From bf3f93a1c5e53418d753300f58565fd21c3f5aab Mon Sep 17 00:00:00 2001 From: Baohua Yang Date: Mon, 22 Apr 2019 14:19:18 +0800 Subject: [PATCH] Enable new chaincode lifecycle --- hyperledger_fabric/latest/Makefile | 14 +- hyperledger_fabric/latest/kafka/configtx.yaml | 9 +- .../raft/channel-artifacts/Org1MSPanchors.tx | Bin 324 -> 324 bytes .../raft/channel-artifacts/Org2MSPanchors.tx | Bin 324 -> 324 bytes .../raft/channel-artifacts/businesschannel.tx | Bin 1598 -> 1598 bytes .../channel-artifacts/businesschannel.tx.json | 2 +- .../channel-artifacts/businesschannel_0.block | Bin 0 -> 23947 bytes .../businesschannel_0.block.json | 1093 + .../channel-artifacts/businesschannel_1.block | Bin 0 -> 23699 bytes .../businesschannel_1.block.json | 1012 + .../channel-artifacts/businesschannel_2.block | Bin 0 -> 23757 bytes .../businesschannel_2.block.json | 1024 + .../channel-artifacts/businesschannel_3.block | Bin 0 -> 4722 bytes .../businesschannel_3.block.json | 131 + .../channel-artifacts/businesschannel_4.block | Bin 0 -> 4721 bytes .../businesschannel_4.block.json | 131 + .../channel-artifacts/businesschannel_5.block | Bin 0 -> 5726 bytes .../businesschannel_5.block.json | 170 + .../channel-artifacts/businesschannel_6.block | Bin 0 -> 4072 bytes .../businesschannel_6.block.json | 162 + .../channel-artifacts/businesschannel_7.block | Bin 0 -> 4062 bytes .../businesschannel_7.block.json | 173 + .../channel-artifacts/businesschannel_8.block | Bin 0 -> 4063 bytes .../businesschannel_8.block.json | 173 + .../channel-artifacts/businesschannel_9.block | Bin 0 -> 35013 bytes .../businesschannel_9.block.json | 1454 + .../businesschannel_config.block | Bin 0 -> 35013 bytes .../businesschannel_config.block.json | 1024 + .../raft/channel-artifacts/config_delta.json | 332 + .../raft/channel-artifacts/config_delta.pb | Bin 0 -> 5012 bytes .../channel-artifacts/config_delta_env.json | 344 + .../channel-artifacts/config_delta_env.pb | Bin 0 -> 7851 bytes .../channel-artifacts/orderer.genesis.block | Bin 18422 -> 18422 bytes .../orderer.genesis.block.json | 744 + .../orderer.genesis.updated.block | Bin 0 -> 18421 bytes .../orderer.genesis.updated.block.json | 744 + .../channel-artifacts/original_config.json | 825 + .../raft/channel-artifacts/original_config.pb | Bin 0 -> 19604 bytes .../channel-artifacts/testchainid_0.block | Bin 0 -> 18422 bytes .../testchainid_0.block.json | 744 + .../channel-artifacts/testchainid_1.block | Bin 0 -> 25840 bytes .../testchainid_1.block.json | 1117 + .../testchainid_config.block | Bin 0 -> 18422 bytes .../testchainid_config.block.json | 744 + .../channel-artifacts/updated_config.json | 1019 + .../raft/channel-artifacts/updated_config.pb | Bin 0 -> 24265 bytes hyperledger_fabric/latest/raft/configtx.yaml | 6 +- .../latest/raft/logs/dev_all.log | 40132 +++++++++++++++- .../latest/raft/logs/dev_orderer.log | 10416 +++- .../latest/raft/logs/dev_peer0.log | 26328 +++++++++- hyperledger_fabric/latest/scripts/func.sh | 117 +- .../latest/scripts/gen_config_channel.sh | 8 +- .../latest/scripts/test_cc_invoke_query.sh | 12 +- .../latest/scripts/test_cc_peer0.sh | 6 +- .../latest/scripts/test_cc_queryapprove.sh | 25 + .../latest/scripts/test_cc_querycommit.sh | 25 + .../latest/scripts/test_cc_upgrade.sh | 4 +- .../latest/scripts/test_cscc.sh | 6 +- .../latest/scripts/test_lscc.sh | 12 +- .../latest/scripts/test_qscc.sh | 4 +- .../latest/scripts/test_sideDB.sh | 10 +- .../latest/scripts/test_temp.sh | 21 +- hyperledger_fabric/latest/solo/configtx.yaml | 9 +- hyperledger_fabric/v1.3.0/scripts/func.sh | 1 + .../channel-artifacts/businesschannel_0.block | Bin 15818 -> 15818 bytes .../channel-artifacts/businesschannel_1.block | Bin 17658 -> 17657 bytes .../channel-artifacts/businesschannel_2.block | Bin 17716 -> 17716 bytes .../channel-artifacts/businesschannel_3.block | Bin 5400 -> 5402 bytes .../channel-artifacts/businesschannel_4.block | Bin 4864 -> 4862 bytes .../channel-artifacts/businesschannel_5.block | Bin 4862 -> 4861 bytes .../channel-artifacts/businesschannel_6.block | Bin 28620 -> 5501 bytes .../channel-artifacts/businesschannel_7.block | Bin 0 -> 28618 bytes .../businesschannel_7.block.json | 1249 + .../businesschannel_config.block | Bin 28620 -> 28618 bytes .../businesschannel_config.block.json | 24 +- .../solo/channel-artifacts/config_delta.pb | Bin 4773 -> 4773 bytes .../channel-artifacts/config_delta_env.pb | Bin 7598 -> 7598 bytes .../solo/channel-artifacts/original_config.pb | Bin 12729 -> 12729 bytes .../channel-artifacts/testchainid_1.block | Bin 18580 -> 18581 bytes .../solo/channel-artifacts/updated_config.pb | Bin 17261 -> 17261 bytes .../v1.3.0/solo/logs/dev_all.log | 1065 +- .../v1.3.0/solo/logs/dev_orderer.log | 101 +- .../v1.3.0/solo/logs/dev_peer0.log | 262 +- 83 files changed, 89865 insertions(+), 3163 deletions(-) create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_0.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_0.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_1.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_1.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_2.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_2.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_3.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_3.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_4.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_4.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_5.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_5.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_6.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_6.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_7.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_7.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_8.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_8.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_9.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_9.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_config.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_config.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/config_delta.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/config_delta.pb create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.pb create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/original_config.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/original_config.pb create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/testchainid_config.block.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/updated_config.json create mode 100644 hyperledger_fabric/latest/raft/channel-artifacts/updated_config.pb create mode 100644 hyperledger_fabric/latest/scripts/test_cc_queryapprove.sh create mode 100644 hyperledger_fabric/latest/scripts/test_cc_querycommit.sh create mode 100644 hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_7.block create mode 100644 hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_7.block.json diff --git a/hyperledger_fabric/latest/Makefile b/hyperledger_fabric/latest/Makefile index 710490a6..67b0ae22 100644 --- a/hyperledger_fabric/latest/Makefile +++ b/hyperledger_fabric/latest/Makefile @@ -57,9 +57,9 @@ ready: # create/join channel, install/instantiate cc make update_anchors - make cc_test # test_cc_install test_cc_approve test_cc_commit test_cc_invoke_query + make cc_test # test_cc_install test_cc_approve test_cc_queryapprove test_cc_commit test_cc_querycommit test_cc_invoke_query - make test_lscc # test lscc operations + # make test_lscc # test lscc operations, in v2.0, legacy lscc won't work make test_qscc # test qscc operations make test_cscc # test cscc operations @@ -84,7 +84,7 @@ ready: # create/join channel, install/instantiate cc channel_test: test_channel_create test_channel_join test_channel_list test_channel_getinfo # chaincode related operations -cc_test: test_cc_install test_cc_approve test_cc_commit test_cc_invoke_query +cc_test: test_cc_install test_cc_approve test_cc_queryapprove test_cc_commit test_cc_querycommit test_cc_invoke_query restart: stop start @@ -148,10 +148,18 @@ test_cc_approve: # Approve the chaincode definition @echo "Approve the chaincode by all orgs" @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_approve.sh" +test_cc_queryapprove: # Query the approval status of chaincode + @echo "Query the chaincode approval status by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_queryapprove.sh" + test_cc_commit: # Commit the chaincode definition @echo "Commit the chaincode by any org" @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_commit.sh" +test_cc_querycommit: # Query the commit status of the chaincode definition + @echo "Query the commit status of chaincode" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_querycommit.sh" + test_cc_instantiate: # Instantiate the chaincode @echo "Instantiate chaincode on the fabric network" @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_instantiate.sh" diff --git a/hyperledger_fabric/latest/kafka/configtx.yaml b/hyperledger_fabric/latest/kafka/configtx.yaml index 9daf44be..92e701d8 100644 --- a/hyperledger_fabric/latest/kafka/configtx.yaml +++ b/hyperledger_fabric/latest/kafka/configtx.yaml @@ -241,7 +241,8 @@ Capabilities: # prior releases. # Prior to enabling V1.3 channel capabilities, ensure that all # orderers and peers on a channel are at v1.3.0 or later. - V1_3: true + V2_0: true + V1_3: false # Orderer capabilities apply only to the orderers, and may be safely # used with prior release peers. @@ -252,7 +253,8 @@ Capabilities: # level, but which would be incompatible with orderers from prior releases. # Prior to enabling V1.1 orderer capabilities, ensure that all # orderers on a channel are at v1.1.0 or later. - V1_1: true + V2_0: true + V1_1: false # Application capabilities apply only to the peer network, and may be safely # used with prior release orderers. @@ -260,7 +262,8 @@ Capabilities: Application: &ApplicationCapabilities # V1.3 for Application enables the new non-backwards compatible # features and fixes of fabric v1.3. - V1_3: true + V2_0: true + V1_3: false # V1.2 for Application enables the new non-backwards compatible # features and fixes of fabric v1.2 (note, this need not be set if # later version capabilities are set) diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/latest/raft/channel-artifacts/Org1MSPanchors.tx index 4d736a472d140257fb0f37fa3c77d9ad461c006e..b4c1defe2a1905a8ab7ce54d9f31d6b84a0dbf65 100644 GIT binary patch delta 77 zcmX@YbcBhY>mU=CESEF~lN1}rzd2tg@`p_pX4K?R;^txxFUl;LIIUo^Jfo~4jGtOm UEX1J1#l_~BlADmU=CESEF~lN1|A%jEWn{9%(-7$qha$W5G`4P|j?u{oyXX66+G06Uxw Aga7~l diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/Org2MSPanchors.tx b/hyperledger_fabric/latest/raft/channel-artifacts/Org2MSPanchors.tx index e783c8bc2577bac4a6f7777c744bc6aedf63f92c..2bd0b2497903d0ffd647465fefb46f90ad07a130 100644 GIT binary patch delta 33 pcmX@YbcBhY>mU=CESEF~lN1}r|2bbL@^71X&U|9D!(mU=CESEF~lN1|A+vN6%{M$I#xtM)}1B4hR9$OanEOE(8vf+X6b12LeZvy8}3rRslDYtpqcZc?1uW xCj%vufde{|jR856^8-7R#sNW*@ivoA0zH#11V@t-1uv6u1)`Hd1ul~k1}vv-D%b!3 delta 131 zcmV-}0DS+x489Bx3cCyn9SR!=0vZMggOi7m4@8lb6p?39k?%Q^Sp+tdp#d+G%mO!) zqyssV7z9C+O#(-gj|4rFUjags%mfaT69PJuC;<|aMFS<1&;d1*Y6Cixlma-D-2*$5 l%mhc1G6NHnIsqk<0|PUWyEBs$1uv831uc_71*4M^1}toHD3bsH diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json index 84365fd9..db0ee773 100644 --- a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel.tx.json @@ -217,7 +217,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2019-04-01T08:19:15Z", + "timestamp": "2019-04-22T05:17:48Z", "tls_cert_hash": null, "tx_id": "", "type": 2, diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_0.block new file mode 100644 index 0000000000000000000000000000000000000000..e22d6626033a1f9d3415bf58e190bd222ae1442a GIT binary patch literal 23947 zcmeHP3$Wu>dCn$bSx#PCZ6M)7LfE7f)&$$~OKwW3-jZ#}mMmMgTPDb|EL*lDTe2<7 zEfD(PIZ&A4JwvBF+5x5|Ofyp;!_a{e`k+h;oel-cP@p9YG{8)OLV=-2_OsDWS*AribJ?{@c`TQ^W zfA{>4{c!xWx4jAZ+`T8jzrg=5hyOow5j zF+~32BzVI~0Los+@C;9=R*;vTygm9MXqFdmA!%9R8J@%ydbt${JWo;zN#gCQi3dD^ zo4kw{2!@fV(jr@Pa`8k^stpRAxe$tivNI&lwA^t@h~(Rfqff1PgSVnKsekqKRU2hQh0>0kBB25q(m_va^qtOtzLr0SAH(Lu&)Rx?9`WhOvp=fjdM&e{rYFhOEoR`7%Xi%QM}Uhq_%41#;EQomLVpfe=_C9J5s+ zoySd@1thusC7?Mx!Q%u^2>s&RNt9H#J}k|!#=PA~Qt7NwFJ(2%8`TxPV^$1(jOo;9 zB7$_;^tFO$jq(Yr$dpH9rHp0NVzEff++Nv@k%ZgAMy#bML`lHY(G%-X0ZqgMDSDI~ zFezM!ZU!d{1m4AH+`@5z^p^$sKpF^S5$ArEG%4jL9(18Fsu zX1qFCAmh5}*ku8C+4W@+@KAU{#|2sDF z_H}_Ia^bw8;eFf>3v4IhO&YdlBxfl8%W%g7w}Qu)Ju?|0>dUuoz2YpmBKq?sXOZte9r^F4@9g~2 zp>V53aO?JW;8vWmcuM3GxWH60V`kRKlMTDJ4{rM6Qp1f^@WvW$G@B1w3wqjW^m^?E z;kT+8tBoe+9EEGEGJ-;*Vh@xcA|9k*!1Z)dPzHfW;d6m9=kPO7qiqm&!h+ANw*l26 z7J}plAuMk`Rg#%J`bvf+)(2nhLE7gtQuE=7I=nC^O~hR@hWC zmevrh_JW3x(pQyxf&_;fN7x=6c3?;A0^u&p0N6mKiPF;tFSs9{>wb)H!xIohJZ1^y z(Ja@J_;{uvPnjZJO|w(aOk^Y@UCC&RX}e_1#ELyuJS9=q7HyJm=UQQbGviI5wd$pY zoK(~j+vxGEf)@3*Uk|OeLU<2?Phw=@oh3Z0H98ta0b!aRVbTmC=@cG~%R!SMq#6gC z7*NqLBqtPH;^G8e3*a^)zQ9Mz14wC_HzgBjxk;%)wN!sjdb6@?42I-_t(e2O=H)ag zBZeUn&*&2}CYtB>L`sH-1TxN>?O7GI`eL3)dR2~?CVj`Cgh?--^$R_*iHZa^7@0$= zwIE!QXC_X26w4?Lcg(bhC=e6lMSGgSGGnRH#T(sR7^drPmGhE#_5d88ecz!7D=r|y zI_xfl_2=crVB%_-PAV*5Xl|Ny=-~Y83VwkQ=3i=rRRlb-LfBkjn<$KoY9=AbSio(^ zWQu4JEjBr74~Q8I>iWE7pBKQH0qmSjZaak_acPrIP&n+yl8MtU?CF7?NXm`5{f7hVUQyXs~>O7Rim15MylhIwS=A1n;E=MFd%7R`Ft<# z7j2%dqqFo}!Q@3&7vg#*6X)a-WqKp4Cr;|-fq{>>7F=27a1=Qi{mx_y_a6$NdIX?u zb_YP>bl{-9*>Ex{5rs+DtEjOGe3<8FgdOWq2~msH;0V(Ug>hs*%Ex*?OPB)7*kuvu z#exVBFiu@$nCc2df(20^gkehUuydFhKlD%q*0GA9S}7?L3!1Y+HM79<+_>5#B`KZk z#zmoEO1T;;wMt?N%{l2FnWX4xKfefSIWSSep*U_f7oOc5wnHC{IgJ(@q`C$}qPBKu zr~=$}th(4x1-R{4HBl-}(wb%RERQPF?nHExWi&`NJp&&s7L~r3>o+`=k16H7NfW#W z{4!QWp^BUHt-LK&B&pFCgj^y_Qs~?+butv2MTJZS9WmqHSeVaQn&hdpr_Nh6AR5gi zGcH+)1St?@3!AAOzuKAAg4P6|Hrnw4F2BwbRI0=rE!sDdyI4OJ>lS1UA zKI|LLWb5n4U^||H9nZiX))^Rb<;XC+t&@1i?mPb3G`Na(INF%&R~K_`UEzl-z6Xs+o(FE-dc!u~^Xjw6@18||y5f75JHL8pGF`LI<9oy^wx}tz zHF0`KRe&kC7hzpXcQfH+NC1X?+m+5lN1G`Ij=6#T%1c&&AzRT(*}Ni zPh8Gm!Ey>)5!@uf*p*I$n@&Wst13L18;oMfQoA9e16nonn4Y4&a=rwouw{|OtBKA; z_q5pz6iTtF>?Rc{jxpjSpJ}z3oKofrMq|w7f&-_p7sL68^lVlkRg*}eooUm{EtFY4 z+&^Xg1wz@Q&-sKG!};_XuRzS?Ht@1}vmm;HVF{jJ^#?UKL-^C&v^}m5hZCijsc~4W zobWL^S?FpHY z<_u@(m0DWV3f|Cdkm5`vb0V6eW7$3{rg;dM04O3Rnju*&WTq0&PI6S%mMwNsE`?$x}Ivv$w`h_80EypU2Rtl1e-V9YF zDO?Ows!TUDjO+uvN;2bi(^~k%xQh?t6|bg=Lu=NYP-zKQ4-HqBj`Oi`M>fZ!iN@8k z3*0J_onQbVM0LZsEZ4oUVok*n>gGy4eNVXB!};Koc~h-b?M#d=B~pY`t*ZnnL(YfG5v^LC0MqJVX4EQPqLn7eii%rau`~BAC+m+0+#0~wE!FWs zoX=Mx&gWYv!Es{v^TGM-1JH3|xaURS#l*SYuQndl#Bjs={MRwyeqMN=W56B!=KZk^ zxV_xZQ5cqpCfQ+Fj!qXv_13)1*(1?K=hrx#F4|pV&HZeB=M=aSCrdtZ|0(3(PJs+K zqx-rZXN?KzI#9Sn3|)PI+zg%?Cs(Sw_%69ne4Et*Iq<~scC}>%A{3`~+wcyp2+wz3 zMNad3hgSOyaPx5ce7xgNG-uM+CPoJ~vG3?^$M6q5!tLNHV+JX__|Yyf1%7GW&gDsX zr|TYi4hGzI=dj;3^iUrfacOFJp{Uu0KhkuAGP-@IA8D=*Zz~OMJ^whHE8RKHq0PyH z>z6leQzbQeLTMB2(299*!@8x4r#Zf+N6(Q6 zkI>rZft!~2s`l;a5O&!W$P~{oYNHPPe(1T=0ND%BsP3V)?f_3-K8wwDD(>dbLo4s? z#-wZ8{mG{G5&GZu16~hrTepF$No}OH`$O3OAyltN0Dz-V9lbMwT(&NC_UsO4egksN zsVgF0efyd3F0&r?Hf7E`8$8aM=DrcR79Iwyzn{K*bDRvgzO=^aZhHSF8r3&NTz$!zP0EJt`DAIp` zi`6Nv^&eoDPO&Bs{9312I$vtZEb#hTYDw9Vgk>e50vic5k#0~54W*P)ASifRP~a!y z!flbfQixQ}>upPM_F9__E>@hq)@Fl?6=$#ImjDVI_sO2mmsJvMn@grsbfv)IgEp7L zl4@yKL%WkOi-88?`3cs+Tg{rnU|pT^<_nsvdc|71-{iTn#C715-BUc9C}37e;TOqr zO{p*3`HHrHLiK&J=Y6uugQP0pD6-0V%IlPpEL0elT1G78%JaSzW@V$&QhK1BGu26r zAC&STX*Bn}@YzUJ#5P%+x7pMhP_;)IGr;8^8sxRA6qo}(LTDk-!Uq=u!d#V#jK>}oBkIG|vrF*_cYYAULdDpMZw zG)tGfiOuA@2}_a(*@H>*NS3xwDY;uHc~Jk4x<5Fm|8InnMay(ba&i!&@rhZXodh3m zXpT|9TN+3>F*R@6S&L5=<1Lzmthv@LsbaV9Ta95IlM>!YA2V^LFwOF1oGbAfpB(aI zC(Zf6LnO`r@lZ_2%fK>TV?xG-{FIZ~rrVoUI_Zu{jypBBx>uGKS!deRr4~vaY@KnT z$aU>aVG?alT-s+qVrU(<@Afc(Tp3 z=1m_3u|j3;qKQCT;N=ywhAk~LOV^9mTnVJ*#E>AC7NT8JeI7bwe5m!5Y77xTQxJ~r zmLf9(wB$f9PEd>#)^eguz`>p;pv#7#^Mfot(?Yv4^zlBZah>dx%;D)S%XA`Nj)SGB z(97)i;F!>ZQzLna8geF~Bnu)s=!IQiGaS~gxuZtP^(b!MuatyAy)7zpyfsZi@ubez zW5zT$3&_@(WK)^aNKUm|HMX&+FB~a31M;ZpRf8esC)|TPIGgM;wMkr&XCgO4!hCC& zG~-(2>fQO>?n>*__UM(;>)aMOhui{B^weD^I*nYr`$Rh=#X2$F`p7wO4V;hohT~6t zB^(*ZpPfVAeh!>6CVI!yx)bE}=fF>{0oS{$>^1QmW3Jhwq46BuwNJk?xApBqhY&T= zTARi75F%+UzmlFAfv9zdBo)`pu1UhEaei*PeA)ZR<)*vhmO?k6MQbUsuBTygyUU{Y z5b{$Mng^rMx>P#h z4D?aC7nrudnO&J7v0|C9DUui}dq)cBK!lDr4L@M0pqE3%_DBIu3VTfpFu7g17Iw#C z&Q$%Hg2HKS-YYg^YCsmGPHLPk`BV>U)=`+AR=W$mQk)F}usz1eaEu9fp07b`)S%TU z40Q`XPa=epnZfM z1N~B_&=+u^@3X@0rD8y2LEp#4@G+w4GEA9pnpJ}9P2FxQ9(2dlq9^x7yV11M89hn5 z6Mx8qV9__J@&v`vhE(a{3#_8V^ifsrSLH-$-Xje zGMZ*@$KJ23GBdED4NZ~5DT2oPG(JGNd^SEn(dx9_;co8r&}-PU_WYEp^g)^vbT z4N;4aX%cW~S1h+JZ$4+@uE(U}ZRp#twBo8$6k2wr&Xi0yrVIJONH{3PK6`llJ4W0k zo3tJyE`sZ3fr$T?h}#|i&`S{i_%VvR{g}yjeJ`HCvbD@$6z*Sr$np5As;xsJqxEtZGjq7gfW^nbgl+w2icRE3?MXm&wqyFY7 zPXlM5x*}TOOg8+9*I$ZDeB{)oz|r&*=fHJK8BJXq_Mx&QTHNUXjl^17u~X(@(pqfT z=4XJ@k<_d2nE23iq1UlzBM5Q|Y%kogx!T*olb6>KDRZ_fR43k4pG-XiISqZ6KZQTn zZHnJ@0-WAfSKytF2Um-O3X>rsfhRv0YyGRaL?*G>wP!-Vch{a=XSr+ZhK(X_`+V`0 zt#a!e01=JudXxUth8#QsPFI&a`Oel&bC32cp%!NSGT?w`c(~5x2%4Jp^Fdzz6!76K z@ITQKd{8KJp(Xe}dlKAxa^o#Uj+ZMsf)C))x32A*<-;WckC!WY6qYMOZoKK#o4)D1 z^nHmZed4vDfl)#5TPI$uZ++?- zH-0-~4*Y)KRmdM*wYU0fu7d9gciiEdBdiX0EDt`K*7aB(43*T!^5EqX58zlHd@K)+ z)(W{OdGOZRJ!AIu50*V5?|eKsPP~>&wjRmu9IbE{t;Bkqcpa}3xxExPa^vZ{{`YzA z)$ig?PVWO>{OlJxABw%^Z$9wy=iP>|3HtJZbjZ(sTDd*dO|F!#H|Dx}`Knq^+y05%aM9^ZoDfPoCgAuK}O?=hw3h`u6Gj|JQR5o&MzCvJ#|H%3K^gHZ-d*+8O zKl|VpPgHJw@ctM76#2lfZGgw&zi0pb2KaBMz;|tKY@OQt4PHqm`a-YG46Jq{KT+z`j5e|A_BmB1Yw(n1-djO%B5_oUMLjssnaVt5dwEw*&$=fGG64dWcb87q)*{d zUko253v?3W!!LuCcpU3yDa^z$p70h0IbZDaL;>UYPC8M^NmF4GppEG`O{q;MJLxw} zvF%{z}k>D_o37CAOLnY}{dX#NewOGAaNCP1< z^%@dO4kS6CHo)^wY;2xH zo_k^gdAb5_!-m6wp(X*()t=*)HO=*qe}vo* zz6;zvgdbv$II!R&+Dx&A1MLyjvCjQiX6qEzu?*YWdf!EGQ+SbgT|~a}I^=I(w{zM5 zaVSu$AyB)<4p0kI21^KB4CCo?YD7;PIig`z_W@O%-)NvRGS*lDm11&1YfepCjb5+a zz`a%_Wwz1Sj3qH;y9_T=sL%sNh^4C(^x2*&@N(Z5NNmQF`V9W{>)|m7Sbol>R>wfy z#OJ)|`NTFz8OqPss&h)_;p7(1K?KehM3nZFdJEz&HEhaMoyW!P`Dw-rpo-EHj%o$X zddgH9g4v!^5RB?}iOS}e^U4ljDV4{aMHv7)C^u1Ra`l4yk-b6ywgfi7@o2>4 zOT%fVC34YJLz>V9s*+?Tt{zK?TC$u{=96|&n+j!XB)f8~q|Dm{*Uq$pJgY~WKxx&A z4Jj_yi%g@(F)~_E+g>d&+cNH61=;w}#5xOLSE^Jv{{mdsU0kPVTvSOcoYDOzj*C?m zcF`xp2~3K~n8-$Ptm?yKcyx{p7Z(td6sLMsiHM+IITA?;UJ^(cr?;mS)HH+~9(OA&K8bs_M)KocF74%eLK7A6Y=5W^ z$krTp2#y}x?O`M(H=GgO9-u&ojppr1ESnmMjV{*cW`ZDDb1JMG$I=JP02hDtP=poc z5Mdo=7s8BLsnH)hN~)6x@>w)9N!yfv<$d|zK?w71G{VX}7TZSHjAxoCjH&fhjF+-L zyNu=}-ojfeQQLKpl;APUhhQQBM39LSqR%;)em!6T z%LI$8z$;23*TeEwoHTP*(ZKDPEQomEXK>9lqK#QytEB8<-FAp-%*v?E6lUNwh@075 zt{3$R7Dv_4X>ulKrFmNAqiQM@Wu+piyF;@ljBEOVArrqH++1NX6gd_CPNnmoI}|{* z5J27Z4uFJ7-$r}W!FX82^W&~tu1Cu7VP2U_cFb2LM9sG+N0^|qN~va zYAJ_?D!?vd)%Audz%FCeSS~jSbDGLA94b$`W5J1+P(RUhHLO3Mmkl9fG~7BDkxP4% zCioq2i&zzgDt5-Ta+X*Y#fHK2nOG1f(V123q(~->@~JX9q({9GKbtWW!I4R~K5J0` zZ#3idsA$Gw1do@@?6ltTDxGQ7Z;i1@qaAIe`{)6os`dO?m~{TtDR7(=9w&vzN#VQcAk2^25bT??RAz6bRpqjVt5v|+_6 z$0H~@al8f-BU?48+6e?9M~&KCA~DYs99%Ze7z3Ni?U)uPc|4UY!E~PJV^IQ2kkLfJ z^ffW<>3)GZG>Km2(BC}Y)5YzAN-HE4wcEu4ZFC0RrcMaF)|^%5NjAzR$);f`qojsi zIT9BuSg=^amU$Xk zvFa+*DaaQi6Um9oVl+z&<6NrMrZaMh&1;PjoAD1^!d?&OBT&<6nW*b{0_{wiZe}h| zbHV;4>vs^!UVY9dxE{{Opxrz^mD<2f=k&bb@S4fHUd8KIofPg(GL!bGHW-ZMUaHDw zBc+&^rQ+3G#@5u?v|vp7irnw|e2eS@DbMt(aXwegN-=x%O>#ch1DO4s59gAtT+HyAXU*T(qs~ye<(>rr5&{_MXY{kxVmwikA>NiJ{pb{ zwwj(}W`XGVeF!148$>0k=8j}@A`DR{Q|zgG!qpzm2OH0t^=idRMVLJ8pe#SN?NLq4 zQNbj_=i5pwfs2(|9VaBn`LG$hRjuJ*Qt3~%YT1pok_1t%W2Rf^%skUhdqW&E`|x#3 zWpohd^VyK|`O+zHoEUyT=PC(I0oFe3h#3axP#xk ze|rONFZXj~S|;R5)@06+XqhW(9L_QAsc{sJDXg%=F|D|tt-sy`H)BN6Lq4~Oys!yU z;JoUoYLwB&gkwYD4nAqU17jiO7!31q-sqh+;41w0TYR$Frqtq9w@ zq9Ut!y+f-#3LY3N+v99+tk`2i8EYNbMZ;E|j^-VDg*SoQv?*lQqDQ;I1h`|>&qX7g z-E|Iag9Z=3ZD4dYHBbjyRGesTASjmR4HZ=*wXR_sp<3(kzEa?!E3dP@)1B)a+MP7G zbMd9E>rykr8z0_0d`8<}6>SV4^Qm=?_LV&X&VKK5*aSS*-6#S(*dy(7WWx(q5xs&Vbq`;lU6;5|E@Ao6;VU5@9q2qT| zd*hxH$ibyoGcNKTJY?G!VrS&pb$&^Xu~= zKmYMVDflu8DR`~4(zA%Q?6j}t$Fx*Q(!r$DMpOA5T-X($RAJQXn;wS4u7EIaXUqElDesuxtycz*;s?W%!qN z;IU9%$%p#r)v<-Fd!_0I*DLE@sk*`S%DPwbO8|w9`vlWh$|`ZD&Bl`ns+?!Bew)o? z%|xwYc;Dfo$acmJDXEP#Vu6ZMw4SpBHMvWc2{;SJfAg-GB=Nx zs&Z}a%(iI@C~@B>nBFI=JV>enjv}j^CEQLi&On7>v86>4jx;mOAT4R-mfQpFj9wpC zxqdMh5L$EJ3!k-AMQ9U+S({0WB7=Is#VWcdS6lw155}=6txvdmw4gA}Qf1ibLnSsO z^cBs6ykRfXD7vQAt`4GEvC+rXq2CBtzthFyK50l6ly_fSSAFqahk}R*-($6j9S|w= zEYZwHh-9}g#v^XA#1oV6ED+V8p6$khh%vF|65~8orTgvrU?MU{6H12c@>(g`q}V=Z z59ml>r-K@6l=^1T4GOtVC&yBadLquZ=7f?>RtjBK7+aNUT(&`8PiC!XRIJv~I#H)f zBaULIqC2+eTsLNlQa^n#X&%bb_9-QI3ndR4|Kacl2aW%=P_kg^c2SD=12j6;%ak4C zq7B8?@>oj&F*{Pv=~mk0;)Q67A|Pw7bc=PNYj|d3P|J!jcc_l&D4n0Axe~?}IfaW4 zxRIS?J^v+==6`Z1CZt7R8LcoOVSH}FN=(z~P0O8RM<+&|DpT1jOAAdmZSqD7B@Z^; zI8fxea<$O0HY+TQHz0K0tfuIfWV~Vgh4BWymJB^Y*KfQ5q4Q?jcq95$D9;te0_Bev zo}itcQ3|xREaE2AL`o}7WEeleF0X=LmoXXF)ny3h@SSkZc~q}VMgbuFIIquKf-6YYt^Xvx;y{1}hM z+jMKz^iUAVmuC(d^OZSP+Gf_W3-iswFQYWK1=3P%fa44E(JrYz2fZ~O)Ow0l8uy`{ z2+Qu4BGWuH^FSAmUkDY}Qmll-$)3ZZKZmAr{WLaJ0;@dmFauQCPI^LQuw<8^JE5b; z&L+sfP3?E@=+M1WB{-2BusSZs^8(uM1zlj#Y_?r>hK+>dlI+YV7x{jzEyy#hHHky< zq{`JI+9WgeiPnf<5~<=)O0-*5rZKP0Z81It(y-}P{6W@>IS09S*4brZowy>eM;?HL z`PME8$nD6P-TB?_N~_fN=#`SI+!ncnT!0O|c2`5^klS}RbQLP#cQ1jna6RH_wm0$Q zV5lL#atV3z64=znYR6T&W8`Npfp44zcRJhIYiy5U=tnbKFCIFD)I+VcURX^bqSErp z$*JZGN_RkzQAO|S1dJM2=BA66y{}wux+`wUR0Ep3782`P5+=91%zZB*KdnRCVHjE$ zO6PATKZUvJw(XFWvGyu`rb9OqQwv%R&R?a`>n!>T9|FYRej|dM3S?H2d5Xw#jd-`1 zs8*80dfcA-8BYpk<2G~}=FO^8CwU8SZ8NA&v6h5NlV-I zU5O^Lg%WO&1U``W&J@tQ2)%L&cED6YEvAa)OaV;_drb>4x!rax?2g5(UiYdp3YWDx zx6q8#eIhS*5~F0%BYW9q4Tb4xr8`&4g=yah%Q;4ZbBxb%ToqcQ`mIKOpqkhf5+Rfz zc73_4DF%ct$UP20QZg(fR}#p!keyHcYJFTw@Hs+mV-+FNDMrkGUQBfIxrSPW2EiG~ zcPlAw*0HOtAX0?3MYB>z(SeXql$kL|({rEC*T-Teunv)m93$=;E5c*ML1V1A9h;94 zcjFMZJO1r8%pNKJHNq5HUvo1sh31$V+L2-txY(TvsF4%ZWPZQy|QDcgy!{qTnrb%n+{EvaJyN-+1|wIwxWJ_M9zDXAy|#3l}xE|!Wnx54)}9J zCre`#LmOhbht0EPIie0Ll2MUj#aWNgsGw|)hEc6NGWC}3>#gb@FCIi=XvVASq4g6_lWxEL$jZtm2S0KmbC}vLjS+XH0(Gf)e z7VQe9w&~7hbkuR_M6?YZ|K(P+ZWs8LRj$!R-HE7tu0P}tO0h2<9{-LJcf%H~$A}Bz zy53si|4YQ}j(_M&U;phxBR4`Z$B5`$*K?z>Y`U824}<;twj9U5?Y&!eQApQ7<32&k zQQ{vzQP}`)pr96d*(4>K`A)!F(S+S>mQzk7L&qkLlZ&uL-$y~$BeQmG+HoZ@FO=&s z44dRlWv2B@`F^L8Vyj+(?vAWrZbrTh|FAMKak3SPEuuknIA?Mc zqs+xzI!>XDrehW(cBX(AbRnKk`oXHru9l05tM7{M@9t7v1 zx+2^fP13xvYb?Yi9#qdg^A&aw_~_Q@ZS~lRi)*DDa^m7%4I4ZF zjpxf5e*44fW#fsh4{sn(ZR~C1{Tr~6pWN7K<=ybWb?+y*?%>fowfkPyGt^V3!SVF7 z*tqaWroV8Xr*J>QGv}aJs3Rme*T47o%b$PjG4ZGW?=PPj{m7q@zWu((9(eSt&yIe-RRwSzytx5R IfZd?{f6<;84gdfE literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_1.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_1.block.json new file mode 100644 index 00000000..51f5d73e --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_1.block.json @@ -0,0 +1,1012 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQRENDQWVPZ0F3SUJBZ0lRVjh2a2VKdEZSUzRGeXVkYjI1SjljREFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dhVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdGNHeGxMbU52CmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VIQTBJQUJHYkgxNDNFUEpIQWtiSDc4MVdMbFUyZnR5NjgKWEZyczBHbkFaWVVURjhmY0RyeHpFQ1NyS1ViaVlJSE9RSGRyMFpyVHJtQko4akxUSXoxT1VUVnpveFdqYlRCcgpNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WSFNVRUZqQVVCZ2dyQmdFRkJRY0RBZ1lJS3dZQkJRVUhBd0V3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlZIUTRFSWdRZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGgKYjdnV3RVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURSd0F3UkFJZ05iQ0t4YkczcStsV3lJMFNnc1RVWnd1awp0MHZGZ3VJVy9LYUdZT1NwZGtRQ0lFL25hZXNUTjhoN1hMcmptYlVsLzhRWGtCY3B3WHlId2RmQTF3RGlSbTJVCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQUlxMkFvaStnSWZzci8wODZVNWtweU13Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQk11Y0h5UUgvY0toODRFVGpKZHlNbS8zbllZUDVvKzdGMHVvbzkrSEx3dzIKZnNEOG5WdmRyUlFKTlBXMEFBdUpqYXhla09Ka2RTNUhVc0tGZnFteXpqK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUI0RnJGRTlrNkF2YXltUGxzQWlVSGQ2dUM3QTRmR0ZkdnQ2RW44M0R5cjUKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBUEN1bzhTRUhMMnlVcHpHOUVHYXpROTYxRTJYWW9qTCtuN0tCS2dOMUo2d0lnCllMNERKMzEvaUlhbU1vRVRGelRIcVI1WkJQRVUxNFRIblRySFNvUEk2UWs9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "2" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQC25YOxKyU3st03gkCX2FkRqj1H57gHoQJsRD0pkshz9gIgGZiV1EqsB3dpZIx5qXeE7tgdmbRdcz5qdbugyxYcX9Q=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "nQEXBdijsjoJTokM+gBkE8nrPTsaBD3a" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:16:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "FM6BGSpRFqY/FS5zUBekICzU0+0MWOlq" + } + } + }, + "signature": "MEUCIQC5sum5r5tYmOwts0NrVHB/eAhhUj3OQMOPwUmauQvocwIgFp/JDX/YT65OTZRZm/3HQKEspYoTDW/sMs583BYeyp4=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:16:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "3fTIxbcwiSZpoRcwZAjjMUtBBXuY+n3u" + } + } + }, + "signature": "MEUCIQC9dZK9HZa8vurcPfuYkbKjAna/SgwztXWhUHpr8Cq8mQIgHe4f+3HvIEni1vP2WCnCKmxMmpXPbtrFPOI+hWxQhG8=" + } + ] + }, + "header": { + "data_hash": "9CRelqj6OcbcTrf7sxMZZxFurQx7Pcgf7QBTCR8d79Y=", + "number": "1", + "previous_hash": "9ik/pgFaqrIicb9Tt6AxH+/3drb3fHaT5NQjB8v5Qlw=" + }, + "metadata": { + "metadata": [ + "ChEKAggBEgsKCQoDAQIDEAQYBRL9BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiU2dBd0lCQWdJUkFKQkZGUkRMejZVbjcvMHdMVWtKZHhNd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFRwpDQ3FHU000OUF3RUhBMElBQklCTWlLeG4wTFdvVmxMdjhYeGJYMUQ0NmVWTDZhOHJwVlRjZGdQZWNxOGNEcHROCjRPZ3NhSk5qcDkwaktGT3BDUE84NVdLS0tCdm9oT28rQ0JvWjhwR2pUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUgKZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU1kNjNTOVJ2TnV5Mlh2dDZFY1lvOHVrWGoyVQo0Vys0RnJWQ0pDL2Nnbm1PTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUFzR3lHSitkRTRGNTZxOFlVZTBXTEs2Ck4rdnNYUkhEbFJzY01DQjd5eFhhQWlBc3lKR2QwcnRYbWFlOWIzUFYvZXZKTlllZ1JRUmNQd3grWHhqUURCeGgKUVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIY7JmdPsh/wTAHPdxehRVzKygaw1mzFR/nEkYwRAIgaMQvtOBh8gYpDaqTRyMfebKhi6o5bggJ3X1v2qPybBACICpyfF4ohcBQ6ZKSUZH8qwxxiNdEd26Jkh5A98hxwFpV", + "CgIIAQ==", + "", + "CgkKAwECAxAEGAU=" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_2.block new file mode 100644 index 0000000000000000000000000000000000000000..000cc443c890c70d8d4bc7e801c9b048c06e4890 GIT binary patch literal 23757 zcmeHv3y|y9d7kc-w0Cv%x`Jdq*0yrBRvhIr7D@00He*G25+DhX00DwzTDu?!f&dAE z1W1Bl#;zoLoF<+)j_f>~=Qy6kV<+**aUPDGaUM!qbsXDu>`qcwiJQtDdE%;8C$XJ2 zanl3tlDm6X_wMTI%Cgy~kC#uM2KYR*&8vZ^4fB$>~ymIr@*2d;1Kl;`Ge(mWR+nqo(RfHzu1}c0cke5lH1}Ic7ld&15KvOfXDjR45w$ zB{aA#gxeOp-Cu9xnf{zyzzc;V1q9xd@j+eYB|e~c&cM;Zh-#|yQOn7PZD-KqrDnk3 z%d@j|kd&Kh+LVUHUfU5yKu3icFC~IPusgiDG}9evpgZ-DCwGRqH%g+#6MTUP$Auc7 z&f_Ls03^BlA)r}2!Qli)@K$L)Oq5l(J}A$y#=PA~Qt7NwFK0E(8`WjKV^$4)jOo;9 zB7k(o^tGa3kMaq-#8gIPwSr~TQmI7D++M|vk%ZgAMg?1zi87C;qi?K31vC*4#OSMJ zfl1+fbTe3qC-5#t<2H`-q`z#)1!A8kOE|}OvZ-2LnhDboZOkTFT5r18wBN8%1*Fwj zn(^vnk&Nr+(5djaTUcEd0S|>IbeyL}lEeK%SSZFibehRz$5>M_5^A}W1ww4*HzbxC zNWRXKL@t~+G~B}duvq9Myh+2+jC?y)t;da7QD_>bBuaWUn8zA(Tcn724~XLHUk{eE zniigXUpwv9Zpjr{XHdxw4cNT4b< z1ZvmX1FBHN7K%*UlVQ(t2$^dQ3Lcg|1XO)-rGZ+I@x}_MbRi$M7TmPe==ItS!f(|w zb{kF1Sqj&7+VC=s3O!JUSbCm@0o&6BUhW41h0l4)oWs9?8f}AslORNeg+mOeXaSQF zGA^=l0#^dKjfgMs(eeOdn&wQ=1YKfS(ix4SC z+Bj|C7tTbghT{Q{M6QQdc{fQgPPNlurxStfsxn9B`lDE~+-^u{pH|I0rl)AHk}u;H zQ4tDwEzz0io;I6-VmUUI+@vhVF-Dl=Gp#n0lPhe|XpGrhaLH9*`$I>fth9hA>lF5( zjGoP^q-qi=v@>mbxrIE-hxCQl7JLVx%)inotMYha2W4}<&_rQeRWk`*!UA?TqEkeR zXcdy9cAuERlt2&5&IRG0>B9-yWOow~5*OFW2!+F`ESflNF@_7Z5 z62q||@U$OL<`Nv$9dL*cJO<9=L3CLidMB2WJe=PUP!xbDvI$ZQI2SiB2QXka$yy?2 z2^h|!TKT3kAv5BfVGX^iqy??$4crDP%mgwgpeZ_*wF*L-gMbNuEMS5elC@%HDsqKM zj>1FYM(Akqjs`m_RLEHhPVk_Q)6)y*@*tlWQ)%n37~oepl)^#Kt*TJ za0OQJ3TE-0g^>%`Mva6E`?yz7Ivv$!tl|K#Rbtgf zE9I9QZ-&aE7%m1WRiYajMp^)`k<7T=v==@x?&5=Z)l)QKV9%NpDlOvbk>LukyYcFB z!xdn6(GKAyC3O z6Q9hRs#0?@u|kn?QI?+#hvT}Kr^9KCFSfNriV$mcl^`XW%ZLy6VLy-0ZtOblf>{OF?@*=Lu5lASjKR& z^*>Gkck(25@+9_>KZzmNL}bZ|7uimO>*-;~^?bvDC`7&+fix#_2eOH5z`v(AuiCmE zxo*vsta~NE8OhKf*Xh529;#R8Z8g|g(K5(C8Brtvqq&^0Z$2B0_T}( zX3WeQd9vXs2a=zN-u-4g&(gW7(4v6>ZTbxpuA<7Fjdi1X`kNW?Sxgp3L1 zg)?!Pg@Y&!Z_jF|Z3%fI>D5?bn)HVT#ZP+qtY7R2O;jMT{>U6qtp(wd95WfVN3o3D zaK}u0fC3>gUbLqPEHf4xUA)oFg<-nx)>tozXD^Y4Uk+nbvgVaWf8uJHPAV*7Xl|Mv z(!qt-^__&Um!C13Uk+pBQoiVS;s!7czd)K8p^nwCR}vSKd}Ul@4Q-YQRnJbBhhjV?2rV$cG9xrI7{~JUu~T}HjM3$Qvcghwq zOvr*rgh7rlY%AWFt41v|9H~Q>R1!{3Z)PB4#DJuY<@3Ebe4yv(Iyy_wWlUORbv~|V zGI3TaQ>Hhvd%~pt(lbWFv_C|9v%zFkCW@1;S5;$GNdH~<2J)N17#)f{bN1ql(V@o2 z3RB-i#^_M=p)bK09cp~>P_@SxQLU7ii3QDBv6fk2dTv~6lA@SScH;tHG{u~PimkGc zLUY4(k4#eZ)XFacB?l&QI1t9o=E8HDgLdenv0`sPrDPrO;*q#)$|O!zgSc)A!ju_m5a%hgGti?#)zGBt-K>vMX_P=d@d0tDRl0X zI~l5wMfpq>9WmqHn4ixJkTIgto;q*QfM_(6%(!eP5+qMlY;2}>{90$G1g!}^ZM5T! zY#+TusA_#aVvPQF1Dqs<-x`e3Apo5ug$G_GUQV1_y%>q8*_SOTT(d=AIsx0a3R`pn zwoAXa|MmsjL8j<9d`v`*?C~+jCzqmrD;8(_Sme@$J&q=q_V-vZMO)8pf@^TH>?6-? zB2R6C47gSIbv<4%CZs!r97 zcVtI+z6(0Cn%_IJ+k@cl!S4CEp+C`v6HA*I9XLd5sJk7*Kk^8#1J@ffNchE%cY!Hz z%W9mI*eCkt*{-n4aJdT#lXqfZaNqn%sDSOdsk8lB_avirde5zz|Yz`7&XH!eE7-H97b zz11z=okQ}Rqb}NQHT5uX`)Vps#%SP%5sh0L8Tyeu;iO&lT;CE(n`lRN%!4~tBb7aE z=xciPJrdzDM*9Qc)k}QUEN41^Q+5YrvS%2|r~^MAdG0ho4gxgldt|Tg2X`&Mi}iKN z?)tw+c0M?bN!M|#$-4J3=HKoYyjtG2?gclH+DL0#133R7RBuB7fU8g)ePaT-YSn5x z18ys?u(O|_e>HL|)JxucfVDq+dfn~&4(vdVXuZ8h7a(jr;?S{O~K*s%fb6ME>Entxw*%qtyJ< zTam|aMSl0z_5O&>|KlTR_bLTxccZdW!H9Ki);Ee1MyjQmaN233nPMJF07_8cFz)s3 z3Vc$eaGMxKsu6Ix3dfad1ng5dDm=lh6prN!MVib4udhU!loJVGc4SvzExRVt4N9h= z2vZDr8Bg;v{L8p-TO`cnBW3k!+fop|(u0G`6@;(!;NWrv;VTLrKuP2wsr7||Orp?c zlj#&)EwXsO&E~MAS{^89cM@hX&|o}2Q5fQ_rXn*~SEs!Bf+lNTNoiY6j;)An2Z}p9 z*>i{@W|w7dk*p|kec{e`1TIhmvdra{5lgw!+_J;0 zWK>&n543ZpI#IZOIUkZn^N=)nEpQRqWNF?mq{gv<8ghx6>B~whnD)UWF=Narr^ZWK zp;@VoI(?|&hSE>X@S(!2mur+g+i5F(WR+u<7B`FU<(M)4b zJT59Ks*);G8FO@jE_)M)$#)aBDD|_KCd(r++aZ1BetG4k=6^K(!KLPZBuHM$D@(RH zEKA9Lh{h*ol^!OzctaZ+MZBef#4x7jO($z}$x^&UlaMXfx@A@9TE5*F)G;yPjr1`S zXNuD-SHambr*X*vHy);0KX`#;`KOP>gtQDS;}s?(oX<~LsnB$LvuY>ZG0Aa9Dbx;9 zlhOO!Hg%=tm6x{bxKJ9q^20ERHY+SGJ0SAxtd{5(WZ5YMOUn*?6&bmUF5j{PBG1l_ zWk(F?NYpEeB|4Za-9&pMqcv!VS;kGMq?A@l$|!z@aHB(zdg7+Gx!kS+$fH5X929v`^&E zL066s6{4cT5CJqI;n;owGs8n05cK~9rAU`8B`O45>^TBDdl)+3&*C#JbgBa%w}8TS zvQsjLr@IBF6M2D#Sc(e0%wgY;34K2b$%)i}H3>Oc6wrPz>;i{jv9{ul8Y$PK*tu0L z^Zj~Tkmq=7nuPCqb*>&Wrny-_w#H;3l_`&;RJ)}V8jJd3C?;n>8a2IIFu?qTdnw<~ zI)O~>C6M-QWg7o9I2+atwDmL2g2>0jE)aHKeWY0=L4nKXUs?hClJFC&;_cgKyjjZgY2%48ZHLMXZ%L?BE#<8yIWomC zHlxTuA60sR>F})Cl^7B$RS1V7iGh4@L4xK=Xy()KORPxraz)x*kf4L&prZoj&^wlj z{UM(7Bp5p$t)gm>u#aTj^; zJV6|E?ut7pzzO269OCxJzk}M$W5vHll&PC*3J7NET%nG3q{I|HQ_lp{%8Posc-RQ_ z?VhRcn(MD*rhXA~{h@b$2N@p_x$6&6K3t4wx(rhxhRqtm_NH#P6%V>&YSEJ{!D%#| zbVg5-?!+H(AXr!?RhghT+7PQfe1TQvm_DjWR!vHj=RMM(!>TWLx&bcizi8P zUjlJRGiRE;y~+jhPG$zy?4&8MI7QI7MdN*x&1d6%6s=8r-9*>Gx+xY-&~3d}q9)Zi zZcqCd)eyA!m?i;>c7;mY_U3aY?s`lr-i9R!s;#&>Eb%R;T4&0p8`JrGf5cxZlixl% z{+%H1iai^jATEOIy7tBYmx$XR{|;8PxV-qsjZxgSVkX!1y?6r4Dw+N$JX~1jB>wFb zm)XZuT?CDXYE>L3{_#_t4Pk``z0||fv}_kUA@9Uf!)CLZabr0qF?HR1j4cNN3c5ap z4ePUxCy7O&swQxJTC}yf(XSNyomz%f{1Ve0JK@5PeH+HVLsbS2#J^o;;(6j9UL~h4 zR-@T68Y-hjAx{^yg_zGKX|&OF?Q(3GD-k7ANEWjJXM$!qO%+qgxW#D>@6s}}klC@6 zX%SUgNv36XD0^(pt#Vnhf2HH!3F0Dp_t@o}P7sIDFKNd4?S(i50oP^{3CBMR?mTtw z+WQ`Q=pnF=X1#97)7Gqo0iB9BZvOq%XJLbD?}Y!Xt$^F-!OcqHIHpiA-X>>%jB)!CePZ zmF2FjJJ!0n-SfqF>v5e2AY#E?Z(>ayNbe)yY;9S%Yj5jnxW|!~z&2OpJ6ydDK;Cf+ z_~WzS>rvT1sIIwK*}uQo0FQ61ov6r3k)vbi|6hK~+M&e|mL)tXa`ZA3IYRFI*dq_V zhrdmY-$G!(*BKqUumlCBu{D=cLBkZV_JO&S&r0IFG#Mkw?QjU-{_G z)qga8nf>jC{?7YuLkbD{^gUO7{TDv@`3I2a{_F=o{Ws5+Z|^A|AHCIj>O&ji^}qOE z-uCQslzIBxYk%jnfB(?Ciu13_GwgqT{JXyJVehdw#~!}=RagDd+3)^OH+=c?y9fH& zw?FXt!l!=jQ(wNPn7{6yKBNAq{k6^UKfUYgZ@=jSo5Qo~4MCyxq z;cwd?dd+Wq0=wt;@BiJ?=fYe5>w}G7de4U_Zmw<#V>yUvp?{r!AJh& zOaJ(9Zr}Q~GvHlkz%Af3ER%daxDH%>>h#rTueoyr`Njq~DPw$6#`vU+@$;84e%%Le z`{|9}d-Err{*|{p`@yeafAG}@e(lUX4?g*Ngh^1R&(UxB_@8|2$)_I8o{8U=lOB8E zfxo^+{Br3T>T|#O@BZjBkGs9o=Q>ZlnSSrvJ}j`-E3tRh?)z8DTi)@7eE;E}dHTni Wzy2RK{`V~a%8fQpgR8)PQ2sysEG-lO literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..f4940951 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,1024 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU51a24yaHZsdHBMQkp0ZnJQVytQd0V3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRFozUTUrd1l2SlM1ejhjN3FTWUNRUTQxZi9OTUpnUTdVMlFaTE4zMjduNGhDMURFdWk5endVNwp0VHlsTnFZWXpybVlsYnlzMituWFpHdzNmZUZDMm1hamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0VFBZQ2p2NTlHSTJUdWZ0Tm8xTzJ3M1lyZUFrenpQaU43aVhyV0krVE9Vd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdIeElaOW1RUFFRWGlNTTcweTFEMnhtTGQ1REc2Mk01UDJwRnFocU14eEdFQ0lENHJXeFpFCkJYWTFGcUxqMDBDTUJPajh2V2RzU2R2VXdadEF1WGIvWDZrMgotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDakNDQWJDZ0F3SUJBZ0lRVmF6OENZOCtDNGZLdEIrckxPTUN1REFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRFF3TVRBNE1UUXdNRm9YRFRJNU1ETXlPVEE0TVRRd01Gb3dWakVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4R2pBWUJnTlZCQU1NRVVGa2JXbHVRR1Y0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJCnpqMERBUWNEUWdBRVlFSGtJbmxGK3luNnlWSGlPa2pMcnlLOWRkOUhFWFczMU1aekNhODRTS2ZITnRtU1UxVG4KSmc0OG0vL1FVVzJXQ1dGT3FJRUdFTHJ0bUY5ZjBqUVJrNk5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3RwpBMVVkRXdFQi93UUNNQUF3S3dZRFZSMGpCQ1F3SW9BZ3gzcmRMMUc4MjdMWmUrM29SeGlqeTZSZVBaVGhiN2dXCnRVSWtMOXlDZVk0d0NnWUlLb1pJemowRUF3SURTQUF3UlFJaEFLamduTFIxa3kyL3RnUEVuMEkvWGFuZUpBWmEKMG4rVzlnbTZqSTFLL1pFQ0FpQmFmTFdOZmlzalhsVjhRMHJwY3FGL0ZKdTZJT0FITElhSTFsSXFuNEhzd2c9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD3nc3aPhLwzFvP4e1MFmhVvnCEadyuBlELntuG7fBEZwIgJrbT9ICTSnj3VHY48b4f37FysH4rgQMcAMEQJdUM69o=", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org2MSP" + }, + "nonce": "7SEGKhIjgpJ5GBuSD1D7ZaJItVhjkCgU" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:16:45Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "u4JAg17vfapihC5AZljwHdjnbiTvyOfI" + } + } + }, + "signature": "MEUCIQCaiz7aR86bzushSjkJ/NFXimr2CHH8k/eLDqkIErrz3AIgEufdkej+lG5ohvCjMbp7Wc7DCsOwLkkqLuRZu+On00w=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T06:16:45Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "JHFxF0JVFthlV7j11LgOTjLIBefj/c+/" + } + } + }, + "signature": "MEUCIQDrbUIHy4GRYSr6frSWATA3wzPkOU7qYq4jrcs4IbwutwIgeRHgQFifma5EErPHfTSppnBKdRWeO+0/fWyzxOj7fxY=" + } + ] + }, + "header": { + "data_hash": "YtkRUcM4eDN6JwbAXyD9aoiPY3vOFKF0kpIKMuGww1A=", + "number": "2", + "previous_hash": "XtAOJl4jDUxlAVfSkClGsJ1R40oJacx310BcHhnoSdE=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_3.block new file mode 100644 index 0000000000000000000000000000000000000000..52c8e444cf57c28c9b525df5ae8ba7960e2182a7 GIT binary patch literal 4722 zcmeH~dz2IP7020KSe73skcCr-C~?8pE|BNs!2xkzdCz2LHk+4LOeT}bdy>p1GYM9U zLJPW26a_6H96Z3blUnXMMPjk+k-}f}(KL#=)WkfjI{ayAqNokm}&W zP*h)bnsuh4F^h{L$^{)RKIEt*HMs06G8Nnn2smYfwe2_(Cs3b{knjpjBOK|IBYDvj z8IRb~nTXz54Eu4(nuObXo-tm`CqGLdHo#=8#h@--3F^#}%?k&59C$Bovy?*>yci0^ zKV6Yp>v5Le5!rX(&RtD4kUZ`$Hur1LcBV+)p4>&$1v#B&%v9)q(b+}*(QxI7$BWj50KwC)e(xw6zcNNwqN2Do79Cl{3SkjVl zCy=bhOHxQ#G$Cv-nG?|z)b{#_A@5t|pMj*Qn0_yDtyzeO-S=AFJ|;h{C_ z>poNL9tQq04E(6CZXy1tuOIdG1MBPbRbX2U_+t%tv*urGnsQAIXo7RO0$*a$csP+| z_$Z69u|zh}k>ImdzCe`adIvgd8fp~%SShE`DeJToG`ePRb2XA|t!?NdUp2~siUF5u zuMjcJUUur{iJA{xjPwU}A?V#4NF6f&{;un{uoqULCf z)tmKUHWo7)Se@Bo(wf5&Go)p85yjF$;OTxq6&`zf1M#aDPv^G0zPqt`_L2)tbMnva zOsH>s=csUfe9s}pg}&fmU&a2u;PNs)7Bm4>Hk@IFT$o`6bu7WAqk_8o^VDr@zQ|@7 zR=J`t7(O+T$)yuaqGKvw;HLK0{bP020H1y-KsU21u77phXT|+%xWagLl*|+w-&gos;(wqsEMiK5*69`?l=but%v{IL@!_==|SiwU!OD z25v4^ql`4Pk%jHgZaz>WEXwU4zIEFPzPz_~!Ht`CbSzpGA`D7Z!$)`H+f}G|cELRSJ$ULU;OJu zKc7EyN8@u!)v2!V`6U;cw=bK1Rw=#JvdFc(IsMxCH{X9WK3;c6pG}`uqa1!@^mO{b zna&aEXD6jL*AF^xGYtRu?VmjR?yS!q_|t@swuP>aEwE zu+=M7cO_r^M7ehNwA)u~=rgBgb6@65aydQty^WjBb$;$+nOVxZhPP{)8ZSphWk1~n z%><3&LOpo-GGbhIMPhVTiIFk(5+g-IdS`^SdRruCK8{6;ge95vCt(-Dart;E>1m~8 zdPpLbDrJHH6|;IN3tWa-Ap&7~Fe^?_GG=CpHYm;7tR0L^O1m>;DdNQ$0^z%TWDN8M zb$Ahcwuu7 z=fK4r7WB)|C!=X3la3Q~P_)9`bZN&$tyf-xfupm|cqBvS7#&$6D2<597$xJU8y9IY znQq4)dKVwO%u`3{MujadO$3l1Y3Et6>y_lX)_tM7neri7uP z2=0a2+wHKF&)_+`C}b&KG6y1Nd)Aao+T6vIrx7%IvgCFoQbNpQrekEe1$VY^B5mT6x^x6GCb<7ZidGF)t8#UX$ofCQ`(_UsvwC^qn!}C9cQ7-?t+UpuZrFS3 z@EflUseGkau<_x83%BgiBsLu#yl`jyEytwY@gu91FZ2iV`h%gMwxL!r5DWlyHMMm^ z`i|(Y=;{{u{CWU9g(zEK3)RN(7gv-y=9Oh0Y3r3aEpK?MmB!o^V|&)5)`;%*lrt(3 zml(dcF${Zu=*G~B!EL>bA*%b<)~6ZKda8wB@erlCl8;e}8FT zu58dPZCWGRdZdlv5-rP@PBR%<-srbaDnvfb2pdw)+u8_&1?F%YK+%ggB5sE@4j6GD zM8YLyHEuueOS?GdLR0ycE_c34kuSMBlbfWu&-nt3}-AaKl#!$}w> zP@&t=AyO#jI??BhCbQb1@Z2>e_+9-(s*9e5eyuGh8;~AzTce{*$Y$*u=+K#1Zfgw=DRF(o^H~|Y~ zr!A@}bObVC))LXT`qXU6Nd{Strf8;Blv)B(lEM%v4k+ph4d3tE$1WLW#G2RcTbdVQ zowL_o_s-tm4uQ5RY#O}w`ab)&qbHw#;$i#Y4@VFAdh^q-9Q@skNyCKxE4vnU&R#t1 z#&WIdo@>s`oxkz6YqgGXQ;poWSn0`;$S%;gs!7lXT&~K003|e5 AZvX%Q literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..7129f878 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,131 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "vp5r5y0yCddESC0pczSXVIGgnOSzuAPm" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEQCIEv+I3GFw5ki/iVyTI2CtpnR9Dpi7CNmL/tty2+s4miTAiATcAbo08xbe6+gKhGj8mOhtOscMbSFDyXzCaA/SvmV5w==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org1MSP", + "hashed_rwset": "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", + "pvt_rwset_hash": "YGqv3hq01XtbqLoAjwG+BGPuTqdSD9C8vfuM6lZlY4g=" + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "YST1uk2Or/Vwv8HVEyqJoP0ij3Gp0WkvJs7pcyFo1uQ=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "QXBwcm92ZUNoYWluY29kZURlZmluaXRpb25Gb3JNeU9yZw==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEABSk4STApKZXhwMDJfMS4wOjFmMDYwYTFkMDViMDU3ZDk4ZWQ5OGNhOGZkNTdlM2E2NTQyZDhkZmUzODNhZWZmNjRlMjg5NzE4YWI4NTFlMmI=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:16:52.488836100Z", + "tls_cert_hash": null, + "tx_id": "e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "vp5r5y0yCddESC0pczSXVIGgnOSzuAPm" + } + } + }, + "signature": "MEQCIELU08Fdv9+KS3BjPqOUS9uJDCOwp3Ib5RPtzGOELLZGAiAl2fPlwrsQeu8SmbyR4Jy/1jBpvekPnNFoxUk81WjnsA==" + } + ] + }, + "header": { + "data_hash": "plCqz16fhHAk/v+M8gyhObbkKf0RSyKxyMrZi+X7iw0=", + "number": "3", + "previous_hash": "bRHrLhAaOpZOVh9Q7I9hCO9f23+ZZoeemfLsk/a4IBw=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAc=" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_4.block new file mode 100644 index 0000000000000000000000000000000000000000..f0c5360513975f5e42fcfcea9efee4d8ec0fc6f5 GIT binary patch literal 4721 zcmeH~dz2IP7020SS(e|TVt^w=Dq(362(pvOYl1?ZSKc$(OeRmYFqupy?_~3uB+^nq z3I#kM4-qYt76gZ6(oVjy< zcjkBJ_x;_^1?H9}g{nyWe5@lPOK-C_j-8KPzijzkt?SxWjTtz7js7=rrK4B+7*iuol+qi~_7d zcpa?gqB=;!35YRlf;3@G)QFhEh=7<7SQCbL&ZL=gwPLUWOi#t50$=4*g5q#9*x3vQ zy7D4Sc{&tZn{TQg7-_N5Dx73ko7sk=EZJiPl+A`aYB-KYEFvn|FjTZLC{32j9k^e_ zv~Z*p%o}TL*;FMZTnySA*^sT4fJoU_;%lT6P-xPEYP=*Cqi~;(s*p95!9?08M`H0L z9Sd7h>9E#b;{0UAoIt(3&v=&b$Nia{i6?@I^*3t=IPCKpa(WjP0Y)tUC` zf_{w@ws_@yn2MA+DUnjpdNJcT>b{hH0(J9*TSUpYId8|xOc>-1Ceco3DIr1S3!XyK zo7H25lCc!-^rccoHm3Jl5w!~{Af(1?GG+w6Qg*~kNsdiMB`QQD0b{qsyc){nMHnd4 zNz)WrkO)!E2LpAWZfiS+x(QSiPzsgm(~6K1iM2~^oI+8_Aq5E_J0>vPE!ncD7{xLU z-pmnXdnW93nB$RDG$`UUB?K#;n$Fs8)e*sXn(NdF=%qykF0LxVBS&Q1wis&56CqPD zUBvb7irFgg9bO&H+4HGv0H@0|Zlqx?sW!wdw9bacF$u6VLW@=0W7n75HcQb+n9>~x zn-1mt)@aD(Pm)e17uH0?m^gJR=vn|BYLBte=Wza9WoiyqjwZ|S!Efz2BRC&mw1HtcNj zjZ$oWL+6OFab)D|?1bV%6FAn?Ze0n^cOU3zkae6i{PVcMxAN8*XIPq~oKVH~8=IKfAm5y!~hyHc@;!M|y z?n!9()JYqCPv2Pgd9ZuMnQ3>nsTU~jTRt{?s&(|~p~F9BAGa>q>mQKKj69|wfa=vj zqgysz^YGM_!Q1<9JoMwa_NhmxQDa9%7G8CB&YstI9#X1)G0C-cQ|;=Viw||qyYt+a zQ{K>IJ&iX$EB&x_)7e9^yn2me)5O#>=l8yLZ|o-c_I|rh)T5kS zHhMO5?DNGVQX6hbb~O(^Z_y2ZYyWi{URm(o!aq!YYmZXJxc8Z!LuPrizZ&82%v|-! z6U)E+-h_`vKJe5%hf0O&=JtA&EByhbYV|PqNTK`fp{I6FR4P8zA$Mh!VnuEJ`pIiK)Pv93Q`?u_GXd8Mt zDk=xSlcC9wqPrP9b{R2lydp8$>%_<#`iRlZYrVCs$rjKhvm8v@)p69&QA?l>OcXm~ z$%L!JEz?5+tJNtB{I8hRM_J%9%nDH$--}r>$}MANhKlP`g2i0qEtQlrO_#$g$x~Ri z$4ACMHVBg?@b!+UV3weYi$x)dASD+;%2$k&ZB^M;t5aj24N#VB1+Ss@UJebiXv)V@ z3?-4haAzZ>91--(&?lp5IGu`7Oi(hTJ#=X$B@HW2K_@a9dn}x$b39C!DK{kHGDgYx z=_Dma3i*B2%W09UgnDhbUPe&9Dnsu#r^QkvqEp8$2vo}oKq^*(9(%2Ti9`uvYk`y_ z>^FvE2Gpv_x$9&Dt~*F#cZ_0I5TSJXMd$~q5w`gG37E8c8o2xraU%^2Gu z$>~knBNgfr#P@ZE9Q$o|hGqiw^mT?f{FSxO@RIprTSZFxM9|Z_2Y`QW0{^|X<+kgR zv;l^Gb8TNPZP24_29hkj+9t>fBkPw*@o8D#_*b_oOy15Y3s&v4cqp9-6-f)g@rySS zX+*gHa3OlX!{NZn*_bP<#<6S&$ypLCi#aJ&*VEh)z0F;{$+rTLK&g7>tqg^s zQG`SjC`#dl9!HzxPExo7wNVj+)?;GIbg2pl%0&ao2eU{i8A!lhp!2JB=DZKLQC3kUF#8(1`@S0_1l(41iXb3jxMTq?iIv;h3>n z327< z_^H*^aStt;=y;?#|I%zP1N92?=JgleiM35Tb;dG*dw$RL!+m2OWP|2i5Os6+r-u){ zx~fs7n7rlSnlIL4@4UNcLHiq%#?09(bdCS5YHlZgcG=8x+h&2Lx+FnAaJeY|0nA`Z A-~a#s literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..63e0c3be --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,131 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "GN+aUPAACb5jf9CVHnTv/iW/0N3szfR1" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQCXQ0Cm5ZDtF2sxTExuVVMSs71plNuDFZbemT467+KRagIgK754GFpg9ZpwWfdvvz1I+0K8f4Nd0UPoJ/y9jXpfn/E=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org2MSP", + "hashed_rwset": "CiIKIOLuczUoZaghuSzmdd2zZxPys4xuvpT+LEH+PSymVrknCiIKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEkQKINEJHwinD6o9lVlcA6bWfYNKPdtNHCMcZIoN+IK/1LrWGiCcLE+up3oOuozWcYV7+/k62DFvUwInwnc/C6eDo2qEkhJECiDi7nM1KGWoIbks5nXds2cT8rOMbr6U/ixB/j0spla5JxogaVLt4CLLrpWeG0qg2tR+hbyeHk6djfzwiFB5NIgLvnUSRAogGTRTTnLLpL7fAXOdcN0Vw8rxb3nZApkmvcx0na5aTTQaIAjafEXLIEN35+QiSc2lcT+oZRFt27TLWhlJsuW0OKarEkQKIPbc0GiaLbuBzmmIdddFhfPf8V6wBmvqnpCdgJWFzBOpGiDz/mH8oP0qy6aB+Bp4xSudS6cqbLv8xNOWaC0yXAC94hJECiDlkh+BUt/2jBhspDxrvgYM/Ec0FdzIF6TPiOaKyS7cvxogUlHGOcM4f1VvoRhLU3yX77aT+R0p7BmbuJHWdXN5qC8SRAogpf6U9T57IiuIEpiTI2LtCx/xExXuVLVIj8RXBW9uGd8aIJkUMttz/t4T7b0qYbDg6SuxLzxIS+C2YMr4sMMe8UcG", + "pvt_rwset_hash": "YGqv3hq01XtbqLoAjwG+BGPuTqdSD9C8vfuM6lZlY4g=" + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + } + ], + "writes": [] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "i5vGxpCwyFiopAxqKBCSFPhr2HVohwFxGGI3GWT4gWo=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "QXBwcm92ZUNoYWluY29kZURlZmluaXRpb25Gb3JNeU9yZw==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEABSk4STApKZXhwMDJfMS4wOjFmMDYwYTFkMDViMDU3ZDk4ZWQ5OGNhOGZkNTdlM2E2NTQyZDhkZmUzODNhZWZmNjRlMjg5NzE4YWI4NTFlMmI=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:16:55.086568600Z", + "tls_cert_hash": null, + "tx_id": "5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "GN+aUPAACb5jf9CVHnTv/iW/0N3szfR1" + } + } + }, + "signature": "MEQCICZXyCY6pwqvBwBak4N2PivbqaAHi6voZuXPl6S+H2hUAiAOwrd1tTOQCDOn56TMtWBESodLrriHginIlGtFK5vAgg==" + } + ] + }, + "header": { + "data_hash": "C+ejDBe362u5ip4D4nQLxtBM85a0Xf/U7bePj9MBEBQ=", + "number": "4", + "previous_hash": "dESJI09ylDqKOpBbSAIjh0IbkpOEC6AilyEHX501rGk=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYCBL9BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiU2dBd0lCQWdJUkFKQkZGUkRMejZVbjcvMHdMVWtKZHhNd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFRwpDQ3FHU000OUF3RUhBMElBQklCTWlLeG4wTFdvVmxMdjhYeGJYMUQ0NmVWTDZhOHJwVlRjZGdQZWNxOGNEcHROCjRPZ3NhSk5qcDkwaktGT3BDUE84NVdLS0tCdm9oT28rQ0JvWjhwR2pUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUgKZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU1kNjNTOVJ2TnV5Mlh2dDZFY1lvOHVrWGoyVQo0Vys0RnJWQ0pDL2Nnbm1PTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUFzR3lHSitkRTRGNTZxOFlVZTBXTEs2Ck4rdnNYUkhEbFJzY01DQjd5eFhhQWlBc3lKR2QwcnRYbWFlOWIzUFYvZXZKTlllZ1JRUmNQd3grWHhqUURCeGgKUVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYsWoEIqh3fODtmXkmqYsqS68Gcs2BVVIwEkYwRAIgO6P942giPu31Rylhxb8bFVYhpVRZRrwwTTv+8NfW0ZcCIBIuq9Cd96NC4+SLiC/YLCGCxGW+KK0gg3Fj+JJ8+7B/", + "CgIIAg==", + "", + "CgkKAwECAxAEGAg=" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_5.block new file mode 100644 index 0000000000000000000000000000000000000000..e8bb05d1f0264ca5e0ff8c749aa64d363e8dcea6 GIT binary patch literal 5726 zcmeI035*-n9mcbpWV1Y$5FA1hmtzS>C?@OKvBw93!kj*5yfYr36^X{<*|EoS*dE(6 zHid#JXj*Y84XCt*awI4fDMhq}ij<=qZ8!>4qzXidQVLX*Qc9qJszTE7ZZ=)cB!E;^ z!jfhA&F44&_xJn!{rmtmJl{3?#*^;r?|$?6+#}M?m)~ESTy)e9@mE{PslGOQ(VtP6gMU3Z7m7 z%;CB2k>MS`di&-1i#EUh=q-aQjxM#$sxFzPSP^txQqMd;7z~cXzCgKL3YYx8GAxyX z{-6**0zRZ%5`B|Wc(M#bhy+8Tk z+lRotLtsIwDUZ|X3D+G%tNIU&jKr8xoaFcz6~j@UoEimmEQTj~IF6PhGHS&zRE}|I zqH3q|wU!|uWnVWQf`jdVPFfZ&7h(yc80#qz>1ZvnM8II(6(HJ|uY@234 z2Bz9Eve+%;5Jku{N~uRq&?q$hVVjN=V7p$-ArQ@ltmyPj2m&i&#mIQQRKq$>4@5hu zW&MTRxK)Z|oPLB`G*z=ms}SAaaU5k2be}+3kzi$%GzgP5%U%h{k{Q9}5SDA?x|Iam zYlTydc$A+&P#>i>Sf2I8!T5Cs6Fa&RrMkJM;!osmofQmWp(os-gtUeD8~&S^#%Lug(W}(HBkLvpt%cRIc{iLwS`xNsxBI3iI66%dbL$G zba2k_fNQ>F*CE(FcYF+j&je@mKkkeU4$pC(1MVYTM;u7Q18-m_8qXha{o`2h>JS)R zblYPpa>BmsdFO3=rL^Lqr4R1eFtSX&{k82Qyb9=N_qrY(0-J_h8;8K`p#9NYumX(g zf+m@DL6l7IWK~kjrgy3uZ(3@!C0&%jSHSXF8ck{mWuYZZtK44&r_8$efeCO!RVA^% zNYg#&n&Unjto$S?sh5qWDQS}4is_Sv`)Joupx=!}1MYc}DT?mX4_>Fc->cQ&^iR4+ zR#2->;Z8YIxA41QFt6jx?K+H(yOmGt1q~K|%s1>Bp6R6P=nt*aweW*QxsIIOvwH`? zk~LMWu2#irYmL#A*UTW%O#{Gb$Z~(0X+E*x{@nxS4fS119)5g}(S3gK`qS@wvUS59 zMcVIdp1FP9J3F7L{9x6VOP{K)ZEq(pdu#We)prinUcK>}8!ox_vL_e+WJdS$x|1&D zcE5AQGIhf_wfl!g-i!E`?A*F^!_#a3^4-VAc0Mqp+qifA+h4nIg=ekn``-;aHS3i=QZ|KW+_jT@%Exx~LU58x!yhAL0N_PmwPw5V!_<8QR!&?VdES?Re z?)mT-GzPi$4uQL7vFU9GWz%?{O~t?ro3aeziR~3e7q|tJ7&jl_FG2jM!>YV>%_C6lu(u(m24$ z7htjtK3<4Qlm*!-9))Ovv{D4=ykdeg)^)~ueLkHT19Zf&@g5qVCf)*%s#%`qXp5Z2 z$QWtWi9*i7O9z5Wnp&Z`f<>WI92+IAao$;iU*`09rKB-+5oS6x3t6}WY!2uqNsF_J zxomefmy&jIdJIP#*cELDuMeL~bxtW8Et}&4x(TReEP$4~jLMK%3o^!iEff_y1YRtW zJd(*oQM;j$^{8d)tYL@prBGB4)|E)IT}!nq6IcKsnlD*pSg+PNd@k){Dfm2G+Q(Ah z{M#Wo%i&TqCNr(HE>Lz%L13bY8RL154d4~KQuTFplJ#b* zSQWHmD4k@iS~Dk8A#RfCddRp(wz#07z-kEzROL@&(g;Kjo;>GY<@QBazPotUTQ@y% z<%YkRC~|gt-KKjsQ0&0T-|--izce_ykl)ssbF-H^?V5d8D5I(H!}HHsaQRv5UiAO& z;+Oucm(*DXocb|2d;^NUOwS0%^8T73z)ajzMFSJP|BV5whibr&2>*`^*!@ffY?sS^ zPc;&PdWHn7mR(54dnP6mZHVvX)kG;5EL8$%blgZ46%x;Tiv}#peqHJs@yQ@v#@I$& zR%;W@NsWg^kfD4USEiz{@Hq`QiRlTE5(v_(my!vpT2?0uGS1La!A|%5QE${w6snrg z@Jr}{KZYMMU|NW&km*yQq;Fis$a*@D3v{X*kcpm^hXpBB$@5T9_E+ML0m(+fE9YY% zXvRVwz0e54YAdN@#$=A;LWsYmBvaWs&0|GhEqQPQ{^GBH7~9OQzH@jmb)mF$ZC+XV zz{as_S8TMNS~;fuX*WMOdI9v>dCxx6 zMM1>isK>{CM-=`3qMKj*fs^caC0wnx~8? zsh`hTiJrXU;&+e#{ezD`ziR8bnc)kMb#Gn()-M3ZfWhHG*OA}|Fn3^Z?xK0ij@a+; zYaLWgHOo>{YWAVw@`DB~!8<`)O3wr>=R^)gaYV8g$ml^YWF<4Tc-f{u@U`?0fdu}G zJ_Mo&G(B?&gu@>SA5OHW{U<1-g(!vnAq@VT!iVl{=Y-`zwgL=2{BWI}tzar#Imn7k zhbuwaoD-m&Dr!!^;vfF0!W^EUBUrZ)Nz?u?Dw7d_F!$YQol`WX{N{ z$xbM5m-6F;KOkk30U^|^XL+$KPe@`TBog%&1N5(%th zR8ocq$BbgA9#ME6OVX%+>KuodKF8^w=S6``pme|UQI5vY$q*{+!28HM4je_lmNvrD)WM%q$CYra~bRrAgMw zMKjWk#64xwPa%OusF0DMTrv>=jHhGfxhSD>rby#huxsZ9w2GSDc%%$9TX{{8!X@8C z)+=@5OhJ-4mJ=r|+mp8ymcZ-^VA+El?j)D4UZ-C1)Ek-GUCXkqtrN{RMqQPQsF-Uy zVz=yKP6$=FpKaQ*ZCPRDkyp;(j~hC6SMb|=o_%p&<-Q%S4~`y3t$)?JHLxJ}PV(tX kkB($E?mBVXm8Tgm-F3#^9S`00?sH&X-;-btnC;5{0D;C`^8f$< literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..3e189fc5 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,170 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "mspid": "Org1MSP" + }, + "nonce": "N/FE7FPfS1SDMt30zCyUY47yKwmi2d0u" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQD5ZHV9jfcTLfOgy42k63NBNTp1kqi3pEZRASGJKzXK5AIgDlTUdgChL0YlkP+MaiBPOcMFPAeGLJLjNMd+5OJuYmw=" + }, + { + "endorser": "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", + "signature": "MEUCIQC06dEurFFesAgCT3tlF4hYaie/pS6VIqV3zicubeDfVAIgXTDsyqtNgRZC3J5bty8M8Uim7mywAZBJzpsOYbC3/3M=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "2.0.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [ + { + "collection_name": "_implicit_org_Org1MSP", + "hashed_rwset": "CiYKIBk0U05yy6S+3wFznXDdFcPK8W952QKZJr3MdJ2uWk00EgIIAwomCiD23NBomi27gc5piHXXRYXz3/FesAZr6p6QnYCVhcwTqRICCAMKJgog5ZIfgVLf9owYbKQ8a74GDPxHNBXcyBekz4jmisku3L8SAggDCiYKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEgIIAw==", + "pvt_rwset_hash": null + }, + { + "collection_name": "_implicit_org_Org2MSP", + "hashed_rwset": "CiYKIBk0U05yy6S+3wFznXDdFcPK8W952QKZJr3MdJ2uWk00EgIIBAomCiD23NBomi27gc5piHXXRYXz3/FesAZr6p6QnYCVhcwTqRICCAQKJgog5ZIfgVLf9owYbKQ8a74GDPxHNBXcyBekz4jmisku3L8SAggECiYKIKX+lPU+eyIriBKYkyNi7Qsf8RMV7lS1SI/EVwVvbhnfEgIIBA==", + "pvt_rwset_hash": null + } + ], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": null + }, + { + "key": "namespaces/metadata/exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "namespaces/fields/exp02/Collections", + "value": "EgA=" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/EndorsementInfo", + "value": "Eg0KAzEuMBABGgRlc2Nj" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/Sequence", + "value": "CAE=" + }, + { + "is_delete": false, + "key": "namespaces/fields/exp02/ValidationInfo", + "value": "EjIKBHZzY2MSKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==" + }, + { + "is_delete": false, + "key": "namespaces/metadata/exp02", + "value": "ChNDaGFpbmNvZGVEZWZpbml0aW9uEghTZXF1ZW5jZRIPRW5kb3JzZW1lbnRJbmZvEg5WYWxpZGF0aW9uSW5mbxILQ29sbGVjdGlvbnM=" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "EKbJbDUd/1Y/P9ToYiLCF8DxpAwYbKvs1wxUbApN0/4=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "_lifecycle", + "path": "", + "version": "" + }, + "input": { + "args": [ + "Q29tbWl0Q2hhaW5jb2RlRGVmaW5pdGlvbg==", + "CAESBWV4cDAyGgMxLjAyKgooEgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUEAB" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "UNDEFINED" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgwSCl9saWZlY3ljbGU=", + "timestamp": "2019-04-22T06:16:58.609318700Z", + "tls_cert_hash": null, + "tx_id": "7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "N/FE7FPfS1SDMt30zCyUY47yKwmi2d0u" + } + } + }, + "signature": "MEQCICtv0FVsIG2grf38RRohfy6GV5bAc4AZPU8Bn6wCQA4tAiAMCqPcIF1BcyMMak+zACdBIdp+9xzNwMrZLcg9VQh7FA==" + } + ] + }, + "header": { + "data_hash": "8thK7BMCaSf79dW7JwwXIjBWTPG2EWKhiEt5RNdqxh4=", + "number": "5", + "previous_hash": "8MwambbyHFfEZdzl/RdMEA3aRZ5GfFKPFki8qFJkdY4=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYCRL+BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiU2dBd0lCQWdJUkFKQkZGUkRMejZVbjcvMHdMVWtKZHhNd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFRwpDQ3FHU000OUF3RUhBMElBQklCTWlLeG4wTFdvVmxMdjhYeGJYMUQ0NmVWTDZhOHJwVlRjZGdQZWNxOGNEcHROCjRPZ3NhSk5qcDkwaktGT3BDUE84NVdLS0tCdm9oT28rQ0JvWjhwR2pUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUgKZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU1kNjNTOVJ2TnV5Mlh2dDZFY1lvOHVrWGoyVQo0Vys0RnJWQ0pDL2Nnbm1PTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUFzR3lHSitkRTRGNTZxOFlVZTBXTEs2Ck4rdnNYUkhEbFJzY01DQjd5eFhhQWlBc3lKR2QwcnRYbWFlOWIzUFYvZXZKTlllZ1JRUmNQd3grWHhqUURCeGgKUVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYTBdekmyMzvBVqxIYVnTIUHLwIBJofUZJEkcwRQIhALvdTh04aFKvqLvUGFkMxOgoVBYGFN03h/HT4/9ovdruAiAWRpTqd6M2B1f2TM+BD0dVpd0e1I0lb+SyKP7awrL32A==", + "CgIIAg==", + "", + "CgkKAwECAxAEGAk=" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_6.block new file mode 100644 index 0000000000000000000000000000000000000000..6f8f4e5ed58145c594d024594d82dfbd8d168f70 GIT binary patch literal 4072 zcmeH~X{;Mp702`5%kpwbNn#Zeo)CGB6xzm3JzmC3LlJjo?u^Iwj6L(lD{X>jd1H_5 z@iMk&Y#N|V8&y_s3=gCf+9Al1f?ZW!iQ!lr8KmWqQD14S%ipM)Ib8IV*Hj6 zm531N$N0bz@|IC4>yvM4$ z_MLh;l8a4EZ+LOjjoV%dNqRE#VeRC>BO6*b(w?7xfb% z)ksVU&IV+;91DikkQ@s6gTY`ZG&_q06glRfjmS|os6~QmNR8lHS-oSWXN6~(=CrVY z=k#)La5-3!?&yAQCgb_e@-3qmff$ybCXpzyG)qDW%|!vnvSe~dl2B!IXtM;=SrI0y zPP$O*Hp{pg93-NFNH1(6+a~oQn{1ZYp@AVc*H(ro1vpq^pg)U<3PLK z?j(^lz9KXAh8#@v%6a6_2F%W{DH4@)*Qx{qlm^`^2I|9NAnGs@EX*e~CB(!Ar6KB- z3YCgnAgt01ZpZ=5iBqsVpTkKgz*j)3am7SCUQu{Xs@XgR9gfl+_i5)xF{5U4Ll$3* zfxJOjoM73cP^5B#z#u!3%MOvmxjh?|MiN|72+&qJU+OCjyj7G?o+E_$vK@{G*#O;R zQE5=j<3_o_8}blkIEc-E+2NRCz-g88IL3)lJ3jv-6h)MX660^lHKOnKKygxyT&S4$ z+cJ}N`w{DMbj?O~F}~1o5(<~PPeDPU1RbI#WeJw*(}1p745>$nd^)d!*=1~*%Ivq@&LMnoy%uu9OtZ$x9UiqA?mSdbQ7^=jGMlr>ntr zea#8+y1uUK>pj-j8bly!Hw4Z-6yC7o&@Xnb)I9sf!2M&MFaX=@)mcp$ zD0R(q3-~CQHp>moYLyku^37JYx@!660P363+C9xwG|%|tGEV|5U=;!nShM7PFSYYg307^j|U@O@cA3P&{Oa$EvS#Q^GoD$-d6&1YE07!Y3MUqA z8qR?|j%>f=mJrfKGf|Nnd`k)NeNMn^(j}Nn{uHuByOhrjE(bMoO7k%icj>PSlU>8EAPmv`VNq9CJhfceJT5;Plg{BiN$kDhN zX&FqaS4;OQ86phuMle<71z)3m?VuiU8vH+?9&sAD_Ky;67u1l|`RwsVQ{ZuptEcfIz|chlhbrpeRe z)5ZI$$Bmz~n7dxsXWhDE>Z=zomhRtO-o5=()A;_+J;*)hncHWe-gVDM&fa_Ez*gt9 zn)<^n-+cb!uE!$x|7u6)J1(s1QXzI##;?lj{V zV$f!0xKIr0hyf(I@WDoLh_R4h39g!SOe~de=IW__wBX1EKNSjVxm36u?X+@|qUsq< zX-5^R)#X7bty|>;Z?s~Vk)+ctGLw$t`D8Ll^qZA*(@PS~QnbYwl0>997@D)y)V!@8 z{k@6)ddlpvrHya= O5G);O5-b6itMZ>mFC?-6 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_6.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_6.block.json new file mode 100644 index 00000000..fcc504f5 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_6.block.json @@ -0,0 +1,162 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "nYVwwVNVITd2JfV1Ofh/BbcyNA8PSFI6" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "CgdPcmcxTVNQEqYGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNKekNDQWM2Z0F3SUJBZ0lRTjUzSmJlRlQreEpxaERkdU05am5XakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEEwTURFd09ERTBNREJhRncweU9UQXpNamt3T0RFME1EQmEKTUdveEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVEwd0N3WURWUVFMRXdSd1pXVnlNUjh3SFFZRFZRUURFeFp3WldWeU1DNXZjbWN4CkxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUVuUmpkb3R4UlI2bnMKRnJJNkFkeU5sTkVWdzBvMTN0QUFjdkRDWmJFVDVVVUhBeHFtRXBId3NuUW94OFhiOEhuN3BqR0x1a091aFBCNgo1bTNMaU5RL21xTk5NRXN3RGdZRFZSMFBBUUgvQkFRREFnZUFNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqCkJDUXdJb0FnYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEUKQXdJRFJ3QXdSQUlnTnRTbmFGeElqNTJEWkJvMVhSUTZDaHhoaTN5bkVRL1ZpZHBDRWJWOXhUZ0NJQXk2bXgzZgp3aEF2b2p2TElpa3NmTzhSZk55K0VKK2d3UjdvajJsYjU2aWcKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "signature": "MEQCIFtOoceSVxHoXZhFPm7yXu5KYY5BfvyG1ouvTwrJJQjXAiBZgmnJasNwR1zHmnMpfRqf+flahI5hjl9gIDWsgIhNuw==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": { + "block_num": "5", + "tx_num": "0" + } + } + ], + "writes": [] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "\u0000􏿿initialized", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "\u0000􏿿initialized", + "value": "MS4w" + }, + { + "is_delete": false, + "key": "a", + "value": "MTAw" + }, + { + "is_delete": false, + "key": "b", + "value": "MjAw" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "XmKg+5mmqjmNrNoSvtVwwtUXa4ENMu6LNh99vtSDCWU=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW5pdA==", + "YQ==", + "MTAw", + "Yg==", + "MjAw" + ], + "decorations": {}, + "is_init": true + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-04-22T06:17:02.381447800Z", + "tls_cert_hash": null, + "tx_id": "b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "nYVwwVNVITd2JfV1Ofh/BbcyNA8PSFI6" + } + } + }, + "signature": "MEQCIHlkXHwe3IHBtzt412RM6SinvPmGkjeEzxpPgyVkPG1jAiA5Zzcrg1fnypvKKiIKB/W62svI1v6xNHKoNA2djUdPCg==" + } + ] + }, + "header": { + "data_hash": "H8wlFF7ONFRnS1AcZcu6wR9wFEYS0aOKOC3myPipfeU=", + "number": "6", + "previous_hash": "D1q8llqQJ4LSZpP2pHvTRWjCV6i3pCvIaYaa09A3Vjk=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYChL+BgqyBgqVBgoKT3JkZXJlck1TUBKGBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDRFRDQ0FiU2dBd0lCQWdJUkFKQkZGUkRMejZVbjcvMHdMVWtKZHhNd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFRwpDQ3FHU000OUF3RUhBMElBQklCTWlLeG4wTFdvVmxMdjhYeGJYMUQ0NmVWTDZhOHJwVlRjZGdQZWNxOGNEcHROCjRPZ3NhSk5qcDkwaktGT3BDUE84NVdLS0tCdm9oT28rQ0JvWjhwR2pUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUgKZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU1kNjNTOVJ2TnV5Mlh2dDZFY1lvOHVrWGoyVQo0Vys0RnJWQ0pDL2Nnbm1PTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUFzR3lHSitkRTRGNTZxOFlVZTBXTEs2Ck4rdnNYUkhEbFJzY01DQjd5eFhhQWlBc3lKR2QwcnRYbWFlOWIzUFYvZXZKTlllZ1JRUmNQd3grWHhqUURCeGgKUVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYbsnM8WYsmZnO5FoRKl1zj/qUFiUtkExWEkcwRQIhAO0MvWTdfNIvDIicUjE7vrsIM8tDR1aWFcJslNoZDqL5AiB6tTuw9Fks3Eu/UV/89znBUsI4rMjiQmnTbnVJWiLwtg==", + "CgIIAg==", + "", + "CgkKAwECAxAEGAo=" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_7.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_7.block new file mode 100644 index 0000000000000000000000000000000000000000..00f10bc1cd936f4f29a1c88d6183964fb87e7a68 GIT binary patch literal 4062 zcmeH~eT>`m8OM8f?OpmSqa}h}d;f4P8bdwWI8K}wShxQC8Yi)H_BpRoJH?LAj*~bq zPGTn-jESw?kbq5vvI@FtFO*e9Wtv(<8C$!;$~I}LpcAas)QzIT(6p)AKxi*?b1rvX z#n3u7{;dD8^Z3cnejfe4&*y7EdnUZoU)iv4(-Zc6Cr-ckqdOkqUOs=|)c)hb$8OoW zxAO9l&*%?bnwtLMpIc$JY!R`#hy6$h z2?vVUd^jSjeiW6XVGKb-fq-Ad0;NDv4Jc@FJ`%+IXrP2DvJxq((c&E|y%XLQs?$JF z@2lhB*>NzDYH5CMZq|EfeAD2-DTd{z2}+b$nkAq_EkpswvP7a!5U|8(&}MO{u_8>A zom8&Ut{1UVpcjvz;ZDe;Y@5*XY@%LZ`vyX}xwg`$l7NF12Kv(!u5&~t!#PwRinzvS z+?6Dv!s{|qt;vCSrTRhSLjon zLQdD^9BvinFhfQWCq}~JFo%;Ul-EJB_JN6ZOjmeLs@OaU9gfr-_iSeeF{5I0eHL4a zfvkaBoM736kS8;Oz)*HPlkQUz=k{z+8i8{O0i~^Cw$N2-SR*e{Sq>M5Wjh=X(kR_w zsX{NG#f)N(H{?Dw%RyxLXNP0*sM9E9F@zH%c5L_%lEe#mf$=xw3f^^lpg74|CYaCq zZJ9~C{fM?Xx?)pyKDO9#0t%PAPeMT<1r1Vl(h{taPX(H4F@zSuv(0QzPYC^XG}Vm9 zq*)9G=xS5o`@LK%)=Sp;pvmJ(*EC{uFWWMLNmKC6@O%MOBUl5)s?C{brddnyJV#kJ zsk!|Sky$9jd^i+HsHu>H_Mog1WmCA%76=YPJ7MQZ;3gV4A=qpkYQ=CnIZGC@mP53< zsk&OJ5`AV?tNMzqa8bbcUJv(SN}HJBwac3dEbc0D&RtOySRKY|e$t56l4aaPBwoOK zb{JQUvM=Xk)j7;;WX(E}MrvUtkHIod1HTc8Ms=T+sIgQA?FJnwBKAWH=Tk7u7Za1D z)@m3!-_B@Twt$7*Px0ixE5f_>)f4M?-Fe?jXTOuY^(Xo>Vtv4 ztHCvWEeP?NzOL!(Bi7fO9&ig-4{r91T&CHS7mSz9ZoQ&{ks=t8!Kfec9`k@7jDYFs zJvUzb{Ej0>es%7x+mm~?zjt)Ugv}b0&mP=**N?Y7dioyk?h$a$h&KelXRGCTRp}{J z)q5Mb6-=AOnrbzQifZ}h%WAb``4-UWn^T(|)l^jPsAq+j28%%50zMAbEPMOGW5>#7 zxm_++%YC)vrnr!GUux+>9$ZWfB2%MLWXj{d?9>?QN2bO+KONa{-6EZ*#{8QR@1=3@ z{VNc?|Eh?N4-l<{mJluQSRgK|v^3+yn>tzQa8bj|8Zd!tT2rqWsae4t*9P7nU=94Q zTwB5#xPog14p)X;(>cNAy2;I9Rh6OJ3gc9hHNGoLl)~Zlg&dc=QXZu`;DZyPO52E& zk|4s7l$|0e_ly_aSkI012bf-p0gkCVL?6b7;Ll62nvpn>v#B9XS;}sZ`K(J>*9*wC zs?Lddn}!QGk5RT?a!Uwmq8Zoa8sAV*zRL-SO}N~0d7q?g(Jo{&y({rdIfY@2z+C1l zj_Wc$Jf2O_DAn7JD27Z6&@DCuOFh2IQyCkn`vYwVl`csXWJrnjap|13H8M2hRgK1K0GCqV3`tvKrr>GmEst z8W>6z@VY-I3L!#w^m3qQQi3m2E;R^B&O{waBUsoA)ttaQuyxq28{H&Zu2}P_h&a#p zW~lg#W{csvfmUTKRM!3zni+%|UBB$jw>>xCxcaGGkH5POZzwO?0I60< zZKAdGVt3QG0QkgmX(? zoIu~V`9;O17mX}sV@7^)2!MZ0f&X6IuF<`$ZGgiMFYYU~4Hm>LA~rJ=H%U37D`2sz z)LelR@1Iq;JI^={9#iuh_Dc6aju+jOeC4DXR66=B0g-GfQRR?otp@AV&$VE-j|V#AixWkj6sI zNItD1*<>OF_?fPi6Jummv=olO!#yWggk@;;;!Fu?wR1K1n^O+VW_)Tl&gWH46hvj# zc4l&pA&|JE13|co$KHm~e_40>-8Fk|xZ8JcVBPg^cn&=Fy~8JcUK$}sr$2FWx!!#J z8)su9k53+Z@~(>)9@%{K*Smt(pW*Q;`>Abrj!v(1Hav5F&%F=qJ@BO!-JSKnmEPIE b@!R1et4ip|>f3UcHh|>=NrGkIN>Tn3VT~rQ literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_7.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_7.block.json new file mode 100644 index 00000000..ddb64146 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_7.block.json @@ -0,0 +1,173 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "18IhkzuK0dqkTCbFaLgDAWOE8GcZ59as" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQDn9AgfFA+vk6X3XUJyY14yq5iZwOPRFwQsw5vUXjmiqAIgcLWvht+8PScq6XhdlLSuiGLebt7PC0L1nZZD5sLgBO0=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "_lifecycle", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "namespaces/fields/exp02/Sequence", + "version": { + "block_num": "5", + "tx_num": "0" + } + } + ], + "writes": [] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "\u0000􏿿initialized", + "version": { + "block_num": "6", + "tx_num": "0" + } + }, + { + "key": "a", + "version": { + "block_num": "6", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "6", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + } + ] + }, + "token_operations": [] + }, + "proposal_hash": "IJkU8H+GtbXY3uksTJle/bmGB3dJahe6q0B9wV2b04A=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {}, + "is_init": false + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-04-22T06:17:43.044936500Z", + "tls_cert_hash": null, + "tx_id": "1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "18IhkzuK0dqkTCbFaLgDAWOE8GcZ59as" + } + } + }, + "signature": "MEUCIQCQCAxzWfz/2m6P8kBW/i6Nfp967ofTbI6docPKbAPl+gIgAMbAxhVV4Uc+p0FxT66/Gs2RbdbE9GUGT4fjBBifZas=" + } + ] + }, + "header": { + "data_hash": "vfPh2YGcAQm8AMLw2ZX9dRe2zw4y6y3oK1pqOxq0fEA=", + "number": "7", + "previous_hash": "iSKfLad3isLTx746l03S4qnPpsBRDSNAnWvStT9olP4=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAs=" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_8.block b/hyperledger_fabric/latest/raft/channel-artifacts/businesschannel_8.block new file mode 100644 index 0000000000000000000000000000000000000000..28a55900640eafd6fbbb58cd8d19d01cdc03cef7 GIT binary patch literal 4063 zcmeH~d#oc>8Nm1U?(V&uU05h_ceydkWffVh+UaB3>Bc2{=Gkd`rk&~ZnFTYi&UE^` zea*CBK!c!(E~0`4O(em`3Q-WE1{78Vfoy^?3T~pn9||liDiT>Jo70}J=XZWz0lT>9Up^Y$r6%tC^Y+efkMF*1`0APXCokB4)>pp&r4u{9F@G04 ze$mqMqd6xoQ}oj*yhXkA>k}t$>1@5?!t{ApQqG|#?|Sfacle*(0sgQ9e0c{rvH;qP z^GjP7KXdnqXEvSv^j9Bw!nb>yI_%fmM!&CFO1o_|Ke(UJ6SYK)&}%h35yQe*Oeb(X z7E-Y&Zm1E}NEmu79FN7rno+}*n1W+^m{4^i5+x!8R;%qj!@uC)WVl@{>_560+_M=h zWP4^9<#Yb;ZT|4|MKT;OEK`gm^DIw6nOThj#Pd{oLQzoXOz7|=G%&SfK9NU>G2>8Xg->^?{KUo>FW1o~Oa>s>;9#i0kQSnfMdUIQD3PX6^k$N&hG3~& zv!zB-L#4#HtPKmZdzwray?b?%16qq6R>I9mB}}-S49l~Gj?8e0adpBEt7Xel%VfWr z$89x?xk(x-vm7KdVZj2K)*B`|NlO!u+;9XMx`;Mi@9LDMF}vZQ36HPGK*=WiNbEb5 zSfPue$T3c;SeP&}@@h6+8bzYC7-suQsXEeHc()=mB}9s|WxGfKg)lqhnd-Pw!fmB2 z*y@DIA&AW$b`e(zyWMID$B;xg$=Qd{G+8C9T&Sxy$dOkAZJcQpqm@#~QMrOwkHi46 z4To_m$+e18P&`$A8j2b%nvkipy%af;RM3kh%#_eUhK+jte7{lX;ADRoAF3kDp3PI?koeB-SM4O~UhwnhMMz+%$tI$lat!C0}U2oPZCM6)F z;^rsOWH1?}EA^JL5;fqdO$F9=6`l8HltkWwe2=asDy;#9i!Pfqv|J%7D5+kvQ>KKG zK*fb{gbBpzoDk(UB2Gs z>mBCn*dllzxB#5LICsisOMbAq-X3)t2AEU8oCUIqT(KHtJqHh8Ut5 zCrdNll~lag*o#f3nqH3q#C2S10#h^bS7g{M%1A;EGqWkrI9<9@@+|B10&1&iA*tf9 za8>6?#tF&Z5~8NmPFZS8=xSkMghb4tJa2iv&oGYUR7=J2>3U||>MTa#p7S-=>oVTD zp4*bGcLuH`#oB$q_V^go$3jzJiVoHZMFtRRBbutJjEolwN$9S$m~PVPx5bW2lvN_x zj(2S?Gi+psR*sATycNmR1u@uq8+xAF8LaDBi4QV4x?1YHRBx2+7>y=1;c{j(sPy8B zhzsK}8N{^#6%fo*dY;-DcugNIIi8*&ZwiBaTVY+^#=~@#?1aja7^5uLsz=6cMhq6~ zdY59#jxGnk8uB#7xx1?YCBk?!Z z> z;sQ7a_!fQsE#M3=Kj)i2d*jZn{?}F!zhN@~*`99njNTOVYu*%eTJ}I!^Xs5X-j-)s ziOx)7g?2oMIhjHurMu`qewS%4uE_6nFV501zut>e;n!_`Npsk>MwW4KyRvo&fPbF? z|3BPbqkD>NK*F~U_vvhdRk$V0;bw5tj4OEnOHHli0ZzUCtRlVh3~}Umh0CL80-6j5 zC~EDE!z3ZbLy{*^J?*x!OsP|BW=2HWRm&kd8Z(NSm_qcrMOo9$oT04{8r>ZTAeuG% zN=mT13CvEj*)EmK5_l<{PLrdKmF)y5vQs6xoGr^_2EpiRJ5A5p>FM99Brs`+rj<`h zh=etQfi{GQ>aQm9j@Up{8uCbwMe+%0Bn-#l@@Noav`U8Z}1 zfpyp)r#Kz!4azOWNT`uqF=&iZLd7s8QPOgb8z{TBNRzGwMDa~}>?eNr&&OW*6|wNQ z7hgOVUfelArJv>Z{1IL1XEEBhjGZ|4jP?9zpy9Viy2r0Odf<|SyY|J;Jg;}w$)~j2 zH@wHUym9~6&N!I3`{w~Ubl~Jq;eEF_qZ3^5$WL+pC>>i_$_SAO7A zZ@Z4tV7>Nd<1`Ht?sreP-#!7)V3sA3Ki)*kl>7CQiznQ3@KJXaR*2c-&hCrl+v4Q~ zcnZbNn)~4L1^8GTXJao)qD>Sq$;(f{Gn`JAt97sl(hU=QAAGkHO#^@LC&9y-XW*lL zFrEafLpxS*R?+5E0N@->7EyW_;xDhbKfii7#Xr5eIOG2K`Eicb!=!%y`Q>k3f)5X` zzk132`!nuepS`a9+xgEAKZF%c|FMYsmL_W=wD3_1h^C2ySQOzj3L(`H47EPg3OsP9 z_G~C*)L)wITq&)*1{FhBYcEGy5tlI2rG9}sfWWx|%L9yNM6_*^;{x_ksN1Y3OPuR7 zPe~SDwY42PIG1BMIMw-{2Dnp0hZIg!GgJ*jh$#dAsut#&5^PK*j-tf^?Y zl5H3YrY(C=V2iLlJ1k8^q-|8>_1GEh{6#HuE$k3voR*yv9Skb+R>Pyc>(t`$P>;O= zj|lQljc3GQ>rctPmIR8t@s&L3EcBgcVV|JoQ3tRIT5bhz->ryPXGB5!8^t6-6NXq3 z#oKp^Ranv>K(NsZxBYI*H=E0)Aqd0WR+5$ZG@eg-O0;pKMgiyXEa_>&?3(b7+05i> z;816`9Cl0uu9eU#dZyxalV(0|vXiZ*rKl2n7FrP~9Hu#uC`LRr4rhA!BD7+kTFmp#Z;nfWBVlw8Y++AfHE243z!`{Fa)fHMhI4gDamr2 z<%%%01L`1GiL;8c-}a{Ye9p(TyIFR{IMo{d+m9w0`wq?1&CY`3r8lVi zVlY!C`*nM?EZ2sp-&@-3Sf=!gFTfEQtV>_U=;a^2k+QbMD4U3Plo`r$7cKjAC~P-7pV!r^aJyI*u+28| zW;TzzJ;RXTt!0AuHO)KA1n+B_ca{m>ZJIEUX({houtX$GyAozkG-k3rlNATj?qq-{ zG#3llI*U7UH!`WLTGtzgd439*rn3gTJ1R?CFt(mvbGrywm zh|!?Zsc{F>QOrC|;-yBe7AMn0kPvw;&pjvE8qAr1cX$)(SkOYDf4k!vdcFGuA*zcI z_M7%@O?y$i0)?#$cDiY-Chf+)uJ=M|3iEx#qP22k)!OX|-Vn8JVk>bJQO!n^$TDfQ zHs`bPUg76^ux)4);~FZc-VK(e5;Y6hJwebwaN59Z$|4dVl@9B^2S%e%f($O*2C7ML zOM+1-iaT8+1E-r}Z#J>($d$u!HywFxp~)+zb=8B{l~8DR{WyQasKC*xLS2Ot!VCas zJ~SuJbi`c4HD0N6KGl6+3Hix(m*v-cN?H`aLzPvzj&|L5>b2`U}^I)lfVD0uD%`&Dy(_oz8h9(wn{zn58_K^5v4_ECR;&%;$@C&=B}*yLUsQ z()CrwQ*c#VSp1OpZpbPYRCy;igEUGcb&S$>IMz2rSyL%Ig3~)i8saObC9 z-tOUUWZ_{J=oR-vrvJS++CAgGb3gL^K*QGwA;O8Q#V@%R+$X1zj(MoFi?g>!e6WNM UAJ*P4;iq@$r2n71*4>o;1ITI!EdT%j literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json b/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json new file mode 100644 index 00000000..e5251b96 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.json @@ -0,0 +1,344 @@ +{ + "payload": { + "header": { + "channel_header": { + "channel_id": "businesschannel", + "type": 2 + } + }, + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQUl6RVVZZlZoWDRwd2NvU0t4RzByYjh3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkE4UGd1Uk9KY1M5b29RNDRYdnVERkdrZmprZFBHaXRZaTh6QWtqaGxQSTRoNk0vV1M5cEYzZVd3V3ZvWExTQgo2R2dUelBTR2JPbDl4azl6RUwzbjBpMmpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKcnpTREZGanB4RzRYVmV3V0JZR2pwMld5dVBmeGtrL2p3T3RvT0Nqbkk4Y3dDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQUtReUx3eG50dlRBYW9iVTdjQ2VoR2R5c0tabzE1WEJSUG1UcElGYnZ6QjFBaUJkR3I4YzMvOFQrZHBjCkNCOFVLdCtHc0gzLzdBRHJObzdvZk9nN0J6TW9udz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + } + } + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/latest/raft/channel-artifacts/config_delta_env.pb new file mode 100644 index 0000000000000000000000000000000000000000..5a8dce150f23ca7ddef811249b3960061084c355 GIT binary patch literal 7851 zcmeHMd#vPC9p1gHcb6{9LLEbaw5kItQry5c!~&rCbhna*@Ngpg^c(`l#E znLDp`YN8}Yln5A66VaHE5DC%vh=D&KtQ!r+fFu|rz7k=1NupxJ1XMJ}&dj}c_j1>L zfPsJR{bSmm{?2L7xxerGedjB3;-kpl=aK!p<`(96eeL1bUV6{sUTxU7T%+IDn>E)p z9Q4=o$RqQ}&Roxo3B^46-TCV$e~@N*@c>B|WS-$kAk))UMBsTc6ObgRvnKF(2u!{J zM0zyJlZpxBvHDQ$B?Ebs8q*$Ws(hwX&{;$PEfz#eG;9iFxh(i}01D6) z%i%~e*%F%?>$J6adRS9vpRqw{c2Ae7a(K^zETXrWp&D}nHAeWX3@WpLj!d(uaW&wF z)k?FeRbanbOxRj1;&T+J&0++Zj)_eq+dgfe$2E0PkXxQe0big@KRkNMq|I)5Lck~1 z+7QKteL?Dbq@+@1Nn&X)T`mQ*EQD(|nHmX&j1*(~HKjVz+lj6!(~1D4*|dE@L`pGc z$kWxaswC`MMYOem&I=$i>+B1x8uPnVB@qz{gvZSuLQ${^t8BEZwcsdR1AUxrmvL2z zdKy~_*CRC$n3hL-D!01gB#_oup8}FjNhY8zrk94Jf`;^#Q)XK12!<{6`o(^$)Jeep zFges#%8oOTn~4%fEaf77f{vC_N!QT*QN|j!YI3XL3010v6w++76cth>q7ZRcL{Xso z9%Y8>QHbP$#92T(DNl+ ztfhNSr$UM&kxYuQIK8xNu_Dd`3wnqw5~4XKi|NEr;@LrxO11NZ+^%*Nu2Ib?EjnB1 zYSFscG>;xdrrA%6)MiAWS6sO5s{B_X7vFJZ`~6Q37jC=hhQ|tfo-NleMPEoDUp|a% z0^GgZ(Qj-=c7tx$vGm%&>bU5g+jnh8_e?<;oq%v|{c?)Q@N!`nvICIWKDuq;667MX z)~#ulV+|}LY*|E*c~Ea#?&N$gvYU46onGH)8}1-%xB_`^)@m5~Sa*z#cXlH?3r4MO z^d|kn3#DfbrWXspKZO47(8gDM;?S%G^~>x!v}OpZIqi8yzA+mV#a49J&jmThj)@=gmdMXO@ZgdF~R?v zW2yqwXB^WMq>y7>VVrObmKo@*?_}HJNRw$@fSqX!5|W^-#^~Yc17SFrz{2qgTNLmV zFlm+~SI<3~0}&n|5Dmjz5I zrn*erP&{SSsbq@~S!PW+$QM~H=cN2rDy$xHH)6$XO@=)I;8R|qX1p?~FR*Ka`h@AZ zVu_xV4g{KJ51KRsL;3@gV&th1N+k}2L`j7t6mpO}Bdd}Zwm~ca-RS@lPV=T@BE6tU zF^t{yS-esZVZPzFTA1zS2Av#fyF8)4ITNS6giMJkBaO43?+!*XsCBeb zQYVcjTOao`)lM`~frWfq?(&Q_3ScxOraIdr^f*SyOZBdfkdP>421{(8i(^SZ^~6rH z)5w`g7ziELJ0meIe(S6#%gB>TPOhO$Vml+NQ}8PIa4^y_ky|o{?M?tP;Xa{=TJ=LtDSzjcnroSfoIW*y!FUlrCxeJU(O!gt7)#qq0Du+|R&4Qb5 zYHhKr$Hb8!5gs+`oTa_09jX~eb0wb(W~m8*5Y}m?r76x(3Iz*N4K|a6A_Ezk`s#}F z@Z{9&7L zQX$iS7HXmD&g^FV^EZk zLOj;4rGVFCtdh~FD2-B5i+ZUx9mk|{x#tz@Wh~L<&s4?X#mJ5#2V&^_Z~6i|C`&-4M4~Q zRRX8JWdI=)1Z@IPq2)0XYL=u7?ZZ$%>%k_ayDE#3Fo>f4YDD8iTP-F|AAAN`jI8P6 zQM+4+@zb zv=yOe;~X<$Qif|e6juustyvQX0(&}H%(hqm8+9ZtNz=UnN%mPFl^E!SXgjrR$sj*P zV?mgqQ4Vnz>T7|VZlmf5Wl9z#DJ~m}SmRERUMer)jeH|NfYp}4`$})6xHQuFz8cAD zS*J!9?2UAefOX`7<-qN9z2)Qp0HQMBBZ3xHJYGrrO;d5B3LmXnZ4;K9MA78UGMBbB zM`<9%lHsV0x{DK)B zMB&>Jh3LHQSmC~K;m=!uJ13`S3vgS2ds~3p(KU?T!m2;B7+rU24x=9k>)t+e7djsv z=XPyd*n@^1OlZSS{F6(zuXn*W8ajv2{bBs&r}W#6Ubx4_UIFW7iDG>~T&(;|J+DEcrO2}isRy$D54j=Zto_Klb8!yH*1?j7~D z)*g!9w-Y&Odruv=w_tl`EI(Ii4LY?%Jw8qovE*>srM)*B0q=P!7PW+0&+Wl58O%8D{>W~5+{%B`e1IiCP=##xcXU|i{O<7`L7 zT@mUd*XEe95-R(wD`88bSVbHn(TydXm8Dd9rJZ@3ws$Q#$mXf4()Y>UDAzGs4jHg{ z)4^)JWKBwl<1xe%`hZ*#&Gn?(YR1@oG+B{v3jc{Kk3c<22V0t2fafK{p_PTac9F)&yd%v`|_`y%V z`1L#gVN|ev2Y!=~nxB7t{|WUKl#S4H2e^|~~pFVf#ef1|VhT2d5`pi`W;i3hG%+DX*edzdg>f&=7QM&bU zYU|_F*2k&y{y25y_Iq#r&iAkU?LCj&<~+Oasq2NfoQTnSBcO;+HerEmi ziT;jy?f5;{eCdg!^y{6yM<1>Q-}4?u=MJRbS3mX{mwfu=Yj>jA%D&^|kI~N^IezW% z!f*cJjU})B0?I_FxdWfN`SJ&U^y-UWxc9DOAAj`Q_y6&c`2LqJd+f^kHF)!v^#^aP r&K;oe2cKWO>+!qqzKQwRu^Vr@^%EaDaoNqEeDvR-62wN&r4IfV*1NCi literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.block b/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.block index a42dff33683d37e3823dec75e31fcae753f660e2..364964d85246c020e37c64173ce7050bccc3afe4 100644 GIT binary patch delta 269 zcmV+o0rLL#j{)|N0e=c28XzbhjFZ3qWZ%OLk6I=`_9t6qnz;8Iw~yU6wN0uI1fmke zj{yq6j{yq2j{ypK3R?&P5CIwn2>P7$B={GB;&rH843hG&VCgVKy*0Fg7qUHY_zaGc`3bVK+5qWI1AC zGB^?%5*T;<_|zr9l(IZ8$DI!_?meXRKY=yFS;3Y*7{V62-K-F1jL#Ij;l{A{g6I;& zj{yq6j{yq2j{ypK3R?&P5CIwn2!WG_4wiFfd{>I5=iD zWML8-5*P|!BIwJpUCMwcc|&lUgrO5Vh1-%esDcI-HIACMh8j-5D8 zY$uNW!WJGX5VS&+7X%L=AtZ!&K%iEDD564rLcH*VKouZVglKs{v;_g>B$>&bKYM5H zy?eXcu4YD=WbAVs$MN_3zVn^$K*vX~e*8nf_$y!eKj-UTef|sPM?d}TkA24dwJ(3? zgJ1f>-`D?0{M{Fy{w?^cU$_N*1w8%)JaXtWcW&Lib#(jAfB*V_{_``(&!%pYjwY5r z_nmv6b{b8zGIB=0GG+S`EVOy6z`rkPj>*y%P% z56D84lZ=uLdLYXjleGp~!Kfm*X4{WOkz!j$*~HS#^(e#^hRWz7Deph_MwB28Wmf`Y z=7x?1)=&!Uf-yyMwC_9-W$^juVjr8i9Gi}~&8!njYg=VTA{p)4K;Q&b17%ik+>itZ z6FD+pa(%JZBs_+rsFT+j!xM-=KqOf%1!8xxZkV!A#)is@Z8QBEw~9RkligYmvx=47 zao18WT&l5(bgjas1iNA8E#4~|kYx@!L#3kX9d0-gI2CP=>|~G!wo1k#QQMxTLuU+G z&gAWPPc8z&*?tRrUt_jkD@1x;OnMAU$|IWC-YA(tlCs7V8I#c&xUdSM5;9*V2`vNL z$Z|m}b_bAajNr*0WHr)Gk2dvWL&fWEB5`QW*lxUK>PxKCTdTXa^TYqAx?}`1h|xSi1lSbGS1I^Ech$G>t6G zspc&lZLI2ZCcF5#-bn~co;1RGB7y7?wh=i4-7HKULqrA7_&tninlwq1t1Rp(xdv5c zwCRL{nxR)Ro6|tWX{I7O1vjU`pVTypkPr2ZCctehdju2FiJUlP7xLVMqdc6{mwG;F z%SGDkE?d0X!-y(7TgpL{e=ok)!oI;MrV{gIZ@UmrIglLNgp&pxA6#Y7UlR zTarX3$!Ko}jNTp?G60TCh(xwS8?#3nB@#piz(hj;K>BJNhb5GLArro9&U8EkIfhQJfbutY>W(y@JSY`1bDMKDJShvU-R{(~50eZU66DWLp`xmRXzHu#p23r7)>-Pa9 zt)_EyvYw@j4%te_aZfMxz?XTEqMYDup{QbC97#e{*}0NHBfwK{hNhq$cLgN+xFCW^ zz*CP&Q)7`tIA}|RfTnbZ+W@M5bgF_t(cf_uNt;y}D`m#I)yE2a)L8ZnN|tMtaaj^u zp4`w-+3ZMFv@x$us0z)j{AQ794JcLfnY1*FA`Xq2ohN8%J~X+kI(AtK4Xtab3OePg z$E7NWKjErW?HN?C#+safs;hA-MU^g^RgKssrbW^7rG`I@b)lqo&xsd$K(AMX`b86&l@y9S5ViIx1p4bipnsOL4Q|7)qdPvA!`Gh#VRfcG(FKgc8Ya zfUk8Y={svJGgD$Uw9CW#6ukm@=HEVl=NA00x1k$Rcq0mLMB(>Q6vDShGvA%3NB?pI zwwn>y%?RxKIs${AUbt?2benKOf1Vsypp#ed$KW3WeD?wP4tyItKXvC_N6*909;}hA z-*eKX20hEnohVM+5P%l`2>hd<{rk`Kdlr80q2Hkw0=-9ZEysd{hmt=AIk4RlhU%DOB;954||moimsw$$RV^jP&6l( zq$abpg=)2EQ34n?ZaAM_hJN#Y z&zPLIN32CN<+DWUBoie)D#79*o?lwDM2-}r7qK`P~D7MyXsMRU0l>0Wt^4L zCT7}fL+$b{cevym*_A`s$MJk5X1(rFx<^(~XJy2VLR~lW%R|<85X#HjOZ)FnPoB?x?5LB&!wAq9G-%C8{Bz zRi;$;IjJT9z+{jr;gXkA{T8;81ukvS&9H~7p}ElcvDww9Oh;MR6~~)=|2>~pI5Whx ziQ9Q5;2k|0Hp`vTrQ(pi6`s!}_Sx_c_IxfiekiJX3q7Ap48&aF`CMxJV7j{R`4FB{ zxQ&b-_9;-c4-?yk&w$V zF)R0C&5~xp+DPe|Oz79r)syplLSn9X%SCGOTD>5GHsxef03mvumlb6YFV$crEzqdZ znT*cS)j7|HNH>PA^+T-0wb%&d#r1r?9LP;3UzNm`Z6Q@s?hka5Qh?{fH%L<(kkG0> zUAtN@M$8&T^>iYL+s-Bl=JjMj62TNqxAd1+c|QNR^?bf{8@dsOKNz0RB>+8WBJfhf z2P5s&Tm=(>H^T7k6ov=i=ihDs_k-g5T*A=};LgpwKaQ|GJD2#jj>I0r``OwgkK_Gp z`#qZXbFs(u-p|<{r{2%er=j;z6Kg(qXH@K3sUOXI(aay^z~6fA&b#3|r+(Mb`^zWo z%H0^)Qf^${`&;)OwBz^_r+wkq;5$GkJPkhuzw6PD1OFVkwa0ev34e!xKleTeI{6ob zl;H2aeDqf@?E^}G`4arcFTr1W>9BumX#K^to>h+qo|W4@odA{x_P7rQRn1-gZ_;^Ien}VVGaa*%}L*TnI?*NS(t8qxS@Svj#MWw5$gCg4Obv}ri zU7tg`YHk;Lm>klk8atf|2O>Eg(=AmaW#b2VU2%J+I)Utlr>B}Q?KE@BH7+@%hq+zJ zrrH~ut1e43Jr|I^m#CVVt)@_ltXXd*=;gM>8QuQEnaY#^95BmGz(9M_7&ao%n^ zPLpSbdbJ{&1!dv2etXPIY1r2)>Ktl$H9RbrWlcwQN@u%Ef#H}=oQ7<3j0CbWtzYdj zZF3yX#c0vlWYJak|MvEWuDbsZ$)a}P%{xkEnxo~^>oIdgC=ac<+agR0LgppC>4o(` zsI?gr+Ho#>hUW}G(nQg7=LYLq>f+bXD!g5~Ylk5>)roX-x6UvTQ zmZz9d2(h{170!qz>z-3{JZkA^T>pHIV;g?8=_j2my1F_?AQiTYr_vxti`cxhtI*K- zNGaj68L|N+f`~Meb!i4XlNQ*vC6;0vd_CPJa@mF|h!*hiw^?07C1wLvRK$$gbAZ5P z3);{@st%-U?Qk{`6(eK!XTURAMK$!Ar_5WRCWg`i>*P8T&+`g3L&AcMZ;DTLlosO+YwG)>twFDP00To84nY zLfjrGYi}>Af^;jgs^%d11YGaOd)@hxY<5fD3F_DN4 zVc*@^ARYm#4kgI+jQ2>j(vr~WBp*W|%j32dEr!)7rumKE>xk2VEvXyATvb5YXe10u z?y9lQD04}1Rjjj6s^*P9XB00u{BQNFW!Ux_j%~$Xs@J^Pr933^#7BiD7^a%jiZ0Rww&qPprqG6EoZW2 zCcWC)%_M6)qv*2bjXer5*hQVZo2hy0bn+PvRhglZ?DLU>8W7rN;<=BYmGu*?yo)Km z8LbR-@_s1-uM+kN&8zHoDFQdh&7qK;O8SGMzd-e%7FnMZZ!6Fuofbn#u!CG%6Q+VHy>`<#sD&rzr8P}uqeXX;d7;RAV}+&g zc9#rkikzwEs}{5^6r@F5QMR@#2omn3YJr6D`NT00+WW}ySzW+;dZMYQ8d1%-ZItwk zYROJ@S?eV91UCjKkjnjWG3vF~(+oPPcM7O?nIH%nSl2K$hppKtATG@BqZD=K;+~c} zXuHs1U++es-T{qFD}LxVyAo|nc(KkjJsniVCZ*a$Un)7BQZQ}FRj1V)jx@q2Hc)Ha z$ApbD*UY@sAqX+(>nJ*ts+P6!XLYv7#Fn1QjXb<&p7#cE4;Y=^Anv|SxIx^LL)=;Z zt2{dY4YzXMJNQIE&I{ZCbrfU;2HtB4^_%jj*19}t{KGEi+36FP^GL>R*KGkKjoBz* z;hQoWg@gR^I=1t+5cEdt(@3F28WGEO$+^)d`N=98o8@f0q>G8-OX1K6YuKnlMQJh< zpsescx|^Z|I+S}8qQHA zw~1A$*3IqI|Pno}y@fH5nsg7av!7 z6k+Vqq)n&2G7+q%I6aiC@{*w-9vw?vJBT+Mwj9N5wQP5zQqL^w^R{S)y#d?tqS8og zP8Z@;a{u^x{<}fk6B|I^AnpcnXZa6(0{kZ|Q6ln7o-j`0GJ@ANY`VzBa}kwyf}Qo& z@!zG{V# z1=nOatB{-Z3WE-fDCm^tjW*f#q)Mxv2_9s0YILhwDf@yIiV>r-g~~4#%p`k^R;j7{ zT#fmD)D!CR^hxvI4dS+<@o@~~2k_qw;todf<0#G_F2unw^bCd|VR9FG<<_gud>r_+ z(5ZoXe0(sSUx8l$$p`54|GQ5e+T4R)BxliRI{N9-vx`1z6X9@JU#S7 z+R7h=?w%Zrn0XOcJv0encpLiIubw{~?e$yG-IL4(;W)9IB*3Yj!7}uLH?os|vVma8 gVb{5l_W51sM96N}1LGkN_5D2QYkmiM*Z%ka0a&MKX#fBK literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block.json new file mode 100644 index 00000000..2d5ff9d2 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/orderer.genesis.updated.block.json @@ -0,0 +1,744 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQUtpeE9Ya3RvYTVkM3lKODI3dTZuRXd3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3hMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFb0RzUXNkL2UKZ2VzR0NnOEJXcVd5aEtRenQ5T3FKSFRQNUEzRmxxUU56eVhySHlMb040bk5CY3ZuakhGeVdyajRMblEvK05OWgpsODVwMjVscSs5VnFtS05OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2E3dExQRFpXc3hDcnZPb2VrbEN6R1BnbC9hcjdhUTVOeXlCLzVjdEMrTmd3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFKbTFEajltTGlCbjBUTlFCeXc3QmVqaS9YeFdlUzVucFdub0NVMG03Y1k1QWlCRgoxajg5OWgvc0ttSUVWMnY0eFQ4Uno2Y00vYzU1L0hSTERncnBqaE50Vmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUptbFlNdlo4Ynl3SThMV29YOS9MK0F3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQWdkemU3d0hYU0MvSDRxaEdVZGRXakZpSmxBU08rUFhaM3NLbXJ2MlRRUXl6bDNXUkVYYThDaQpBU0NGcWJZanpzQnFmQWwvUHJVYU5sanZZdEQ0UUFXamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdtQW5SZ3FwdGFIVTZ6QWpLQ2R3azVReERmeS9SUlZycVRqdU5wMm83TGhjd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdBdHhZV1VTbTUrR0pGbzJITXZubnFWUTlFeXUrTUpiYTAzQlFTVldCQ1JFQ0lIN0JaVVZCCnVTa3ZlVVByMFo0Q0NQV0FqcktkeHNqbjZzcEJBamtjREFTcQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 20, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T05:17:46Z", + "tls_cert_hash": null, + "tx_id": "d7921cec05f57cede225e40c40427ef50974637a60806026573552a75fd9ba28", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "d/z41CXAlLI8L8edDzDuPaUiSZF/h0Pn" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "KB6Mk7/+ZN/DDY9aJkD2J1tlmrj3HLeP3Ta1TaoPBKI=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/original_config.json b/hyperledger_fabric/latest/raft/channel-artifacts/original_config.json new file mode 100644 index 00000000..8ad73d95 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/original_config.json @@ -0,0 +1,825 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVakNDQWZpZ0F3SUJBZ0lSQU5TOHpVVEVqdG5oaW1CVElabEdyODR3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NaTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIycytxNnlOeGVwU21QMSsyMnVvc1hHMERaVlJVZHlOTjlFcWJJMzN6SkNJMGpCeEdpQXZUYjBlMURNQjU0TwpBMUNrQS9DQTNELzNLandlUTZzZ3dLR2piVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKZkJuS2NGYURFL25iTEtGaWRsZllnQ05NZVl4U3o0SC9INERZaW1hcTRlQXdDZ1lJS29aSXpqMEVBd0lEU0FBdwpSUUloQVBNbzFCRm1QZFhIdXROQ2ZXVElDN2twKzFMYlhSMmtFV2c5OGMzRXJPOUxBaUJPTkdBUzBkdGNyYXZ2CkpMK3VSbzFUUS84Rk50OTVaYkY3VE9ISmVYcUg3dz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUptbFlNdlo4Ynl3SThMV29YOS9MK0F3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd05EQXhNRGd4TkRBd1doY05Namt3TXpJNU1EZ3gKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQWdkemU3d0hYU0MvSDRxaEdVZGRXakZpSmxBU08rUFhaM3NLbXJ2MlRRUXl6bDNXUkVYYThDaQpBU0NGcWJZanpzQnFmQWwvUHJVYU5sanZZdEQ0UUFXamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdtQW5SZ3FwdGFIVTZ6QWpLQ2R3azVReERmeS9SUlZycVRqdU5wMm83TGhjd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdBdHhZV1VTbTUrR0pGbzJITXZubnFWUTlFeXUrTUpiYTAzQlFTVldCQ1JFQ0lIN0JaVVZCCnVTa3ZlVVByMFo0Q0NQV0FqcktkeHNqbjZzcEJBamtjREFTcQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQUlxMkFvaStnSWZzci8wODZVNWtweU13Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBME1ERXdPREUwTURCYUZ3MHlPVEF6TWprd09ERTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQk11Y0h5UUgvY0toODRFVGpKZHlNbS8zbllZUDVvKzdGMHVvbzkrSEx3dzIKZnNEOG5WdmRyUlFKTlBXMEFBdUpqYXhla09Ka2RTNUhVc0tGZnFteXpqK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUI0RnJGRTlrNkF2YXltUGxzQWlVSGQ2dUM3QTRmR0ZkdnQ2RW44M0R5cjUKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBUEN1bzhTRUhMMnlVcHpHOUVHYXpROTYxRTJYWW9qTCtuN0tCS2dOMUo2d0lnCllMNERKMzEvaUlhbU1vRVRGelRIcVI1WkJQRVUxNFRIblRySFNvUEk2UWs9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/latest/raft/channel-artifacts/original_config.pb new file mode 100644 index 0000000000000000000000000000000000000000..a93725ab86aaf10c9a1963e7c83aef17ad9a5b75 GIT binary patch literal 19604 zcmeHPO|0waS?+YE)7x);ddZ!3I;ZV0y$n#@&`IL_gDUX9oy1P;*m0aqWjl^z$3Kbf z#IaXXgoFUW3KobJt8Ne*7Dy~uAhASjSRo`NKq^8AkU*##R6ZvsIe&9c&fK{((~izr zoSb8S@ArNF?Du`2@A32I!Hb38`@>0ptN|PO#ykiIrWrwps3I8d-7r=(^nOn_Uy5@UE;641E=Gn{W z)U*BQ?6)3+7xPZO|G4nK-zxm~w=TN<$Ctm8|6nA|^6%iJD6tfaqY}A03OJUNoGKtMO zd^F;=WQK~E#gAZ5629Q)I_-LTwX@a~a!Wa=ygz41#0Z|VF&Y>iwN?=~Q<2t|meBFO zK_HQIJDp_YdNQ8R^)VJrhIL0r%3Fp&wS5~-A`yNLdfo>%OqjXBbJ8N=33SU5))syy zN`A~)BwWVU566JwU>PSw2`;F_NDyc;>5SxzlsLF%`K93)*A);d(v-=@@ajudA{7o3 z_LsfocpxLxnk6Txs?;5A%sYBUPB_fi8_zibUcb)`>#j*tu|aR$p2u%=i8MGY*tG$0 zf|81m>kn>-!Ol1uOIP%etF=*!q;dTG?}TK~GK&HXD-|8CzuYt@0$Zw&#WmF>hc$W~ zTIIT6)&_MgTkAb@!w7KmK9544RM$k-&u& z%MvOuB@C4lcnm9L=yKPAP$OAOuz=Q#djn#kL|Z)E^aFF@;u$@#+>#bHHKER@DORc* zF<#`Y>rWyf!Y+Y`vX;IXB96_su}U~(uyrN!O@fQ(?MBp@^D4q)t;N!EiAjb9I7`L8 zzAVFv7Xf^EmFeqptG*J(Gju#_rfF>y44JTkHo(qZNS?UqLXZFSq=$7g=wVa( zl84#b{&*1wT76ngJ1wNSZun$!{klF&9u_@s4;yf3dGBFcj#iQFa-!7BoY+d3y&Dq* zHo+!zWvMT)4U96zw&#s%s!~aGT80s)9dpzIKAb9Z9@B7CIL0>ug^#gdp=3ZrLNqOz zz%nBmw_2F8Qqp->$l`W?)nTMT9j#LCO5n3}95QJy;A=jQ85`eWs8k7^TF)0sMV_Ak zw^d&vb$3;4k5*on=Q%P;2y5pUgS}%2&~Z$ZLzA7ik$Z2$ITTHxGZ6rKkb~hu!Um}I zEY1SX<2EsbJ&FQ5M>}4HaN1ta#{9Cx3s{;oG1IY2&2>;6*l16(e9O+&4tHb#Mp z(`vWprKsz%h%&M_6RFnI&(fAS>OHcEe?ad4qh5EC{lPi|6Ol% zet6P>M!5sc8W#@4uNOWt-?;IzhjrpvI8cfMcr&l3sHyX*q^N8k95IxWC|`_#0rS*H zNmF2#yBrL8Rwn`&%u~;pre+*gra_(vVVY8=^cJS-51*<44EnoVg%OjgP%kFxrZcQ( zEu*;_s<AMWppC=7UNfNvdjSqKhmW*nHC-hYDMi z`d2{{TmyEOtMXLEY}rZM69$4XwmGg@PAdem^?K7fK{pVtK0ub#YQEyOTbjgKq82LK z2??;VTA@}wr(DK4tnaio$}}2IH*zwG(e+p_jT;N(7SEgf{c8|({@cso9u(e#!h2Bo zF@nOv%Z6*4eth?pa^ON9m%$fBQ=8`e$*q_@TCb1Kj4qLSwF#MBXirBj{MK>D$q%lSIU74aA4e!JhAyIMFNcpX~9D0LF z5kb~LG^WeMWF*Sdl;_*zN@uIptb?;~!?~qxbR+3yvqErKz1D{t0epd$aI{L4s$C~B zg+^p0UHT;aKA`W9&J@isziUt$L6&^I*QM;KJ5w#3=S+1w%xX-DsS&E}X{(xvUVjpI zdtb2I{0_LFf>GXJI%d`}kIxi|#hZ&|vC`AWBC;SAtKBlHWY}-_;O4i_)9A1~jg3&- zY(S@1T#G?P5=t$KkK6T$PBo=I(=o>@rkUKj`F$3)h$lCj0j^kB6`8Kpu$f7lc6xKO z`x)}GPoFJHpM@>5sj!1>L>+{Uw$Au(yIUX0g;Eyb9| zK(6sxCv<}`&Tn|U$s<*=*sy87#zKclfW)_WE5(PM`dVP=xJk6VK}+%`ONE(D`pSar ziA%jQwdNl`Th#GfmD@~OdYZ7Uo)V1PrC#wya7aE0w&+Io*)mUOi*7W&Q>yv|*`ga6 zh`fa@y3zRQ>FRMbNJoYnL=uEFbE}F- zj=f@U#s4rTpWvnrBBSW1oK1~+T zg@{>N62(!tlAJZaM1p2-Zd^%MSJ)yn-l~c`^y)>rLj?%KZG3+<653?CE^-}RD_1dL zI8rcNglrMh#3u3x1MA^pW6FcDJgMRMKtY|bJKaW(--wnN>MY=kn&Ij;w&?7#%feTP_rUPe1cpb(=-=-h?k9yYy5UFn4tM39{j&he z%Wok+)t%Ti*67akOwN@YNu4`!P1h|>b4^z)?!q7*DT?I=h-nn*KFSirY2#|Y~S8#limj3D8b{tZ@Q&Rnx)eD!~qF@ z?ovO(+6>bV)6F?McWpYmZg|ZzqornCnoU%A+H?;6)WIVoGK>;!#(3aEB@^Zb#^R(| z4HT}LNug<;wE9)>&7IZI_SUWzoBI)SQ+YXs|DWvOJKz;_0~x^5-DU|dZr_};UC2{o+aGR0%Fzm{@t+GsC zV5V@(9!jByby`kOVzWwLmPT2y-P0COb9-8ld7H=u+(nSNt%lQHg@)S1-oz|c1959R zX+tyz6KM|grlrI(yXdu3+*EJ8@HvWHcpdLFju^YYaC%|dZBM6dh8!!^3OC7ctyLR#XAB>EL%AaPpkviq zUa2I=3Zmc&)nBnBP4>drquR5wBZ!N}?WB1wXq#TwSYDP`-uC?Gk3YEW`9Df5yN>1e z#L6N?O0hK{{W4n`Yrfe*CmJaGMWtDrZtEo&6uL|1o zDgd2$-V)2(qjLb|u{)hU0SgMsI>YZGG`Om*M@=dzZ($NCa|D_62@-x{8a$RKmMpIT zI2_~XWQ%8L2fmifixyM~bw?5>atXQ50W6s;2~~meVpwLNd+wYQ)r8v5fFYBLq$)K_ z^gA#ndi)X!JvW>vBxEk^6@)IC#Mf2-8i!fCyb0Bm;z3QB=TC5{${|rCRKhIdJcYB^ zMLOp&Ea7n!9d0DPOI4fgdb3D2xy>jBd}G`b!j>whO$OW>HuZW<5 z+cSf8TzI|k68Jn49j0(Mbbt1<;1S$&DcM zG6c%|qAW&2_47P0QF&1oJxV8IHaTGWBc#8U>tQgsSx+I=Q;88Jj>KE+xH9Wiy#2s|;C{dr<}9AnKy3U77$ zm`C84D_sp+AdeK7hTaml@>;5hJ`Y>4*5YdI1w`8W;)~0`fU%TFmJmoWw8O4iR1&-+ zOslI}FCykGb%a2yJe+05pu1Tl;5^`oFyJLD%gV6AYcUyjT*E=H>6H*1zqGiAcn9*5 zuYJHXV8DYQnGkKyZufaY=Udq(k(GE<<=VKUqeH$p?G>FxN2pFa?Xe-FHo66!*|5%T zr@lN%i#-(OoS}jsE??EOt?f3bEa5szEHqQ^gl^^Du$4xRFIICsJ9IPB`VkOo@zEV;My)myTRII#$ zE8p*S1YuXXd@1MUJBy3LT?gXy9QTVmxK0Apff*xDkkFV-gawCp(GSAyPlN4%!*}K3 zQ&JFY4#)9J0OCeHre)197FXIMGjQZEEuKLMj6`h`T_8-mQCc9#a6O-uXJ%_wWsowd z8}lv^4@#)BUbKiYua#CL4j5#{_jM=SZmCibQq_{)4~m0HN%6bf#2bvLo)r`guDw`t zx8eQAr}N*v$33?l^u5R3d)(#xceR?~+43K|LeRi2TI?(eOXXHWt}m7;cSUmdS>Uri zx%_uS9dnob$E^(}h2H~Vbmy%aDLI{K%6X-#ud0K3P;64=br7_ROfN|gFpG$mKiW(~ zQRwgkrHrEMj-zeOMZdF{4(p5@b*b6POEahVQ<(p5D9o?qzjJ2d1M(j_z}G=*NHRSn zm6sXaCTT4b+Kmc{jMc#D75!!x>soxJ(@0ngsJ$A|sa8rht9e{NN>nB>E3rPo2Bci6 zNsKRr%rF?R4Po)T^WVM4<)HCd804qqzk826GR4n=IDfi4u22A9sF%xL^bmaQg?GO2 zZOGGt1A+SZ3Hb6(d@|Bp8>)`-FO<4P>~PRXT(tR^L=#80`4_;$Toq&c7V267tgW1T zg+k#0IRDCz!*!g!{{nb;u8%;c)6k3}C>e1J0(k3#nBQM+mh0u?sVke}tEaBuh25#M zH;;<8^YKdOU!C9pYt#d*G9Y!&B8-iIQnDw^X21=@1$=zdjdetZwFy) nuRZuqpa32YcVFCfarDsRV<>7l(E7LB!_$J5JBVWr_vilsZ-V81 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block new file mode 100644 index 0000000000000000000000000000000000000000..364964d85246c020e37c64173ce7050bccc3afe4 GIT binary patch literal 18422 zcmeHPTdd>SS?-*kGoAX}Mn0{2x+&#!pWZZ48^?(g2T`fZcPFtEJ9Zqq56Dg&$4(q4 zb`r;a;S?cNAZUdsF9;q$LP!YlfK(koTq-W=6XJy@1gZd`B1FprPznOdO0qARy=V5G zna(-AXz$V9nX#9%9MAgx?_1yc)<%wxUigx#Q=TZn7MV zZGYwu?|ph$tK+4CJHUt$Q5(2J7sm;=f(L%;Q&qrZ3sd8gFvpnv`f`une-Z@zMNetYmw zZhvC?MX|gnzecmFCUPPTG|i z)L5c>J!!+{K;8G?Y4k)MJNz_s%8iw6up2G_`u^NNV|wtMPw|70gB?$E#Kg%B$AIp> zL8Q_6{?^X!OdX`${y8yhN(5$?n7TZ-9PpcIE0ouWqfwSbNj#M;_^wo`1CQlt`sD8^ zD*#Lc6z>S7N}2661Tb-g8d)-0Qym{Ivnq-7xj4c28L&)UB zraYFT6gV0@Q*5RtMJc)fQZ_}H6pjNG(|{rrDWIqDAXUu4eD?-Qg%v%;+mz#BtHhId zt!24|a-?qjAgiiw$I`}#Q}c|aE>2qYjCRdRN^g6JEHMwT?cFdcd`lIGp6t-gjl-80 zg{hH=Sl3H5-AY#zWQnagZzUSVrp=q}?tC~=Xpt?>Y&X$la$M`T;vjVNX^~X=6KXI| z`vO@$bGnY|v{MlR+xyhDObp5 z)vPD@?Mcvzvu1rbtP5=4D3>HFr){#*ZH@$a8FuxOHbWX-g$#>DMK^GRHn{deWO=p~ zFGH?A!U9E|RApIWla%pxL%p*f>aZ4iE|5UVBU=EmdjQcA04W5>783zQE2$WPE64wK z_#;=1|1Nw(RT0Oa8F;gnTAE~dap`r~873C{_RMVn%SNzS!Kiy-H4sb9qQ%m{r|eP7 zkVk$J^rt;i!Q%N~!4iXS)Kx(c9afM78mk z*J4855zFEf6DpAED?#PWXuR$WD?^W740XP%Uxa$ay9$jQmS{%nR5F(5ZJV&nMTD^XAM{rLwP>H<+Y?LDZ3qY ziqd4$<$dJgXsj(!-j2$^MpB3TCO2_*wdGIbfIw420~+NGPAFWY&gopDs8pr_=&m)n z$(3t$qE=vQ(z>@qmQrRn##;R5vEAwJ| z=EaRARV+E2wJ{SMDKt8p2**-82kku*U_=qkHt1G$&DkGj7 zu9sDIMwXc@CL|D@k?ihnFb}}0LyHPC6+B8SHDr7;&PGVc38bS(^L{ys8DZmhTGFKF z$l3;2s}f|Sf!Hg!tJ*rHtp&}OiPl^#JC@G(^IkqvN^3-&n{hXtk_i@Fg|MUBU>N$d zbt{>jM!g3-bEGUq)+r7`Wo!u z0|y=5MPEAXXsd(w_jm8)_2|RMyD1wA;;x^&==;zY@BI5a@4oTI8_&H8f1I^G`XKVc zu9fD8ZnRpWFQLyO&)~`FyB+-q@(Mk+XES%ILU|qggQXwM67(&s^R%8Rwv}`$Yd4kc(UfM2wm0%< zNMRR+a`N^H&6||GehoG=1=JPwO4BonhW&7)zy=h3S=w;`jz}51F3cAP&wtmAz27LEO_r+#&y!9-sgE zTRrcc8AVXfi+m3ss@Mw7yw@`B*Oft~0e;~0JU4mjdLB#p?c@+TY3xRY2AMh?guP6< zU<_UKg^&jtLt=q4BaUlRGqXzx<5e`Wis@*<tmdR8^(%ko$_7Vqp zU+IiNPIk1yVBS^zu8OrbW7=i2POz94-OeKLEHCve{l57wMB{eCYj_fc?Rc%BC_7*8 zfb+I9i*utWfI59^BB?vM&LSXyjIkw1NQz>rOeDGq9;DkJCfgB--c1aLtfKf5P16Sg zVslYIc;5K@;c9zjhMakro-6={Vu8ja>-Fyz%kYtjGN4|Qv|_k zLNa~XE-qLa5%7`Rc7k}b;fhhrm5WY0Ds-%(F>6Xz*y(XCFDeYA`eZI$rS~6!|85Ys zHGH4S4EhFfH;6mrKl~~1pSZw5VXQtU9qC$CLX|lphK@BvdaoBJk#enUuStcSL)Rgi}%ea zXccC)Ce`%hQlpxR9%8mCOru;X`l2055vy^zCM;CKqB^Wzs%XMYi-m5~5v$7NY4hI= z;+w#UFWTr`%d)TX9o`3 zoSMvMZB7mxv^n*ZUqxSnZ-bnA%y*wTYjY2InVLp}Nzb18LwjrZ?)>9jpBLWm)NMxJ z6p`n*25%HE{Z*KtzagT3BOrIXI}`W(1o{;L{rcJet3BeYmh(fH7s5O{k>@# zY3$b5%lC^s=YAiy5g1^f8mlbyeUTPiVtPQsR2UCrNt>iH1J{fgZv$UbV|xs)V@dfo zFtI;|7y*@U{p%;qc_61jkAs{C%sLFV^FNjzOA53vXP4)_>_DQTT^j`6ptfDmdT_(* zgA)iv6$^pXp08_`A{L3hy5gE_x5BSt4X-13hk40X?n*%55WxM3WqXZ}5Lg2xK_(F2xQGyeQU0b#~jAbMnI$pOU zcQU1OzT-`cc3iU+Le4U(NDP*ALG~`H&s}f=*(N8Pbr%nOxlWbhu0X9y$;@S><+xr= z8e`eSWs024y(wemR78v1a^}nngw~H1oHNA{8C&Ge3L}Yy(jS5TsFr1wUep!h5~yCW zYJB|L*CMRBT~!(K2MF^w?fzsL*~GA%HDFp~Rh_Zv#m|-g03mF*Li98d){(%@o?+>Y z#G5!=YBmT=Qpx?Y1$3Pl%Azd3G`mvC;BDpe?slj>{2wY~wL8UcQiUnD=kSR&babmhC z)O(Atd3DTUOXC+)7RX`D;z_`=O^@tiMrSdLMp$Bkdf4)*8K%h!m8CVx4g6w%W4K*n zHaBJwtz%(rU=lE8!6Bu9tk=iIq#25A4_{X{8mZ>hfm9q2L{U&%j2F*?vApa(X3XMi z*8-@w1<u;m^3xo`k=doQAkt9Y4+lAsS1HPl zOXTFBw&@?hGiuN--N9p!SGdFB0Bh-TZ|XdX2Y{^`LYrl z8;eD#zFFcHtpLMliE0Pr+88F?;aX3vC0O;HV!t}Uub?XHuU~`-h=0C~+=#*(QFtQ? z-$GG{-X2VSceXtGryH={%)oADU~lOR41IR)y78IwQaW{G(2t=%4EgT;2Z_HI(dW;s zk@L9UaRqsvoeiTnaYG1N^dsmG!Ry|4aNYA;tLVgUIqL{JbB`Y5ic@px(fT;EhW=~s z_uyN<=j*Q@{o;w=^K-}OPadP+-upeflmBq7nAW#B{zJbJF#xd(_n2bnTi7T8#}LBo_KnmPY7nJx0o+&L9gZ@ zXwt)U0wKhVvZAW?;)NEhp;y zbHLs2{XCK-v-L?1O`Pj3nftDI6n|-Z!ISt)haH`IKS!TN-g~lrl#bn9l&BL;{Xqu( ztruYW=+3F%b@aaCNxS07Z%-+nY-fGgiQ`Y4UW>kt-hn#dS@apW;q+n6?>+1U+$Z}e z8(2Sz+!gF(?9V(f^&+^HcO0VV_Wt+#?N9$tjy{3Bf0vzNY^b;P7j&2LYOq|zE_xU4 z6aF^*dikvR8@G_VCm$FLhq0R^a0~4eRgm{TXd~>8)-VD)J9Xb4q5DtW7oXmpdgz0J V$+GJcVNWT2b~Y^TAn(}!`F}PVX;%OM literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json new file mode 100644 index 00000000..ec3d49d7 --- /dev/null +++ b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_0.block.json @@ -0,0 +1,744 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZpZ0F3SUJBZ0lSQUt2R0EzTkkwQU1GUDVxRnZYOUNYbVV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkIvK2pNT3B2N1pRSS81WFJ1RktFUzRHdXJnMDVRZTRQNWF6dWJMZXZOUG1xVHJUME9hemJDSWI3WnlKSGcvWQphWlZMWFIxVFdMR1hoSUdUMktjYnNWeWpiVEJyTUE0R0ExVWREd0VCL3dRRUF3SUJwakFkQmdOVkhTVUVGakFVCkJnZ3JCZ0VGQlFjREFnWUlLd1lCQlFVSEF3RXdEd1lEVlIwVEFRSC9CQVV3QXdFQi96QXBCZ05WSFE0RUlnUWcKYTd0TFBEWldzeENydk9vZWtsQ3pHUGdsL2FyN2FRNU55eUIvNWN0QytOZ3dDZ1lJS29aSXpqMEVBd0lEUndBdwpSQUlnYnZTMmppTjlCMXJTSEJ1MXNuZURNdGg5NnNKaE5ZMk5COGtwZ2xEWnpCb0NJRnRuYnArNVRYb3FGYmwyCk4wcXpidTA4NXFRWGZBWGY3eXk0Vm9TSHIxQTYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLekNDQWRHZ0F3SUJBZ0lSQU5FdnZQQ1dnQjMyZHVZcjd6VHY5eUV3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGt3TkRBeE1EZ3hOREF3V2hjTk1qa3dNekk1TURneE5EQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFaUZySkJ2UmIKcjY5Z0pOb01lak1yc1Nza1VvNUJzdTd1YnFWbGx0VGg1VUg4K08wczhFMVU5N25lY3h2S2l1a2FUa2Z3TVpEawpSSkdoVTFNOVU4UjBucU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ2ZCbktjRmFERS9uYkxLRmlkbGZZZ0NOTWVZeFN6NEgvSDREWWltYXE0ZUF3Q2dZSUtvWkkKemowRUF3SURTQUF3UlFJaEFJckRaOVltdEM1UXhGSGVjUFU0TmFKcmxvWENOdk5DN04yM0UrNmlHTjRJQWlCdwpUTjhOZ3lDU0o1dVFJR3Q3RDltUDhUbVpwV0hmWk9Xa0VMUnBiMWRnaGc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "migration_context": "0", + "migration_state": "MIG_STATE_NONE", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V2_0": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-22T05:17:46Z", + "tls_cert_hash": null, + "tx_id": "d7921cec05f57cede225e40c40427ef50974637a60806026573552a75fd9ba28", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "d/z41CXAlLI8L8edDzDuPaUiSZF/h0Pn" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "KB6Mk7/+ZN/DDY9aJkD2J1tlmrj3HLeP3Ta1TaoPBKI=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/latest/raft/channel-artifacts/testchainid_1.block new file mode 100644 index 0000000000000000000000000000000000000000..9b6b0836b7b4f9eeac2d42e3d6e26bdd4140c3e7 GIT binary patch literal 25840 zcmeHw4YcD{eP?DSc^U5HW6*>qd5|znQlR4o+wym_X{v9@wq#3|KihMHEX%TGOR^=~ zvb+V-QbN*FHtk6%{i1~eEje4lHZ6r54%uu;OFy8cdm!DW*|u~yVWENcY)fe=Wv~2f zzxU?Ny!SFp2(X?xZ{9rV-m5F?{_pR9fBOCI1N8AD$mx&#;b*~vzj@?6KlF~z-SVE; zXS{!Zoe-ZN4$Bux1hF=fDuTO4(>yKZ)xpDmWKJ-uj`-(FsMw&ZPJ4)B; zwvgZ406((1-2v;J)zTN`erkh9V=C8N*h>t>zpc+6?m?TGe9-zaUJc?>S%gOlUQl1fGrbf zC0?&ay(UwJ=QAT-QaxI%lNC`UDKBBvONqY5&?BHS(|+C*CQTXBXfHA?$XJAjMG7PZ zzvBu#=EGw%-sr84@pNxW%;1f}o&p@J%UHi6^Ahh-TUX#HZ$Q?o(?P?`_)W9l;ibAq zWAm%Cloyrj)wnKM*-q0G20%rH2`@!F##?l6Dos>V>Z@kO=ZURuZub&z@Ho%l{*Wp0 z@eHO@3?PWb4<5y05e~ySobTqQRwQ4wEB*W=U7I#*Q8J#?D*2?6b_Nw$ZRtf#9i~-s zFcLt#pu0*|Fb0{3k)sO(qF6{Ls<~VapV*y(9U^eMksdIHEaQ0|iw94vMS2t-_Qc>( zvOp&>KKL+LiN~>an!*eW;|X_Okn_YIPvkI;ZzW@;j5HC(K3bcMl9XDv)8k&vK+7Or z4aI4vLS%`ss#|7($82VKTR3bAi>Me+i3EqajL&34Eh&y2Q_(WbSg{h;CRw4b>5?d^MQ<9aO%0L6ryU@QciaKy zqnZ-Py(1mD;dOH4fmdJqJ?U3Pe)q07dM|E#;3J>DFW-FCXOK@nas=E9zy53ky!7~y zRbXA)9J^ghb6pr*mZkOA!L<&qb#PrExM~l7@Uh~@Z~MT5v+);S|2OY?=;vPk@Kx4N zyo^I0diV(VmA4;(IQa8#KZ5+d1WsUsLBFdiqpocse=Wfi&)x#AEI4{JfUCc`W%Ir> z;8^hAA31}3`4!0jeZ}_4zd8`h$^n+OyW3cnn=n{R;361L7ZXEzQp*rEv%Ck()Y+xR zGDgN~ODv<9jNh11<3_F1Y1VMJQA!w1G%{sLOxY^K%M>bfKpw))c?x=LM-_Ov=LsY> z?ghUkNMH->12`TI8GK&XbxpZ zjuezxli-@EhM#5ia2+U(O1>sV9Q#UTDo9ZP zuImo2Q#3BBBo-t+ULD89G7G!tkpad_5g8NNFpiZycnlBEu)(|mF-~#1r~@T6$`{E- z)twT~q+n~kJ~3m8dOxfWByl`ne;KlwgxU!Z^J-DWOJJ$ly_@#Ny+q zYiT4u>SU5`wji{M+)Eu{ zMIMW6Mc9;Q>L^S*tBD9Nr9F0$@RE1~Z!pn8vxiS$#;i{B<~i9h-GhU(&MxwE0uxuc zI*GwyEb16#ldkBt!Wz&umm%~tUL98bPEMSSGKFE5m5T{1M)!xJF!O5;>*sADZV9+L zu?&{>tBw)RTVgmQ2o2CrCkAMuKMZ9mLo+7`Jmq?%J`arIR$z!Qa5Rj^yx_K4)K;oV z@EGR7U?KsGAOj~vkFzoTVuA%M)*xgFwkU~Q2g{mK(#V+kE^b9+LBxG8g=PBU|pOBQ6rtnbi!`VYGxN$RFp~Yg zFs#>Sj#=+FeHRT`wFcwG+8Rxurg9)u0d|2^7YkK@U0~HnF4hTSlE^R|Dv#SE!HyPC zFIIOntT&q#yF#j4bE;fOF6>U4;Ag<~o%#Axbbv1Hg)v1$^P~Ezjv&#zqvc>nH0m<|1Et@~H;Cp`Z4DzFA zkgsp?J@b=)dtfqMHqPODgi?A|mMLRob-E@lbB#XZq~m*%>2Jnrlshcnv!~#<8sF1B z_Z`NC_?|rl55@POZfKbFg{d|unZ;-bMaQ;VVS%QPh#wpXq zCUP^PMM)k{#0xN;Cwf?zz+z-LmNPs}OuD+4V-8HBmpSw|&iAx&E2q*5NrkOuK1X+3 z{dQd^1YWC8OS3o|X5(bNYbwLIhMhYS=POt+U&0o7JBrh0u~lQoBY|jFWsXSo2BB!a zS(DHnRn;?THAXpwOdc*_3j%|cBCV0?D3b}u=0ju2j>=*Ua!ojq6ToCQmZ{-X-gIP?Wv!oR5DooKKf_viL-50wT+$cidCtUfbgvWDiJLrc;jc znQ~f+Si^6S^SPLS*~|HG4%x`m%@L6hr!=dn#d2IwvQFQw5yC_uQUV&ILdh;8#5ou+ z9*~8!p!-BAn;456GfI&evzV66#-Pf!8-;3*%1eW0w54~Rf6gas_Urtlk#71Pmxgb7 zYngC9v}bbgz8Rd)9`u>A7v_BS6h0JGeG@sKJqSeY!};tfd||lS=6o={HPccaTPqQ8 zVjp&xa;sG}=x(-;l?tI^tr3HyqBB8dQS@j1SXH8GN}A{btVGbmX5E;%_^^%j!$qg8 z2z_HxACYkps~!kfmyYu>F-y{igOS3PlQYc75iPF=Lx^nqVM(euL)jP$1Jq9CJL)dD z+Qs=`qiMZbE}4lClcjBxC4T zov$`t(8O@X`~2NH;J#IOpLM|P|K|PMJK%P6KZjvh0-9u-VL3cq6x3VtGG`7&7oA(< zV7h2$jV1T9`S-`c+KavM{lwx(n}+ z3xyY~7D$1Y3>Ver6>wh|n@!C*up+$PITcyO?HpL`2f)q!#q~JL9VynRtBkZ3>|)na z?Uv>q*urh#gf@W`Uife~7y~a}_H%v_&T88SUV{d=-qr86HPu)9T38%wjxQ*t<_;89 zBegaZ2nU+0gZoN>Th47~b*J0y9N3*CxNiQTt?E+Kt~)yT^6(jLeN=R}4;e|Vb-0i0 zHQ=g%I)!<)J+NKvg56sT++gS}KjOt0lBXPb!D`E)mj>Up915g1=-Ylk%$5e4dSFdB zXqPot9|@_9lmjbf!1c?X%8p{WiW)pe+&@Hb?*uo^n!JiMj zb{rtP12m|6V6EH1jq_)*x=-0&{rAAiyN5Ahn`U>ks(py@w|KzI>232?a225plxDXN z$3G0!>kt6oEL1`7iXfLQOPx8h&6!`1Tz&jlz^gBw`OY%SX>V2LoU6fhmNfSb$ThGT zu>ASt(N#MMa9w^Gr#tEWn~+nm#;X`7iG1a{%}<=#(px@$3VGxd@;j$i=L3HJza2=y7fDFLYlWqrMXaPJJuN$;rBa;s z$E_xs$Y$WeE(fIw!%ojAK$QTA8TcU3e}IeCDK7ONV24hz%;VfrrOBGAW~*&qMi;B@pf*6hn#$YC&u4dK~#Zywo4mC zjDgh`G0szEy4S4s$0Bn$p=7`=uauH?itTY$pAPv}(yy@HLeI!MelF8$Wmu|KjYav! zj8M|?Qm)MkBePVF$`;7#@w6EZi{&a>C8~5`$WaWHcSa_iX-5oE>LvFl%>!B59;M_? zq2zw!KN$XCzwy5kO6CmR%1hCnkA_Ejk+LFOxTaWI7HcRVVuh+1-Ao!>G#74A1Z2&X zcD^dKyRK2|SJGm{8K^@#OlQYQu7I(5PT`_`ZfM0>*L#kn`JWsZ6Ve=5hRc|cFg`P8 zC8ln7CdF2~r4z$enJMj-r3JpUCV8oalKcD8Y$$SF8o%gBlNILPG!U56mQ(a|@}@D~ z+?xhpO9nQ&i}$91z?`<_O%pvTkmrhGj`Bux+uU}~C?_;Z^Xe zGA84?x`1#F--dG@$320-u+l^pa&#<}Nu)wlil0ACgxCb3~SbC=vndYJ24I16NT%fR)A_W{y_8bl^ zY&4bWC9#R(o5jA1bwQbJCC5Yxi?b0P$xge)Jm0G{1$l}!#!)DqRJlq>8>c27(HIg;ERi2bv1X&p)Mk~L zB}OMe8q}SV*H60k(J8+_5YB0}c7lXOVZF1;@3K+H#ck2zlTv z_}bOrI(sX7jl4#iD(0ZCy+*aolRuu?{L+C_NHx$}>$&9=A}S5H7@ugKptSo08CLYR zPC(Q+H#eQX?EU8DraN#;rfSgtIG0#g;xM`0;eUM&`Dqn8a|39dE1kcQ{1oPJeG76&uF$ zF4;-fD=17)OYNCj%uRY8Sj;gJoMSwW)+xO07kanL(1ZejB};x1jp?Zm(6bH~40 zkV5M#ZU&~%98*DCQe+GlyAuKJW<)if-K#tKc2A)f+dEv!6#4?&JM6K-?xtcuu)o6| zE`|%?b(^LOxK%IVY-en@8)2_KBxfC|E10#q8BeHD!XCMO4tTS!P8LQehStPl2b-mf za!4JNq;5%yz(brGvuwz46JBFU0^X1 zr?4)C^-wmG4EIp9H14z`Z7to7v1o*9s+}A;Duyv*+)I-+K?x5j0IR{+av1Ug?|fX;yn0=6^XH(E>UbA^~-}9lc5-8CT5aR3a!;`BOkI- zIXtHe(QMM=bWqR7$!shd?sAIB+muYtWOgVe8hDW^N8>VU$qrkxi(FFdU26PWM_jhZa8xKidWx#_uXL0*+OB%i*N;Q{a5PFG-wLE z`uIN{I|&P1aRdBk<+|Iv8C*3lC3j8D9*>Y~kjueQ)Lpgma&QW&D}oKqB)E~F)18Y; zT;%wwz~S^0XTh~|8BIm$ccHQ**xYF!jl@z~v0dhQ(ps$8=2wD~fz+#O=~!R4q1Ulv zA_#IEEH>^~-R*7Q#`%2&%A7@o(#RRBqp_nQC!z21>+sLDtKxSb0Vfyg3ar&~;BIkH zVbVuLaO3${>+efN5|P!ZT?_i%r*`E!^HZDGuM}~M>xH*$m78Y)2xxTM8Fj}djJRxEgu%6nNWJU{Ao^j(pGV9s4#H-tIu%i(IzD=nb`W@QvU0oCAM;`~>oj6T7Rw z^#puRxa|&KwXoIPS{{5jt?ODI43*StdGLIT2e6h0ujRqPULhAH58gbpYtFvzeAy%N zt59I~JN$+taq^{wwbemi+Ae9!$4zBVLA-+c7+ z#_YrIir9+$>t7wb@8O^N++#8C)H8qd_#58!^-n!=SMTQV(~E|F^;q)O&XZ?fdCTp8 ze%bf`l5$7Kd-qG<@Y#p*Pu_gfSN{8bU;fz9)1EMR?|-Be|4$$MrPlAhF8pWe8=X)6 zT>7hDf1RQJ{IgGte{j*zm*4Xy{u%T`5551jfBcVs@wC9-&i#jH9(esfy;kw=`>DTu z|L1Qzdb;|x-UDCwH~jp%AFwbpNFn|Cc5`t!H_@B@t( zKYINy|Hhd|<^S{eKRodZ_x#=Ml@F=c{m;oA@5TS+OGi)N^nJw>_k8&mkKKFYGojuS z=AVB4yKi~LhhP8cPyXfQ_Lpf*{{~5jb|_=&_TR-*5%;?;BwK z3lG-6@L>H556=G!58g!o>sxO9Ur*1T`s=4Z9{!cLWA_!l|Au>i>rr75myan|o_U7- z?Khr!@8*~8yubYh^UWXM{P0iE@yEaTlB1vb=pAs%@u~lG-6yU*_U@;W?>M18{ia|0 f;BWmy=HWX(`qNK+>iYVVrTTvbm%+a~Bl7YWJyTJ)Ju_v`c&5@xjFx98Q7_7Y;qXmLA|<{=NgIQtD2fyx z5=n_7SK}Z+FbT2vax|6@WNRH2#_oiWEo^11PEX+90WlUAVFXtNSs6IO823v zdv8})_dIZGaaE$uIXrxP|No!weEaCofq%n^S}+07e9Up-Yp0Dy_c2${r$@S{QmW@|LMISl>Z2t<;Cxjw5;+BPvRfFO{nCk)rS&P?Kw z)Q6ARH$q9GW2{i^9tnC7Tk2 zq;YsgXH*7ntXxxZi9-ln%iu8rDe(1S0I5myj^qHNlMY7IOi%V?ycq@p-l7zibZ3=T+!&)0@vcM;cPM$Z%k;27wybTU;p+)KvLNEX5 zL4@@Sh_E?(17YrdI9a8U(V92%9)@=fOvXL_q9 z$XLc5VN6lPjF_?YwYeg8(8^f*K`?Gk^?GKq8nigwRA5%{<(zU?HjTukvwfp*_!>(N zPDfNCC3D0Ej-9ZigAw{h&zF6vNV~&Lk5fl2yutVzNi6b7%;kefY=$CX?Lv=Zay|B% zgHS@MqBsLS)>@-2e^c#_H$h(%1v<$n=Kze+5f~B#j*Sa=c0e0_L>npKcm}~l0f-=v zAf=3taOX|H0

frN9woiC^NqpiX(+VBivAO%){~&pL$dxyWR%+e#~3>tRG{wV-27 zTewRwpzdMa?h;A*0Z)(7U30Hua?!Q~#A>w=P99KBy!Mu2I(B~hx9jBYA7x751j^M+*>!Rk~PsBwPN8?D~g35$) z0xamKK98FM2jArp=$nEF5YSJ(p_^I=M2!WdBZO{BpR;@Dsz1A{0?_Cmd=){>8d9s8 zO?N$|RbWOr@ssMN8t5S6|CB0p%%krqYU8G`EAEH@f8r%4)C`PW> zaVN3PSJmO|pb6ds{@|-hSH-!lEh{?3hYzAJfMhe8x!*=>SQRX`>o2B@6Vj`3F3cUw;v;XiR3_AbId*CT3 zd z9o{!9&noZ1&#yfDg%|Hve(B7OoO{&46^~L9F0kRZZ*=&u^8UHQ^LNf&n&5ppoJVnD z2N33uJrSImY#Z~(Pwmsw#QxclDMCw<=MNvj6rrzUivHmhQ}p*3CgX&g}>Z*ibjF@&?Gn474L#}5}He4sWck%lsY>`Osb|X@Ehz2^} zPUB9Y?z;KqV)y3=Wj}egD1Q^S$YtUlv6D>@x4TYHj0D>g;zUVSTGS$vZD(t4#=f7b z%a+Dr)nP5c=(^VJgtoQc_1*2tP*;mgm{BVr_t>RY7rGiI*TT)`WQ*PeFqdo*A5*jL zG)T#ov}ZWm8fi_@=*50CA;q0Yc0{y6SKBTtHhBn`45%U|IytHIT3d-{(+<@QMwlAR z);hPC4fPd0kk@8??kvA}wx}2QQ(-s5%sk_eoO(q&sGpZ)FMY@c^q$4Z!50Rs54kvx7^h&wg^x6Q(aSnR+a5B5y}a>Fx-r#E}d_y zLeDg64MI}JIzh^iE#f-FOdAtmtE_gmHi~PrCP|KT+>873ed2}fWKH1S3U1UWoBP1KfqT%b2cA{nB7UEN2_>&9_&y3N3eFEH13uAPFqbI=K z+OvO?!1CrUxOf~JIa_(yvy^TWNzLYDx1|_%weVK+5$mQ?7c20U zxAaGRbJ-RUUFoiwhOKA%E}9G!0<>92Ek+7!4*l+a)rI=6Mp$#v2ZQOi$Nj{GLNScD z-m}fg*v@of%6e;5&$pw+eziipY?wwv(hGU)b}(J;yq3C$qs8e<`5@be=}yIs$kaL( zX)oD%p7du?y)_}^QJ}7Q#@rP|9WG_(kkhmp2&Pu&YYUJBruEY*n{W-JgHy2>b)v=4 z=|Bxx6h6TH{F4V6)_$qQo0BJ@gTzKVHS>SPqXBr5^8e z3;pxAX5cRcd73f!LAS@zSzU#f&~)Um zw=@HB4P_TQLBcZX*m*!_GY{$!eKVA9uDYQPh*_Dszm=fm5X_28BcZFfN;uZl9p{Pb zyDtz#CXzTVcgMRV8@XN#im})nhbb1%`&ix)M-H{X_c^9!tvVL>cDX>O0@qP!)z?{) zThHdMs$`AU3RxRDi>z|6#rV0@##y2>w4+)rQwn@|bh{XVFEAR)N=TxKXH%fc;Xl?T?M*F;jTlHJCPSOeHhZ_az5@5Q^qld;mqtey9leO)e+uCoo0V%dHWkL z6*#zE@K|=uOtBEq#7c*!Y+H}mVkWjQN)<*lCce`LM*Lh(;Hx?^If{IS7X)Cq8zd-6W zT@P%C@1=zleH&{c?eS=nxwUq6jbxzO3RGl*m>U6#?>J`1bnVdfDb9eK296=70{bf2 z9UGJ)C-^kxpeIQObuURKEG}sbkwLWG6t}AQ=zvC9IHFO7xP!u0fjkJI=YVn~mmn!_ zfY#hRDtgs%wYeBAMkz5{+5BFQH%fJ9@yWC{FbBRt%ie8s4)8Pb@OBYK>#W^LaU7eZ zd`&RxddBO${nF9Hy3W^UZr~7_-%=dj8FM|)^z{W$G~1sp=3x_?bcnd8VyZb~sRkQ2 zLnvbmb`6!j4|%iC!TUS~gU2%Qu(uImH+q*FyNEl_1%SS<(6+FWE2E$N-hmIw4%99*$X#> zgTb`7?}A@L;PEiDedIvzC+4!smN*!o6lAJ15J)z)+P z{lNi#0N%HEP>zN?ZkF)kj?Ed@hjKZ4{zI~ zw-g3 z&D13@JC2@e{A$q6Nqc&s5G?iTV6-{20I-p z>-kC|d8h(4>;#I6334M68ETuP`pq+KG0*1E$vygry|$oR~YM zxfLJ!Of?VN`IvKuD{m0z{qB6;<>-mts0*`#G_a=9UvOd?C|X?&LCps5;n_QB8My2Jye-IP$!Le*kjzz|W?v|6;X|&vp=FPc7Zsr=R+|Gh5H-$~=ZRh3Q zZ=EBUQ+=SYAv?{S*l8c!F39lsZK~5Q71Xkql`cN}Hr0t_2j^`nS<2`#8@y!Mv-Fnp zfTbb~fp89f6YjLhrxe`Me}WsOF|voZsg#{6_L)Yf+v-&5j<6f2Kx|J2QjATtyhFg( zD95T@w#fzkd6C3TX)!Q#yWVgROy72prL;zdp%eE~0;!wKY(Gs3Ek3gBgn(lQ3jPXUjDQ~)_N-qzR=GALpt0wPCKEGs zch$ysMjnj(1b2bP&D&eDgEto}GvB3cI>Z`O9=8NMI+w~QH_h;xgF~xB@)G594x!e2 zBDz}U3lK0IW@^!T(uiV;+qQ;hofPR&!0 zTKTl{J$RyDyKy4OSlm3(rGDhacfkjQky=aD4eV%}R=!^OD)AkESU6zZgxlIT>Q;P)Fj&6|gAe)ppC=54A@H$A52xbhDN1L`8a?bdpH2Ae z6s@0w^*df1!u+zlhT6(iPF4k)#P~^lF=%K?bFJ6IBI_h_zE4fK{onJnNT-AV@TQk* zJA5Xi@~Gc+r{vm^^6HKvGiyCuW=RUIBvRp&e0Q1MIkNFjr-H8o{>Fi-qg2%#QkEygy=LM0gg96gN;)c4o)Gu;5O>r6-7W+7DE~JpBX#FY0l`R}XUFJVu5IC( zdMBc8SF)PD%bcj6^+=sr9po@?Gg7Z*>`@N`7ZWm+xX8X0jPuI^Z?_pADC@W^+(z(K zVj3~bkO-#=!7aDZVuoak4OJ{5qq@poSBn3GwoJ|DTv0h#FXxwv@WlZx|Gtk>pE^8jKIqxZ&y+m zfP2tmlnxRugZWHa31lCCRYd-}fE=7eGPESQ0!flL0*H(9T#mE6zPai#G6QGL<5?p^ z<13WwwviQzD%<6vwy?29gF|byX)XIyIzn)7yTYi6XdoM!1RS~$ho%?r_Y4xnOan28 zQFSy!^sq0?g3*{6I8oISx~sKtUnKwXVgL7pxVN@8enQ+6;%@rC+r=&3%>VHl6p!4h z!!ME;sbOucwOZ%GMf$>%|2yibZ!lG_LE}ZT)MNagu(h}xswb`f5^K_`*PG`;fHcDC zbkvHf9j3O8qHdKNWElz;35A8@-8`11o;cELIKJ(9#@=2Hd#kz9;ohuJHefaEuz55(C_}aJN zpX-`cZ%gFxDfq@go-#Ik7wVEqS=T+HiIdjiy3HN&#YqP7;s@Z{hjA$=3Mz#!Zs;g! zytUG8Y(sh7d(Zv?{`RzWpkK`nNi@R_*-Lt+o5@pKgUU aho4@2^DLITIv;W@`2O-s6t$e5&;JL*1d=BJ literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/latest/raft/configtx.yaml b/hyperledger_fabric/latest/raft/configtx.yaml index d298f95c..6365b436 100644 --- a/hyperledger_fabric/latest/raft/configtx.yaml +++ b/hyperledger_fabric/latest/raft/configtx.yaml @@ -242,7 +242,8 @@ Capabilities: # prior releases. # Prior to enabling V1.3 channel capabilities, ensure that all # orderers and peers on a channel are at v1.3.0 or later. - V1_3: true + V2_0: true + V1_3: false # Orderer capabilities apply only to the orderers, and may be safely # used with prior release peers. @@ -253,7 +254,8 @@ Capabilities: # level, but which would be incompatible with orderers from prior releases. # Prior to enabling V1.1 orderer capabilities, ensure that all # orderers on a channel are at v1.1.0 or later. - V1_1: true + V2_0: true + V1_1: false # Application capabilities apply only to the peer network, and may be safely # used with prior release orderers. diff --git a/hyperledger_fabric/latest/raft/logs/dev_all.log b/hyperledger_fabric/latest/raft/logs/dev_all.log index 44de5577..6f62a3c7 100644 --- a/hyperledger_fabric/latest/raft/logs/dev_all.log +++ b/hyperledger_fabric/latest/raft/logs/dev_all.log @@ -1,2156 +1,38148 @@ -Attaching to peer1.org1.example.com, peer1.org2.example.com, peer0.org1.example.com, peer0.org2.example.com, orderer1.example.com, orderer0.example.com, kafka1, kafka2, kafka0, kafka3, zookeeper2, zookeeper1, fabric-cli, zookeeper0 -peer1.org1.example.com | [001 02-28 03:15:37.14 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: -orderer1.example.com | 2019-02-28 03:15:33.083 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -orderer1.example.com | [002 02-28 03:15:33.25 UTC] [%{longpkg}] %{callpath} -> INFO Orderer config values: -orderer1.example.com | General.LedgerType = "file" -orderer1.example.com | General.ListenAddress = "0.0.0.0" -orderer1.example.com | General.ListenPort = 7050 -peer1.org1.example.com | Version: 1.4.0 -peer1.org1.example.com | Commit SHA: development build -peer1.org1.example.com | Go version: go1.11.5 -orderer1.example.com | General.TLS.Enabled = true -orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" -orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -orderer1.example.com | General.TLS.ClientAuthRequired = false -orderer1.example.com | General.TLS.ClientRootCAs = [] -orderer1.example.com | General.Cluster.ListenAddress = "" -orderer1.example.com | General.Cluster.ListenPort = 0 -orderer1.example.com | General.Cluster.ServerCertificate = "" -orderer1.example.com | General.Cluster.ServerPrivateKey = "" -orderer1.example.com | General.Cluster.ClientCertificate = "" -orderer1.example.com | General.Cluster.ClientPrivateKey = "" -orderer1.example.com | General.Cluster.RootCAs = [/etc/hyperledger/fabric/tls/ca.crt] -orderer1.example.com | General.Cluster.DialTimeout = 5s -orderer1.example.com | General.Cluster.RPCTimeout = 7s -orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 -orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s -orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s -orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s -orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 -orderer1.example.com | General.Cluster.SendBufferSize = 10 -orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s -orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s -orderer1.example.com | General.Keepalive.ServerTimeout = 20s -orderer1.example.com | General.GenesisMethod = "file" -orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" -orderer1.example.com | General.SystemChannel = "test-system-channel-name" -orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" -peer1.org1.example.com | OS/Arch: linux/amd64 -orderer1.example.com | General.Profile.Enabled = false -orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" -peer1.org1.example.com | Chaincode: -orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" -peer1.org1.example.com | Base Docker Namespace: hyperledger -orderer1.example.com | General.LocalMSPID = "OrdererMSP" -peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric -peer1.org2.example.com | [001 02-28 03:15:37.27 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: -orderer1.example.com | General.BCCSP.ProviderName = "SW" -peer0.org1.example.com | [001 02-28 03:15:36.99 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: -peer1.org1.example.com | Docker Namespace: hyperledger -peer1.org2.example.com | Version: 1.4.0 -orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 -peer0.org1.example.com | Version: 1.4.0 -peer1.org1.example.com | [002 02-28 03:15:37.14 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -peer1.org2.example.com | Commit SHA: development build -orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +Attaching to peer0.org2.example.com, peer1.org2.example.com, peer0.org1.example.com, peer1.org1.example.com, fabric-cli, orderer0.example.com, orderer1.example.com, orderer2.example.com +peer0.org2.example.com | "2019-04-22 06:16:31.826 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 2.0.0 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.11.5 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-04-22 06:16:31.826 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.8:7051" +peer0.org2.example.com | "2019-04-22 06:16:31.826 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-04-22 06:16:31.835 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org2.example.com | "2019-04-22 06:16:31.835 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org2.example.com | "2019-04-22 06:16:31.915 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org2.example.com | "2019-04-22 06:16:31.979 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org2.example.com | "2019-04-22 06:16:31.980 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org2.example.com | "2019-04-22 06:16:31.997 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org2.example.com | "2019-04-22 06:16:32.007 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-04-22 06:16:32.007 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-04-22 06:16:32.024 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-04-22 06:16:32.024 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-04-22 06:16:32.025 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-04-22 06:16:32.026 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org2.example.com | "2019-04-22 06:16:32.040 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:16:32.052 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-04-22 06:16:32.054 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-04-22 06:16:32.060 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:16:32.065 UTC [cscc] Init -> INFO 014 Init CSCC" +peer0.org2.example.com | "2019-04-22 06:16:32.067 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:16:32.070 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org2.example.com | "2019-04-22 06:16:32.072 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-04-22 06:16:32.075 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:16:32.076 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org2.example.com | "2019-04-22 06:16:32.078 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-04-22 06:16:32.078 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org2.example.com | "2019-04-22 06:16:32.079 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:16:32.079 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:16:40.891 UTC [endorser] callChaincode -> INFO 01e [][21141e32] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:30.436 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +peer0.org2.example.com | "2019-04-22 06:16:40.898 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:16:30.436 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.SW" +peer0.org2.example.com | "2019-04-22 06:16:40.902 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer0.org1.example.com | "2019-04-22 06:16:30.436 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-04-22 06:16:30.436 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +peer0.org2.example.com | "2019-04-22 06:16:40.924 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 14ms (state_validation=1ms block_commit=7ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:16:30.436 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: 256" +peer0.org2.example.com | "2019-04-22 06:16:40.927 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:16:40.936 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:16:30.437 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Security setting to int 256" +peer0.org2.example.com | "2019-04-22 06:16:40.936 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:16:30.437 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +peer0.org1.example.com | "2019-04-22 06:16:30.439 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +peer0.org2.example.com | "2019-04-22 06:16:40.936 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:16:30.439 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +peer0.org2.example.com | "2019-04-22 06:16:40.968 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-04-22 06:16:40.969 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:30.439 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for peer.BCCSP.PKCS11" +peer0.org2.example.com | "2019-04-22 06:16:40.970 UTC [cscc] Init -> INFO 028 Init CSCC" +peer0.org1.example.com | "2019-04-22 06:16:30.439 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-04-22 06:16:40.970 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:30.440 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for peer.BCCSP.PKCS11.Label setting to " +peer0.org2.example.com | "2019-04-22 06:16:40.971 UTC [qscc] Init -> INFO 02a Init QSCC" +peer0.org1.example.com | "2019-04-22 06:16:30.440 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-04-22 06:16:30.440 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Pin setting to " +peer0.org2.example.com | "2019-04-22 06:16:40.971 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:30.441 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-04-22 06:16:40.971 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:16:40.972 UTC [endorser] callChaincode -> INFO 02d [][21141e32] Exit chaincode: name:"cscc" (81ms)" +peer0.org1.example.com | "2019-04-22 06:16:30.441 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Hash setting to " +peer0.org2.example.com | "2019-04-22 06:16:40.973 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53446 grpc.code=OK grpc.call_duration=82.8888ms +peer0.org1.example.com | "2019-04-22 06:16:30.441 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-04-22 06:16:41.901 UTC [endorser] callChaincode -> INFO 02f [][6d394459] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:30.442 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Security setting to " +peer0.org2.example.com | "2019-04-22 06:16:41.902 UTC [endorser] callChaincode -> INFO 030 [][6d394459] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:16:30.442 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +peer0.org2.example.com | "2019-04-22 06:16:41.903 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53454 grpc.code=OK grpc.call_duration=2.0518ms +peer0.org1.example.com | "2019-04-22 06:16:30.442 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-04-22 06:16:42.808 UTC [endorser] callChaincode -> INFO 032 [][02065291] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:16:30.442 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +peer0.org2.example.com | "2019-04-22 06:16:42.810 UTC [endorser] callChaincode -> INFO 033 [][02065291] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:16:30.444 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " +peer0.org2.example.com | "2019-04-22 06:16:42.810 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53462 grpc.code=OK grpc.call_duration=3.2854ms +peer0.org2.example.com | "2019-04-22 06:16:46.693 UTC [comm.grpc.server] 1 -> INFO 035 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.691Z grpc.peer_address=192.168.224.5:43526 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=129.4µs +peer0.org1.example.com | "2019-04-22 06:16:30.444 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.Library setting to " +peer0.org2.example.com | "2019-04-22 06:16:46.731 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:56.706Z grpc.peer_address=192.168.224.5:43526 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.261ms +peer0.org2.example.com | "2019-04-22 06:16:46.744 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.744Z grpc.peer_address=192.168.224.5:43528 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=139.2µs +peer0.org1.example.com | "2019-04-22 06:16:30.445 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org2.example.com | "2019-04-22 06:16:46.853 UTC [comm.grpc.server] 1 -> INFO 038 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.852Z grpc.peer_address=192.168.224.6:57130 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.5µs +peer0.org1.example.com | "2019-04-22 06:16:30.445 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.Default setting to string SW" +peer0.org2.example.com | "2019-04-22 06:16:46.878 UTC [comm.grpc.server] 1 -> INFO 039 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:56.855Z grpc.peer_address=192.168.224.6:57130 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.2421ms +peer0.org1.example.com | "2019-04-22 06:16:30.445 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[SW:map[Hash:SHA2 Security:256 FileKeyStore:map[KeyStore:]] PKCS11:map[FileKeyStore:map[KeyStore:] Library: Label: Pin: Hash: Security:] Default:SW]]" +peer0.org2.example.com | "2019-04-22 06:16:46.889 UTC [comm.grpc.server] 1 -> INFO 03a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.888Z grpc.peer_address=192.168.224.6:57132 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.6µs +peer0.org1.example.com | "2019-04-22 06:16:30.449 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +peer0.org2.example.com | "2019-04-22 06:16:46.971 UTC [gossip.election] beLeader -> INFO 03b 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org1.example.com | "2019-04-22 06:16:30.449 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +peer0.org2.example.com | "2019-04-22 06:16:46.972 UTC [gossip.service] func1 -> INFO 03c Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:30.449 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +peer0.org2.example.com | "2019-04-22 06:16:47.016 UTC [gossip.privdata] StoreBlock -> INFO 03d [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-04-22 06:16:30.456 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +peer0.org2.example.com | "2019-04-22 06:16:47.038 UTC [gossip.gossip] JoinChan -> INFO 03e Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:16:30.461 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +peer0.org2.example.com | "2019-04-22 06:16:47.038 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:16:30.466 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +peer0.org2.example.com | "2019-04-22 06:16:47.039 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:16:30.468 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +peer0.org2.example.com | "2019-04-22 06:16:47.072 UTC [comm.grpc.server] 1 -> INFO 041 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:57132 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=179.8826ms +peer0.org1.example.com | "2019-04-22 06:16:30.476 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +peer0.org2.example.com | "2019-04-22 06:16:47.074 UTC [committer.txvalidator] Validate -> INFO 042 [businesschannel] Validated block [1] in 57ms" +peer0.org1.example.com | "2019-04-22 06:16:30.489 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +peer0.org1.example.com | "2019-04-22 06:16:30.490 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-04-22 06:16:30.490 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +peer0.org2.example.com | "2019-04-22 06:16:47.116 UTC [kvledger] CommitWithPvtData -> INFO 043 [businesschannel] Committed block [1] with 1 transaction(s) in 41ms (state_validation=1ms block_commit=31ms state_commit=5ms)" +peer0.org1.example.com | "2019-04-22 06:16:30.496 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +peer0.org2.example.com | "2019-04-22 06:16:47.117 UTC [gossip.privdata] StoreBlock -> INFO 044 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-04-22 06:16:30.499 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +peer0.org2.example.com | "2019-04-22 06:16:47.126 UTC [comm.grpc.server] 1 -> INFO 045 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.125Z grpc.peer_address=192.168.224.6:57142 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=156.7µs +peer0.org1.example.com | "2019-04-22 06:16:30.500 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +peer0.org2.example.com | "2019-04-22 06:16:47.153 UTC [gossip.gossip] JoinChan -> INFO 046 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:16:30.500 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +peer0.org2.example.com | "2019-04-22 06:16:47.154 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:16:30.501 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +peer0.org2.example.com | "2019-04-22 06:16:47.154 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:16:30.505 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +peer0.org2.example.com | "2019-04-22 06:16:47.154 UTC [gossip.gossip] learnAnchorPeers -> INFO 049 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:16:30.516 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +peer0.org2.example.com | "2019-04-22 06:16:47.205 UTC [committer.txvalidator] Validate -> INFO 04a [businesschannel] Validated block [2] in 88ms" +peer0.org1.example.com | "2019-04-22 06:16:30.516 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +peer0.org2.example.com | "2019-04-22 06:16:47.245 UTC [kvledger] CommitWithPvtData -> INFO 04b [businesschannel] Committed block [2] with 1 transaction(s) in 38ms (state_validation=3ms block_commit=22ms state_commit=8ms)" +peer0.org1.example.com | "2019-04-22 06:16:30.517 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +peer0.org2.example.com | "2019-04-22 06:16:47.256 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:57142 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=125.927ms +peer0.org1.example.com | "2019-04-22 06:16:30.517 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +peer0.org2.example.com | "2019-04-22 06:16:47.376 UTC [comm.grpc.server] 1 -> INFO 04d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.375Z grpc.peer_address=192.168.224.7:50250 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=197µs +peer0.org1.example.com | "2019-04-22 06:16:30.517 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | "2019-04-22 06:16:47.390 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.382Z grpc.peer_address=192.168.224.7:50250 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.951ms +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | "2019-04-22 06:16:47.399 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.398Z grpc.peer_address=192.168.224.7:50254 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.1µs +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | "2019-04-22 06:16:50.937 UTC [gossip.channel] reportMembershipChanges -> INFO 050 Membership view has changed. peers went online: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]]" +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | "2019-04-22 06:16:50.975 UTC [endorser] callChaincode -> INFO 051 [][fe01b50e] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org2.example.com | "2019-04-22 06:16:50.976 UTC [endorser] callChaincode -> INFO 052 [][fe01b50e] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | "2019-04-22 06:16:50.977 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53524 grpc.code=OK grpc.call_duration=2.7512ms +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org2.example.com | "2019-04-22 06:16:54.551 UTC [gossip.privdata] StoreBlock -> INFO 054 [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org2.example.com | "2019-04-22 06:16:54.597 UTC [committer.txvalidator] Validate -> INFO 055 [businesschannel] Validated block [3] in 45ms" +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org2.example.com | "2019-04-22 06:16:54.607 UTC [confighistory] HandleStateUpdates -> ERRO 056 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0039b50e0)}" +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org2.example.com | "2019-04-22 06:16:54.636 UTC [kvledger] CommitWithPvtData -> INFO 057 [businesschannel] Committed block [3] with 1 transaction(s) in 30ms (state_validation=1ms block_commit=19ms state_commit=4ms)" +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org2.example.com | "2019-04-22 06:16:54.861 UTC [endorser] callChaincode -> INFO 058 [][46a38592] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:16:54.862 UTC [endorser] callChaincode -> INFO 059 [][46a38592] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org2.example.com | "2019-04-22 06:16:54.863 UTC [comm.grpc.server] 1 -> INFO 05a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53542 grpc.code=OK grpc.call_duration=2.2548ms +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org2.example.com | "2019-04-22 06:16:55.063 UTC [endorser] callChaincode -> INFO 05b [][b42b7a29] Entry chaincode: name:"cscc" " +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | "2019-04-22 06:16:55.065 UTC [endorser] callChaincode -> INFO 05c [][b42b7a29] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:16:30.517 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | "2019-04-22 06:16:55.065 UTC [comm.grpc.server] 1 -> INFO 05d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53546 grpc.code=OK grpc.call_duration=2.8738ms +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | "2019-04-22 06:16:55.088 UTC [endorser] callChaincode -> INFO 05e [businesschannel][5719277d] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | "2019-04-22 06:16:55.092 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 05f successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | "2019-04-22 06:16:55.092 UTC [endorser] callChaincode -> INFO 060 [businesschannel][5719277d] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org2.example.com | "2019-04-22 06:16:55.099 UTC [comm.grpc.server] 1 -> INFO 061 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53546 grpc.code=OK grpc.call_duration=12.6668ms +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | "2019-04-22 06:16:57.157 UTC [gossip.privdata] StoreBlock -> INFO 062 [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org2.example.com | "2019-04-22 06:16:57.178 UTC [committer.txvalidator] Validate -> INFO 063 [businesschannel] Validated block [4] in 18ms" +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org2.example.com | "2019-04-22 06:16:57.194 UTC [confighistory] HandleStateUpdates -> ERRO 064 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003e19740)}" +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org2.example.com | "2019-04-22 06:16:57.237 UTC [kvledger] CommitWithPvtData -> INFO 065 [businesschannel] Committed block [4] with 1 transaction(s) in 49ms (state_validation=9ms block_commit=29ms state_commit=6ms)" +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org2.example.com | "2019-04-22 06:16:57.266 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:17:25.101Z grpc.peer_address=192.168.224.9:53548 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1638874s +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org2.example.com | "2019-04-22 06:16:57.919 UTC [endorser] callChaincode -> INFO 067 [businesschannel][ef7a73c4] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org2.example.com | "2019-04-22 06:16:57.923 UTC [lifecycle] QueryApprovalStatus -> INFO 068 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org2.example.com | "2019-04-22 06:16:57.923 UTC [endorser] callChaincode -> INFO 069 [businesschannel][ef7a73c4] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | "2019-04-22 06:16:57.924 UTC [comm.grpc.server] 1 -> INFO 06a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53564 grpc.code=OK grpc.call_duration=5.7054ms +peer0.org1.example.com | "2019-04-22 06:16:30.518 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | "2019-04-22 06:16:58.634 UTC [endorser] callChaincode -> INFO 06b [businesschannel][7771236d] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | "2019-04-22 06:16:58.639 UTC [lifecycle] QueryApprovalStatus -> INFO 06c successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | "2019-04-22 06:16:58.640 UTC [lifecycle] CommitChaincodeDefinition -> INFO 06d successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | "2019-04-22 06:16:58.640 UTC [endorser] callChaincode -> INFO 06e [businesschannel][7771236d] Exit chaincode: name:"_lifecycle" (6ms)" +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org2.example.com | "2019-04-22 06:16:58.644 UTC [comm.grpc.server] 1 -> INFO 06f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53576 grpc.code=OK grpc.call_duration=11.3049ms +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | "2019-04-22 06:17:00.955 UTC [gossip.privdata] StoreBlock -> INFO 070 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-04-22 06:17:00.978 UTC [committer.txvalidator] Validate -> INFO 071 [businesschannel] Validated block [5] in 22ms" +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org2.example.com | "2019-04-22 06:17:01.019 UTC [lifecycle] update -> INFO 072 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org2.example.com | "2019-04-22 06:17:01.021 UTC [lifecycle] update -> INFO 073 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org2.example.com | "2019-04-22 06:17:01.021 UTC [cceventmgmt] HandleStateUpdates -> INFO 074 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-04-22 06:17:01.022 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 075 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | "2019-04-22 06:17:01.022 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 076 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org2.example.com | "2019-04-22 06:17:01.052 UTC [kvledger] CommitWithPvtData -> INFO 077 [businesschannel] Committed block [5] with 1 transaction(s) in 55ms (state_validation=31ms block_commit=14ms state_commit=6ms)" +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org2.example.com | "2019-04-22 06:17:01.073 UTC [comm.grpc.server] 1 -> INFO 078 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:17:28.648Z grpc.peer_address=192.168.224.9:53578 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.4219588s +peer0.org2.example.com | "2019-04-22 06:17:01.870 UTC [endorser] callChaincode -> INFO 079 [businesschannel][82cdfca9] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:30.531 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +peer0.org1.example.com | "2019-04-22 06:16:30.535 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:30.535 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +peer0.org1.example.com | "2019-04-22 06:16:30.545 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:30.546 UTC [nodeCmd] serve -> INFO 037 Starting peer: +peer0.org1.example.com | Version: 2.0.0 peer0.org1.example.com | Commit SHA: development build -peer1.org1.example.com | [003 02-28 03:15:37.14 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -peer1.org2.example.com | Go version: go1.11.5 peer0.org1.example.com | Go version: go1.11.5 -peer1.org1.example.com | [004 02-28 03:15:37.29 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false -peer1.org2.example.com | OS/Arch: linux/amd64 -peer1.org1.example.com | [005 02-28 03:15:37.32 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" peer0.org1.example.com | OS/Arch: linux/amd64 -peer1.org2.example.com | Chaincode: -peer1.org1.example.com | [006 02-28 03:15:37.32 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.15:7051 -orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = peer0.org1.example.com | Chaincode: -peer1.org2.example.com | Base Docker Namespace: hyperledger -peer1.org1.example.com | [007 02-28 03:15:37.32 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 -orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = peer0.org1.example.com | Base Docker Namespace: hyperledger -peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric -peer1.org1.example.com | [008 02-28 03:15:37.32 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.15:7051 -orderer1.example.com | General.BCCSP.PluginOpts = peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric -peer1.org2.example.com | Docker Namespace: hyperledger -peer1.org1.example.com | [009 02-28 03:15:37.32 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 -orderer1.example.com | General.Authentication.TimeWindow = 15m0s -peer0.org1.example.com | Docker Namespace: hyperledger -peer1.org2.example.com | [002 02-28 03:15:37.27 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -peer1.org1.example.com | [00a 02-28 03:15:37.33 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -peer0.org1.example.com | [002 02-28 03:15:36.99 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -peer1.org2.example.com | [003 02-28 03:15:37.27 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" -peer1.org1.example.com | [00b 02-28 03:15:37.34 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com -peer1.org2.example.com | [004 02-28 03:15:37.51 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -peer0.org1.example.com | [003 02-28 03:15:36.99 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" -peer1.org1.example.com | [00c 02-28 03:15:37.34 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org1.example.com:7052 -peer1.org2.example.com | [005 02-28 03:15:37.57 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -peer0.org1.example.com | [004 02-28 03:15:37.22 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -orderer1.example.com | RAMLedger.HistorySize = 1000 -peer1.org1.example.com | [00d 02-28 03:15:37.36 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -peer0.org1.example.com | [005 02-28 03:15:37.36 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -orderer1.example.com | Kafka.Retry.ShortInterval = 1s -peer1.org1.example.com | [00e 02-28 03:15:37.36 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -peer0.org1.example.com | [006 02-28 03:15:37.37 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.13:7051 -orderer1.example.com | Kafka.Retry.ShortTotal = 30s -peer1.org1.example.com | [00f 02-28 03:15:37.36 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -peer1.org2.example.com | [006 02-28 03:15:37.58 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.14:7051 -peer0.org1.example.com | [007 02-28 03:15:37.37 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -orderer1.example.com | Kafka.Retry.LongInterval = 5m0s -peer1.org1.example.com | [010 02-28 03:15:37.36 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -peer1.org2.example.com | [007 02-28 03:15:37.58 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 -orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s -peer1.org1.example.com | [011 02-28 03:15:37.37 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051] -peer0.org1.example.com | [008 02-28 03:15:37.38 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.13:7051 -peer1.org2.example.com | [008 02-28 03:15:37.58 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.14:7051 -orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s -peer1.org1.example.com | [012 02-28 03:15:37.40 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: ebda318a4e484fcb0c5c762138cdb64773221bd0b0c88909e40b57ad8cb726c6, Metadata: -peer0.org1.example.com | [009 02-28 03:15:37.38 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -peer1.org2.example.com | [009 02-28 03:15:37.58 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 -orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s -peer1.org1.example.com | [013 02-28 03:15:37.40 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org1.example.com:7051 started -peer0.org1.example.com | [00a 02-28 03:15:37.40 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -peer1.org2.example.com | [00a 02-28 03:15:37.61 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s -peer1.org1.example.com | [014 02-28 03:15:37.41 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer0.org1.example.com | [00b 02-28 03:15:37.42 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com -peer1.org2.example.com | [00b 02-28 03:15:37.63 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com -orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 -peer1.org1.example.com | [015 02-28 03:15:37.42 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer0.org1.example.com | [00c 02-28 03:15:37.42 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 -peer1.org2.example.com | [00c 02-28 03:15:37.63 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org2.example.com:7052 -orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms -peer1.org1.example.com | [016 02-28 03:15:37.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer0.org1.example.com | [00d 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -peer1.org2.example.com | [00d 02-28 03:15:37.65 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 -peer1.org1.example.com | [017 02-28 03:15:37.45 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org1.example.com | [00e 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -peer1.org2.example.com | [00e 02-28 03:15:37.66 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms -peer1.org1.example.com | [018 02-28 03:15:37.45 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org1.example.com | [00f 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -peer1.org2.example.com | [00f 02-28 03:15:37.66 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s -peer1.org1.example.com | [019 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org1.example.com | [010 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -peer1.org2.example.com | [010 02-28 03:15:37.66 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -orderer1.example.com | Kafka.Verbose = true -peer0.org1.example.com | [011 02-28 03:15:37.48 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] -peer1.org2.example.com | [011 02-28 03:15:37.68 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051] -orderer1.example.com | Kafka.Version = 0.10.2.0 -peer1.org1.example.com | [01a 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -peer0.org1.example.com | [012 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9, Metadata: -orderer1.example.com | Kafka.TLS.Enabled = false -peer1.org2.example.com | [012 02-28 03:15:37.69 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 563a66c461a1e7be99c7e7b44a172f5dd83b0757e7951f8eb96202f9994a664b, Metadata: -peer0.org1.example.com | [013 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started -orderer1.example.com | Kafka.TLS.PrivateKey = "" -peer1.org2.example.com | [013 02-28 03:15:37.69 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org2.example.com:7051 started -peer1.org1.example.com | [01b 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -peer0.org1.example.com | [014 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -orderer1.example.com | Kafka.TLS.Certificate = "" -peer1.org2.example.com | [014 02-28 03:15:37.70 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org1.example.com | [01c 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -peer0.org1.example.com | [015 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -orderer1.example.com | Kafka.TLS.RootCAs = [] -peer1.org2.example.com | [015 02-28 03:15:37.71 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org1.example.com | [01d 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] -peer0.org1.example.com | [016 02-28 03:15:37.51 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org2.example.com | [016 02-28 03:15:37.71 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org1.example.com | [01e 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] -orderer1.example.com | Kafka.TLS.ClientAuthRequired = false -peer0.org1.example.com | [017 02-28 03:15:37.51 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer1.org2.example.com | [017 02-28 03:15:37.71 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer1.org1.example.com | [01f 02-28 03:16:12.87 UTC] [%{longpkg}] %{callpath} -> INFO [][7f72c830] Entry chaincode: name:"cscc" -orderer1.example.com | Kafka.TLS.ClientRootCAs = [] -peer0.org1.example.com | [018 02-28 03:15:37.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer1.org2.example.com | [018 02-28 03:15:37.71 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer1.org1.example.com | [020 02-28 03:16:12.89 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -orderer1.example.com | Kafka.SASLPlain.Enabled = false -peer0.org1.example.com | [019 02-28 03:15:37.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer1.org2.example.com | [019 02-28 03:15:37.72 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer1.org1.example.com | [021 02-28 03:16:12.90 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -orderer1.example.com | Kafka.SASLPlain.User = "" -peer0.org1.example.com | [01a 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -peer1.org2.example.com | [01a 02-28 03:15:37.72 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -peer1.org1.example.com | [022 02-28 03:16:12.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 20ms (state_validation=1ms block_commit=11ms state_commit=5ms) -orderer1.example.com | Kafka.SASLPlain.Password = "" -peer0.org1.example.com | [01b 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -peer1.org2.example.com | [01b 02-28 03:15:37.72 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -peer1.org1.example.com | [023 02-28 03:16:12.93 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 -peer0.org1.example.com | [01c 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -peer1.org2.example.com | [01c 02-28 03:15:37.72 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -peer1.org1.example.com | [024 02-28 03:16:12.94 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -orderer1.example.com | Debug.BroadcastTraceDir = "" -peer0.org1.example.com | [01d 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -peer1.org2.example.com | [01d 02-28 03:15:37.72 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] -peer1.org1.example.com | [025 02-28 03:16:12.94 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -orderer1.example.com | Debug.DeliverTraceDir = "" -peer0.org1.example.com | [01e 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -peer1.org2.example.com | [01e 02-28 03:15:37.72 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] -peer1.org1.example.com | [026 02-28 03:16:12.94 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot EvictionSuspicion:10m WALDir:/var/hyperledger/production/orderer/etcdraft/wal] -peer0.org1.example.com | [01f 02-28 03:15:37.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:15:39.543Z grpc.peer_address=172.28.0.15:41242 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.8µs -peer1.org2.example.com | [01f 02-28 03:16:13.56 UTC] [%{longpkg}] %{callpath} -> INFO [][27a60cfe] Entry chaincode: name:"cscc" -peer1.org1.example.com | [027 02-28 03:16:12.96 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" -peer0.org1.example.com | [020 02-28 03:15:37.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:15:47.558Z grpc.peer_address=172.28.0.15:41242 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.0998ms -peer1.org2.example.com | [020 02-28 03:16:13.62 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -peer1.org1.example.com | [028 02-28 03:16:12.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -orderer1.example.com | Operations.TLS.Enabled = false -peer0.org1.example.com | [021 02-28 03:15:37.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:15:39.596Z grpc.peer_address=172.28.0.15:41244 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.8279ms -peer1.org2.example.com | [021 02-28 03:16:13.63 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -peer1.org1.example.com | [029 02-28 03:16:12.97 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -orderer1.example.com | Operations.TLS.PrivateKey = "" -peer0.org1.example.com | [022 02-28 03:16:12.58 UTC] [%{longpkg}] %{callpath} -> INFO [][8e124410] Entry chaincode: name:"cscc" -peer1.org2.example.com | [022 02-28 03:16:13.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 25ms (state_validation=2ms block_commit=18ms state_commit=2ms) -peer1.org1.example.com | [02a 02-28 03:16:12.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -orderer1.example.com | Operations.TLS.Certificate = "" -peer0.org1.example.com | [023 02-28 03:16:12.59 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -peer1.org2.example.com | [023 02-28 03:16:13.67 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -orderer1.example.com | Operations.TLS.RootCAs = [] -peer1.org1.example.com | [02b 02-28 03:16:12.97 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org1.example.com | [024 02-28 03:16:12.60 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -peer1.org2.example.com | [024 02-28 03:16:13.68 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -orderer1.example.com | Operations.TLS.ClientAuthRequired = false -peer1.org1.example.com | [02c 02-28 03:16:12.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org1.example.com | [025 02-28 03:16:12.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 23ms (state_validation=2ms block_commit=9ms state_commit=9ms) -peer1.org2.example.com | [025 02-28 03:16:13.68 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -orderer1.example.com | Operations.TLS.ClientRootCAs = [] -peer1.org1.example.com | [02d 02-28 03:16:12.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org1.example.com | [026 02-28 03:16:12.63 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -peer1.org2.example.com | [026 02-28 03:16:13.68 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -orderer1.example.com | Metrics.Provider = "prometheus" -peer1.org1.example.com | [02e 02-28 03:16:12.98 UTC] [%{longpkg}] %{callpath} -> INFO [][7f72c830] Exit chaincode: name:"cscc" (101ms) -peer0.org1.example.com | [027 02-28 03:16:12.64 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org2.example.com | [027 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -peer1.org1.example.com | [02f 02-28 03:16:12.98 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:49154 grpc.code=OK grpc.call_duration=108.9162ms -peer0.org1.example.com | [028 02-28 03:16:12.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer1.org2.example.com | [028 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org1.example.com | [030 02-28 03:16:14.47 UTC] [%{longpkg}] %{callpath} -> INFO [][1a6f9d4e] Entry chaincode: name:"cscc" -peer0.org1.example.com | [029 02-28 03:16:12.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -peer1.org2.example.com | [029 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org1.example.com | [031 02-28 03:16:14.47 UTC] [%{longpkg}] %{callpath} -> INFO [][1a6f9d4e] Exit chaincode: name:"cscc" (1ms) -peer0.org1.example.com | [02a 02-28 03:16:12.67 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -peer1.org2.example.com | [02a 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org1.example.com | [032 02-28 03:16:14.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:49162 grpc.code=OK grpc.call_duration=3.8117ms -zookeeper0 | ZooKeeper JMX enabled by default -peer0.org1.example.com | [02b 02-28 03:16:12.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org1.example.com | [033 02-28 03:16:15.55 UTC] [%{longpkg}] %{callpath} -> INFO [][e6dd7f0f] Entry chaincode: name:"qscc" -peer1.org2.example.com | [02b 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org1.example.com | [02c 02-28 03:16:12.67 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org1.example.com | [034 02-28 03:16:15.55 UTC] [%{longpkg}] %{callpath} -> INFO [][e6dd7f0f] Exit chaincode: name:"qscc" (2ms) -zookeeper0 | Using config: /conf/zoo.cfg -orderer1.example.com | Metrics.Statsd.Network = "udp" -peer1.org2.example.com | [02c 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org1.example.com | [02d 02-28 03:16:12.68 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org1.example.com | [035 02-28 03:16:15.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:49170 grpc.code=OK grpc.call_duration=4.0764ms -zookeeper0 | 2019-02-28 03:15:31,859 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg -orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" -peer1.org2.example.com | [02d 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org1.example.com | [02e 02-28 03:16:12.68 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -zookeeper0 | 2019-02-28 03:15:32,143 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/172.28.0.4 -orderer1.example.com | Metrics.Statsd.WriteInterval = 30s -peer1.org2.example.com | [02e 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO [][27a60cfe] Exit chaincode: name:"cscc" (158ms) -peer0.org1.example.com | [02f 02-28 03:16:12.68 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer1.org1.example.com | [036 02-28 03:16:17.94 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]] -orderer1.example.com | Metrics.Statsd.Prefix = "" -peer1.org2.example.com | [02f 02-28 03:16:13.72 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50606 grpc.code=OK grpc.call_duration=163.7918ms -peer0.org1.example.com | [030 02-28 03:16:12.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -zookeeper0 | 2019-02-28 03:15:32,149 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/172.28.0.3 -kafka3 | [2019-02-28 03:15:42,728] INFO KafkaConfig values: -peer1.org1.example.com | [037 02-28 03:16:18.69 UTC] [%{longpkg}] %{callpath} -> INFO ebda318a4e484fcb0c5c762138cdb64773221bd0b0c88909e40b57ad8cb726c6 : Some peer is already a leader -zookeeper1 | ZooKeeper JMX enabled by default -orderer1.example.com | [003 02-28 03:15:33.49 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer with TLS enabled -peer1.org2.example.com | [030 02-28 03:16:14.83 UTC] [%{longpkg}] %{callpath} -> INFO [][06b6cd87] Entry chaincode: name:"cscc" -kafka1 | [2019-02-28 03:15:42,478] INFO KafkaConfig values: -peer0.org1.example.com | [031 02-28 03:16:12.69 UTC] [%{longpkg}] %{callpath} -> INFO [][8e124410] Exit chaincode: name:"cscc" (106ms) -zookeeper0 | 2019-02-28 03:15:32,150 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/172.28.0.2 -kafka3 | advertised.host.name = null -kafka0 | [2019-02-28 03:15:42,514] INFO KafkaConfig values: -peer0.org2.example.com | [001 02-28 03:15:36.30 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: -orderer0.example.com | 2019-02-28 03:15:33.126 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -orderer1.example.com | [004 02-28 03:15:33.50 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -kafka1 | advertised.host.name = null -peer1.org1.example.com | [038 02-28 03:16:18.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -peer1.org2.example.com | [031 02-28 03:16:14.84 UTC] [%{longpkg}] %{callpath} -> INFO [][06b6cd87] Exit chaincode: name:"cscc" (1ms) -zookeeper1 | Using config: /conf/zoo.cfg -peer0.org1.example.com | [032 02-28 03:16:12.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45236 grpc.code=OK grpc.call_duration=115.3254ms -zookeeper0 | 2019-02-28 03:15:32,152 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums -kafka3 | advertised.listeners = null -kafka0 | advertised.host.name = null -peer0.org2.example.com | Version: 1.4.0 -orderer0.example.com | [002 02-28 03:15:33.37 UTC] [%{longpkg}] %{callpath} -> INFO Orderer config values: -orderer1.example.com | [005 02-28 03:15:33.69 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block 0 -kafka1 | advertised.listeners = null -peer1.org1.example.com | [039 02-28 03:16:18.71 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org2.example.com | [032 02-28 03:16:14.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50614 grpc.code=OK grpc.call_duration=2.0496ms -peer0.org1.example.com | [033 02-28 03:16:14.28 UTC] [%{longpkg}] %{callpath} -> INFO [][c165adbc] Entry chaincode: name:"cscc" -zookeeper0 | 2019-02-28 03:15:32,284 [myid:1] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 -zookeeper1 | 2019-02-28 03:15:31,845 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg -kafka3 | advertised.port = null -kafka0 | advertised.listeners = null -peer0.org2.example.com | Commit SHA: development build +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-04-22 06:16:30.560 UTC [peer] getLocalAddress -> INFO 038 Auto-detected peer address: 192.168.224.6:7051" +peer0.org1.example.com | "2019-04-22 06:16:30.561 UTC [peer] getLocalAddress -> INFO 039 Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:30.563 UTC [msp] GetDefaultSigningIdentity -> DEBU 03a Obtaining default signing identity" +peer0.org1.example.com | "2019-04-22 06:16:30.563 UTC [msp.identity] Sign -> DEBU 03b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-04-22 06:16:30.563 UTC [msp.identity] Sign -> DEBU 03c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-04-22 06:16:30.564 UTC [ledgermgmt] initialize -> INFO 03d Initializing ledger mgmt" +peer0.org1.example.com | "2019-04-22 06:16:30.564 UTC [kvledger] NewProvider -> INFO 03e Initializing ledger provider" +peer0.org1.example.com | "2019-04-22 06:16:30.564 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03f CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +peer0.org1.example.com | "2019-04-22 06:16:30.564 UTC [kvledger.util] logDirStatus -> DEBU 040 Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:30.564 UTC [kvledger.util] logDirStatus -> DEBU 041 After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +peer0.org1.example.com | "2019-04-22 06:16:30.611 UTC [kvledger.util] CreateDirIfMissing -> DEBU 042 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +peer0.org1.example.com | "2019-04-22 06:16:30.611 UTC [kvledger.util] logDirStatus -> DEBU 043 Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:30.611 UTC [kvledger.util] logDirStatus -> DEBU 044 After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +peer0.org1.example.com | "2019-04-22 06:16:30.629 UTC [kvledger.util] CreateDirIfMissing -> DEBU 045 CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +peer0.org1.example.com | "2019-04-22 06:16:30.629 UTC [kvledger.util] logDirStatus -> DEBU 046 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:30.629 UTC [kvledger.util] logDirStatus -> DEBU 047 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +peer0.org1.example.com | "2019-04-22 06:16:30.644 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 048 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +peer0.org2.example.com | "2019-04-22 06:17:01.873 UTC [lifecycle] QueryChaincodeDefinition -> INFO 07a successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org2.example.com | "2019-04-22 06:17:01.874 UTC [endorser] callChaincode -> INFO 07b [businesschannel][82cdfca9] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org2.example.com | "2019-04-22 06:17:01.875 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53586 grpc.code=OK grpc.call_duration=5.7615ms +peer0.org2.example.com | "2019-04-22 06:17:39.664 UTC [gossip.privdata] StoreBlock -> INFO 07d [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-04-22 06:17:39.680 UTC [committer.txvalidator] Validate -> INFO 07e [businesschannel] Validated block [6] in 16ms" +peer0.org2.example.com | "2019-04-22 06:17:39.717 UTC [kvledger] CommitWithPvtData -> INFO 07f [businesschannel] Committed block [6] with 1 transaction(s) in 30ms (state_validation=3ms block_commit=20ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:17:45.120 UTC [gossip.privdata] StoreBlock -> INFO 080 [businesschannel] Received block [7] from buffer" +peer0.org2.example.com | "2019-04-22 06:17:45.129 UTC [committer.txvalidator] Validate -> INFO 081 [businesschannel] Validated block [7] in 8ms" +peer0.org2.example.com | "2019-04-22 06:17:45.148 UTC [kvledger] CommitWithPvtData -> INFO 082 [businesschannel] Committed block [7] with 1 transaction(s) in 18ms (state_validation=0ms block_commit=13ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:17:47.794 UTC [gossip.privdata] StoreBlock -> INFO 083 [businesschannel] Received block [8] from buffer" +peer0.org2.example.com | "2019-04-22 06:17:47.800 UTC [committer.txvalidator] Validate -> INFO 084 [businesschannel] Validated block [8] in 4ms" +peer0.org2.example.com | "2019-04-22 06:17:47.849 UTC [kvledger] CommitWithPvtData -> INFO 085 [businesschannel] Committed block [8] with 1 transaction(s) in 44ms (state_validation=0ms block_commit=18ms state_commit=14ms)" +peer0.org2.example.com | "2019-04-22 06:18:03.449 UTC [gossip.privdata] StoreBlock -> INFO 086 [businesschannel] Received block [9] from buffer" +peer0.org2.example.com | "2019-04-22 06:18:03.453 UTC [cauthdsl] deduplicate -> WARN 087 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:18:03.454 UTC [cauthdsl] deduplicate -> WARN 088 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:18:03.569 UTC [comm.grpc.server] 1 -> INFO 089 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.558Z grpc.peer_address=192.168.224.7:50430 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0458ms +peer0.org2.example.com | "2019-04-22 06:18:03.580 UTC [gossip.gossip] JoinChan -> INFO 08a Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-04-22 06:18:03.581 UTC [gossip.gossip] learnAnchorPeers -> INFO 08b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:18:03.581 UTC [gossip.gossip] learnAnchorPeers -> INFO 08c Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:18:03.581 UTC [gossip.gossip] learnAnchorPeers -> INFO 08d No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:18:03.582 UTC [gossip.gossip] learnAnchorPeers -> INFO 08e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:18:03.624 UTC [committer.txvalidator] Validate -> INFO 08f [businesschannel] Validated block [9] in 174ms" +peer0.org2.example.com | "2019-04-22 06:18:03.637 UTC [gossip.comm] func1 -> WARN 090 peer1.org2.example.com:7051, PKIid:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd isn't responsive: rpc error: code = Unavailable desc = transport is closing" +peer0.org2.example.com | "2019-04-22 06:18:03.651 UTC [comm.grpc.server] 1 -> INFO 091 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:50254 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m16.3513804s +peer0.org2.example.com | "2019-04-22 06:18:03.656 UTC [kvledger] CommitWithPvtData -> INFO 092 [businesschannel] Committed block [9] with 1 transaction(s) in 29ms (state_validation=2ms block_commit=17ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:18:03.637 UTC [comm.grpc.server] 1 -> INFO 093 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.575Z grpc.peer_address=192.168.224.7:50430 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=77.7543ms +peer0.org2.example.com | "2019-04-22 06:18:03.680 UTC [gossip.discovery] expireDeadMembers -> WARN 094 Entering [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd]" +peer0.org2.example.com | "2019-04-22 06:18:03.680 UTC [gossip.discovery] expireDeadMembers -> WARN 095 Closing connection to Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer0.org2.example.com | "2019-04-22 06:18:03.680 UTC [gossip.discovery] expireDeadMembers -> WARN 096 Exiting" +peer0.org2.example.com | "2019-04-22 06:18:03.688 UTC [comm.grpc.server] 1 -> INFO 097 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.688Z grpc.peer_address=192.168.224.5:43734 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=125.7µs +peer0.org2.example.com | "2019-04-22 06:18:03.720 UTC [comm.grpc.server] 1 -> INFO 098 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:43528 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m17.0745681s +peer0.org2.example.com | "2019-04-22 06:18:03.727 UTC [comm.grpc.server] 1 -> INFO 099 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.69Z grpc.peer_address=192.168.224.5:43734 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=37.0743ms +peer0.org2.example.com | "2019-04-22 06:18:03.793 UTC [comm.grpc.server] 1 -> INFO 09a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.792Z grpc.peer_address=192.168.224.6:57342 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=332.8µs +peer0.org2.example.com | "2019-04-22 06:18:03.823 UTC [comm.grpc.server] 1 -> INFO 09b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.798Z grpc.peer_address=192.168.224.6:57342 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.9109ms +peer0.org2.example.com | "2019-04-22 06:18:03.836 UTC [comm.grpc.server] 1 -> INFO 09c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.835Z grpc.peer_address=192.168.224.6:57344 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=328.3µs +peer0.org2.example.com | "2019-04-22 06:18:05.835 UTC [gossip.channel] reportMembershipChanges -> INFO 09d Membership view has changed. peers went offline: [[peer1.org2.example.com:7051]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:18:10.835 UTC [gossip.channel] reportMembershipChanges -> INFO 09e Membership view has changed. peers went online: [[peer1.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:18:21.321 UTC [endorser] callChaincode -> INFO 09f [][62f671df] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:18:21.322 UTC [endorser] callChaincode -> INFO 0a0 [][62f671df] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-04-22 06:18:21.322 UTC [comm.grpc.server] 1 -> INFO 0a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53750 grpc.code=OK grpc.call_duration=2.5275ms +peer0.org2.example.com | "2019-04-22 06:18:22.287 UTC [endorser] callChaincode -> INFO 0a2 [][732b15c0] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-04-22 06:18:22.288 UTC [endorser] callChaincode -> INFO 0a3 [][732b15c0] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-04-22 06:18:22.289 UTC [comm.grpc.server] 1 -> INFO 0a4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:53758 grpc.code=OK grpc.call_duration=2.8884ms +peer0.org1.example.com | "2019-04-22 06:16:30.644 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +peer0.org1.example.com | "2019-04-22 06:16:30.644 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:30.644 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +peer0.org1.example.com | "2019-04-22 06:16:30.669 UTC [kvledger] NewProvider -> INFO 04c ledger provider Initialized" +peer0.org1.example.com | "2019-04-22 06:16:30.669 UTC [confighistory] newDBProvider -> DEBU 04d Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +peer0.org1.example.com | "2019-04-22 06:16:30.670 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04e CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +peer0.org1.example.com | "2019-04-22 06:16:30.670 UTC [kvledger.util] logDirStatus -> DEBU 04f Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:30.670 UTC [kvledger.util] logDirStatus -> DEBU 050 After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +peer0.org1.example.com | "2019-04-22 06:16:30.686 UTC [kvledger.util] CreateDirIfMissing -> DEBU 051 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +peer0.org1.example.com | "2019-04-22 06:16:30.686 UTC [kvledger.util] logDirStatus -> DEBU 052 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:30.686 UTC [kvledger.util] logDirStatus -> DEBU 053 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +peer0.org1.example.com | "2019-04-22 06:16:30.696 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 054 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +peer0.org1.example.com | "2019-04-22 06:16:30.696 UTC [kvledger.util] CreateDirIfMissing -> DEBU 055 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +peer0.org1.example.com | "2019-04-22 06:16:30.696 UTC [kvledger.util] logDirStatus -> DEBU 056 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:30.696 UTC [kvledger.util] logDirStatus -> DEBU 057 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +peer0.org1.example.com | "2019-04-22 06:16:30.723 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 058 Recovering under construction ledger" +peer0.org1.example.com | "2019-04-22 06:16:30.723 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 No under construction ledger found. Quitting recovery" +peer0.org1.example.com | "2019-04-22 06:16:30.723 UTC [ledgermgmt] initialize -> INFO 05a ledger mgmt initialized" +peer0.org1.example.com | "2019-04-22 06:16:30.723 UTC [lifecycle] InitializeLocalChaincodes -> INFO 05b Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org1.example.com | "2019-04-22 06:16:30.736 UTC [nodeCmd] serve -> INFO 05c Starting peer with TLS enabled" +peer0.org1.example.com | "2019-04-22 06:16:30.753 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05d Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org1.example.com | "2019-04-22 06:16:30.753 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05e Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:16:30.785 UTC [inproccontroller] Register -> DEBU 05f Registering chaincode instance: lscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.785 UTC [sccapi] registerSysCC -> INFO 060 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org1.example.com | "2019-04-22 06:16:30.786 UTC [inproccontroller] Register -> DEBU 061 Registering chaincode instance: cscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.786 UTC [sccapi] registerSysCC -> INFO 062 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org1.example.com | "2019-04-22 06:16:30.786 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: qscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.787 UTC [sccapi] registerSysCC -> INFO 064 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-04-22 06:16:30.789 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: _lifecycle:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.789 UTC [sccapi] registerSysCC -> INFO 066 system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org1.example.com | "2019-04-22 06:16:30.790 UTC [nodeCmd] serve -> DEBU 067 Running peer" +peer0.org1.example.com | "2019-04-22 06:16:30.792 UTC [msp] GetDefaultSigningIdentity -> DEBU 068 Obtaining default signing identity" +peer0.org1.example.com | "2019-04-22 06:16:30.793 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers" +peer0.org1.example.com | "2019-04-22 06:16:30.793 UTC [viperutil] getKeysRecursively -> DEBU 06a Found map[string]interface{} value for peer.handlers.endorsers" +peer0.org1.example.com | "2019-04-22 06:16:30.794 UTC [viperutil] getKeysRecursively -> DEBU 06b Found map[string]interface{} value for peer.handlers.endorsers.escc" +peer0.org1.example.com | "2019-04-22 06:16:30.795 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org1.example.com | "2019-04-22 06:16:30.795 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +peer0.org1.example.com | "2019-04-22 06:16:30.796 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-04-22 06:16:30.799 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.endorsers.escc.library setting to " +peer0.org1.example.com | "2019-04-22 06:16:30.811 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[string]interface{} value for peer.handlers.validators" +peer0.org1.example.com | "2019-04-22 06:16:30.814 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[string]interface{} value for peer.handlers.validators.vscc" +peer0.org1.example.com | "2019-04-22 06:16:30.814 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org1.example.com | "2019-04-22 06:16:30.814 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +peer0.org1.example.com | "2019-04-22 06:16:30.815 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-04-22 06:16:30.822 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.validators.vscc.library setting to " +peer0.org1.example.com | "2019-04-22 06:16:30.825 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org1.example.com | "2019-04-22 06:16:30.826 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org1.example.com | "2019-04-22 06:16:30.827 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +peer0.org1.example.com | "2019-04-22 06:16:30.827 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +peer0.org1.example.com | "2019-04-22 06:16:30.827 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07a map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[name:DefaultEndorsement library:]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +peer0.org1.example.com | "2019-04-22 06:16:30.867 UTC [gossip.service] func1 -> INFO 07b Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org1.example.com | "2019-04-22 06:16:30.870 UTC [msp] DeserializeIdentity -> DEBU 07c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:30.871 UTC [msp.identity] newIdentity -> DEBU 07d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:30.871 UTC [msp] Validate -> DEBU 07e MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:30.872 UTC [gossip.discovery] periodicalSendAlive -> DEBU 07f Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:16:30.872 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 080 Sleeping 25s" +peer0.org1.example.com | "2019-04-22 06:16:30.872 UTC [gossip.gossip] NewGossipService -> INFO 081 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org1.example.com | "2019-04-22 06:16:30.872 UTC [msp.identity] Sign -> DEBU 082 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:30.872 UTC [msp.identity] Sign -> DEBU 083 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [gossip.pull] Add -> DEBU 084 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [gossip.gossip] start -> INFO 085 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [gossip.gossip] syncDiscovery -> DEBU 086 Entering discovery sync with interval 4s" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 087 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 088 Sign: digest: 1A11CDCB4785838BC3DD0E5875016BC377B1D2012911363660C288733420D79F " +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 089 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 08a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [chaincode] LaunchConfig -> DEBU 08b launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [chaincode] Start -> DEBU 08c start container: lscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [chaincode] Start -> DEBU 08d start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [gossip.discovery] Connect -> DEBU 08e Skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [chaincode] Start -> DEBU 08f start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [container] lockContainer -> DEBU 090 waiting for container(lscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [container] lockContainer -> DEBU 091 got container (lscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [inproccontroller] getInstance -> DEBU 092 chaincode instance created for lscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [container] unlockContainer -> DEBU 093 container lock deleted(lscc:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.873 UTC [container] lockContainer -> DEBU 094 waiting for container(lscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [container] lockContainer -> DEBU 095 got container (lscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [container] unlockContainer -> DEBU 096 container lock deleted(lscc:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [inproccontroller] func2 -> DEBU 097 chaincode-support started for lscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [inproccontroller] func1 -> DEBU 098 chaincode started for lscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] handleMessage -> DEBU 099 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] HandleRegister -> DEBU 09a Received REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] Register -> DEBU 09b registered handler complete for chaincode lscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] HandleRegister -> DEBU 09c Got REGISTER for chaincodeID = name:"lscc:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] HandleRegister -> DEBU 09d Changed state to established for name:"lscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] sendReady -> DEBU 09e sending READY for chaincode name:"lscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] sendReady -> DEBU 09f Changed to state ready for chaincode name:"lscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] Launch -> DEBU 0a0 launch complete" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] Execute -> DEBU 0a1 Entry" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] handleMessage -> DEBU 0a2 [2e7adbbd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] Notify -> DEBU 0a3 [2e7adbbd] notifying Txid:2e7adbbd-25ff-4682-81a8-bdc2d4b946ca, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [chaincode] Execute -> DEBU 0a4 Exit" +peer0.org1.example.com | "2019-04-22 06:16:30.874 UTC [sccapi] deploySysCC -> INFO 0a5 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:30.875 UTC [chaincode] LaunchConfig -> DEBU 0a6 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-04-22 06:16:30.875 UTC [chaincode] Start -> DEBU 0a7 start container: cscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.875 UTC [chaincode] Start -> DEBU 0a8 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:16:30.876 UTC [chaincode] Start -> DEBU 0a9 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-04-22 06:16:30.877 UTC [container] lockContainer -> DEBU 0aa waiting for container(cscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.878 UTC [container] lockContainer -> DEBU 0ab got container (cscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.878 UTC [inproccontroller] getInstance -> DEBU 0ac chaincode instance created for cscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.879 UTC [inproccontroller] func2 -> DEBU 0ad chaincode-support started for cscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.879 UTC [inproccontroller] func1 -> DEBU 0ae chaincode started for cscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.879 UTC [chaincode] handleMessage -> DEBU 0af [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] HandleRegister -> DEBU 0b0 Received REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] Register -> DEBU 0b1 registered handler complete for chaincode cscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] HandleRegister -> DEBU 0b2 Got REGISTER for chaincodeID = name:"cscc:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] HandleRegister -> DEBU 0b3 Changed state to established for name:"cscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] sendReady -> DEBU 0b4 sending READY for chaincode name:"cscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] sendReady -> DEBU 0b5 Changed to state ready for chaincode name:"cscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [container] lockContainer -> DEBU 0b7 waiting for container(cscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] Launch -> DEBU 0b8 launch complete" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [container] lockContainer -> DEBU 0b9 got container (cscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] Execute -> DEBU 0ba Entry" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [container] unlockContainer -> DEBU 0bb container lock deleted(cscc:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [cscc] Init -> INFO 0bc Init CSCC" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] handleMessage -> DEBU 0bd [057053e6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] Notify -> DEBU 0be [057053e6] notifying Txid:057053e6-a5e0-486a-a9a7-46ba4e2d3563, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:30.880 UTC [chaincode] Execute -> DEBU 0bf Exit" +peer0.org1.example.com | "2019-04-22 06:16:30.881 UTC [sccapi] deploySysCC -> INFO 0c0 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:30.881 UTC [chaincode] LaunchConfig -> DEBU 0c1 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-04-22 06:16:30.881 UTC [chaincode] Start -> DEBU 0c2 start container: qscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.881 UTC [chaincode] Start -> DEBU 0c3 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [chaincode] Start -> DEBU 0c4 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0c5 waiting for container(qscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0c6 got container (qscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [inproccontroller] getInstance -> DEBU 0c7 chaincode instance created for qscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [container] unlockContainer -> DEBU 0c8 container lock deleted(qscc:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0c9 waiting for container(qscc:2.0.0) lock" +peer1.org1.example.com | "2019-04-22 06:16:30.931 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 2.0.0 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.11.5 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-04-22 06:16:30.931 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.5:7051" +peer1.org1.example.com | "2019-04-22 06:16:30.931 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-04-22 06:16:30.935 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org1.example.com | "2019-04-22 06:16:30.935 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org1.example.com | "2019-04-22 06:16:31.001 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org1.example.com | "2019-04-22 06:16:31.051 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org1.example.com | "2019-04-22 06:16:31.051 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org1.example.com | "2019-04-22 06:16:31.064 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org1.example.com | "2019-04-22 06:16:31.104 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-04-22 06:16:31.104 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-04-22 06:16:31.133 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-04-22 06:16:31.134 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-04-22 06:16:31.134 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-04-22 06:16:31.134 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org1.example.com | "2019-04-22 06:16:31.152 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:16:31.158 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-04-22 06:16:31.160 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-04-22 06:16:31.162 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:16:31.163 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:16:31.163 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:16:31.164 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org1.example.com | "2019-04-22 06:16:31.165 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:16:31.166 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:16:31.166 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org1.example.com | "2019-04-22 06:16:31.167 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-04-22 06:16:31.167 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org1.example.com | "2019-04-22 06:16:31.167 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:16:31.167 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:16:40.657 UTC [endorser] callChaincode -> INFO 01e [][c262c8c2] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:16:40.665 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:16:40.669 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org1.example.com | "2019-04-22 06:16:40.699 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 18ms (state_validation=1ms block_commit=9ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:16:40.701 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:16:40.712 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:16:40.712 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:16:40.713 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:16:40.737 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-04-22 06:16:40.739 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:16:40.739 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:16:40.740 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:16:40.740 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org1.example.com | "2019-04-22 06:16:40.741 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:16:40.742 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:16:40.743 UTC [endorser] callChaincode -> INFO 02d [][c262c8c2] Exit chaincode: name:"cscc" (86ms)" +peer1.org1.example.com | "2019-04-22 06:16:40.743 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:51216 grpc.code=OK grpc.call_duration=87.7089ms +peer1.org1.example.com | "2019-04-22 06:16:41.758 UTC [endorser] callChaincode -> INFO 02f [][ea52c8fb] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:16:41.760 UTC [endorser] callChaincode -> INFO 030 [][ea52c8fb] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-04-22 06:16:41.761 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:51224 grpc.code=OK grpc.call_duration=2.8625ms +peer1.org1.example.com | "2019-04-22 06:16:42.641 UTC [endorser] callChaincode -> INFO 032 [][26771862] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:16:42.643 UTC [endorser] callChaincode -> INFO 033 [][26771862] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-04-22 06:16:42.643 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:51232 grpc.code=OK grpc.call_duration=3.2563ms +peer1.org1.example.com | "2019-04-22 06:16:45.712 UTC [gossip.channel] reportMembershipChanges -> INFO 035 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:16:46.510 UTC [gossip.election] leaderElection -> INFO 036 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-04-22 06:16:46.550 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-04-22 06:16:46.578 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:16:46.579 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:16:46.580 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:16:46.581 UTC [gossip.service] updateEndpoints -> WARN 03b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:16:46.602 UTC [committer.txvalidator] Validate -> INFO 03c [businesschannel] Validated block [1] in 52ms" +peer1.org1.example.com | "2019-04-22 06:16:46.624 UTC [kvledger] CommitWithPvtData -> INFO 03d [businesschannel] Committed block [1] with 1 transaction(s) in 20ms (state_validation=1ms block_commit=12ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:16:46.625 UTC [gossip.privdata] StoreBlock -> INFO 03e [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-04-22 06:16:46.646 UTC [gossip.gossip] JoinChan -> INFO 03f Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:16:46.647 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:16:46.647 UTC [gossip.gossip] learnAnchorPeers -> INFO 041 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:16:46.648 UTC [gossip.service] updateEndpoints -> WARN 042 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:16:46.665 UTC [committer.txvalidator] Validate -> INFO 043 [businesschannel] Validated block [2] in 40ms" +peer1.org1.example.com | "2019-04-22 06:16:46.713 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [2] with 1 transaction(s) in 40ms (state_validation=6ms block_commit=25ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:16:46.721 UTC [gossip.comm] func1 -> WARN 045 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:16:46.722 UTC [gossip.discovery] expireDeadMembers -> WARN 046 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-04-22 06:16:46.722 UTC [gossip.discovery] expireDeadMembers -> WARN 047 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-04-22 06:16:46.722 UTC [gossip.discovery] expireDeadMembers -> WARN 048 Exiting" +peer1.org1.example.com | "2019-04-22 06:16:46.932 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.931Z grpc.peer_address=192.168.224.6:44758 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=209.2µs +peer1.org1.example.com | "2019-04-22 06:16:50.229 UTC [endorser] callChaincode -> INFO 04a [][50f14397] Entry chaincode: name:"_lifecycle" " +peer1.org1.example.com | "2019-04-22 06:16:50.232 UTC [endorser] callChaincode -> INFO 04b [][50f14397] Exit chaincode: name:"_lifecycle" (2ms)" +peer1.org1.example.com | "2019-04-22 06:16:50.232 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:51292 grpc.code=OK grpc.call_duration=4.1209ms +peer1.org1.example.com | "2019-04-22 06:16:50.712 UTC [gossip.channel] reportMembershipChanges -> INFO 04d Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:16:54.572 UTC [gossip.privdata] StoreBlock -> INFO 04e [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-04-22 06:16:54.584 UTC [committer.txvalidator] Validate -> INFO 04f [businesschannel] Validated block [3] in 11ms" +peer1.org1.example.com | "2019-04-22 06:16:54.600 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (13ms)" +peer1.org1.example.com | "2019-04-22 06:16:54.602 UTC [confighistory] HandleStateUpdates -> ERRO 051 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00372fd80)}" +peer1.org1.example.com | "2019-04-22 06:16:54.628 UTC [kvledger] CommitWithPvtData -> INFO 052 [businesschannel] Committed block [3] with 1 transaction(s) in 28ms (state_validation=2ms block_commit=13ms state_commit=6ms)" +peer1.org1.example.com | "2019-04-22 06:16:55.877 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:57.877Z grpc.peer_address=192.168.224.7:60632 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=176.4µs +peer1.org1.example.com | "2019-04-22 06:16:55.892 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:60632 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.9109ms +orderer2.example.com | 2019-04-22 06:16:27.038 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2019-04-22 06:16:27.175 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +peer1.org1.example.com | "2019-04-22 06:16:56.171 UTC [comm.grpc.server] 1 -> INFO 055 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:58.17Z grpc.peer_address=192.168.224.7:60638 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=238.3µs +peer1.org1.example.com | "2019-04-22 06:16:57.205 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-04-22 06:16:57.211 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [4] in 5ms" +peer1.org1.example.com | "2019-04-22 06:16:57.213 UTC [confighistory] HandleStateUpdates -> ERRO 058 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003b3fae0)}" +peer1.org1.example.com | "2019-04-22 06:16:57.242 UTC [kvledger] CommitWithPvtData -> INFO 059 [businesschannel] Committed block [4] with 1 transaction(s) in 30ms (state_validation=1ms block_commit=18ms state_commit=5ms)" +peer1.org1.example.com | "2019-04-22 06:17:00.680 UTC [gossip.channel] reportMembershipChanges -> INFO 05a Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051 ] [peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:17:00.985 UTC [gossip.privdata] StoreBlock -> INFO 05b [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-04-22 06:17:00.989 UTC [committer.txvalidator] Validate -> INFO 05c [businesschannel] Validated block [5] in 3ms" +peer1.org1.example.com | "2019-04-22 06:17:00.997 UTC [lifecycle] update -> INFO 05d Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org1.example.com | "2019-04-22 06:17:01.023 UTC [lifecycle] update -> INFO 05e Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org1.example.com | "2019-04-22 06:17:01.027 UTC [cceventmgmt] HandleStateUpdates -> INFO 05f Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-04-22 06:17:01.027 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 060 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org1.example.com | "2019-04-22 06:17:01.028 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 061 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org1.example.com | "2019-04-22 06:17:01.063 UTC [kvledger] CommitWithPvtData -> INFO 062 [businesschannel] Committed block [5] with 1 transaction(s) in 72ms (state_validation=45ms block_commit=19ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:17:39.635 UTC [gossip.privdata] StoreBlock -> INFO 063 [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-04-22 06:17:39.640 UTC [committer.txvalidator] Validate -> INFO 064 [businesschannel] Validated block [6] in 4ms" +peer1.org1.example.com | "2019-04-22 06:17:39.678 UTC [kvledger] CommitWithPvtData -> INFO 065 [businesschannel] Committed block [6] with 1 transaction(s) in 37ms (state_validation=0ms block_commit=13ms state_commit=6ms)" +peer1.org1.example.com | "2019-04-22 06:17:45.146 UTC [gossip.privdata] StoreBlock -> INFO 066 [businesschannel] Received block [7] from buffer" +peer1.org1.example.com | "2019-04-22 06:17:45.151 UTC [committer.txvalidator] Validate -> INFO 067 [businesschannel] Validated block [7] in 4ms" +peer1.org1.example.com | "2019-04-22 06:17:45.174 UTC [kvledger] CommitWithPvtData -> INFO 068 [businesschannel] Committed block [7] with 1 transaction(s) in 22ms (state_validation=1ms block_commit=12ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:17:47.814 UTC [gossip.privdata] StoreBlock -> INFO 069 [businesschannel] Received block [8] from buffer" +peer1.org1.example.com | "2019-04-22 06:17:47.816 UTC [committer.txvalidator] Validate -> INFO 06a [businesschannel] Validated block [8] in 1ms" +peer1.org1.example.com | "2019-04-22 06:17:47.836 UTC [kvledger] CommitWithPvtData -> INFO 06b [businesschannel] Committed block [8] with 1 transaction(s) in 18ms (state_validation=0ms block_commit=10ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:18:03.446 UTC [gossip.privdata] StoreBlock -> INFO 06c [businesschannel] Received block [9] from buffer" +peer1.org1.example.com | "2019-04-22 06:18:03.450 UTC [cauthdsl] deduplicate -> WARN 06d De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:18:03.451 UTC [cauthdsl] deduplicate -> WARN 06e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:18:03.497 UTC [gossip.gossip] JoinChan -> INFO 06f Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-04-22 06:18:03.497 UTC [gossip.gossip] learnAnchorPeers -> INFO 070 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:18:03.507 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:18:03.507 UTC [gossip.gossip] learnAnchorPeers -> INFO 072 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:18:03.509 UTC [gossip.service] updateEndpoints -> WARN 073 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:18:03.595 UTC [committer.txvalidator] Validate -> INFO 074 [businesschannel] Validated block [9] in 148ms" +peer1.org1.example.com | "2019-04-22 06:18:03.697 UTC [kvledger] CommitWithPvtData -> INFO 075 [businesschannel] Committed block [9] with 1 transaction(s) in 101ms (state_validation=1ms block_commit=81ms state_commit=7ms)" +peer1.org1.example.com | "2019-04-22 06:18:03.782 UTC [comm.grpc.server] 1 -> INFO 076 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:44758 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m16.951298s +peer1.org1.example.com | "2019-04-22 06:18:04.001 UTC [comm.grpc.server] 1 -> INFO 077 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:06.001Z grpc.peer_address=192.168.224.8:45594 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=148.8µs +peer1.org1.example.com | "2019-04-22 06:18:04.435 UTC [comm.grpc.server] 1 -> INFO 078 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:06.434Z grpc.peer_address=192.168.224.6:44974 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=123.5µs +peer1.org1.example.com | "2019-04-22 06:18:04.443 UTC [comm.grpc.server] 1 -> INFO 079 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:44974 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=6.7269ms +peer1.org1.example.com | "2019-04-22 06:18:04.489 UTC [comm.grpc.server] 1 -> INFO 07a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:06.489Z grpc.peer_address=192.168.224.6:44978 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=156.7µs +peer1.org1.example.com | "2019-04-22 06:18:21.163 UTC [endorser] callChaincode -> INFO 07b [][eb3acaba] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0ca got container (qscc:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [container] unlockContainer -> DEBU 0cb container lock deleted(qscc:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [inproccontroller] func2 -> DEBU 0cc chaincode-support started for qscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [inproccontroller] func1 -> DEBU 0cd chaincode started for qscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [chaincode] handleMessage -> DEBU 0ce [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.882 UTC [chaincode] HandleRegister -> DEBU 0cf Received REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] Register -> DEBU 0d0 registered handler complete for chaincode qscc:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] HandleRegister -> DEBU 0d1 Got REGISTER for chaincodeID = name:"qscc:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] HandleRegister -> DEBU 0d2 Changed state to established for name:"qscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] sendReady -> DEBU 0d3 sending READY for chaincode name:"qscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] sendReady -> DEBU 0d4 Changed to state ready for chaincode name:"qscc:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] Launch -> DEBU 0d5 launch complete" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] Execute -> DEBU 0d6 Entry" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [qscc] Init -> INFO 0d7 Init QSCC" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] handleMessage -> DEBU 0d8 [b8b0f262] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] Notify -> DEBU 0d9 [b8b0f262] notifying Txid:b8b0f262-ef7b-4fd6-b248-c8015484877f, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [chaincode] Execute -> DEBU 0da Exit" +peer0.org1.example.com | "2019-04-22 06:16:30.883 UTC [sccapi] deploySysCC -> INFO 0db system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer2.example.com | Kafka.SASLPlain.Password = "" +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2019-04-22 06:16:27.237 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +peer0.org1.example.com | "2019-04-22 06:16:30.892 UTC [chaincode] LaunchConfig -> DEBU 0dc launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-04-22 06:16:30.892 UTC [chaincode] Start -> DEBU 0dd start container: _lifecycle:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.892 UTC [chaincode] Start -> DEBU 0de start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [chaincode] Start -> DEBU 0df start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e0 waiting for container(_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e1 got container (_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [inproccontroller] getInstance -> DEBU 0e2 chaincode instance created for _lifecycle:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [container] unlockContainer -> DEBU 0e3 container lock deleted(_lifecycle:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e4 waiting for container(_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e5 got container (_lifecycle:2.0.0) lock" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [container] unlockContainer -> DEBU 0e6 container lock deleted(_lifecycle:2.0.0)" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [inproccontroller] func1 -> DEBU 0e7 chaincode started for _lifecycle:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [inproccontroller] func2 -> DEBU 0e8 chaincode-support started for _lifecycle:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [chaincode] handleMessage -> DEBU 0e9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [chaincode] HandleRegister -> DEBU 0ea Received REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [chaincode] Register -> DEBU 0eb registered handler complete for chaincode _lifecycle:2.0.0" +peer0.org1.example.com | "2019-04-22 06:16:30.893 UTC [chaincode] HandleRegister -> DEBU 0ec Got REGISTER for chaincodeID = name:"_lifecycle:2.0.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] HandleRegister -> DEBU 0ed Changed state to established for name:"_lifecycle:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] sendReady -> DEBU 0ee sending READY for chaincode name:"_lifecycle:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] sendReady -> DEBU 0ef Changed to state ready for chaincode name:"_lifecycle:2.0.0" " +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] Launch -> DEBU 0f0 launch complete" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] Execute -> DEBU 0f1 Entry" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] handleMessage -> DEBU 0f2 [1f077576] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] Notify -> DEBU 0f3 [1f077576] notifying Txid:1f077576-5156-4e3d-aa81-e2e48235ba73, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [chaincode] Execute -> DEBU 0f4 Exit" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [sccapi] deploySysCC -> INFO 0f5 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [nodeCmd] serve -> INFO 0f6 Deployed system chaincodes" +peer0.org1.example.com | "2019-04-22 06:16:30.894 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0f7 Returning []" +peer0.org1.example.com | "2019-04-22 06:16:30.895 UTC [discovery] NewService -> INFO 0f8 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-04-22 06:16:30.895 UTC [nodeCmd] registerDiscoveryService -> INFO 0f9 Discovery service activated" +peer0.org1.example.com | "2019-04-22 06:16:30.895 UTC [nodeCmd] serve -> INFO 0fa Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:16:30.895 UTC [nodeCmd] serve -> INFO 0fb Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:16:31.175 UTC [comm.grpc.server] 1 -> INFO 0fc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:33.173Z grpc.peer_address=192.168.224.5:47442 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=473µs +peer0.org1.example.com | "2019-04-22 06:16:31.185 UTC [msp.identity] Sign -> DEBU 0fd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:31.185 UTC [msp.identity] Sign -> DEBU 0fe Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:31.185 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0ff Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:47442" +peer1.org2.example.com | "2019-04-22 06:16:31.373 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org2.example.com | Version: 2.0.0 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.11.5 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger" +peer1.org2.example.com | "2019-04-22 06:16:31.373 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.7:7051" +peer1.org2.example.com | "2019-04-22 06:16:31.373 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-04-22 06:16:31.377 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org2.example.com | "2019-04-22 06:16:31.377 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org2.example.com | "2019-04-22 06:16:31.466 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org2.example.com | "2019-04-22 06:16:31.525 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org2.example.com | "2019-04-22 06:16:31.525 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org2.example.com | "2019-04-22 06:16:31.549 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org2.example.com | "2019-04-22 06:16:31.575 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-04-22 06:16:31.575 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-04-22 06:16:31.609 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-04-22 06:16:31.610 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-04-22 06:16:31.610 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-04-22 06:16:31.610 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org2.example.com | "2019-04-22 06:16:31.633 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:16:31.637 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-04-22 06:16:31.639 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-04-22 06:16:31.642 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:16:31.644 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:16:31.645 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:16:31.648 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org2.example.com | "2019-04-22 06:16:31.648 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:16:31.650 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:16:31.650 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org2.example.com | "2019-04-22 06:16:31.652 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-04-22 06:16:31.652 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org2.example.com | "2019-04-22 06:16:31.652 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:16:31.657 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:16:41.106 UTC [endorser] callChaincode -> INFO 01e [][556ba961] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:16:41.113 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:16:41.116 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org2.example.com | "2019-04-22 06:16:41.137 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=8ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:16:41.140 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:16:41.151 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:16:41.151 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:16:41.151 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:16:41.184 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-04-22 06:16:41.186 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:16:41.186 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:16:41.186 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:16:41.187 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org1.example.com | "2019-04-22 06:18:21.164 UTC [endorser] callChaincode -> INFO 07c [][eb3acaba] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-04-22 06:18:21.164 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:51520 grpc.code=OK grpc.call_duration=2.4883ms +peer1.org1.example.com | "2019-04-22 06:18:22.141 UTC [endorser] callChaincode -> INFO 07e [][e2f55fe5] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:18:22.144 UTC [endorser] callChaincode -> INFO 07f [][e2f55fe5] Exit chaincode: name:"qscc" (3ms)" +peer1.org1.example.com | "2019-04-22 06:18:22.144 UTC [comm.grpc.server] 1 -> INFO 080 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:51528 grpc.code=OK grpc.call_duration=3.9327ms +orderer2.example.com | "2019-04-22 06:16:27.238 UTC [orderer.common.server] configureClusterListener -> INFO 004 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2019-04-22 06:16:27.243 UTC [fsblkstorage] newBlockfileMgr -> INFO 005 Getting block information from block storage" +orderer2.example.com | "2019-04-22 06:16:27.285 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 006 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-04-22 06:16:27.286 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 007 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.306 UTC [orderer.commmon.multichannel] Initialize -> INFO 008 Starting system channel 'testchainid' with genesis block hash bccae20aaab201a55c9ee823a533d677feba8c9063b32a630efd47c984a7033d and orderer type etcdraft" +orderer2.example.com | "2019-04-22 06:16:27.321 UTC [orderer.consensus.etcdraft] Start -> INFO 009 Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.321 UTC [orderer.common.cluster] Configure -> INFO 00a Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +peer1.org2.example.com | "2019-04-22 06:16:41.188 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:16:41.188 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:16:41.189 UTC [endorser] callChaincode -> INFO 02d [][556ba961] Exit chaincode: name:"cscc" (83ms)" +peer1.org2.example.com | "2019-04-22 06:16:41.189 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:33164 grpc.code=OK grpc.call_duration=85.104ms +peer1.org2.example.com | "2019-04-22 06:16:42.036 UTC [endorser] callChaincode -> INFO 02f [][38fdef97] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:16:42.038 UTC [endorser] callChaincode -> INFO 030 [][38fdef97] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:16:42.038 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:33172 grpc.code=OK grpc.call_duration=2.6581ms +peer1.org2.example.com | "2019-04-22 06:16:43.057 UTC [endorser] callChaincode -> INFO 032 [][ea2b7554] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:16:43.060 UTC [endorser] callChaincode -> INFO 033 [][ea2b7554] Exit chaincode: name:"qscc" (3ms)" +peer0.org1.example.com | "2019-04-22 06:16:31.186 UTC [gossip.comm] authenticateRemotePeer -> DEBU 100 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47442" +peer0.org1.example.com | "2019-04-22 06:16:31.186 UTC [msp] DeserializeIdentity -> DEBU 101 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:31.186 UTC [msp.identity] newIdentity -> DEBU 102 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:31.187 UTC [msp] Validate -> DEBU 103 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:31.187 UTC [msp.identity] Verify -> DEBU 104 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:16:31.188 UTC [msp.identity] Verify -> DEBU 105 Verify: sig = 00000000 30 45 02 21 00 a0 3d 56 68 f2 10 ea bc 70 8c c8 |0E.!..=Vh....p..| +peer0.org1.example.com | 00000010 d1 5d e2 9e 21 9f ce aa 4c fe 63 d8 5c 7a 79 cf |.]..!...L.c.\zy.| +peer0.org1.example.com | 00000020 d8 fc 98 b7 b2 02 20 4b 5a 20 bb b8 f2 fb 2b a2 |...... KZ ....+.| +peer0.org1.example.com | 00000030 0c 0a 9f 50 33 4c 32 f9 7d 50 16 12 9e 46 54 3f |...P3L2.}P...FT?| +peer0.org1.example.com | 00000040 5c c1 0b d4 5f b3 bc |\..._..|" +peer0.org1.example.com | "2019-04-22 06:16:31.188 UTC [gossip.comm] authenticateRemotePeer -> DEBU 106 Authenticated 192.168.224.5:47442" +peer0.org1.example.com | "2019-04-22 06:16:31.188 UTC [gossip.comm] GossipStream -> DEBU 107 Servicing 192.168.224.5:47442" +peer0.org1.example.com | "2019-04-22 06:16:31.205 UTC [gossip.comm] readFromStream -> DEBU 108 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:16:31.205 UTC [gossip.comm] func2 -> DEBU 109 Client 192.168.224.5:47442 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:31.205 UTC [comm.grpc.server] 1 -> INFO 10a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:41.184Z grpc.peer_address=192.168.224.5:47442 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.2921ms +peer0.org1.example.com | "2019-04-22 06:16:31.206 UTC [grpc] infof -> DEBU 10b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:31.206 UTC [gossip.comm] writeToStream -> DEBU 10c Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:31.251 UTC [comm.grpc.server] 1 -> INFO 10d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:33.24Z grpc.peer_address=192.168.224.5:47444 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.9734ms +peer0.org1.example.com | "2019-04-22 06:16:31.255 UTC [msp.identity] Sign -> DEBU 10e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:31.255 UTC [msp.identity] Sign -> DEBU 10f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:31.256 UTC [gossip.comm] authenticateRemotePeer -> DEBU 110 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:47444" +peer0.org1.example.com | "2019-04-22 06:16:31.256 UTC [gossip.comm] authenticateRemotePeer -> DEBU 111 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47444" +peer0.org1.example.com | "2019-04-22 06:16:31.257 UTC [msp.identity] Verify -> DEBU 112 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:16:31.257 UTC [msp.identity] Verify -> DEBU 113 Verify: sig = 00000000 30 45 02 21 00 e2 52 b4 f1 ab 2f 62 6c 0e f5 1b |0E.!..R.../bl...| +peer0.org1.example.com | 00000010 4a c7 1d f7 b1 f8 ac a7 91 d4 6d 17 14 e7 55 bc |J.........m...U.| +peer0.org1.example.com | 00000020 91 2a 2d d2 77 02 20 20 8a dc eb 22 81 3d fa 46 |.*-.w. ...".=.F| +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-04-22 06:16:27.323 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00b Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-04-22 06:16:27.323 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-04-22 06:16:27.324 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-04-22 06:16:27.324 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-04-22 06:16:27.324 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 00f 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-04-22 06:16:27.325 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-04-22 06:16:27.325 UTC [orderer.common.cluster] Configure -> INFO 011 Exiting" +orderer2.example.com | "2019-04-22 06:16:27.325 UTC [orderer.consensus.etcdraft] start -> INFO 012 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.325 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 013 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.325 UTC [orderer.consensus.etcdraft] newRaft -> INFO 014 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.325 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 015 3 became follower at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.326 UTC [orderer.common.server] Start -> INFO 016 Starting orderer: +orderer2.example.com | Version: 2.0.0 +orderer2.example.com | Commit SHA: development build +orderer2.example.com | Go version: go1.11.5 +orderer2.example.com | OS/Arch: linux/amd64" +orderer2.example.com | "2019-04-22 06:16:27.326 UTC [orderer.common.server] Start -> INFO 017 Beginning to serve requests" +orderer2.example.com | "2019-04-22 06:16:27.327 UTC [orderer.consensus.etcdraft] run -> INFO 018 This node is picked to start campaign" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.331 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.331 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:27.332 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.328 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 3 is starting a new election at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.328 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01d 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.328 UTC [orderer.consensus.etcdraft] poll -> INFO 01e 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.328 UTC [orderer.consensus.etcdraft] campaign -> INFO 01f 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.328 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.329 UTC [orderer.consensus.etcdraft] logSendFailure -> ERRO 021 Failed to send StepRequest to 2, because: rpc error: code = Unavailable desc = all SubConns are in TransientFailure, latest connection error: connection error: desc = "transport: Error while dialing dial tcp 192.168.224.3:7050: connect: connection refused"" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.333 UTC [orderer.consensus.etcdraft] poll -> INFO 022 3 received MsgPreVoteResp from 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.333 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 023 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.333 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 024 3 became candidate at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.333 UTC [orderer.consensus.etcdraft] poll -> INFO 025 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.333 UTC [orderer.consensus.etcdraft] campaign -> INFO 026 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.333 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.338 UTC [orderer.consensus.etcdraft] poll -> INFO 028 3 received MsgVoteResp from 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.338 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 029 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.338 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02a 3 became leader at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.340 UTC [orderer.consensus.etcdraft] run -> INFO 02b raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.343 UTC [orderer.consensus.etcdraft] run -> INFO 02c Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.344 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02d Raft leader changed: 0 -> 3" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.347 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02e Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:28.828 UTC [orderer.consensus.etcdraft] send -> INFO 02f Successfully sent StepRequest to 2 after failed attempt(s)" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:38.500 UTC [orderer.consensus.etcdraft] propose -> INFO 030 Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:38.500 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 031 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:38.512 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 032 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer2.example.com | "2019-04-22 06:16:38.542 UTC [fsblkstorage] newBlockfileMgr -> INFO 033 Getting block information from block storage" +orderer2.example.com | "2019-04-22 06:16:38.569 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 034 EvictionSuspicion not set, defaulting to 10m0s" +peer1.org2.example.com | "2019-04-22 06:16:43.061 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:33180 grpc.code=OK grpc.call_duration=4.7232ms +peer1.org2.example.com | "2019-04-22 06:16:47.190 UTC [gossip.election] beLeader -> INFO 035 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" +peer1.org2.example.com | "2019-04-22 06:16:47.191 UTC [gossip.service] func1 -> INFO 036 Elected as a leader, starting delivery service for channel businesschannel" +peer1.org2.example.com | "2019-04-22 06:16:47.227 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-04-22 06:16:47.263 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:16:47.263 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:16:47.263 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:16:47.297 UTC [committer.txvalidator] Validate -> INFO 03b [businesschannel] Validated block [1] in 70ms" +peer1.org2.example.com | "2019-04-22 06:16:47.332 UTC [kvledger] CommitWithPvtData -> INFO 03c [businesschannel] Committed block [1] with 1 transaction(s) in 33ms (state_validation=2ms block_commit=20ms state_commit=4ms)" +peer1.org2.example.com | "2019-04-22 06:16:47.333 UTC [gossip.privdata] StoreBlock -> INFO 03d [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-04-22 06:16:47.347 UTC [gossip.gossip] JoinChan -> INFO 03e Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:16:47.347 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:16:47.348 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:16:47.360 UTC [committer.txvalidator] Validate -> INFO 041 [businesschannel] Validated block [2] in 26ms" +peer1.org2.example.com | "2019-04-22 06:16:47.381 UTC [kvledger] CommitWithPvtData -> INFO 042 [businesschannel] Committed block [2] with 1 transaction(s) in 20ms (state_validation=3ms block_commit=10ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:16:47.646 UTC [gossip.comm] func1 -> WARN 043 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:16:47.647 UTC [gossip.discovery] expireDeadMembers -> WARN 044 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org2.example.com | "2019-04-22 06:16:47.648 UTC [gossip.discovery] expireDeadMembers -> WARN 045 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org2.example.com | "2019-04-22 06:16:47.648 UTC [gossip.discovery] expireDeadMembers -> WARN 046 Exiting" +peer1.org2.example.com | "2019-04-22 06:16:48.518 UTC [comm.grpc.server] 1 -> INFO 047 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:50.518Z grpc.peer_address=192.168.224.6:50724 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=178.2µs +peer1.org2.example.com | "2019-04-22 06:16:48.724 UTC [gossip.gossip] validateMsg -> WARN 048 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-04-22 06:16:48.724 UTC [gossip.gossip] handleMessage -> WARN 049 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org2.example.com | "2019-04-22 06:16:51.151 UTC [gossip.channel] reportMembershipChanges -> INFO 04a Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-04-22 06:16:51.741 UTC [endorser] callChaincode -> INFO 04b [][aa9fdec2] Entry chaincode: name:"_lifecycle" " +peer1.org2.example.com | "2019-04-22 06:16:51.742 UTC [endorser] callChaincode -> INFO 04c [][aa9fdec2] Exit chaincode: name:"_lifecycle" (1ms)" +peer1.org2.example.com | "2019-04-22 06:16:51.742 UTC [comm.grpc.server] 1 -> INFO 04d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:33244 grpc.code=OK grpc.call_duration=2.7426ms +peer1.org2.example.com | "2019-04-22 06:16:51.981 UTC [gossip.election] stopBeingLeader -> INFO 04e 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" +peer1.org2.example.com | "2019-04-22 06:16:51.981 UTC [gossip.service] func1 -> INFO 04f Renounced leadership, stopping delivery service for channel businesschannel" +peer1.org2.example.com | "2019-04-22 06:16:51.982 UTC [deliveryClient] try -> WARN 050 Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" +peer1.org2.example.com | "2019-04-22 06:16:51.982 UTC [blocksProvider] DeliverBlocks -> WARN 051 [businesschannel] Receive error: client is closing" +peer1.org2.example.com | "2019-04-22 06:16:54.592 UTC [gossip.privdata] StoreBlock -> INFO 052 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-04-22 06:16:54.601 UTC [committer.txvalidator] Validate -> INFO 053 [businesschannel] Validated block [3] in 8ms" +peer1.org2.example.com | "2019-04-22 06:16:54.615 UTC [confighistory] HandleStateUpdates -> ERRO 054 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00332cd60)}" +peer1.org2.example.com | "2019-04-22 06:16:54.645 UTC [kvledger] CommitWithPvtData -> INFO 055 [businesschannel] Committed block [3] with 1 transaction(s) in 36ms (state_validation=11ms block_commit=14ms state_commit=4ms)" +peer1.org2.example.com | "2019-04-22 06:16:55.883 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:57.882Z grpc.peer_address=192.168.224.5:41892 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160µs +peer1.org2.example.com | "2019-04-22 06:16:55.891 UTC [comm.grpc.server] 1 -> INFO 057 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:41892 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=4.7753ms +peer1.org2.example.com | "2019-04-22 06:16:56.147 UTC [comm.grpc.server] 1 -> INFO 058 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:58.146Z grpc.peer_address=192.168.224.5:41894 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=193.5µs +orderer2.example.com | "2019-04-22 06:16:38.570 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 035 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.583 UTC [orderer.commmon.multichannel] newChain -> INFO 036 Created and starting new chain businesschannel" +orderer2.example.com | "2019-04-22 06:16:38.583 UTC [orderer.consensus.etcdraft] Start -> INFO 037 Starting Raft node" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.584 UTC [orderer.common.cluster] Configure -> INFO 038 Entering, channel: businesschannel, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer2.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer2.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer2.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer2.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-04-22 06:16:38.584 UTC [orderer.common.cluster] updateStubInMapping -> INFO 039 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-04-22 06:16:38.585 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-04-22 06:16:38.586 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-04-22 06:16:38.586 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03c Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +peer1.org2.example.com | "2019-04-22 06:16:56.179 UTC [comm.grpc.server] 1 -> INFO 059 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:41894 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=28.4003ms +peer1.org2.example.com | "2019-04-22 06:16:57.182 UTC [gossip.privdata] StoreBlock -> INFO 05a [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-04-22 06:16:57.192 UTC [committer.txvalidator] Validate -> INFO 05b [businesschannel] Validated block [4] in 7ms" +peer1.org2.example.com | "2019-04-22 06:16:57.206 UTC [gossip.privdata] StoreBlock -> INFO 05c [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (11ms)" +peer1.org2.example.com | "2019-04-22 06:16:57.208 UTC [confighistory] HandleStateUpdates -> ERRO 05d Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003263680)}" +peer1.org2.example.com | "2019-04-22 06:16:57.261 UTC [kvledger] CommitWithPvtData -> INFO 05e [businesschannel] Committed block [4] with 1 transaction(s) in 54ms (state_validation=11ms block_commit=22ms state_commit=7ms)" +peer1.org2.example.com | "2019-04-22 06:17:00.967 UTC [gossip.privdata] StoreBlock -> INFO 05f [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-04-22 06:17:00.972 UTC [committer.txvalidator] Validate -> INFO 060 [businesschannel] Validated block [5] in 4ms" +peer1.org2.example.com | "2019-04-22 06:17:00.976 UTC [lifecycle] update -> INFO 061 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org2.example.com | "2019-04-22 06:17:00.979 UTC [lifecycle] update -> INFO 062 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org2.example.com | "2019-04-22 06:17:00.980 UTC [cceventmgmt] HandleStateUpdates -> INFO 063 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-04-22 06:17:00.980 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 064 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org2.example.com | "2019-04-22 06:17:00.980 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 065 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org2.example.com | "2019-04-22 06:17:01.015 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [5] with 1 transaction(s) in 42ms (state_validation=17ms block_commit=16ms state_commit=4ms)" +peer1.org2.example.com | "2019-04-22 06:17:01.123 UTC [gossip.channel] reportMembershipChanges -> INFO 067 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:17:39.674 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-04-22 06:17:39.679 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [6] in 4ms" +peer1.org2.example.com | "2019-04-22 06:17:39.708 UTC [kvledger] CommitWithPvtData -> INFO 06a [businesschannel] Committed block [6] with 1 transaction(s) in 27ms (state_validation=2ms block_commit=15ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:17:45.189 UTC [gossip.privdata] StoreBlock -> INFO 06b [businesschannel] Received block [7] from buffer" +peer1.org2.example.com | "2019-04-22 06:17:45.193 UTC [committer.txvalidator] Validate -> INFO 06c [businesschannel] Validated block [7] in 4ms" +peer1.org2.example.com | "2019-04-22 06:17:45.214 UTC [kvledger] CommitWithPvtData -> INFO 06d [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=0ms block_commit=14ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:17:47.820 UTC [gossip.privdata] StoreBlock -> INFO 06e [businesschannel] Received block [8] from buffer" +peer1.org2.example.com | "2019-04-22 06:17:47.824 UTC [committer.txvalidator] Validate -> INFO 06f [businesschannel] Validated block [8] in 3ms" +peer1.org2.example.com | "2019-04-22 06:17:47.848 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=13ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:18:03.467 UTC [gossip.privdata] StoreBlock -> INFO 071 [businesschannel] Received block [9] from buffer" +peer1.org2.example.com | "2019-04-22 06:18:03.471 UTC [cauthdsl] deduplicate -> WARN 072 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:18:03.474 UTC [cauthdsl] deduplicate -> WARN 073 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:18:03.505 UTC [gossip.gossip] JoinChan -> INFO 074 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-04-22 06:18:03.513 UTC [gossip.gossip] learnAnchorPeers -> INFO 075 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:18:03.513 UTC [gossip.gossip] learnAnchorPeers -> INFO 076 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:18:03.515 UTC [gossip.gossip] learnAnchorPeers -> INFO 077 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:18:03.516 UTC [gossip.service] updateEndpoints -> WARN 078 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:18:03.532 UTC [committer.txvalidator] Validate -> INFO 079 [businesschannel] Validated block [9] in 64ms" +peer1.org2.example.com | "2019-04-22 06:18:03.568 UTC [kvledger] CommitWithPvtData -> INFO 07a [businesschannel] Committed block [9] with 1 transaction(s) in 35ms (state_validation=5ms block_commit=22ms state_commit=4ms)" +peer1.org2.example.com | "2019-04-22 06:18:03.705 UTC [comm.grpc.server] 1 -> INFO 07b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:50724 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m15.2859836s +peer1.org2.example.com | "2019-04-22 06:18:03.721 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.721Z grpc.peer_address=192.168.224.8:57704 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=187.8µs +peer1.org2.example.com | "2019-04-22 06:18:04.370 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:06.366Z grpc.peer_address=192.168.224.6:50912 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.1µs +peer1.org2.example.com | "2019-04-22 06:18:21.483 UTC [endorser] callChaincode -> INFO 07e [][df93157c] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:18:21.484 UTC [endorser] callChaincode -> INFO 07f [][df93157c] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:18:21.484 UTC [comm.grpc.server] 1 -> INFO 080 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:33468 grpc.code=OK grpc.call_duration=2.2712ms +peer1.org2.example.com | "2019-04-22 06:18:22.431 UTC [endorser] callChaincode -> INFO 081 [][9e88fbe9] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:18:22.433 UTC [endorser] callChaincode -> INFO 082 [][9e88fbe9] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-04-22 06:18:22.433 UTC [comm.grpc.server] 1 -> INFO 083 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:33476 grpc.code=OK grpc.call_duration=2.9315ms +orderer2.example.com | "2019-04-22 06:16:38.587 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-04-22 06:16:38.587 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03e 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-04-22 06:16:38.587 UTC [orderer.common.cluster] Configure -> INFO 03f Exiting" +orderer2.example.com | "2019-04-22 06:16:38.587 UTC [orderer.consensus.etcdraft] start -> INFO 040 Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.587 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 041 3 became follower at term 0" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.590 UTC [orderer.consensus.etcdraft] newRaft -> INFO 042 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.591 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 043 3 became follower at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.594 UTC [orderer.consensus.etcdraft] apply -> INFO 044 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.595 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:38.595 UTC [orderer.consensus.etcdraft] apply -> INFO 046 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:39.679 UTC [orderer.consensus.etcdraft] Step -> INFO 047 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:39.687 UTC [orderer.consensus.etcdraft] Step -> INFO 048 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:39.687 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 049 3 became follower at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:39.687 UTC [orderer.consensus.etcdraft] Step -> INFO 04a 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:39.699 UTC [orderer.consensus.etcdraft] run -> INFO 04b raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:39.701 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04c Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:43.692 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:45.907 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:54.538 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:16:57.140 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:17:00.932 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:17:39.590 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 052 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:17:45.095 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 053 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:17:47.777 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 054 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:18:03.289 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 055 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-04-22 06:18:03.293 UTC [cauthdsl] deduplicate -> WARN 056 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer2.example.com | "2019-04-22 06:18:03.295 UTC [cauthdsl] deduplicate -> WARN 057 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer1.example.com | 2019-04-22 06:16:27.199 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2019-04-22 06:16:27.274 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +peer0.org1.example.com | 00000030 e2 62 c2 fd 03 f8 bd e0 5e 93 cd 0e 16 6c 83 b1 |.b......^....l..| +peer0.org1.example.com | 00000040 ea 5f 79 ae 29 01 ab |._y.)..|" +peer0.org1.example.com | "2019-04-22 06:16:31.257 UTC [gossip.comm] authenticateRemotePeer -> DEBU 114 Authenticated 192.168.224.5:47444" +peer0.org1.example.com | "2019-04-22 06:16:31.257 UTC [gossip.comm] GossipStream -> DEBU 115 Servicing 192.168.224.5:47444" +peer0.org1.example.com | "2019-04-22 06:16:31.272 UTC [gossip.gossip] handleMessage -> DEBU 116 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1108 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:31.272 UTC [gossip.gossip] handleMessage -> DEBU 117 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:31.272 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118 Got message: GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1108 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 119 Verify: digest = 00000000 65 b1 bf b8 a0 94 b3 f4 d4 fc 5d bf 77 7a 45 12 |e.........].wzE.| +peer0.org1.example.com | 00000010 01 5f c3 5f 89 52 a9 f9 8b 59 3d 13 62 a9 52 33 |._._.R...Y=.b.R3|" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 11a Verify: sig = 00000000 30 44 02 20 00 d8 46 a5 07 ad e7 02 01 9b df bd |0D. ..F.........| +peer0.org1.example.com | 00000010 fe b7 dc af 16 f5 2a bb 60 94 26 05 4c b5 14 a5 |......*.`.&.L...| +peer0.org1.example.com | 00000020 4e e6 2a 57 02 20 56 b0 15 5e 2d 71 43 58 9a c3 |N.*W. V..^-qCX..| +peer0.org1.example.com | 00000030 34 8e 4f ca 97 06 eb ee bc c0 4f 20 dc e8 1d 69 |4.O.......O ...i| +peer0.org1.example.com | 00000040 e4 29 84 0b ed 23 |.)...#|" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 11b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 11c Verify: sig = 00000000 30 45 02 21 00 c3 11 0b ca cc 6f 5e e6 34 dc ff |0E.!......o^.4..| +peer0.org1.example.com | 00000010 63 71 a4 93 aa 82 c2 32 ac 8d 25 c4 90 68 9f a3 |cq.....2..%..h..| +peer0.org1.example.com | 00000020 e4 cf bb 6e ab 02 20 74 99 92 b3 28 b4 6c 78 66 |...n.. t...(.lxf| +peer0.org1.example.com | 00000030 2d 15 f1 df 08 e7 e2 04 3c 75 eb b1 38 e0 8e f3 |-....... DEBU 11d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for debug +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for debug.DeliverTraceDir setting to +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for operations +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 00c Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 00d Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 014 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for metrics.Statsd.WriteInterval setting to string 30s +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for metrics.Provider setting to string prometheus +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +orderer0.example.com | 2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 020 Found map[interface{}]interface{} value for consensus +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +orderer0.example.com | 2019-04-22 06:16:27.820 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | 2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +orderer0.example.com | 2019-04-22 06:16:27.820 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +orderer0.example.com | 2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +orderer0.example.com | 2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[interface{}]interface{} value for general +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | 2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 026 Found map[string]interface{} value for general.Keepalive +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +orderer0.example.com | 2019-04-22 06:16:27.827 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer1.example.com | RAMLedger.HistorySize = 1000 +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [gossip.discovery] learnNewMembers -> DEBU 11e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +orderer0.example.com | 2019-04-22 06:16:27.831 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | 2019-04-22 06:16:27.831 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | 2019-04-22 06:16:27.831 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2019-04-22 06:16:27.831 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.831 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | 2019-04-22 06:16:27.832 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.832 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer0.example.com | 2019-04-22 06:16:27.832 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.832 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2019-04-22 06:16:27.832 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.832 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2019-04-22 06:16:27.835 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2019-04-22 06:16:27.835 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.835 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2019-04-22 06:16:27.835 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-04-22 06:16:27.835 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2019-04-22 06:16:27.835 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.LedgerType setting to string file +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03c Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] unmarshalJSON -> DEBU 03d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03e Found real value for general.BCCSP.Default setting to string SW +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03f Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2019-04-22 06:16:27.836 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value is not a string: 256 +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 044 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 047 Found map[string]interface{} value for general.Profile +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 04c Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for general.Cluster.SendBufferSize setting to string 10 +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.Cluster.ListenPort setting to +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.Cluster.ListenAddress setting to +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.Cluster.ServerCertificate setting to +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for general.Cluster.ServerPrivateKey setting to +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 05f Found map[string]interface{} value for general.TLS +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 060 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 061 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 062 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 063 Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-04-22 06:16:27.850 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2019-04-22 06:16:27.850 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 074 Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 075 Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 07a Found map[string]interface{} value for kafka.TLS +orderer0.example.com | 2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value is not a string: false +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[WALDir:/var/hyperledger/production/orderer/etcdraft/wal SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-04-22 06:16:27.374 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +orderer1.example.com | "2019-04-22 06:16:27.375 UTC [orderer.common.server] configureClusterListener -> INFO 004 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2019-04-22 06:16:27.381 UTC [fsblkstorage] newBlockfileMgr -> INFO 005 Getting block information from block storage" +orderer1.example.com | "2019-04-22 06:16:27.424 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 006 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-04-22 06:16:27.424 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 007 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.439 UTC [orderer.commmon.multichannel] Initialize -> INFO 008 Starting system channel 'testchainid' with genesis block hash bccae20aaab201a55c9ee823a533d677feba8c9063b32a630efd47c984a7033d and orderer type etcdraft" +orderer1.example.com | "2019-04-22 06:16:27.439 UTC [orderer.consensus.etcdraft] Start -> INFO 009 Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.440 UTC [orderer.common.cluster] Configure -> INFO 00a Entering, channel: testchainid, nodes: [ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 083 Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Version setting to +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 091 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2019-04-22 06:16:27.855 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0a9 map[ramledger:map[HistorySize:1000] kafka:map[Retry:map[LongTotal:12h NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Metadata:map[RetryMax:3 RetryBackoff:250ms] Producer:map[RetryBackoff:100ms RetryMax:3] Consumer:map[RetryBackoff:2s] ShortInterval:5s ShortTotal:10m LongInterval:5m] Topic:map[ReplicationFactor:3] Verbose:false TLS:map[Certificate: RootCAs: Enabled:false PrivateKey:] SASLPlain:map[Password: Enabled:false User:] Version:] debug:map[DeliverTraceDir: BroadcastTraceDir:] operations:map[TLS:map[ClientAuthRequired:false ClientRootCAs:[] Enabled:false Certificate: PrivateKey:] ListenAddress:0.0.0.0:8443] metrics:map[Statsd:map[WriteInterval:30s Prefix: Network:udp Address:127.0.0.1:8125] Provider:prometheus] consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] general:map[GenesisFile:/var/hyperledger/orderer/orderer.genesis.block BCCSP:map[Default:SW SW:map[Hash:SHA2 Security:256 FileKeyStore:map[KeyStore:]]] LocalMSPDir:/var/hyperledger/orderer/msp Authentication:map[TimeWindow:15m] LedgerType:file GenesisMethod:file Cluster:map[ListenPort: ListenAddress: ServerCertificate: ServerPrivateKey: SendBufferSize:10 ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key] ListenPort:7050 TLS:map[RootCAs:[/var/hyperledger/orderer/tls/ca.crt] ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key Certificate:/var/hyperledger/orderer/tls/server.crt] Keepalive:map[ServerMinInterval:60s ServerInterval:7200s ServerTimeout:20s] ListenAddress:0.0.0.0 GenesisProfile:SampleInsecureSolo LocalMSPID:OrdererMSP Profile:map[Enabled:false Address:0.0.0.0:6060]] fileledger:map[Prefix:hyperledger-fabric-ordererledger Location:/var/hyperledger/production/orderer]] +orderer0.example.com | 2019-04-22 06:16:27.856 UTC [localconfig] completeInitialization -> INFO 0aa Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-04-22 06:16:27.862 UTC [bccsp_sw] openKeyStore -> DEBU 0ab KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +orderer0.example.com | "2019-04-22 06:16:27.862 UTC [bccsp] initBCCSP -> DEBU 0ac Initialize BCCSP [SW]" +orderer0.example.com | "2019-04-22 06:16:27.862 UTC [msp] getPemMaterialFromDir -> DEBU 0ad Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2019-04-22 06:16:27.884 UTC [msp] getPemMaterialFromDir -> DEBU 0ae Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2019-04-22 06:16:27.891 UTC [msp] getPemMaterialFromDir -> DEBU 0af Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2019-04-22 06:16:27.897 UTC [msp] getPemMaterialFromDir -> DEBU 0b0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2019-04-22 06:16:27.903 UTC [msp] getPemMaterialFromDir -> DEBU 0b1 Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2019-04-22 06:16:27.913 UTC [msp] getPemMaterialFromDir -> DEBU 0b2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +orderer0.example.com | "2019-04-22 06:16:27.920 UTC [msp] getPemMaterialFromDir -> DEBU 0b3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2019-04-22 06:16:27.923 UTC [msp] getMspConfig -> DEBU 0b4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2019-04-22 06:16:27.923 UTC [msp] getPemMaterialFromDir -> DEBU 0b5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2019-04-22 06:16:27.934 UTC [msp] getPemMaterialFromDir -> DEBU 0b6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2019-04-22 06:16:27.937 UTC [msp] getPemMaterialFromDir -> DEBU 0b7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2019-04-22 06:16:27.938 UTC [msp] getMspConfig -> DEBU 0b8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2019-04-22 06:16:27.938 UTC [msp] getPemMaterialFromDir -> DEBU 0b9 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2019-04-22 06:16:27.939 UTC [msp] getMspConfig -> DEBU 0ba crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2019-04-22 06:16:27.939 UTC [msp] getMspConfig -> DEBU 0bb MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +orderer0.example.com | "2019-04-22 06:16:27.939 UTC [msp] newBccspMsp -> DEBU 0bc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.940 UTC [msp] New -> DEBU 0bd Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.940 UTC [msp] loadLocaMSP -> DEBU 0be Created new local MSP" +orderer0.example.com | "2019-04-22 06:16:27.940 UTC [msp] Setup -> DEBU 0bf Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:27.940 UTC [msp.identity] newIdentity -> DEBU 0c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-04-22 06:16:27.440 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-04-22 06:16:27.441 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-04-22 06:16:27.444 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-04-22 06:16:27.444 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-04-22 06:16:27.444 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 00f 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-04-22 06:16:27.444 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-04-22 06:16:27.444 UTC [orderer.common.cluster] Configure -> INFO 011 Exiting" +orderer1.example.com | "2019-04-22 06:16:27.445 UTC [orderer.consensus.etcdraft] start -> INFO 012 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.445 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 013 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.445 UTC [orderer.consensus.etcdraft] newRaft -> INFO 014 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.445 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 015 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.447 UTC [orderer.common.server] Start -> INFO 016 Starting orderer: +orderer1.example.com | Version: 2.0.0 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.11.5 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-04-22 06:16:27.448 UTC [orderer.common.server] Start -> INFO 017 Beginning to serve requests" +orderer1.example.com | "2019-04-22 06:16:27.451 UTC [orderer.consensus.etcdraft] apply -> INFO 018 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.451 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:27.451 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:28.830 UTC [orderer.consensus.etcdraft] Step -> INFO 01b 2 [term: 1] received a MsgHeartbeat message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:28.830 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01c 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:28.830 UTC [orderer.consensus.etcdraft] run -> INFO 01d raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:28.832 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 01e Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:38.521 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 01f Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2019-04-22 06:16:38.534 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +orderer1.example.com | "2019-04-22 06:16:38.557 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 021 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-04-22 06:16:38.557 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 022 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [gossip.discovery] learnNewMembers -> DEBU 11f Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [gossip.discovery] learnNewMembers -> DEBU 120 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [gossip.discovery] handleAliveMessage -> DEBU 121 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [gossip.discovery] sendMemResponse -> DEBU 123 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:31.273 UTC [msp.identity] Sign -> DEBU 124 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:31.274 UTC [msp.identity] Sign -> DEBU 125 Sign: digest: 00B7D2034AA89AFEF9224FA845145AAE6FABB7614D2365D24B3E63EF424741A5 " +peer0.org1.example.com | "2019-04-22 06:16:31.274 UTC [msp.identity] Sign -> DEBU 126 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:31.274 UTC [msp.identity] Sign -> DEBU 127 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:31.274 UTC [gossip.comm] Send -> DEBU 128 Entering, sending GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:31.274 UTC [gossip.discovery] sendMemResponse -> DEBU 129 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:31.274 UTC [gossip.comm] sendToEndpoint -> DEBU 12a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:31.274 UTC [gossip.comm] sendToEndpoint -> DEBU 12b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.874 UTC [gossip.pull] Hello -> DEBU 12c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:34.874 UTC [msp.identity] Sign -> DEBU 12d Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:34.875 UTC [msp.identity] Sign -> DEBU 12f Sign: digest: 940083C1871AA2ABBBCE580D185EFCB20D00AB2B1E549B331393AF321FF40B4E " +peer0.org1.example.com | "2019-04-22 06:16:34.875 UTC [msp.identity] Sign -> DEBU 130 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:34.875 UTC [msp.identity] Sign -> DEBU 131 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:34.875 UTC [gossip.comm] Send -> DEBU 12e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:34.876 UTC [gossip.comm] Send -> DEBU 132 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:34.877 UTC [gossip.comm] sendToEndpoint -> DEBU 133 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.940 UTC [msp.identity] newIdentity -> DEBU 0c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.948 UTC [msp.identity] newIdentity -> DEBU 0c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.955 UTC [bccsp_sw] loadPrivateKey -> DEBU 0c3 Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +orderer0.example.com | "2019-04-22 06:16:27.965 UTC [msp.identity] newIdentity -> DEBU 0c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.966 UTC [msp] setupSigningIdentity -> DEBU 0c5 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +orderer0.example.com | "2019-04-22 06:16:27.966 UTC [msp] Validate -> DEBU 0c6 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:27.967 UTC [orderer.common.server] prettyPrintStruct -> INFO 0c7 Orderer config values: orderer0.example.com | General.LedgerType = "file" -kafka1 | advertised.port = null -peer0.org1.example.com | [034 02-28 03:16:14.28 UTC] [%{longpkg}] %{callpath} -> INFO [][c165adbc] Exit chaincode: name:"cscc" (1ms) -orderer1.example.com | [006 02-28 03:15:33.69 UTC] [%{longpkg}] %{callpath} -> INFO Starting system channel 'testchainid' with genesis block hash 771af1716c1f80986256250b678791d672cb8b75b2d5b8871393510f89d488d7 and orderer type kafka -peer1.org1.example.com | [03a 02-28 03:16:18.71 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer1.org2.example.com | [033 02-28 03:16:15.94 UTC] [%{longpkg}] %{callpath} -> INFO [][54673241] Entry chaincode: name:"qscc" -kafka3 | alter.config.policy.class.name = null -kafka0 | advertised.port = null -zookeeper0 | 2019-02-28 03:15:32,284 [myid:1] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 -zookeeper1 | 2019-02-28 03:15:32,173 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/172.28.0.4 -zookeeper2 | ZooKeeper JMX enabled by default orderer0.example.com | General.ListenAddress = "0.0.0.0" -kafka2 | [2019-02-28 03:15:42,714] INFO KafkaConfig values: -orderer1.example.com | [007 02-28 03:15:33.70 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the topic for this channel... -kafka1 | alter.config.policy.class.name = null -peer0.org2.example.com | Go version: go1.11.5 -peer1.org2.example.com | [034 02-28 03:16:15.94 UTC] [%{longpkg}] %{callpath} -> INFO [][54673241] Exit chaincode: name:"qscc" (2ms) -peer1.org1.example.com | [03b 02-28 03:16:18.71 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -kafka3 | authorizer.class.name = -kafka0 | alter.config.policy.class.name = null -peer0.org1.example.com | [035 02-28 03:16:14.28 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45244 grpc.code=OK grpc.call_duration=2.1875ms -zookeeper2 | Using config: /conf/zoo.cfg orderer0.example.com | General.ListenPort = 7050 -zookeeper0 | 2019-02-28 03:15:32,315 [myid:1] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. -kafka2 | advertised.host.name = null -zookeeper1 | 2019-02-28 03:15:32,180 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/172.28.0.3 -orderer1.example.com | [008 02-28 03:15:33.73 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer: -kafka1 | authorizer.class.name = -peer0.org2.example.com | OS/Arch: linux/amd64 -peer1.org2.example.com | [035 02-28 03:16:15.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50622 grpc.code=OK grpc.call_duration=3.9552ms -kafka3 | auto.create.topics.enable = true -kafka0 | authorizer.class.name = -peer1.org1.example.com | [03c 02-28 03:16:18.71 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found orderer0.example.com | General.TLS.Enabled = true -peer0.org1.example.com | [036 02-28 03:16:15.34 UTC] [%{longpkg}] %{callpath} -> INFO [][3f29bc9d] Entry chaincode: name:"qscc" -orderer1.example.com | Version: 1.4.0 -kafka2 | advertised.listeners = null -kafka1 | auto.create.topics.enable = true -zookeeper1 | 2019-02-28 03:15:32,202 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/172.28.0.2 -peer0.org2.example.com | Chaincode: -peer1.org2.example.com | [036 02-28 03:16:19.69 UTC] [%{longpkg}] %{callpath} -> INFO 563a66c461a1e7be99c7e7b44a172f5dd83b0757e7951f8eb96202f9994a664b : Becoming a leader -zookeeper2 | 2019-02-28 03:15:31,889 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg -zookeeper0 | 2019-02-28 03:15:32,654 [myid:1] - INFO [main:QuorumPeerMain@127] - Starting quorum peer -kafka3 | auto.leader.rebalance.enable = true -kafka0 | auto.create.topics.enable = true orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" -orderer1.example.com | Commit SHA: development build -kafka2 | advertised.port = null -peer1.org1.example.com | [03d 02-28 03:16:18.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 79ms -kafka1 | auto.leader.rebalance.enable = true -peer0.org1.example.com | [037 02-28 03:16:15.34 UTC] [%{longpkg}] %{callpath} -> INFO [][3f29bc9d] Exit chaincode: name:"qscc" (2ms) -peer0.org2.example.com | Base Docker Namespace: hyperledger -zookeeper2 | 2019-02-28 03:15:32,233 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/172.28.0.4 -peer1.org2.example.com | [037 02-28 03:16:19.69 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel -kafka0 | auto.leader.rebalance.enable = true orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" -zookeeper1 | 2019-02-28 03:15:32,202 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums -orderer1.example.com | Go version: go1.11.5 -kafka2 | alter.config.policy.class.name = null -kafka3 | background.threads = 10 -peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric -zookeeper2 | 2019-02-28 03:15:32,267 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/172.28.0.3 -peer1.org1.example.com | [03e 02-28 03:16:18.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 47ms (state_validation=11ms block_commit=18ms state_commit=12ms) -kafka1 | background.threads = 10 -zookeeper0 | 2019-02-28 03:15:33,293 [myid:1] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. -peer0.org1.example.com | [038 02-28 03:16:15.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45252 grpc.code=OK grpc.call_duration=3.434ms -peer1.org2.example.com | [038 02-28 03:16:19.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -kafka0 | background.threads = 10 orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] -zookeeper1 | 2019-02-28 03:15:32,236 [myid:2] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 -kafka2 | authorizer.class.name = -kafka3 | broker.id = 3 -orderer1.example.com | OS/Arch: linux/amd64 -peer0.org2.example.com | Docker Namespace: hyperledger -kafka1 | broker.id = 1 -zookeeper2 | 2019-02-28 03:15:32,325 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/172.28.0.2 -peer1.org2.example.com | [039 02-28 03:16:19.73 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -kafka0 | broker.id = 0 -zookeeper0 | 2019-02-28 03:15:33,513 [myid:1] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 orderer0.example.com | General.TLS.ClientAuthRequired = false -kafka2 | auto.create.topics.enable = true -zookeeper1 | 2019-02-28 03:15:32,242 [myid:2] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 -kafka3 | broker.id.generation.enable = true -peer0.org2.example.com | [002 02-28 03:15:36.30 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -orderer1.example.com | [009 02-28 03:15:33.73 UTC] [%{longpkg}] %{callpath} -> INFO Beginning to serve requests -peer1.org1.example.com | [03f 02-28 03:16:18.95 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:20.949Z grpc.peer_address=172.28.0.13:37970 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=153.8µs -kafka1 | broker.id.generation.enable = true -zookeeper2 | 2019-02-28 03:15:32,332 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums -peer0.org1.example.com | [039 02-28 03:16:17.64 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] -peer1.org2.example.com | [03a 02-28 03:16:19.73 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -kafka0 | broker.id.generation.enable = true -zookeeper0 | 2019-02-28 03:15:33,516 [myid:1] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 orderer0.example.com | General.TLS.ClientRootCAs = [] -kafka2 | auto.leader.rebalance.enable = true -zookeeper1 | 2019-02-28 03:15:32,301 [myid:2] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. -kafka3 | broker.rack = null -peer0.org2.example.com | [003 02-28 03:15:36.30 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -orderer1.example.com | [00a 02-28 03:15:56.71 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the producer for this channel... -kafka1 | broker.rack = null -zookeeper2 | 2019-02-28 03:15:32,495 [myid:3] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 -peer1.org1.example.com | [040 02-28 03:16:18.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -peer0.org1.example.com | [03a 02-28 03:16:18.67 UTC] [%{longpkg}] %{callpath} -> INFO c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9 : Becoming a leader -peer1.org2.example.com | [03b 02-28 03:16:19.73 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] orderer0.example.com | General.Cluster.ListenAddress = "" -kafka2 | background.threads = 10 -zookeeper0 | 2019-02-28 03:15:33,589 [myid:1] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 -zookeeper1 | 2019-02-28 03:15:32,826 [myid:2] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. -kafka3 | compression.type = producer -kafka0 | broker.rack = null -peer0.org2.example.com | [004 02-28 03:15:36.50 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -orderer1.example.com | [00b 02-28 03:15:56.83 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Producer set up successfully -zookeeper2 | 2019-02-28 03:15:32,501 [myid:3] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 -kafka1 | compression.type = producer -peer1.org2.example.com | [03c 02-28 03:16:19.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 34ms -peer0.org1.example.com | [03b 02-28 03:16:18.68 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel orderer0.example.com | General.Cluster.ListenPort = 0 -peer1.org1.example.com | [041 02-28 03:16:19.03 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -kafka2 | broker.id = 2 -zookeeper0 | 2019-02-28 03:15:33,589 [myid:1] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 -zookeeper1 | 2019-02-28 03:15:32,904 [myid:2] - INFO [main:QuorumPeerMain@127] - Starting quorum peer -kafka3 | connections.max.idle.ms = 600000 -kafka0 | compression.type = producer -peer0.org2.example.com | [005 02-28 03:15:36.61 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -orderer1.example.com | [00c 02-28 03:15:56.83 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] About to post the CONNECT message... -zookeeper2 | 2019-02-28 03:15:32,579 [myid:3] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. -kafka1 | connections.max.idle.ms = 600000 -peer1.org2.example.com | [03d 02-28 03:16:19.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 19ms (state_validation=1ms block_commit=11ms state_commit=4ms) orderer0.example.com | General.Cluster.ServerCertificate = "" -kafka2 | broker.id.generation.enable = true -peer1.org1.example.com | [042 02-28 03:16:19.03 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer0.org1.example.com | [03c 02-28 03:16:18.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -zookeeper1 | 2019-02-28 03:15:33,291 [myid:2] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 -kafka0 | connections.max.idle.ms = 600000 -peer0.org2.example.com | [006 02-28 03:15:36.62 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.12:7051 -kafka3 | controlled.shutdown.enable = true -orderer1.example.com | [00d 02-28 03:15:59.14 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] CONNECT message posted successfully -zookeeper2 | 2019-02-28 03:15:33,306 [myid:3] - INFO [main:QuorumPeerMain@127] - Starting quorum peer orderer0.example.com | General.Cluster.ServerPrivateKey = "" -kafka2 | broker.rack = null -peer1.org2.example.com | [03e 02-28 03:16:19.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -kafka1 | controlled.shutdown.enable = true -zookeeper1 | 2019-02-28 03:15:33,357 [myid:2] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 -kafka0 | controlled.shutdown.enable = true -peer1.org1.example.com | [043 02-28 03:16:19.04 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org2.example.com | [007 02-28 03:15:36.63 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 -peer0.org1.example.com | [03d 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -zookeeper2 | 2019-02-28 03:15:33,334 [myid:3] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. -orderer0.example.com | General.Cluster.ClientCertificate = "" -orderer1.example.com | [00e 02-28 03:15:59.14 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the parent consumer for this channel... -peer1.org2.example.com | [03f 02-28 03:16:19.79 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -kafka2 | compression.type = producer -kafka3 | controlled.shutdown.max.retries = 3 -kafka0 | controlled.shutdown.max.retries = 3 -kafka1 | controlled.shutdown.max.retries = 3 -zookeeper0 | 2019-02-28 03:15:33,589 [myid:1] - INFO [main:QuorumPeer@1065] - initLimit set to 5 -peer0.org2.example.com | [008 02-28 03:15:36.63 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.12:7051 -zookeeper1 | 2019-02-28 03:15:33,392 [myid:2] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 -peer0.org1.example.com | [03e 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer1.org1.example.com | [044 02-28 03:16:19.04 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -orderer1.example.com | [00f 02-28 03:15:59.14 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Parent consumer set up successfully -peer1.org2.example.com | [040 02-28 03:16:19.79 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -orderer0.example.com | General.Cluster.ClientPrivateKey = "" -kafka0 | controlled.shutdown.retry.backoff.ms = 5000 -kafka2 | connections.max.idle.ms = 600000 -kafka1 | controlled.shutdown.retry.backoff.ms = 5000 -kafka3 | controlled.shutdown.retry.backoff.ms = 5000 -peer0.org2.example.com | [009 02-28 03:15:36.63 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 -zookeeper1 | 2019-02-28 03:15:33,393 [myid:2] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 -zookeeper2 | 2019-02-28 03:15:33,826 [myid:3] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 -peer0.org1.example.com | [03f 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -orderer1.example.com | [010 02-28 03:15:59.15 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)... -peer1.org2.example.com | [041 02-28 03:16:19.79 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -orderer0.example.com | General.Cluster.RootCAs = [/etc/hyperledger/fabric/tls/ca.crt] -kafka2 | controlled.shutdown.enable = true -kafka0 | controller.socket.timeout.ms = 30000 -kafka1 | controller.socket.timeout.ms = 30000 -peer1.org1.example.com | [045 02-28 03:16:19.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 84ms -kafka3 | controller.socket.timeout.ms = 30000 -zookeeper0 | 2019-02-28 03:15:33,814 [myid:1] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation -zookeeper1 | 2019-02-28 03:15:33,404 [myid:2] - INFO [main:QuorumPeer@1065] - initLimit set to 5 -zookeeper2 | 2019-02-28 03:15:33,836 [myid:3] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 -peer0.org2.example.com | [00a 02-28 03:15:36.70 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -peer0.org1.example.com | [040 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -orderer1.example.com | [011 02-28 03:15:59.16 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Channel consumer set up successfully -peer1.org2.example.com | [042 02-28 03:16:19.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 53ms +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [] orderer0.example.com | General.Cluster.DialTimeout = 5s -kafka2 | controlled.shutdown.max.retries = 3 -kafka0 | create.topic.policy.class.name = null -kafka1 | create.topic.policy.class.name = null -kafka3 | create.topic.policy.class.name = null -zookeeper2 | 2019-02-28 03:15:33,836 [myid:3] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 -peer1.org1.example.com | [046 02-28 03:16:19.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 20ms (state_validation=6ms block_commit=9ms state_commit=2ms) -zookeeper1 | 2019-02-28 03:15:33,624 [myid:2] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation -peer0.org2.example.com | [00b 02-28 03:15:36.73 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com -peer0.org1.example.com | [041 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 70ms -peer1.org2.example.com | [043 02-28 03:16:19.86 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 35ms (state_validation=1ms block_commit=25ms state_commit=4ms) -orderer1.example.com | [012 02-28 03:15:59.16 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Start phase completed successfully orderer0.example.com | General.Cluster.RPCTimeout = 7s -kafka2 | controlled.shutdown.retry.backoff.ms = 5000 -zookeeper0 | 2019-02-28 03:15:33,850 [myid:1] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation -kafka1 | default.replication.factor = 3 -kafka0 | default.replication.factor = 3 -kafka3 | default.replication.factor = 3 -zookeeper2 | 2019-02-28 03:15:33,848 [myid:3] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 -peer0.org2.example.com | [00c 02-28 03:15:36.73 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org2.example.com:7052 -peer1.org1.example.com | [047 02-28 03:16:19.16 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.13:37970 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=209.7254ms -orderer1.example.com | [013 02-28 03:16:08.96 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -peer1.org2.example.com | [044 02-28 03:16:20.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:22.632Z grpc.peer_address=172.28.0.13:33118 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.5µs -peer0.org1.example.com | [042 02-28 03:16:18.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:20.766Z grpc.peer_address=172.28.0.15:41640 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=174.2µs orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 -kafka2 | controller.socket.timeout.ms = 30000 -kafka1 | delete.records.purgatory.purge.interval.requests = 1 -kafka0 | delete.records.purgatory.purge.interval.requests = 1 -kafka3 | delete.records.purgatory.purge.interval.requests = 1 -zookeeper1 | 2019-02-28 03:15:33,695 [myid:2] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation -zookeeper0 | 2019-02-28 03:15:33,935 [myid:1] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper0/172.28.0.2:3888 -zookeeper2 | 2019-02-28 03:15:33,850 [myid:3] - INFO [main:QuorumPeer@1065] - initLimit set to 5 -peer0.org2.example.com | [00d 02-28 03:15:36.75 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -orderer1.example.com | [014 02-28 03:16:09.01 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block 0 -peer1.org2.example.com | [045 02-28 03:16:20.92 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1551323772945459200 seq_num:1551323779110964000 PKI-id:ebda318a4e484fcb0c5c762138cdb64773221bd0b0c88909e40b57ad8cb726c6 channel MAC:907a89c05559e9e3aaa28ee947ed0fdf7000905a39e3f765f4d59ba78320e77a properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s -kafka2 | create.topic.policy.class.name = null -kafka1 | delete.topic.enable = true -peer0.org1.example.com | [043 02-28 03:16:18.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 29ms (state_validation=2ms block_commit=17ms state_commit=5ms) -peer1.org1.example.com | [048 02-28 03:16:20.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:22.629Z grpc.peer_address=172.28.0.13:38004 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=353.3µs -kafka3 | delete.topic.enable = true -kafka0 | delete.topic.enable = true -zookeeper1 | 2019-02-28 03:15:33,801 [myid:2] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper1/172.28.0.3:3888 -zookeeper0 | 2019-02-28 03:15:34,185 [myid:1] - INFO [zookeeper0/172.28.0.2:3888:QuorumCnxManager$Listener@541] - Received connection request /172.28.0.3:42030 -zookeeper2 | 2019-02-28 03:15:34,088 [myid:3] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation -peer0.org2.example.com | [00e 02-28 03:15:36.75 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -orderer1.example.com | [015 02-28 03:16:09.01 UTC] [%{longpkg}] %{callpath} -> INFO Created and starting new chain businesschannel -peer1.org2.example.com | [046 02-28 03:16:20.92 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1551323772945459200 seq_num:1551323779110964000 PKI-id:ebda318a4e484fcb0c5c762138cdb64773221bd0b0c88909e40b57ad8cb726c6 channel MAC:907a89c05559e9e3aaa28ee947ed0fdf7000905a39e3f765f4d59ba78320e77a properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes isn't valid -kafka2 | default.replication.factor = 3 orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s -kafka1 | fetch.purgatory.purge.interval.requests = 1000 -kafka3 | fetch.purgatory.purge.interval.requests = 1000 -peer1.org1.example.com | [049 02-28 03:16:22.91 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]] -peer0.org1.example.com | [044 02-28 03:16:18.78 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:28.77Z grpc.peer_address=172.28.0.15:41640 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.078ms -kafka0 | fetch.purgatory.purge.interval.requests = 1000 -zookeeper1 | 2019-02-28 03:15:34,051 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer@774] - LOOKING -zookeeper0 | 2019-02-28 03:15:34,273 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer@774] - LOOKING -zookeeper2 | 2019-02-28 03:15:34,202 [myid:3] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation -peer0.org2.example.com | [00f 02-28 03:15:36.75 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -orderer1.example.com | [016 02-28 03:16:09.01 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the topic for this channel... -peer1.org2.example.com | [047 02-28 03:16:23.65 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]] -kafka2 | delete.records.purgatory.purge.interval.requests = 1 orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s -kafka1 | group.initial.rebalance.delay.ms = 0 -kafka3 | group.initial.rebalance.delay.ms = 0 -peer1.org1.example.com | [04a 02-28 03:16:25.66 UTC] [%{longpkg}] %{callpath} -> INFO [][ea987ce2] Entry chaincode: name:"lscc" -zookeeper1 | 2019-02-28 03:15:34,053 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 2, proposed zxid=0x0 -peer0.org1.example.com | [045 02-28 03:16:18.78 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.15:41244 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=41.2371078s -kafka0 | group.initial.rebalance.delay.ms = 0 -peer0.org2.example.com | [010 02-28 03:15:36.76 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -orderer1.example.com | [017 02-28 03:16:09.55 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the producer for this channel... -peer1.org2.example.com | [048 02-28 03:16:24.24 UTC] [%{longpkg}] %{callpath} -> INFO 563a66c461a1e7be99c7e7b44a172f5dd83b0757e7951f8eb96202f9994a664b Stopped being a leader -kafka2 | delete.topic.enable = true -zookeeper2 | 2019-02-28 03:15:34,311 [myid:3] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper2/172.28.0.4:3888 orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 -kafka1 | group.max.session.timeout.ms = 300000 -zookeeper0 | 2019-02-28 03:15:34,292 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 1, proposed zxid=0x0 -kafka3 | group.max.session.timeout.ms = 300000 -peer1.org1.example.com | [04b 02-28 03:16:25.67 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -zookeeper1 | 2019-02-28 03:15:34,280 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -kafka0 | group.max.session.timeout.ms = 300000 -peer0.org2.example.com | [011 02-28 03:15:36.79 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] -peer1.org2.example.com | [049 02-28 03:16:24.24 UTC] [%{longpkg}] %{callpath} -> INFO Renounced leadership, stopping delivery service for channel businesschannel -peer0.org1.example.com | [046 02-28 03:16:18.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -orderer1.example.com | [018 02-28 03:16:09.63 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Producer set up successfully -kafka2 | fetch.purgatory.purge.interval.requests = 1000 -zookeeper2 | 2019-02-28 03:15:34,379 [myid:3] - INFO [zookeeper2/172.28.0.4:3888:QuorumCnxManager$Listener@541] - Received connection request /172.28.0.2:40814 orderer0.example.com | General.Cluster.SendBufferSize = 10 -kafka1 | group.min.session.timeout.ms = 6000 -kafka3 | group.min.session.timeout.ms = 6000 -kafka0 | group.min.session.timeout.ms = 6000 -peer0.org2.example.com | [012 02-28 03:15:36.85 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca, Metadata: -peer1.org1.example.com | [04c 02-28 03:16:25.67 UTC] [%{longpkg}] %{callpath} -> INFO [][ea987ce2] Exit chaincode: name:"lscc" (3ms) -peer1.org2.example.com | [04a 02-28 03:16:24.24 UTC] [%{longpkg}] %{callpath} -> WARN Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s -orderer1.example.com | [019 02-28 03:16:09.63 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] About to post the CONNECT message... -zookeeper0 | 2019-02-28 03:15:34,298 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -zookeeper2 | 2019-02-28 03:15:34,485 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:QuorumPeer@774] - LOOKING +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | "2019-04-22 06:16:38.578 UTC [orderer.commmon.multichannel] newChain -> INFO 023 Created and starting new chain businesschannel" +orderer1.example.com | "2019-04-22 06:16:38.578 UTC [orderer.consensus.etcdraft] Start -> INFO 024 Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:38.578 UTC [orderer.common.cluster] Configure -> INFO 025 Entering, channel: businesschannel, nodes: [ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer1.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer1.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQaZsP4vewNaflCD/agfgCGjAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAET5yTHRTMEC8IX1fL3US4pW1nzw7sRyxtblVTJjUoWDMm +orderer1.example.com | IbjyUvAZR2RPK9iYCpgQy+vDCwcpOhwgmMHgfRFC8KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgHgWsUT2ToC9rKY+WwCJQd3q4LsDh8YV2+3oSfzcPKvkw +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIDRimi9ONDbN8zvwUWtV3M9CTbASN+dL+jkJQ3dJ9XcUAiAx +orderer1.example.com | JfS5IxdnUZy+LAAMjSW22lN3aaxil6FzwMJWtQ7ymw== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-04-22 06:16:38.579 UTC [orderer.common.cluster] updateStubInMapping -> INFO 026 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-04-22 06:16:38.579 UTC [orderer.common.cluster] updateStubInMapping -> INFO 027 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-04-22 06:16:38.579 UTC [orderer.common.cluster] updateStubInMapping -> INFO 028 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-04-22 06:16:38.579 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-04-22 06:16:38.580 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02a 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-04-22 06:16:38.580 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02b 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-04-22 06:16:38.581 UTC [orderer.common.cluster] Configure -> INFO 02c Exiting" +orderer1.example.com | "2019-04-22 06:16:38.582 UTC [orderer.consensus.etcdraft] start -> INFO 02d Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:38.583 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 02e 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:38.583 UTC [orderer.consensus.etcdraft] newRaft -> INFO 02f newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:38.584 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 030 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:38.595 UTC [orderer.consensus.etcdraft] apply -> INFO 031 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:38.595 UTC [orderer.consensus.etcdraft] apply -> INFO 032 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:38.595 UTC [orderer.consensus.etcdraft] apply -> INFO 033 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:39.677 UTC [orderer.consensus.etcdraft] Step -> INFO 034 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:39.689 UTC [orderer.consensus.etcdraft] Step -> INFO 035 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:39.689 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 036 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:39.689 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:39.697 UTC [orderer.consensus.etcdraft] run -> INFO 038 raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:39.698 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 039 Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:43.665 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03a Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:45.907 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03b Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:51.983 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.7:38310 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.7683046s +orderer1.example.com | "2019-04-22 06:16:54.536 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:16:57.136 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:17:00.931 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:17:39.589 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:17:45.094 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:17:47.779 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:18:03.294 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-04-22 06:18:03.306 UTC [cauthdsl] deduplicate -> WARN 044 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer1.example.com | "2019-04-22 06:18:03.307 UTC [cauthdsl] deduplicate -> WARN 045 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s -zookeeper1 | 2019-02-28 03:15:34,342 [myid:2] - WARN [WorkerSender[myid=2]:QuorumCnxManager@400] - Cannot open channel to 3 at election address zookeeper2/172.28.0.4:3888 -peer0.org1.example.com | [047 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -kafka1 | host.name = -kafka2 | group.initial.rebalance.delay.ms = 0 -kafka3 | host.name = -kafka0 | host.name = -peer0.org2.example.com | [013 02-28 03:15:36.85 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org2.example.com:7051 started -peer1.org2.example.com | [04b 02-28 03:16:24.24 UTC] [%{longpkg}] %{callpath} -> WARN [businesschannel] Receive error: client is closing -orderer1.example.com | [01a 02-28 03:16:11.61 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] CONNECT message posted successfully -zookeeper0 | 2019-02-28 03:15:34,353 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s -peer1.org1.example.com | [04d 02-28 03:16:25.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:49230 grpc.code=OK grpc.call_duration=4.2135ms -zookeeper1 | java.net.ConnectException: Connection refused (Connection refused) -kafka1 | inter.broker.listener.name = null -zookeeper2 | 2019-02-28 03:15:34,562 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 3, proposed zxid=0x0 -kafka2 | group.max.session.timeout.ms = 300000 -kafka3 | inter.broker.listener.name = null -kafka0 | inter.broker.listener.name = null -peer0.org1.example.com | [048 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org2.example.com | [014 02-28 03:15:36.85 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org2.example.com | [04c 02-28 03:16:27.73 UTC] [%{longpkg}] %{callpath} -> INFO [][ca057568] Entry chaincode: name:"lscc" -orderer1.example.com | [01b 02-28 03:16:11.61 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the parent consumer for this channel... -zookeeper0 | 2019-02-28 03:15:34,420 [myid:1] - INFO [WorkerSender[myid=1]:QuorumCnxManager@199] - Have smaller server identifier, so dropping the connection: (3, 1) orderer0.example.com | General.Keepalive.ServerTimeout = 20s -zookeeper1 | at java.net.PlainSocketImpl.socketConnect(Native Method) -peer1.org1.example.com | [04e 02-28 03:16:25.68 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:27.681Z grpc.peer_address=172.28.0.14:44292 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=238.9µs -kafka2 | group.min.session.timeout.ms = 6000 -kafka3 | inter.broker.protocol.version = 1.0-IV0 -kafka1 | inter.broker.protocol.version = 1.0-IV0 -kafka0 | inter.broker.protocol.version = 1.0-IV0 -zookeeper2 | 2019-02-28 03:15:34,613 [myid:3] - INFO [zookeeper2/172.28.0.4:3888:QuorumCnxManager$Listener@541] - Received connection request /172.28.0.2:40816 -peer0.org2.example.com | [015 02-28 03:15:36.87 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org2.example.com | [04d 02-28 03:16:27.73 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -zookeeper0 | 2019-02-28 03:15:34,432 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -orderer1.example.com | [01c 02-28 03:16:11.63 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Parent consumer set up successfully -zookeeper1 | at java.net.AbstractPlainSocketImpl.doConnect(AbstractPlainSocketImpl.java:350) orderer0.example.com | General.GenesisMethod = "file" -kafka2 | host.name = -peer1.org1.example.com | [04f 02-28 03:16:32.91 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] -peer0.org1.example.com | [049 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -kafka3 | leader.imbalance.check.interval.seconds = 300 -kafka1 | leader.imbalance.check.interval.seconds = 300 -kafka0 | leader.imbalance.check.interval.seconds = 300 -zookeeper2 | 2019-02-28 03:15:34,676 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -peer0.org2.example.com | [016 02-28 03:15:36.87 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org2.example.com | [04e 02-28 03:16:27.73 UTC] [%{longpkg}] %{callpath} -> INFO [][ca057568] Exit chaincode: name:"lscc" (1ms) -zookeeper0 | 2019-02-28 03:15:34,433 [myid:1] - INFO [WorkerSender[myid=1]:QuorumCnxManager@199] - Have smaller server identifier, so dropping the connection: (3, 1) -zookeeper1 | at java.net.AbstractPlainSocketImpl.connectToAddress(AbstractPlainSocketImpl.java:206) orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" -kafka2 | inter.broker.listener.name = null -peer0.org1.example.com | [04a 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer1.org1.example.com | [050 02-28 03:17:13.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -kafka3 | leader.imbalance.per.broker.percentage = 10 -kafka1 | leader.imbalance.per.broker.percentage = 10 -kafka0 | leader.imbalance.per.broker.percentage = 10 -peer0.org2.example.com | [017 02-28 03:15:36.88 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -orderer1.example.com | [01d 02-28 03:16:11.63 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)... -zookeeper2 | 2019-02-28 03:15:34,676 [myid:3] - WARN [RecvWorker:1:QuorumCnxManager$RecvWorker@813] - Interrupting SendWorker -zookeeper0 | 2019-02-28 03:15:34,455 [myid:1] - INFO [zookeeper0/172.28.0.2:3888:QuorumCnxManager$Listener@541] - Received connection request /172.28.0.4:59190 -peer1.org2.example.com | [04f 02-28 03:16:27.73 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50688 grpc.code=OK grpc.call_duration=2.3534ms -zookeeper1 | at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:188) orderer0.example.com | General.SystemChannel = "test-system-channel-name" -kafka2 | inter.broker.protocol.version = 1.0-IV0 -kafka3 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL -peer0.org1.example.com | [04b 02-28 03:16:19.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 140ms -kafka1 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL -peer1.org1.example.com | [051 02-28 03:17:13.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 8ms -kafka0 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL -peer0.org2.example.com | [018 02-28 03:15:36.88 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -zookeeper2 | 2019-02-28 03:15:34,707 [myid:3] - WARN [SendWorker:1:QuorumCnxManager$SendWorker@732] - Exception when using channel: for id 1 my id = 3 error = java.net.SocketException: Socket closed -zookeeper0 | 2019-02-28 03:15:34,624 [myid:1] - WARN [RecvWorker:3:QuorumCnxManager$RecvWorker@810] - Connection broken for id 3, my id = 1, error = -zookeeper1 | at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392) -orderer1.example.com | [01e 02-28 03:16:11.74 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Channel consumer set up successfully orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" -kafka3 | listeners = null -kafka2 | leader.imbalance.check.interval.seconds = 300 -peer1.org2.example.com | [050 02-28 03:16:28.65 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]] -kafka1 | listeners = null -peer0.org1.example.com | [04c 02-28 03:16:19.11 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.117Z grpc.peer_address=172.28.0.15:41654 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=183.5µs -kafka0 | listeners = null -peer0.org2.example.com | [019 02-28 03:15:36.88 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -zookeeper0 | java.net.SocketException: Connection reset -peer1.org1.example.com | [052 02-28 03:17:13.91 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] -zookeeper1 | at java.net.Socket.connect(Socket.java:589) orderer0.example.com | General.Profile.Enabled = false -kafka3 | log.cleaner.backoff.ms = 15000 -kafka2 | leader.imbalance.per.broker.percentage = 10 -orderer1.example.com | [01f 02-28 03:16:11.77 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Start phase completed successfully -zookeeper2 | 2019-02-28 03:15:34,716 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -kafka1 | log.cleaner.backoff.ms = 15000 -peer1.org2.example.com | [051 02-28 03:17:12.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50700 grpc.code=OK grpc.call_duration=3.9859ms -peer0.org2.example.com | [01a 02-28 03:15:36.89 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -zookeeper0 | at java.net.SocketInputStream.read(SocketInputStream.java:210) -peer0.org1.example.com | [04d 02-28 03:16:19.16 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.123Z grpc.peer_address=172.28.0.15:41654 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.063ms -zookeeper1 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.connectOne(QuorumCnxManager.java:381) -peer1.org1.example.com | [053 02-28 03:17:13.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 43ms (state_validation=19ms block_commit=17ms state_commit=3ms) orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" -kafka2 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL -kafka3 | log.cleaner.dedupe.buffer.size = 134217728 -kafka0 | log.cleaner.backoff.ms = 15000 -zookeeper2 | 2019-02-28 03:15:34,747 [myid:3] - WARN [SendWorker:1:QuorumCnxManager$SendWorker@736] - Send worker leaving thread -orderer1.example.com | [020 02-28 03:18:19.83 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -kafka1 | log.cleaner.dedupe.buffer.size = 134217728 -peer1.org2.example.com | [052 02-28 03:17:13.89 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -peer0.org2.example.com | [01b 02-28 03:15:36.89 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -zookeeper0 | at java.net.SocketInputStream.read(SocketInputStream.java:141) -zookeeper1 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.toSend(QuorumCnxManager.java:354) -kafka2 | listeners = null orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" -peer0.org1.example.com | [04e 02-28 03:16:19.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 80ms (state_validation=0ms block_commit=38ms state_commit=6ms) -kafka3 | log.cleaner.delete.retention.ms = 86400000 -peer1.org1.example.com | [054 02-28 03:17:57.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -kafka0 | log.cleaner.dedupe.buffer.size = 134217728 -kafka1 | log.cleaner.delete.retention.ms = 86400000 -orderer1.example.com | [021 02-28 03:18:19.83 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -zookeeper2 | 2019-02-28 03:15:34,764 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LEADING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -peer1.org2.example.com | [053 02-28 03:17:13.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 16ms -peer0.org2.example.com | [01c 02-28 03:15:36.90 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -zookeeper0 | at java.net.SocketInputStream.read(SocketInputStream.java:224) -zookeeper1 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.process(FastLeaderElection.java:452) -kafka2 | log.cleaner.backoff.ms = 15000 orderer0.example.com | General.LocalMSPID = "OrdererMSP" -kafka3 | log.cleaner.enable = true -kafka0 | log.cleaner.delete.retention.ms = 86400000 -kafka1 | log.cleaner.enable = true -peer1.org1.example.com | [055 02-28 03:17:57.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 17ms -peer0.org1.example.com | [04f 02-28 03:16:19.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.333Z grpc.peer_address=172.28.0.12:50100 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=330.3µs -zookeeper2 | 2019-02-28 03:15:34,814 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -peer1.org2.example.com | [054 02-28 03:17:13.92 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] -peer0.org2.example.com | [01d 02-28 03:15:36.90 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] -zookeeper0 | at java.io.DataInputStream.readInt(DataInputStream.java:387) -zookeeper1 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.run(FastLeaderElection.java:433) -kafka2 | log.cleaner.dedupe.buffer.size = 134217728 orderer0.example.com | General.BCCSP.ProviderName = "SW" -kafka3 | log.cleaner.io.buffer.load.factor = 0.9 -kafka0 | log.cleaner.enable = true -kafka1 | log.cleaner.io.buffer.load.factor = 0.9 -peer1.org1.example.com | [056 02-28 03:17:57.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 22ms (state_validation=1ms block_commit=14ms state_commit=2ms) -peer0.org1.example.com | [050 02-28 03:16:19.35 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.338Z grpc.peer_address=172.28.0.12:50100 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.1912ms -zookeeper2 | 2019-02-28 03:15:34,988 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), FOLLOWING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -peer0.org2.example.com | [01e 02-28 03:15:36.90 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] -peer1.org2.example.com | [055 02-28 03:17:13.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 29ms (state_validation=2ms block_commit=13ms state_commit=4ms) -zookeeper0 | at org.apache.zookeeper.server.quorum.QuorumCnxManager$RecvWorker.run(QuorumCnxManager.java:795) orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 -kafka2 | log.cleaner.delete.retention.ms = 86400000 -kafka0 | log.cleaner.io.buffer.load.factor = 0.9 -kafka1 | log.cleaner.io.buffer.size = 524288 -kafka3 | log.cleaner.io.buffer.size = 524288 -zookeeper1 | at java.lang.Thread.run(Thread.java:748) -zookeeper2 | 2019-02-28 03:15:35,004 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:QuorumPeer@844] - FOLLOWING -peer0.org1.example.com | [051 02-28 03:16:19.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.358Z grpc.peer_address=172.28.0.12:50102 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144µs -peer0.org2.example.com | [01f 02-28 03:16:13.14 UTC] [%{longpkg}] %{callpath} -> INFO [][f2a53875] Entry chaincode: name:"cscc" -peer1.org1.example.com | [057 02-28 03:18:00.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -peer1.org2.example.com | [056 02-28 03:17:14.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][acc35f8e] Entry chaincode: name:"exp02" -zookeeper0 | 2019-02-28 03:15:34,665 [myid:1] - WARN [RecvWorker:3:QuorumCnxManager$RecvWorker@813] - Interrupting SendWorker orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" -kafka2 | log.cleaner.enable = true -kafka0 | log.cleaner.io.buffer.size = 524288 -kafka1 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 -zookeeper1 | 2019-02-28 03:15:34,358 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -kafka3 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 -zookeeper2 | 2019-02-28 03:15:35,226 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Learner@86] - TCP NoDelay set to: true -peer0.org2.example.com | [020 02-28 03:16:13.14 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -peer1.org1.example.com | [058 02-28 03:18:00.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 7ms -zookeeper0 | 2019-02-28 03:15:34,633 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer@844] - FOLLOWING orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false -kafka2 | log.cleaner.io.buffer.load.factor = 0.9 -peer0.org1.example.com | [052 02-28 03:16:19.52 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.521Z grpc.peer_address=172.28.0.12:50104 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.1µs -kafka0 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 -peer1.org2.example.com | [057 02-28 03:17:14.69 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' -kafka1 | log.cleaner.min.cleanable.ratio = 0.5 -kafka3 | log.cleaner.min.cleanable.ratio = 0.5 -zookeeper1 | 2019-02-28 03:15:34,399 [myid:2] - INFO [WorkerSender[myid=2]:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/172.28.0.4 -peer0.org2.example.com | [021 02-28 03:16:13.15 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" -zookeeper0 | 2019-02-28 03:15:34,687 [myid:1] - WARN [SendWorker:3:QuorumCnxManager$SendWorker@727] - Interrupted while waiting for message on queue -zookeeper2 | 2019-02-28 03:15:35,415 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT -peer1.org1.example.com | [059 02-28 03:18:00.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=16ms state_commit=13ms) -kafka2 | log.cleaner.io.buffer.size = 524288 -kafka0 | log.cleaner.min.cleanable.ratio = 0.5 -peer0.org1.example.com | [053 02-28 03:16:19.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.12:50102 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=164.6591ms -peer1.org2.example.com | [058 02-28 03:17:55.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][acc35f8e] Exit chaincode: name:"exp02" (40711ms) -kafka1 | log.cleaner.min.compaction.lag.ms = 0 -kafka3 | log.cleaner.min.compaction.lag.ms = 0 -zookeeper1 | 2019-02-28 03:15:34,433 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) -peer0.org2.example.com | [022 02-28 03:16:13.17 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 12ms (state_validation=1ms block_commit=7ms state_commit=2ms) orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = -zookeeper0 | java.lang.InterruptedException -zookeeper2 | 2019-02-28 03:15:35,431 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper2 -kafka2 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 -kafka0 | log.cleaner.min.compaction.lag.ms = 0 -peer1.org1.example.com | [05a 02-28 03:18:19.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -peer1.org2.example.com | [059 02-28 03:17:55.31 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50704 grpc.code=OK grpc.call_duration=40.7152185s -kafka1 | log.cleaner.threads = 1 -kafka3 | log.cleaner.threads = 1 -peer0.org1.example.com | [054 02-28 03:16:19.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.522Z grpc.peer_address=172.28.0.12:50104 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.4234ms -zookeeper1 | 2019-02-28 03:15:34,636 [myid:2] - INFO [zookeeper1/172.28.0.3:3888:QuorumCnxManager$Listener@541] - Received connection request /172.28.0.4:47964 -peer0.org2.example.com | [023 02-28 03:16:13.17 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = -zookeeper0 | at java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.reportInterruptAfterWait(AbstractQueuedSynchronizer.java:2014) -kafka2 | log.cleaner.min.cleanable.ratio = 0.5 -zookeeper2 | 2019-02-28 03:15:35,431 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_181 -kafka0 | log.cleaner.threads = 1 -peer1.org1.example.com | [05b 02-28 03:18:19.91 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -peer1.org2.example.com | [05a 02-28 03:17:55.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][80b41c59] Entry chaincode: name:"exp02" -kafka1 | log.cleanup.policy = [delete] -kafka3 | log.cleanup.policy = [delete] -zookeeper1 | 2019-02-28 03:15:34,655 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer@856] - LEADING -peer0.org1.example.com | [055 02-28 03:16:19.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.742Z grpc.peer_address=172.28.0.14:41150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=234.4µs -peer0.org2.example.com | [024 02-28 03:16:13.21 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations orderer0.example.com | General.BCCSP.PluginOpts = -zookeeper0 | at java.util.concurrent.locks.AbstractQueuedSynchronizer$ConditionObject.awaitNanos(AbstractQueuedSynchronizer.java:2088) -zookeeper2 | 2019-02-28 03:15:35,433 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation -kafka0 | log.cleanup.policy = [delete] -kafka2 | log.cleaner.min.compaction.lag.ms = 0 -kafka3 | log.dir = /tmp/kafka-logs -zookeeper1 | 2019-02-28 03:15:34,675 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Leader@59] - TCP NoDelay set to: true -peer1.org2.example.com | [05b 02-28 03:17:55.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][80b41c59] Exit chaincode: name:"exp02" (2ms) -peer0.org2.example.com | [025 02-28 03:16:13.21 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -peer0.org1.example.com | [056 02-28 03:16:19.77 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.746Z grpc.peer_address=172.28.0.14:41150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.3935ms orderer0.example.com | General.Authentication.TimeWindow = 15m0s -zookeeper0 | at java.util.concurrent.ArrayBlockingQueue.poll(ArrayBlockingQueue.java:418) -peer1.org1.example.com | [05c 02-28 03:18:19.91 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -zookeeper2 | 2019-02-28 03:15:35,434 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre -kafka1 | log.dir = /tmp/kafka-logs -kafka0 | log.dir = /tmp/kafka-logs -kafka2 | log.cleaner.threads = 1 -kafka3 | log.dirs = /tmp/kafka-logs -peer1.org2.example.com | [05c 02-28 03:17:55.75 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50716 grpc.code=OK grpc.call_duration=5.3793ms -zookeeper1 | 2019-02-28 03:15:34,699 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LEADING (my state) -peer0.org2.example.com | [026 02-28 03:16:13.21 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer0.org1.example.com | [057 02-28 03:16:19.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.775Z grpc.peer_address=172.28.0.14:41152 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=393.1µs orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" -zookeeper0 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.pollSendQueue(QuorumCnxManager.java:879) -peer1.org1.example.com | [05d 02-28 03:18:19.97 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -kafka1 | log.dirs = /tmp/kafka-logs -kafka0 | log.dirs = /tmp/kafka-logs -zookeeper2 | 2019-02-28 03:15:35,443 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: -kafka2 | log.cleanup.policy = [delete] -kafka3 | log.flush.interval.messages = 9223372036854775807 -peer0.org2.example.com | [027 02-28 03:16:13.25 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -peer0.org1.example.com | [058 02-28 03:16:19.81 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.814Z grpc.peer_address=172.28.0.14:41154 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=179.4µs -zookeeper1 | 2019-02-28 03:15:34,912 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" -peer1.org2.example.com | [05d 02-28 03:17:57.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -zookeeper0 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.access$500(QuorumCnxManager.java:65) -kafka0 | log.flush.interval.messages = 9223372036854775807 -peer1.org1.example.com | [05e 02-28 03:18:19.97 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -kafka2 | log.dir = /tmp/kafka-logs -kafka3 | log.flush.interval.ms = null -peer0.org2.example.com | [028 02-28 03:16:13.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -kafka1 | log.flush.interval.messages = 9223372036854775807 -peer0.org1.example.com | [059 02-28 03:16:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.817Z grpc.peer_address=172.28.0.14:41154 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.5329ms -zookeeper2 | 2019-02-28 03:15:35,445 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib orderer0.example.com | RAMLedger.HistorySize = 1000 -zookeeper0 | at org.apache.zookeeper.server.quorum.QuorumCnxManager$SendWorker.run(QuorumCnxManager.java:715) -kafka0 | log.flush.interval.ms = null -peer1.org2.example.com | [05e 02-28 03:17:57.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 9ms -peer1.org1.example.com | [05f 02-28 03:18:19.97 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -zookeeper1 | 2019-02-28 03:15:34,912 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper1 -kafka2 | log.dirs = /tmp/kafka-logs -kafka3 | log.flush.offset.checkpoint.interval.ms = 60000 -peer0.org2.example.com | [029 02-28 03:16:13.26 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -kafka1 | log.flush.interval.ms = null -peer0.org1.example.com | [05a 02-28 03:16:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.14:41152 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=39.2071ms -zookeeper2 | 2019-02-28 03:15:35,455 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp -orderer0.example.com | Kafka.Retry.ShortInterval = 1s -zookeeper0 | 2019-02-28 03:15:34,698 [myid:1] - WARN [SendWorker:3:QuorumCnxManager$SendWorker@736] - Send worker leaving thread -kafka0 | log.flush.offset.checkpoint.interval.ms = 60000 -peer1.org2.example.com | [05f 02-28 03:17:57.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 41ms (state_validation=2ms block_commit=33ms state_commit=3ms) -zookeeper1 | 2019-02-28 03:15:34,912 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_181 -kafka2 | log.flush.interval.messages = 9223372036854775807 -kafka3 | log.flush.scheduler.interval.ms = 9223372036854775807 -peer0.org2.example.com | [02a 02-28 03:16:13.26 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -kafka1 | log.flush.offset.checkpoint.interval.ms = 60000 -peer0.org1.example.com | [05b 02-28 03:16:22.61 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] -peer1.org1.example.com | [060 02-28 03:18:19.97 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -zookeeper2 | 2019-02-28 03:15:35,456 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= -orderer0.example.com | Kafka.Retry.ShortTotal = 30s -zookeeper0 | 2019-02-28 03:15:34,708 [myid:1] - INFO [zookeeper0/172.28.0.2:3888:QuorumCnxManager$Listener@541] - Received connection request /172.28.0.4:59194 -kafka0 | log.flush.scheduler.interval.ms = 9223372036854775807 -zookeeper1 | 2019-02-28 03:15:34,912 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation -peer1.org2.example.com | [060 02-28 03:17:57.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a3c41756] Entry chaincode: name:"exp02" -kafka3 | log.flush.start.offset.checkpoint.interval.ms = 60000 -kafka1 | log.flush.scheduler.interval.ms = 9223372036854775807 -kafka2 | log.flush.interval.ms = null -peer0.org2.example.com | [02b 02-28 03:16:13.26 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org1.example.com | [05c 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO [][6971e8f4] Entry chaincode: name:"lscc" +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s orderer0.example.com | Kafka.Retry.LongInterval = 5m0s -zookeeper0 | 2019-02-28 03:15:34,810 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Learner@86] - TCP NoDelay set to: true -peer1.org1.example.com | [061 02-28 03:18:19.97 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -kafka0 | log.flush.start.offset.checkpoint.interval.ms = 60000 -zookeeper2 | 2019-02-28 03:15:35,458 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux -zookeeper1 | 2019-02-28 03:15:34,912 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre -peer1.org2.example.com | [061 02-28 03:17:57.98 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a3c41756] Exit chaincode: name:"exp02" (5ms) -kafka3 | log.index.interval.bytes = 4096 -kafka1 | log.flush.start.offset.checkpoint.interval.ms = 60000 -kafka2 | log.flush.offset.checkpoint.interval.ms = 60000 -peer0.org2.example.com | [02c 02-28 03:16:13.26 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org1.example.com | [05d 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -zookeeper0 | 2019-02-28 03:15:34,986 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) FOLLOWING (my state) orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s -kafka0 | log.index.interval.bytes = 4096 -zookeeper2 | 2019-02-28 03:15:35,459 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 -zookeeper1 | 2019-02-28 03:15:34,913 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: -peer1.org1.example.com | [062 02-28 03:18:20.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 108ms -kafka1 | log.index.interval.bytes = 4096 -kafka2 | log.flush.scheduler.interval.ms = 9223372036854775807 -peer0.org2.example.com | [02d 02-28 03:16:13.26 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org1.example.com | [05e 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO [][6971e8f4] Exit chaincode: name:"lscc" (2ms) -peer1.org2.example.com | [062 02-28 03:17:57.98 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50720 grpc.code=OK grpc.call_duration=9.4724ms -kafka3 | log.index.size.max.bytes = 10485760 -zookeeper0 | 2019-02-28 03:15:35,144 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s -kafka0 | log.index.size.max.bytes = 10485760 -zookeeper2 | 2019-02-28 03:15:35,468 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit -zookeeper1 | 2019-02-28 03:15:35,034 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib -peer1.org1.example.com | [063 02-28 03:18:20.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 38ms (state_validation=8ms block_commit=20ms state_commit=6ms) -kafka1 | log.index.size.max.bytes = 10485760 -kafka2 | log.flush.start.offset.checkpoint.interval.ms = 60000 -peer0.org2.example.com | [02e 02-28 03:16:13.26 UTC] [%{longpkg}] %{callpath} -> INFO [][f2a53875] Exit chaincode: name:"cscc" (121ms) -peer0.org1.example.com | [05f 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45310 grpc.code=OK grpc.call_duration=3.4367ms -kafka3 | log.message.format.version = 1.0-IV0 -peer1.org2.example.com | [063 02-28 03:17:58.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][882b544d] Entry chaincode: name:"exp02" -zookeeper0 | 2019-02-28 03:15:35,144 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper0 orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s -zookeeper2 | 2019-02-28 03:15:35,472 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper -kafka0 | log.message.format.version = 1.0-IV0 -kafka2 | log.index.interval.bytes = 4096 -peer0.org2.example.com | [02f 02-28 03:16:13.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:41368 grpc.code=OK grpc.call_duration=122.6831ms -kafka1 | log.message.format.version = 1.0-IV0 -peer1.org1.example.com | [064 02-28 03:18:20.06 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca isn't responsive: EOF -peer0.org1.example.com | [060 02-28 03:16:28.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][342b45c0] Entry chaincode: name:"lscc" -kafka3 | log.message.timestamp.difference.max.ms = 9223372036854775807 -peer1.org2.example.com | [064 02-28 03:17:58.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][882b544d] Exit chaincode: name:"exp02" (7ms) orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s -kafka0 | log.message.timestamp.difference.max.ms = 9223372036854775807 -kafka2 | log.index.size.max.bytes = 10485760 -peer0.org2.example.com | [030 02-28 03:16:14.66 UTC] [%{longpkg}] %{callpath} -> INFO [][e812f71e] Entry chaincode: name:"cscc" -peer1.org1.example.com | [065 02-28 03:18:20.06 UTC] [%{longpkg}] %{callpath} -> WARN Entering [06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca] -peer0.org1.example.com | [061 02-28 03:16:28.38 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' -kafka1 | log.message.timestamp.difference.max.ms = 9223372036854775807 -zookeeper1 | 2019-02-28 03:15:35,034 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp -kafka3 | log.message.timestamp.type = CreateTime orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 -zookeeper2 | 2019-02-28 03:15:35,483 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper -kafka0 | log.message.timestamp.type = CreateTime -peer1.org2.example.com | [065 02-28 03:17:58.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50724 grpc.code=OK grpc.call_duration=10.9002ms -kafka2 | log.message.format.version = 1.0-IV0 -peer0.org2.example.com | [031 02-28 03:16:14.66 UTC] [%{longpkg}] %{callpath} -> INFO [][e812f71e] Exit chaincode: name:"cscc" (1ms) -zookeeper0 | 2019-02-28 03:15:35,185 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_181 -peer0.org1.example.com | [062 02-28 03:17:11.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][342b45c0] Exit chaincode: name:"lscc" (43468ms) -kafka1 | log.message.timestamp.type = CreateTime -zookeeper1 | 2019-02-28 03:15:35,035 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= -kafka3 | log.preallocate = false orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms -peer1.org1.example.com | [066 02-28 03:18:20.06 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca, Metadata: -kafka0 | log.preallocate = false -kafka2 | log.message.timestamp.difference.max.ms = 9223372036854775807 -peer1.org2.example.com | [066 02-28 03:18:00.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -peer0.org2.example.com | [032 02-28 03:16:14.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:41376 grpc.code=OK grpc.call_duration=3.5787ms -peer0.org1.example.com | [063 02-28 03:17:11.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45328 grpc.code=OK grpc.call_duration=43.4807321s -zookeeper2 | 2019-02-28 03:15:35,484 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 -kafka1 | log.preallocate = false -kafka3 | log.retention.bytes = -1 orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 -kafka0 | log.retention.bytes = -1 -peer1.org1.example.com | [067 02-28 03:18:20.06 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -kafka2 | log.message.timestamp.type = CreateTime -peer0.org2.example.com | [033 02-28 03:16:15.74 UTC] [%{longpkg}] %{callpath} -> INFO [][c1ecfd70] Entry chaincode: name:"qscc" -peer0.org1.example.com | [064 02-28 03:17:13.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -peer1.org2.example.com | [067 02-28 03:18:00.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 8ms -kafka3 | log.retention.check.interval.ms = 300000 orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms -kafka1 | log.retention.bytes = -1 -peer0.org2.example.com | [034 02-28 03:16:15.74 UTC] [%{longpkg}] %{callpath} -> INFO [][c1ecfd70] Exit chaincode: name:"qscc" (2ms) -kafka0 | log.retention.check.interval.ms = 300000 -peer0.org1.example.com | [065 02-28 03:17:13.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 14ms -kafka3 | log.retention.hours = 168 -kafka2 | log.preallocate = false -zookeeper1 | 2019-02-28 03:15:35,035 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux -peer1.org1.example.com | [068 02-28 03:18:20.08 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.13:38004 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m59.585209s -peer1.org2.example.com | [068 02-28 03:18:00.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 25ms (state_validation=2ms block_commit=13ms state_commit=6ms) orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s -zookeeper2 | 2019-02-28 03:15:35,503 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 -kafka1 | log.retention.check.interval.ms = 300000 -peer0.org2.example.com | [035 02-28 03:16:15.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:41384 grpc.code=OK grpc.call_duration=3.8879ms -kafka0 | log.retention.hours = 168 -peer0.org1.example.com | [066 02-28 03:17:13.90 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] -kafka2 | log.retention.bytes = -1 -kafka3 | log.retention.minutes = null -zookeeper0 | 2019-02-28 03:15:35,186 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation -orderer0.example.com | Kafka.Verbose = true -peer1.org1.example.com | [069 02-28 03:18:20.49 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.498Z grpc.peer_address=172.28.0.13:38156 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=167.7µs -peer1.org2.example.com | [069 02-28 03:18:19.89 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -zookeeper2 | 2019-02-28 03:15:35,507 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Follower@61] - FOLLOWING - LEADER ELECTION TOOK - 945 -kafka1 | log.retention.hours = 168 -peer0.org2.example.com | [036 02-28 03:16:19.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.026Z grpc.peer_address=172.28.0.13:48496 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=159.6µs -kafka0 | log.retention.minutes = null -peer0.org1.example.com | [067 02-28 03:17:13.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 34ms (state_validation=12ms block_commit=15ms state_commit=2ms) -kafka3 | log.retention.ms = -1 -kafka2 | log.retention.check.interval.ms = 300000 -zookeeper0 | 2019-02-28 03:15:35,186 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre +orderer0.example.com | Kafka.Verbose = false orderer0.example.com | Kafka.Version = 0.10.2.0 -zookeeper1 | 2019-02-28 03:15:35,035 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 -peer1.org2.example.com | [06a 02-28 03:18:19.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -peer1.org1.example.com | [06a 02-28 03:18:20.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.53Z grpc.peer_address=172.28.0.12:60510 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=173.6µs -kafka1 | log.retention.minutes = null -kafka0 | log.retention.ms = -1 -peer0.org1.example.com | [068 02-28 03:17:55.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3670e2a5] Entry chaincode: name:"exp02" -kafka2 | log.retention.hours = 168 -kafka3 | log.roll.hours = 168 -peer0.org2.example.com | [037 02-28 03:16:19.07 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.03Z grpc.peer_address=172.28.0.13:48496 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=41.9545ms orderer0.example.com | Kafka.TLS.Enabled = false -zookeeper2 | 2019-02-28 03:15:35,563 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/172.28.0.3 -peer1.org2.example.com | [06b 02-28 03:18:19.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -zookeeper1 | 2019-02-28 03:15:35,035 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit -peer1.org1.example.com | [06b 02-28 03:18:37.35 UTC] [%{longpkg}] %{callpath} -> INFO [][83affcf0] Entry chaincode: name:"cscc" -kafka1 | log.retention.ms = -1 -kafka0 | log.roll.hours = 168 -peer0.org1.example.com | [069 02-28 03:17:55.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3670e2a5] Exit chaincode: name:"exp02" (16ms) -kafka3 | log.roll.jitter.hours = 0 -kafka2 | log.retention.minutes = null orderer0.example.com | Kafka.TLS.PrivateKey = "" -zookeeper2 | 2019-02-28 03:15:35,885 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Learner@326] - Getting a diff from the leader 0x0 -peer0.org2.example.com | [038 02-28 03:16:19.08 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.084Z grpc.peer_address=172.28.0.15:34376 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.5µs -peer1.org2.example.com | [06c 02-28 03:18:19.93 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -kafka0 | log.roll.jitter.hours = 0 -peer0.org1.example.com | [06a 02-28 03:17:55.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45346 grpc.code=OK grpc.call_duration=20.1875ms -kafka1 | log.roll.hours = 168 -peer1.org1.example.com | [06c 02-28 03:18:37.35 UTC] [%{longpkg}] %{callpath} -> INFO [][83affcf0] Exit chaincode: name:"cscc" (1ms) -zookeeper0 | 2019-02-28 03:15:35,186 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: -kafka3 | log.roll.jitter.ms = null orderer0.example.com | Kafka.TLS.Certificate = "" -kafka2 | log.retention.ms = -1 -peer0.org2.example.com | [039 02-28 03:16:19.08 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.088Z grpc.peer_address=172.28.0.13:48500 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=159.1µs -kafka0 | log.roll.jitter.ms = null -peer0.org1.example.com | [06b 02-28 03:17:57.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -kafka1 | log.roll.jitter.hours = 0 -peer1.org2.example.com | [06d 02-28 03:18:19.93 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -zookeeper0 | 2019-02-28 03:15:35,186 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib orderer0.example.com | Kafka.TLS.RootCAs = [] -kafka3 | log.roll.ms = null -peer1.org1.example.com | [06d 02-28 03:18:37.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:49412 grpc.code=OK grpc.call_duration=2.3011ms -zookeeper1 | 2019-02-28 03:15:35,037 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper -kafka2 | log.roll.hours = 168 -kafka0 | log.roll.ms = null -peer0.org1.example.com | [06c 02-28 03:17:57.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 16ms -peer0.org2.example.com | [03a 02-28 03:16:19.11 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.097Z grpc.peer_address=172.28.0.15:34376 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.4504ms -kafka1 | log.roll.jitter.ms = null -peer1.org2.example.com | [06e 02-28 03:18:19.93 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about orderer0.example.com | Kafka.TLS.ClientAuthRequired = false -kafka3 | log.segment.bytes = 1073741824 -peer1.org1.example.com | [06e 02-28 03:18:38.45 UTC] [%{longpkg}] %{callpath} -> INFO [][553cf7eb] Entry chaincode: name:"qscc" -kafka0 | log.segment.bytes = 1073741824 -peer0.org1.example.com | [06d 02-28 03:17:57.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 31ms (state_validation=2ms block_commit=17ms state_commit=3ms) -kafka2 | log.roll.jitter.hours = 0 -zookeeper2 | 2019-02-28 03:15:35,897 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FileTxnSnapLog@240] - Snapshotting: 0x0 to /data/version-2/snapshot.0 -kafka1 | log.roll.ms = null -zookeeper1 | 2019-02-28 03:15:35,037 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper -zookeeper0 | 2019-02-28 03:15:35,186 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp orderer0.example.com | Kafka.TLS.ClientRootCAs = [] -kafka3 | log.segment.delete.delay.ms = 60000 -peer0.org2.example.com | [03b 02-28 03:16:19.13 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.129Z grpc.peer_address=172.28.0.15:34382 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=161.7µs -kafka0 | log.segment.delete.delay.ms = 60000 -peer1.org1.example.com | [06f 02-28 03:18:38.45 UTC] [%{longpkg}] %{callpath} -> INFO [][553cf7eb] Exit chaincode: name:"qscc" (1ms) -peer0.org1.example.com | [06e 02-28 03:17:58.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f545d011] Entry chaincode: name:"exp02" -kafka2 | log.roll.jitter.ms = null -kafka1 | log.segment.bytes = 1073741824 -peer1.org2.example.com | [06f 02-28 03:18:19.94 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -zookeeper1 | 2019-02-28 03:15:35,065 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 orderer0.example.com | Kafka.SASLPlain.Enabled = false -peer0.org2.example.com | [03c 02-28 03:16:19.22 UTC] [%{longpkg}] %{callpath} -> INFO 06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca : Becoming a leader -kafka3 | max.connections.per.ip = 2147483647 -peer1.org1.example.com | [070 02-28 03:18:38.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:49420 grpc.code=OK grpc.call_duration=3.5085ms -peer0.org1.example.com | [06f 02-28 03:17:58.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f545d011] Exit chaincode: name:"exp02" (3ms) -kafka0 | max.connections.per.ip = 2147483647 -kafka2 | log.roll.ms = null -kafka1 | log.segment.delete.delay.ms = 60000 -zookeeper0 | 2019-02-28 03:15:35,186 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= orderer0.example.com | Kafka.SASLPlain.User = "" -zookeeper1 | 2019-02-28 03:15:35,083 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 -peer1.org2.example.com | [070 02-28 03:18:19.94 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -kafka3 | max.connections.per.ip.overrides = -peer0.org1.example.com | [070 02-28 03:17:58.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45366 grpc.code=OK grpc.call_duration=5.3192ms -peer0.org2.example.com | [03d 02-28 03:16:19.22 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel -kafka0 | max.connections.per.ip.overrides = -kafka2 | log.segment.bytes = 1073741824 -kafka1 | max.connections.per.ip = 2147483647 -zookeeper2 | 2019-02-28 03:15:43,326 [myid:3] - WARN [QuorumPeer[myid=3]/0.0.0.0:2181:Follower@116] - Got zxid 0x100000001 expected 0x1 orderer0.example.com | Kafka.SASLPlain.Password = "" -kafka3 | message.max.bytes = 1048576 -peer0.org1.example.com | [071 02-28 03:18:00.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -kafka0 | message.max.bytes = 1048576 -peer1.org2.example.com | [071 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 99ms -kafka2 | log.segment.delete.delay.ms = 60000 -kafka1 | max.connections.per.ip.overrides = -peer0.org2.example.com | [03e 02-28 03:16:19.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 -kafka3 | metric.reporters = [] -peer0.org1.example.com | [072 02-28 03:18:00.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 2ms -zookeeper1 | 2019-02-28 03:15:35,098 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Leader@361] - LEADING - LEADER ELECTION TOOK - 1045 -kafka0 | metric.reporters = [] -zookeeper0 | 2019-02-28 03:15:35,202 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux -kafka1 | message.max.bytes = 1048576 -peer1.org2.example.com | [072 02-28 03:18:20.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 40ms (state_validation=16ms block_commit=17ms state_commit=3ms) -peer0.org2.example.com | [03f 02-28 03:16:19.31 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations orderer0.example.com | Debug.BroadcastTraceDir = "" -kafka3 | metrics.num.samples = 2 -kafka2 | max.connections.per.ip = 2147483647 -peer0.org1.example.com | [073 02-28 03:18:00.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=24ms state_commit=6ms) -kafka0 | metrics.num.samples = 2 -kafka1 | metric.reporters = [] -zookeeper0 | 2019-02-28 03:15:35,202 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 -peer0.org2.example.com | [040 02-28 03:16:19.31 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about orderer0.example.com | Debug.DeliverTraceDir = "" -kafka3 | metrics.recording.level = INFO -kafka2 | max.connections.per.ip.overrides = -peer0.org1.example.com | [074 02-28 03:18:00.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4b5c9548] Entry chaincode: name:"exp02" -kafka1 | metrics.num.samples = 2 -kafka0 | metrics.recording.level = INFO -zookeeper0 | 2019-02-28 03:15:35,203 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit -peer1.org2.example.com | [073 02-28 03:18:20.08 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.13:33118 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m59.5837844s -orderer0.example.com | Consensus = map[WALDir:/var/hyperledger/production/orderer/etcdraft/wal SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot EvictionSuspicion:10m] -peer0.org2.example.com | [041 02-28 03:16:19.31 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -kafka2 | message.max.bytes = 1048576 -peer0.org1.example.com | [075 02-28 03:18:00.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4b5c9548] Exit chaincode: name:"exp02" (3ms) -kafka0 | metrics.sample.window.ms = 30000 -kafka3 | metrics.sample.window.ms = 30000 -kafka1 | metrics.recording.level = INFO -peer1.org2.example.com | [074 02-28 03:18:20.49 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.496Z grpc.peer_address=172.28.0.13:33270 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=169.1µs +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" -peer0.org2.example.com | [042 02-28 03:16:19.34 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.13:48500 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=252.3852ms -kafka2 | metric.reporters = [] -kafka3 | min.insync.replicas = 2 -kafka1 | metrics.sample.window.ms = 30000 -zookeeper0 | 2019-02-28 03:15:35,203 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper -peer0.org1.example.com | [076 02-28 03:18:00.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45370 grpc.code=OK grpc.call_duration=5.7713ms -peer1.org2.example.com | [075 02-28 03:18:20.52 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca isn't responsive: EOF -kafka0 | min.insync.replicas = 2 orderer0.example.com | Operations.TLS.Enabled = false -kafka2 | metrics.num.samples = 2 -kafka3 | num.io.threads = 8 -peer0.org2.example.com | [043 02-28 03:16:19.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 148ms -kafka1 | min.insync.replicas = 2 -peer1.org2.example.com | [076 02-28 03:18:20.52 UTC] [%{longpkg}] %{callpath} -> WARN Entering [06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca] orderer0.example.com | Operations.TLS.PrivateKey = "" -kafka0 | num.io.threads = 8 -peer0.org1.example.com | [077 02-28 03:18:01.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7ca4bbf1] Entry chaincode: name:"lscc" -peer0.org2.example.com | [044 02-28 03:16:19.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=9ms state_commit=2ms) -peer0.org1.example.com | [078 02-28 03:18:01.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7ca4bbf1] Exit chaincode: name:"lscc" (2ms) -kafka2 | metrics.recording.level = INFO -kafka1 | num.io.threads = 8 orderer0.example.com | Operations.TLS.Certificate = "" -kafka3 | num.network.threads = 3 -kafka2 | metrics.sample.window.ms = 30000 -kafka0 | num.network.threads = 3 -peer1.org2.example.com | [077 02-28 03:18:20.52 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06a0a1e17c552e8407f0bc56eb8a67d063424ddb14eb34c6f0866b145782e8ca, Metadata: -peer0.org1.example.com | [079 02-28 03:18:01.38 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45374 grpc.code=OK grpc.call_duration=4.7474ms -kafka1 | num.network.threads = 3 -peer0.org2.example.com | [045 02-28 03:16:19.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer orderer0.example.com | Operations.TLS.RootCAs = [] -zookeeper0 | 2019-02-28 03:15:35,203 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper -kafka3 | num.partitions = 1 -kafka0 | num.partitions = 1 -kafka2 | min.insync.replicas = 2 -peer1.org2.example.com | [078 02-28 03:18:20.52 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -kafka1 | num.partitions = 1 -peer0.org1.example.com | [07a 02-28 03:18:01.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][eeb0d664] Entry chaincode: name:"lscc" orderer0.example.com | Operations.TLS.ClientAuthRequired = false -peer0.org2.example.com | [046 02-28 03:16:19.49 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -kafka3 | num.recovery.threads.per.data.dir = 1 -kafka1 | num.recovery.threads.per.data.dir = 1 -kafka2 | num.io.threads = 8 -zookeeper0 | 2019-02-28 03:15:35,203 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 -kafka0 | num.recovery.threads.per.data.dir = 1 -peer1.org2.example.com | [079 02-28 03:18:20.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.531Z grpc.peer_address=172.28.0.12:48598 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=142.8µs orderer0.example.com | Operations.TLS.ClientRootCAs = [] -peer0.org1.example.com | [07b 02-28 03:18:01.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][eeb0d664] Exit chaincode: name:"lscc" (2ms) -peer0.org2.example.com | [047 02-28 03:16:19.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -kafka3 | num.replica.fetchers = 1 -kafka1 | num.replica.fetchers = 1 -kafka2 | num.network.threads = 3 -kafka0 | num.replica.fetchers = 1 orderer0.example.com | Metrics.Provider = "prometheus" -peer1.org2.example.com | [07a 02-28 03:18:37.76 UTC] [%{longpkg}] %{callpath} -> INFO [][7dfbafa9] Entry chaincode: name:"cscc" -zookeeper0 | 2019-02-28 03:15:35,269 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 -kafka1 | offset.metadata.max.bytes = 4096 -peer0.org2.example.com | [048 02-28 03:16:19.49 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -kafka2 | num.partitions = 1 -kafka3 | offset.metadata.max.bytes = 4096 -kafka0 | offset.metadata.max.bytes = 4096 orderer0.example.com | Metrics.Statsd.Network = "udp" -peer0.org1.example.com | [07c 02-28 03:18:01.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45378 grpc.code=OK grpc.call_duration=3.6408ms -kafka1 | offsets.commit.required.acks = -1 -peer1.org2.example.com | [07b 02-28 03:18:37.76 UTC] [%{longpkg}] %{callpath} -> INFO [][7dfbafa9] Exit chaincode: name:"cscc" (1ms) -kafka2 | num.recovery.threads.per.data.dir = 1 -zookeeper0 | 2019-02-28 03:15:35,271 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Follower@61] - FOLLOWING - LEADER ELECTION TOOK - 978 -peer0.org2.example.com | [049 02-28 03:16:19.49 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -kafka3 | offsets.commit.required.acks = -1 -kafka0 | offsets.commit.required.acks = -1 orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" -peer0.org1.example.com | [07d 02-28 03:18:01.85 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][20d685f7] Entry chaincode: name:"lscc" -kafka1 | offsets.commit.timeout.ms = 5000 -peer1.org2.example.com | [07c 02-28 03:18:37.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50864 grpc.code=OK grpc.call_duration=2.1847ms -kafka2 | num.replica.fetchers = 1 -peer0.org2.example.com | [04a 02-28 03:16:19.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 65ms -kafka3 | offsets.commit.timeout.ms = 5000 orderer0.example.com | Metrics.Statsd.WriteInterval = 30s -zookeeper0 | 2019-02-28 03:15:35,290 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/172.28.0.3 -kafka1 | offsets.load.buffer.size = 5242880 -kafka0 | offsets.commit.timeout.ms = 5000 -peer0.org1.example.com | [07e 02-28 03:18:01.85 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][20d685f7] Exit chaincode: name:"lscc" (1ms) -peer1.org2.example.com | [07d 02-28 03:18:38.83 UTC] [%{longpkg}] %{callpath} -> INFO [][a1031a33] Entry chaincode: name:"qscc" -peer0.org2.example.com | [04b 02-28 03:16:19.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 25ms (state_validation=1ms block_commit=20ms state_commit=2ms) -kafka2 | offset.metadata.max.bytes = 4096 -kafka3 | offsets.load.buffer.size = 5242880 -orderer0.example.com | Metrics.Statsd.Prefix = "" -peer0.org2.example.com | [04c 02-28 03:16:19.83 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.834Z grpc.peer_address=172.28.0.14:34836 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.8µs -kafka3 | offsets.retention.check.interval.ms = 600000 -kafka0 | offsets.load.buffer.size = 5242880 -orderer0.example.com | [003 02-28 03:15:33.86 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer with TLS enabled -peer1.org2.example.com | [07e 02-28 03:18:38.83 UTC] [%{longpkg}] %{callpath} -> INFO [][a1031a33] Exit chaincode: name:"qscc" (2ms) -kafka2 | offsets.commit.required.acks = -1 -kafka1 | offsets.retention.check.interval.ms = 600000 -peer0.org2.example.com | [04d 02-28 03:16:19.85 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.841Z grpc.peer_address=172.28.0.14:34836 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.9731ms -kafka3 | offsets.retention.minutes = 1440 -peer0.org1.example.com | [07f 02-28 03:18:01.85 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45382 grpc.code=OK grpc.call_duration=2.2009ms -kafka0 | offsets.retention.check.interval.ms = 600000 -zookeeper0 | 2019-02-28 03:15:35,521 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Learner@326] - Getting a diff from the leader 0x0 -orderer0.example.com | [004 02-28 03:15:33.89 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -kafka2 | offsets.commit.timeout.ms = 5000 -peer1.org2.example.com | [07f 02-28 03:18:38.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:50872 grpc.code=OK grpc.call_duration=2.9166ms -kafka1 | offsets.retention.minutes = 1440 -kafka3 | offsets.topic.compression.codec = 0 -peer0.org2.example.com | [04e 02-28 03:16:19.86 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.863Z grpc.peer_address=172.28.0.14:34838 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=239.1µs -kafka0 | offsets.retention.minutes = 1440 -orderer0.example.com | [005 02-28 03:15:34.01 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block 0 -kafka2 | offsets.load.buffer.size = 5242880 -peer0.org1.example.com | [080 02-28 03:18:02.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7c75ddde] Entry chaincode: name:"lscc" -kafka3 | offsets.topic.num.partitions = 50 -kafka1 | offsets.topic.compression.codec = 0 -kafka0 | offsets.topic.compression.codec = 0 -zookeeper1 | 2019-02-28 03:15:35,447 [myid:2] - INFO [LearnerHandler-/172.28.0.2:33470:LearnerHandler@329] - Follower sid: 1 : info : org.apache.zookeeper.server.quorum.QuorumPeer$QuorumServer@566af785 -zookeeper2 | 2019-02-28 03:15:43,350 [myid:3] - INFO [SyncThread:3:FileTxnLog@203] - Creating new log file: log.100000001 -orderer0.example.com | [006 02-28 03:15:34.04 UTC] [%{longpkg}] %{callpath} -> INFO Starting system channel 'testchainid' with genesis block hash 771af1716c1f80986256250b678791d672cb8b75b2d5b8871393510f89d488d7 and orderer type kafka -zookeeper0 | 2019-02-28 03:15:35,567 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:FileTxnSnapLog@240] - Snapshotting: 0x0 to /data/version-2/snapshot.0 -peer0.org2.example.com | [04f 02-28 03:16:20.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:22.644Z grpc.peer_address=172.28.0.13:48530 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.8µs -kafka2 | offsets.retention.check.interval.ms = 600000 -kafka3 | offsets.topic.replication.factor = 1 -peer0.org1.example.com | [081 02-28 03:18:02.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7c75ddde] Exit chaincode: name:"lscc" (1ms) -kafka1 | offsets.topic.num.partitions = 50 -kafka0 | offsets.topic.num.partitions = 50 -orderer0.example.com | [007 02-28 03:15:34.04 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer: -peer0.org2.example.com | [050 02-28 03:16:20.64 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9 isn't responsive: EOF -kafka2 | offsets.retention.minutes = 1440 -peer0.org1.example.com | [082 02-28 03:18:02.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45386 grpc.code=OK grpc.call_duration=3.1674ms -kafka0 | offsets.topic.replication.factor = 1 -kafka3 | offsets.topic.segment.bytes = 104857600 -kafka1 | offsets.topic.replication.factor = 1 -orderer0.example.com | Version: 1.4.0 -peer0.org2.example.com | [051 02-28 03:16:20.64 UTC] [%{longpkg}] %{callpath} -> WARN Entering [c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9] -zookeeper0 | 2019-02-28 03:15:43,255 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /172.28.0.9:38762 -kafka2 | offsets.topic.compression.codec = 0 -peer0.org1.example.com | [083 02-28 03:18:02.24 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8b9a3b89] Entry chaincode: name:"lscc" -kafka0 | offsets.topic.segment.bytes = 104857600 -kafka3 | port = 9092 -kafka1 | offsets.topic.segment.bytes = 104857600 +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-04-22 06:16:27.971 UTC [common.channelconfig] NewStandardValues -> DEBU 0c8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0c9 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ca Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cb Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cc Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cd Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.971 UTC [common.channelconfig] NewStandardValues -> DEBU 0ce Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cf Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d0 Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d1 Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d2 Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d3 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d4 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] NewStandardValues -> DEBU 0d5 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d6 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] NewStandardValues -> DEBU 0d7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d8 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [common.channelconfig] validateMSP -> DEBU 0d9 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [msp] newBccspMsp -> DEBU 0da Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [msp] New -> DEBU 0db Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [msp] Setup -> DEBU 0dc Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:27.972 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [msp] Validate -> DEBU 0df MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [common.channelconfig] NewStandardValues -> DEBU 0e0 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e1 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [common.channelconfig] NewStandardValues -> DEBU 0e2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e3 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [common.channelconfig] validateMSP -> DEBU 0e4 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [msp] newBccspMsp -> DEBU 0e5 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [msp] New -> DEBU 0e6 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.973 UTC [msp] Setup -> DEBU 0e7 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.974 UTC [msp.identity] newIdentity -> DEBU 0e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.974 UTC [msp.identity] newIdentity -> DEBU 0e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.974 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0ea Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.974 UTC [msp] Validate -> DEBU 0eb MSP Org1MSP validating identity" +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.877 UTC [gossip.comm] sendToEndpoint -> DEBU 134 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.879 UTC [gossip.comm] sendToEndpoint -> DEBU 135 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.879 UTC [gossip.comm] sendToEndpoint -> DEBU 136 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.881 UTC [gossip.gossip] handleMessage -> DEBU 137 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:16:27.974 UTC [msp] getCertificationChain -> DEBU 0ec MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [msp] hasOURole -> DEBU 0ed MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [msp] getCertificationChain -> DEBU 0ee MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [common.channelconfig] NewStandardValues -> DEBU 0ef Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [common.channelconfig] validateMSP -> DEBU 0f1 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [msp] newBccspMsp -> DEBU 0f2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [msp] New -> DEBU 0f3 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [msp] Setup -> DEBU 0f4 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [msp.identity] newIdentity -> DEBU 0f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.975 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.976 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0f7 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.976 UTC [msp] Validate -> DEBU 0f8 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:27.976 UTC [msp] getCertificationChain -> DEBU 0f9 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.976 UTC [msp] hasOURole -> DEBU 0fa MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:27.976 UTC [msp] getCertificationChain -> DEBU 0fb MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [msp] Setup -> DEBU 0fc Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [msp] Setup -> DEBU 0fd MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 0fe Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 0ff Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 100 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 101 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 102 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 103 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 104 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 105 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 106 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 107 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 108 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 109 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10c Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10d Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] GetPolicy -> DEBU 10e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10f Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] GetPolicy -> DEBU 110 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 111 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 113 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 114 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 115 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 116 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 117 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 118 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 119 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 120 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:27.979 UTC [common.configtx] addToMap -> DEBU 121 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:27.979 UTC [common.configtx] addToMap -> DEBU 122 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:27.979 UTC [common.configtx] addToMap -> DEBU 123 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:27.981 UTC [common.configtx] addToMap -> DEBU 124 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-04-22 06:16:27.981 UTC [common.configtx] addToMap -> DEBU 125 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.982 UTC [common.configtx] addToMap -> DEBU 126 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:27.983 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:27.983 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:34.882 UTC [gossip.pull] HandleMessage -> DEBU 138 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.883 UTC [gossip.gossip] handleMessage -> DEBU 139 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.884 UTC [gossip.gossip] handleMessage -> DEBU 13a Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.885 UTC [gossip.gossip] handleMessage -> DEBU 13b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.885 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.886 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 94 00 83 c1 87 1a a2 ab bb ce 58 0d 18 5e fc b2 |..........X..^..| +peer0.org1.example.com | 00000010 0d 00 ab 2b 1e 54 9b 33 13 93 af 32 1f f4 0b 4e |...+.T.3...2...N|" +peer0.org1.example.com | "2019-04-22 06:16:34.886 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 61 46 3a 3c cd 77 46 80 0f ba 66 a8 |0D. aF:<.wF...f.| +peer0.org1.example.com | 00000010 2d fd 2d 5e ab 3c 48 a3 db c1 fc b9 73 80 79 e1 |-.-^. DEBU 13f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:16:34.887 UTC [msp.identity] Verify -> DEBU 140 Verify: sig = 00000000 30 45 02 21 00 bb ed 20 94 b7 2a b1 74 77 bd 93 |0E.!... ..*.tw..| +peer0.org1.example.com | 00000010 d5 41 35 f4 87 40 c2 f4 ec 0c 5c 69 ce f1 df 08 |.A5..@....\i....| +peer0.org1.example.com | 00000020 01 63 58 b4 86 02 20 49 20 1d d2 ab 83 93 11 f0 |.cX... I .......| +peer0.org1.example.com | 00000030 70 ec a6 8b b4 0e fd 95 2e 58 cd 3a 23 b7 3d f4 |p........X.:#.=.| +peer0.org1.example.com | 00000040 74 54 25 23 97 95 82 |tT%#...|" +peer0.org1.example.com | "2019-04-22 06:16:34.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 141 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.888 UTC [gossip.discovery] isSentByMe -> DEBU 142 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 143 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.889 UTC [msp.identity] Verify -> DEBU 144 Verify: digest = 00000000 26 fd 4a ea 2f 28 61 3d 6c b1 33 8b 77 44 d5 df |&.J./(a=l.3.wD..| +orderer0.example.com | "2019-04-22 06:16:27.983 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:27.984 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] NewStandardValues -> DEBU 13a Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13b Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13c Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13d Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13e Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] NewStandardValues -> DEBU 140 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142 Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143 Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 144 Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 145 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 146 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] NewStandardValues -> DEBU 147 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 148 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] NewStandardValues -> DEBU 149 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14a Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [common.channelconfig] validateMSP -> DEBU 14b Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [msp] newBccspMsp -> DEBU 14c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [msp] New -> DEBU 14d Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [msp] Setup -> DEBU 14e Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:27.987 UTC [msp.identity] newIdentity -> DEBU 14f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | 00000010 85 dc 77 57 a7 34 8a 8a 0e 24 b7 08 55 19 b6 f9 |..wW.4...$..U...|" +peer0.org1.example.com | "2019-04-22 06:16:34.890 UTC [msp.identity] Verify -> DEBU 145 Verify: sig = 00000000 30 44 02 20 0f 70 ba c9 78 7e c7 1f b1 76 f9 75 |0D. .p..x~...v.u| +peer0.org1.example.com | 00000010 6d b4 88 80 2b 3a d6 6e e3 ec 50 25 9d 5f 1b 52 |m...+:.n..P%._.R| +peer0.org1.example.com | 00000020 cc 19 f9 92 02 20 53 c3 33 2d 3d 5c 59 52 0f 64 |..... S.3-=\YR.d| +peer0.org1.example.com | 00000030 b5 aa 7f 2d cf 47 c9 37 ff db fb e4 2e 91 02 e6 |...-.G.7........| +peer0.org1.example.com | 00000040 3e 9a 68 b6 60 14 |>.h.`.|" +peer0.org1.example.com | "2019-04-22 06:16:34.891 UTC [msp.identity] Verify -> DEBU 146 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:34.891 UTC [msp.identity] Verify -> DEBU 147 Verify: sig = 00000000 30 45 02 21 00 b2 54 c3 44 dd e8 45 ed be ee 01 |0E.!..T.D..E....| +peer0.org1.example.com | 00000010 dc dc 70 2e 8b d4 58 fd 4e 71 af 93 38 95 47 be |..p...X.Nq..8.G.| +peer0.org1.example.com | 00000020 21 fc fb 3b 22 02 20 48 a2 32 c4 11 ee 47 17 98 |!..;". H.2...G..| +peer0.org1.example.com | 00000030 6a 3e 3f 52 b2 58 07 f8 00 4e 21 db 93 7c 36 ad |j>?R.X...N!..|6.| +peer0.org1.example.com | 00000040 46 a9 2b b7 9d 67 82 |F.+..g.|" +peer0.org1.example.com | "2019-04-22 06:16:34.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 148 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [msp.identity] newIdentity -> DEBU 150 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [msp] Validate -> DEBU 151 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [common.channelconfig] NewStandardValues -> DEBU 152 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [common.channelconfig] NewStandardValues -> DEBU 154 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [common.channelconfig] validateMSP -> DEBU 156 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [msp] newBccspMsp -> DEBU 157 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [msp] New -> DEBU 158 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [msp] Setup -> DEBU 159 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [msp.identity] newIdentity -> DEBU 15a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.988 UTC [msp.identity] newIdentity -> DEBU 15b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15c Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] Validate -> DEBU 15d MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] getCertificationChain -> DEBU 15e MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] hasOURole -> DEBU 15f MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] getCertificationChain -> DEBU 160 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [common.channelconfig] NewStandardValues -> DEBU 161 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [common.channelconfig] validateMSP -> DEBU 163 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] newBccspMsp -> DEBU 164 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] New -> DEBU 165 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:27.989 UTC [msp] Setup -> DEBU 166 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.990 UTC [msp.identity] newIdentity -> DEBU 167 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.990 UTC [msp.identity] newIdentity -> DEBU 168 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:27.990 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 169 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.990 UTC [msp] Validate -> DEBU 16a MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:27.990 UTC [msp] getCertificationChain -> DEBU 16b MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [msp] hasOURole -> DEBU 16c MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [msp] getCertificationChain -> DEBU 16d MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [msp] Setup -> DEBU 16e Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [msp] Setup -> DEBU 16f MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 170 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 171 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 172 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 173 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 174 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 175 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 176 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 177 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 178 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 179 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17c Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17d Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] GetPolicy -> DEBU 181 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:27.991 UTC [policies] GetPolicy -> DEBU 183 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 185 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 186 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 187 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 188 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 189 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18d Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18f Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 190 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 191 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 192 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:34.892 UTC [gossip.discovery] learnExistingMembers -> DEBU 149 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:34.892 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:4 " +peer0.org1.example.com | "2019-04-22 06:16:34.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:4 " +peer0.org1.example.com | "2019-04-22 06:16:34.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 14c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ac Obtaining default signing identity" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [orderer.common.server] createLedgerFactory -> DEBU 1ad Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1ae CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [kvledger.util] logDirStatus -> DEBU 1af Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2019-04-22 06:16:27.994 UTC [kvledger.util] logDirStatus -> DEBU 1b0 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2019-04-22 06:16:28.054 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1b1 Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2019-04-22 06:16:28.075 UTC [orderer.common.server] initializeServerConfig -> INFO 1b2 Starting orderer with TLS enabled" +orderer0.example.com | "2019-04-22 06:16:28.076 UTC [orderer.common.server] configureClusterListener -> INFO 1b3 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer0.example.com | "2019-04-22 06:16:28.084 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b4 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2019-04-22 06:16:28.084 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1b5 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [kvledger.util] logDirStatus -> DEBU 1b6 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [kvledger.util] logDirStatus -> DEBU 1b7 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [fsblkstorage] newBlockfileMgr -> INFO 1b8 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1b9 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ba retrieveLastFileSuffix()" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bb retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bc Last file number found = -1" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bd No block file found" +orderer0.example.com | "2019-04-22 06:16:28.085 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1be Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000184940)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-04-22 06:16:28.088 UTC [fsblkstorage] newBlockIndex -> DEBU 1bf newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-04-22 06:16:28.094 UTC [fsblkstorage] indexBlock -> DEBU 1c0 Indexing block [blockNum=0, blockHash=[]byte{0xbc, 0xca, 0xe2, 0xa, 0xaa, 0xb2, 0x1, 0xa5, 0x5c, 0x9e, 0xe8, 0x23, 0xa5, 0x33, 0xd6, 0x77, 0xfe, 0xba, 0x8c, 0x90, 0x63, 0xb3, 0x2a, 0x63, 0xe, 0xfd, 0x47, 0xc9, 0x84, 0xa7, 0x3, 0x3d} txOffsets= +orderer0.example.com | txId=d7921cec05f57cede225e40c40427ef50974637a60806026573552a75fd9ba28 locPointer=offset=39, bytesLength=18371 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:28.098 UTC [fsblkstorage] updateCheckpoint -> DEBU 1c1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18415], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1c2 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c3 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ca Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1cf Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:28.100 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.100 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.100 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.100 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:28.100 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.100 UTC [msp.identity] newIdentity -> DEBU 1d8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [msp] Validate -> DEBU 1d9 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [common.channelconfig] NewStandardValues -> DEBU 1da Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: MSP" +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:34.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 14e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:34.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.161 UTC [gossip.gossip] handleMessage -> DEBU 150 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.161 UTC [gossip.pull] HandleMessage -> DEBU 151 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.161 UTC [gossip.pull] SendDigest -> DEBU 152 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:35.161 UTC [gossip.gossip] handleMessage -> DEBU 153 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.163 UTC [gossip.gossip] handleMessage -> DEBU 154 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.163 UTC [gossip.gossip] handleMessage -> DEBU 155 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [common.channelconfig] validateMSP -> DEBU 1de Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [msp] newBccspMsp -> DEBU 1df Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [msp] New -> DEBU 1e0 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [msp] Setup -> DEBU 1e1 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [msp.identity] newIdentity -> DEBU 1e2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.101 UTC [msp.identity] newIdentity -> DEBU 1e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.102 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e4 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.164 UTC [msp.identity] Verify -> DEBU 157 Verify: digest = 00000000 57 13 9d 51 33 a6 8f 60 9e ec 63 85 c3 8f 10 8d |W..Q3..`..c.....| +peer0.org1.example.com | 00000010 d1 f7 d6 59 52 d1 3f 9c 68 e8 5e f6 e0 67 01 50 |...YR.?.h.^..g.P|" +peer0.org1.example.com | "2019-04-22 06:16:35.165 UTC [msp.identity] Verify -> DEBU 158 Verify: sig = 00000000 30 45 02 21 00 e0 ce 3c 7b d2 57 79 5b ba 1f 05 |0E.!...<{.Wy[...| +peer0.org1.example.com | 00000010 b0 86 74 38 84 69 4d 74 54 80 bc 1b af dc 6e 85 |..t8.iMtT.....n.| +peer0.org1.example.com | 00000020 ee bf 7b 56 1b 02 20 51 79 a1 37 0d 13 b4 2f 0a |..{V.. Qy.7.../.| +peer0.org1.example.com | 00000030 f0 e5 b0 87 ad c7 53 d8 33 6c 43 14 b3 04 03 5f |......S.3lC...._| +peer0.org1.example.com | 00000040 73 b3 34 8d 5d 22 00 |s.4.]".|" +peer0.org1.example.com | "2019-04-22 06:16:35.165 UTC [msp.identity] Verify -> DEBU 159 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:35.165 UTC [msp.identity] Verify -> DEBU 15a Verify: sig = 00000000 30 45 02 21 00 c4 3d 9d b6 82 7f c9 f1 29 93 c1 |0E.!..=......)..| +peer0.org1.example.com | 00000010 32 73 cc 4a 54 4d 88 c1 cc 2f dd 14 78 8a 05 a2 |2s.JTM.../..x...| +peer0.org1.example.com | 00000020 a4 46 7e 2c eb 02 20 3f 8b c8 cd a1 db 1f 5a d0 |.F~,.. ?......Z.| +peer0.org1.example.com | 00000030 9d f7 3d 5e 1c f6 57 62 ac e3 13 20 55 79 b2 91 |..=^..Wb... Uy..| +peer0.org1.example.com | 00000040 73 5d c5 85 fb 0d 00 |s].....|" +peer0.org1.example.com | "2019-04-22 06:16:35.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +orderer0.example.com | "2019-04-22 06:16:28.102 UTC [msp] Validate -> DEBU 1e5 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [msp] getCertificationChain -> DEBU 1e6 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [msp] hasOURole -> DEBU 1e7 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [msp] getCertificationChain -> DEBU 1e8 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [common.channelconfig] NewStandardValues -> DEBU 1e9 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ea Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [common.channelconfig] validateMSP -> DEBU 1eb Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [msp] newBccspMsp -> DEBU 1ec Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.103 UTC [msp] New -> DEBU 1ed Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.104 UTC [msp] Setup -> DEBU 1ee Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.104 UTC [msp.identity] newIdentity -> DEBU 1ef Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.104 UTC [msp.identity] newIdentity -> DEBU 1f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:5 " +peer0.org1.example.com | "2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1f1 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [msp] Validate -> DEBU 1f2 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [msp] getCertificationChain -> DEBU 1f3 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [msp] hasOURole -> DEBU 1f4 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [msp] getCertificationChain -> DEBU 1f5 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [msp] Setup -> DEBU 1f6 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [msp] Setup -> DEBU 1f7 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.105 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] GetPolicy -> DEBU 209 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 20a Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:28.106 UTC [policies] GetPolicy -> DEBU 20b Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [policies] NewManagerImpl -> DEBU 20c Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:5 " +peer0.org1.example.com | "2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 160 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 161 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 162 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.167 UTC [gossip.discovery] sendMemResponse -> DEBU 163 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:35.167 UTC [msp.identity] Sign -> DEBU 164 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:35.168 UTC [msp.identity] Sign -> DEBU 165 Sign: digest: 0A96F1CF9A1C0A0D7723555E949F34BDC12E44015C0D2B075B3CB91C7C56EEFA " +peer0.org1.example.com | "2019-04-22 06:16:35.168 UTC [msp.identity] Sign -> DEBU 166 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:35.168 UTC [msp.identity] Sign -> DEBU 167 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:35.169 UTC [gossip.comm] Send -> DEBU 168 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:35.169 UTC [gossip.discovery] sendMemResponse -> DEBU 169 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:35.169 UTC [gossip.comm] sendToEndpoint -> DEBU 16a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.170 UTC [gossip.comm] sendToEndpoint -> DEBU 16b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.873 UTC [msp.identity] Sign -> DEBU 16c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:35.873 UTC [msp.identity] Sign -> DEBU 16d Sign: digest: B3E5358C5DA99987D73A6B5229C2B882198C231B31F68504B490FDA0342E5E43 " +peer0.org1.example.com | "2019-04-22 06:16:35.874 UTC [msp.identity] Sign -> DEBU 16e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:35.874 UTC [msp.identity] Sign -> DEBU 16f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:35.874 UTC [gossip.discovery] periodicalSendAlive -> DEBU 170 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:16:35.878 UTC [gossip.pull] SendReq -> DEBU 171 Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:35.878 UTC [gossip.comm] Send -> DEBU 172 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU 173 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU 174 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.879 UTC [gossip.gossip] handleMessage -> DEBU 175 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12867739519671063510, Envelope: 962 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.880 UTC [msp.identity] Verify -> DEBU 176 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:28.114 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] Next -> DEBU 234 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] newBlockfileStream -> DEBU 235 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 236 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 237 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] Next -> DEBU 239 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] newBlockfileStream -> DEBU 23a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23b Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23c Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23d blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:28.117 UTC [common.channelconfig] NewStandardValues -> DEBU 23e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:28.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.122 UTC [common.channelconfig] NewStandardValues -> DEBU 244 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:28.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:28.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: BatchSize" +peer0.org1.example.com | 00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" +peer0.org1.example.com | "2019-04-22 06:16:35.880 UTC [msp.identity] Verify -> DEBU 177 Verify: sig = 00000000 30 45 02 21 00 f3 bb aa 56 ef 7c 31 50 14 66 e9 |0E.!....V.|1P.f.| +peer0.org1.example.com | 00000010 fa d0 7d 21 a5 1e 04 b9 92 a1 60 be 61 c5 70 79 |..}!......`.a.py| +peer0.org1.example.com | 00000020 36 1e 70 0e 05 02 20 44 f7 06 e7 70 7b de a8 d3 |6.p... D...p{...| +peer0.org1.example.com | 00000030 e0 ad e4 7f 38 8b a8 6a 1f 6d a0 88 ac d3 bc 9f |....8..j.m......| +peer0.org1.example.com | 00000040 c8 62 3e c9 5f 13 79 |.b>._.y|" +peer0.org1.example.com | "2019-04-22 06:16:35.880 UTC [gossip.pull] HandleMessage -> DEBU 178 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12867739519671063510, Envelope: 962 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] NewStandardValues -> DEBU 24b Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [common.channelconfig] validateMSP -> DEBU 24f Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [msp] newBccspMsp -> DEBU 250 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [msp] New -> DEBU 251 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [msp] Setup -> DEBU 252 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [msp.identity] newIdentity -> DEBU 253 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.123 UTC [msp.identity] newIdentity -> DEBU 254 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [msp] Validate -> DEBU 255 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [common.channelconfig] validateMSP -> DEBU 25a Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [msp] newBccspMsp -> DEBU 25b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [msp] New -> DEBU 25c Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [msp] Setup -> DEBU 25d Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.124 UTC [msp.identity] newIdentity -> DEBU 25e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.125 UTC [msp.identity] newIdentity -> DEBU 25f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 260 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [msp] Validate -> DEBU 261 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [msp] getCertificationChain -> DEBU 262 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [msp] hasOURole -> DEBU 263 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [common.channelconfig] NewStandardValues -> DEBU 265 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [common.channelconfig] validateMSP -> DEBU 267 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.127 UTC [msp] newBccspMsp -> DEBU 268 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.128 UTC [msp] New -> DEBU 269 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:28.128 UTC [msp] Setup -> DEBU 26a Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.128 UTC [msp.identity] newIdentity -> DEBU 26b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | "2019-04-22 06:16:35.881 UTC [gossip.gossip] func2 -> DEBU 179 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-04-22 06:16:35.881 UTC [gossip.pull] HandleMessage -> DEBU 17a Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +peer0.org1.example.com | "2019-04-22 06:16:35.881 UTC [gossip.gossip] handleMessage -> DEBU 17b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:35.882 UTC [gossip.comm] Send -> DEBU 17c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:35.883 UTC [gossip.comm] sendToEndpoint -> DEBU 17d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:35.884 UTC [gossip.comm] sendToEndpoint -> DEBU 17e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:36.161 UTC [gossip.gossip] handleMessage -> DEBU 17f Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13393075672769567094 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:36.161 UTC [gossip.pull] HandleMessage -> DEBU 180 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13393075672769567094 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:36.162 UTC [gossip.pull] SendRes -> DEBU 181 Sending 1 IDENTITY_MSG items to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:36.163 UTC [gossip.gossip] handleMessage -> DEBU 182 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:36.169 UTC [gossip.gossip] handleMessage -> DEBU 183 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:36.169 UTC [gossip.gossip] handleMessage -> DEBU 184 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:36.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 185 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.128 UTC [msp.identity] newIdentity -> DEBU 26c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:28.129 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 26d Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.129 UTC [msp] Validate -> DEBU 26e MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:28.129 UTC [msp] getCertificationChain -> DEBU 26f MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.129 UTC [msp] hasOURole -> DEBU 270 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:28.129 UTC [msp] getCertificationChain -> DEBU 271 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [msp] Setup -> DEBU 272 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [msp] Setup -> DEBU 273 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.132 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.132 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:36.171 UTC [msp.identity] Verify -> DEBU 186 Verify: digest = 00000000 40 f9 73 32 8a 43 2c 8a fe a6 26 12 b2 bb 21 e5 |@.s2.C,...&...!.| +peer0.org1.example.com | 00000010 be 98 7b 3b d2 ba 0c 9e 7f b5 26 56 2b 1e a6 55 |..{;......&V+..U|" +peer0.org1.example.com | "2019-04-22 06:16:36.171 UTC [msp.identity] Verify -> DEBU 187 Verify: sig = 00000000 30 44 02 20 4c 6f 2c 1d 91 bb f0 5e 8a f1 d3 7d |0D. Lo,....^...}| +peer0.org1.example.com | 00000010 3b 3a bb c2 7b 00 fa 07 d1 37 19 59 a6 be 74 d9 |;:..{....7.Y..t.| +peer0.org1.example.com | 00000020 d3 b1 1f d0 02 20 42 2e b9 72 6c 19 aa f4 79 be |..... B..rl...y.| +peer0.org1.example.com | 00000030 ad 37 c0 9f 73 4f 72 b6 f0 2f db f4 5f ff eb 1f |.7..sOr../.._...| +peer0.org1.example.com | 00000040 77 5b b9 8c 9c 1d |w[....|" +peer0.org1.example.com | "2019-04-22 06:16:36.172 UTC [msp.identity] Verify -> DEBU 188 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:36.172 UTC [msp.identity] Verify -> DEBU 189 Verify: sig = 00000000 30 45 02 21 00 80 81 e2 ab 97 3e a2 0c 3e 19 e2 |0E.!......>..>..| +peer0.org1.example.com | 00000010 7a 7f 2b d5 ff ec ee ea 6e d9 f3 ea 44 ae 02 1d |z.+.....n...D...| +peer0.org1.example.com | 00000020 9a ed 69 63 9d 02 20 63 cc b7 e6 b8 c4 22 65 e6 |..ic.. c....."e.| +peer0.org1.example.com | 00000030 c0 92 7c c1 9e b6 01 7a 17 80 67 f6 08 91 1a 10 |..|....z..g.....| +peer0.org1.example.com | 00000040 98 bf c2 7f a6 9e 2a |......*|" +peer0.org1.example.com | "2019-04-22 06:16:36.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 18a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:36.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:36.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 18c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:6 " +peer0.org1.example.com | "2019-04-22 06:16:36.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:6 " +peer0.org1.example.com | "2019-04-22 06:16:36.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] GetPolicy -> DEBU 285 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] GetPolicy -> DEBU 287 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b0 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b1 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b2 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b3 Manager Channel has managers Orderer" +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b4 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b5 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b6 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b7 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b8 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b9 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ba As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.capabilities] Supported -> DEBU 2bb Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [common.capabilities] Supported -> DEBU 2bc Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [orderer.common.server] func1 -> DEBU 2bd Executing callback to update root CAs" +orderer0.example.com | "2019-04-22 06:16:28.136 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2be updating root CAs for channel [testchainid]" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2bf adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c0 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c1 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [fsblkstorage] Next -> DEBU 2c2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c4 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c5 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2c7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +orderer0.example.com | "2019-04-22 06:16:28.137 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2c8 EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-04-22 06:16:28.141 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.141 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ca No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.150 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2cb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.161 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cc Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.161 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cd Appending 0 entries to memory storage" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.162 UTC [fsblkstorage] Next -> DEBU 2ce Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:28.162 UTC [fsblkstorage] newBlockfileStream -> DEBU 2cf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:28.162 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d0 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:28.162 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d1 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:28.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d2 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:28.164 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2d3 [channel: testchainid] Done creating channel support resources" +orderer0.example.com | "2019-04-22 06:16:28.164 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2d4 Creating system channel msg processor for channel testchainid" +orderer0.example.com | "2019-04-22 06:16:28.165 UTC [fsblkstorage] Next -> DEBU 2d5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:28.165 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:28.165 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d7 Remaining bytes=[18415], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:28.165 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d8 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:28.165 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d9 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:28.166 UTC [orderer.commmon.multichannel] Initialize -> INFO 2da Starting system channel 'testchainid' with genesis block hash bccae20aaab201a55c9ee823a533d677feba8c9063b32a630efd47c984a7033d and orderer type etcdraft" +orderer0.example.com | "2019-04-22 06:16:28.166 UTC [orderer.consensus.etcdraft] Start -> INFO 2db Starting Raft node" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.166 UTC [orderer.common.cluster] Configure -> INFO 2dc Entering, channel: testchainid, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:28.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2dd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-04-22 06:16:28.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2de Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-04-22 06:16:28.167 UTC [orderer.common.cluster] func1 -> DEBU 2df Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:36.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 18f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:36.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 190 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:36.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:38.878 UTC [msp.identity] Sign -> DEBU 192 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:38.879 UTC [gossip.pull] Hello -> DEBU 193 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:38.879 UTC [gossip.comm] Send -> DEBU 194 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:38.879 UTC [msp.identity] Sign -> DEBU 195 Sign: digest: 07F3D2560299FCCF8E7D2B2924768D47E4E4972FAA2C014FA5A13023406A21CC " +peer0.org1.example.com | "2019-04-22 06:16:38.880 UTC [msp.identity] Sign -> DEBU 196 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU 197 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.881 UTC [msp.identity] Sign -> DEBU 198 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:38.882 UTC [gossip.comm] Send -> DEBU 199 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 19a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 19b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:38.881 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:38.885 UTC [gossip.gossip] handleMessage -> DEBU 19d Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17348528674567313950 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.885 UTC [gossip.pull] HandleMessage -> DEBU 19e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17348528674567313950 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.886 UTC [gossip.gossip] handleMessage -> DEBU 19f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:38.886 UTC [gossip.gossip] handleMessage -> DEBU 1a0 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.886 UTC [gossip.gossip] handleMessage -> DEBU 1a1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:38.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.888 UTC [msp.identity] Verify -> DEBU 1a3 Verify: digest = 00000000 07 f3 d2 56 02 99 fc cf 8e 7d 2b 29 24 76 8d 47 |...V.....}+)$v.G| +peer0.org1.example.com | 00000010 e4 e4 97 2f aa 2c 01 4f a5 a1 30 23 40 6a 21 cc |.../.,.O..0#@j!.|" +peer0.org1.example.com | "2019-04-22 06:16:38.888 UTC [msp.identity] Verify -> DEBU 1a4 Verify: sig = 00000000 30 44 02 20 6f 61 fc 31 41 1c 30 c6 39 11 fb 66 |0D. oa.1A.0.9..f| +peer0.org1.example.com | 00000010 e5 e9 69 9d 92 f6 52 17 ab 4b 4a 40 85 33 4f f4 |..i...R..KJ@.3O.| +peer0.org1.example.com | 00000020 a8 e3 48 78 02 20 09 c3 86 16 06 c2 a8 7f e3 f6 |..Hx. ..........| +peer0.org1.example.com | 00000030 07 da 7f 9d 23 37 2b f5 3b 35 23 3b d2 e8 51 10 |....#7+.;5#;..Q.| +peer0.org1.example.com | 00000040 65 ad 49 2e bc 60 |e.I..`|" +peer0.org1.example.com | "2019-04-22 06:16:38.889 UTC [msp.identity] Verify -> DEBU 1a5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:16:38.889 UTC [msp.identity] Verify -> DEBU 1a6 Verify: sig = 00000000 30 45 02 21 00 d7 5a e9 ce bb a9 44 38 91 bf 4a |0E.!..Z....D8..J| +peer0.org1.example.com | 00000010 45 f6 c1 bd 42 aa 02 21 44 bc 37 df 42 f0 6c 21 |E...B..!D.7.B.l!| +peer0.org1.example.com | 00000020 c6 f3 3d a2 13 02 20 3b fe 8f 25 7b e3 a4 35 5a |..=... ;..%{..5Z| +peer0.org1.example.com | 00000030 70 52 7c da ce 75 22 1b f2 91 cb a0 01 61 06 76 |pR|..u"......a.v| +peer0.org1.example.com | 00000040 e5 b5 60 75 78 33 5d |..`ux3]|" +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-04-22 06:16:28.168 UTC [grpc] DialContext -> DEBU 2e0 parsed scheme: """ +orderer0.example.com | "2019-04-22 06:16:28.168 UTC [grpc] DialContext -> DEBU 2e1 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-04-22 06:16:28.168 UTC [grpc] NewAddress -> DEBU 2e2 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +orderer0.example.com | "2019-04-22 06:16:28.169 UTC [grpc] switchBalancer -> DEBU 2e3 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-04-22 06:16:28.169 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e4 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-04-22 06:16:28.171 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e6 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-04-22 06:16:28.169 UTC [grpc] HandleSubConnStateChange -> DEBU 2e5 pickfirstBalancer: HandleSubConnStateChange: 0xc00024e010, CONNECTING" +orderer0.example.com | "2019-04-22 06:16:28.172 UTC [orderer.common.cluster] func1 -> DEBU 2e7 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-04-22 06:16:28.172 UTC [grpc] DialContext -> DEBU 2e8 parsed scheme: """ +orderer0.example.com | "2019-04-22 06:16:28.172 UTC [grpc] DialContext -> DEBU 2e9 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-04-22 06:16:28.172 UTC [grpc] NewAddress -> DEBU 2ea ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +orderer0.example.com | "2019-04-22 06:16:28.173 UTC [grpc] switchBalancer -> DEBU 2eb ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-04-22 06:16:28.173 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ec 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-04-22 06:16:28.173 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ee 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-04-22 06:16:28.173 UTC [grpc] HandleSubConnStateChange -> DEBU 2ed pickfirstBalancer: HandleSubConnStateChange: 0xc00024e330, CONNECTING" +orderer0.example.com | "2019-04-22 06:16:28.174 UTC [orderer.common.cluster] Configure -> INFO 2ef Exiting" +orderer0.example.com | "2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] start -> DEBU 2f0 Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] start -> INFO 2f1 Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f2 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2f3 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f4 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.176 UTC [orderer.common.server] Start -> INFO 2f5 Starting orderer: +orderer0.example.com | Version: 2.0.0 orderer0.example.com | Commit SHA: development build -peer0.org2.example.com | [052 02-28 03:16:20.64 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9, Metadata: -kafka2 | offsets.topic.num.partitions = 50 -zookeeper0 | 2019-02-28 03:15:43,305 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /172.28.0.9:38762 -kafka0 | port = 9092 -kafka1 | port = 9092 orderer0.example.com | Go version: go1.11.5 -peer0.org1.example.com | [084 02-28 03:18:02.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8b9a3b89] Exit chaincode: name:"lscc" (15ms) -kafka3 | principal.builder.class = null -peer0.org2.example.com | [053 02-28 03:16:20.64 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -kafka2 | offsets.topic.replication.factor = 1 -kafka0 | principal.builder.class = null -zookeeper0 | 2019-02-28 03:15:43,329 [myid:1] - WARN [QuorumPeer[myid=1]/0.0.0.0:2181:Follower@116] - Got zxid 0x100000001 expected 0x1 -kafka1 | principal.builder.class = null -orderer0.example.com | OS/Arch: linux/amd64 -kafka3 | producer.purgatory.purge.interval.requests = 1000 -peer0.org2.example.com | [054 02-28 03:16:23.18 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051]] -peer0.org1.example.com | [085 02-28 03:18:02.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45390 grpc.code=OK grpc.call_duration=18.6256ms -kafka2 | offsets.topic.segment.bytes = 104857600 -kafka0 | producer.purgatory.purge.interval.requests = 1000 -zookeeper0 | 2019-02-28 03:15:43,330 [myid:1] - INFO [SyncThread:1:FileTxnLog@203] - Creating new log file: log.100000001 -kafka1 | producer.purgatory.purge.interval.requests = 1000 -kafka3 | queued.max.request.bytes = -1 -orderer0.example.com | [008 02-28 03:15:34.04 UTC] [%{longpkg}] %{callpath} -> INFO Beginning to serve requests -peer0.org2.example.com | [055 02-28 03:16:26.79 UTC] [%{longpkg}] %{callpath} -> INFO [][799b31dd] Entry chaincode: name:"lscc" -peer0.org1.example.com | [086 02-28 03:18:02.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ce799050] Entry chaincode: name:"qscc" -kafka2 | port = 9092 -kafka0 | queued.max.request.bytes = -1 -kafka1 | queued.max.request.bytes = -1 -kafka3 | queued.max.requests = 500 -zookeeper0 | 2019-02-28 03:15:43,431 [myid:1] - INFO [CommitProcessor:1:ZooKeeperServer@673] - Established session 0x1693219a5ee0000 with negotiated timeout 6000 for client /172.28.0.9:38762 -orderer0.example.com | [009 02-28 03:15:34.06 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the topic for this channel... -peer0.org2.example.com | [056 02-28 03:16:26.79 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -kafka2 | principal.builder.class = null -kafka0 | queued.max.requests = 500 -kafka1 | queued.max.requests = 500 -zookeeper0 | 2019-02-28 03:15:43,636 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /172.28.0.7:55964 -peer0.org1.example.com | [087 02-28 03:18:02.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ce799050] Exit chaincode: name:"qscc" (2ms) -kafka3 | quota.consumer.default = 9223372036854775807 -orderer0.example.com | [00a 02-28 03:15:56.71 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the producer for this channel... -peer0.org2.example.com | [057 02-28 03:16:26.79 UTC] [%{longpkg}] %{callpath} -> INFO [][799b31dd] Exit chaincode: name:"lscc" (2ms) -kafka2 | producer.purgatory.purge.interval.requests = 1000 -kafka0 | quota.consumer.default = 9223372036854775807 -kafka1 | quota.consumer.default = 9223372036854775807 -zookeeper0 | 2019-02-28 03:15:43,700 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /172.28.0.7:55964 -kafka3 | quota.producer.default = 9223372036854775807 -orderer0.example.com | [00b 02-28 03:15:56.72 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Producer set up successfully -peer0.org2.example.com | [058 02-28 03:16:26.79 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:41448 grpc.code=OK grpc.call_duration=3.0046ms -kafka2 | queued.max.request.bytes = -1 -peer0.org1.example.com | [088 02-28 03:18:02.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45394 grpc.code=OK grpc.call_duration=6.1555ms -kafka0 | quota.producer.default = 9223372036854775807 -kafka1 | quota.producer.default = 9223372036854775807 -kafka3 | quota.window.num = 11 -zookeeper0 | 2019-02-28 03:15:43,711 [myid:1] - INFO [CommitProcessor:1:ZooKeeperServer@673] - Established session 0x1693219a5ee0001 with negotiated timeout 6000 for client /172.28.0.7:55964 -orderer0.example.com | [00c 02-28 03:15:56.72 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] About to post the CONNECT message... -peer0.org2.example.com | [059 02-28 03:17:13.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -kafka0 | quota.window.num = 11 -peer0.org1.example.com | [089 02-28 03:18:03.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][811da089] Entry chaincode: name:"qscc" -kafka2 | queued.max.requests = 500 -kafka1 | quota.window.num = 11 -kafka3 | quota.window.size.seconds = 1 -zookeeper0 | 2019-02-28 03:15:50,842 [myid:1] - WARN [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@357] - caught end of stream exception -peer0.org2.example.com | [05a 02-28 03:17:13.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 19ms -orderer0.example.com | [00d 02-28 03:15:58.65 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] CONNECT message posted successfully -kafka0 | quota.window.size.seconds = 1 -kafka1 | quota.window.size.seconds = 1 -kafka2 | quota.consumer.default = 9223372036854775807 -peer0.org1.example.com | [08a 02-28 03:18:03.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][811da089] Exit chaincode: name:"qscc" (6ms) -kafka3 | replica.fetch.backoff.ms = 1000 -peer0.org2.example.com | [05b 02-28 03:17:13.90 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] -zookeeper0 | EndOfStreamException: Unable to read additional data from client sessionid 0x1693219a5ee0001, likely client has closed socket -orderer0.example.com | [00e 02-28 03:15:58.65 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the parent consumer for this channel... -kafka0 | replica.fetch.backoff.ms = 1000 -kafka1 | replica.fetch.backoff.ms = 1000 -kafka2 | quota.producer.default = 9223372036854775807 -kafka3 | replica.fetch.max.bytes = 1048576 -peer0.org2.example.com | [05c 02-28 03:17:13.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 41ms (state_validation=4ms block_commit=18ms state_commit=4ms) -peer0.org1.example.com | [08b 02-28 03:18:03.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45398 grpc.code=OK grpc.call_duration=8.6717ms -orderer0.example.com | [00f 02-28 03:15:58.71 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Parent consumer set up successfully -kafka0 | replica.fetch.max.bytes = 1048576 -kafka1 | replica.fetch.max.bytes = 1048576 -zookeeper0 | at org.apache.zookeeper.server.NIOServerCnxn.doIO(NIOServerCnxn.java:228) -kafka3 | replica.fetch.min.bytes = 1 -kafka2 | quota.window.num = 11 -peer0.org1.example.com | [08c 02-28 03:18:03.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5fc046c1] Entry chaincode: name:"cscc" -orderer0.example.com | [010 02-28 03:15:58.71 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)... -peer0.org2.example.com | [05d 02-28 03:17:57.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -kafka0 | replica.fetch.min.bytes = 1 -kafka1 | replica.fetch.min.bytes = 1 -zookeeper0 | at org.apache.zookeeper.server.NIOServerCnxnFactory.run(NIOServerCnxnFactory.java:203) -kafka3 | replica.fetch.response.max.bytes = 10485760 -kafka2 | quota.window.size.seconds = 1 -orderer0.example.com | [011 02-28 03:15:58.77 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Channel consumer set up successfully -peer0.org1.example.com | [08d 02-28 03:18:03.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5fc046c1] Exit chaincode: name:"cscc" (2ms) -peer0.org2.example.com | [05e 02-28 03:17:57.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 20ms -zookeeper0 | at java.lang.Thread.run(Thread.java:748) -kafka0 | replica.fetch.response.max.bytes = 10485760 -kafka1 | replica.fetch.response.max.bytes = 10485760 -kafka2 | replica.fetch.backoff.ms = 1000 -orderer0.example.com | [012 02-28 03:15:58.82 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Start phase completed successfully -kafka3 | replica.fetch.wait.max.ms = 500 -peer0.org2.example.com | [05f 02-28 03:17:57.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 55ms (state_validation=0ms block_commit=22ms state_commit=9ms) -kafka0 | replica.fetch.wait.max.ms = 500 -peer0.org1.example.com | [08e 02-28 03:18:03.62 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45402 grpc.code=OK grpc.call_duration=4.6617ms -kafka1 | replica.fetch.wait.max.ms = 500 -kafka2 | replica.fetch.max.bytes = 1048576 -zookeeper0 | 2019-02-28 03:15:50,849 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /172.28.0.7:55964 which had sessionid 0x1693219a5ee0001 -orderer0.example.com | [013 02-28 03:16:08.99 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -kafka3 | replica.high.watermark.checkpoint.interval.ms = 5000 -peer0.org2.example.com | [060 02-28 03:18:00.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -kafka0 | replica.high.watermark.checkpoint.interval.ms = 5000 -kafka2 | replica.fetch.min.bytes = 1 -zookeeper0 | 2019-02-28 03:15:52,276 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /172.28.0.5:56846 -peer0.org1.example.com | [08f 02-28 03:18:03.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bb51d33] Entry chaincode: name:"cscc" -kafka3 | replica.lag.time.max.ms = 10000 -kafka1 | replica.high.watermark.checkpoint.interval.ms = 5000 -peer0.org2.example.com | [061 02-28 03:18:00.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 5ms -orderer0.example.com | [014 02-28 03:16:09.01 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53832 grpc.code=OK grpc.call_duration=155.0212ms -kafka0 | replica.lag.time.max.ms = 10000 -kafka2 | replica.fetch.response.max.bytes = 10485760 -zookeeper0 | 2019-02-28 03:15:52,293 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x2693219a6220000 at /172.28.0.5:56846 -kafka3 | replica.socket.receive.buffer.bytes = 65536 -peer0.org1.example.com | [090 02-28 03:18:03.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bb51d33] Exit chaincode: name:"cscc" (1ms) -kafka1 | replica.lag.time.max.ms = 10000 -peer0.org2.example.com | [062 02-28 03:18:00.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 19ms (state_validation=0ms block_commit=11ms state_commit=3ms) -kafka0 | replica.socket.receive.buffer.bytes = 65536 -orderer0.example.com | [015 02-28 03:16:09.05 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block 0 -kafka2 | replica.fetch.wait.max.ms = 500 -kafka3 | replica.socket.timeout.ms = 30000 -zookeeper1 | 2019-02-28 03:15:35,490 [myid:2] - INFO [LearnerHandler-/172.28.0.2:33470:LearnerHandler@384] - Synchronizing with Follower sid: 1 maxCommittedLog=0x0 minCommittedLog=0x0 peerLastZxid=0x0 -peer0.org2.example.com | [063 02-28 03:18:19.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -kafka1 | replica.socket.receive.buffer.bytes = 65536 -peer0.org1.example.com | [091 02-28 03:18:03.90 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45406 grpc.code=OK grpc.call_duration=2.7253ms -kafka0 | replica.socket.timeout.ms = 30000 -kafka2 | replica.high.watermark.checkpoint.interval.ms = 5000 -orderer0.example.com | [016 02-28 03:16:09.05 UTC] [%{longpkg}] %{callpath} -> INFO Created and starting new chain businesschannel -kafka3 | replication.quota.window.num = 11 -zookeeper0 | 2019-02-28 03:15:52,295 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x2693219a6220000 -zookeeper2 | 2019-02-28 03:15:43,521 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /172.28.0.8:35234 -peer0.org2.example.com | [064 02-28 03:18:19.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -kafka1 | replica.socket.timeout.ms = 30000 -kafka0 | replication.quota.window.num = 11 -peer0.org1.example.com | [092 02-28 03:18:04.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c065ada1] Entry chaincode: name:"cscc" -kafka2 | replica.lag.time.max.ms = 10000 -kafka3 | replication.quota.window.size.seconds = 1 -zookeeper0 | 2019-02-28 03:15:52,309 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:ZooKeeperServer@673] - Established session 0x2693219a6220000 with negotiated timeout 6000 for client /172.28.0.5:56846 -orderer0.example.com | [017 02-28 03:16:09.05 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the topic for this channel... -peer0.org2.example.com | [065 02-28 03:18:19.91 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -kafka1 | replication.quota.window.num = 11 -kafka0 | replication.quota.window.size.seconds = 1 -kafka2 | replica.socket.receive.buffer.bytes = 65536 -kafka3 | request.timeout.ms = 30000 -peer0.org1.example.com | [093 02-28 03:18:04.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c065ada1] Exit chaincode: name:"cscc" (2ms) -peer0.org2.example.com | [066 02-28 03:18:19.95 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:21.959Z grpc.peer_address=172.28.0.14:34978 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=164.3µs -kafka1 | replication.quota.window.size.seconds = 1 -kafka0 | request.timeout.ms = 30000 -orderer0.example.com | [018 02-28 03:16:09.06 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53830 because of consenter error -kafka2 | replica.socket.timeout.ms = 30000 -kafka3 | reserved.broker.max.id = 1000 -peer0.org1.example.com | [094 02-28 03:18:04.14 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45410 grpc.code=OK grpc.call_duration=6.2881ms -peer0.org2.example.com | [067 02-28 03:18:19.96 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -kafka1 | request.timeout.ms = 30000 -kafka0 | reserved.broker.max.id = 1000 -orderer0.example.com | [019 02-28 03:16:09.06 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53830 grpc.code=OK grpc.call_duration=224.5306ms -kafka2 | replication.quota.window.num = 11 -kafka3 | sasl.enabled.mechanisms = [GSSAPI] -peer0.org1.example.com | [095 02-28 03:18:19.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -peer0.org2.example.com | [068 02-28 03:18:19.96 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -kafka1 | reserved.broker.max.id = 1000 -kafka0 | sasl.enabled.mechanisms = [GSSAPI] -kafka2 | replication.quota.window.size.seconds = 1 -kafka3 | sasl.kerberos.kinit.cmd = /usr/bin/kinit -orderer0.example.com | [01a 02-28 03:16:09.30 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53838 because of consenter error -kafka1 | sasl.enabled.mechanisms = [GSSAPI] -kafka0 | sasl.kerberos.kinit.cmd = /usr/bin/kinit -kafka2 | request.timeout.ms = 30000 -peer0.org1.example.com | [096 02-28 03:18:19.89 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -peer0.org2.example.com | [069 02-28 03:18:19.96 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -kafka3 | sasl.kerberos.min.time.before.relogin = 60000 -kafka1 | sasl.kerberos.kinit.cmd = /usr/bin/kinit -kafka0 | sasl.kerberos.min.time.before.relogin = 60000 -orderer0.example.com | [01b 02-28 03:16:09.30 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53838 grpc.code=OK grpc.call_duration=212.243ms -kafka2 | reserved.broker.max.id = 1000 -peer0.org1.example.com | [097 02-28 03:18:19.89 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -kafka3 | sasl.kerberos.principal.to.local.rules = [DEFAULT] -peer0.org2.example.com | [06a 02-28 03:18:19.96 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -kafka0 | sasl.kerberos.principal.to.local.rules = [DEFAULT] -kafka1 | sasl.kerberos.min.time.before.relogin = 60000 -kafka2 | sasl.enabled.mechanisms = [GSSAPI] -kafka3 | sasl.kerberos.service.name = null -orderer0.example.com | [01c 02-28 03:16:09.43 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the producer for this channel... -peer0.org1.example.com | [098 02-28 03:18:19.99 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -kafka0 | sasl.kerberos.service.name = null -peer0.org2.example.com | [06b 02-28 03:18:19.96 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -kafka1 | sasl.kerberos.principal.to.local.rules = [DEFAULT] -kafka3 | sasl.kerberos.ticket.renew.jitter = 0.05 -kafka2 | sasl.kerberos.kinit.cmd = /usr/bin/kinit -peer0.org1.example.com | [099 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -orderer0.example.com | [01d 02-28 03:16:09.46 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Producer set up successfully -peer0.org2.example.com | [06c 02-28 03:18:19.96 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.14:34838 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m0.2276775s -kafka1 | sasl.kerberos.service.name = null -kafka3 | sasl.kerberos.ticket.renew.window.factor = 0.8 -kafka0 | sasl.kerberos.ticket.renew.jitter = 0.05 -kafka2 | sasl.kerberos.min.time.before.relogin = 60000 -peer0.org1.example.com | [09a 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -orderer0.example.com | [01e 02-28 03:16:09.46 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] About to post the CONNECT message... -peer0.org2.example.com | [06d 02-28 03:18:19.96 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:29.961Z grpc.peer_address=172.28.0.14:34978 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=7.921ms -kafka1 | sasl.kerberos.ticket.renew.jitter = 0.05 -kafka3 | sasl.mechanism.inter.broker.protocol = GSSAPI -kafka0 | sasl.kerberos.ticket.renew.window.factor = 0.8 -kafka2 | sasl.kerberos.principal.to.local.rules = [DEFAULT] -peer0.org1.example.com | [09b 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org2.example.com | [06e 02-28 03:18:19.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 108ms -orderer0.example.com | [01f 02-28 03:16:09.58 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53840 because of consenter error -kafka3 | security.inter.broker.protocol = PLAINTEXT -kafka0 | sasl.mechanism.inter.broker.protocol = GSSAPI -kafka2 | sasl.kerberos.service.name = null -peer0.org1.example.com | [09c 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -kafka1 | sasl.kerberos.ticket.renew.window.factor = 0.8 -kafka3 | socket.receive.buffer.bytes = 102400 -peer0.org2.example.com | [06f 02-28 03:18:20.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.021Z grpc.peer_address=172.28.0.15:34548 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=171.7µs -zookeeper1 | 2019-02-28 03:15:35,490 [myid:2] - INFO [LearnerHandler-/172.28.0.2:33470:LearnerHandler@393] - leader and follower are in sync, zxid=0x0 -kafka2 | sasl.kerberos.ticket.renew.jitter = 0.05 -orderer0.example.com | [020 02-28 03:16:09.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53840 grpc.code=OK grpc.call_duration=200.4706ms -kafka0 | security.inter.broker.protocol = PLAINTEXT -peer0.org1.example.com | [09d 02-28 03:18:20.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 126ms -kafka1 | sasl.mechanism.inter.broker.protocol = GSSAPI -kafka3 | socket.request.max.bytes = 104857600 -peer0.org2.example.com | [070 02-28 03:18:20.05 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.15:34382 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2m1.0524097s -kafka2 | sasl.kerberos.ticket.renew.window.factor = 0.8 -kafka0 | socket.receive.buffer.bytes = 102400 -kafka1 | security.inter.broker.protocol = PLAINTEXT -orderer0.example.com | [021 02-28 03:16:09.80 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53846 because of consenter error -kafka3 | socket.send.buffer.bytes = 102400 -peer0.org1.example.com | [09e 02-28 03:18:20.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.017Z grpc.peer_address=172.28.0.12:50260 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=196.6µs -kafka2 | sasl.mechanism.inter.broker.protocol = GSSAPI -peer0.org2.example.com | [071 02-28 03:18:20.05 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.047Z grpc.peer_address=172.28.0.15:34548 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=8.5576ms -kafka0 | socket.request.max.bytes = 104857600 -kafka1 | socket.receive.buffer.bytes = 102400 -kafka3 | ssl.cipher.suites = null -orderer0.example.com | [022 02-28 03:16:09.80 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53846 grpc.code=OK grpc.call_duration=204.0983ms -kafka2 | security.inter.broker.protocol = PLAINTEXT -peer0.org1.example.com | [09f 02-28 03:18:20.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.024Z grpc.peer_address=172.28.0.15:41824 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.7556ms -kafka0 | socket.send.buffer.bytes = 102400 -kafka1 | socket.request.max.bytes = 104857600 -peer0.org2.example.com | [072 02-28 03:18:20.09 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9 isn't responsive: rpc error: code = Unavailable desc = transport is closing -kafka3 | ssl.client.auth = none -kafka2 | socket.receive.buffer.bytes = 102400 -orderer0.example.com | [023 02-28 03:16:10.02 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53848 because of consenter error -peer0.org1.example.com | [0a0 02-28 03:18:20.03 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.031Z grpc.peer_address=172.28.0.14:41300 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.7728ms -kafka0 | ssl.cipher.suites = null -kafka1 | socket.send.buffer.bytes = 102400 -peer0.org2.example.com | [073 02-28 03:18:20.09 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.13:48530 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m59.5829587s -kafka3 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] -kafka2 | socket.request.max.bytes = 104857600 -kafka0 | ssl.client.auth = none -orderer0.example.com | [024 02-28 03:16:10.02 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53848 grpc.code=OK grpc.call_duration=202.0332ms -peer0.org1.example.com | [0a1 02-28 03:18:20.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 50ms (state_validation=29ms block_commit=11ms state_commit=7ms) -peer0.org2.example.com | [074 02-28 03:18:20.09 UTC] [%{longpkg}] %{callpath} -> WARN Entering [c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9] -kafka1 | ssl.cipher.suites = null -kafka2 | socket.send.buffer.bytes = 102400 -orderer0.example.com | [025 02-28 03:16:10.23 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53854 because of consenter error -kafka3 | ssl.endpoint.identification.algorithm = null -peer0.org1.example.com | [0a2 02-28 03:18:20.08 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.052Z grpc.peer_address=172.28.0.14:41300 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.86ms -kafka0 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] -kafka1 | ssl.client.auth = none -kafka2 | ssl.cipher.suites = null -peer0.org2.example.com | [076 02-28 03:18:20.09 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9, Metadata: -kafka3 | ssl.key.password = null -orderer0.example.com | [026 02-28 03:16:10.24 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53854 grpc.code=OK grpc.call_duration=201.8249ms -kafka1 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] -kafka0 | ssl.endpoint.identification.algorithm = null -kafka2 | ssl.client.auth = none -peer0.org2.example.com | [077 02-28 03:18:20.10 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -peer0.org1.example.com | [0a3 02-28 03:18:20.08 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.036Z grpc.peer_address=172.28.0.15:41824 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.6249ms -kafka3 | ssl.keymanager.algorithm = SunX509 -orderer0.example.com | [027 02-28 03:16:10.45 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53858 because of consenter error -kafka0 | ssl.key.password = null -kafka2 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] -kafka1 | ssl.endpoint.identification.algorithm = null -peer0.org2.example.com | [075 02-28 03:18:20.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 88ms (state_validation=50ms block_commit=32ms state_commit=3ms) -peer0.org1.example.com | [0a4 02-28 03:18:20.10 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.053Z grpc.peer_address=172.28.0.12:50260 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.4603ms -kafka1 | ssl.key.password = null -kafka0 | ssl.keymanager.algorithm = SunX509 -kafka2 | ssl.endpoint.identification.algorithm = null -kafka3 | ssl.keystore.location = null -orderer0.example.com | [028 02-28 03:16:10.46 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53858 grpc.code=OK grpc.call_duration=204.577ms -zookeeper2 | 2019-02-28 03:15:43,576 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /172.28.0.8:35234 -peer0.org1.example.com | [0a5 02-28 03:18:37.16 UTC] [%{longpkg}] %{callpath} -> INFO [][db559b66] Entry chaincode: name:"cscc" -peer0.org2.example.com | [078 02-28 03:18:20.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.106Z grpc.peer_address=172.28.0.13:48674 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=345.3µs -kafka2 | ssl.key.password = null -kafka3 | ssl.keystore.password = null -kafka0 | ssl.keystore.location = null -orderer0.example.com | [029 02-28 03:16:10.68 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53860 because of consenter error -kafka1 | ssl.keymanager.algorithm = SunX509 -peer0.org1.example.com | [0a6 02-28 03:18:37.16 UTC] [%{longpkg}] %{callpath} -> INFO [][db559b66] Exit chaincode: name:"cscc" (1ms) -peer0.org2.example.com | [079 02-28 03:18:20.12 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.11Z grpc.peer_address=172.28.0.13:48674 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.4895ms -kafka3 | ssl.keystore.type = JKS -kafka0 | ssl.keystore.password = null -kafka2 | ssl.keymanager.algorithm = SunX509 -kafka1 | ssl.keystore.location = null -kafka3 | ssl.protocol = TLS -peer0.org1.example.com | [0a7 02-28 03:18:37.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45494 grpc.code=OK grpc.call_duration=3.3891ms -orderer0.example.com | [02a 02-28 03:16:10.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53860 grpc.code=OK grpc.call_duration=218.503ms -kafka2 | ssl.keystore.location = null -kafka1 | ssl.keystore.password = null -kafka3 | ssl.provider = null -peer0.org2.example.com | [07a 02-28 03:18:20.13 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.13Z grpc.peer_address=172.28.0.13:48676 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=148.9µs -kafka0 | ssl.keystore.type = JKS -kafka2 | ssl.keystore.password = null -kafka3 | ssl.secure.random.implementation = null -orderer0.example.com | [02b 02-28 03:16:10.96 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53864 because of consenter error -peer0.org1.example.com | [0a8 02-28 03:18:38.28 UTC] [%{longpkg}] %{callpath} -> INFO [][20b1bcac] Entry chaincode: name:"qscc" -kafka1 | ssl.keystore.type = JKS -kafka0 | ssl.protocol = TLS -kafka2 | ssl.keystore.type = JKS -kafka3 | ssl.trustmanager.algorithm = PKIX -peer0.org2.example.com | [07b 02-28 03:18:37.56 UTC] [%{longpkg}] %{callpath} -> INFO [][3f6e4307] Entry chaincode: name:"cscc" -orderer0.example.com | [02c 02-28 03:16:10.96 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53864 grpc.code=OK grpc.call_duration=204.0672ms -kafka1 | ssl.protocol = TLS -peer0.org1.example.com | [0a9 02-28 03:18:38.28 UTC] [%{longpkg}] %{callpath} -> INFO [][20b1bcac] Exit chaincode: name:"qscc" (2ms) -kafka0 | ssl.provider = null -kafka2 | ssl.protocol = TLS -kafka3 | ssl.truststore.location = null -peer0.org2.example.com | [07c 02-28 03:18:37.56 UTC] [%{longpkg}] %{callpath} -> INFO [][3f6e4307] Exit chaincode: name:"cscc" (1ms) -kafka1 | ssl.provider = null -orderer0.example.com | [02d 02-28 03:16:11.24 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53866 because of consenter error -peer0.org1.example.com | [0aa 02-28 03:18:38.28 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45502 grpc.code=OK grpc.call_duration=5.2134ms -kafka0 | ssl.secure.random.implementation = null -kafka2 | ssl.provider = null -zookeeper1 | 2019-02-28 03:15:35,491 [myid:2] - INFO [LearnerHandler-/172.28.0.2:33470:LearnerHandler@458] - Sending DIFF -kafka3 | ssl.truststore.password = null -peer0.org2.example.com | [07d 02-28 03:18:37.56 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:41626 grpc.code=OK grpc.call_duration=3.07ms -kafka1 | ssl.secure.random.implementation = null -orderer0.example.com | [02e 02-28 03:16:11.25 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53866 grpc.code=OK grpc.call_duration=222.4605ms -kafka0 | ssl.trustmanager.algorithm = PKIX -kafka2 | ssl.secure.random.implementation = null -kafka3 | ssl.truststore.type = JKS -kafka1 | ssl.trustmanager.algorithm = PKIX -peer0.org2.example.com | [07e 02-28 03:18:38.63 UTC] [%{longpkg}] %{callpath} -> INFO [][7ee4e714] Entry chaincode: name:"qscc" -kafka0 | ssl.truststore.location = null -kafka2 | ssl.trustmanager.algorithm = PKIX -kafka3 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 -orderer0.example.com | [02f 02-28 03:16:11.50 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] CONNECT message posted successfully -kafka1 | ssl.truststore.location = null -kafka0 | ssl.truststore.password = null -kafka3 | transaction.max.timeout.ms = 900000 -kafka2 | ssl.truststore.location = null -peer0.org2.example.com | [07f 02-28 03:18:38.64 UTC] [%{longpkg}] %{callpath} -> INFO [][7ee4e714] Exit chaincode: name:"qscc" (2ms) -kafka1 | ssl.truststore.password = null -orderer0.example.com | [030 02-28 03:16:11.50 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the parent consumer for this channel... -kafka0 | ssl.truststore.type = JKS -kafka3 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 -kafka2 | ssl.truststore.password = null -peer0.org2.example.com | [080 02-28 03:18:38.64 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:41634 grpc.code=OK grpc.call_duration=4.6445ms -kafka1 | ssl.truststore.type = JKS -kafka3 | transaction.state.log.load.buffer.size = 5242880 -kafka0 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 -kafka2 | ssl.truststore.type = JKS -orderer0.example.com | [031 02-28 03:16:11.51 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Parent consumer set up successfully -kafka3 | transaction.state.log.min.isr = 1 -kafka0 | transaction.max.timeout.ms = 900000 -orderer0.example.com | [032 02-28 03:16:11.51 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)... -kafka2 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 -kafka0 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 -kafka3 | transaction.state.log.num.partitions = 50 -kafka1 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 -orderer0.example.com | [033 02-28 03:16:11.53 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53868 because of consenter error -kafka0 | transaction.state.log.load.buffer.size = 5242880 -kafka1 | transaction.max.timeout.ms = 900000 -kafka3 | transaction.state.log.replication.factor = 1 -kafka2 | transaction.max.timeout.ms = 900000 -kafka0 | transaction.state.log.min.isr = 1 -orderer0.example.com | [034 02-28 03:16:11.53 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53868 grpc.code=OK grpc.call_duration=205.1203ms -kafka1 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 -kafka3 | transaction.state.log.segment.bytes = 104857600 -kafka2 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 -kafka0 | transaction.state.log.num.partitions = 50 -kafka1 | transaction.state.log.load.buffer.size = 5242880 -kafka3 | transactional.id.expiration.ms = 604800000 -kafka2 | transaction.state.log.load.buffer.size = 5242880 -orderer0.example.com | [035 02-28 03:16:11.70 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Channel consumer set up successfully -kafka0 | transaction.state.log.replication.factor = 1 -kafka1 | transaction.state.log.min.isr = 1 -kafka2 | transaction.state.log.min.isr = 1 -kafka0 | transaction.state.log.segment.bytes = 104857600 -kafka1 | transaction.state.log.num.partitions = 50 -kafka3 | unclean.leader.election.enable = false -kafka2 | transaction.state.log.num.partitions = 50 -kafka0 | transactional.id.expiration.ms = 604800000 -kafka1 | transaction.state.log.replication.factor = 1 -orderer0.example.com | [036 02-28 03:16:11.73 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Start phase completed successfully -kafka3 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 -kafka2 | transaction.state.log.replication.factor = 1 -kafka0 | unclean.leader.election.enable = false -kafka1 | transaction.state.log.segment.bytes = 104857600 -kafka3 | zookeeper.connection.timeout.ms = 6000 -kafka2 | transaction.state.log.segment.bytes = 104857600 -kafka0 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 -orderer0.example.com | [037 02-28 03:16:11.84 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53874 grpc.code=OK grpc.call_duration=256.1619ms -kafka1 | transactional.id.expiration.ms = 604800000 -kafka3 | zookeeper.session.timeout.ms = 6000 -kafka2 | transactional.id.expiration.ms = 604800000 -kafka0 | zookeeper.connection.timeout.ms = 6000 -orderer0.example.com | [038 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53908: rpc error: code = Canceled desc = context canceled -kafka1 | unclean.leader.election.enable = false -kafka3 | zookeeper.set.acl = false -kafka0 | zookeeper.session.timeout.ms = 6000 -kafka2 | unclean.leader.election.enable = false -kafka1 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 -orderer0.example.com | [03a 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53908 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=69.4443ms -kafka3 | zookeeper.sync.time.ms = 2000 -kafka0 | zookeeper.set.acl = false -kafka2 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 -kafka1 | zookeeper.connection.timeout.ms = 6000 -kafka1 | zookeeper.session.timeout.ms = 6000 -kafka1 | zookeeper.set.acl = false -kafka0 | zookeeper.sync.time.ms = 2000 -orderer0.example.com | [039 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53910: rpc error: code = Canceled desc = context canceled -kafka3 | (kafka.server.KafkaConfig) -kafka1 | zookeeper.sync.time.ms = 2000 -kafka2 | zookeeper.connection.timeout.ms = 6000 -orderer0.example.com | [03b 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53910 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=56.0448ms -kafka3 | [2019-02-28 03:15:43,282] INFO starting (kafka.server.KafkaServer) -kafka0 | (kafka.server.KafkaConfig) -kafka1 | (kafka.server.KafkaConfig) -orderer0.example.com | [03c 02-28 03:16:18.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53916: rpc error: code = Canceled desc = context canceled -kafka2 | zookeeper.session.timeout.ms = 6000 -kafka1 | [2019-02-28 03:15:42,920] INFO starting (kafka.server.KafkaServer) -zookeeper1 | 2019-02-28 03:15:35,582 [myid:2] - INFO [LearnerHandler-/172.28.0.2:33470:LearnerHandler@518] - Received NEWLEADER-ACK message from 1 -kafka2 | zookeeper.set.acl = false -kafka3 | [2019-02-28 03:15:43,305] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) -kafka0 | [2019-02-28 03:15:42,948] INFO starting (kafka.server.KafkaServer) -orderer0.example.com | [03d 02-28 03:16:18.93 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53916 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=144.3606ms -kafka1 | [2019-02-28 03:15:42,928] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) -kafka2 | zookeeper.sync.time.ms = 2000 -kafka3 | [2019-02-28 03:15:43,495] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) -orderer0.example.com | [03e 02-28 03:16:18.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53918: rpc error: code = Canceled desc = context canceled -zookeeper2 | 2019-02-28 03:15:43,610 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x3693219a7580000 with negotiated timeout 6000 for client /172.28.0.8:35234 -kafka0 | [2019-02-28 03:15:42,962] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) -kafka1 | [2019-02-28 03:15:43,003] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) -orderer0.example.com | [03f 02-28 03:16:18.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53918 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=140.6368ms -kafka2 | (kafka.server.KafkaConfig) -kafka1 | [2019-02-28 03:15:43,060] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,195] INFO starting (kafka.server.KafkaServer) -kafka3 | [2019-02-28 03:15:43,516] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [040 02-28 03:16:24.24 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.14:47114 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.5387103s -kafka0 | [2019-02-28 03:15:43,128] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) -kafka1 | [2019-02-28 03:15:43,061] INFO Client environment:host.name=kafka1 (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,204] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) -kafka3 | [2019-02-28 03:15:43,558] INFO Client environment:host.name=kafka3 (org.apache.zookeeper.ZooKeeper) -kafka0 | [2019-02-28 03:15:43,175] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,386] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) -kafka3 | [2019-02-28 03:15:43,558] INFO Client environment:java.version=1.8.0_181 (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,558] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [041 02-28 03:17:11.85 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53980: rpc error: code = Canceled desc = context canceled -kafka1 | [2019-02-28 03:15:43,061] INFO Client environment:java.version=1.8.0_181 (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,559] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,403] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [042 02-28 03:17:11.85 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53980 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5368747s -orderer0.example.com | [043 02-28 03:17:55.56 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53998: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [044 02-28 03:17:55.56 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.1122ms -orderer0.example.com | [045 02-28 03:17:58.26 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54012: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [046 02-28 03:17:58.26 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:54012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.6709ms -orderer0.example.com | [047 02-28 03:18:04.72 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54062: rpc error: code = Canceled desc = context canceled -kafka1 | [2019-02-28 03:15:43,061] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [048 02-28 03:18:04.72 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.5046ms -orderer0.example.com | [049 02-28 03:18:05.12 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54064: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [04a 02-28 03:18:05.12 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54064 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.9987ms -kafka1 | [2019-02-28 03:15:43,062] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) -kafka0 | [2019-02-28 03:15:43,192] INFO Client environment:host.name=kafka0 (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [04b 02-28 03:18:05.36 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54066: rpc error: code = Canceled desc = context canceled -kafka2 | [2019-02-28 03:15:43,403] INFO Client environment:host.name=kafka2 (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [04c 02-28 03:18:05.36 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2082ms -kafka0 | [2019-02-28 03:15:43,202] INFO Client environment:java.version=1.8.0_181 (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [04d 02-28 03:18:05.66 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54068: rpc error: code = Canceled desc = context canceled -kafka0 | [2019-02-28 03:15:43,208] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [04e 02-28 03:18:05.66 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.1116ms -kafka2 | [2019-02-28 03:15:43,403] INFO Client environment:java.version=1.8.0_181 (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [04f 02-28 03:18:05.97 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54070: rpc error: code = Canceled desc = context canceled -kafka0 | [2019-02-28 03:15:43,214] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [050 02-28 03:18:05.97 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=61.9088ms -kafka2 | [2019-02-28 03:15:43,404] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [051 02-28 03:18:06.16 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54072: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [052 02-28 03:18:06.16 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.2948ms -orderer0.example.com | [053 02-28 03:18:06.39 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54074: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [054 02-28 03:18:06.39 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54074 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2278ms -kafka2 | [2019-02-28 03:15:43,404] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) -orderer0.example.com | [055 02-28 03:18:06.64 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54076: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [056 02-28 03:18:06.65 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.0671ms -orderer0.example.com | [057 02-28 03:18:06.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54078: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [058 02-28 03:18:06.92 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54078 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.1341ms -orderer0.example.com | [059 02-28 03:18:07.13 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54080: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [05a 02-28 03:18:07.13 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54080 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0353ms -orderer0.example.com | [05b 02-28 03:18:07.39 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54082: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [05c 02-28 03:18:07.40 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54082 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0492ms -orderer0.example.com | [05d 02-28 03:18:07.63 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54084: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [05e 02-28 03:18:07.63 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.009ms -zookeeper1 | 2019-02-28 03:15:35,583 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Leader@952] - Have quorum of supporters, sids: [ 1,2 ]; starting up and setting last processed zxid: 0x100000000 -orderer0.example.com | [05f 02-28 03:18:19.75 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -orderer0.example.com | [060 02-28 03:18:19.76 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -orderer0.example.com | [061 02-28 03:18:19.81 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -orderer0.example.com | [062 02-28 03:18:19.81 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -orderer0.example.com | [063 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54086: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [064 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54086 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=89.9368ms -orderer0.example.com | [065 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54088: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [066 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:54088 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=77.9045ms -orderer0.example.com | [067 02-28 03:18:22.00 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54112: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [068 02-28 03:18:22.00 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54112 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.8183ms -orderer0.example.com | [069 02-28 03:18:22.18 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54114: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [06a 02-28 03:18:22.18 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54114 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.2779ms -orderer0.example.com | [06b 02-28 03:18:22.84 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54116: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [06c 02-28 03:18:22.84 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54116 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.5206ms -orderer0.example.com | [06d 02-28 03:18:23.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54118: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [06e 02-28 03:18:23.07 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54118 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.4903ms -orderer0.example.com | [06f 02-28 03:18:23.26 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54120: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [070 02-28 03:18:23.26 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54120 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.6267ms -orderer0.example.com | [071 02-28 03:18:23.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54122: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [072 02-28 03:18:23.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54122 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.9503ms -orderer0.example.com | [073 02-28 03:18:23.75 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54124: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [074 02-28 03:18:23.75 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54124 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2949ms -orderer0.example.com | [075 02-28 03:18:23.98 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54126: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [076 02-28 03:18:23.98 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54126 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.5484ms -orderer0.example.com | [077 02-28 03:18:24.20 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54128: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [078 02-28 03:18:24.20 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54128 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6568ms -orderer0.example.com | [079 02-28 03:18:24.44 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54130: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [07a 02-28 03:18:24.44 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54130 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.9623ms -orderer0.example.com | [07b 02-28 03:18:24.72 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54132: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [07c 02-28 03:18:24.72 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54132 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.5518ms -orderer0.example.com | [07d 02-28 03:18:24.99 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54134: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [07e 02-28 03:18:24.99 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54134 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.9978ms -orderer0.example.com | [07f 02-28 03:18:25.21 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54136: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [080 02-28 03:18:25.21 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54136 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8164ms -orderer0.example.com | [081 02-28 03:18:25.41 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54138: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [082 02-28 03:18:25.41 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54138 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.071ms -orderer0.example.com | [083 02-28 03:18:25.76 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54140: rpc error: code = Canceled desc = context canceled -zookeeper2 | 2019-02-28 03:15:50,941 [myid:3] - WARN [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@357] - caught end of stream exception -orderer0.example.com | [084 02-28 03:18:25.76 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.1155ms -kafka2 | [2019-02-28 03:15:43,404] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,405] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,406] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,406] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,407] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,407] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,408] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,408] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,409] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,409] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) -zookeeper1 | 2019-02-28 03:15:35,600 [myid:2] - INFO [LearnerHandler-/172.28.0.4:43102:LearnerHandler@329] - Follower sid: 3 : info : org.apache.zookeeper.server.quorum.QuorumPeer$QuorumServer@6a1b684e -kafka2 | [2019-02-28 03:15:43,412] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@6572421 (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:43,557] INFO Opening socket connection to server zookeeper0.hlf_net/172.28.0.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:43,568] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) -kafka2 | [2019-02-28 03:15:43,644] INFO Socket connection established to zookeeper0.hlf_net/172.28.0.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) -zookeeper2 | EndOfStreamException: Unable to read additional data from client sessionid 0x3693219a7580000, likely client has closed socket -kafka2 | [2019-02-28 03:15:43,716] INFO Session establishment complete on server zookeeper0.hlf_net/172.28.0.2:2181, sessionid = 0x1693219a5ee0001, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:43,756] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) -kafka2 | [2019-02-28 03:15:45,656] INFO Cluster ID = a5PpSFQ3Tv-Yzkiezevw7w (kafka.server.KafkaServer) -kafka2 | [2019-02-28 03:15:45,718] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -kafka2 | [2019-02-28 03:15:46,039] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka2 | [2019-02-28 03:15:46,046] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka2 | [2019-02-28 03:15:46,073] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka2 | [2019-02-28 03:15:46,390] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:46,528] INFO Loading logs. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:46,610] INFO Logs loading complete in 80 ms. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:50,840] WARN Client session timed out, have not heard from server in 4575ms for sessionid 0x1693219a5ee0001 (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:50,841] INFO Client session timed out, have not heard from server in 4575ms for sessionid 0x1693219a5ee0001, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:51,012] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) -kafka2 | [2019-02-28 03:15:51,299] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:51,344] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:51,817] INFO Opening socket connection to server zookeeper2.hlf_net/172.28.0.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:51,823] INFO Socket connection established to zookeeper2.hlf_net/172.28.0.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:51,886] INFO Session establishment complete on server zookeeper2.hlf_net/172.28.0.4:2181, sessionid = 0x1693219a5ee0001, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:51,895] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) -kafka2 | [2019-02-28 03:15:54,670] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) -zookeeper2 | at org.apache.zookeeper.server.NIOServerCnxn.doIO(NIOServerCnxn.java:228) -kafka2 | [2019-02-28 03:15:54,725] INFO [SocketServer brokerId=2] Started 1 acceptor threads (kafka.network.SocketServer) -zookeeper1 | 2019-02-28 03:15:35,617 [myid:2] - INFO [LearnerHandler-/172.28.0.4:43102:LearnerHandler@384] - Synchronizing with Follower sid: 3 maxCommittedLog=0x0 minCommittedLog=0x0 peerLastZxid=0x0 -zookeeper2 | at org.apache.zookeeper.server.NIOServerCnxnFactory.run(NIOServerCnxnFactory.java:203) -zookeeper2 | at java.lang.Thread.run(Thread.java:748) -kafka2 | [2019-02-28 03:15:54,899] INFO [ExpirationReaper-2-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper1 | 2019-02-28 03:15:35,625 [myid:2] - INFO [LearnerHandler-/172.28.0.4:43102:LearnerHandler@393] - leader and follower are in sync, zxid=0x0 -zookeeper1 | 2019-02-28 03:15:35,631 [myid:2] - INFO [LearnerHandler-/172.28.0.4:43102:LearnerHandler@458] - Sending DIFF -zookeeper2 | 2019-02-28 03:15:51,050 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /172.28.0.8:35234 which had sessionid 0x3693219a7580000 -kafka2 | [2019-02-28 03:15:54,919] INFO [ExpirationReaper-2-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper1 | 2019-02-28 03:15:35,977 [myid:2] - INFO [LearnerHandler-/172.28.0.4:43102:LearnerHandler@518] - Received NEWLEADER-ACK message from 3 -kafka2 | [2019-02-28 03:15:54,943] INFO [ExpirationReaper-2-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper2 | 2019-02-28 03:15:51,818 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /172.28.0.7:48762 -zookeeper1 | 2019-02-28 03:15:43,319 [myid:2] - INFO [SyncThread:2:FileTxnLog@203] - Creating new log file: log.100000001 -kafka2 | [2019-02-28 03:15:55,175] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) -kafka2 | [2019-02-28 03:15:55,468] INFO [ExpirationReaper-2-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper2 | 2019-02-28 03:15:51,835 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x1693219a5ee0001 at /172.28.0.7:48762 -zookeeper1 | 2019-02-28 03:15:43,746 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /172.28.0.5:55660 -zookeeper2 | 2019-02-28 03:15:51,836 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x1693219a5ee0001 -kafka2 | [2019-02-28 03:15:55,515] INFO [ExpirationReaper-2-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper1 | 2019-02-28 03:15:43,815 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /172.28.0.5:55660 -kafka2 | [2019-02-28 03:15:55,529] INFO [ExpirationReaper-2-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper2 | 2019-02-28 03:15:51,890 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:ZooKeeperServer@673] - Established session 0x1693219a5ee0001 with negotiated timeout 6000 for client /172.28.0.7:48762 -zookeeper1 | 2019-02-28 03:15:43,876 [myid:2] - INFO [CommitProcessor:2:ZooKeeperServer@673] - Established session 0x2693219a6220000 with negotiated timeout 6000 for client /172.28.0.5:55660 -kafka2 | [2019-02-28 03:15:55,676] INFO [GroupCoordinator 2]: Starting up. (kafka.coordinator.group.GroupCoordinator) -kafka2 | [2019-02-28 03:15:55,685] INFO [GroupCoordinator 2]: Startup complete. (kafka.coordinator.group.GroupCoordinator) -zookeeper1 | 2019-02-28 03:15:43,891 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x5 zxid:0x100000006 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NoNode for /brokers -kafka2 | [2019-02-28 03:15:55,735] INFO [GroupMetadataManager brokerId=2] Removed 0 expired offsets in 51 milliseconds. (kafka.coordinator.group.GroupMetadataManager) -kafka2 | [2019-02-28 03:15:55,831] INFO [ProducerId Manager 2]: Acquired new producerId block (brokerId:2,blockStartProducerId:3000,blockEndProducerId:3999) by writing to Zk with path version 4 (kafka.coordinator.transaction.ProducerIdManager) -zookeeper1 | 2019-02-28 03:15:43,924 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x3 zxid:0x100000007 txntype:-1 reqpath:n/a Error Path:/consumers Error:KeeperErrorCode = NodeExists for /consumers -kafka2 | [2019-02-28 03:15:55,933] INFO [TransactionCoordinator id=2] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) -kafka1 | [2019-02-28 03:15:43,062] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) -kafka0 | [2019-02-28 03:15:43,214] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:55,944] INFO [TransactionCoordinator id=2] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) -kafka2 | [2019-02-28 03:15:55,954] INFO [Transaction Marker Channel Manager 2]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) -kafka1 | [2019-02-28 03:15:43,063] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) -zookeeper1 | 2019-02-28 03:15:43,968 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0x4 zxid:0x100000008 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NoNode for /brokers -kafka0 | [2019-02-28 03:15:43,219] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,063] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:56,352] INFO Creating /brokers/ids/2 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) -kafka0 | [2019-02-28 03:15:43,219] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:56,447] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) -kafka1 | [2019-02-28 03:15:43,063] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) -zookeeper1 | 2019-02-28 03:15:44,049 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0xb zxid:0x10000000c txntype:-1 reqpath:n/a Error Path:/config Error:KeeperErrorCode = NoNode for /config -kafka0 | [2019-02-28 03:15:43,229] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,064] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:56,472] INFO Registered broker 2 at path /brokers/ids/2 with addresses: EndPoint(kafka2,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) -kafka3 | [2019-02-28 03:15:43,559] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) -kafka0 | [2019-02-28 03:15:43,229] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,066] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) -kafka0 | [2019-02-28 03:15:43,230] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:56,498] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -kafka1 | [2019-02-28 03:15:43,066] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) -zookeeper1 | 2019-02-28 03:15:44,063 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0x5 zxid:0x10000000d txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers -kafka2 | [2019-02-28 03:15:56,530] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) -kafka0 | [2019-02-28 03:15:43,230] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,560] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,067] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,068] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,068] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,071] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@6572421 (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:15:43,159] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) -kafka1 | [2019-02-28 03:15:43,191] INFO Opening socket connection to server zookeeper0.hlf_net/172.28.0.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) -kafka1 | [2019-02-28 03:15:43,270] INFO Socket connection established to zookeeper0.hlf_net/172.28.0.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) -kafka1 | [2019-02-28 03:15:43,443] INFO Session establishment complete on server zookeeper0.hlf_net/172.28.0.2:2181, sessionid = 0x1693219a5ee0000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) -kafka1 | [2019-02-28 03:15:43,453] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) -kafka1 | [2019-02-28 03:15:45,304] INFO Cluster ID = a5PpSFQ3Tv-Yzkiezevw7w (kafka.server.KafkaServer) -kafka1 | [2019-02-28 03:15:45,415] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -kafka1 | [2019-02-28 03:15:45,687] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka1 | [2019-02-28 03:15:45,688] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka1 | [2019-02-28 03:15:45,749] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka1 | [2019-02-28 03:15:46,112] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) -kafka1 | [2019-02-28 03:15:46,239] INFO Loading logs. (kafka.log.LogManager) -kafka1 | [2019-02-28 03:15:46,295] INFO Logs loading complete in 50 ms. (kafka.log.LogManager) -kafka1 | [2019-02-28 03:15:47,118] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) -kafka1 | [2019-02-28 03:15:47,145] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) -kafka1 | [2019-02-28 03:15:53,427] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) -kafka1 | [2019-02-28 03:15:53,475] INFO [SocketServer brokerId=1] Started 1 acceptor threads (kafka.network.SocketServer) -kafka1 | [2019-02-28 03:15:53,861] INFO [ExpirationReaper-1-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka1 | [2019-02-28 03:15:53,861] INFO [ExpirationReaper-1-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka1 | [2019-02-28 03:15:53,882] INFO [ExpirationReaper-1-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka1 | [2019-02-28 03:15:54,379] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) -kafka1 | [2019-02-28 03:15:54,864] INFO [ExpirationReaper-1-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka1 | [2019-02-28 03:15:54,955] INFO [ExpirationReaper-1-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka1 | [2019-02-28 03:15:54,964] INFO [ExpirationReaper-1-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka1 | [2019-02-28 03:15:54,997] INFO Creating /controller (is it secure? false) (kafka.utils.ZKCheckedEphemeral) -kafka1 | [2019-02-28 03:15:55,077] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) -kafka1 | [2019-02-28 03:15:55,178] INFO [GroupCoordinator 1]: Starting up. (kafka.coordinator.group.GroupCoordinator) -kafka1 | [2019-02-28 03:15:55,186] INFO [GroupCoordinator 1]: Startup complete. (kafka.coordinator.group.GroupCoordinator) -kafka1 | [2019-02-28 03:15:55,248] INFO [GroupMetadataManager brokerId=1] Removed 0 expired offsets in 54 milliseconds. (kafka.coordinator.group.GroupMetadataManager) -kafka1 | [2019-02-28 03:15:55,350] INFO [ProducerId Manager 1]: Acquired new producerId block (brokerId:1,blockStartProducerId:0,blockEndProducerId:999) by writing to Zk with path version 1 (kafka.coordinator.transaction.ProducerIdManager) -kafka1 | [2019-02-28 03:15:55,640] INFO [TransactionCoordinator id=1] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) -kafka1 | [2019-02-28 03:15:55,652] INFO [Transaction Marker Channel Manager 1]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) -kafka1 | [2019-02-28 03:15:55,724] INFO [TransactionCoordinator id=1] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) -kafka1 | [2019-02-28 03:15:56,630] INFO Creating /brokers/ids/1 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) -kafka1 | [2019-02-28 03:15:56,667] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) -kafka1 | [2019-02-28 03:15:56,675] INFO Registered broker 1 at path /brokers/ids/1 with addresses: EndPoint(kafka1,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) -kafka1 | [2019-02-28 03:15:56,696] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -kafka1 | [2019-02-28 03:15:56,902] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) -kafka1 | [2019-02-28 03:15:56,933] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) -kafka1 | [2019-02-28 03:15:56,936] INFO Topic creation {"version":1,"partitions":{"0":[3,2,0]}} (kafka.admin.AdminUtils$) -kafka1 | [2019-02-28 03:15:56,956] INFO [KafkaApi-1] Auto creation of topic testchainid with 1 partitions and replication factor 3 is successful (kafka.server.KafkaApis) -kafka1 | [2019-02-28 03:15:56,988] INFO [KafkaServer id=1] started (kafka.server.KafkaServer) -kafka2 | [2019-02-28 03:15:56,531] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) -kafka1 | [2019-02-28 03:16:09,727] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka1 | [2019-02-28 03:16:09,745] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka1 | [2019-02-28 03:16:09,932] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) -kafka1 | [2019-02-28 03:16:10,002] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 151 ms (kafka.log.Log) -kafka1 | [2019-02-28 03:16:10,007] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) -kafka1 | [2019-02-28 03:16:10,125] INFO [Partition businesschannel-0 broker=1] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) -kafka0 | [2019-02-28 03:15:43,230] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:16:10,132] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka1 | [2019-02-28 03:16:10,151] INFO [ReplicaFetcherManager on broker 1] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) -kafka1 | [2019-02-28 03:16:10,404] INFO [ReplicaFetcher replicaId=1, leaderId=0, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) -kafka3 | [2019-02-28 03:15:43,560] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:16:10,453] INFO [ReplicaFetcherManager on broker 1] Added fetcher for partitions List([businesschannel-0, initOffset 0 to broker BrokerEndPoint(0,kafka0,9092)] ) (kafka.server.ReplicaFetcherManager) -kafka2 | [2019-02-28 03:15:56,553] INFO [KafkaServer id=2] started (kafka.server.KafkaServer) -kafka1 | [2019-02-28 03:16:10,819] WARN [ReplicaFetcher replicaId=1, leaderId=0, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in businesschannel-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) -kafka3 | [2019-02-28 03:15:43,561] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) -kafka0 | [2019-02-28 03:15:43,231] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) -zookeeper1 | 2019-02-28 03:15:44,089 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0xd zxid:0x100000010 txntype:-1 reqpath:n/a Error Path:/config/changes Error:KeeperErrorCode = NodeExists for /config/changes -kafka0 | [2019-02-28 03:15:43,231] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,562] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:57,536] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka1 | [2019-02-28 03:16:10,865] INFO Truncating businesschannel-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) -kafka3 | [2019-02-28 03:15:43,562] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) -kafka2 | [2019-02-28 03:15:57,802] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) -kafka0 | [2019-02-28 03:15:43,239] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@6572421 (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,562] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) -kafka1 | [2019-02-28 03:16:11,312] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) -zookeeper1 | 2019-02-28 03:15:44,091 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0x6 zxid:0x100000011 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids -kafka0 | [2019-02-28 03:15:43,458] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) -kafka2 | [2019-02-28 03:15:57,885] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 224 ms (kafka.log.Log) -kafka3 | [2019-02-28 03:15:43,564] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,564] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,564] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) -kafka0 | [2019-02-28 03:15:43,471] INFO Opening socket connection to server zookeeper2.hlf_net/172.28.0.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) -zookeeper1 | 2019-02-28 03:15:44,142 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0xd zxid:0x100000014 txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NoNode for /admin -kafka0 | [2019-02-28 03:15:43,529] INFO Socket connection established to zookeeper2.hlf_net/172.28.0.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) -kafka3 | [2019-02-28 03:15:43,571] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@6572421 (org.apache.zookeeper.ZooKeeper) -kafka3 | [2019-02-28 03:15:43,660] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) -kafka0 | [2019-02-28 03:15:43,615] INFO Session establishment complete on server zookeeper2.hlf_net/172.28.0.4:2181, sessionid = 0x3693219a7580000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) -zookeeper1 | 2019-02-28 03:15:44,164 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0xf zxid:0x100000015 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics -kafka0 | [2019-02-28 03:15:43,631] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) -kafka3 | [2019-02-28 03:15:43,680] INFO Opening socket connection to server zookeeper1.hlf_net/172.28.0.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) -kafka0 | [2019-02-28 03:15:45,639] INFO Cluster ID = a5PpSFQ3Tv-Yzkiezevw7w (kafka.server.KafkaServer) -kafka2 | [2019-02-28 03:15:57,916] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) -kafka3 | [2019-02-28 03:15:43,737] INFO Socket connection established to zookeeper1.hlf_net/172.28.0.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) -kafka0 | [2019-02-28 03:15:45,695] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -zookeeper1 | 2019-02-28 03:15:44,269 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0xf zxid:0x100000018 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics -kafka2 | [2019-02-28 03:15:57,931] INFO [Partition testchainid-0 broker=2] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) -kafka0 | [2019-02-28 03:15:46,012] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka3 | [2019-02-28 03:15:43,880] INFO Session establishment complete on server zookeeper1.hlf_net/172.28.0.3:2181, sessionid = 0x2693219a6220000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:57,943] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka0 | [2019-02-28 03:15:46,039] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka3 | [2019-02-28 03:15:43,894] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) -zookeeper1 | 2019-02-28 03:15:44,283 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x12 zxid:0x100000019 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics -kafka2 | [2019-02-28 03:15:57,949] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka3 | [2019-02-28 03:15:45,571] INFO Cluster ID = a5PpSFQ3Tv-Yzkiezevw7w (kafka.server.KafkaServer) -kafka0 | [2019-02-28 03:15:46,046] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka0 | [2019-02-28 03:15:46,368] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) -kafka3 | [2019-02-28 03:15:45,615] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -kafka2 | [2019-02-28 03:15:57,999] INFO [ReplicaFetcherManager on broker 2] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) -kafka0 | [2019-02-28 03:15:46,495] INFO Loading logs. (kafka.log.LogManager) -kafka3 | [2019-02-28 03:15:45,990] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka2 | [2019-02-28 03:15:58,182] INFO [ReplicaFetcher replicaId=2, leaderId=3, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) -kafka0 | [2019-02-28 03:15:46,617] INFO Logs loading complete in 108 ms. (kafka.log.LogManager) -zookeeper1 | 2019-02-28 03:15:44,297 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0xc zxid:0x10000001a txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics -kafka3 | [2019-02-28 03:15:46,013] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -kafka0 | [2019-02-28 03:15:50,933] WARN Client session timed out, have not heard from server in 4666ms for sessionid 0x3693219a7580000 (org.apache.zookeeper.ClientCnxn) -kafka2 | [2019-02-28 03:15:58,269] INFO [ReplicaFetcherManager on broker 2] Added fetcher for partitions List([testchainid-0, initOffset 0 to broker BrokerEndPoint(3,kafka3,9092)] ) (kafka.server.ReplicaFetcherManager) -kafka3 | [2019-02-28 03:15:46,026] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) -zookeeper1 | 2019-02-28 03:15:44,310 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x2693219a6220000 type:create cxid:0xb zxid:0x10000001c txntype:-1 reqpath:n/a Error Path:/brokers/seqid Error:KeeperErrorCode = NodeExists for /brokers/seqid -kafka3 | [2019-02-28 03:15:46,412] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) -kafka0 | [2019-02-28 03:15:50,936] INFO Client session timed out, have not heard from server in 4666ms for sessionid 0x3693219a7580000, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) -kafka3 | [2019-02-28 03:15:46,528] INFO Loading logs. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:58,423] WARN [ReplicaFetcher replicaId=2, leaderId=3, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in testchainid-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) -kafka0 | [2019-02-28 03:15:51,046] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) -kafka3 | [2019-02-28 03:15:46,668] INFO Logs loading complete in 100 ms. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:58,438] INFO Truncating testchainid-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) -kafka0 | [2019-02-28 03:15:51,222] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) -zookeeper1 | 2019-02-28 03:15:44,319 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x14 zxid:0x10000001e txntype:-1 reqpath:n/a Error Path:/brokers/seqid Error:KeeperErrorCode = NodeExists for /brokers/seqid -kafka3 | [2019-02-28 03:15:51,397] WARN Client session timed out, have not heard from server in 5111ms for sessionid 0x2693219a6220000 (org.apache.zookeeper.ClientCnxn) -kafka0 | [2019-02-28 03:15:51,328] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) -kafka2 | [2019-02-28 03:15:58,555] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) -kafka3 | [2019-02-28 03:15:51,424] INFO Client session timed out, have not heard from server in 5111ms for sessionid 0x2693219a6220000, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) -zookeeper1 | 2019-02-28 03:15:44,360 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x15 zxid:0x100000020 txntype:-1 reqpath:n/a Error Path:/latest_producer_id_block Error:KeeperErrorCode = NodeExists for /latest_producer_id_block -kafka0 | [2019-02-28 03:15:51,804] INFO Opening socket connection to server zookeeper1.hlf_net/172.28.0.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) -kafka3 | [2019-02-28 03:15:51,522] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) -kafka0 | [2019-02-28 03:15:51,810] INFO Socket connection established to zookeeper1.hlf_net/172.28.0.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) -kafka3 | [2019-02-28 03:15:51,562] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) -kafka0 | [2019-02-28 03:15:51,855] INFO Session establishment complete on server zookeeper1.hlf_net/172.28.0.3:2181, sessionid = 0x3693219a7580000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) -kafka3 | [2019-02-28 03:15:51,609] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) -zookeeper1 | 2019-02-28 03:15:44,388 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0x12 zxid:0x100000022 txntype:-1 reqpath:n/a Error Path:/log_dir_event_notification Error:KeeperErrorCode = NodeExists for /log_dir_event_notification -kafka0 | [2019-02-28 03:15:51,856] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) -kafka0 | [2019-02-28 03:15:54,353] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) -kafka3 | [2019-02-28 03:15:52,275] INFO Opening socket connection to server zookeeper0.hlf_net/172.28.0.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) -kafka0 | [2019-02-28 03:15:54,471] INFO [SocketServer brokerId=0] Started 1 acceptor threads (kafka.network.SocketServer) -kafka3 | [2019-02-28 03:15:52,292] INFO Socket connection established to zookeeper0.hlf_net/172.28.0.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) -zookeeper1 | 2019-02-28 03:15:44,399 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x18 zxid:0x100000023 txntype:-1 reqpath:n/a Error Path:/log_dir_event_notification Error:KeeperErrorCode = NodeExists for /log_dir_event_notification -kafka0 | [2019-02-28 03:15:54,638] INFO [ExpirationReaper-0-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka3 | [2019-02-28 03:15:52,319] INFO Session establishment complete on server zookeeper0.hlf_net/172.28.0.2:2181, sessionid = 0x2693219a6220000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) -kafka0 | [2019-02-28 03:15:54,670] INFO [ExpirationReaper-0-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka3 | [2019-02-28 03:15:52,324] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) -kafka0 | [2019-02-28 03:15:54,687] INFO [ExpirationReaper-0-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper1 | 2019-02-28 03:15:45,262 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x1a zxid:0x100000024 txntype:-1 reqpath:n/a Error Path:/cluster Error:KeeperErrorCode = NoNode for /cluster -kafka3 | [2019-02-28 03:15:54,585] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) -kafka0 | [2019-02-28 03:15:54,873] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) -kafka3 | [2019-02-28 03:15:54,623] INFO [SocketServer brokerId=3] Started 1 acceptor threads (kafka.network.SocketServer) -kafka0 | [2019-02-28 03:15:55,406] INFO [ExpirationReaper-0-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper1 | 2019-02-28 03:15:45,356 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x2693219a6220000 type:create cxid:0x10 zxid:0x100000027 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id -kafka3 | [2019-02-28 03:15:54,751] INFO [ExpirationReaper-3-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka0 | [2019-02-28 03:15:55,408] INFO [ExpirationReaper-0-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka3 | [2019-02-28 03:15:54,775] INFO [ExpirationReaper-3-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka0 | [2019-02-28 03:15:55,408] INFO [ExpirationReaper-0-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka3 | [2019-02-28 03:15:54,799] INFO [ExpirationReaper-3-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka0 | [2019-02-28 03:15:55,504] INFO [GroupCoordinator 0]: Starting up. (kafka.coordinator.group.GroupCoordinator) -zookeeper1 | 2019-02-28 03:15:45,436 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x19 zxid:0x100000028 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id -kafka3 | [2019-02-28 03:15:54,911] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) -kafka0 | [2019-02-28 03:15:55,551] INFO [GroupCoordinator 0]: Startup complete. (kafka.coordinator.group.GroupCoordinator) -kafka3 | [2019-02-28 03:15:55,367] INFO [ExpirationReaper-3-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -kafka0 | [2019-02-28 03:15:55,560] INFO [GroupMetadataManager brokerId=0] Removed 0 expired offsets in 46 milliseconds. (kafka.coordinator.group.GroupMetadataManager) -kafka3 | [2019-02-28 03:15:55,370] INFO [ExpirationReaper-3-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper1 | 2019-02-28 03:15:45,454 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0x14 zxid:0x100000029 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id -kafka0 | [2019-02-28 03:15:55,671] INFO [ProducerId Manager 0]: Acquired new producerId block (brokerId:0,blockStartProducerId:2000,blockEndProducerId:2999) by writing to Zk with path version 3 (kafka.coordinator.transaction.ProducerIdManager) -kafka3 | [2019-02-28 03:15:55,402] INFO [ExpirationReaper-3-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) -zookeeper1 | 2019-02-28 03:15:51,458 [myid:2] - WARN [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@357] - caught end of stream exception -kafka0 | [2019-02-28 03:15:55,773] INFO [TransactionCoordinator id=0] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) -kafka3 | [2019-02-28 03:15:55,477] INFO [GroupCoordinator 3]: Starting up. (kafka.coordinator.group.GroupCoordinator) -zookeeper1 | EndOfStreamException: Unable to read additional data from client sessionid 0x2693219a6220000, likely client has closed socket -zookeeper1 | at org.apache.zookeeper.server.NIOServerCnxn.doIO(NIOServerCnxn.java:228) -kafka0 | [2019-02-28 03:15:55,783] INFO [TransactionCoordinator id=0] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) -kafka3 | [2019-02-28 03:15:55,495] INFO [GroupCoordinator 3]: Startup complete. (kafka.coordinator.group.GroupCoordinator) -zookeeper1 | at org.apache.zookeeper.server.NIOServerCnxnFactory.run(NIOServerCnxnFactory.java:203) -zookeeper1 | at java.lang.Thread.run(Thread.java:748) -kafka0 | [2019-02-28 03:15:55,801] INFO [Transaction Marker Channel Manager 0]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) -kafka3 | [2019-02-28 03:15:55,534] INFO [GroupMetadataManager brokerId=3] Removed 0 expired offsets in 34 milliseconds. (kafka.coordinator.group.GroupMetadataManager) -kafka0 | [2019-02-28 03:15:56,186] INFO Creating /brokers/ids/0 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) -zookeeper1 | 2019-02-28 03:15:51,475 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /172.28.0.5:55660 which had sessionid 0x2693219a6220000 -kafka0 | [2019-02-28 03:15:56,236] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) -kafka3 | [2019-02-28 03:15:55,611] INFO [ProducerId Manager 3]: Acquired new producerId block (brokerId:3,blockStartProducerId:1000,blockEndProducerId:1999) by writing to Zk with path version 2 (kafka.coordinator.transaction.ProducerIdManager) -zookeeper1 | 2019-02-28 03:15:51,810 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /172.28.0.8:56918 -kafka3 | [2019-02-28 03:15:55,725] INFO [TransactionCoordinator id=3] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) -kafka0 | [2019-02-28 03:15:56,250] INFO Registered broker 0 at path /brokers/ids/0 with addresses: EndPoint(kafka0,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) -kafka3 | [2019-02-28 03:15:55,737] INFO [TransactionCoordinator id=3] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) -kafka0 | [2019-02-28 03:15:56,265] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -zookeeper1 | 2019-02-28 03:15:51,836 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x3693219a7580000 at /172.28.0.8:56918 -kafka0 | [2019-02-28 03:15:56,435] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) -kafka3 | [2019-02-28 03:15:55,790] INFO [Transaction Marker Channel Manager 3]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) -kafka0 | [2019-02-28 03:15:56,453] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) -kafka3 | [2019-02-28 03:15:56,274] INFO Creating /brokers/ids/3 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) -kafka0 | [2019-02-28 03:15:56,486] INFO [KafkaServer id=0] started (kafka.server.KafkaServer) -kafka3 | [2019-02-28 03:15:56,335] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) -zookeeper1 | 2019-02-28 03:15:51,847 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@673] - Established session 0x3693219a7580000 with negotiated timeout 6000 for client /172.28.0.8:56918 -kafka0 | [2019-02-28 03:15:57,488] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka3 | [2019-02-28 03:15:56,341] INFO Registered broker 3 at path /brokers/ids/3 with addresses: EndPoint(kafka3,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) -kafka0 | [2019-02-28 03:15:57,490] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka3 | [2019-02-28 03:15:56,348] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) -kafka0 | [2019-02-28 03:15:57,723] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) -kafka3 | [2019-02-28 03:15:56,441] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) -zookeeper1 | 2019-02-28 03:15:55,138 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:setData cxid:0x25 zxid:0x10000002b txntype:-1 reqpath:n/a Error Path:/controller_epoch Error:KeeperErrorCode = NoNode for /controller_epoch -kafka0 | [2019-02-28 03:15:57,770] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 142 ms (kafka.log.Log) -kafka3 | [2019-02-28 03:15:56,441] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) -kafka3 | [2019-02-28 03:15:56,456] INFO [KafkaServer id=3] started (kafka.server.KafkaServer) -kafka3 | [2019-02-28 03:15:57,513] INFO [ReplicaFetcherManager on broker 3] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) -kafka3 | [2019-02-28 03:15:57,723] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) -zookeeper1 | 2019-02-28 03:15:55,617 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:setData cxid:0x20 zxid:0x10000002f txntype:-1 reqpath:n/a Error Path:/latest_producer_id_block Error:KeeperErrorCode = BadVersion for /latest_producer_id_block -kafka3 | [2019-02-28 03:15:57,777] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 135 ms (kafka.log.Log) -kafka0 | [2019-02-28 03:15:57,816] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) -zookeeper1 | 2019-02-28 03:15:56,196 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x2e zxid:0x100000032 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers -kafka0 | [2019-02-28 03:15:57,832] INFO [Partition testchainid-0 broker=0] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) -kafka0 | [2019-02-28 03:15:57,836] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka0 | [2019-02-28 03:15:57,905] INFO [ReplicaFetcherManager on broker 0] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) -zookeeper1 | 2019-02-28 03:15:56,198 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x2f zxid:0x100000033 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids -kafka0 | [2019-02-28 03:15:58,171] INFO [ReplicaFetcher replicaId=0, leaderId=3, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) -kafka3 | [2019-02-28 03:15:57,794] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) -kafka3 | [2019-02-28 03:15:57,812] INFO [Partition testchainid-0 broker=3] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) -kafka0 | [2019-02-28 03:15:58,207] INFO [ReplicaFetcherManager on broker 0] Added fetcher for partitions List([testchainid-0, initOffset 0 to broker BrokerEndPoint(3,kafka3,9092)] ) (kafka.server.ReplicaFetcherManager) -zookeeper1 | 2019-02-28 03:15:56,282 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x2693219a6220000 type:create cxid:0x22 zxid:0x100000035 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers -kafka3 | [2019-02-28 03:15:57,823] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka3 | [2019-02-28 03:15:57,834] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -zookeeper1 | 2019-02-28 03:15:56,288 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x2693219a6220000 type:create cxid:0x23 zxid:0x100000036 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids -kafka3 | [2019-02-28 03:15:57,836] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka0 | [2019-02-28 03:15:58,356] WARN [ReplicaFetcher replicaId=0, leaderId=3, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in testchainid-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) -kafka0 | [2019-02-28 03:15:58,370] INFO Truncating testchainid-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) -kafka3 | [2019-02-28 03:15:57,845] INFO [Partition testchainid-0 broker=3] testchainid-0 starts at Leader Epoch 0 from offset 0. Previous Leader Epoch was: -1 (kafka.cluster.Partition) -zookeeper1 | 2019-02-28 03:15:56,362 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0x26 zxid:0x100000038 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers -kafka0 | [2019-02-28 03:15:58,582] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) -kafka3 | [2019-02-28 03:15:58,175] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) -kafka0 | [2019-02-28 03:16:09,373] INFO Topic creation {"version":1,"partitions":{"0":[0,3,1]}} (kafka.admin.AdminUtils$) -zookeeper1 | 2019-02-28 03:15:56,427 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0001 type:create cxid:0x27 zxid:0x100000039 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids -kafka3 | [2019-02-28 03:16:09,644] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka0 | [2019-02-28 03:16:09,388] INFO Topic creation {"version":1,"partitions":{"0":[3,0,1]}} (kafka.admin.AdminUtils$) -kafka3 | [2019-02-28 03:16:09,664] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) -kafka0 | [2019-02-28 03:16:09,424] INFO [KafkaApi-0] Auto creation of topic businesschannel with 1 partitions and replication factor 3 is successful (kafka.server.KafkaApis) -kafka3 | [2019-02-28 03:16:09,670] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 16 ms (kafka.log.Log) -zookeeper1 | 2019-02-28 03:15:56,570 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:delete cxid:0x4f zxid:0x10000003b txntype:-1 reqpath:n/a Error Path:/admin/preferred_replica_election Error:KeeperErrorCode = NoNode for /admin/preferred_replica_election -kafka0 | [2019-02-28 03:16:09,639] INFO [ReplicaFetcherManager on broker 0] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) -kafka0 | [2019-02-28 03:16:09,688] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) -kafka0 | [2019-02-28 03:16:09,709] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 22 ms (kafka.log.Log) -zookeeper1 | 2019-02-28 03:15:56,642 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x56 zxid:0x10000003c txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers -zookeeper1 | 2019-02-28 03:15:56,651 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x57 zxid:0x10000003d txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids -kafka3 | [2019-02-28 03:16:09,691] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) -zookeeper1 | 2019-02-28 03:15:56,844 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:setData cxid:0x61 zxid:0x10000003f txntype:-1 reqpath:n/a Error Path:/config/topics/testchainid Error:KeeperErrorCode = NoNode for /config/topics/testchainid -kafka3 | [2019-02-28 03:16:09,701] INFO [Partition businesschannel-0 broker=3] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) -kafka0 | [2019-02-28 03:16:09,712] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) -kafka3 | [2019-02-28 03:16:09,705] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -zookeeper1 | 2019-02-28 03:15:56,858 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x62 zxid:0x100000040 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics -kafka0 | [2019-02-28 03:16:09,714] INFO [Partition businesschannel-0 broker=0] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) -kafka3 | [2019-02-28 03:16:09,706] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka0 | [2019-02-28 03:16:09,715] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka3 | [2019-02-28 03:16:09,726] INFO [ReplicaFetcherManager on broker 3] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) -kafka0 | [2019-02-28 03:16:09,721] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka3 | [2019-02-28 03:16:10,053] INFO [ReplicaFetcher replicaId=3, leaderId=0, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) -zookeeper1 | 2019-02-28 03:15:57,336 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x81 zxid:0x100000043 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid/partitions/0 Error:KeeperErrorCode = NoNode for /brokers/topics/testchainid/partitions/0 -kafka0 | [2019-02-28 03:16:09,722] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) -kafka3 | [2019-02-28 03:16:10,155] INFO [ReplicaFetcherManager on broker 3] Added fetcher for partitions List([businesschannel-0, initOffset 0 to broker BrokerEndPoint(0,kafka0,9092)] ) (kafka.server.ReplicaFetcherManager) -kafka0 | [2019-02-28 03:16:09,732] INFO [Partition businesschannel-0 broker=0] businesschannel-0 starts at Leader Epoch 0 from offset 0. Previous Leader Epoch was: -1 (kafka.cluster.Partition) -zookeeper1 | 2019-02-28 03:15:57,348 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x82 zxid:0x100000044 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid/partitions Error:KeeperErrorCode = NoNode for /brokers/topics/testchainid/partitions -kafka0 | [2019-02-28 03:16:10,097] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) -kafka3 | [2019-02-28 03:16:10,318] WARN [ReplicaFetcher replicaId=3, leaderId=0, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in businesschannel-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) -kafka3 | [2019-02-28 03:16:10,329] INFO Truncating businesschannel-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) -zookeeper1 | 2019-02-28 03:16:09,248 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:setData cxid:0x3e zxid:0x100000048 txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NoNode for /config/topics/businesschannel -kafka3 | [2019-02-28 03:16:10,795] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) -zookeeper1 | 2019-02-28 03:16:09,260 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:setData cxid:0x3f zxid:0x100000049 txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NoNode for /config/topics/businesschannel -zookeeper1 | 2019-02-28 03:16:09,285 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x40 zxid:0x10000004a txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics -zookeeper1 | 2019-02-28 03:16:09,313 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x41 zxid:0x10000004b txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics -zookeeper1 | 2019-02-28 03:16:09,337 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x43 zxid:0x10000004d txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NodeExists for /config/topics/businesschannel -zookeeper1 | 2019-02-28 03:16:09,392 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x3693219a7580000 type:create cxid:0x46 zxid:0x100000050 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel Error:KeeperErrorCode = NodeExists for /brokers/topics/businesschannel -zookeeper1 | 2019-02-28 03:16:09,501 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x8d zxid:0x100000051 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel/partitions/0 Error:KeeperErrorCode = NoNode for /brokers/topics/businesschannel/partitions/0 -zookeeper1 | 2019-02-28 03:16:09,521 [myid:2] - INFO [ProcessThread(sid:2 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x1693219a5ee0000 type:create cxid:0x8e zxid:0x100000052 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel/partitions Error:KeeperErrorCode = NoNode for /brokers/topics/businesschannel/partitions +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-04-22 06:16:28.176 UTC [orderer.common.server] Start -> INFO 2f6 Beginning to serve requests" +orderer0.example.com | "2019-04-22 06:16:28.179 UTC [orderer.consensus.etcdraft] apply -> INFO 2f7 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.179 UTC [orderer.consensus.etcdraft] apply -> INFO 2f8 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.179 UTC [orderer.consensus.etcdraft] apply -> INFO 2f9 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.215 UTC [grpc] HandleSubConnStateChange -> DEBU 2fa pickfirstBalancer: HandleSubConnStateChange: 0xc00024e010, READY" +orderer0.example.com | "2019-04-22 06:16:28.222 UTC [grpc] HandleSubConnStateChange -> DEBU 2fb pickfirstBalancer: HandleSubConnStateChange: 0xc00024e330, READY" +orderer0.example.com | "2019-04-22 06:16:28.330 UTC [orderer.common.cluster] Step -> DEBU 2fc Connection from orderer2.example.com(192.168.224.2:57130)" +orderer0.example.com | "2019-04-22 06:16:28.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2fd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:28.331 UTC [orderer.consensus.etcdraft] Step -> INFO 2fe 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.331 UTC [orderer.common.cluster] NewStream -> DEBU 2ff Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-04-22 06:16:28.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 300 Sending msg of 28 bytes to 3 on channel testchainid took 152µs" +orderer0.example.com | "2019-04-22 06:16:28.332 UTC [orderer.common.cluster.step] sendMessage -> DEBU 301 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.6µs " +orderer0.example.com | "2019-04-22 06:16:28.335 UTC [orderer.common.cluster.step] handleMessage -> DEBU 302 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:28.335 UTC [orderer.consensus.etcdraft] Step -> INFO 303 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.335 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 304 1 became follower at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.335 UTC [orderer.consensus.etcdraft] Step -> INFO 305 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.337 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 306 Sending msg of 28 bytes to 3 on channel testchainid took 34.1µs" +orderer0.example.com | "2019-04-22 06:16:28.337 UTC [orderer.common.cluster.step] sendMessage -> DEBU 307 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.3µs " +orderer0.example.com | "2019-04-22 06:16:28.344 UTC [orderer.common.cluster.step] handleMessage -> DEBU 308 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 36" +orderer0.example.com | "2019-04-22 06:16:28.344 UTC [orderer.consensus.etcdraft] run -> INFO 309 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.346 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30a Sending msg of 28 bytes to 3 on channel testchainid took 123.6µs" +orderer0.example.com | "2019-04-22 06:16:28.346 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " +orderer0.example.com | "2019-04-22 06:16:28.346 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 30c Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:28.347 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:28.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30e Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +orderer0.example.com | "2019-04-22 06:16:28.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.5µs " +orderer0.example.com | "2019-04-22 06:16:28.832 UTC [orderer.common.cluster.step] handleMessage -> DEBU 310 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:28.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 311 Sending msg of 28 bytes to 3 on channel testchainid took 73.6µs" +orderer0.example.com | "2019-04-22 06:16:28.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +orderer0.example.com | "2019-04-22 06:16:29.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 313 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:29.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 314 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +orderer0.example.com | "2019-04-22 06:16:29.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 315 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.5µs " +orderer0.example.com | "2019-04-22 06:16:29.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 316 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:29.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 317 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +orderer0.example.com | "2019-04-22 06:16:29.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " +orderer0.example.com | "2019-04-22 06:16:30.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 319 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:30.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31a Sending msg of 28 bytes to 3 on channel testchainid took 38.6µs" +orderer0.example.com | "2019-04-22 06:16:30.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +orderer0.example.com | "2019-04-22 06:16:30.828 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:30.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31d Sending msg of 28 bytes to 3 on channel testchainid took 162.5µs" +orderer0.example.com | "2019-04-22 06:16:30.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.4µs " +orderer0.example.com | "2019-04-22 06:16:31.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:31.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" +orderer0.example.com | "2019-04-22 06:16:31.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.5µs " +orderer0.example.com | "2019-04-22 06:16:31.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:31.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 323 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +orderer0.example.com | "2019-04-22 06:16:31.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +orderer0.example.com | "2019-04-22 06:16:32.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:32.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +orderer0.example.com | "2019-04-22 06:16:32.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +orderer0.example.com | "2019-04-22 06:16:32.832 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:32.833 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2019-04-22 06:16:32.833 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.1µs " +orderer0.example.com | "2019-04-22 06:16:33.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:33.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32c Sending msg of 28 bytes to 3 on channel testchainid took 48.6µs" +orderer0.example.com | "2019-04-22 06:16:33.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 368.6µs " +orderer0.example.com | "2019-04-22 06:16:33.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:33.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32f Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" +orderer0.example.com | "2019-04-22 06:16:33.832 UTC [orderer.common.cluster.step] sendMessage -> DEBU 330 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 724.1µs " +orderer0.example.com | "2019-04-22 06:16:34.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 331 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:34.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 332 Sending msg of 28 bytes to 3 on channel testchainid took 80.4µs" +orderer0.example.com | "2019-04-22 06:16:34.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 333 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 689.6µs " +orderer0.example.com | "2019-04-22 06:16:34.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 334 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:34.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 335 Sending msg of 28 bytes to 3 on channel testchainid took 33.7µs" +orderer0.example.com | "2019-04-22 06:16:34.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 336 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 617.2µs " +orderer0.example.com | "2019-04-22 06:16:35.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 337 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:35.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 338 Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs" +orderer0.example.com | "2019-04-22 06:16:35.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 339 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +orderer0.example.com | "2019-04-22 06:16:35.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:35.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33b Sending msg of 28 bytes to 3 on channel testchainid took 36.1µs" +orderer0.example.com | "2019-04-22 06:16:35.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157µs " +orderer0.example.com | "2019-04-22 06:16:36.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:36.332 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33e Sending msg of 28 bytes to 3 on channel testchainid took 117.3µs" +orderer0.example.com | "2019-04-22 06:16:36.332 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 528.7µs " +orderer0.example.com | "2019-04-22 06:16:36.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 340 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:36.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 341 Sending msg of 28 bytes to 3 on channel testchainid took 45.6µs" +orderer0.example.com | "2019-04-22 06:16:36.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 342 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 466.6µs " +orderer0.example.com | "2019-04-22 06:16:37.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 343 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:37.332 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.3µs " +orderer0.example.com | "2019-04-22 06:16:37.332 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 345 Sending msg of 28 bytes to 3 on channel testchainid took 187.2µs" +orderer0.example.com | "2019-04-22 06:16:37.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 346 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:37.832 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 347 Sending msg of 28 bytes to 3 on channel testchainid took 43.9µs" +orderer0.example.com | "2019-04-22 06:16:37.832 UTC [orderer.common.cluster.step] sendMessage -> DEBU 348 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.7µs " +orderer0.example.com | "2019-04-22 06:16:38.116 UTC [orderer.common.server] replicateDisabledChains -> DEBU 349 No inactive chains to try to replicate" +orderer0.example.com | "2019-04-22 06:16:38.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:38.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34b Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +orderer0.example.com | "2019-04-22 06:16:38.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234µs " +orderer0.example.com | "2019-04-22 06:16:38.389 UTC [orderer.common.server] Deliver -> DEBU 34d Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:38.389 UTC [common.deliver] Handle -> DEBU 34e Starting new deliver loop for 192.168.224.9:34480" +orderer0.example.com | "2019-04-22 06:16:38.389 UTC [common.deliver] Handle -> DEBU 34f Attempting to read seek info message from 192.168.224.9:34480" +orderer0.example.com | "2019-04-22 06:16:38.402 UTC [orderer.common.server] Broadcast -> DEBU 350 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:16:38.403 UTC [orderer.common.broadcast] Handle -> DEBU 351 Starting new broadcast loop for 192.168.224.9:34482" +orderer0.example.com | "2019-04-22 06:16:38.404 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 352 [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34482" +orderer0.example.com | "2019-04-22 06:16:38.405 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 353 Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2019-04-22 06:16:38.405 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 354 Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2019-04-22 06:16:38.407 UTC [common.channelconfig] NewStandardValues -> DEBU 355 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:38.407 UTC [common.channelconfig] initializeProtosStruct -> DEBU 356 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.407 UTC [common.channelconfig] initializeProtosStruct -> DEBU 357 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.408 UTC [common.channelconfig] initializeProtosStruct -> DEBU 358 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.408 UTC [common.channelconfig] initializeProtosStruct -> DEBU 359 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:38.408 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35a Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.409 UTC [common.channelconfig] NewStandardValues -> DEBU 35b Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:38.409 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35c Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.410 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35d Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.410 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35e Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35f Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:38.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU 360 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU 361 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.412 UTC [common.channelconfig] NewStandardValues -> DEBU 362 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU 363 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:38.413 UTC [common.channelconfig] NewStandardValues -> DEBU 364 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU 365 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.413 UTC [common.channelconfig] validateMSP -> DEBU 366 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.414 UTC [msp] newBccspMsp -> DEBU 367 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.415 UTC [msp] New -> DEBU 368 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.415 UTC [msp] Setup -> DEBU 369 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:38.416 UTC [msp.identity] newIdentity -> DEBU 36a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.416 UTC [msp.identity] newIdentity -> DEBU 36b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.416 UTC [msp] Validate -> DEBU 36c MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.416 UTC [common.channelconfig] NewStandardValues -> DEBU 36d Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:16:38.416 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36e Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:38.416 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36f Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.416 UTC [common.channelconfig] NewStandardValues -> DEBU 370 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.418 UTC [common.channelconfig] initializeProtosStruct -> DEBU 371 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.418 UTC [common.channelconfig] NewStandardValues -> DEBU 372 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.418 UTC [common.channelconfig] initializeProtosStruct -> DEBU 373 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [common.channelconfig] Validate -> DEBU 374 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [common.channelconfig] validateMSP -> DEBU 375 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [msp] newBccspMsp -> DEBU 376 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [msp] New -> DEBU 377 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [msp] Setup -> DEBU 378 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [msp.identity] newIdentity -> DEBU 379 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [msp.identity] newIdentity -> DEBU 37a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37b Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.419 UTC [msp] Validate -> DEBU 37c MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [msp] getCertificationChain -> DEBU 37d MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [msp] hasOURole -> DEBU 37e MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [msp] getCertificationChain -> DEBU 37f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [common.channelconfig] NewStandardValues -> DEBU 380 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [common.channelconfig] initializeProtosStruct -> DEBU 381 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [common.channelconfig] NewStandardValues -> DEBU 382 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [common.channelconfig] initializeProtosStruct -> DEBU 383 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [common.channelconfig] Validate -> DEBU 384 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [common.channelconfig] validateMSP -> DEBU 385 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [msp] newBccspMsp -> DEBU 386 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [msp] New -> DEBU 387 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [msp] Setup -> DEBU 388 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:38.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.891 UTC [gossip.discovery] isSentByMe -> DEBU 1a8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:38.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:38.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aa Exiting" +peer0.org1.example.com | "2019-04-22 06:16:39.162 UTC [gossip.gossip] handleMessage -> DEBU 1ab Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:39.162 UTC [gossip.pull] HandleMessage -> DEBU 1ac GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:39.162 UTC [gossip.pull] SendDigest -> DEBU 1ad Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:39.162 UTC [gossip.gossip] handleMessage -> DEBU 1ae Exiting" +peer0.org1.example.com | "2019-04-22 06:16:39.164 UTC [gossip.gossip] handleMessage -> DEBU 1af Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:39.165 UTC [gossip.gossip] handleMessage -> DEBU 1b0 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:39.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:39.166 UTC [msp.identity] Verify -> DEBU 1b2 Verify: digest = 00000000 f3 ec 0a c8 99 f8 4e a2 53 de 2e 7d e8 2d c9 bc |......N.S..}.-..| +peer0.org1.example.com | 00000010 12 f3 5e 8b 4c a5 7e 16 7c 4b ad c3 93 10 a8 7b |..^.L.~.|K.....{|" +peer0.org1.example.com | "2019-04-22 06:16:39.166 UTC [msp.identity] Verify -> DEBU 1b3 Verify: sig = 00000000 30 44 02 20 1c 5b 6f b6 c7 bd 36 d4 ba dc ab 38 |0D. .[o...6....8| +peer0.org1.example.com | 00000010 9e 9c 56 49 04 58 1b 94 6b 61 cf b5 66 5d f5 78 |..VI.X..ka..f].x| +peer0.org1.example.com | 00000020 be 77 a6 8f 02 20 1f 02 a7 d4 5b f3 db cf c9 4c |.w... ....[....L| +peer0.org1.example.com | 00000030 9a 25 98 22 f8 5b e7 c5 65 96 d2 fe 36 a9 19 7b |.%.".[..e...6..{| +peer0.org1.example.com | 00000040 c2 d1 5a 0c 99 2c |..Z..,|" +peer0.org1.example.com | "2019-04-22 06:16:39.166 UTC [msp.identity] Verify -> DEBU 1b4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +orderer0.example.com | "2019-04-22 06:16:38.420 UTC [msp.identity] newIdentity -> DEBU 389 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | "2019-04-22 06:16:39.167 UTC [msp.identity] Verify -> DEBU 1b5 Verify: sig = 00000000 30 45 02 21 00 e3 d5 39 bd 6a 32 a9 f7 0e 6e 30 |0E.!...9.j2...n0| +peer0.org1.example.com | 00000010 f3 35 c8 73 f0 eb 86 aa f5 9e b7 ac dc b3 58 8f |.5.s..........X.| +peer0.org1.example.com | 00000020 eb 65 0d bf 93 02 20 70 92 da 57 a2 8b ea fa 50 |.e.... p..W....P| +peer0.org1.example.com | 00000030 27 58 ba ee e8 2f 16 d4 f4 e1 cd 4e 0f 9a cd 55 |'X.../.....N...U| +peer0.org1.example.com | 00000040 6f 2f 6c bc 7d 47 42 |o/l.}GB|" +peer0.org1.example.com | "2019-04-22 06:16:39.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.421 UTC [msp.identity] newIdentity -> DEBU 38a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.421 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 38b Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.421 UTC [msp] Validate -> DEBU 38c MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.421 UTC [msp] getCertificationChain -> DEBU 38d MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.421 UTC [msp] hasOURole -> DEBU 38e MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.421 UTC [msp] getCertificationChain -> DEBU 38f MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [msp] Setup -> DEBU 390 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [msp] Setup -> DEBU 391 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 392 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 393 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 394 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 395 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 396 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 397 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 398 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 399 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39a Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39b Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39c Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39d Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39e Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39f Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a0 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a1 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] GetPolicy -> DEBU 3a2 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:7 " +peer0.org1.example.com | "2019-04-22 06:16:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:7 " +peer0.org1.example.com | "2019-04-22 06:16:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bb Exiting" +peer0.org1.example.com | "2019-04-22 06:16:39.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc Exiting" +peer0.org1.example.com | "2019-04-22 06:16:39.168 UTC [gossip.discovery] sendMemResponse -> DEBU 1be Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:39.168 UTC [gossip.comm] Send -> DEBU 1bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:39.169 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:39.169 UTC [gossip.comm] sendToEndpoint -> DEBU 1c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a3 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] GetPolicy -> DEBU 3a4 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a5 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:38.426 UTC [policies] GetPolicy -> DEBU 3a6 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.426 UTC [policies] NewManagerImpl -> DEBU 3a7 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:38.427 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.427 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:38.429 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:38.429 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.430 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.430 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.430 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.431 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.431 UTC [common.configtx] addToMap -> DEBU 3b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:38.431 UTC [common.configtx] addToMap -> DEBU 3b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:38.432 UTC [common.configtx] addToMap -> DEBU 3b6 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:38.432 UTC [common.configtx] addToMap -> DEBU 3b7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:38.432 UTC [common.configtx] addToMap -> DEBU 3b8 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:39.169 UTC [gossip.comm] sendToEndpoint -> DEBU 1c2 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:39.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd Exiting" +peer0.org1.example.com | "2019-04-22 06:16:40.335 UTC [endorser] ProcessProposal -> DEBU 1c3 Entering: request from 192.168.224.9:49140" +peer0.org1.example.com | "2019-04-22 06:16:40.336 UTC [protoutils] ValidateProposalMessage -> DEBU 1c4 ValidateProposalMessage starts for signed proposal 0xc002490910" +peer0.org1.example.com | "2019-04-22 06:16:40.336 UTC [protoutils] validateChannelHeader -> DEBU 1c5 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-04-22 06:16:40.336 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c6 begin" +peer0.org1.example.com | "2019-04-22 06:16:40.337 UTC [msp] DeserializeIdentity -> DEBU 1c7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:40.337 UTC [msp.identity] newIdentity -> DEBU 1c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.338 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:40.339 UTC [msp] Validate -> DEBU 1ca MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:40.339 UTC [protoutils] checkSignatureFromCreator -> DEBU 1cb creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:40.340 UTC [msp.identity] Verify -> DEBU 1cc Verify: digest = 00000000 ef a8 bc 98 15 03 b5 ab aa a1 c1 d5 99 2a 71 74 |.............*qt| +peer0.org1.example.com | 00000010 93 9a b6 08 a6 72 52 cd 6c 47 5b 8b 77 49 b7 48 |.....rR.lG[.wI.H|" +peer0.org1.example.com | "2019-04-22 06:16:40.340 UTC [msp.identity] Verify -> DEBU 1cd Verify: sig = 00000000 30 44 02 20 03 ef 61 c5 c4 35 8c 8b c3 83 b0 4c |0D. ..a..5.....L| +peer0.org1.example.com | 00000010 1f de da a6 ca 5e 49 18 00 d1 65 e7 f9 0b 55 78 |.....^I...e...Ux| +peer0.org1.example.com | 00000020 ad b3 0f 83 02 20 5e b3 cd cd d4 c3 e9 a9 be 83 |..... ^.........| +peer0.org1.example.com | 00000030 17 2b b0 04 39 9b ea a5 21 22 75 36 93 32 01 c7 |.+..9...!"u6.2..| +peer0.org1.example.com | 00000040 7b e2 62 86 8e 9a |{.b...|" +peer0.org1.example.com | "2019-04-22 06:16:40.340 UTC [protoutils] checkSignatureFromCreator -> DEBU 1ce exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:40.341 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cf validateChaincodeProposalMessage starts for proposal 0xc002485030, header 0xc002491220" +peer0.org1.example.com | "2019-04-22 06:16:40.341 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1d0 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:40.341 UTC [endorser] preProcess -> DEBU 1d1 [][66b0a642] processing txid: 66b0a642a88a1551bdc484ed5f11b636cd6bcd5291a0137cb0e2db12aa125509" +peer0.org1.example.com | "2019-04-22 06:16:40.342 UTC [endorser] SimulateProposal -> DEBU 1d2 [][66b0a642] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:40.342 UTC [endorser] callChaincode -> INFO 1d3 [][66b0a642] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:40.342 UTC [chaincode] Execute -> DEBU 1d4 Entry" +peer0.org1.example.com | "2019-04-22 06:16:40.343 UTC [cscc] Invoke -> DEBU 1d5 Invoke function: JoinChain" +peer0.org1.example.com | "2019-04-22 06:16:40.344 UTC [common.channelconfig] NewStandardValues -> DEBU 1d6 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.344 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:16:40.344 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:40.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:16:40.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: Consortium" +peer0.org1.example.com | "2019-04-22 06:16:40.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.346 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ConsensusType" +peer0.org1.example.com | "2019-04-22 06:16:40.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1de Processing field: BatchSize" +peer0.org1.example.com | "2019-04-22 06:16:40.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:16:40.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-04-22 06:16:40.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:16:40.348 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.348 UTC [common.channelconfig] NewStandardValues -> DEBU 1e3 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.348 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Endpoints" +peer0.org1.example.com | "2019-04-22 06:16:40.349 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.349 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.349 UTC [common.channelconfig] validateMSP -> DEBU 1e7 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.349 UTC [msp] newBccspMsp -> DEBU 1e8 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.349 UTC [msp] New -> DEBU 1e9 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.349 UTC [msp] Setup -> DEBU 1ea Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-04-22 06:16:40.349 UTC [msp.identity] newIdentity -> DEBU 1eb Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.350 UTC [msp.identity] newIdentity -> DEBU 1ec Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2019-04-22 06:16:38.433 UTC [common.configtx] addToMap -> DEBU 3b9 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.433 UTC [common.configtx] addToMap -> DEBU 3ba Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.433 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.434 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.434 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.435 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.436 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.436 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.437 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.437 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.438 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.438 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.438 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.439 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.439 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3ce Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cf Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3d0 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3d1 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d2 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d5 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d7 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d8 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d9 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3da Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3db Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3dc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3dd Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3de Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] verifyDeltaSet -> DEBU 3df Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [common.configtx] policyForItem -> DEBU 3e0 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.441 UTC [policies] Manager -> DEBU 3e1 Manager Channel looking up path []" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e2 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e3 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e4 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e5 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e6 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e7 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e8 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e9 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Evaluate -> DEBU 3ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Evaluate -> DEBU 3eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [policies] Evaluate -> DEBU 3ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [msp] DeserializeIdentity -> DEBU 3ed Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [msp.identity] newIdentity -> DEBU 3ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.350 UTC [msp] Validate -> DEBU 1ed MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:40.350 UTC [common.channelconfig] NewStandardValues -> DEBU 1ee Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.350 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ef Processing field: ACLs" +peer0.org1.example.com | "2019-04-22 06:16:40.350 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f0 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.352 UTC [common.channelconfig] NewStandardValues -> DEBU 1f1 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.352 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f2 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:40.352 UTC [common.channelconfig] NewStandardValues -> DEBU 1f3 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f4 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.354 UTC [common.channelconfig] Validate -> DEBU 1f5 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-04-22 06:16:40.354 UTC [common.channelconfig] validateMSP -> DEBU 1f6 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.355 UTC [msp] newBccspMsp -> DEBU 1f7 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.355 UTC [msp] New -> DEBU 1f8 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.356 UTC [msp] Setup -> DEBU 1f9 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.356 UTC [msp.identity] newIdentity -> DEBU 1fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.357 UTC [msp.identity] newIdentity -> DEBU 1fb Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [cauthdsl] func1 -> DEBU 3ef 0xc000c15bb0 gate 1555913798442752000 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [cauthdsl] func2 -> DEBU 3f0 0xc000c15bb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [cauthdsl] func2 -> DEBU 3f1 0xc000c15bb0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f2 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [cauthdsl] func2 -> DEBU 3f3 0xc000c15bb0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:38.442 UTC [msp.identity] Verify -> DEBU 3f4 Verify: digest = 00000000 a8 4b ca 9f 8a ef ce 6e 35 78 9c 94 89 37 8d 63 |.K.....n5x...7.c| +orderer0.example.com | 00000010 f9 28 84 f9 bb ab 1e a6 fb 1b ab fb 7b 47 43 26 |.(..........{GC&|" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [msp.identity] Verify -> DEBU 3f5 Verify: sig = 00000000 30 45 02 21 00 ca bc be 2c 38 ef 04 a8 ba 2f 2b |0E.!....,8..../+| +orderer0.example.com | 00000010 6f ed 8d 96 dd 0d 24 a1 08 3b 44 03 2f 86 90 aa |o.....$..;D./...| +orderer0.example.com | 00000020 60 2b 51 31 87 02 20 06 7a b9 a2 30 6f 61 54 a8 |`+Q1.. .z..0oaT.| +orderer0.example.com | 00000030 fb 70 a9 b3 91 e8 c1 33 77 13 e7 cb c5 7f a2 ff |.p.....3w.......| +orderer0.example.com | 00000040 d1 ba 5f 6b 1e 2f e6 |.._k./.|" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [cauthdsl] func2 -> DEBU 3f6 0xc000c15bb0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [cauthdsl] func1 -> DEBU 3f7 0xc000c15bb0 gate 1555913798442752000 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3f8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3fa Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3fc Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3fd Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3fe Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3ff Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 400 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 401 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 402 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:38.443 UTC [common.configtx] recurseConfigMap -> DEBU 403 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 404 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 405 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 406 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 407 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 408 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 409 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40e Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 410 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 411 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 412 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 413 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 414 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 415 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.358 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1fc Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.358 UTC [msp] Validate -> DEBU 1fd MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:40.359 UTC [msp] getCertificationChain -> DEBU 1fe MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.360 UTC [msp] hasOURole -> DEBU 1ff MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:40.360 UTC [msp] getCertificationChain -> DEBU 200 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.361 UTC [common.channelconfig] NewStandardValues -> DEBU 201 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 202 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:40.362 UTC [common.channelconfig] NewStandardValues -> DEBU 203 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 204 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.363 UTC [common.channelconfig] Validate -> DEBU 205 Anchor peers for org Org1MSP are " +peer0.org1.example.com | "2019-04-22 06:16:40.364 UTC [common.channelconfig] validateMSP -> DEBU 206 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.364 UTC [msp] newBccspMsp -> DEBU 207 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.365 UTC [msp] New -> DEBU 208 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.366 UTC [msp] Setup -> DEBU 209 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.366 UTC [msp.identity] newIdentity -> DEBU 20a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.367 UTC [msp.identity] newIdentity -> DEBU 20b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.368 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 20c Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.369 UTC [msp] Validate -> DEBU 20d MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:40.369 UTC [msp] getCertificationChain -> DEBU 20e MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.369 UTC [msp] hasOURole -> DEBU 20f MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:40.370 UTC [msp] getCertificationChain -> DEBU 210 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.370 UTC [msp] Setup -> DEBU 211 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-04-22 06:16:40.371 UTC [msp] Setup -> DEBU 212 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-04-22 06:16:40.371 UTC [common.capabilities] Supported -> DEBU 213 Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:40.371 UTC [common.capabilities] Supported -> DEBU 214 Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:40.372 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 215 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.372 UTC [msp.identity] Verify -> DEBU 216 Verify: digest = 00000000 ef a8 bc 98 15 03 b5 ab aa a1 c1 d5 99 2a 71 74 |.............*qt| +peer0.org1.example.com | 00000010 93 9a b6 08 a6 72 52 cd 6c 47 5b 8b 77 49 b7 48 |.....rR.lG[.wI.H|" +peer0.org1.example.com | "2019-04-22 06:16:40.373 UTC [msp.identity] Verify -> DEBU 217 Verify: sig = 00000000 30 44 02 20 03 ef 61 c5 c4 35 8c 8b c3 83 b0 4c |0D. ..a..5.....L| +peer0.org1.example.com | 00000010 1f de da a6 ca 5e 49 18 00 d1 65 e7 f9 0b 55 78 |.....^I...e...Ux| +peer0.org1.example.com | 00000020 ad b3 0f 83 02 20 5e b3 cd cd d4 c3 e9 a9 be 83 |..... ^.........| +peer0.org1.example.com | 00000030 17 2b b0 04 39 9b ea a5 21 22 75 36 93 32 01 c7 |.+..9...!"u6.2..| +peer0.org1.example.com | 00000040 7b e2 62 86 8e 9a |{.b...|" +peer0.org1.example.com | "2019-04-22 06:16:40.374 UTC [ledgermgmt] CreateLedger -> INFO 218 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:16:40.377 UTC [fsblkstorage] newBlockfileMgr -> DEBU 219 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +peer0.org1.example.com | "2019-04-22 06:16:40.377 UTC [kvledger.util] CreateDirIfMissing -> DEBU 21a CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +peer0.org1.example.com | "2019-04-22 06:16:40.378 UTC [kvledger.util] logDirStatus -> DEBU 21b Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:40.378 UTC [kvledger.util] logDirStatus -> DEBU 21c After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +peer0.org1.example.com | "2019-04-22 06:16:40.379 UTC [fsblkstorage] newBlockfileMgr -> INFO 21d Getting block information from block storage" +peer0.org1.example.com | "2019-04-22 06:16:40.379 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 21e Retrieving checkpoint info from block files" +peer0.org1.example.com | "2019-04-22 06:16:40.379 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 21f retrieveLastFileSuffix()" +peer0.org1.example.com | "2019-04-22 06:16:40.379 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 220 retrieveLastFileSuffix() - biggestFileNum = -1" +peer0.org1.example.com | "2019-04-22 06:16:40.380 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 221 Last file number found = -1" +peer0.org1.example.com | "2019-04-22 06:16:40.380 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 222 No block file found" +peer0.org1.example.com | "2019-04-22 06:16:40.381 UTC [fsblkstorage] newBlockfileMgr -> DEBU 223 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002654c00)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +peer0.org1.example.com | "2019-04-22 06:16:40.384 UTC [fsblkstorage] newBlockIndex -> DEBU 224 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +peer0.org1.example.com | "2019-04-22 06:16:40.385 UTC [pvtdatastorage] processCollElgEvents -> DEBU 225 Starting to process collection eligibility events" +peer0.org1.example.com | "2019-04-22 06:16:40.386 UTC [leveldbhelper] GetIterator -> DEBU 226 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +peer0.org1.example.com | "2019-04-22 06:16:40.386 UTC [pvtdatastorage] processCollElgEvents -> DEBU 227 Converted [0] inelligible mising data entries to elligible" +peer0.org1.example.com | "2019-04-22 06:16:40.386 UTC [pvtdatastorage] func1 -> DEBU 228 Waiting for collection eligibility event" +peer0.org1.example.com | "2019-04-22 06:16:40.385 UTC [pvtdatastorage] OpenStore -> DEBU 229 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +peer0.org1.example.com | "2019-04-22 06:16:40.387 UTC [leveldbhelper] GetIterator -> DEBU 22a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +peer0.org1.example.com | "2019-04-22 06:16:40.387 UTC [kvledger] newKVLedger -> DEBU 22b Creating KVLedger ledgerID=businesschannel: " +peer0.org1.example.com | "2019-04-22 06:16:40.387 UTC [kvledger] newKVLedger -> DEBU 22c Register state db for chaincode lifecycle events: false" +peer0.org1.example.com | "2019-04-22 06:16:40.388 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22d constructing new query executor txid = []" +peer0.org1.example.com | "2019-04-22 06:16:40.388 UTC [leveldbhelper] GetIterator -> DEBU 22e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]" +peer0.org1.example.com | "2019-04-22 06:16:40.389 UTC [lockbasedtxmgr] Done -> DEBU 22f Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-04-22 06:16:40.389 UTC [kvledger] recoverDBs -> DEBU 230 Entering recoverDB()" +peer0.org1.example.com | "2019-04-22 06:16:40.389 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 231 Block storage is empty." +peer0.org1.example.com | "2019-04-22 06:16:40.389 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 232 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:16:40.389 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 233 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +peer0.org1.example.com | "2019-04-22 06:16:40.390 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 234 Constructing unique pvtData by removing duplicate entries" +peer0.org1.example.com | "2019-04-22 06:16:40.392 UTC [kvledger] CommitWithPvtData -> DEBU 235 [businesschannel] Validating state for block [0]" +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 416 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 417 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 418 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 419 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41a Sign: plaintext: 0AD2060A1B08011A0608C6B8F5E50522...638372D19938FBFF7D6A639AEDD7755B " +orderer0.example.com | "2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41b Sign: digest: BB618B48FE09E33783AFE19AEFC7FD437E5E7D443710A18EB0D3FEDD591B6218 " +orderer0.example.com | "2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41c Sign: plaintext: 0ACE060A1708041A0608C6B8F5E50522...D9C17C6C3794FC7EC4ED0F6EAD651A5F " +orderer0.example.com | "2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41d Sign: digest: 506A891A32D02BEBC13E324A81DF6C067206ECB495BE5272783C5DBE49D49A06 " +orderer0.example.com | "2019-04-22 06:16:38.451 UTC [policies] Evaluate -> DEBU 41e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:38.451 UTC [policies] Evaluate -> DEBU 41f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:38.451 UTC [policies] Evaluate -> DEBU 420 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-04-22 06:16:38.452 UTC [policies] Evaluate -> DEBU 421 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:38.452 UTC [policies] Evaluate -> DEBU 422 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-04-22 06:16:38.452 UTC [msp] DeserializeIdentity -> DEBU 423 Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:38.452 UTC [msp.identity] newIdentity -> DEBU 424 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.453 UTC [cauthdsl] func1 -> DEBU 425 0xc0001723f0 gate 1555913798453641700 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:38.453 UTC [cauthdsl] func2 -> DEBU 426 0xc0001723f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:38.453 UTC [cauthdsl] func2 -> DEBU 427 0xc0001723f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:38.453 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 428 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:38.453 UTC [msp] Validate -> DEBU 429 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.454 UTC [cauthdsl] func2 -> DEBU 42a 0xc0001723f0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:38.454 UTC [msp.identity] Verify -> DEBU 42b Verify: digest = 00000000 50 6a 89 1a 32 d0 2b eb c1 3e 32 4a 81 df 6c 06 |Pj..2.+..>2J..l.| +orderer0.example.com | 00000010 72 06 ec b4 95 be 52 72 78 3c 5d be 49 d4 9a 06 |r.....Rrx<].I...|" +orderer0.example.com | "2019-04-22 06:16:38.456 UTC [msp.identity] Verify -> DEBU 42c Verify: sig = 00000000 30 45 02 21 00 d8 96 7c 94 5a 11 bf 17 9f ad 22 |0E.!...|.Z....."| +orderer0.example.com | 00000010 bf 54 e9 c5 f1 d7 9b 86 ec 3b 56 b8 63 14 de 76 |.T.......;V.c..v| +orderer0.example.com | 00000020 3d a6 42 f9 ef 02 20 1d 3a 50 0b 86 f6 9c 03 88 |=.B... .:P......| +orderer0.example.com | 00000030 19 e7 2b 6b d7 6d d0 ea 25 23 21 b9 7e d5 ce dc |..+k.m..%#!.~...| +orderer0.example.com | 00000040 04 55 db 64 c7 cc eb |.U.d...|" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [cauthdsl] func2 -> DEBU 42d 0xc0001723f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [cauthdsl] func1 -> DEBU 42e 0xc0001723f0 gate 1555913798453641700 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 42f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 430 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 431 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 432 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 433 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 434 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:38.458 UTC [common.channelconfig] NewStandardValues -> DEBU 435 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 437 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 439 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43a Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] NewStandardValues -> DEBU 43b Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43c Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43d Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43e Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43f Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 440 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 441 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [common.channelconfig] NewStandardValues -> DEBU 442 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [common.channelconfig] initializeProtosStruct -> DEBU 443 Processing field: Endpoints" +peer0.org1.example.com | "2019-04-22 06:16:40.392 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 236 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 237 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 238 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 239 ValidateAndPrepareBatch() for block number = [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 23a preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [valimpl] preprocessProtoBlock -> DEBU 23b txType=CONFIG" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [valimpl] processNonEndorserTx -> DEBU 23c Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [valimpl] processNonEndorserTx -> DEBU 23d Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23e constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23f constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-04-22 06:16:40.393 UTC [peer] GenerateSimulationResults -> DEBU 240 Processing CONFIG" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [common.channelconfig] NewStandardValues -> DEBU 444 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [common.channelconfig] initializeProtosStruct -> DEBU 445 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [common.channelconfig] validateMSP -> DEBU 446 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [msp] newBccspMsp -> DEBU 447 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [msp] New -> DEBU 448 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [msp] Setup -> DEBU 449 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:38.460 UTC [msp.identity] newIdentity -> DEBU 44a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.461 UTC [msp.identity] newIdentity -> DEBU 44b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.461 UTC [msp] Validate -> DEBU 44c MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.461 UTC [common.channelconfig] NewStandardValues -> DEBU 44d Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:16:38.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44e Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:38.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44f Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.461 UTC [common.channelconfig] NewStandardValues -> DEBU 450 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 451 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [common.channelconfig] NewStandardValues -> DEBU 452 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 453 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [common.channelconfig] Validate -> DEBU 454 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [common.channelconfig] validateMSP -> DEBU 455 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [msp] newBccspMsp -> DEBU 456 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [msp] New -> DEBU 457 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [msp] Setup -> DEBU 458 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [msp.identity] newIdentity -> DEBU 459 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.462 UTC [msp.identity] newIdentity -> DEBU 45a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.463 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 45b Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.463 UTC [msp] Validate -> DEBU 45c MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.463 UTC [msp] getCertificationChain -> DEBU 45d MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.463 UTC [msp] hasOURole -> DEBU 45e MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [msp] getCertificationChain -> DEBU 45f MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [common.channelconfig] NewStandardValues -> DEBU 460 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU 461 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [common.channelconfig] NewStandardValues -> DEBU 462 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU 463 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [common.channelconfig] Validate -> DEBU 464 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [common.channelconfig] validateMSP -> DEBU 465 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [msp] newBccspMsp -> DEBU 466 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.464 UTC [msp] New -> DEBU 467 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.465 UTC [msp] Setup -> DEBU 468 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.465 UTC [msp.identity] newIdentity -> DEBU 469 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.465 UTC [msp.identity] newIdentity -> DEBU 46a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.466 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 46b Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.466 UTC [msp] Validate -> DEBU 46c MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.466 UTC [msp] getCertificationChain -> DEBU 46d MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [msp] hasOURole -> DEBU 46e MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [msp] getCertificationChain -> DEBU 46f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [msp] Setup -> DEBU 470 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [msp] Setup -> DEBU 471 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 472 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 473 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 474 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 475 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 476 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 477 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 478 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 479 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47a Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47e Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47f Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 480 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 481 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] GetPolicy -> DEBU 482 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 483 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] GetPolicy -> DEBU 484 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 485 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [policies] GetPolicy -> DEBU 486 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [policies] NewManagerImpl -> DEBU 487 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 494 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 495 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 496 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 497 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 498 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 499 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] verifyDeltaSet -> DEBU 4bf Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [common.configtx] policyForItem -> DEBU 4c0 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c1 Manager Channel looking up path []" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c2 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c3 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c4 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c5 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c6 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c7 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c8 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c9 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Evaluate -> DEBU 4ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-04-22 06:16:38.473 UTC [policies] Evaluate -> DEBU 4cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [msp] DeserializeIdentity -> DEBU 4cd Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [msp.identity] newIdentity -> DEBU 4ce Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [cauthdsl] func1 -> DEBU 4cf 0xc00054af00 gate 1555913798474450200 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d0 0xc00054af00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d1 0xc00054af00 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d2 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d3 0xc00054af00 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [msp.identity] Verify -> DEBU 4d4 Verify: digest = 00000000 a8 4b ca 9f 8a ef ce 6e 35 78 9c 94 89 37 8d 63 |.K.....n5x...7.c| +orderer0.example.com | 00000010 f9 28 84 f9 bb ab 1e a6 fb 1b ab fb 7b 47 43 26 |.(..........{GC&|" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [msp.identity] Verify -> DEBU 4d5 Verify: sig = 00000000 30 45 02 21 00 ca bc be 2c 38 ef 04 a8 ba 2f 2b |0E.!....,8..../+| +orderer0.example.com | 00000010 6f ed 8d 96 dd 0d 24 a1 08 3b 44 03 2f 86 90 aa |o.....$..;D./...| +orderer0.example.com | 00000020 60 2b 51 31 87 02 20 06 7a b9 a2 30 6f 61 54 a8 |`+Q1.. .z..0oaT.| +orderer0.example.com | 00000030 fb 70 a9 b3 91 e8 c1 33 77 13 e7 cb c5 7f a2 ff |.p.....3w.......| +orderer0.example.com | 00000040 d1 ba 5f 6b 1e 2f e6 |.._k./.|" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d6 0xc00054af00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [cauthdsl] func1 -> DEBU 4d7 0xc00054af00 gate 1555913798474450200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4d8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4da Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4dc Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4dd Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4de Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4df Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4e0 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4e1 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4e2 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4ea Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4eb Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4ec Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.476 UTC [common.configtx] recurseConfigMap -> DEBU 4ee Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.479 UTC [common.configtx] recurseConfigMap -> DEBU 4ef Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.479 UTC [common.configtx] recurseConfigMap -> DEBU 4f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.configtx] recurseConfigMap -> DEBU 4f9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] NewStandardValues -> DEBU 4fa Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] NewStandardValues -> DEBU 500 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 501 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 503 Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 505 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 506 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] NewStandardValues -> DEBU 507 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 508 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] NewStandardValues -> DEBU 509 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50a Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [common.channelconfig] validateMSP -> DEBU 50b Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [msp] newBccspMsp -> DEBU 50c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.482 UTC [msp] New -> DEBU 50d Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.483 UTC [msp] Setup -> DEBU 50e Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:38.483 UTC [msp.identity] newIdentity -> DEBU 50f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.484 UTC [msp.identity] newIdentity -> DEBU 510 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.484 UTC [msp] Validate -> DEBU 511 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.484 UTC [common.channelconfig] NewStandardValues -> DEBU 512 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 513 Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 514 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.485 UTC [common.channelconfig] NewStandardValues -> DEBU 515 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 516 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.485 UTC [common.channelconfig] NewStandardValues -> DEBU 517 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 518 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.485 UTC [common.channelconfig] Validate -> DEBU 519 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-04-22 06:16:38.486 UTC [common.channelconfig] validateMSP -> DEBU 51a Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.486 UTC [msp] newBccspMsp -> DEBU 51b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.486 UTC [msp] New -> DEBU 51c Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.486 UTC [msp] Setup -> DEBU 51d Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.487 UTC [msp.identity] newIdentity -> DEBU 51e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.487 UTC [msp.identity] newIdentity -> DEBU 51f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.487 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 520 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.487 UTC [msp] Validate -> DEBU 521 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [msp] getCertificationChain -> DEBU 522 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [msp] hasOURole -> DEBU 523 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [msp] getCertificationChain -> DEBU 524 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [common.channelconfig] NewStandardValues -> DEBU 525 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [common.channelconfig] NewStandardValues -> DEBU 527 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [common.channelconfig] initializeProtosStruct -> DEBU 528 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.488 UTC [common.channelconfig] Validate -> DEBU 529 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-04-22 06:16:38.489 UTC [common.channelconfig] validateMSP -> DEBU 52a Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.489 UTC [msp] newBccspMsp -> DEBU 52b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.489 UTC [msp] New -> DEBU 52c Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.489 UTC [msp] Setup -> DEBU 52d Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.489 UTC [msp.identity] newIdentity -> DEBU 52e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.490 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | "2019-04-22 06:16:40.394 UTC [peer] processChannelConfigTx -> DEBU 241 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-04-22 06:16:40.394 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 242 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:16:40.395 UTC [lockbasedtxmgr] Done -> DEBU 243 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-04-22 06:16:40.396 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 244 Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-04-22 06:16:40.396 UTC [valinternal] ApplyWriteSet -> DEBU 245 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0026cc0c0)}" +peer0.org1.example.com | "2019-04-22 06:16:40.397 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 246 validating rwset..." +peer0.org1.example.com | "2019-04-22 06:16:40.397 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 247 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:40.397 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 248 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:16:40.398 UTC [kvledger] CommitWithPvtData -> DEBU 249 [businesschannel] Committing block [0] to storage" +peer0.org1.example.com | "2019-04-22 06:16:40.398 UTC [ledgerstorage] CommitWithPvtData -> DEBU 24a Writing block [0] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:16:40.405 UTC [pvtdatastorage] Prepare -> DEBU 24b Saved 0 private data write sets for block [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.409 UTC [fsblkstorage] indexBlock -> DEBU 24c Indexing block [blockNum=0, blockHash=[]byte{0xf6, 0x29, 0x3f, 0xa6, 0x1, 0x5a, 0xaa, 0xb2, 0x22, 0x71, 0xbf, 0x53, 0xb7, 0xa0, 0x31, 0x1f, 0xef, 0xf7, 0x76, 0xb6, 0xf7, 0x7c, 0x76, 0x93, 0xe4, 0xd4, 0x23, 0x7, 0xcb, 0xf9, 0x42, 0x5c} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=39, bytesLength=23896 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:16:40.409 UTC [fsblkstorage] indexBlock -> DEBU 24d Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx ID: [] to txid-index" +peer0.org1.example.com | "2019-04-22 06:16:40.410 UTC [fsblkstorage] indexBlock -> DEBU 24e Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:16:40.412 UTC [fsblkstorage] updateCheckpoint -> DEBU 24f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23941], isChainEmpty=[false], lastBlockNumber=[0]" +peer0.org1.example.com | "2019-04-22 06:16:40.412 UTC [pvtdatastorage] Commit -> DEBU 250 Committing private data for block [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.414 UTC [pvtdatastorage] Commit -> DEBU 251 Committed private data for block [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.415 UTC [pvtdatastorage] func1 -> DEBU 252 Purger started: Purging expired private data till block number [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.415 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 253 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +peer0.org1.example.com | "2019-04-22 06:16:40.416 UTC [leveldbhelper] GetIterator -> DEBU 254 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:16:40.416 UTC [pvtdatastorage] func1 -> DEBU 255 Purger finished" +peer0.org1.example.com | "2019-04-22 06:16:40.415 UTC [kvledger] CommitWithPvtData -> DEBU 256 [businesschannel] Committing block [0] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:16:40.417 UTC [lockbasedtxmgr] Commit -> DEBU 257 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:40.418 UTC [lockbasedtxmgr] Commit -> DEBU 258 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:40.418 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 259 Preparing potential purge list working-set for expiringAtBlk [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.418 UTC [leveldbhelper] GetIterator -> DEBU 25a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:16:40.418 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 25b No expiry entry found for expiringAtBlk [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.419 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 25c Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:16:40.419 UTC [lockbasedtxmgr] Commit -> DEBU 25d Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:40.419 UTC [stateleveldb] ApplyUpdates -> DEBU 25e Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-04-22 06:16:40.422 UTC [lockbasedtxmgr] Commit -> DEBU 25f Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:16:40.422 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 260 Preparing potential purge list working-set for expiringAtBlk [1]" +peer0.org1.example.com | "2019-04-22 06:16:40.423 UTC [leveldbhelper] GetIterator -> DEBU 261 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:16:40.423 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 262 No expiry entry found for expiringAtBlk [1]" +peer0.org1.example.com | "2019-04-22 06:16:40.423 UTC [lockbasedtxmgr] func1 -> DEBU 263 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:16:40.424 UTC [kvledger] CommitWithPvtData -> DEBU 264 [businesschannel] Committing block [0] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:16:40.424 UTC [historyleveldb] Commit -> DEBU 265 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:16:40.424 UTC [historyleveldb] Commit -> DEBU 266 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-04-22 06:16:40.427 UTC [historyleveldb] Commit -> DEBU 267 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +peer0.org1.example.com | "2019-04-22 06:16:40.427 UTC [kvledger] CommitWithPvtData -> INFO 268 [businesschannel] Committed block [0] with 1 transaction(s) in 34ms (state_validation=5ms block_commit=17ms state_commit=8ms)" +peer0.org1.example.com | "2019-04-22 06:16:40.430 UTC [ledgermgmt] CreateLedger -> INFO 269 Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:16:40.431 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 26a constructing new query executor txid = [74456df6-9998-4725-b2ef-944b80341c2b]" +peer0.org1.example.com | "2019-04-22 06:16:40.431 UTC [stateleveldb] GetState -> DEBU 26b GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +peer0.org1.example.com | "2019-04-22 06:16:40.431 UTC [lockbasedtxmgr] Done -> DEBU 26c Done with transaction simulation / query execution [74456df6-9998-4725-b2ef-944b80341c2b]" +peer0.org1.example.com | "2019-04-22 06:16:40.432 UTC [common.channelconfig] NewStandardValues -> DEBU 26d Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.490 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 530 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.490 UTC [msp] Validate -> DEBU 531 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [msp] getCertificationChain -> DEBU 532 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [msp] hasOURole -> DEBU 533 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [msp] getCertificationChain -> DEBU 534 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [msp] Setup -> DEBU 535 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [msp] Setup -> DEBU 536 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [policies] NewManagerImpl -> DEBU 537 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [policies] NewManagerImpl -> DEBU 538 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.491 UTC [policies] NewManagerImpl -> DEBU 539 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53a Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53b Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53c Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53d Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53e Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53f Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 540 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.432 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26e Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:16:40.432 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26f Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 270 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 271 Processing field: Consortium" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 272 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ACLs" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 275 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] NewStandardValues -> DEBU 276 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 277 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] NewStandardValues -> DEBU 278 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 279 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] Validate -> DEBU 27a Anchor peers for org Org1MSP are " +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [common.channelconfig] validateMSP -> DEBU 27b Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [msp] newBccspMsp -> DEBU 27c Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [msp] New -> DEBU 27d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.433 UTC [msp] Setup -> DEBU 27e Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.434 UTC [msp.identity] newIdentity -> DEBU 27f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.434 UTC [msp.identity] newIdentity -> DEBU 280 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.434 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 281 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.434 UTC [msp] Validate -> DEBU 282 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:40.434 UTC [msp] getCertificationChain -> DEBU 283 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.435 UTC [msp] hasOURole -> DEBU 284 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:40.435 UTC [msp] getCertificationChain -> DEBU 285 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.435 UTC [common.channelconfig] NewStandardValues -> DEBU 286 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 287 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:40.436 UTC [common.channelconfig] NewStandardValues -> DEBU 288 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 289 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.437 UTC [common.channelconfig] Validate -> DEBU 28a Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-04-22 06:16:40.437 UTC [common.channelconfig] validateMSP -> DEBU 28b Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.438 UTC [msp] newBccspMsp -> DEBU 28c Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.438 UTC [msp] New -> DEBU 28d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.439 UTC [msp] Setup -> DEBU 28e Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.439 UTC [msp.identity] newIdentity -> DEBU 28f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.440 UTC [msp.identity] newIdentity -> DEBU 290 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 541 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 542 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 543 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 544 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 545 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 546 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 547 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 548 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 549 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 54a Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [policies] NewManagerImpl -> DEBU 54b Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [policies] NewManagerImpl -> DEBU 54c Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [policies] NewManagerImpl -> DEBU 54d Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 567 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 568 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 569 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 578 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.441 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 291 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.442 UTC [msp] Validate -> DEBU 292 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:40.442 UTC [msp] getCertificationChain -> DEBU 293 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.443 UTC [msp] hasOURole -> DEBU 294 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:40.443 UTC [msp] getCertificationChain -> DEBU 295 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] NewStandardValues -> DEBU 296 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 297 Processing field: ConsensusType" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 298 Processing field: BatchSize" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 299 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29a Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29b Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29c Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] NewStandardValues -> DEBU 29d Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29e Processing field: Endpoints" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] NewStandardValues -> DEBU 29f Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a0 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [common.channelconfig] validateMSP -> DEBU 2a1 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [msp] newBccspMsp -> DEBU 2a2 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [msp] New -> DEBU 2a3 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [msp] Setup -> DEBU 2a4 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [msp.identity] newIdentity -> DEBU 2a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.444 UTC [msp.identity] newIdentity -> DEBU 2a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [msp] Validate -> DEBU 2a7 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [msp] Setup -> DEBU 2a8 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [msp] Setup -> DEBU 2a9 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2aa Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ab Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ac Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ad Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ae Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2af Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b0 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b1 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b2 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b3 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b4 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b5 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b6 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.446 UTC [policies] NewManagerImpl -> DEBU 2b9 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.446 UTC [policies] NewManagerImpl -> DEBU 2ba Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:40.446 UTC [policies] NewManagerImpl -> DEBU 2bb Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:40.449 UTC [policies] NewManagerImpl -> DEBU 2bc Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:40.449 UTC [policies] NewManagerImpl -> DEBU 2bd Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:40.450 UTC [policies] NewManagerImpl -> DEBU 2be Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 579 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.capabilities] Supported -> DEBU 57a Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:38.497 UTC [common.capabilities] Supported -> DEBU 57b Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:38.498 UTC [orderer.common.cluster] NewStream -> DEBU 57c Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2019-04-22 06:16:38.498 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 57d Sending msg of 24746 bytes to 3 on channel testchainid took 182.9µs" +orderer0.example.com | "2019-04-22 06:16:38.498 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 57e [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34482" +orderer0.example.com | "2019-04-22 06:16:38.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 57f Send of SubmitRequest for channel testchainid with payload of size 24746 to orderer2.example.com(orderer2.example.com:7050) took 1.43ms " +orderer0.example.com | "2019-04-22 06:16:38.504 UTC [orderer.common.broadcast] Handle -> DEBU 580 Received EOF from 192.168.224.9:34482, hangup" +orderer0.example.com | "2019-04-22 06:16:38.505 UTC [orderer.common.server] func1 -> DEBU 581 Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:16:38.510 UTC [comm.grpc.server] 1 -> INFO 582 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34482 grpc.code=OK grpc.call_duration=107.7729ms +orderer0.example.com | "2019-04-22 06:16:38.511 UTC [common.deliver] deliverBlocks -> DEBU 583 Rejecting deliver for 192.168.224.9:34480 because channel businesschannel not found" +orderer0.example.com | "2019-04-22 06:16:38.511 UTC [orderer.common.server] func1 -> DEBU 584 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:38.511 UTC [comm.grpc.server] 1 -> INFO 585 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34480 grpc.code=OK grpc.call_duration=121.92ms +orderer0.example.com | "2019-04-22 06:16:38.513 UTC [orderer.common.cluster.step] handleMessage -> DEBU 586 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 24955" +orderer0.example.com | "2019-04-22 06:16:38.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU 587 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:38.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 588 Sending msg of 28 bytes to 3 on channel testchainid took 141.9µs" +orderer0.example.com | "2019-04-22 06:16:38.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 589 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.4µs " +orderer0.example.com | "2019-04-22 06:16:38.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 58a Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +orderer0.example.com | "2019-04-22 06:16:38.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 58b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186µs " +orderer0.example.com | "2019-04-22 06:16:38.536 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 58c Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2019-04-22 06:16:38.537 UTC [common.channelconfig] NewStandardValues -> DEBU 58d Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:38.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58f Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 590 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 591 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:38.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 592 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.540 UTC [common.channelconfig] NewStandardValues -> DEBU 593 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:16:38.540 UTC [common.channelconfig] initializeProtosStruct -> DEBU 594 Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:38.540 UTC [common.channelconfig] initializeProtosStruct -> DEBU 595 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.541 UTC [common.channelconfig] NewStandardValues -> DEBU 596 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.542 UTC [common.channelconfig] initializeProtosStruct -> DEBU 597 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.543 UTC [common.channelconfig] NewStandardValues -> DEBU 598 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.543 UTC [common.channelconfig] initializeProtosStruct -> DEBU 599 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.544 UTC [common.channelconfig] Validate -> DEBU 59a Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-04-22 06:16:38.544 UTC [common.channelconfig] validateMSP -> DEBU 59b Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.544 UTC [msp] newBccspMsp -> DEBU 59c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.545 UTC [msp] New -> DEBU 59d Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.547 UTC [msp] Setup -> DEBU 59e Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.548 UTC [msp.identity] newIdentity -> DEBU 59f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.551 UTC [msp.identity] newIdentity -> DEBU 5a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:40.450 UTC [policies] NewManagerImpl -> DEBU 2bf Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-04-22 06:16:40.450 UTC [policies] NewManagerImpl -> DEBU 2c0 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cf Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d0 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d1 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d2 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d3 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d5 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d6 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d7 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d8 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2da Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2db Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2dc Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2dd Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2de Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2df Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e2 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e3 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e4 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e5 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e7 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e8 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e9 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2ea Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.capabilities] Supported -> DEBU 2ed Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.capabilities] Supported -> DEBU 2ee Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ef As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f0 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f1 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f2 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f3 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f4 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f5 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f6 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f7 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:16:38.561 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5a1 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.563 UTC [msp] Validate -> DEBU 5a2 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.564 UTC [msp] getCertificationChain -> DEBU 5a3 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.564 UTC [msp] hasOURole -> DEBU 5a4 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.565 UTC [msp] getCertificationChain -> DEBU 5a5 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.566 UTC [common.channelconfig] NewStandardValues -> DEBU 5a6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a7 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:38.567 UTC [common.channelconfig] NewStandardValues -> DEBU 5a8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a9 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.572 UTC [common.channelconfig] Validate -> DEBU 5aa Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-04-22 06:16:38.572 UTC [common.channelconfig] validateMSP -> DEBU 5ab Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.572 UTC [msp] newBccspMsp -> DEBU 5ac Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.576 UTC [msp] New -> DEBU 5ad Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.577 UTC [msp] Setup -> DEBU 5ae Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.578 UTC [msp.identity] newIdentity -> DEBU 5af Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.590 UTC [msp.identity] newIdentity -> DEBU 5b1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.588 UTC [orderer.common.server] Deliver -> DEBU 5b0 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:38.591 UTC [common.deliver] Handle -> DEBU 5b2 Starting new deliver loop for 192.168.224.9:34484" +orderer0.example.com | "2019-04-22 06:16:38.594 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5b3 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.591 UTC [common.deliver] Handle -> DEBU 5b4 Attempting to read seek info message from 192.168.224.9:34484" +orderer0.example.com | "2019-04-22 06:16:38.596 UTC [msp] Validate -> DEBU 5b5 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.599 UTC [msp] getCertificationChain -> DEBU 5b6 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.600 UTC [msp] hasOURole -> DEBU 5b7 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:38.600 UTC [msp] getCertificationChain -> DEBU 5b8 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:38.601 UTC [common.channelconfig] NewStandardValues -> DEBU 5b9 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:38.601 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ba Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.601 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bb Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.602 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bc Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.602 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bd Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:38.603 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5be Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.603 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bf Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.604 UTC [common.channelconfig] NewStandardValues -> DEBU 5c0 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:38.604 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c1 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:38.605 UTC [common.channelconfig] NewStandardValues -> DEBU 5c2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:38.605 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c3 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:38.605 UTC [common.channelconfig] validateMSP -> DEBU 5c4 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.606 UTC [msp] newBccspMsp -> DEBU 5c5 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.606 UTC [msp] New -> DEBU 5c6 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:38.606 UTC [msp] Setup -> DEBU 5c7 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:38.606 UTC [msp.identity] newIdentity -> DEBU 5c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.607 UTC [msp.identity] newIdentity -> DEBU 5c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:38.608 UTC [msp] Validate -> DEBU 5ca MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:38.608 UTC [msp] Setup -> DEBU 5cb Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:38.609 UTC [msp] Setup -> DEBU 5cc MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5cd Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5ce Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5cf Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5d0 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d1 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d2 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d3 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d4 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.611 UTC [policies] NewManagerImpl -> DEBU 5d5 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.611 UTC [policies] NewManagerImpl -> DEBU 5d6 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.612 UTC [policies] NewManagerImpl -> DEBU 5d7 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.612 UTC [policies] NewManagerImpl -> DEBU 5d8 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.612 UTC [policies] NewManagerImpl -> DEBU 5d9 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.613 UTC [policies] NewManagerImpl -> DEBU 5da Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.614 UTC [policies] NewManagerImpl -> DEBU 5db Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f8 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:16:38.614 UTC [policies] NewManagerImpl -> DEBU 5dc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f9 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:16:38.615 UTC [policies] NewManagerImpl -> DEBU 5dd Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fa Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:16:38.615 UTC [policies] NewManagerImpl -> DEBU 5de Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.615 UTC [policies] NewManagerImpl -> DEBU 5df Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e0 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e1 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fb Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e2 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fc Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e3 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fd Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fe Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:38.619 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:38.619 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:38.619 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:38.620 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:38.620 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:38.620 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:38.621 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:38.621 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:38.622 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.622 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.622 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.623 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ff As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [gossip.service] ProcessConfigUpdate -> DEBU 300 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [gossip.service] ProcessConfigUpdate -> DEBU 301 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [gossip.service] updateAnchors -> DEBU 302 Org1MSP anchor peers: []" +peer0.org1.example.com | "2019-04-22 06:16:40.454 UTC [gossip.service] updateAnchors -> DEBU 303 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-04-22 06:16:40.455 UTC [gossip.service] updateAnchors -> DEBU 304 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.457 UTC [gossip.gossip] JoinChan -> INFO 305 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:16:40.458 UTC [gossip.gossip] learnAnchorPeers -> INFO 306 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:16:40.458 UTC [gossip.gossip] learnAnchorPeers -> INFO 307 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:16:40.459 UTC [peer] updateTrustedRoots -> DEBU 308 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.471 UTC [peer] buildTrustedRootsForChain -> DEBU 309 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:40.472 UTC [peer] buildTrustedRootsForChain -> DEBU 30a adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-04-22 06:16:40.472 UTC [peer] buildTrustedRootsForChain -> DEBU 30b adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-04-22 06:16:40.473 UTC [peer] buildTrustedRootsForChain -> DEBU 30c adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-04-22 06:16:40.473 UTC [kvledger.util] CreateDirIfMissing -> DEBU 30d CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +peer0.org1.example.com | "2019-04-22 06:16:40.474 UTC [kvledger.util] logDirStatus -> DEBU 30e Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +peer0.org1.example.com | "2019-04-22 06:16:40.474 UTC [kvledger.util] logDirStatus -> DEBU 30f After creating dir - [/var/hyperledger/production/transientStore/] exists" +peer0.org1.example.com | "2019-04-22 06:16:40.484 UTC [gossip.service] InitializeChannel -> DEBU 310 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.486 UTC [msp.identity] Sign -> DEBU 311 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-04-22 06:16:40.486 UTC [msp.identity] Sign -> DEBU 312 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-04-22 06:16:40.487 UTC [gossip.privdata] NewReconciler -> DEBU 313 Private data reconciliation is enabled" +peer0.org1.example.com | "2019-04-22 06:16:40.489 UTC [gossip.state] NewGossipStateProvider -> INFO 314 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-04-22 06:16:40.490 UTC [gossip.state] NewGossipStateProvider -> DEBU 315 Updating gossip ledger height to 1" +peer0.org1.example.com | "2019-04-22 06:16:40.491 UTC [msp.identity] Sign -> DEBU 316 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-04-22 06:16:40.491 UTC [msp.identity] Sign -> DEBU 317 Sign: digest: CEBC9A85F1B440F7D0EE8D5396F3D9025CBAA12ABA78DEAD4D81BA810DC3333D " +peer0.org1.example.com | "2019-04-22 06:16:40.492 UTC [gossip.service] InitializeChannel -> DEBU 318 Delivery uses dynamic leader election mechanism, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.493 UTC [peer] InitChain -> DEBU 319 Initializing channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.494 UTC [nodeCmd] func6 -> DEBU 31c Deploying system CC, for channel " +peer0.org1.example.com | "2019-04-22 06:16:40.493 UTC [gossip.election] waitForMembershipStabilization -> DEBU 31a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:40.493 UTC [gossip.election] handleMessages -> DEBU 31b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:40.495 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 31d constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:40.495 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 31e constructing new tx simulator txid = [14523f86-a699-407a-8092-22569d162a45]" +peer0.org1.example.com | "2019-04-22 06:16:40.495 UTC [chaincode] Execute -> DEBU 31f Entry" +peer0.org1.example.com | "2019-04-22 06:16:40.496 UTC [chaincode] handleMessage -> DEBU 320 [14523f86] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:40.496 UTC [chaincode] Notify -> DEBU 321 [14523f86] notifying Txid:14523f86-a699-407a-8092-22569d162a45, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.497 UTC [chaincode] Execute -> DEBU 322 Exit" +peer0.org1.example.com | "2019-04-22 06:16:40.497 UTC [sccapi] deploySysCC -> INFO 323 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:40.498 UTC [lockbasedtxmgr] Done -> DEBU 324 Done with transaction simulation / query execution [14523f86-a699-407a-8092-22569d162a45]" +peer0.org1.example.com | "2019-04-22 06:16:40.498 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 325 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:40.498 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 326 constructing new tx simulator txid = [1f239df4-b9e0-4604-a3d4-868d395f6646]" +peer0.org1.example.com | "2019-04-22 06:16:40.499 UTC [chaincode] Execute -> DEBU 327 Entry" +peer0.org1.example.com | "2019-04-22 06:16:40.499 UTC [cscc] Init -> INFO 328 Init CSCC" +peer0.org1.example.com | "2019-04-22 06:16:40.500 UTC [chaincode] handleMessage -> DEBU 329 [1f239df4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:40.500 UTC [chaincode] Notify -> DEBU 32a [1f239df4] notifying Txid:1f239df4-b9e0-4604-a3d4-868d395f6646, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.501 UTC [chaincode] Execute -> DEBU 32b Exit" +peer0.org1.example.com | "2019-04-22 06:16:40.501 UTC [sccapi] deploySysCC -> INFO 32c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:40.502 UTC [lockbasedtxmgr] Done -> DEBU 32d Done with transaction simulation / query execution [1f239df4-b9e0-4604-a3d4-868d395f6646]" +peer0.org1.example.com | "2019-04-22 06:16:40.502 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 32e constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:40.503 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 32f constructing new tx simulator txid = [79401bf3-063c-4725-bb9b-eab61d32c1fc]" +peer0.org1.example.com | "2019-04-22 06:16:40.503 UTC [chaincode] Execute -> DEBU 330 Entry" +orderer0.example.com | "2019-04-22 06:16:38.627 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.627 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:38.627 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:38.628 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:38.628 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.628 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:38.629 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:38.629 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:38.629 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:38.630 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:38.630 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:38.632 UTC [common.configtx] addToMap -> DEBU 60e Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:38.632 UTC [common.configtx] addToMap -> DEBU 60f Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:38.632 UTC [common.channelconfig] LogSanityChecks -> DEBU 610 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:16:38.632 UTC [common.channelconfig] LogSanityChecks -> DEBU 611 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 612 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 613 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 614 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 615 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 616 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 617 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:38.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 618 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:16:38.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 619 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:16:38.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 61a As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:16:38.635 UTC [policies] Manager -> DEBU 61b Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:16:38.635 UTC [policies] Manager -> DEBU 61c Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:38.636 UTC [policies] Manager -> DEBU 61d Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:38.636 UTC [policies] Manager -> DEBU 61e Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:16:38.636 UTC [policies] Manager -> DEBU 61f Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:38.636 UTC [common.channelconfig] LogSanityChecks -> DEBU 620 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [common.capabilities] Supported -> DEBU 621 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [common.capabilities] Supported -> DEBU 622 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] newBlockfileMgr -> DEBU 623 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [kvledger.util] CreateDirIfMissing -> DEBU 624 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [kvledger.util] logDirStatus -> DEBU 625 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [kvledger.util] logDirStatus -> DEBU 626 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] newBlockfileMgr -> INFO 627 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 628 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 629 retrieveLastFileSuffix()" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 62a retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 62b Last file number found = -1" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 62c No block file found" +orderer0.example.com | "2019-04-22 06:16:38.637 UTC [fsblkstorage] newBlockfileMgr -> DEBU 62d Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000558d20)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-04-22 06:16:38.641 UTC [fsblkstorage] newBlockIndex -> DEBU 62e newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-04-22 06:16:38.642 UTC [orderer.common.server] func1 -> DEBU 62f Executing callback to update root CAs" +orderer0.example.com | "2019-04-22 06:16:38.642 UTC [orderer.common.server] updateTrustedRoots -> DEBU 630 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-04-22 06:16:38.644 UTC [orderer.common.server] updateTrustedRoots -> DEBU 631 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-04-22 06:16:38.647 UTC [orderer.common.server] updateTrustedRoots -> DEBU 632 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-04-22 06:16:38.647 UTC [orderer.common.server] updateTrustedRoots -> DEBU 633 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-04-22 06:16:38.651 UTC [fsblkstorage] indexBlock -> DEBU 634 Indexing block [blockNum=0, blockHash=[]byte{0xf6, 0x29, 0x3f, 0xa6, 0x1, 0x5a, 0xaa, 0xb2, 0x22, 0x71, 0xbf, 0x53, 0xb7, 0xa0, 0x31, 0x1f, 0xef, 0xf7, 0x76, 0xb6, 0xf7, 0x7c, 0x76, 0x93, 0xe4, 0xd4, 0x23, 0x7, 0xcb, 0xf9, 0x42, 0x5c} txOffsets= +orderer0.example.com | txId= locPointer=offset=39, bytesLength=23896 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:38.655 UTC [fsblkstorage] updateCheckpoint -> DEBU 635 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23940], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-04-22 06:16:38.655 UTC [fsblkstorage] Next -> DEBU 636 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:38.655 UTC [fsblkstorage] newBlockfileStream -> DEBU 637 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:38.656 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 638 Remaining bytes=[23940], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:38.656 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 639 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:38.657 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63a blockbytes [23937] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:38.658 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 63b [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2019-04-22 06:16:38.658 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 63c EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-04-22 06:16:38.658 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63d No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.659 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 63e No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.664 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 63f Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.665 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 640 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.665 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 641 Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.665 UTC [fsblkstorage] Next -> DEBU 642 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:38.666 UTC [fsblkstorage] newBlockfileStream -> DEBU 643 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:38.667 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 644 Remaining bytes=[23940], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:38.667 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 645 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:38.667 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 646 blockbytes [23937] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:38.668 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 647 [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2019-04-22 06:16:38.668 UTC [orderer.commmon.multichannel] newChain -> INFO 648 Created and starting new chain businesschannel" +orderer0.example.com | "2019-04-22 06:16:38.668 UTC [orderer.consensus.etcdraft] Start -> INFO 649 Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.669 UTC [orderer.common.cluster] Configure -> INFO 64a Entering, channel: businesschannel, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +peer0.org1.example.com | "2019-04-22 06:16:40.503 UTC [qscc] Init -> INFO 331 Init QSCC" +peer0.org1.example.com | "2019-04-22 06:16:40.504 UTC [chaincode] handleMessage -> DEBU 332 [79401bf3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:40.504 UTC [chaincode] Notify -> DEBU 333 [79401bf3] notifying Txid:79401bf3-063c-4725-bb9b-eab61d32c1fc, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.504 UTC [chaincode] Execute -> DEBU 334 Exit" +peer0.org1.example.com | "2019-04-22 06:16:40.505 UTC [sccapi] deploySysCC -> INFO 335 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:16:40.505 UTC [lockbasedtxmgr] Done -> DEBU 336 Done with transaction simulation / query execution [79401bf3-063c-4725-bb9b-eab61d32c1fc]" +peer0.org1.example.com | "2019-04-22 06:16:40.506 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 337 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:40.506 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 338 constructing new tx simulator txid = [cedbfce1-0f29-4f09-885b-609ad444c518]" +peer0.org1.example.com | "2019-04-22 06:16:40.506 UTC [chaincode] Execute -> DEBU 339 Entry" +peer0.org1.example.com | "2019-04-22 06:16:40.506 UTC [chaincode] handleMessage -> DEBU 33a [cedbfce1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [chaincode] Notify -> DEBU 33b [cedbfce1] notifying Txid:cedbfce1-0f29-4f09-885b-609ad444c518, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [chaincode] Execute -> DEBU 33c Exit" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [sccapi] deploySysCC -> INFO 33d system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [lockbasedtxmgr] Done -> DEBU 33e Done with transaction simulation / query execution [cedbfce1-0f29-4f09-885b-609ad444c518]" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 33f constructing new query executor txid = [a2d86ae6-f0b9-4a59-b21f-e51784d029de]" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 340 Returning []" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [lockbasedtxmgr] Done -> DEBU 341 Done with transaction simulation / query execution [a2d86ae6-f0b9-4a59-b21f-e51784d029de]" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [msp.identity] Sign -> DEBU 342 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020801 " +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [msp.identity] Sign -> DEBU 343 Sign: digest: 21170F5343D60F5E741704EC35A6FCE299660F5FC9B29A8D4BCFC4684B0157C2 " +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 344 Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [chaincode] handleMessage -> DEBU 345 [66b0a642] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [chaincode] Notify -> DEBU 346 [66b0a642] notifying Txid:66b0a642a88a1551bdc484ed5f11b636cd6bcd5291a0137cb0e2db12aa125509, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [chaincode] Execute -> DEBU 347 Exit" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [endorser] callChaincode -> INFO 348 [][66b0a642] Exit chaincode: name:"cscc" (165ms)" +peer0.org1.example.com | "2019-04-22 06:16:40.507 UTC [endorser] SimulateProposal -> DEBU 349 [][66b0a642] Exit" +peer0.org1.example.com | "2019-04-22 06:16:40.508 UTC [endorser] func1 -> DEBU 34a Exit: request from 192.168.224.9:49140" +peer0.org1.example.com | "2019-04-22 06:16:40.508 UTC [comm.grpc.server] 1 -> INFO 34b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49140 grpc.code=OK grpc.call_duration=172.711ms +peer0.org1.example.com | "2019-04-22 06:16:40.513 UTC [grpc] infof -> DEBU 34c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 34d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151008 " +peer0.org1.example.com | "2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 34e Sign: digest: 7DDF291C903FC22DF4A5F2FF5428EFF69BED034945DEA6A4AF284A3E55C58FC5 " +peer0.org1.example.com | "2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 34f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 350 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:40.876 UTC [gossip.discovery] periodicalSendAlive -> DEBU 351 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:16:40.876 UTC [gossip.comm] Send -> DEBU 352 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:40.877 UTC [gossip.comm] sendToEndpoint -> DEBU 353 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:40.877 UTC [gossip.comm] sendToEndpoint -> DEBU 354 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:41.168 UTC [gossip.gossip] handleMessage -> DEBU 355 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:41.168 UTC [gossip.gossip] handleMessage -> DEBU 356 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:41.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 357 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:41.168 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:41.169 UTC [msp.identity] Verify -> DEBU 359 Verify: digest = 00000000 c5 c7 ab 5d 84 38 cd a6 03 ef 8b 01 2a f4 d7 d5 |...].8......*...| +peer0.org1.example.com | 00000010 42 90 cf e1 25 c1 3c 21 7f c3 1d a2 87 ca 96 96 |B...%. DEBU 35a Verify: sig = 00000000 30 45 02 21 00 eb cb e4 21 7b 81 4c c9 8a 8c 04 |0E.!....!{.L....| +peer0.org1.example.com | 00000010 0c 95 50 ca d2 ab 56 a7 c3 1e 8a 44 f6 e8 0c 91 |..P...V....D....| +peer0.org1.example.com | 00000020 88 94 0f a3 9f 02 20 7c 79 4d a1 df 3f c9 c3 3b |...... |yM..?..;| +peer0.org1.example.com | 00000030 fa 48 de 99 3e ba 53 21 6e c7 72 35 30 71 c9 7b |.H..>.S!n.r50q.{| +peer0.org1.example.com | 00000040 c2 26 4e 26 22 0f 2d |.&N&".-|" +peer0.org1.example.com | "2019-04-22 06:16:41.169 UTC [msp.identity] Verify -> DEBU 35b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:41.169 UTC [msp.identity] Verify -> DEBU 35c Verify: sig = 00000000 30 44 02 20 0e 9c 80 b7 57 ae dc 01 c8 fc dc 60 |0D. ....W......`| +peer0.org1.example.com | 00000010 1b 32 8e 50 23 a1 a2 57 10 ed 42 62 8c d0 7f 18 |.2.P#..W..Bb....| +peer0.org1.example.com | 00000020 53 ed d0 10 02 20 11 e3 23 d4 f3 ba ba f8 47 82 |S.... ..#.....G.| +peer0.org1.example.com | 00000030 b8 d4 19 73 49 a4 5d 10 0d a0 4e 06 f9 5d cf 48 |...sI.]...N..].H| +peer0.org1.example.com | 00000040 ca ec aa 4a 96 9a |...J..|" +peer0.org1.example.com | "2019-04-22 06:16:41.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 35d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:41.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 35e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:41.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 " +peer0.org1.example.com | "2019-04-22 06:16:41.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 360 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 " +peer0.org1.example.com | "2019-04-22 06:16:41.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 361 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:41.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 362 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:41.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 363 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:41.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 364 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:41.495 UTC [gossip.election] waitForMembershipStabilization -> DEBU 365 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +peer0.org1.example.com | "2019-04-22 06:16:41.495 UTC [gossip.election] leaderElection -> DEBU 366 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:41.495 UTC [gossip.election] propose -> DEBU 367 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:41.495 UTC [gossip.election] propose -> DEBU 368 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:16:41.495 UTC [msp.identity] Sign -> DEBU 369 Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C089889839CBAEBEDCB151001 " +peer0.org1.example.com | "2019-04-22 06:16:41.495 UTC [msp.identity] Sign -> DEBU 36a Sign: digest: 75CE81932E61578E886A738A783830FC9728F18CB4C94CC128FC495DF715C9F5 " +peer0.org1.example.com | "2019-04-22 06:16:41.495 UTC [gossip.election] waitForInterrupt -> DEBU 36b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:41.605 UTC [endorser] ProcessProposal -> DEBU 36c Entering: request from 192.168.224.9:49148" +peer0.org1.example.com | "2019-04-22 06:16:41.606 UTC [protoutils] ValidateProposalMessage -> DEBU 36d ValidateProposalMessage starts for signed proposal 0xc002ed7c20" +peer0.org1.example.com | "2019-04-22 06:16:41.606 UTC [protoutils] validateChannelHeader -> DEBU 36e validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:41.606 UTC [protoutils] checkSignatureFromCreator -> DEBU 36f begin" +peer0.org1.example.com | "2019-04-22 06:16:41.607 UTC [protoutils] checkSignatureFromCreator -> DEBU 370 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:41.607 UTC [protoutils] checkSignatureFromCreator -> DEBU 371 creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:41.607 UTC [msp.identity] Verify -> DEBU 372 Verify: digest = 00000000 f9 2c e9 be d5 b9 51 1e 30 71 74 66 89 f4 43 20 |.,....Q.0qtf..C | +peer0.org1.example.com | 00000010 27 e5 f5 16 91 fb 07 62 e8 d0 73 d7 37 84 36 86 |'......b..s.7.6.|" +peer0.org1.example.com | "2019-04-22 06:16:41.608 UTC [msp.identity] Verify -> DEBU 373 Verify: sig = 00000000 30 45 02 21 00 a8 27 f3 65 15 b2 cb df 7e d5 75 |0E.!..'.e....~.u| +peer0.org1.example.com | 00000010 71 e2 08 e4 0e bf 44 0d 55 d0 f2 00 9c cf 8f 5a |q.....D.U......Z| +peer0.org1.example.com | 00000020 47 99 d4 d1 c2 02 20 70 32 82 f8 f2 64 87 4d ce |G..... p2...d.M.| +peer0.org1.example.com | 00000030 43 d6 45 64 a5 8b 46 fd 91 a5 cb 4d f7 0d c2 c9 |C.Ed..F....M....| +peer0.org1.example.com | 00000040 ce e6 d3 0d a1 ea 3b |......;|" +peer0.org1.example.com | "2019-04-22 06:16:41.608 UTC [protoutils] checkSignatureFromCreator -> DEBU 374 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:41.608 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 375 validateChaincodeProposalMessage starts for proposal 0xc0029add50, header 0xc002f3e050" +peer0.org1.example.com | "2019-04-22 06:16:41.609 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 376 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:41.609 UTC [endorser] preProcess -> DEBU 377 [][f20bbfb5] processing txid: f20bbfb5cf9c96a3739fdf9727989735b1bfd6021bb0bcbeb74025218f16baab" +peer0.org1.example.com | "2019-04-22 06:16:41.609 UTC [endorser] SimulateProposal -> DEBU 378 [][f20bbfb5] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:41.610 UTC [endorser] callChaincode -> INFO 379 [][f20bbfb5] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:41.611 UTC [chaincode] Execute -> DEBU 37a Entry" +peer0.org1.example.com | "2019-04-22 06:16:41.611 UTC [cscc] Invoke -> DEBU 37b Invoke function: GetChannels" +peer0.org1.example.com | "2019-04-22 06:16:41.612 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37c Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:41.612 UTC [msp] Validate -> DEBU 37d MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:41.613 UTC [msp.identity] Verify -> DEBU 37e Verify: digest = 00000000 f9 2c e9 be d5 b9 51 1e 30 71 74 66 89 f4 43 20 |.,....Q.0qtf..C | +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:38.669 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64b Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-04-22 06:16:38.669 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64c Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-04-22 06:16:38.669 UTC [orderer.common.cluster] func1 -> DEBU 64d Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +orderer0.example.com | wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +orderer0.example.com | H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-04-22 06:16:38.669 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-04-22 06:16:38.670 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64f Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-04-22 06:16:38.670 UTC [orderer.common.cluster] func1 -> DEBU 650 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +orderer0.example.com | fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +orderer0.example.com | YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-04-22 06:16:38.670 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 651 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-04-22 06:16:38.670 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 652 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-04-22 06:16:38.671 UTC [orderer.common.cluster] Configure -> INFO 653 Exiting" +orderer0.example.com | "2019-04-22 06:16:38.671 UTC [orderer.consensus.etcdraft] start -> DEBU 654 Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.671 UTC [orderer.consensus.etcdraft] start -> INFO 655 Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.672 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 656 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.672 UTC [orderer.consensus.etcdraft] newRaft -> INFO 657 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.672 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 658 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.673 UTC [orderer.consensus.etcdraft] run -> INFO 659 This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.674 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 65a [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2019-04-22 06:16:38.674 UTC [msp.identity] Sign -> DEBU 65b Sign: plaintext: 0A00120B0A090A03010203100418050A...A90EC401B38C45839F581B9740AF1F09 " +orderer0.example.com | "2019-04-22 06:16:38.675 UTC [msp.identity] Sign -> DEBU 65c Sign: digest: 67C72C0F7EA7DB7DDD5F80482256A26CA859D71A624646CCF518DC1B26005830 " +orderer0.example.com | "2019-04-22 06:16:38.678 UTC [orderer.consensus.etcdraft] apply -> INFO 65d Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.679 UTC [orderer.consensus.etcdraft] apply -> INFO 65e Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.679 UTC [orderer.consensus.etcdraft] apply -> INFO 65f Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:38.680 UTC [fsblkstorage] indexBlock -> DEBU 660 Indexing block [blockNum=1, blockHash=[]byte{0x41, 0x47, 0x51, 0xca, 0x5b, 0xad, 0xe7, 0x33, 0x3a, 0xb, 0xc9, 0xfd, 0x91, 0x3, 0x18, 0x36, 0x7f, 0x31, 0x21, 0x4b, 0x89, 0x8c, 0x23, 0xc9, 0xb2, 0xcb, 0x2a, 0xcd, 0xd0, 0xa0, 0x74, 0xb2} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=24826 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:38.683 UTC [fsblkstorage] updateCheckpoint -> DEBU 661 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44243], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-04-22 06:16:38.683 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 662 [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2019-04-22 06:16:38.783 UTC [common.deliver] deliverBlocks -> WARN 663 [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34484 because of consenter error" +orderer0.example.com | "2019-04-22 06:16:38.784 UTC [orderer.common.server] func1 -> DEBU 664 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:38.784 UTC [comm.grpc.server] 1 -> INFO 665 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34484 grpc.code=OK grpc.call_duration=196.1123ms +orderer0.example.com | "2019-04-22 06:16:38.799 UTC [orderer.common.server] Deliver -> DEBU 666 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:38.799 UTC [common.deliver] Handle -> DEBU 667 Starting new deliver loop for 192.168.224.9:34486" +orderer0.example.com | "2019-04-22 06:16:38.799 UTC [common.deliver] Handle -> DEBU 668 Attempting to read seek info message from 192.168.224.9:34486" +orderer0.example.com | "2019-04-22 06:16:38.831 UTC [orderer.common.cluster.step] handleMessage -> DEBU 669 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000010 27 e5 f5 16 91 fb 07 62 e8 d0 73 d7 37 84 36 86 |'......b..s.7.6.|" +peer0.org1.example.com | "2019-04-22 06:16:41.613 UTC [msp.identity] Verify -> DEBU 37f Verify: sig = 00000000 30 45 02 21 00 a8 27 f3 65 15 b2 cb df 7e d5 75 |0E.!..'.e....~.u| +peer0.org1.example.com | 00000010 71 e2 08 e4 0e bf 44 0d 55 d0 f2 00 9c cf 8f 5a |q.....D.U......Z| +peer0.org1.example.com | 00000020 47 99 d4 d1 c2 02 20 70 32 82 f8 f2 64 87 4d ce |G..... p2...d.M.| +peer0.org1.example.com | 00000030 43 d6 45 64 a5 8b 46 fd 91 a5 cb 4d f7 0d c2 c9 |C.Ed..F....M....| +peer0.org1.example.com | 00000040 ce e6 d3 0d a1 ea 3b |......;|" +peer0.org1.example.com | "2019-04-22 06:16:41.614 UTC [chaincode] handleMessage -> DEBU 380 [f20bbfb5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:41.614 UTC [chaincode] Notify -> DEBU 381 [f20bbfb5] notifying Txid:f20bbfb5cf9c96a3739fdf9727989735b1bfd6021bb0bcbeb74025218f16baab, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:41.614 UTC [chaincode] Execute -> DEBU 382 Exit" +peer0.org1.example.com | "2019-04-22 06:16:41.615 UTC [endorser] callChaincode -> INFO 383 [][f20bbfb5] Exit chaincode: name:"cscc" (4ms)" +peer0.org1.example.com | "2019-04-22 06:16:41.615 UTC [endorser] SimulateProposal -> DEBU 384 [][f20bbfb5] Exit" +peer0.org1.example.com | "2019-04-22 06:16:41.615 UTC [endorser] func1 -> DEBU 385 Exit: request from 192.168.224.9:49148" +peer0.org1.example.com | "2019-04-22 06:16:41.615 UTC [comm.grpc.server] 1 -> INFO 386 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49148 grpc.code=OK grpc.call_duration=10.6011ms +peer0.org1.example.com | "2019-04-22 06:16:41.619 UTC [grpc] infof -> DEBU 387 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:42.473 UTC [endorser] ProcessProposal -> DEBU 388 Entering: request from 192.168.224.9:49156" +peer0.org1.example.com | "2019-04-22 06:16:42.474 UTC [protoutils] ValidateProposalMessage -> DEBU 389 ValidateProposalMessage starts for signed proposal 0xc0024cb180" +peer0.org1.example.com | "2019-04-22 06:16:42.474 UTC [protoutils] validateChannelHeader -> DEBU 38a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:42.474 UTC [protoutils] checkSignatureFromCreator -> DEBU 38b begin" +peer0.org1.example.com | "2019-04-22 06:16:42.475 UTC [protoutils] checkSignatureFromCreator -> DEBU 38c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:42.475 UTC [protoutils] checkSignatureFromCreator -> DEBU 38d creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:42.475 UTC [msp.identity] Verify -> DEBU 38e Verify: digest = 00000000 45 3e 83 84 03 cd 0e e0 1f 04 54 f3 3c 24 14 66 |E>........T.<$.f| +peer0.org1.example.com | 00000010 40 3e d7 71 02 32 10 01 b0 fb 56 1c f5 4a ec 6a |@>.q.2....V..J.j|" +peer0.org1.example.com | "2019-04-22 06:16:42.476 UTC [msp.identity] Verify -> DEBU 38f Verify: sig = 00000000 30 44 02 20 44 2b ae 8c cf f2 31 7f c5 de 6d 50 |0D. D+....1...mP| +peer0.org1.example.com | 00000010 8b 18 cb 36 b6 dd e6 37 0a ee 33 11 8e a4 65 20 |...6...7..3...e | +peer0.org1.example.com | 00000020 d1 26 5c 2b 02 20 33 c9 86 04 c9 4d 28 31 e9 94 |.&\+. 3....M(1..| +peer0.org1.example.com | 00000030 2a fa 57 a6 0e a8 81 2b 1d b3 1a 51 a3 b9 7b f1 |*.W....+...Q..{.| +peer0.org1.example.com | 00000040 83 12 e0 34 74 96 |...4t.|" +peer0.org1.example.com | "2019-04-22 06:16:42.476 UTC [protoutils] checkSignatureFromCreator -> DEBU 390 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:42.477 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 391 validateChaincodeProposalMessage starts for proposal 0xc0024416c0, header 0xc0024cb590" +peer0.org1.example.com | "2019-04-22 06:16:42.477 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 392 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:16:42.478 UTC [endorser] preProcess -> DEBU 393 [][650b8298] processing txid: 650b8298ebb38e79aa442a08a8a93df5b404824c0de582684db6de14258be890" +peer0.org1.example.com | "2019-04-22 06:16:42.478 UTC [endorser] SimulateProposal -> DEBU 394 [][650b8298] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:16:42.479 UTC [endorser] callChaincode -> INFO 395 [][650b8298] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:16:42.479 UTC [chaincode] Execute -> DEBU 396 Entry" +peer0.org1.example.com | "2019-04-22 06:16:42.480 UTC [qscc] Invoke -> DEBU 397 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:42.480 UTC [aclmgmt] CheckACL -> DEBU 398 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-04-22 06:16:42.481 UTC [aclmgmt] CheckACL -> DEBU 399 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:16:42.481 UTC [policies] Evaluate -> DEBU 39a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:42.481 UTC [policies] Evaluate -> DEBU 39b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:42.482 UTC [policies] Evaluate -> DEBU 39c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:42.482 UTC [msp] DeserializeIdentity -> DEBU 39d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:42.483 UTC [msp.identity] newIdentity -> DEBU 39e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:42.483 UTC [cauthdsl] func1 -> DEBU 39f 0xc002f83610 gate 1555913802483778600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:42.484 UTC [cauthdsl] func2 -> DEBU 3a0 0xc002f83610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:42.484 UTC [cauthdsl] func2 -> DEBU 3a1 0xc002f83610 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:42.484 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3a2 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:38.832 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66a Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +orderer0.example.com | "2019-04-22 06:16:38.833 UTC [orderer.common.cluster.step] sendMessage -> DEBU 66b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 431.2µs " +orderer0.example.com | "2019-04-22 06:16:39.003 UTC [common.deliver] deliverBlocks -> WARN 66c [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34486 because of consenter error" +orderer0.example.com | "2019-04-22 06:16:39.004 UTC [orderer.common.server] func1 -> DEBU 66d Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:39.004 UTC [comm.grpc.server] 1 -> INFO 66e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34486 grpc.code=OK grpc.call_duration=204.7664ms +orderer0.example.com | "2019-04-22 06:16:39.018 UTC [orderer.common.server] Deliver -> DEBU 66f Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:39.019 UTC [common.deliver] Handle -> DEBU 670 Starting new deliver loop for 192.168.224.9:34488" +orderer0.example.com | "2019-04-22 06:16:39.019 UTC [common.deliver] Handle -> DEBU 671 Attempting to read seek info message from 192.168.224.9:34488" +orderer0.example.com | "2019-04-22 06:16:39.221 UTC [common.deliver] deliverBlocks -> WARN 672 [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34488 because of consenter error" +orderer0.example.com | "2019-04-22 06:16:39.222 UTC [orderer.common.server] func1 -> DEBU 673 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:39.222 UTC [comm.grpc.server] 1 -> INFO 674 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34488 grpc.code=OK grpc.call_duration=204.0475ms +orderer0.example.com | "2019-04-22 06:16:39.235 UTC [orderer.common.server] Deliver -> DEBU 675 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:39.235 UTC [common.deliver] Handle -> DEBU 676 Starting new deliver loop for 192.168.224.9:34490" +orderer0.example.com | "2019-04-22 06:16:39.236 UTC [common.deliver] Handle -> DEBU 677 Attempting to read seek info message from 192.168.224.9:34490" +orderer0.example.com | "2019-04-22 06:16:39.332 UTC [orderer.common.cluster.step] handleMessage -> DEBU 678 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.333 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 679 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +orderer0.example.com | "2019-04-22 06:16:39.333 UTC [orderer.common.cluster.step] sendMessage -> DEBU 67a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " +orderer0.example.com | "2019-04-22 06:16:39.439 UTC [common.deliver] deliverBlocks -> WARN 67b [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34490 because of consenter error" +orderer0.example.com | "2019-04-22 06:16:39.440 UTC [orderer.common.server] func1 -> DEBU 67c Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:39.440 UTC [comm.grpc.server] 1 -> INFO 67d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34490 grpc.code=OK grpc.call_duration=205.6087ms +orderer0.example.com | "2019-04-22 06:16:39.453 UTC [orderer.common.server] Deliver -> DEBU 67e Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:39.453 UTC [common.deliver] Handle -> DEBU 67f Starting new deliver loop for 192.168.224.9:34492" +orderer0.example.com | "2019-04-22 06:16:39.453 UTC [common.deliver] Handle -> DEBU 680 Attempting to read seek info message from 192.168.224.9:34492" +orderer0.example.com | "2019-04-22 06:16:39.654 UTC [common.deliver] deliverBlocks -> WARN 681 [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34492 because of consenter error" +orderer0.example.com | "2019-04-22 06:16:39.655 UTC [orderer.common.server] func1 -> DEBU 682 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:39.655 UTC [comm.grpc.server] 1 -> INFO 683 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34492 grpc.code=OK grpc.call_duration=202.3277ms +orderer0.example.com | "2019-04-22 06:16:39.673 UTC [orderer.consensus.etcdraft] Step -> INFO 684 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.673 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 685 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.674 UTC [orderer.consensus.etcdraft] poll -> INFO 686 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.674 UTC [orderer.consensus.etcdraft] campaign -> INFO 687 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.675 UTC [orderer.consensus.etcdraft] campaign -> INFO 688 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.675 UTC [orderer.common.cluster] NewStream -> DEBU 689 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-04-22 06:16:39.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68a Sending msg of 28 bytes to 2 on channel businesschannel took 621.3µs" +orderer0.example.com | "2019-04-22 06:16:39.676 UTC [orderer.common.cluster] NewStream -> DEBU 68b Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-04-22 06:16:39.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.1µs " +orderer0.example.com | "2019-04-22 06:16:39.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68d Sending msg of 28 bytes to 3 on channel businesschannel took 763.6µs" +peer0.org1.example.com | "2019-04-22 06:16:42.485 UTC [msp] Validate -> DEBU 3a3 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:42.485 UTC [msp] getCertificationChain -> DEBU 3a4 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:42.485 UTC [cauthdsl] func2 -> DEBU 3a5 0xc002f83610 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:42.486 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 45 3e 83 84 03 cd 0e e0 1f 04 54 f3 3c 24 14 66 |E>........T.<$.f| +peer0.org1.example.com | 00000010 40 3e d7 71 02 32 10 01 b0 fb 56 1c f5 4a ec 6a |@>.q.2....V..J.j|" +peer0.org1.example.com | "2019-04-22 06:16:42.486 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 44 02 20 44 2b ae 8c cf f2 31 7f c5 de 6d 50 |0D. D+....1...mP| +peer0.org1.example.com | 00000010 8b 18 cb 36 b6 dd e6 37 0a ee 33 11 8e a4 65 20 |...6...7..3...e | +peer0.org1.example.com | 00000020 d1 26 5c 2b 02 20 33 c9 86 04 c9 4d 28 31 e9 94 |.&\+. 3....M(1..| +peer0.org1.example.com | 00000030 2a fa 57 a6 0e a8 81 2b 1d b3 1a 51 a3 b9 7b f1 |*.W....+...Q..{.| +peer0.org1.example.com | 00000040 83 12 e0 34 74 96 |...4t.|" +orderer0.example.com | "2019-04-22 06:16:39.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " +orderer0.example.com | "2019-04-22 06:16:39.680 UTC [orderer.common.cluster] Step -> DEBU 68f Connection from orderer2.example.com(192.168.224.2:57130)" +orderer0.example.com | "2019-04-22 06:16:39.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 691 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.681 UTC [orderer.consensus.etcdraft] poll -> INFO 692 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.680 UTC [orderer.common.cluster] Step -> DEBU 690 Connection from orderer1.example.com(192.168.224.3:45624)" +orderer0.example.com | "2019-04-22 06:16:39.682 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 693 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.682 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 694 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.682 UTC [orderer.consensus.etcdraft] poll -> INFO 695 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.683 UTC [orderer.consensus.etcdraft] campaign -> INFO 696 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.683 UTC [orderer.consensus.etcdraft] campaign -> INFO 697 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.683 UTC [orderer.common.cluster.step] handleMessage -> DEBU 698 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.685 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 699 Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +orderer0.example.com | "2019-04-22 06:16:39.685 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69a Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-04-22 06:16:39.686 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.2µs " +orderer0.example.com | "2019-04-22 06:16:39.686 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.6µs " +orderer0.example.com | "2019-04-22 06:16:39.686 UTC [orderer.common.server] Deliver -> DEBU 69d Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:39.687 UTC [common.deliver] Handle -> DEBU 69e Starting new deliver loop for 192.168.224.9:34494" +orderer0.example.com | "2019-04-22 06:16:39.688 UTC [common.deliver] Handle -> DEBU 69f Attempting to read seek info message from 192.168.224.9:34494" +orderer0.example.com | "2019-04-22 06:16:39.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a0 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.692 UTC [orderer.consensus.etcdraft] poll -> INFO 6a2 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.692 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6a3 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.693 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6a4 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.693 UTC [orderer.consensus.etcdraft] run -> INFO 6a5 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.695 UTC [orderer.consensus.etcdraft] run -> INFO 6a6 Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.695 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6a7 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.696 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6a8 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.696 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a9 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 194µs " +orderer0.example.com | "2019-04-22 06:16:39.695 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6aa Sending msg of 36 bytes to 2 on channel businesschannel took 28.8µs" +orderer0.example.com | "2019-04-22 06:16:39.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ab Sending msg of 36 bytes to 3 on channel businesschannel took 154.7µs" +orderer0.example.com | "2019-04-22 06:16:39.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ac Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 343.4µs " +orderer0.example.com | "2019-04-22 06:16:39.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ad Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.702 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ae Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-04-22 06:16:39.702 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 452.6µs " +orderer0.example.com | "2019-04-22 06:16:39.702 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6b0 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:39.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.704 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b2 Sending msg of 28 bytes to 3 on channel businesschannel took 273.9µs" +orderer0.example.com | "2019-04-22 06:16:39.704 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b3 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.705 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202.9µs " +orderer0.example.com | "2019-04-22 06:16:39.706 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:39.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b7 Sending msg of 28 bytes to 3 on channel testchainid took 51.3µs" +peer0.org1.example.com | "2019-04-22 06:16:42.486 UTC [cauthdsl] func2 -> DEBU 3a8 0xc002f83610 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [cauthdsl] func1 -> DEBU 3a9 0xc002f83610 gate 1555913802483778600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3aa Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3ac Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [chaincode] handleMessage -> DEBU 3ae [650b8298] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [chaincode] Notify -> DEBU 3af [650b8298] notifying Txid:650b8298ebb38e79aa442a08a8a93df5b404824c0de582684db6de14258be890, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [chaincode] Execute -> DEBU 3b0 Exit" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [endorser] callChaincode -> INFO 3b1 [][650b8298] Exit chaincode: name:"qscc" (8ms)" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [endorser] SimulateProposal -> DEBU 3b2 [][650b8298] Exit" +peer0.org1.example.com | "2019-04-22 06:16:42.487 UTC [endorser] func1 -> DEBU 3b3 Exit: request from 192.168.224.9:49156" +peer0.org1.example.com | "2019-04-22 06:16:42.488 UTC [comm.grpc.server] 1 -> INFO 3b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49156 grpc.code=OK grpc.call_duration=14.695ms +peer0.org1.example.com | "2019-04-22 06:16:42.492 UTC [grpc] infof -> DEBU 3b5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151009 " +peer0.org1.example.com | "2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b7 Sign: digest: F6B0B01C9FCB2EBC3F3444282F0FEF04DF2DA7BDF45AB7E29C4AF132B69F0264 " +peer0.org1.example.com | "2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:42.909 UTC [gossip.pull] Hello -> DEBU 3ba Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:42.910 UTC [gossip.comm] Send -> DEBU 3bc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:42.909 UTC [gossip.comm] Send -> DEBU 3bb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:42.911 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.911 UTC [gossip.comm] sendToEndpoint -> DEBU 3be Exiting" +peer0.org1.example.com | "2019-04-22 06:16:42.910 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.911 UTC [gossip.comm] sendToEndpoint -> DEBU 3c0 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:42.913 UTC [gossip.gossip] handleMessage -> DEBU 3c1 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10001977445049725770 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.913 UTC [gossip.pull] HandleMessage -> DEBU 3c2 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10001977445049725770 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.914 UTC [gossip.gossip] handleMessage -> DEBU 3c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:42.914 UTC [gossip.gossip] handleMessage -> DEBU 3c4 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.915 UTC [gossip.gossip] handleMessage -> DEBU 3c5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:42.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:42.916 UTC [msp.identity] Verify -> DEBU 3c8 Verify: digest = 00000000 f6 b0 b0 1c 9f cb 2e bc 3f 34 44 28 2f 0f ef 04 |........?4D(/...| +peer0.org1.example.com | 00000010 df 2d a7 bd f4 5a b7 e2 9c 4a f1 32 b6 9f 02 64 |.-...Z...J.2...d|" +peer0.org1.example.com | "2019-04-22 06:16:42.917 UTC [msp.identity] Verify -> DEBU 3c9 Verify: sig = 00000000 30 44 02 20 44 8e 4e ff b8 e6 7f c6 2d 3b 6c 54 |0D. D.N.....-;lT| +peer0.org1.example.com | 00000010 0d e5 ce d0 b1 3a 97 2e 10 77 2a 23 77 c2 7a 68 |.....:...w*#w.zh| +peer0.org1.example.com | 00000020 1a 01 ec f7 02 20 22 27 6a 19 51 13 79 c8 5f f3 |..... "'j.Q.y._.| +peer0.org1.example.com | 00000030 26 8e b5 b3 8f da 74 9c d6 a4 83 52 f6 12 a4 50 |&.....t....R...P| +peer0.org1.example.com | 00000040 bb d3 23 f6 7b 4e |..#.{N|" +peer0.org1.example.com | "2019-04-22 06:16:42.918 UTC [msp.identity] Verify -> DEBU 3ca Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:16:42.918 UTC [msp.identity] Verify -> DEBU 3cb Verify: sig = 00000000 30 45 02 21 00 d3 08 8e 5d 23 66 e0 8d c3 81 6f |0E.!....]#f....o| +peer0.org1.example.com | 00000010 74 56 94 38 ec 8f c1 00 82 84 a2 a6 61 b5 a1 35 |tV.8........a..5| +peer0.org1.example.com | 00000020 92 b5 83 b4 a7 02 20 70 dd 5f ad fb 9b 9a 55 99 |...... p._....U.| +peer0.org1.example.com | 00000030 f3 b9 16 61 81 47 95 37 a5 f8 33 99 fd 2d 0b 74 |...a.G.7..3..-.t| +peer0.org1.example.com | 00000040 a2 67 9d 71 24 70 c1 |.g.q$p.|" +orderer0.example.com | "2019-04-22 06:16:39.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.3µs " +orderer0.example.com | "2019-04-22 06:16:39.887 UTC [policies] Evaluate -> DEBU 6b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:16:39.887 UTC [policies] Evaluate -> DEBU 6ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:39.888 UTC [policies] Evaluate -> DEBU 6bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:16:39.888 UTC [policies] Evaluate -> DEBU 6bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:39.889 UTC [policies] Evaluate -> DEBU 6bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:16:39.889 UTC [msp] DeserializeIdentity -> DEBU 6be Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:39.889 UTC [msp.identity] newIdentity -> DEBU 6bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:39.890 UTC [cauthdsl] func1 -> DEBU 6c0 0xc000ec8600 gate 1555913799890029900 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:39.890 UTC [cauthdsl] func2 -> DEBU 6c1 0xc000ec8600 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:39.890 UTC [cauthdsl] func2 -> DEBU 6c2 0xc000ec8600 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:39.890 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6c3 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:39.890 UTC [msp] Validate -> DEBU 6c4 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:39.891 UTC [msp] getCertificationChain -> DEBU 6c5 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:39.892 UTC [cauthdsl] func2 -> DEBU 6c6 0xc000ec8600 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:39.892 UTC [msp.identity] Verify -> DEBU 6c7 Verify: digest = 00000000 2e 89 e4 7a d0 f9 5d 16 c6 21 d0 50 47 cf 6b dc |...z..]..!.PG.k.| +orderer0.example.com | 00000010 94 8b 85 75 d6 e0 bb 50 7c c3 47 2c 8f f9 37 13 |...u...P|.G,..7.|" +orderer0.example.com | "2019-04-22 06:16:39.892 UTC [msp.identity] Verify -> DEBU 6c8 Verify: sig = 00000000 30 44 02 20 36 19 23 fd 0b 98 23 58 d9 79 7b 27 |0D. 6.#...#X.y{'| +orderer0.example.com | 00000010 9e 44 d4 e6 61 9a 8d d1 fc bd e2 0f e5 27 29 52 |.D..a........')R| +orderer0.example.com | 00000020 a5 96 df 09 02 20 13 66 04 76 13 55 da ff c1 f0 |..... .f.v.U....| +orderer0.example.com | 00000030 ab e4 90 0f be d3 e3 ea a6 31 92 2e c1 b7 47 49 |.........1....GI| +orderer0.example.com | 00000040 07 5c 10 c5 fe bc |.\....|" +orderer0.example.com | "2019-04-22 06:16:39.893 UTC [cauthdsl] func2 -> DEBU 6c9 0xc000ec8600 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:39.893 UTC [cauthdsl] func1 -> DEBU 6ca 0xc000ec8600 gate 1555913799890029900 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:39.893 UTC [policies] Evaluate -> DEBU 6cb Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6cd Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6cf Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:39.895 UTC [common.deliver] deliverBlocks -> DEBU 6d1 [channel: businesschannel] Received seekInfo (0xc000dd7f40) start: > stop: > from 192.168.224.9:34494" +orderer0.example.com | "2019-04-22 06:16:39.895 UTC [fsblkstorage] Next -> DEBU 6d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-04-22 06:16:39.895 UTC [fsblkstorage] newBlockfileStream -> DEBU 6d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:16:39.896 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6d4 Remaining bytes=[23940], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:39.896 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6d5 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:16:39.896 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6d6 blockbytes [23937] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:39.896 UTC [common.deliver] deliverBlocks -> DEBU 6d7 [channel: businesschannel] Delivering block [0] for (0xc000dd7f40) for 192.168.224.9:34494" +orderer0.example.com | "2019-04-22 06:16:39.897 UTC [common.deliver] deliverBlocks -> DEBU 6d8 [channel: businesschannel] Done delivering to 192.168.224.9:34494 for (0xc000dd7f40)" +orderer0.example.com | "2019-04-22 06:16:39.897 UTC [common.deliver] Handle -> DEBU 6d9 Waiting for new SeekInfo from 192.168.224.9:34494" +orderer0.example.com | "2019-04-22 06:16:39.897 UTC [common.deliver] Handle -> DEBU 6da Attempting to read seek info message from 192.168.224.9:34494" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [grpc] warningf -> DEBU 6db transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.4:7050->192.168.224.9:34494: read: connection reset by peer" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [common.deliver] Handle -> WARN 6de Error reading from 192.168.224.9:34494: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6e0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [orderer.common.server] func1 -> DEBU 6e1 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6e3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:39.902 UTC [grpc] infof -> DEBU 6e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:39.902 UTC [grpc] infof -> DEBU 6e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:42.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.919 UTC [gossip.discovery] isSentByMe -> DEBU 3cd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:42.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ce Exiting" +peer0.org1.example.com | "2019-04-22 06:16:42.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cf Exiting" +peer0.org1.example.com | "2019-04-22 06:16:43.179 UTC [gossip.gossip] handleMessage -> DEBU 3d0 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:43.179 UTC [gossip.pull] HandleMessage -> DEBU 3d1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:43.179 UTC [gossip.pull] SendDigest -> DEBU 3d2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:43.179 UTC [gossip.gossip] handleMessage -> DEBU 3d3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:43.185 UTC [gossip.gossip] handleMessage -> DEBU 3d4 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:43.185 UTC [gossip.gossip] handleMessage -> DEBU 3d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:43.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:43.185 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:43.186 UTC [msp.identity] Verify -> DEBU 3d8 Verify: digest = 00000000 e4 b2 1a 11 35 93 ee 1b 40 c5 71 12 d3 75 35 49 |....5...@.q..u5I| +peer0.org1.example.com | 00000010 10 fd 6d 9f 98 90 14 34 c7 2f 60 15 57 30 e2 8f |..m....4./`.W0..|" +peer0.org1.example.com | "2019-04-22 06:16:43.186 UTC [msp.identity] Verify -> DEBU 3d9 Verify: sig = 00000000 30 44 02 20 7c d9 03 c7 0b 95 ff b4 8c 28 3f ac |0D. |........(?.| +peer0.org1.example.com | 00000010 48 f8 53 6a ea 3e 40 d3 60 31 cc a8 4d e0 94 7e |H.Sj.>@.`1..M..~| +peer0.org1.example.com | 00000020 6f 31 fa 82 02 20 3f 8c 08 d7 32 2c 9d 49 d7 36 |o1... ?...2,.I.6| +peer0.org1.example.com | 00000030 ee 8f d5 df 26 9b 4b 86 28 0a 57 73 8f 52 e4 bb |....&.K.(.Ws.R..| +peer0.org1.example.com | 00000040 6e 22 b5 6f 6b ed |n".ok.|" +peer0.org1.example.com | "2019-04-22 06:16:43.187 UTC [msp.identity] Verify -> DEBU 3da Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:43.187 UTC [msp.identity] Verify -> DEBU 3db Verify: sig = 00000000 30 44 02 20 0b 0b d4 27 4d 73 2e de 93 5e e7 d0 |0D. ...'Ms...^..| +peer0.org1.example.com | 00000010 d6 76 80 5d f5 d9 af 49 af 57 8b d5 1c 58 fe b5 |.v.]...I.W...X..| +peer0.org1.example.com | 00000020 3c b8 ef 44 02 20 35 8f b6 a4 16 2c ce 73 6c e4 |<..D. 5....,.sl.| +peer0.org1.example.com | 00000030 f7 81 a7 d6 fb 4a 7b cc fe 39 ec fb eb 58 fc d3 |.....J{..9...X..| +peer0.org1.example.com | 00000040 f1 ac 5f 13 11 a3 |.._...|" +peer0.org1.example.com | "2019-04-22 06:16:43.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3de updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 " +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 " +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e2 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:43.188 UTC [gossip.discovery] sendMemResponse -> DEBU 3e4 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:43.189 UTC [gossip.comm] Send -> DEBU 3e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:43.189 UTC [gossip.discovery] sendMemResponse -> DEBU 3e6 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +orderer0.example.com | "2019-04-22 06:16:39.902 UTC [comm.grpc.server] 1 -> INFO 6e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34494 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=216.5729ms +orderer0.example.com | "2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6df transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:40.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e7 Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" +orderer0.example.com | "2019-04-22 06:16:40.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e8 Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +orderer0.example.com | "2019-04-22 06:16:40.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101µs " +orderer0.example.com | "2019-04-22 06:16:40.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.2µs " +orderer0.example.com | "2019-04-22 06:16:40.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6eb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:40.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:40.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ed Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:40.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ee Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +orderer0.example.com | "2019-04-22 06:16:40.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +orderer0.example.com | "2019-04-22 06:16:40.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" +orderer0.example.com | "2019-04-22 06:16:40.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-04-22 06:16:40.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.3µs " +orderer0.example.com | "2019-04-22 06:16:40.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.7µs " +orderer0.example.com | "2019-04-22 06:16:40.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:40.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:40.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:40.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f7 Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +orderer0.example.com | "2019-04-22 06:16:40.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 547.6µs " +orderer0.example.com | "2019-04-22 06:16:41.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f9 Sending msg of 28 bytes to 2 on channel businesschannel took 44µs" +orderer0.example.com | "2019-04-22 06:16:41.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.5µs " +orderer0.example.com | "2019-04-22 06:16:41.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.1µs " +orderer0.example.com | "2019-04-22 06:16:41.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fc Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +orderer0.example.com | "2019-04-22 06:16:41.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fd Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:41.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:41.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ff Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:41.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 700 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2019-04-22 06:16:41.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 701 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +orderer0.example.com | "2019-04-22 06:16:41.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 702 Sending msg of 28 bytes to 2 on channel businesschannel took 46µs" +orderer0.example.com | "2019-04-22 06:16:41.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 703 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 277.1µs " +orderer0.example.com | "2019-04-22 06:16:41.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 704 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +orderer0.example.com | "2019-04-22 06:16:41.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 705 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.6µs " +orderer0.example.com | "2019-04-22 06:16:41.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 706 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:41.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 707 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:41.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 708 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:41.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 709 Sending msg of 28 bytes to 3 on channel testchainid took 32.8µs" +peer0.org1.example.com | "2019-04-22 06:16:43.189 UTC [gossip.comm] sendToEndpoint -> DEBU 3e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:43.189 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:44.456 UTC [gossip.comm] Send -> DEBU 3e9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:44.456 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:44.457 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb Exiting" +peer0.org1.example.com | "2019-04-22 06:16:44.458 UTC [gossip.gossip] handleMessage -> DEBU 3ec Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:44.459 UTC [msp.identity] Verify -> DEBU 3ed Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +peer0.org1.example.com | 00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +peer0.org1.example.com | "2019-04-22 06:16:44.459 UTC [msp.identity] Verify -> DEBU 3ee Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +peer0.org1.example.com | 00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +peer0.org1.example.com | 00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +peer0.org1.example.com | 00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +peer0.org1.example.com | 00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +peer0.org1.example.com | "2019-04-22 06:16:44.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:44.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:44.461 UTC [policies] Evaluate -> DEBU 3f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:44.461 UTC [policies] Evaluate -> DEBU 3f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:44.461 UTC [policies] Evaluate -> DEBU 3f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:44.461 UTC [msp] DeserializeIdentity -> DEBU 3f4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:44.462 UTC [msp.identity] newIdentity -> DEBU 3f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:44.463 UTC [cauthdsl] func1 -> DEBU 3f6 0xc002ff0fd0 gate 1555913804463336700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:44.463 UTC [cauthdsl] func2 -> DEBU 3f7 0xc002ff0fd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:44.463 UTC [cauthdsl] func2 -> DEBU 3f8 0xc002ff0fd0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:44.464 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f9 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:44.464 UTC [msp] Validate -> DEBU 3fa MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:44.465 UTC [msp] getCertificationChain -> DEBU 3fb MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:44.466 UTC [cauthdsl] func2 -> DEBU 3fc 0xc002ff0fd0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:44.466 UTC [msp.identity] Verify -> DEBU 3fd Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +peer0.org1.example.com | 00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +peer0.org1.example.com | "2019-04-22 06:16:44.466 UTC [msp.identity] Verify -> DEBU 3fe Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +peer0.org1.example.com | 00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +peer0.org1.example.com | 00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +peer0.org1.example.com | 00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +peer0.org1.example.com | 00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +peer0.org1.example.com | "2019-04-22 06:16:44.467 UTC [cauthdsl] func2 -> DEBU 3ff 0xc002ff0fd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:44.467 UTC [cauthdsl] func1 -> DEBU 400 0xc002ff0fd0 gate 1555913804463336700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:44.467 UTC [policies] Evaluate -> DEBU 401 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:44.467 UTC [policies] Evaluate -> DEBU 402 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:44.468 UTC [policies] Evaluate -> DEBU 403 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:44.468 UTC [policies] Evaluate -> DEBU 404 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:44.469 UTC [gossip.gossip] handleMessage -> DEBU 405 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:44.469 UTC [gossip.comm] Send -> DEBU 406 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913800507418700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:44.470 UTC [gossip.comm] sendToEndpoint -> DEBU 407 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913800507418700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:44.470 UTC [gossip.comm] sendToEndpoint -> DEBU 408 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:44.714 UTC [gossip.gossip] handleMessage -> DEBU 409 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:44.715 UTC [gossip.gossip] handleMessage -> DEBU 40a Exiting" +orderer0.example.com | "2019-04-22 06:16:41.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.1µs " +orderer0.example.com | "2019-04-22 06:16:42.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70b Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +orderer0.example.com | "2019-04-22 06:16:42.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70c Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-04-22 06:16:42.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.7µs " +orderer0.example.com | "2019-04-22 06:16:42.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.5µs " +orderer0.example.com | "2019-04-22 06:16:42.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:42.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 710 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:42.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 711 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:42.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 712 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +orderer0.example.com | "2019-04-22 06:16:42.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 713 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +orderer0.example.com | "2019-04-22 06:16:42.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 714 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +orderer0.example.com | "2019-04-22 06:16:42.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 715 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +orderer0.example.com | "2019-04-22 06:16:42.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 716 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.4µs " +orderer0.example.com | "2019-04-22 06:16:42.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 717 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.4µs " +orderer0.example.com | "2019-04-22 06:16:42.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 718 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:42.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 719 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:42.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:42.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71b Sending msg of 28 bytes to 3 on channel testchainid took 52.9µs" +orderer0.example.com | "2019-04-22 06:16:42.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.7µs " +orderer0.example.com | "2019-04-22 06:16:43.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71d Sending msg of 28 bytes to 2 on channel businesschannel took 1.2315ms" +orderer0.example.com | "2019-04-22 06:16:43.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" +orderer0.example.com | "2019-04-22 06:16:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 802.2µs " +orderer0.example.com | "2019-04-22 06:16:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 415.1µs " +orderer0.example.com | "2019-04-22 06:16:43.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 721 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" +orderer0.example.com | "2019-04-22 06:16:43.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 695.7µs " +orderer0.example.com | "2019-04-22 06:16:43.540 UTC [orderer.common.server] Deliver -> DEBU 726 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:43.541 UTC [common.deliver] Handle -> DEBU 727 Starting new deliver loop for 192.168.224.9:34520" +orderer0.example.com | "2019-04-22 06:16:43.541 UTC [common.deliver] Handle -> DEBU 728 Attempting to read seek info message from 192.168.224.9:34520" +orderer0.example.com | "2019-04-22 06:16:43.556 UTC [orderer.common.server] Broadcast -> DEBU 729 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:16:43.556 UTC [orderer.common.broadcast] Handle -> DEBU 72a Starting new broadcast loop for 192.168.224.9:34522" +orderer0.example.com | "2019-04-22 06:16:43.556 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 72b [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34522" +orderer0.example.com | "2019-04-22 06:16:43.556 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 72c Processing config update message for channel businesschannel" +orderer0.example.com | "2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 72d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 72e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 72f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 730 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 731 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.557 UTC [cauthdsl] func1 -> DEBU 732 0xc000ec7b60 gate 1555913803557755200 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:43.558 UTC [cauthdsl] func2 -> DEBU 733 0xc000ec7b60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:43.558 UTC [cauthdsl] func2 -> DEBU 734 0xc000ec7b60 processing identity 0 with bytes of ebaeb0" +peer0.org1.example.com | "2019-04-22 06:16:44.716 UTC [gossip.gossip] handleMessage -> DEBU 40b Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:44.717 UTC [gossip.pull] HandleMessage -> DEBU 40c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:44.717 UTC [gossip.gossip] handleMessage -> DEBU 40d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:44.725 UTC [gossip.gossip] handleMessage -> DEBU 40e Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913800742965600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:44.726 UTC [msp.identity] Verify -> DEBU 40f Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +peer0.org1.example.com | 00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +peer0.org1.example.com | "2019-04-22 06:16:44.726 UTC [msp.identity] Verify -> DEBU 410 Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +peer0.org1.example.com | 00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +peer0.org1.example.com | 00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +peer0.org1.example.com | 00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +peer0.org1.example.com | 00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +peer0.org1.example.com | "2019-04-22 06:16:44.726 UTC [gossip.gossip] handleMessage -> DEBU 411 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:45.458 UTC [gossip.channel] reportMembershipChanges -> INFO 412 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-04-22 06:16:45.876 UTC [msp.identity] Sign -> DEBU 413 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15100A " +peer0.org1.example.com | "2019-04-22 06:16:45.877 UTC [msp.identity] Sign -> DEBU 414 Sign: digest: BBE6F5D957F00E94C27496D79DE5E9922E6648C091215F8578FBC691289E1B2D " +peer0.org1.example.com | "2019-04-22 06:16:45.877 UTC [msp.identity] Sign -> DEBU 415 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:45.877 UTC [msp.identity] Sign -> DEBU 416 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:45.877 UTC [gossip.discovery] periodicalSendAlive -> DEBU 417 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:16:45.878 UTC [gossip.comm] Send -> DEBU 418 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:45.878 UTC [gossip.comm] sendToEndpoint -> DEBU 419 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:45.879 UTC [gossip.comm] sendToEndpoint -> DEBU 41a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.166 UTC [gossip.gossip] handleMessage -> DEBU 41b Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.166 UTC [gossip.gossip] handleMessage -> DEBU 41c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:46.167 UTC [msp.identity] Verify -> DEBU 41f Verify: digest = 00000000 1b bc 36 cc 07 29 ee 70 72 b1 48 4f 67 4c c0 d1 |..6..).pr.HOgL..| +peer0.org1.example.com | 00000010 6e 99 5a 09 86 c0 fb 9f 37 28 19 72 62 a3 72 e1 |n.Z.....7(.rb.r.|" +peer0.org1.example.com | "2019-04-22 06:16:46.167 UTC [msp.identity] Verify -> DEBU 420 Verify: sig = 00000000 30 45 02 21 00 d3 4a f2 9e ef f2 ad ed db e3 68 |0E.!..J........h| +peer0.org1.example.com | 00000010 60 d0 e8 66 db a3 2c f9 c7 68 59 43 1d 60 9b 57 |`..f..,..hYC.`.W| +peer0.org1.example.com | 00000020 3b c6 a2 2d be 02 20 3c ba 53 3c 28 2d 2a e8 1f |;..-.. <.S<(-*..| +peer0.org1.example.com | 00000030 9f b9 01 e3 1c 45 77 fe 1f a5 79 ab 9c 80 3c 92 |.....Ew...y...<.| +peer0.org1.example.com | 00000040 e4 92 a6 7f 54 0a 25 |....T.%|" +peer0.org1.example.com | "2019-04-22 06:16:46.168 UTC [msp.identity] Verify -> DEBU 421 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:46.168 UTC [msp.identity] Verify -> DEBU 422 Verify: sig = 00000000 30 45 02 21 00 90 e3 f5 50 3f 6a 6c 75 38 ef b2 |0E.!....P?jlu8..| +peer0.org1.example.com | 00000010 1d f4 e7 fe 40 fb 5b 1e e7 02 f5 91 c2 3f 9c de |....@.[......?..| +peer0.org1.example.com | 00000020 99 d9 24 d4 c8 02 20 0b 30 85 df f2 22 11 29 59 |..$... .0...".)Y| +peer0.org1.example.com | 00000030 98 c7 33 95 d0 7c 54 4c c1 1a 1c d9 94 65 85 7b |..3..|TL.....e.{| +peer0.org1.example.com | 00000040 a7 2f 29 f3 ad 01 c0 |./)....|" +peer0.org1.example.com | "2019-04-22 06:16:46.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 423 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 424 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:46.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 425 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 " +orderer0.example.com | "2019-04-22 06:16:43.558 UTC [cauthdsl] func2 -> DEBU 735 0xc000ec7b60 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:43.558 UTC [msp.identity] Verify -> DEBU 736 Verify: digest = 00000000 51 1c 19 82 c7 6e a2 35 51 f1 eb b5 3a ab c1 e0 |Q....n.5Q...:...| +orderer0.example.com | 00000010 e7 80 e8 a3 aa 35 c2 09 d7 b8 6d ba 50 5f 01 cc |.....5....m.P_..|" +orderer0.example.com | "2019-04-22 06:16:43.558 UTC [msp.identity] Verify -> DEBU 737 Verify: sig = 00000000 30 45 02 21 00 b9 b2 e9 b9 af 9b 58 98 ec 2d b3 |0E.!.......X..-.| +orderer0.example.com | 00000010 43 6b 54 70 7f 78 08 61 52 3d ce 40 c3 8f c1 49 |CkTp.x.aR=.@...I| +orderer0.example.com | 00000020 9a b9 0b e8 73 02 20 16 9f c9 0d 7f d8 4f ae 4e |....s. ......O.N| +orderer0.example.com | 00000030 4d 94 59 9b fd c7 40 a1 2c a5 8a 13 0d 6f ec 32 |M.Y...@.,....o.2| +orderer0.example.com | 00000040 ce 7c dc 16 1e ca 9e |.|.....|" +orderer0.example.com | "2019-04-22 06:16:43.559 UTC [cauthdsl] func2 -> DEBU 738 0xc000ec7b60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:43.559 UTC [cauthdsl] func1 -> DEBU 739 0xc000ec7b60 gate 1555913803557755200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:43.559 UTC [policies] Evaluate -> DEBU 73a Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73c Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73e Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:43.561 UTC [policies] Evaluate -> DEBU 73f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:43.561 UTC [common.configtx] addToMap -> DEBU 740 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:43.561 UTC [common.configtx] addToMap -> DEBU 741 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.562 UTC [common.configtx] addToMap -> DEBU 742 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.563 UTC [common.configtx] addToMap -> DEBU 743 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.563 UTC [common.configtx] addToMap -> DEBU 744 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.563 UTC [common.configtx] addToMap -> DEBU 745 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.564 UTC [common.configtx] addToMap -> DEBU 746 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.564 UTC [common.configtx] addToMap -> DEBU 747 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.565 UTC [common.configtx] addToMap -> DEBU 748 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:43.565 UTC [common.configtx] addToMap -> DEBU 749 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.566 UTC [common.configtx] addToMap -> DEBU 74a Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.566 UTC [common.configtx] addToMap -> DEBU 74b Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.567 UTC [common.configtx] addToMap -> DEBU 74c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.567 UTC [common.configtx] addToMap -> DEBU 74d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.568 UTC [common.configtx] addToMap -> DEBU 74e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.568 UTC [common.configtx] addToMap -> DEBU 74f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.568 UTC [common.configtx] addToMap -> DEBU 750 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.569 UTC [common.configtx] verifyDeltaSet -> DEBU 751 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.570 UTC [common.configtx] verifyDeltaSet -> DEBU 752 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.570 UTC [common.configtx] policyForItem -> DEBU 753 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-04-22 06:16:43.571 UTC [policies] Manager -> DEBU 754 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:43.571 UTC [policies] Manager -> DEBU 755 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:43.571 UTC [policies] Manager -> DEBU 756 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:43.572 UTC [policies] Manager -> DEBU 757 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:43.572 UTC [policies] Manager -> DEBU 758 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.572 UTC [policies] Manager -> DEBU 759 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75a Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75b Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75c Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75d Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-04-22 06:16:43.574 UTC [policies] Evaluate -> DEBU 75e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:16:43.574 UTC [cauthdsl] func1 -> DEBU 75f 0xc000ee8c80 gate 1555913803574586500 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:43.574 UTC [cauthdsl] func2 -> DEBU 760 0xc000ee8c80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:43.575 UTC [cauthdsl] func2 -> DEBU 761 0xc000ee8c80 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:43.575 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 762 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.575 UTC [cauthdsl] func2 -> DEBU 763 0xc000ee8c80 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:43.575 UTC [msp.identity] Verify -> DEBU 764 Verify: digest = 00000000 d6 49 94 91 b8 a6 6c b3 a9 57 7e f9 27 5b 5a e3 |.I....l..W~.'[Z.| +orderer0.example.com | 00000010 52 1c 53 ad 04 db 62 c2 c0 a6 ee 8e 58 ad 10 22 |R.S...b.....X.."|" +orderer0.example.com | "2019-04-22 06:16:43.576 UTC [msp.identity] Verify -> DEBU 765 Verify: sig = 00000000 30 45 02 21 00 b6 e5 83 b1 2b 25 37 b2 dd 37 82 |0E.!.....+%7..7.| +orderer0.example.com | 00000010 40 97 d8 59 11 aa 3d 47 e7 b8 07 a1 02 6c 44 3d |@..Y..=G.....lD=| +orderer0.example.com | 00000020 29 92 c8 73 f6 02 20 19 98 95 d4 4a ac 07 77 69 |)..s.. ....J..wi| +orderer0.example.com | 00000030 64 8c 79 a9 77 84 ee d8 1d 99 b4 5d 73 3e 6a 75 |d.y.w......]s>ju| +orderer0.example.com | 00000040 bb a0 cb 16 1c 5f d4 |....._.|" +orderer0.example.com | "2019-04-22 06:16:43.576 UTC [cauthdsl] func2 -> DEBU 766 0xc000ee8c80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:43.576 UTC [cauthdsl] func1 -> DEBU 767 0xc000ee8c80 gate 1555913803574586500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:43.576 UTC [policies] Evaluate -> DEBU 768 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.576 UTC [policies] Evaluate -> DEBU 769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76a Setting policy for key Admins to " +orderer0.example.com | "2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76b Setting policy for key Endorsement to " +orderer0.example.com | "2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76c Setting policy for key Readers to " +orderer0.example.com | "2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76d Setting policy for key Writers to " +orderer0.example.com | "2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 76e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 76f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 770 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 771 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 772 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 773 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 774 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 775 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 776 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 777 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 778 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 779 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 77a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 77b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 780 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.580 UTC [common.channelconfig] NewStandardValues -> DEBU 781 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:43.581 UTC [common.channelconfig] initializeProtosStruct -> DEBU 782 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:43.581 UTC [common.channelconfig] initializeProtosStruct -> DEBU 783 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:43.581 UTC [common.channelconfig] initializeProtosStruct -> DEBU 784 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:43.582 UTC [common.channelconfig] initializeProtosStruct -> DEBU 785 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:43.582 UTC [common.channelconfig] initializeProtosStruct -> DEBU 786 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.583 UTC [common.channelconfig] NewStandardValues -> DEBU 787 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:43.583 UTC [common.channelconfig] initializeProtosStruct -> DEBU 788 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:43.583 UTC [common.channelconfig] initializeProtosStruct -> DEBU 789 Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:43.583 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78a Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78b Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78c Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78d Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] NewStandardValues -> DEBU 78e Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78f Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] NewStandardValues -> DEBU 790 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 791 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:43.584 UTC [common.channelconfig] validateMSP -> DEBU 792 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.585 UTC [msp] newBccspMsp -> DEBU 793 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.585 UTC [msp] New -> DEBU 794 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.585 UTC [msp] Setup -> DEBU 795 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:43.586 UTC [msp.identity] newIdentity -> DEBU 796 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.586 UTC [msp.identity] newIdentity -> DEBU 797 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.587 UTC [msp] Validate -> DEBU 798 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:43.587 UTC [common.channelconfig] NewStandardValues -> DEBU 799 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79a Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79b Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.588 UTC [common.channelconfig] NewStandardValues -> DEBU 79c Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79d Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.588 UTC [common.channelconfig] NewStandardValues -> DEBU 79e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79f Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:43.589 UTC [common.channelconfig] Validate -> DEBU 7a0 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:16:43.589 UTC [common.channelconfig] validateMSP -> DEBU 7a1 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.589 UTC [msp] newBccspMsp -> DEBU 7a2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.589 UTC [msp] New -> DEBU 7a3 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.589 UTC [msp] Setup -> DEBU 7a4 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.590 UTC [msp.identity] newIdentity -> DEBU 7a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.591 UTC [msp.identity] newIdentity -> DEBU 7a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.592 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7a7 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.592 UTC [msp] Validate -> DEBU 7a8 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:43.593 UTC [msp] getCertificationChain -> DEBU 7a9 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.594 UTC [msp] hasOURole -> DEBU 7aa MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:43.594 UTC [msp] getCertificationChain -> DEBU 7ab MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.595 UTC [common.channelconfig] NewStandardValues -> DEBU 7ac Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:43.595 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ad Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.595 UTC [common.channelconfig] NewStandardValues -> DEBU 7ae Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:43.595 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7af Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:43.595 UTC [common.channelconfig] Validate -> DEBU 7b0 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-04-22 06:16:43.595 UTC [common.channelconfig] validateMSP -> DEBU 7b1 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.595 UTC [msp] newBccspMsp -> DEBU 7b2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.596 UTC [msp] New -> DEBU 7b3 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.596 UTC [msp] Setup -> DEBU 7b4 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.597 UTC [msp.identity] newIdentity -> DEBU 7b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.597 UTC [msp.identity] newIdentity -> DEBU 7b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.598 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7b7 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.598 UTC [msp] Validate -> DEBU 7b8 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:43.599 UTC [msp] getCertificationChain -> DEBU 7b9 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.599 UTC [msp] hasOURole -> DEBU 7ba MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:43.599 UTC [msp] getCertificationChain -> DEBU 7bb MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.600 UTC [msp] Setup -> DEBU 7bc Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:43.600 UTC [msp] Setup -> DEBU 7bd MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:43.600 UTC [policies] NewManagerImpl -> DEBU 7be Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.600 UTC [policies] NewManagerImpl -> DEBU 7bf Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c0 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c1 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c2 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c3 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c4 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c5 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c6 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c7 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c8 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c9 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7ca Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7cb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7cc Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7cd Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7ce Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.603 UTC [policies] NewManagerImpl -> DEBU 7cf Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.603 UTC [policies] NewManagerImpl -> DEBU 7d0 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.603 UTC [policies] NewManagerImpl -> DEBU 7d1 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.605 UTC [policies] NewManagerImpl -> DEBU 7d2 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:43.605 UTC [policies] NewManagerImpl -> DEBU 7d3 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:43.605 UTC [policies] NewManagerImpl -> DEBU 7d4 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d7 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 426 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 " +peer0.org1.example.com | "2019-04-22 06:16:46.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 427 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:46.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 428 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 429 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.496 UTC [gossip.election] waitForInterrupt -> DEBU 42b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.496 UTC [gossip.election] beLeader -> INFO 42c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-04-22 06:16:46.496 UTC [gossip.service] func1 -> INFO 42d Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.498 UTC [deliveryClient] StartDeliverForChannel -> DEBU 42e This peer will pass blocks from orderer service to other peers for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.498 UTC [gossip.election] leaderElection -> DEBU 42f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.498 UTC [gossip.election] IsLeader -> DEBU 430 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:16:46.498 UTC [msp.identity] Sign -> DEBU 431 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510021801 " +peer0.org1.example.com | "2019-04-22 06:16:46.498 UTC [msp.identity] Sign -> DEBU 432 Sign: digest: B563D945DE15E18946F204D2BAF8D35EF856DFDEA99F19488378DF4A4E806123 " +peer0.org1.example.com | "2019-04-22 06:16:46.499 UTC [gossip.election] waitForInterrupt -> DEBU 433 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:46.498 UTC [ConnProducer] NewConnection -> DEBU 434 Creating a new connection" +peer0.org1.example.com | "2019-04-22 06:16:46.500 UTC [grpc] DialContext -> DEBU 435 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:16:46.500 UTC [grpc] DialContext -> DEBU 436 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:16:46.501 UTC [grpc] NewAddress -> DEBU 437 ccResolverWrapper: sending new addresses to cc: [{orderer0.example.com:7050 0 }]" +peer0.org1.example.com | "2019-04-22 06:16:46.501 UTC [grpc] switchBalancer -> DEBU 438 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:16:46.501 UTC [grpc] HandleSubConnStateChange -> DEBU 439 pickfirstBalancer: HandleSubConnStateChange: 0xc003074c90, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:16:46.508 UTC [grpc] HandleSubConnStateChange -> DEBU 43a pickfirstBalancer: HandleSubConnStateChange: 0xc003074c90, READY" +peer0.org1.example.com | "2019-04-22 06:16:46.508 UTC [ConnProducer] NewConnection -> DEBU 43c Connected to orderer0.example.com:7050" +peer0.org1.example.com | "2019-04-22 06:16:46.508 UTC [gossip.comm] Send -> DEBU 43b Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:46.508 UTC [deliveryClient] connect -> DEBU 43d Connected to orderer0.example.com:7050" +peer0.org1.example.com | "2019-04-22 06:16:46.508 UTC [deliveryClient] connect -> DEBU 43f Establishing gRPC stream with orderer0.example.com:7050 ..." +peer0.org1.example.com | "2019-04-22 06:16:46.508 UTC [gossip.comm] sendToEndpoint -> DEBU 43e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.509 UTC [gossip.comm] sendToEndpoint -> DEBU 440 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.509 UTC [deliveryClient] afterConnect -> DEBU 441 Entering" +peer0.org1.example.com | "2019-04-22 06:16:46.512 UTC [deliveryClient] RequestBlocks -> DEBU 442 Starting deliver with block [1] for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.512 UTC [msp.identity] Sign -> DEBU 443 Sign: plaintext: 0A91070A3D08051A0608CEB8F5E50522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +peer0.org1.example.com | "2019-04-22 06:16:46.513 UTC [msp.identity] Sign -> DEBU 444 Sign: digest: F5676FE90186E23BC8C3DAB368F58EF897FFF5668553D6FB6848FC806000CAEC " +peer0.org1.example.com | "2019-04-22 06:16:46.513 UTC [deliveryClient] afterConnect -> DEBU 445 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.529 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 446 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.529 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 447 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.530 UTC [policies] Evaluate -> DEBU 448 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:16:46.531 UTC [policies] Evaluate -> DEBU 449 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.531 UTC [policies] Evaluate -> DEBU 44a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.533 UTC [msp] DeserializeIdentity -> DEBU 44b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.534 UTC [msp.identity] newIdentity -> DEBU 44c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.535 UTC [cauthdsl] func1 -> DEBU 44d 0xc0030b48f0 gate 1555913806535261400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.535 UTC [cauthdsl] func2 -> DEBU 44e 0xc0030b48f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.535 UTC [cauthdsl] func2 -> DEBU 44f 0xc0030b48f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.535 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 450 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-04-22 06:16:46.536 UTC [msp] Validate -> DEBU 451 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.536 UTC [cauthdsl] func2 -> DEBU 452 0xc0030b48f0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7da Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.607 UTC [common.configtx] addToMap -> DEBU 7db Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.607 UTC [common.configtx] addToMap -> DEBU 7dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.607 UTC [common.configtx] addToMap -> DEBU 7dd Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7de Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7df Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e4 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e5 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e6 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e7 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e8 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.536 UTC [msp.identity] Verify -> DEBU 453 Verify: digest = 00000000 b7 0b 32 46 29 b5 68 d7 c7 5d 63 02 db 1e 99 23 |..2F).h..]c....#| +peer0.org1.example.com | 00000010 4f 56 10 60 95 61 db 53 a7 f6 f2 34 00 b5 f2 b1 |OV.`.a.S...4....|" +peer0.org1.example.com | "2019-04-22 06:16:46.537 UTC [msp.identity] Verify -> DEBU 454 Verify: sig = 00000000 30 44 02 20 68 c4 2f b4 e0 61 f2 06 29 0d aa 93 |0D. h./..a..)...| +peer0.org1.example.com | 00000010 47 23 1f 79 b2 a1 8b aa 39 6e 08 09 dd 7d 6f da |G#.y....9n...}o.| +peer0.org1.example.com | 00000020 a3 f2 6c 10 02 20 2a 72 7c 5e 28 85 c0 50 e9 92 |..l.. *r|^(..P..| +peer0.org1.example.com | 00000030 92 51 91 fc ab 0c 71 88 d7 44 77 6e 89 92 1e 40 |.Q....q..Dwn...@| +peer0.org1.example.com | 00000040 f7 c8 71 c0 5a 55 |..q.ZU|" +peer0.org1.example.com | "2019-04-22 06:16:46.538 UTC [cauthdsl] func2 -> DEBU 455 0xc0030b48f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.538 UTC [cauthdsl] func1 -> DEBU 456 0xc0030b48f0 gate 1555913806535261400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.538 UTC [policies] Evaluate -> DEBU 457 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.538 UTC [policies] Evaluate -> DEBU 458 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.539 UTC [policies] Evaluate -> DEBU 459 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:46.539 UTC [policies] Evaluate -> DEBU 45a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:46.539 UTC [blocksProvider] DeliverBlocks -> DEBU 45b [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.540 UTC [gossip.state] addPayload -> DEBU 45c [businesschannel] Adding payload to local buffer, blockNum = [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.540 UTC [gossip.state] deliverPayloads -> DEBU 45d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [gossip.state] addPayload -> DEBU 45e Blocks payloads buffer size for channel [businesschannel] is 0 blocks" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [blocksProvider] DeliverBlocks -> DEBU 45f [businesschannel] Gossiping block [1], peers number [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [gossip.state] deliverPayloads -> DEBU 460 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [gossip.privdata] StoreBlock -> INFO 461 [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [gossip.privdata] StoreBlock -> DEBU 462 [businesschannel] Validating block [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [committer.txvalidator] Validate -> DEBU 463 [businesschannel] START Block Validation for block [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [committer.txvalidator] Validate -> DEBU 464 expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:16:46.541 UTC [committer.txvalidator] validateTx -> DEBU 465 [businesschannel] validateTx starts for block 0xc002fe4600 env 0xc003020c80 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:46.542 UTC [protoutils] ValidateTransaction -> DEBU 466 ValidateTransactionEnvelope starts for envelope 0xc003020c80" +peer0.org1.example.com | "2019-04-22 06:16:46.542 UTC [protoutils] ValidateTransaction -> DEBU 467 Header is channel_header:"\010\001\032\006\010\313\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\335\364\310\305\2670\211&i\241\0270d\010\3431KA\005{\230\372}\356" " +peer0.org1.example.com | "2019-04-22 06:16:46.542 UTC [protoutils] validateChannelHeader -> DEBU 468 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-04-22 06:16:46.542 UTC [protoutils] checkSignatureFromCreator -> DEBU 469 begin" +peer0.org1.example.com | "2019-04-22 06:16:46.542 UTC [msp] GetManagerForChain -> DEBU 46a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:46.542 UTC [protoutils] checkSignatureFromCreator -> DEBU 46b creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-04-22 06:16:46.542 UTC [msp] Validate -> DEBU 46c MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 46d creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:46.543 UTC [msp.identity] Verify -> DEBU 46e Verify: digest = 00000000 8c fb 29 f2 97 74 25 6e cb 51 c7 a3 6a 77 ad 93 |..)..t%n.Q..jw..| +peer0.org1.example.com | 00000010 02 76 4f 05 73 12 55 54 81 be 8f dd 1d e1 ec 03 |.vO.s.UT........|" +peer0.org1.example.com | "2019-04-22 06:16:46.543 UTC [msp.identity] Verify -> DEBU 46f Verify: sig = 00000000 30 45 02 21 00 bd 75 92 bd 1d 96 bc be ea dc 3d |0E.!..u........=| +peer0.org1.example.com | 00000010 fb 98 91 b2 a3 02 76 bf 4a 0c 33 b5 75 a1 50 7a |......v.J.3.u.Pz| +peer0.org1.example.com | 00000020 6b f0 2a bc 99 02 20 1d ee 1f fb 71 ef 20 49 e2 |k.*... ....q. I.| +peer0.org1.example.com | 00000030 d6 f3 f6 58 29 c2 2a 6c 4c 9a 95 cf 6e da c5 3c |...X).*lL...n..<| +peer0.org1.example.com | 00000040 e2 3e 85 6c 50 84 6f |.>.lP.o|" +peer0.org1.example.com | "2019-04-22 06:16:46.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 470 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:46.544 UTC [protoutils] validateConfigTransaction -> DEBU 471 validateConfigTransaction starts for data 0xc0001ed500, header channel_header:"\010\001\032\006\010\313\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\335\364\310\305\2670\211&i\241\0270d\010\3431KA\005{\230\372}\356" " +orderer0.example.com | "2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7e9 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ea Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7eb Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ec Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ed Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:43.611 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:43.611 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:43.611 UTC [common.configtx] addToMap -> DEBU 7f2 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f3 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f6 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f7 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f8 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7f9 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fa Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fb Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fc Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fd Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:43.614 UTC [common.configtx] addToMap -> DEBU 7fe Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.614 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:43.614 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:43.615 UTC [common.configtx] addToMap -> DEBU 801 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:43.615 UTC [common.channelconfig] LogSanityChecks -> DEBU 802 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:16:43.615 UTC [common.channelconfig] LogSanityChecks -> DEBU 803 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:16:43.615 UTC [policies] Manager -> DEBU 804 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 805 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 806 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 807 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 808 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 809 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 80a As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 80b As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 80c As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 80d Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 80e Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 80f Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 810 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 811 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 812 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [common.capabilities] Supported -> DEBU 813 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:43.617 UTC [common.capabilities] Supported -> DEBU 814 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:43.618 UTC [msp.identity] Sign -> DEBU 815 Sign: plaintext: 0AD2060A1B08011A0608CBB8F5E50522...A12CA58A130D6FEC32CE7CDC161ECA9E " +orderer0.example.com | "2019-04-22 06:16:43.618 UTC [msp.identity] Sign -> DEBU 816 Sign: digest: 8CFB29F29774256ECB51C7A36A77AD9302764F057312555481BE8FDD1DE1EC03 " +orderer0.example.com | "2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 817 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 818 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 819 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 81a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.544 UTC [committer.txvalidator] validateTx -> DEBU 472 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.543 UTC [gossip.channel] AddToMsgStore -> DEBU 473 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23699 bytes, seq: 1}, Envelope: 23732 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:16:46.544 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.544 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.544 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 478 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 47a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 47b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.544 UTC [gossip.pull] Add -> DEBU 474 Added 1, total items: 1" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 47f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 480 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [policies] Evaluate -> DEBU 481 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [policies] Evaluate -> DEBU 483 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [policies] Evaluate -> DEBU 484 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [cauthdsl] func1 -> DEBU 485 0xc00311cad0 gate 1555913806546517700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [cauthdsl] func2 -> DEBU 486 0xc00311cad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [cauthdsl] func2 -> DEBU 487 0xc00311cad0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [cauthdsl] func2 -> DEBU 488 0xc00311cad0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [msp.identity] Verify -> DEBU 489 Verify: digest = 00000000 91 72 80 3e d5 d4 80 db 98 9c 37 a2 61 f9 7e f8 |.r.>......7.a.~.| +peer0.org1.example.com | 00000010 df 9a 19 bc 44 87 1e 39 8c 3d 69 63 98 12 8b 75 |....D..9.=ic...u|" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [gossip.comm] Send -> DEBU 48a Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23699 bytes, seq: 1}, Envelope: 23732 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:46.547 UTC [gossip.comm] sendToEndpoint -> DEBU 48c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23699 bytes, seq: 1}, Envelope: 23732 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.547 UTC [gossip.comm] sendToEndpoint -> DEBU 48d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.550 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.550 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.551 UTC [common.configtx] verifyDeltaSet -> DEBU 494 Processing change to key: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.551 UTC [common.configtx] policyForItem -> DEBU 495 Getting policy for item Org1MSP with mod_policy Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.552 UTC [policies] Manager -> DEBU 496 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-04-22 06:16:46.552 UTC [policies] Manager -> DEBU 497 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:16:46.552 UTC [policies] Manager -> DEBU 498 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 499 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49a Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49b Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49c Manager Channel/Application looking up path [Org1MSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49d Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49e Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.554 UTC [policies] Manager -> DEBU 49f Manager Channel/Application/Org1MSP looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.554 UTC [policies] Evaluate -> DEBU 4a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-04-22 06:16:46.555 UTC [cauthdsl] func1 -> DEBU 4a1 0xc003252360 gate 1555913806554948200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.555 UTC [cauthdsl] func2 -> DEBU 4a2 0xc003252360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.555 UTC [cauthdsl] func2 -> DEBU 4a3 0xc003252360 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.546 UTC [msp.identity] Verify -> DEBU 48b Verify: sig = 00000000 30 44 02 20 45 83 be c4 bb c8 dc 92 36 07 2f 28 |0D. E.......6./(| +peer0.org1.example.com | 00000010 37 52 b0 3e 3e de 04 51 eb 4b e7 44 d4 b2 c6 c1 |7R.>>..Q.K.D....| +peer0.org1.example.com | 00000020 d1 ba 6f 68 02 20 64 dc 7e 45 a1 86 b1 4e 48 69 |..oh. d.~E...NHi| +peer0.org1.example.com | 00000030 1b 38 90 53 28 5d 55 83 8e df 39 6b 81 98 e3 8d |.8.S(]U...9k....| +peer0.org1.example.com | 00000040 59 ac c9 06 f9 11 |Y.....|" +peer0.org1.example.com | "2019-04-22 06:16:46.555 UTC [cauthdsl] func2 -> DEBU 4a4 0xc00311cad0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.557 UTC [cauthdsl] func1 -> DEBU 4a6 0xc00311cad0 gate 1555913806546517700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4a7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4a9 Signature set satisfies policy /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 81b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.619 UTC [msp] DeserializeIdentity -> DEBU 81c Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:43.619 UTC [msp.identity] newIdentity -> DEBU 81d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [blocksProvider] DeliverBlocks -> DEBU 4ab [businesschannel] Adding payload to local buffer, blockNum = [2]" +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.620 UTC [cauthdsl] func1 -> DEBU 81e 0xc000d290f0 gate 1555913803620069100 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:43.620 UTC [cauthdsl] func2 -> DEBU 81f 0xc000d290f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:43.620 UTC [cauthdsl] func2 -> DEBU 820 0xc000d290f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:43.621 UTC [cauthdsl] func2 -> DEBU 821 0xc000d290f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:16:43.621 UTC [cauthdsl] func2 -> DEBU 822 0xc000d290f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:16:43.621 UTC [cauthdsl] func1 -> DEBU 823 0xc000d290f0 gate 1555913803620069100 evaluation fails" +orderer0.example.com | "2019-04-22 06:16:43.621 UTC [policies] Evaluate -> DEBU 824 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.622 UTC [policies] Evaluate -> DEBU 825 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.622 UTC [policies] Evaluate -> DEBU 826 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.622 UTC [cauthdsl] func1 -> DEBU 827 0xc000e90360 gate 1555913803622448400 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:43.622 UTC [cauthdsl] func2 -> DEBU 828 0xc000e90360 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:43.622 UTC [cauthdsl] func2 -> DEBU 829 0xc000e90360 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:43.623 UTC [cauthdsl] func2 -> DEBU 82a 0xc000e90360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:16:43.623 UTC [cauthdsl] func2 -> DEBU 82b 0xc000e90360 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:16:43.623 UTC [cauthdsl] func1 -> DEBU 82c 0xc000e90360 gate 1555913803622448400 evaluation fails" +orderer0.example.com | "2019-04-22 06:16:43.623 UTC [policies] Evaluate -> DEBU 82d Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.623 UTC [policies] Evaluate -> DEBU 82e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.623 UTC [policies] func1 -> DEBU 82f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 830 Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 831 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 832 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 833 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 834 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [cauthdsl] func1 -> DEBU 835 0xc000e911c0 gate 1555913803624894500 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [cauthdsl] func2 -> DEBU 836 0xc000e911c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:43.624 UTC [cauthdsl] func2 -> DEBU 837 0xc000e911c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:43.625 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 838 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:43.625 UTC [msp] Validate -> DEBU 839 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:43.626 UTC [cauthdsl] func2 -> DEBU 83a 0xc000e911c0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:43.627 UTC [msp.identity] Verify -> DEBU 83b Verify: digest = 00000000 8c fb 29 f2 97 74 25 6e cb 51 c7 a3 6a 77 ad 93 |..)..t%n.Q..jw..| +orderer0.example.com | 00000010 02 76 4f 05 73 12 55 54 81 be 8f dd 1d e1 ec 03 |.vO.s.UT........|" +orderer0.example.com | "2019-04-22 06:16:43.627 UTC [msp.identity] Verify -> DEBU 83c Verify: sig = 00000000 30 45 02 21 00 bd 75 92 bd 1d 96 bc be ea dc 3d |0E.!..u........=| +orderer0.example.com | 00000010 fb 98 91 b2 a3 02 76 bf 4a 0c 33 b5 75 a1 50 7a |......v.J.3.u.Pz| +orderer0.example.com | 00000020 6b f0 2a bc 99 02 20 1d ee 1f fb 71 ef 20 49 e2 |k.*... ....q. I.| +orderer0.example.com | 00000030 d6 f3 f6 58 29 c2 2a 6c 4c 9a 95 cf 6e da c5 3c |...X).*lL...n..<| +orderer0.example.com | 00000040 e2 3e 85 6c 50 84 6f |.>.lP.o|" +orderer0.example.com | "2019-04-22 06:16:43.627 UTC [cauthdsl] func2 -> DEBU 83d 0xc000e911c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:43.627 UTC [cauthdsl] func1 -> DEBU 83e 0xc000e911c0 gate 1555913803624894500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:43.627 UTC [policies] Evaluate -> DEBU 83f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:43.627 UTC [policies] Evaluate -> DEBU 840 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 841 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 842 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 843 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 844 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:43.628 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 845 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34522" +orderer0.example.com | "2019-04-22 06:16:43.631 UTC [orderer.consensus.etcdraft] propose -> INFO 846 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:43.631 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 847 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:43.631 UTC [orderer.consensus.etcdraft] 2 -> DEBU 848 Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:43.634 UTC [orderer.common.broadcast] Handle -> WARN 849 Error reading from 192.168.224.9:34522: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:16:43.635 UTC [orderer.common.server] func1 -> DEBU 84a Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:16:43.635 UTC [comm.grpc.server] 1 -> INFO 84b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34522 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=79.0446ms +orderer0.example.com | "2019-04-22 06:16:43.635 UTC [grpc] infof -> DEBU 84c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:43.635 UTC [common.deliver] Handle -> WARN 84d Error reading from 192.168.224.9:34520: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:16:43.635 UTC [orderer.common.server] func1 -> DEBU 84e Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:43.635 UTC [comm.grpc.server] 1 -> INFO 84f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34520 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=95.1722ms +orderer0.example.com | "2019-04-22 06:16:43.636 UTC [grpc] infof -> DEBU 850 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:43.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 851 Sending msg of 22809 bytes to 3 on channel businesschannel took 100µs" +orderer0.example.com | "2019-04-22 06:16:43.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 852 Sending msg of 22809 bytes to 2 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-04-22 06:16:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU 853 Send of ConsensusRequest for channel businesschannel with payload of size 22809 to orderer1.example.com(orderer1.example.com:7050) took 105.3µs " +orderer0.example.com | "2019-04-22 06:16:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU 854 Send of ConsensusRequest for channel businesschannel with payload of size 22809 to orderer2.example.com(orderer2.example.com:7050) took 85µs " +orderer0.example.com | "2019-04-22 06:16:43.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU 855 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.645 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 856 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:43.648 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:43.651 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.651 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.652 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.653 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.653 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.653 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.654 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.654 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:43.655 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.655 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.655 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.656 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 865 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 867 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.658 UTC [common.configtx] verifyDeltaSet -> DEBU 868 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.658 UTC [common.configtx] policyForItem -> DEBU 869 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-04-22 06:16:43.659 UTC [policies] Manager -> DEBU 86a Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:43.659 UTC [policies] Manager -> DEBU 86b Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:43.659 UTC [policies] Manager -> DEBU 86c Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:43.660 UTC [policies] Manager -> DEBU 86d Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:43.660 UTC [policies] Manager -> DEBU 86e Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.660 UTC [policies] Manager -> DEBU 86f Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.661 UTC [policies] Manager -> DEBU 870 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-04-22 06:16:43.661 UTC [policies] Manager -> DEBU 871 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.661 UTC [policies] Manager -> DEBU 872 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.662 UTC [policies] Manager -> DEBU 873 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-04-22 06:16:43.676 UTC [policies] Evaluate -> DEBU 877 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:16:43.676 UTC [cauthdsl] func1 -> DEBU 878 0xc000ec93a0 gate 1555913803676674300 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:43.677 UTC [cauthdsl] func2 -> DEBU 879 0xc000ec93a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:43.677 UTC [cauthdsl] func2 -> DEBU 87a 0xc000ec93a0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:43.677 UTC [cauthdsl] func2 -> DEBU 87b 0xc000ec93a0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:43.677 UTC [msp.identity] Verify -> DEBU 87c Verify: digest = 00000000 d6 49 94 91 b8 a6 6c b3 a9 57 7e f9 27 5b 5a e3 |.I....l..W~.'[Z.| +orderer0.example.com | 00000010 52 1c 53 ad 04 db 62 c2 c0 a6 ee 8e 58 ad 10 22 |R.S...b.....X.."|" +orderer0.example.com | "2019-04-22 06:16:43.678 UTC [msp.identity] Verify -> DEBU 87d Verify: sig = 00000000 30 45 02 21 00 b6 e5 83 b1 2b 25 37 b2 dd 37 82 |0E.!.....+%7..7.| +orderer0.example.com | 00000010 40 97 d8 59 11 aa 3d 47 e7 b8 07 a1 02 6c 44 3d |@..Y..=G.....lD=| +orderer0.example.com | 00000020 29 92 c8 73 f6 02 20 19 98 95 d4 4a ac 07 77 69 |)..s.. ....J..wi| +orderer0.example.com | 00000030 64 8c 79 a9 77 84 ee d8 1d 99 b4 5d 73 3e 6a 75 |d.y.w......]s>ju| +orderer0.example.com | 00000040 bb a0 cb 16 1c 5f d4 |....._.|" +orderer0.example.com | "2019-04-22 06:16:43.678 UTC [cauthdsl] func2 -> DEBU 87f 0xc000ec93a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:43.679 UTC [cauthdsl] func1 -> DEBU 880 0xc000ec93a0 gate 1555913803676674300 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:43.679 UTC [policies] Evaluate -> DEBU 881 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.680 UTC [policies] Evaluate -> DEBU 882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 87e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.664 UTC [orderer.common.cluster.step] sendMessage -> DEBU 874 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 292.2µs " +orderer0.example.com | "2019-04-22 06:16:43.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU 875 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.664 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 876 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +orderer0.example.com | "2019-04-22 06:16:43.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 884 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-04-22 06:16:43.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 885 Sending msg of 28 bytes to 2 on channel businesschannel took 52µs" +orderer0.example.com | "2019-04-22 06:16:43.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 886 Sending msg of 28 bytes to 3 on channel businesschannel took 28.3µs" +orderer0.example.com | "2019-04-22 06:16:43.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 887 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " +orderer0.example.com | "2019-04-22 06:16:43.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 888 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.1µs " +orderer0.example.com | "2019-04-22 06:16:43.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 889 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +orderer0.example.com | "2019-04-22 06:16:43.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.680 UTC [common.configtx] verifyDeltaSet -> DEBU 883 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.694 UTC [common.configtx] recurseConfigMap -> DEBU 88c Setting policy for key Endorsement to " +orderer0.example.com | "2019-04-22 06:16:43.694 UTC [common.configtx] recurseConfigMap -> DEBU 88d Setting policy for key Readers to " +orderer0.example.com | "2019-04-22 06:16:43.695 UTC [common.configtx] recurseConfigMap -> DEBU 88e Setting policy for key Writers to " +orderer0.example.com | "2019-04-22 06:16:43.695 UTC [common.configtx] recurseConfigMap -> DEBU 88f Setting policy for key Admins to " +orderer0.example.com | "2019-04-22 06:16:43.695 UTC [common.configtx] recurseConfigMap -> DEBU 890 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.696 UTC [common.configtx] recurseConfigMap -> DEBU 891 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.696 UTC [common.configtx] recurseConfigMap -> DEBU 892 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.696 UTC [common.configtx] recurseConfigMap -> DEBU 893 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.697 UTC [common.configtx] recurseConfigMap -> DEBU 894 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.697 UTC [common.configtx] recurseConfigMap -> DEBU 895 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.697 UTC [common.configtx] recurseConfigMap -> DEBU 896 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.698 UTC [common.configtx] recurseConfigMap -> DEBU 897 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.699 UTC [common.configtx] recurseConfigMap -> DEBU 898 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.699 UTC [common.configtx] recurseConfigMap -> DEBU 899 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.699 UTC [common.configtx] recurseConfigMap -> DEBU 89a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.700 UTC [common.configtx] recurseConfigMap -> DEBU 89b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.700 UTC [common.configtx] recurseConfigMap -> DEBU 89c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.700 UTC [common.configtx] recurseConfigMap -> DEBU 89d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 89e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 89f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 8a0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 8a1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.702 UTC [common.configtx] recurseConfigMap -> DEBU 8a2 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:43.702 UTC [common.channelconfig] NewStandardValues -> DEBU 8a3 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:43.702 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a4 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:43.702 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:43.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a6 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:43.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a7 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:43.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a8 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.703 UTC [common.channelconfig] NewStandardValues -> DEBU 8a9 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [gossip.state] addPayload -> DEBU 4ac [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [gossip.state] addPayload -> DEBU 4ad Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:16:46.558 UTC [blocksProvider] DeliverBlocks -> DEBU 4ae [businesschannel] Gossiping block [2], peers number [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.559 UTC [gossip.channel] AddToMsgStore -> DEBU 4af Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:16:46.559 UTC [gossip.pull] Add -> DEBU 4b0 Added 2, total items: 2" +peer0.org1.example.com | "2019-04-22 06:16:46.556 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4a5 Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.559 UTC [cauthdsl] func2 -> DEBU 4b1 0xc003252360 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.559 UTC [msp.identity] Verify -> DEBU 4b2 Verify: digest = 00000000 d6 49 94 91 b8 a6 6c b3 a9 57 7e f9 27 5b 5a e3 |.I....l..W~.'[Z.| +peer0.org1.example.com | 00000010 52 1c 53 ad 04 db 62 c2 c0 a6 ee 8e 58 ad 10 22 |R.S...b.....X.."|" +peer0.org1.example.com | "2019-04-22 06:16:46.560 UTC [gossip.comm] Send -> DEBU 4b3 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:46.563 UTC [gossip.comm] sendToEndpoint -> DEBU 4b4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.563 UTC [gossip.comm] sendToEndpoint -> DEBU 4b5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.563 UTC [msp.identity] Verify -> DEBU 4b6 Verify: sig = 00000000 30 45 02 21 00 b6 e5 83 b1 2b 25 37 b2 dd 37 82 |0E.!.....+%7..7.| +peer0.org1.example.com | 00000010 40 97 d8 59 11 aa 3d 47 e7 b8 07 a1 02 6c 44 3d |@..Y..=G.....lD=| +peer0.org1.example.com | 00000020 29 92 c8 73 f6 02 20 19 98 95 d4 4a ac 07 77 69 |)..s.. ....J..wi| +peer0.org1.example.com | 00000030 64 8c 79 a9 77 84 ee d8 1d 99 b4 5d 73 3e 6a 75 |d.y.w......]s>ju| +peer0.org1.example.com | 00000040 bb a0 cb 16 1c 5f d4 |....._.|" +peer0.org1.example.com | "2019-04-22 06:16:46.564 UTC [cauthdsl] func2 -> DEBU 4b7 0xc003252360 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.564 UTC [cauthdsl] func1 -> DEBU 4b8 0xc003252360 gate 1555913806554948200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.564 UTC [policies] Evaluate -> DEBU 4b9 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.564 UTC [policies] Evaluate -> DEBU 4ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.564 UTC [common.configtx] verifyDeltaSet -> DEBU 4bb Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4bc Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4bd Setting policy for key Readers to " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4be Setting policy for key Writers to " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4bf Setting policy for key Admins to " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c0 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c5 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c6 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c8 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4ca Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4cb Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.567 UTC [common.configtx] recurseConfigMap -> DEBU 4cc Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4cd Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4ce Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4cf Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4d0 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4d1 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.570 UTC [common.configtx] recurseConfigMap -> DEBU 4d2 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.570 UTC [common.channelconfig] NewStandardValues -> DEBU 4d3 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d4 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d5 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d7 Processing field: Consortium" +peer0.org1.example.com | "2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.571 UTC [common.channelconfig] NewStandardValues -> DEBU 4d9 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4da Processing field: ACLs" +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4db Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [common.channelconfig] NewStandardValues -> DEBU 4dc Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dd Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [common.channelconfig] NewStandardValues -> DEBU 4de Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4df Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [common.channelconfig] Validate -> DEBU 4e0 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [common.channelconfig] validateMSP -> DEBU 4e1 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.575 UTC [msp] newBccspMsp -> DEBU 4e2 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.576 UTC [msp] New -> DEBU 4e3 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.576 UTC [msp] Setup -> DEBU 4e4 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.576 UTC [msp.identity] newIdentity -> DEBU 4e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.576 UTC [msp.identity] newIdentity -> DEBU 4e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.577 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4e7 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.577 UTC [msp] Validate -> DEBU 4e8 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.577 UTC [msp] getCertificationChain -> DEBU 4e9 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.579 UTC [msp] hasOURole -> DEBU 4ea MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:46.579 UTC [msp] getCertificationChain -> DEBU 4eb MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.579 UTC [common.channelconfig] NewStandardValues -> DEBU 4ec Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.579 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ed Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.579 UTC [common.channelconfig] NewStandardValues -> DEBU 4ee Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.580 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ef Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.580 UTC [common.channelconfig] Validate -> DEBU 4f0 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-04-22 06:16:46.581 UTC [common.channelconfig] validateMSP -> DEBU 4f1 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.581 UTC [msp] newBccspMsp -> DEBU 4f2 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.581 UTC [msp] New -> DEBU 4f3 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.582 UTC [msp] Setup -> DEBU 4f4 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.582 UTC [msp.identity] newIdentity -> DEBU 4f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | "2019-04-22 06:16:43.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8aa Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:43.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ab Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.704 UTC [common.channelconfig] NewStandardValues -> DEBU 8ac Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:43.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ad Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.704 UTC [common.channelconfig] NewStandardValues -> DEBU 8ae Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:43.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8af Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:43.705 UTC [common.channelconfig] Validate -> DEBU 8b0 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:16:43.705 UTC [common.channelconfig] validateMSP -> DEBU 8b1 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.706 UTC [msp] newBccspMsp -> DEBU 8b2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.706 UTC [msp] New -> DEBU 8b3 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.706 UTC [msp] Setup -> DEBU 8b4 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.707 UTC [msp.identity] newIdentity -> DEBU 8b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.708 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8b6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.708 UTC [msp.identity] newIdentity -> DEBU 8b7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.710 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8b8 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.712 UTC [msp] Validate -> DEBU 8b9 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:43.712 UTC [msp] getCertificationChain -> DEBU 8ba MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.713 UTC [msp] hasOURole -> DEBU 8bb MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:43.713 UTC [msp] getCertificationChain -> DEBU 8bc MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.719 UTC [common.channelconfig] NewStandardValues -> DEBU 8bd Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:43.719 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8be Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.720 UTC [common.channelconfig] NewStandardValues -> DEBU 8bf Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:43.721 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c0 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:43.721 UTC [common.channelconfig] Validate -> DEBU 8c1 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-04-22 06:16:43.722 UTC [common.channelconfig] validateMSP -> DEBU 8c2 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.722 UTC [msp] newBccspMsp -> DEBU 8c3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.723 UTC [msp] New -> DEBU 8c4 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.723 UTC [msp] Setup -> DEBU 8c5 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.724 UTC [msp.identity] newIdentity -> DEBU 8c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.724 UTC [msp.identity] newIdentity -> DEBU 8c7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.725 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8c8 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.725 UTC [msp] Validate -> DEBU 8c9 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:43.726 UTC [msp] getCertificationChain -> DEBU 8ca MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.726 UTC [msp] hasOURole -> DEBU 8cb MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:43.727 UTC [msp] getCertificationChain -> DEBU 8cc MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:43.727 UTC [common.channelconfig] NewStandardValues -> DEBU 8cd Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:43.728 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ce Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:43.728 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cf Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:43.728 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d0 Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:43.729 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d1 Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:43.729 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d2 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:43.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d3 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.730 UTC [common.channelconfig] NewStandardValues -> DEBU 8d4 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:43.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d5 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:43.733 UTC [common.channelconfig] NewStandardValues -> DEBU 8d6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:43.733 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d7 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:43.733 UTC [common.channelconfig] validateMSP -> DEBU 8d8 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.734 UTC [msp] newBccspMsp -> DEBU 8d9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.734 UTC [msp] New -> DEBU 8da Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:43.735 UTC [msp] Setup -> DEBU 8db Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:43.735 UTC [msp.identity] newIdentity -> DEBU 8dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.736 UTC [msp.identity] newIdentity -> DEBU 8dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:43.736 UTC [msp] Validate -> DEBU 8de MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:43.737 UTC [msp] Setup -> DEBU 8df Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:43.737 UTC [msp] Setup -> DEBU 8e0 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:43.737 UTC [policies] NewManagerImpl -> DEBU 8e1 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.738 UTC [policies] NewManagerImpl -> DEBU 8e2 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.738 UTC [policies] NewManagerImpl -> DEBU 8e3 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.582 UTC [msp.identity] newIdentity -> DEBU 4f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.583 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f7 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.583 UTC [msp] Validate -> DEBU 4f8 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.583 UTC [msp] getCertificationChain -> DEBU 4f9 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.583 UTC [msp] hasOURole -> DEBU 4fa MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:46.583 UTC [msp] getCertificationChain -> DEBU 4fb MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.583 UTC [common.channelconfig] NewStandardValues -> DEBU 4fc Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: ConsensusType" +peer0.org1.example.com | "2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: BatchSize" +peer0.org1.example.com | "2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 500 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 501 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:16:46.585 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.585 UTC [common.channelconfig] NewStandardValues -> DEBU 503 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.585 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: Endpoints" +peer0.org1.example.com | "2019-04-22 06:16:46.585 UTC [common.channelconfig] NewStandardValues -> DEBU 505 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 506 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.586 UTC [common.channelconfig] validateMSP -> DEBU 507 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.586 UTC [msp] newBccspMsp -> DEBU 508 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.586 UTC [msp] New -> DEBU 509 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.587 UTC [msp] Setup -> DEBU 50a Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-04-22 06:16:46.589 UTC [msp.identity] newIdentity -> DEBU 50b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.589 UTC [msp.identity] newIdentity -> DEBU 50c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.590 UTC [msp] Validate -> DEBU 50d MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.593 UTC [comm.grpc.server] 1 -> INFO 50e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.592Z grpc.peer_address=192.168.224.5:47496 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.0805ms +peer0.org1.example.com | "2019-04-22 06:16:46.592 UTC [msp] Setup -> DEBU 50f Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-04-22 06:16:46.594 UTC [msp] Setup -> DEBU 510 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.596 UTC [msp.identity] Sign -> DEBU 516 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:46.599 UTC [msp.identity] Sign -> DEBU 518 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:46.597 UTC [policies] NewManagerImpl -> DEBU 517 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.599 UTC [gossip.comm] authenticateRemotePeer -> DEBU 519 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:47496" +peer0.org1.example.com | "2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51a Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51b Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.738 UTC [policies] NewManagerImpl -> DEBU 8e4 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.739 UTC [policies] NewManagerImpl -> DEBU 8e5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.739 UTC [policies] NewManagerImpl -> DEBU 8e6 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.740 UTC [policies] NewManagerImpl -> DEBU 8e7 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.741 UTC [policies] NewManagerImpl -> DEBU 8e8 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.741 UTC [policies] NewManagerImpl -> DEBU 8e9 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.741 UTC [policies] NewManagerImpl -> DEBU 8ea Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.742 UTC [policies] NewManagerImpl -> DEBU 8eb Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.742 UTC [policies] NewManagerImpl -> DEBU 8ec Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.742 UTC [policies] NewManagerImpl -> DEBU 8ed Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.743 UTC [policies] NewManagerImpl -> DEBU 8ee Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.743 UTC [policies] NewManagerImpl -> DEBU 8ef Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.743 UTC [policies] NewManagerImpl -> DEBU 8f0 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f1 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f2 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f3 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f4 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.745 UTC [policies] NewManagerImpl -> DEBU 8f5 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:43.745 UTC [policies] NewManagerImpl -> DEBU 8f6 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:43.745 UTC [policies] NewManagerImpl -> DEBU 8f7 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:43.746 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:43.746 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:43.746 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51c Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51d Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51e Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 51f Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [gossip.comm] authenticateRemotePeer -> DEBU 520 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47496" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 521 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 522 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 523 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 524 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 525 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 526 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 527 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 528 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [msp.identity] Verify -> DEBU 529 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 52a Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [msp.identity] Verify -> DEBU 52b Verify: sig = 00000000 30 45 02 21 00 8b ad 1e 20 ea 86 f9 6a 34 22 b2 |0E.!.... ...j4".| +peer0.org1.example.com | 00000010 cf 02 6e 2d 6d 62 9c db 36 5d 6b a7 ad c9 e3 24 |..n-mb..6]k....$| +peer0.org1.example.com | 00000020 4d f4 7c 74 2a 02 20 27 e8 f4 bf 45 85 07 b0 ef |M.|t*. '...E....| +peer0.org1.example.com | 00000030 b1 3b 8e 62 0e 01 93 6e d1 a1 f4 5c 5f 67 3a 49 |.;.b...n...\_g:I| +peer0.org1.example.com | 00000040 3d 75 2c 4d 33 f0 a7 |=u,M3..|" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 52c Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 52d Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.600 UTC [gossip.comm] authenticateRemotePeer -> DEBU 52f Authenticated 192.168.224.5:47496" +peer0.org1.example.com | "2019-04-22 06:16:46.601 UTC [gossip.comm] GossipStream -> DEBU 530 Servicing 192.168.224.5:47496" +peer0.org1.example.com | "2019-04-22 06:16:46.601 UTC [gossip.comm] serviceConnection -> DEBU 531 Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:16:46.606 UTC [gossip.comm] func2 -> DEBU 537 Client 192.168.224.5:47444 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:46.603 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.605 UTC [gossip.comm] readFromStream -> DEBU 533 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:16:46.605 UTC [grpc] infof -> DEBU 534 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:46.605 UTC [gossip.comm] readFromStream -> DEBU 535 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:16:46.605 UTC [gossip.comm] func2 -> DEBU 536 Client 192.168.224.5:47496 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:46.606 UTC [gossip.comm] writeToStream -> DEBU 538 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:46.606 UTC [comm.grpc.server] 1 -> INFO 539 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:47444 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=15.3516056s +peer0.org1.example.com | "2019-04-22 06:16:46.606 UTC [gossip.comm] writeToStream -> DEBU 53a Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:46.607 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.608 UTC [comm.grpc.server] 1 -> INFO 53c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:56.595Z grpc.peer_address=192.168.224.5:47496 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.9234ms +peer0.org1.example.com | "2019-04-22 06:16:46.609 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.611 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.613 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.614 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.615 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.616 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.617 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.618 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.621 UTC [common.configtx] addToMap -> DEBU 545 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.622 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.622 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.623 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.623 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.630 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-04-22 06:16:46.630 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.631 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.631 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.631 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:16:46.634 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.635 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-04-22 06:16:46.635 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-04-22 06:16:46.636 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:16:46.636 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:46.637 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.637 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.637 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.638 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:16:46.640 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.640 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.641 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.641 UTC [common.channelconfig] LogSanityChecks -> DEBU 567 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-04-22 06:16:46.641 UTC [common.channelconfig] LogSanityChecks -> DEBU 568 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-04-22 06:16:46.641 UTC [policies] Manager -> DEBU 569 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-04-22 06:16:46.641 UTC [policies] Manager -> DEBU 56a Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56b Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56c Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56d Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56e Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.643 UTC [common.channelconfig] LogSanityChecks -> DEBU 56f As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-04-22 06:16:46.643 UTC [common.channelconfig] LogSanityChecks -> DEBU 570 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-04-22 06:16:46.643 UTC [common.channelconfig] LogSanityChecks -> DEBU 571 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 572 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 573 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 574 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 575 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.645 UTC [policies] Manager -> DEBU 576 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.645 UTC [common.channelconfig] LogSanityChecks -> DEBU 577 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-04-22 06:16:46.646 UTC [common.capabilities] Supported -> DEBU 578 Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:46.646 UTC [common.capabilities] Supported -> DEBU 579 Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:46.646 UTC [gossip.service] ProcessConfigUpdate -> DEBU 57a Processing new config for channel businesschannel" +orderer0.example.com | "2019-04-22 06:16:43.747 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:43.747 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.747 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 917 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 918 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 919 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91a Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:46.647 UTC [gossip.service] ProcessConfigUpdate -> DEBU 57b Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.647 UTC [gossip.service] updateAnchors -> DEBU 57c Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-04-22 06:16:46.647 UTC [gossip.service] updateAnchors -> DEBU 57d Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-04-22 06:16:46.653 UTC [gossip.service] updateAnchors -> DEBU 57e Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.654 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.655 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 580 Got reader policy for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-04-22 06:16:43.750 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:43.750 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:43.758 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:43.759 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:43.759 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:43.760 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:43.760 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:43.761 UTC [common.channelconfig] LogSanityChecks -> DEBU 925 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:16:43.761 UTC [common.channelconfig] LogSanityChecks -> DEBU 926 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:16:43.762 UTC [policies] Manager -> DEBU 927 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:43.762 UTC [policies] Manager -> DEBU 928 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 929 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 92a Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 92b Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 92c Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:43.764 UTC [common.channelconfig] LogSanityChecks -> DEBU 92d As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:16:43.764 UTC [common.channelconfig] LogSanityChecks -> DEBU 92e As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:16:43.764 UTC [common.channelconfig] LogSanityChecks -> DEBU 92f As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:16:43.764 UTC [policies] Manager -> DEBU 930 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:16:43.765 UTC [policies] Manager -> DEBU 931 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:43.765 UTC [policies] Manager -> DEBU 932 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:43.765 UTC [policies] Manager -> DEBU 933 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.655 UTC [policies] Evaluate -> DEBU 581 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.655 UTC [policies] Evaluate -> DEBU 582 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.658 UTC [policies] Evaluate -> DEBU 583 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.659 UTC [cauthdsl] func1 -> DEBU 584 0xc00354a8d0 gate 1555913806659200200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.659 UTC [cauthdsl] func2 -> DEBU 585 0xc00354a8d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.659 UTC [cauthdsl] func2 -> DEBU 586 0xc00354a8d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.659 UTC [cauthdsl] func2 -> DEBU 587 0xc00354a8d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.660 UTC [msp.identity] Verify -> DEBU 588 Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +peer0.org1.example.com | 00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +peer0.org1.example.com | "2019-04-22 06:16:46.660 UTC [msp.identity] Verify -> DEBU 589 Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +peer0.org1.example.com | 00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +peer0.org1.example.com | 00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +peer0.org1.example.com | 00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +peer0.org1.example.com | 00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +peer0.org1.example.com | "2019-04-22 06:16:46.661 UTC [cauthdsl] func2 -> DEBU 58a 0xc00354a8d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.661 UTC [cauthdsl] func1 -> DEBU 58b 0xc00354a8d0 gate 1555913806659200200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.661 UTC [policies] Evaluate -> DEBU 58c Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.662 UTC [policies] Evaluate -> DEBU 58d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.662 UTC [policies] Evaluate -> DEBU 58e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.662 UTC [policies] Evaluate -> DEBU 58f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.663 UTC [gossip.gossip] JoinChan -> INFO 590 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:16:46.663 UTC [gossip.gossip] learnAnchorPeers -> INFO 591 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:16:46.664 UTC [gossip.gossip] learnAnchorPeers -> INFO 592 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:16:46.664 UTC [gossip.gossip] learnAnchorPeers -> INFO 593 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:16:46.664 UTC [gossip.service] updateEndpoints -> DEBU 594 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-04-22 06:16:46.666 UTC [peer] updateTrustedRoots -> DEBU 595 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.693 UTC [peer] buildTrustedRootsForChain -> DEBU 596 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.693 UTC [peer] buildTrustedRootsForChain -> DEBU 597 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.694 UTC [peer] buildTrustedRootsForChain -> DEBU 598 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.694 UTC [peer] buildTrustedRootsForChain -> DEBU 599 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.696 UTC [committer.txvalidator] validateTx -> DEBU 59a config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.696 UTC [committer.txvalidator] validateTx -> DEBU 59b [businesschannel] validateTx completes for block 0xc002fe4600 env 0xc003020c80 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:46.696 UTC [committer.txvalidator] Validate -> DEBU 59c got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:16:46.696 UTC [committer.txvalidator] Validate -> INFO 59d [businesschannel] Validated block [1] in 155ms" +peer0.org1.example.com | "2019-04-22 06:16:46.696 UTC [gossip.privdata] listMissingPrivateData -> DEBU 59e Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:16:46.697 UTC [gossip.privdata] StoreBlock -> DEBU 59f [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:16:46.699 UTC [committer] preCommit -> DEBU 5a0 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-04-22 06:16:46.699 UTC [kvledger] CommitWithPvtData -> DEBU 5a1 [businesschannel] Validating state for block [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.699 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5a2 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:16:46.699 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5a3 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:16:46.700 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5a4 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a5 ValidateAndPrepareBatch() for block number = [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a6 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [valimpl] preprocessProtoBlock -> DEBU 5a7 txType=CONFIG" +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [valimpl] processNonEndorserTx -> DEBU 5a8 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [valimpl] processNonEndorserTx -> DEBU 5a9 Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5aa constructing new tx simulator" +orderer0.example.com | "2019-04-22 06:16:43.766 UTC [policies] Manager -> DEBU 934 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:43.766 UTC [common.channelconfig] LogSanityChecks -> DEBU 935 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:16:43.766 UTC [common.capabilities] Supported -> DEBU 936 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:43.766 UTC [common.capabilities] Supported -> DEBU 937 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:43.767 UTC [orderer.common.server] func1 -> DEBU 938 Executing callback to update root CAs" +orderer0.example.com | "2019-04-22 06:16:43.767 UTC [orderer.common.server] updateTrustedRoots -> DEBU 939 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-04-22 06:16:43.767 UTC [orderer.common.server] updateTrustedRoots -> DEBU 93a adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-04-22 06:16:43.768 UTC [orderer.common.server] updateTrustedRoots -> DEBU 93b adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-04-22 06:16:43.768 UTC [orderer.common.server] updateTrustedRoots -> DEBU 93c adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-04-22 06:16:43.769 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 93d [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2019-04-22 06:16:43.769 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 93e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2019-04-22 06:16:43.769 UTC [msp.identity] Sign -> DEBU 93f Sign: plaintext: 0A020801120B0A090A03010203100418...116EAD0C7B3DC81FED0053091F1DEFD6 " +orderer0.example.com | "2019-04-22 06:16:43.769 UTC [msp.identity] Sign -> DEBU 940 Sign: digest: B70B324629B568D7C75D6302DB1E99234F5610609561DB53A7F6F23400B5F2B1 " +orderer0.example.com | "2019-04-22 06:16:43.773 UTC [fsblkstorage] indexBlock -> DEBU 941 Indexing block [blockNum=1, blockHash=[]byte{0x5e, 0xd0, 0xe, 0x26, 0x5e, 0x23, 0xd, 0x4c, 0x65, 0x1, 0x57, 0xd2, 0x90, 0x29, 0x46, 0xb0, 0x9d, 0x51, 0xe3, 0x4a, 0x9, 0x69, 0xcc, 0x77, 0xd7, 0x40, 0x5c, 0x1e, 0x19, 0xe8, 0x49, 0xd1} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=22680 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:43.777 UTC [fsblkstorage] updateCheckpoint -> DEBU 942 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47627], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-04-22 06:16:43.778 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 943 [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2019-04-22 06:16:43.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 944 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:43.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 945 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +orderer0.example.com | "2019-04-22 06:16:43.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 946 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.9µs " +orderer0.example.com | "2019-04-22 06:16:44.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 947 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.2µs " +orderer0.example.com | "2019-04-22 06:16:44.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 948 Sending msg of 28 bytes to 3 on channel businesschannel took 172.7µs" +orderer0.example.com | "2019-04-22 06:16:44.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 949 Sending msg of 28 bytes to 2 on channel businesschannel took 817.8µs" +orderer0.example.com | "2019-04-22 06:16:44.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 94a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 776.2µs " +orderer0.example.com | "2019-04-22 06:16:44.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:44.185 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:44.332 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:44.334 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 94e Sending msg of 28 bytes to 3 on channel testchainid took 56.7µs" +orderer0.example.com | "2019-04-22 06:16:44.335 UTC [orderer.common.cluster.step] sendMessage -> DEBU 94f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228.4µs " +orderer0.example.com | "2019-04-22 06:16:44.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 950 Sending msg of 28 bytes to 2 on channel businesschannel took 40.7µs" +orderer0.example.com | "2019-04-22 06:16:44.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 951 Sending msg of 28 bytes to 3 on channel businesschannel took 155.6µs" +orderer0.example.com | "2019-04-22 06:16:44.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 952 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +orderer0.example.com | "2019-04-22 06:16:44.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 953 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1807ms " +orderer0.example.com | "2019-04-22 06:16:44.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 954 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:44.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 955 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:44.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 956 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:44.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 957 Sending msg of 28 bytes to 3 on channel testchainid took 36.8µs" +orderer0.example.com | "2019-04-22 06:16:44.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 958 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.8µs " +orderer0.example.com | "2019-04-22 06:16:45.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 959 Sending msg of 28 bytes to 2 on channel businesschannel took 53.7µs" +orderer0.example.com | "2019-04-22 06:16:45.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95a Sending msg of 28 bytes to 3 on channel businesschannel took 41.3µs" +orderer0.example.com | "2019-04-22 06:16:45.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 256.4µs " +orderer0.example.com | "2019-04-22 06:16:45.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 271.1µs " +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5ab constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-04-22 06:16:46.701 UTC [peer] GenerateSimulationResults -> DEBU 5ac Processing CONFIG" +orderer0.example.com | "2019-04-22 06:16:45.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.332 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 960 Sending msg of 28 bytes to 3 on channel testchainid took 27.3µs" +orderer0.example.com | "2019-04-22 06:16:45.333 UTC [orderer.common.cluster.step] sendMessage -> DEBU 961 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 457.6µs " +orderer0.example.com | "2019-04-22 06:16:45.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 962 Sending msg of 28 bytes to 2 on channel businesschannel took 46µs" +orderer0.example.com | "2019-04-22 06:16:45.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 963 Sending msg of 28 bytes to 3 on channel businesschannel took 30.1µs" +orderer0.example.com | "2019-04-22 06:16:45.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 964 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.9µs " +orderer0.example.com | "2019-04-22 06:16:45.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 965 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.6µs " +orderer0.example.com | "2019-04-22 06:16:45.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 966 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 967 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.804 UTC [orderer.common.server] Deliver -> DEBU 968 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:45.805 UTC [common.deliver] Handle -> DEBU 969 Starting new deliver loop for 192.168.224.9:34524" +orderer0.example.com | "2019-04-22 06:16:45.805 UTC [common.deliver] Handle -> DEBU 96a Attempting to read seek info message from 192.168.224.9:34524" +orderer0.example.com | "2019-04-22 06:16:45.816 UTC [orderer.common.server] Broadcast -> DEBU 96b Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:16:45.816 UTC [orderer.common.broadcast] Handle -> DEBU 96c Starting new broadcast loop for 192.168.224.9:34526" +orderer0.example.com | "2019-04-22 06:16:45.817 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 96d [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34526" +orderer0.example.com | "2019-04-22 06:16:45.817 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 96e Processing config update message for channel businesschannel" +orderer0.example.com | "2019-04-22 06:16:45.818 UTC [policies] Evaluate -> DEBU 96f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.819 UTC [policies] Evaluate -> DEBU 970 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:45.819 UTC [policies] Evaluate -> DEBU 971 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.819 UTC [policies] Evaluate -> DEBU 972 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:45.820 UTC [policies] Evaluate -> DEBU 973 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.820 UTC [msp] DeserializeIdentity -> DEBU 974 Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:45.821 UTC [msp.identity] newIdentity -> DEBU 975 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.822 UTC [cauthdsl] func1 -> DEBU 976 0xc000ec9d30 gate 1555913805822365700 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:45.822 UTC [cauthdsl] func2 -> DEBU 977 0xc000ec9d30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:45.823 UTC [cauthdsl] func2 -> DEBU 978 0xc000ec9d30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:45.823 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 979 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.823 UTC [msp] Validate -> DEBU 97a MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.824 UTC [msp] getCertificationChain -> DEBU 97b MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.825 UTC [cauthdsl] func2 -> DEBU 97c 0xc000ec9d30 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:45.826 UTC [msp.identity] Verify -> DEBU 97d Verify: digest = 00000000 f3 e6 0d 39 a9 70 ff ca 1c e8 c2 cf 27 e5 46 4f |...9.p......'.FO| +orderer0.example.com | 00000010 22 3a 45 92 2f 9a de 58 80 18 cb ba 84 4b 73 a7 |":E./..X.....Ks.|" +orderer0.example.com | "2019-04-22 06:16:45.826 UTC [msp.identity] Verify -> DEBU 97e Verify: sig = 00000000 30 45 02 21 00 9a 8b 3e da 47 ce 9b ce eb 21 4a |0E.!...>.G....!J| +orderer0.example.com | 00000010 39 09 fc d1 57 8a 6a f6 08 71 fc 93 f7 8b 0e a9 |9...W.j..q......| +orderer0.example.com | 00000020 08 12 ba f3 dc 02 20 12 e7 dd 91 e8 fe 94 6e 68 |...... .......nh| +orderer0.example.com | 00000030 86 f0 a3 31 ba 7b 59 ce c3 0a c3 b0 2e 49 2a 2e |...1.{Y......I*.| +orderer0.example.com | 00000040 e4 59 bb e3 a7 d3 4c |.Y....L|" +orderer0.example.com | "2019-04-22 06:16:45.827 UTC [cauthdsl] func2 -> DEBU 97f 0xc000ec9d30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:45.827 UTC [cauthdsl] func1 -> DEBU 980 0xc000ec9d30 gate 1555913805822365700 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:45.829 UTC [policies] Evaluate -> DEBU 981 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.829 UTC [policies] Evaluate -> DEBU 983 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.830 UTC [policies] Evaluate -> DEBU 984 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:45.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 982 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.830 UTC [policies] Evaluate -> DEBU 985 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:45.831 UTC [policies] Evaluate -> DEBU 986 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:45.831 UTC [policies] Evaluate -> DEBU 988 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:45.831 UTC [common.configtx] addToMap -> DEBU 989 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:45.832 UTC [common.configtx] addToMap -> DEBU 98b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.832 UTC [common.configtx] addToMap -> DEBU 98c Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.832 UTC [common.configtx] addToMap -> DEBU 98d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 336µs " +orderer0.example.com | "2019-04-22 06:16:45.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 987 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +orderer0.example.com | "2019-04-22 06:16:45.833 UTC [common.configtx] addToMap -> DEBU 98e Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.833 UTC [common.configtx] addToMap -> DEBU 98f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 990 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 991 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 992 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 993 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 994 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.835 UTC [common.configtx] addToMap -> DEBU 995 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.835 UTC [common.configtx] addToMap -> DEBU 996 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 997 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 998 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.703 UTC [peer] processChannelConfigTx -> DEBU 5ad channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-04-22 06:16:46.703 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5ae Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:16:46.705 UTC [lockbasedtxmgr] Done -> DEBU 5af Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-04-22 06:16:46.705 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5b0 Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.705 UTC [valinternal] ApplyWriteSet -> DEBU 5b1 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00335fd00)}" +peer0.org1.example.com | "2019-04-22 06:16:46.705 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5b2 validating rwset..." +peer0.org1.example.com | "2019-04-22 06:16:46.706 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5b3 postprocessing ProtoBlock..." +orderer0.example.com | "2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 999 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 99a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.837 UTC [common.configtx] verifyDeltaSet -> DEBU 99b Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.837 UTC [common.configtx] verifyDeltaSet -> DEBU 99c Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.837 UTC [common.configtx] policyForItem -> DEBU 99d Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-04-22 06:16:45.837 UTC [policies] Manager -> DEBU 99e Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 99f Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a0 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a1 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a2 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a3 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.839 UTC [policies] Manager -> DEBU 9a4 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-04-22 06:16:45.839 UTC [policies] Manager -> DEBU 9a5 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.839 UTC [policies] Manager -> DEBU 9a6 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.840 UTC [policies] Manager -> DEBU 9a7 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.840 UTC [policies] Evaluate -> DEBU 9a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:16:45.840 UTC [cauthdsl] func1 -> DEBU 9a9 0xc000d29d70 gate 1555913805840879300 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:45.840 UTC [cauthdsl] func2 -> DEBU 9aa 0xc000d29d70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:45.841 UTC [cauthdsl] func2 -> DEBU 9ab 0xc000d29d70 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:45.841 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ac Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.841 UTC [cauthdsl] func2 -> DEBU 9ad 0xc000d29d70 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:45.841 UTC [msp.identity] Verify -> DEBU 9ae Verify: digest = 00000000 15 3c 35 3e 0a a5 a4 08 d3 8b 10 e1 1e 92 64 23 |.<5>..........d#| +orderer0.example.com | 00000010 29 f6 f1 75 85 a5 47 e9 95 bb 52 8b 72 4c f0 0e |)..u..G...R.rL..|" +orderer0.example.com | "2019-04-22 06:16:45.841 UTC [msp.identity] Verify -> DEBU 9af Verify: sig = 00000000 30 45 02 21 00 f7 9d cd da 3e 12 f0 cc 5b cf e1 |0E.!.....>...[..| +orderer0.example.com | 00000010 ed 4c 16 68 55 be 70 84 69 dc ae 06 51 0b 9e db |.L.hU.p.i...Q...| +orderer0.example.com | 00000020 86 ed f0 44 67 02 20 26 b6 d3 f4 80 93 4a 78 f7 |...Dg. &.....Jx.| +orderer0.example.com | 00000030 54 76 38 f1 be 1f df b1 72 b0 7e 2b 81 03 1c 00 |Tv8.....r.~+....| +orderer0.example.com | 00000040 c1 10 25 d5 0c eb da |..%....|" +orderer0.example.com | "2019-04-22 06:16:45.842 UTC [cauthdsl] func2 -> DEBU 9b0 0xc000d29d70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:45.842 UTC [cauthdsl] func1 -> DEBU 9b1 0xc000d29d70 gate 1555913805840879300 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:45.842 UTC [policies] Evaluate -> DEBU 9b2 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.842 UTC [policies] Evaluate -> DEBU 9b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.843 UTC [common.configtx] recurseConfigMap -> DEBU 9b4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.843 UTC [common.configtx] recurseConfigMap -> DEBU 9b5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.843 UTC [common.configtx] recurseConfigMap -> DEBU 9b6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9b7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.707 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5b4 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:16:46.707 UTC [kvledger] CommitWithPvtData -> DEBU 5b5 [businesschannel] Committing block [1] to storage" +peer0.org1.example.com | "2019-04-22 06:16:46.708 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5b6 Writing block [1] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:16:46.711 UTC [comm.grpc.server] 1 -> INFO 5b7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.709Z grpc.peer_address=192.168.224.5:47498 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=559.2µs +peer0.org1.example.com | "2019-04-22 06:16:46.713 UTC [pvtdatastorage] Prepare -> DEBU 5b8 Saved 0 private data write sets for block [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.715 UTC [msp.identity] Sign -> DEBU 5b9 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:46.715 UTC [msp.identity] Sign -> DEBU 5ba Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:46.716 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5bb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:47498" +peer0.org1.example.com | "2019-04-22 06:16:46.716 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5bc Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47498" +peer0.org1.example.com | "2019-04-22 06:16:46.717 UTC [msp.identity] Verify -> DEBU 5bd Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:16:46.718 UTC [msp.identity] Verify -> DEBU 5be Verify: sig = 00000000 30 44 02 20 6c 7e 42 49 b8 0a cd db a0 e7 bd 4f |0D. l~BI.......O| +peer0.org1.example.com | 00000010 00 1e 14 db fd aa f8 4d 0d 99 d2 6e 93 fd 01 46 |.......M...n...F| +peer0.org1.example.com | 00000020 97 e3 2e 9b 02 20 15 b9 3f 07 bb 23 70 82 41 99 |..... ..?..#p.A.| +peer0.org1.example.com | 00000030 1a 69 49 2a d6 51 2e b0 44 d2 4e a8 d9 66 bd c9 |.iI*.Q..D.N..f..| +peer0.org1.example.com | 00000040 e0 cc 6a 0f 68 c8 |..j.h.|" +peer0.org1.example.com | "2019-04-22 06:16:46.718 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5bf Authenticated 192.168.224.5:47498" +peer0.org1.example.com | "2019-04-22 06:16:46.719 UTC [gossip.comm] GossipStream -> DEBU 5c1 Servicing 192.168.224.5:47498" +peer0.org1.example.com | "2019-04-22 06:16:46.718 UTC [fsblkstorage] indexBlock -> DEBU 5c0 Indexing block [blockNum=1, blockHash=[]byte{0x5e, 0xd0, 0xe, 0x26, 0x5e, 0x23, 0xd, 0x4c, 0x65, 0x1, 0x57, 0xd2, 0x90, 0x29, 0x46, 0xb0, 0x9d, 0x51, 0xe3, 0x4a, 0x9, 0x69, 0xcc, 0x77, 0xd7, 0x40, 0x5c, 0x1e, 0x19, 0xe8, 0x49, 0xd1} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22680 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:16:46.719 UTC [fsblkstorage] indexBlock -> DEBU 5c2 txid [] is a duplicate of a previous tx. Not indexing in txid-index" +peer0.org1.example.com | "2019-04-22 06:16:46.719 UTC [fsblkstorage] indexBlock -> DEBU 5c3 Adding txLoc [fileSuffixNum=0, offset=24012, bytesLength=22680] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:16:46.722 UTC [grpc] infof -> DEBU 5c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:46.723 UTC [gossip.comm] readFromStream -> DEBU 5c5 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:16:46.723 UTC [gossip.comm] func2 -> DEBU 5c6 Client 192.168.224.5:47498 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:46.723 UTC [comm.grpc.server] 1 -> INFO 5c7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:56.714Z grpc.peer_address=192.168.224.5:47498 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.4159ms +peer0.org1.example.com | "2019-04-22 06:16:46.724 UTC [gossip.comm] writeToStream -> DEBU 5c8 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:46.726 UTC [grpc] infof -> DEBU 5c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:46.726 UTC [fsblkstorage] updateCheckpoint -> DEBU 5ca Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47629], isChainEmpty=[false], lastBlockNumber=[1]" +peer0.org1.example.com | "2019-04-22 06:16:46.726 UTC [pvtdatastorage] Commit -> DEBU 5cb Committing private data for block [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.728 UTC [pvtdatastorage] Commit -> DEBU 5cc Committed private data for block [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.728 UTC [kvledger] CommitWithPvtData -> DEBU 5cd [businesschannel] Committing block [1] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.728 UTC [lockbasedtxmgr] Commit -> DEBU 5ce lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.729 UTC [lockbasedtxmgr] Commit -> DEBU 5cf Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.729 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5d0 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:16:46.730 UTC [lockbasedtxmgr] Commit -> DEBU 5d1 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.730 UTC [stateleveldb] ApplyUpdates -> DEBU 5d2 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +orderer0.example.com | "2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9b8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9ba Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9bb Setting policy for key Admins to " +orderer0.example.com | "2019-04-22 06:16:45.845 UTC [common.configtx] recurseConfigMap -> DEBU 9bc Setting policy for key Endorsement to " +orderer0.example.com | "2019-04-22 06:16:45.845 UTC [common.configtx] recurseConfigMap -> DEBU 9bd Setting policy for key Readers to " +orderer0.example.com | "2019-04-22 06:16:45.845 UTC [common.configtx] recurseConfigMap -> DEBU 9be Setting policy for key Writers to " +orderer0.example.com | "2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9bf Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9c0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9c2 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c3 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c6 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c7 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.configtx] recurseConfigMap -> DEBU 9c9 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.configtx] recurseConfigMap -> DEBU 9ca Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9cb Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9cc Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9cd Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ce Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9cf Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d0 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9d1 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d2 Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d3 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9d4 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d5 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9d6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d7 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] Validate -> DEBU 9d8 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [common.channelconfig] validateMSP -> DEBU 9d9 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [msp] newBccspMsp -> DEBU 9da Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [msp] New -> DEBU 9db Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [msp] Setup -> DEBU 9dc Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.848 UTC [msp.identity] newIdentity -> DEBU 9dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.849 UTC [msp.identity] newIdentity -> DEBU 9de Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.849 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9df Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.849 UTC [msp] Validate -> DEBU 9e0 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.849 UTC [msp] getCertificationChain -> DEBU 9e1 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.849 UTC [msp] hasOURole -> DEBU 9e2 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:45.849 UTC [msp] getCertificationChain -> DEBU 9e3 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.849 UTC [common.channelconfig] NewStandardValues -> DEBU 9e4 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:45.850 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e5 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.850 UTC [common.channelconfig] NewStandardValues -> DEBU 9e6 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:45.851 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e7 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:45.851 UTC [common.channelconfig] Validate -> DEBU 9e8 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:16:45.851 UTC [common.channelconfig] validateMSP -> DEBU 9e9 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.851 UTC [msp] newBccspMsp -> DEBU 9ea Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.851 UTC [msp] New -> DEBU 9eb Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.852 UTC [msp] Setup -> DEBU 9ec Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.852 UTC [msp.identity] newIdentity -> DEBU 9ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | "2019-04-22 06:16:46.734 UTC [lockbasedtxmgr] Commit -> DEBU 5d3 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:16:46.735 UTC [lockbasedtxmgr] func1 -> DEBU 5d5 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:16:46.735 UTC [kvledger] CommitWithPvtData -> DEBU 5d6 [businesschannel] Committing block [1] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:16:46.735 UTC [historyleveldb] Commit -> DEBU 5d7 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:16:46.736 UTC [historyleveldb] Commit -> DEBU 5d8 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-04-22 06:16:46.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5d4 Preparing potential purge list working-set for expiringAtBlk [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.736 UTC [leveldbhelper] GetIterator -> DEBU 5d9 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:16:46.737 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5da No expiry entry found for expiringAtBlk [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.738 UTC [historyleveldb] Commit -> DEBU 5db Channel [businesschannel]: Updates committed to history database for blockNo [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.739 UTC [kvledger] CommitWithPvtData -> INFO 5dc [businesschannel] Committed block [1] with 1 transaction(s) in 39ms (state_validation=8ms block_commit=20ms state_commit=6ms)" +peer0.org1.example.com | "2019-04-22 06:16:46.740 UTC [msp.identity] Sign -> DEBU 5dd Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020802 " +peer0.org1.example.com | "2019-04-22 06:16:46.740 UTC [msp.identity] Sign -> DEBU 5de Sign: digest: 73CAA67B75A74144E39C5F4AAFF3BA1461215A7CE81E70C046E60C9CAF3E7604 " +peer0.org1.example.com | "2019-04-22 06:16:46.741 UTC [gossip.state] commitBlock -> DEBU 5df [businesschannel] Committed block [1] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:16:46.742 UTC [gossip.state] deliverPayloads -> DEBU 5e0 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:16:46.742 UTC [gossip.privdata] StoreBlock -> INFO 5e1 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-04-22 06:16:46.742 UTC [gossip.privdata] StoreBlock -> DEBU 5e2 [businesschannel] Validating block [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.743 UTC [committer.txvalidator] Validate -> DEBU 5e3 [businesschannel] START Block Validation for block [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.744 UTC [committer.txvalidator] validateTx -> DEBU 5e4 [businesschannel] validateTx starts for block 0xc0033e7e00 env 0xc003357cc0 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:46.744 UTC [protoutils] ValidateTransaction -> DEBU 5e5 ValidateTransactionEnvelope starts for envelope 0xc003357cc0" +peer0.org1.example.com | "2019-04-22 06:16:46.744 UTC [protoutils] ValidateTransaction -> DEBU 5e6 Header is channel_header:"\010\001\032\006\010\315\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030$qq\027BU\026\330eW\270\365\324\270\016N2\310\005\347\343\375\317\277" " +peer0.org1.example.com | "2019-04-22 06:16:46.745 UTC [protoutils] validateChannelHeader -> DEBU 5e7 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-04-22 06:16:46.745 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e8 begin" +peer0.org1.example.com | "2019-04-22 06:16:46.745 UTC [msp] GetManagerForChain -> DEBU 5e9 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:46.745 UTC [msp] DeserializeIdentity -> DEBU 5ea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.746 UTC [msp.identity] newIdentity -> DEBU 5eb Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.743 UTC [committer.txvalidator] Validate -> DEBU 5ec expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:16:46.747 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ed creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-04-22 06:16:46.750 UTC [msp] Validate -> DEBU 5ee MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.750 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ef creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:46.751 UTC [msp.identity] Verify -> DEBU 5f0 Verify: digest = 00000000 47 08 7e f7 6e 1f 59 d0 d0 17 3f 7c fd 5e 05 dd |G.~.n.Y...?|.^..| +peer0.org1.example.com | 00000010 f2 f5 57 40 ec a6 aa d1 27 98 05 00 0c 2c 45 35 |..W@....'....,E5|" +peer0.org1.example.com | "2019-04-22 06:16:46.751 UTC [msp.identity] Verify -> DEBU 5f1 Verify: sig = 00000000 30 45 02 21 00 eb 6d 42 07 cb 81 91 61 2a fa 7e |0E.!..mB....a*.~| +peer0.org1.example.com | 00000010 b4 96 01 30 37 c3 33 e4 39 4e ea 62 ae 23 ad cb |...07.3.9N.b.#..| +peer0.org1.example.com | 00000020 38 21 bc 2e b7 02 20 79 11 e0 40 58 9f 99 ae 44 |8!.... y..@X...D| +peer0.org1.example.com | 00000030 12 b3 c7 7d 34 a9 a6 70 4a 75 15 9e 3b ed 3f 7d |...}4..pJu..;.?}| +peer0.org1.example.com | 00000040 6c b3 c4 e8 fb 7f 16 |l......|" +peer0.org1.example.com | "2019-04-22 06:16:46.752 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f2 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:46.755 UTC [protoutils] validateConfigTransaction -> DEBU 5f3 validateConfigTransaction starts for data 0xc00369c000, header channel_header:"\010\001\032\006\010\315\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030$qq\027BU\026\330eW\270\365\324\270\016N2\310\005\347\343\375\317\277" " +peer0.org1.example.com | "2019-04-22 06:16:46.755 UTC [committer.txvalidator] validateTx -> DEBU 5f4 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.756 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.756 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.756 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.757 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.757 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.757 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.758 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.758 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.759 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.759 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.759 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.760 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.761 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.761 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.762 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.762 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.764 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.764 UTC [common.configtx] verifyDeltaSet -> DEBU 606 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.766 UTC [common.configtx] verifyDeltaSet -> DEBU 607 Processing change to key: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.767 UTC [common.configtx] policyForItem -> DEBU 608 Getting policy for item Org2MSP with mod_policy Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.767 UTC [policies] Manager -> DEBU 609 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-04-22 06:16:46.768 UTC [policies] Manager -> DEBU 60a Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:16:46.769 UTC [policies] Manager -> DEBU 60b Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.769 UTC [policies] Manager -> DEBU 60c Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.769 UTC [policies] Manager -> DEBU 60d Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.770 UTC [policies] Manager -> DEBU 60e Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.770 UTC [policies] Manager -> DEBU 60f Manager Channel/Application looking up path [Org2MSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.770 UTC [policies] Manager -> DEBU 610 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.771 UTC [policies] Manager -> DEBU 611 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.771 UTC [policies] Manager -> DEBU 612 Manager Channel/Application/Org2MSP looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.771 UTC [policies] Evaluate -> DEBU 613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-04-22 06:16:46.771 UTC [msp] DeserializeIdentity -> DEBU 614 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.778 UTC [msp.identity] newIdentity -> DEBU 615 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.778 UTC [cauthdsl] func1 -> DEBU 616 0xc003692910 gate 1555913806778901700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.778 UTC [cauthdsl] func2 -> DEBU 617 0xc003692910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.779 UTC [cauthdsl] func2 -> DEBU 618 0xc003692910 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.779 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 619 Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.779 UTC [cauthdsl] func2 -> DEBU 61a 0xc003692910 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.779 UTC [msp.identity] Verify -> DEBU 61b Verify: digest = 00000000 15 3c 35 3e 0a a5 a4 08 d3 8b 10 e1 1e 92 64 23 |.<5>..........d#| +peer0.org1.example.com | 00000010 29 f6 f1 75 85 a5 47 e9 95 bb 52 8b 72 4c f0 0e |)..u..G...R.rL..|" +peer0.org1.example.com | "2019-04-22 06:16:46.781 UTC [msp.identity] Verify -> DEBU 61c Verify: sig = 00000000 30 45 02 21 00 f7 9d cd da 3e 12 f0 cc 5b cf e1 |0E.!.....>...[..| +peer0.org1.example.com | 00000010 ed 4c 16 68 55 be 70 84 69 dc ae 06 51 0b 9e db |.L.hU.p.i...Q...| +peer0.org1.example.com | 00000020 86 ed f0 44 67 02 20 26 b6 d3 f4 80 93 4a 78 f7 |...Dg. &.....Jx.| +peer0.org1.example.com | 00000030 54 76 38 f1 be 1f df b1 72 b0 7e 2b 81 03 1c 00 |Tv8.....r.~+....| +peer0.org1.example.com | 00000040 c1 10 25 d5 0c eb da |..%....|" +peer0.org1.example.com | "2019-04-22 06:16:46.782 UTC [cauthdsl] func2 -> DEBU 61d 0xc003692910 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.782 UTC [cauthdsl] func1 -> DEBU 61e 0xc003692910 gate 1555913806778901700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.782 UTC [policies] Evaluate -> DEBU 61f Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.782 UTC [policies] Evaluate -> DEBU 620 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.783 UTC [common.configtx] recurseConfigMap -> DEBU 621 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.783 UTC [common.configtx] recurseConfigMap -> DEBU 622 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.783 UTC [common.configtx] recurseConfigMap -> DEBU 623 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.784 UTC [common.configtx] recurseConfigMap -> DEBU 624 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.784 UTC [common.configtx] recurseConfigMap -> DEBU 625 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.785 UTC [common.configtx] recurseConfigMap -> DEBU 626 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.785 UTC [common.configtx] recurseConfigMap -> DEBU 627 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Readers to " +peer0.org1.example.com | "2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Writers to " +peer0.org1.example.com | "2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Admins to " +peer0.org1.example.com | "2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.788 UTC [common.configtx] recurseConfigMap -> DEBU 631 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 632 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 633 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 634 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 635 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 636 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 637 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:46.790 UTC [common.channelconfig] NewStandardValues -> DEBU 638 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 639 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:16:46.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63a Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:46.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63b Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:16:46.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63c Processing field: Consortium" +peer0.org1.example.com | "2019-04-22 06:16:46.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63d Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.791 UTC [common.channelconfig] NewStandardValues -> DEBU 63e Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63f Processing field: ConsensusType" +peer0.org1.example.com | "2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 640 Processing field: BatchSize" +peer0.org1.example.com | "2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 641 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 642 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 643 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 644 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.793 UTC [common.channelconfig] NewStandardValues -> DEBU 645 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 646 Processing field: Endpoints" +peer0.org1.example.com | "2019-04-22 06:16:46.793 UTC [common.channelconfig] NewStandardValues -> DEBU 647 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 648 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.794 UTC [common.channelconfig] validateMSP -> DEBU 649 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.794 UTC [msp] newBccspMsp -> DEBU 64a Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.794 UTC [msp] New -> DEBU 64b Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.794 UTC [msp] Setup -> DEBU 64c Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-04-22 06:16:46.795 UTC [msp.identity] newIdentity -> DEBU 64d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.796 UTC [msp.identity] newIdentity -> DEBU 64e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.796 UTC [msp] Validate -> DEBU 64f MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.797 UTC [common.channelconfig] NewStandardValues -> DEBU 650 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 651 Processing field: ACLs" +peer0.org1.example.com | "2019-04-22 06:16:46.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 652 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.797 UTC [common.channelconfig] NewStandardValues -> DEBU 653 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 654 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.798 UTC [common.channelconfig] NewStandardValues -> DEBU 655 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 656 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.798 UTC [common.channelconfig] Validate -> DEBU 657 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-04-22 06:16:46.798 UTC [common.channelconfig] validateMSP -> DEBU 658 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.799 UTC [msp] newBccspMsp -> DEBU 659 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.799 UTC [msp] New -> DEBU 65a Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.799 UTC [msp] Setup -> DEBU 65b Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.800 UTC [msp.identity] newIdentity -> DEBU 65c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.801 UTC [msp.identity] newIdentity -> DEBU 65d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.801 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 65e Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.802 UTC [msp] Validate -> DEBU 65f MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.802 UTC [msp] getCertificationChain -> DEBU 660 MSP Org1MSP getting certification chain" +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.853 UTC [msp.identity] newIdentity -> DEBU 9ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.854 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ef Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.854 UTC [msp] Validate -> DEBU 9f0 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.854 UTC [msp] getCertificationChain -> DEBU 9f1 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.855 UTC [msp] hasOURole -> DEBU 9f2 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:45.855 UTC [msp] getCertificationChain -> DEBU 9f3 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.855 UTC [common.channelconfig] NewStandardValues -> DEBU 9f4 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:45.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f5 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:45.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f6 Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:45.856 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f7 Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f8 Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f9 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fa Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.857 UTC [common.channelconfig] NewStandardValues -> DEBU 9fb Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fc Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:45.858 UTC [common.channelconfig] NewStandardValues -> DEBU 9fd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:45.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fe Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:45.858 UTC [common.channelconfig] validateMSP -> DEBU 9ff Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.858 UTC [msp] newBccspMsp -> DEBU a00 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.858 UTC [msp] New -> DEBU a01 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.858 UTC [msp] Setup -> DEBU a02 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:45.859 UTC [msp.identity] newIdentity -> DEBU a03 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | "2019-04-22 06:16:46.803 UTC [msp] hasOURole -> DEBU 661 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:46.803 UTC [msp] getCertificationChain -> DEBU 662 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.803 UTC [common.channelconfig] NewStandardValues -> DEBU 663 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.803 UTC [common.channelconfig] initializeProtosStruct -> DEBU 664 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.803 UTC [common.channelconfig] NewStandardValues -> DEBU 665 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:16:46.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 666 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.804 UTC [common.channelconfig] Validate -> DEBU 667 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-04-22 06:16:46.804 UTC [common.channelconfig] validateMSP -> DEBU 668 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.805 UTC [msp] newBccspMsp -> DEBU 669 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.805 UTC [msp] New -> DEBU 66a Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:16:46.805 UTC [msp] Setup -> DEBU 66b Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.805 UTC [msp.identity] newIdentity -> DEBU 66c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.806 UTC [msp.identity] newIdentity -> DEBU 66d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.860 UTC [msp.identity] newIdentity -> DEBU a04 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.860 UTC [msp] Validate -> DEBU a05 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.861 UTC [msp] Setup -> DEBU a06 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:45.861 UTC [msp] Setup -> DEBU a07 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:45.861 UTC [policies] NewManagerImpl -> DEBU a08 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.861 UTC [policies] NewManagerImpl -> DEBU a09 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.861 UTC [policies] NewManagerImpl -> DEBU a0a Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0b Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0c Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0d Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0e Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0f Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a10 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a11 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a12 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a13 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a14 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a15 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a16 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a17 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a18 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a19 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a1a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a1b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [policies] NewManagerImpl -> DEBU a1c Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [policies] NewManagerImpl -> DEBU a1d Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [policies] NewManagerImpl -> DEBU a1e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a1f Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a20 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a21 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a22 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a23 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a24 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a25 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a26 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a27 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a28 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a29 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a2a Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a2b Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2d Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2e Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a30 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a31 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.807 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 66e Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.807 UTC [msp] Validate -> DEBU 66f MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.808 UTC [msp] getCertificationChain -> DEBU 670 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.808 UTC [msp] hasOURole -> DEBU 671 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:16:46.808 UTC [msp] getCertificationChain -> DEBU 672 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.809 UTC [msp] Setup -> DEBU 673 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-04-22 06:16:46.809 UTC [msp] Setup -> DEBU 674 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-04-22 06:16:46.809 UTC [policies] NewManagerImpl -> DEBU 675 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.809 UTC [policies] NewManagerImpl -> DEBU 676 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.809 UTC [policies] NewManagerImpl -> DEBU 677 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.810 UTC [policies] NewManagerImpl -> DEBU 678 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.810 UTC [policies] NewManagerImpl -> DEBU 679 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.810 UTC [policies] NewManagerImpl -> DEBU 67a Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67b Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.812 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.812 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 685 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 686 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 687 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 688 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 689 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 68a Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 68b Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.815 UTC [common.configtx] addToMap -> DEBU 68c Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:16:46.815 UTC [common.configtx] addToMap -> DEBU 68d Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:16:46.815 UTC [common.configtx] addToMap -> DEBU 68e Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.816 UTC [common.configtx] addToMap -> DEBU 68f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.816 UTC [common.configtx] addToMap -> DEBU 690 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 691 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 692 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.818 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.818 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:16:46.819 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.819 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-04-22 06:16:46.821 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.821 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.821 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a32 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a33 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a34 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a35 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a36 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:45.871 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.871 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:45.872 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:45.872 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:45.872 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:45.872 UTC [common.channelconfig] LogSanityChecks -> DEBU a4d As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:16:45.872 UTC [common.channelconfig] LogSanityChecks -> DEBU a4e As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a4f Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a50 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a51 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a52 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a53 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a54 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a55 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a56 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a57 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a58 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a59 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a5a Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a5b Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a5c Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a5d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [common.capabilities] Supported -> DEBU a5e Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [common.capabilities] Supported -> DEBU a5f Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [msp.identity] Sign -> DEBU a60 Sign: plaintext: 0AD2060A1B08011A0608CDB8F5E50522...CEC30AC3B02E492A2EE459BBE3A7D34C " +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [msp.identity] Sign -> DEBU a61 Sign: digest: 47087EF76E1F59D0D0173F7CFD5E05DDF2F55740ECA6AAD1279805000C2C4535 " +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Evaluate -> DEBU a62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.874 UTC [policies] Evaluate -> DEBU a63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:45.875 UTC [policies] Evaluate -> DEBU a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.875 UTC [policies] Evaluate -> DEBU a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:45.875 UTC [policies] Evaluate -> DEBU a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.875 UTC [msp] DeserializeIdentity -> DEBU a67 Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:45.876 UTC [msp.identity] newIdentity -> DEBU a68 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.877 UTC [cauthdsl] func1 -> DEBU a69 0xc000fb6350 gate 1555913805877824900 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:45.877 UTC [cauthdsl] func2 -> DEBU a6a 0xc000fb6350 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:45.878 UTC [cauthdsl] func2 -> DEBU a6b 0xc000fb6350 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a6c 0xc000fb6350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a6d 0xc000fb6350 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func1 -> DEBU a6e 0xc000fb6350 gate 1555913805877824900 evaluation fails" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a6f Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func1 -> DEBU a72 0xc000fb7600 gate 1555913805881658100 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a73 0xc000fb7600 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a74 0xc000fb7600 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a75 0xc000fb7600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a76 0xc000fb7600 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [cauthdsl] func1 -> DEBU a77 0xc000fb7600 gate 1555913805881658100 evaluation fails" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.881 UTC [policies] func1 -> DEBU a7a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7b Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [cauthdsl] func1 -> DEBU a80 0xc000e2a390 gate 1555913805882203100 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a81 0xc000e2a390 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a82 0xc000e2a390 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a83 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [msp] Validate -> DEBU a84 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a85 0xc000e2a390 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [msp.identity] Verify -> DEBU a86 Verify: digest = 00000000 47 08 7e f7 6e 1f 59 d0 d0 17 3f 7c fd 5e 05 dd |G.~.n.Y...?|.^..| +orderer0.example.com | 00000010 f2 f5 57 40 ec a6 aa d1 27 98 05 00 0c 2c 45 35 |..W@....'....,E5|" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [msp.identity] Verify -> DEBU a87 Verify: sig = 00000000 30 45 02 21 00 eb 6d 42 07 cb 81 91 61 2a fa 7e |0E.!..mB....a*.~| +orderer0.example.com | 00000010 b4 96 01 30 37 c3 33 e4 39 4e ea 62 ae 23 ad cb |...07.3.9N.b.#..| +orderer0.example.com | 00000020 38 21 bc 2e b7 02 20 79 11 e0 40 58 9f 99 ae 44 |8!.... y..@X...D| +orderer0.example.com | 00000030 12 b3 c7 7d 34 a9 a6 70 4a 75 15 9e 3b ed 3f 7d |...}4..pJu..;.?}| +orderer0.example.com | 00000040 6c b3 c4 e8 fb 7f 16 |l......|" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a88 0xc000e2a390 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [cauthdsl] func1 -> DEBU a89 0xc000e2a390 gate 1555913805882203100 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a8a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a8b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a8c Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:45.883 UTC [policies] Evaluate -> DEBU a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:45.883 UTC [policies] Evaluate -> DEBU a8e Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:45.883 UTC [policies] Evaluate -> DEBU a8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:45.883 UTC [orderer.consensus.etcdraft] propose -> INFO a90 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:45.883 UTC [orderer.consensus.etcdraft] serveRequest -> INFO a91 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:45.884 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a92 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34526" +orderer0.example.com | "2019-04-22 06:16:45.884 UTC [orderer.consensus.etcdraft] 2 -> DEBU a93 Proposed block [2] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:45.890 UTC [orderer.common.broadcast] Handle -> WARN a94 Error reading from 192.168.224.9:34526: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:16:45.891 UTC [orderer.common.server] func1 -> DEBU a95 Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:16:45.891 UTC [comm.grpc.server] 1 -> INFO a96 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34526 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=74.9321ms +peer0.org1.example.com | "2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-04-22 06:16:46.824 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-04-22 06:16:46.824 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:16:46.824 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b3 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b4 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b6 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:16:46.827 UTC [common.configtx] addToMap -> DEBU 6b7 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-04-22 06:16:46.827 UTC [common.configtx] addToMap -> DEBU 6b8 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.827 UTC [common.configtx] addToMap -> DEBU 6b9 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 6ba As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-04-22 06:16:46.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bb As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6bc Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6bd Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6be Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6bf Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c0 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c1 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.832 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c2 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-04-22 06:16:46.832 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c3 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-04-22 06:16:46.832 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c4 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c5 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c6 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:16:46.833 UTC [policies] Manager -> DEBU 6c7 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:16:46.833 UTC [policies] Manager -> DEBU 6c8 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-04-22 06:16:46.834 UTC [policies] Manager -> DEBU 6c9 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.834 UTC [common.channelconfig] LogSanityChecks -> DEBU 6ca As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-04-22 06:16:46.834 UTC [common.capabilities] Supported -> DEBU 6cb Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:46.834 UTC [common.capabilities] Supported -> DEBU 6cc Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:16:46.834 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6cd Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.835 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6ce Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.835 UTC [gossip.service] updateAnchors -> DEBU 6cf Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-04-22 06:16:46.835 UTC [gossip.service] updateAnchors -> DEBU 6d0 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-04-22 06:16:46.836 UTC [gossip.service] updateAnchors -> DEBU 6d1 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.836 UTC [policies] Evaluate -> DEBU 6d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.837 UTC [policies] Evaluate -> DEBU 6d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.837 UTC [policies] Evaluate -> DEBU 6d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.837 UTC [msp] DeserializeIdentity -> DEBU 6d7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.837 UTC [msp.identity] newIdentity -> DEBU 6d8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.838 UTC [cauthdsl] func1 -> DEBU 6d9 0xc00049fa90 gate 1555913806838715000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.838 UTC [cauthdsl] func2 -> DEBU 6da 0xc00049fa90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.838 UTC [cauthdsl] func2 -> DEBU 6db 0xc00049fa90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.839 UTC [cauthdsl] func2 -> DEBU 6dc 0xc00049fa90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:46.839 UTC [cauthdsl] func2 -> DEBU 6dd 0xc00049fa90 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:46.839 UTC [cauthdsl] func1 -> DEBU 6de 0xc00049fa90 gate 1555913806838715000 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:46.839 UTC [policies] Evaluate -> DEBU 6df Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.839 UTC [policies] Evaluate -> DEBU 6e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.840 UTC [policies] Evaluate -> DEBU 6e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.840 UTC [cauthdsl] func1 -> DEBU 6e2 0xc00021ec80 gate 1555913806840148900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.840 UTC [cauthdsl] func2 -> DEBU 6e3 0xc00021ec80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.840 UTC [cauthdsl] func2 -> DEBU 6e4 0xc00021ec80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.840 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6e5 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.841 UTC [msp] Validate -> DEBU 6e6 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.841 UTC [msp] getCertificationChain -> DEBU 6e7 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.842 UTC [cauthdsl] func2 -> DEBU 6e8 0xc00021ec80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.842 UTC [msp.identity] Verify -> DEBU 6e9 Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +peer0.org1.example.com | 00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +peer0.org1.example.com | "2019-04-22 06:16:46.842 UTC [msp.identity] Verify -> DEBU 6ea Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +peer0.org1.example.com | 00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +peer0.org1.example.com | 00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +peer0.org1.example.com | 00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +peer0.org1.example.com | 00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +peer0.org1.example.com | "2019-04-22 06:16:46.842 UTC [cauthdsl] func2 -> DEBU 6eb 0xc00021ec80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.842 UTC [cauthdsl] func1 -> DEBU 6ec 0xc00021ec80 gate 1555913806840148900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6ed Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6ef Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.844 UTC [gossip.gossip] JoinChan -> INFO 6f1 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:16:46.844 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f2 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:16:46.845 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f3 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:16:46.845 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f4 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:16:46.845 UTC [gossip.discovery] Connect -> DEBU 6f5 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-04-22 06:16:46.845 UTC [gossip.discovery] Connect -> DEBU 6f6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.845 UTC [gossip.service] updateEndpoints -> DEBU 6f7 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-04-22 06:16:46.846 UTC [peer] updateTrustedRoots -> DEBU 6f8 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.846 UTC [grpc] DialContext -> DEBU 6f9 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:16:46.846 UTC [grpc] DialContext -> DEBU 6fa scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:16:46.846 UTC [grpc] NewAddress -> DEBU 6fb ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:16:46.846 UTC [grpc] switchBalancer -> DEBU 6fc ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:16:46.846 UTC [grpc] HandleSubConnStateChange -> DEBU 6fd pickfirstBalancer: HandleSubConnStateChange: 0xc000317c00, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:16:46.851 UTC [grpc] HandleSubConnStateChange -> DEBU 6fe pickfirstBalancer: HandleSubConnStateChange: 0xc000317c00, READY" +peer0.org1.example.com | "2019-04-22 06:16:46.854 UTC [msp.identity] Sign -> DEBU 6ff Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:46.854 UTC [msp.identity] Sign -> DEBU 700 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:46.855 UTC [gossip.comm] authenticateRemotePeer -> DEBU 701 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.859 UTC [gossip.comm] authenticateRemotePeer -> DEBU 702 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.859 UTC [msp] DeserializeIdentity -> DEBU 703 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.859 UTC [msp] DeserializeIdentity -> DEBU 704 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.860 UTC [msp.identity] newIdentity -> DEBU 705 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.861 UTC [msp] Validate -> DEBU 706 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.862 UTC [msp] getCertificationChain -> DEBU 707 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.862 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.863 UTC [msp] DeserializeIdentity -> DEBU 709 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.864 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.864 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.866 UTC [msp] DeserializeIdentity -> DEBU 70c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.867 UTC [policies] Evaluate -> DEBU 710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.867 UTC [policies] Evaluate -> DEBU 711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.867 UTC [peer] buildTrustedRootsForChain -> DEBU 712 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.867 UTC [peer] buildTrustedRootsForChain -> DEBU 714 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.867 UTC [peer] buildTrustedRootsForChain -> DEBU 715 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.868 UTC [peer] buildTrustedRootsForChain -> DEBU 716 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-04-22 06:16:46.867 UTC [policies] Evaluate -> DEBU 713 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.869 UTC [cauthdsl] func1 -> DEBU 717 0xc000329660 gate 1555913806868997300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.869 UTC [cauthdsl] func2 -> DEBU 718 0xc000329660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.869 UTC [cauthdsl] func2 -> DEBU 719 0xc000329660 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.869 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 71a Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.869 UTC [committer.txvalidator] validateTx -> DEBU 71b config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:46.870 UTC [committer.txvalidator] validateTx -> DEBU 71c [businesschannel] validateTx completes for block 0xc0033e7e00 env 0xc003357cc0 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:46.870 UTC [committer.txvalidator] Validate -> DEBU 71e got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:16:46.870 UTC [committer.txvalidator] Validate -> INFO 71f [businesschannel] Validated block [2] in 126ms" +peer0.org1.example.com | "2019-04-22 06:16:46.870 UTC [gossip.privdata] listMissingPrivateData -> DEBU 720 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:16:46.869 UTC [msp] Validate -> DEBU 71d MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.871 UTC [msp] getCertificationChain -> DEBU 721 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.871 UTC [cauthdsl] func2 -> DEBU 722 0xc000329660 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.871 UTC [msp.identity] Verify -> DEBU 723 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:16:46.871 UTC [msp.identity] Verify -> DEBU 724 Verify: sig = 00000000 30 45 02 21 00 90 8d 0f 76 e1 0e 19 5a 2a a5 a8 |0E.!....v...Z*..| +peer0.org1.example.com | 00000010 2a 75 32 8c 96 d2 be 28 cd 64 94 8f 31 30 b0 df |*u2....(.d..10..| +peer0.org1.example.com | 00000020 2a 54 8f 33 7e 02 20 6f 09 78 39 2b 7d 25 75 1e |*T.3~. o.x9+}%u.| +peer0.org1.example.com | 00000030 97 7f 27 47 d7 18 90 ae c6 e1 b9 d4 03 95 8d 99 |..'G............| +peer0.org1.example.com | 00000040 d3 a8 a0 b1 49 f2 d7 |....I..|" +peer0.org1.example.com | "2019-04-22 06:16:46.872 UTC [cauthdsl] func2 -> DEBU 725 0xc000329660 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:45.891 UTC [grpc] infof -> DEBU a97 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:45.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a98 Sending msg of 22867 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-04-22 06:16:45.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a99 Sending msg of 22867 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-04-22 06:16:45.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU a9a Send of ConsensusRequest for channel businesschannel with payload of size 22867 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +orderer0.example.com | "2019-04-22 06:16:45.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU a9b Send of ConsensusRequest for channel businesschannel with payload of size 22867 to orderer1.example.com(orderer1.example.com:7050) took 303.9µs " +orderer0.example.com | "2019-04-22 06:16:45.898 UTC [common.deliver] Handle -> WARN a9c Error reading from 192.168.224.9:34524: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:16:45.901 UTC [orderer.common.server] func1 -> DEBU a9d Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:16:45.901 UTC [comm.grpc.server] 1 -> INFO a9e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34524 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=96.5274ms +orderer0.example.com | "2019-04-22 06:16:45.903 UTC [grpc] infof -> DEBU a9f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:45.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.904 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa1 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +orderer0.example.com | "2019-04-22 06:16:45.904 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +orderer0.example.com | "2019-04-22 06:16:45.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa3 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.905 UTC [orderer.consensus.etcdraft] writeBlock -> INFO aa4 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:45.905 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.8µs " +orderer0.example.com | "2019-04-22 06:16:45.905 UTC [common.configtx] addToMap -> DEBU aa6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:45.906 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +orderer0.example.com | "2019-04-22 06:16:45.906 UTC [common.configtx] addToMap -> DEBU aa8 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.916 UTC [common.configtx] addToMap -> DEBU aaa Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU aab Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:45.921 UTC [common.configtx] addToMap -> DEBU aac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.926 UTC [common.configtx] addToMap -> DEBU aad Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.926 UTC [common.configtx] addToMap -> DEBU aae Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU aaf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab1 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab2 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab3 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab4 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.931 UTC [common.configtx] addToMap -> DEBU ab9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.931 UTC [common.configtx] verifyDeltaSet -> DEBU aba Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.932 UTC [common.configtx] verifyDeltaSet -> DEBU abb Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.932 UTC [common.configtx] policyForItem -> DEBU abc Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-04-22 06:16:45.932 UTC [policies] Manager -> DEBU abd Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:45.932 UTC [policies] Manager -> DEBU abe Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:45.933 UTC [policies] Manager -> DEBU abf Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:45.937 UTC [policies] Manager -> DEBU ac0 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.938 UTC [policies] Manager -> DEBU ac1 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.939 UTC [policies] Manager -> DEBU ac2 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.939 UTC [policies] Manager -> DEBU ac3 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-04-22 06:16:45.939 UTC [policies] Manager -> DEBU ac4 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.940 UTC [policies] Manager -> DEBU ac5 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.940 UTC [policies] Manager -> DEBU ac6 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.940 UTC [policies] Evaluate -> DEBU ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-04-22 06:16:46.872 UTC [cauthdsl] func1 -> DEBU 726 0xc000329660 gate 1555913806868997300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.872 UTC [policies] Evaluate -> DEBU 727 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.872 UTC [policies] Evaluate -> DEBU 728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.872 UTC [policies] Evaluate -> DEBU 729 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.873 UTC [policies] Evaluate -> DEBU 72a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.873 UTC [gossip.comm] authenticateRemotePeer -> DEBU 72b Authenticated 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.873 UTC [msp] DeserializeIdentity -> DEBU 72c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.873 UTC [msp] DeserializeIdentity -> DEBU 72d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.873 UTC [msp.identity] newIdentity -> DEBU 72e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | "2019-04-22 06:16:45.942 UTC [cauthdsl] func1 -> DEBU ac8 0xc000c062a0 gate 1555913805942123600 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:45.942 UTC [cauthdsl] func2 -> DEBU ac9 0xc000c062a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:45.942 UTC [cauthdsl] func2 -> DEBU aca 0xc000c062a0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:45.943 UTC [cauthdsl] func2 -> DEBU acb 0xc000c062a0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:45.943 UTC [msp.identity] Verify -> DEBU acc Verify: digest = 00000000 15 3c 35 3e 0a a5 a4 08 d3 8b 10 e1 1e 92 64 23 |.<5>..........d#| +orderer0.example.com | 00000010 29 f6 f1 75 85 a5 47 e9 95 bb 52 8b 72 4c f0 0e |)..u..G...R.rL..|" +orderer0.example.com | "2019-04-22 06:16:45.943 UTC [msp.identity] Verify -> DEBU acd Verify: sig = 00000000 30 45 02 21 00 f7 9d cd da 3e 12 f0 cc 5b cf e1 |0E.!.....>...[..| +orderer0.example.com | 00000010 ed 4c 16 68 55 be 70 84 69 dc ae 06 51 0b 9e db |.L.hU.p.i...Q...| +orderer0.example.com | 00000020 86 ed f0 44 67 02 20 26 b6 d3 f4 80 93 4a 78 f7 |...Dg. &.....Jx.| +orderer0.example.com | 00000030 54 76 38 f1 be 1f df b1 72 b0 7e 2b 81 03 1c 00 |Tv8.....r.~+....| +orderer0.example.com | 00000040 c1 10 25 d5 0c eb da |..%....|" +orderer0.example.com | "2019-04-22 06:16:45.945 UTC [cauthdsl] func2 -> DEBU ace 0xc000c062a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:45.946 UTC [cauthdsl] func1 -> DEBU acf 0xc000c062a0 gate 1555913805942123600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:45.946 UTC [policies] Evaluate -> DEBU ad0 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.946 UTC [policies] Evaluate -> DEBU ad1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad6 Setting policy for key Admins to " +orderer0.example.com | "2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ad7 Setting policy for key Endorsement to " +orderer0.example.com | "2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ad8 Setting policy for key Readers to " +orderer0.example.com | "2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ad9 Setting policy for key Writers to " +orderer0.example.com | "2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ada Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU adb Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.949 UTC [common.configtx] recurseConfigMap -> DEBU adc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.950 UTC [common.configtx] recurseConfigMap -> DEBU add Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.950 UTC [common.configtx] recurseConfigMap -> DEBU ade Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU adf Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU ae0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU ae1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU ae2 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.952 UTC [common.configtx] recurseConfigMap -> DEBU ae3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae5 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.954 UTC [common.configtx] recurseConfigMap -> DEBU ae8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:16:45.954 UTC [common.channelconfig] NewStandardValues -> DEBU ae9 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aea Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aeb Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aec Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aed Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aee Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.955 UTC [common.channelconfig] NewStandardValues -> DEBU aef Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:16:45.955 UTC [common.channelconfig] initializeProtosStruct -> DEBU af0 Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:16:45.955 UTC [common.channelconfig] initializeProtosStruct -> DEBU af1 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.955 UTC [common.channelconfig] NewStandardValues -> DEBU af2 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:45.955 UTC [common.channelconfig] initializeProtosStruct -> DEBU af3 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.956 UTC [common.channelconfig] NewStandardValues -> DEBU af4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:45.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU af5 Processing field: MSP" +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:46.874 UTC [msp.identity] Sign -> DEBU 72f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151010 " +peer0.org1.example.com | "2019-04-22 06:16:46.874 UTC [msp.identity] Sign -> DEBU 730 Sign: digest: 1250EC7C87C9970775A80227639D533F13572B72A5C341719C13F9369B5EF15E " +peer0.org1.example.com | "2019-04-22 06:16:46.875 UTC [msp.identity] Sign -> DEBU 731 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:46.875 UTC [msp.identity] Sign -> DEBU 732 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:46.876 UTC [msp] DeserializeIdentity -> DEBU 733 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.876 UTC [gossip.comm] Send -> DEBU 734 Entering, sending GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:46.876 UTC [gossip.comm] sendToEndpoint -> DEBU 735 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.876 UTC [gossip.comm] createConnection -> DEBU 736 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:46.877 UTC [grpc] DialContext -> DEBU 737 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:16:46.880 UTC [grpc] DialContext -> DEBU 73a scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:16:46.880 UTC [grpc] NewAddress -> DEBU 73b ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:16:46.880 UTC [grpc] switchBalancer -> DEBU 73c ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:16:46.880 UTC [grpc] HandleSubConnStateChange -> DEBU 73d pickfirstBalancer: HandleSubConnStateChange: 0xc002259470, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:16:46.870 UTC [gossip.privdata] StoreBlock -> DEBU 738 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:16:46.880 UTC [committer] preCommit -> DEBU 73e Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [kvledger] CommitWithPvtData -> DEBU 73f [businesschannel] Validating state for block [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 740 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 741 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 742 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 743 ValidateAndPrepareBatch() for block number = [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 744 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [valimpl] preprocessProtoBlock -> DEBU 745 txType=CONFIG" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [valimpl] processNonEndorserTx -> DEBU 746 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-04-22 06:16:46.881 UTC [valimpl] processNonEndorserTx -> DEBU 747 Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-04-22 06:16:46.879 UTC [grpc] infof -> DEBU 739 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:46.882 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 748 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:46.882 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 749 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-04-22 06:16:46.883 UTC [peer] GenerateSimulationResults -> DEBU 74a Processing CONFIG" +orderer0.example.com | "2019-04-22 06:16:45.956 UTC [common.channelconfig] Validate -> DEBU af6 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:16:45.956 UTC [common.channelconfig] validateMSP -> DEBU af7 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.957 UTC [msp] newBccspMsp -> DEBU af8 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.957 UTC [msp] New -> DEBU af9 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.957 UTC [msp] Setup -> DEBU afa Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.957 UTC [msp.identity] newIdentity -> DEBU afb Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.958 UTC [msp.identity] newIdentity -> DEBU afc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.961 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU afd Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.962 UTC [msp] Validate -> DEBU afe MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.967 UTC [msp] getCertificationChain -> DEBU aff MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.967 UTC [msp] hasOURole -> DEBU b00 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:45.967 UTC [msp] getCertificationChain -> DEBU b01 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.968 UTC [common.channelconfig] NewStandardValues -> DEBU b02 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:16:45.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU b03 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.968 UTC [common.channelconfig] NewStandardValues -> DEBU b04 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:45.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU b05 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:45.969 UTC [common.channelconfig] Validate -> DEBU b06 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:16:45.969 UTC [common.channelconfig] validateMSP -> DEBU b07 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.969 UTC [msp] newBccspMsp -> DEBU b08 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.969 UTC [msp] New -> DEBU b09 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.970 UTC [msp] Setup -> DEBU b0a Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.970 UTC [msp.identity] newIdentity -> DEBU b0b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.971 UTC [msp.identity] newIdentity -> DEBU b0c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.972 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b0d Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.972 UTC [msp] Validate -> DEBU b0e MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.973 UTC [msp] getCertificationChain -> DEBU b0f MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.973 UTC [msp] hasOURole -> DEBU b10 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:16:45.974 UTC [msp] getCertificationChain -> DEBU b11 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:45.974 UTC [common.channelconfig] NewStandardValues -> DEBU b12 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b13 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b14 Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b15 Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b16 Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b17 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU b18 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [common.channelconfig] NewStandardValues -> DEBU b19 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1a Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [common.channelconfig] NewStandardValues -> DEBU b1b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1c Processing field: MSP" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [common.channelconfig] validateMSP -> DEBU b1d Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [msp] newBccspMsp -> DEBU b1e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.976 UTC [msp] New -> DEBU b1f Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:16:45.977 UTC [msp] Setup -> DEBU b20 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:16:45.978 UTC [msp.identity] newIdentity -> DEBU b21 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.979 UTC [msp.identity] newIdentity -> DEBU b22 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:45.980 UTC [msp] Validate -> DEBU b23 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:16:45.980 UTC [msp] Setup -> DEBU b24 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-04-22 06:16:45.980 UTC [msp] Setup -> DEBU b25 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b26 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b27 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b28 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b29 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2a Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2b Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2c Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2d Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2e Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2f Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b30 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b31 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b32 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b33 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:16:46.884 UTC [peer] processChannelConfigTx -> DEBU 74b channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-04-22 06:16:46.884 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 74c Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:16:46.884 UTC [lockbasedtxmgr] Done -> DEBU 74d Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-04-22 06:16:46.885 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 74e Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.886 UTC [valinternal] ApplyWriteSet -> DEBU 74f txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00254abc0)}" +peer0.org1.example.com | "2019-04-22 06:16:46.886 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 750 validating rwset..." +peer0.org1.example.com | "2019-04-22 06:16:46.886 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 751 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:46.886 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 752 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:16:46.886 UTC [kvledger] CommitWithPvtData -> DEBU 753 [businesschannel] Committing block [2] to storage" +peer0.org1.example.com | "2019-04-22 06:16:46.887 UTC [ledgerstorage] CommitWithPvtData -> DEBU 754 Writing block [2] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:16:46.888 UTC [grpc] HandleSubConnStateChange -> DEBU 755 pickfirstBalancer: HandleSubConnStateChange: 0xc002259470, READY" +peer0.org1.example.com | "2019-04-22 06:16:46.891 UTC [msp.identity] Sign -> DEBU 756 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:46.891 UTC [msp.identity] Sign -> DEBU 757 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:46.891 UTC [pvtdatastorage] Prepare -> DEBU 758 Saved 0 private data write sets for block [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 759 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +orderer0.example.com | "2019-04-22 06:16:45.982 UTC [policies] NewManagerImpl -> DEBU b34 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.982 UTC [policies] NewManagerImpl -> DEBU b35 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.982 UTC [policies] NewManagerImpl -> DEBU b36 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.983 UTC [policies] NewManagerImpl -> DEBU b37 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.983 UTC [policies] NewManagerImpl -> DEBU b38 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b39 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b3a Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b3b Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b3c Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:16:45.985 UTC [common.configtx] addToMap -> DEBU b3d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:16:45.985 UTC [common.configtx] addToMap -> DEBU b3e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:16:45.985 UTC [common.configtx] addToMap -> DEBU b3f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b40 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b41 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b42 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b43 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:46.896 UTC [gossip.comm] authenticateRemotePeer -> DEBU 75a Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.896 UTC [msp] DeserializeIdentity -> DEBU 75b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.896 UTC [msp] Validate -> DEBU 75c MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.897 UTC [fsblkstorage] indexBlock -> DEBU 75d Indexing block [blockNum=2, blockHash=[]byte{0x6d, 0x11, 0xeb, 0x2e, 0x10, 0x1a, 0x3a, 0x96, 0x4e, 0x56, 0x1f, 0x50, 0xec, 0x8f, 0x61, 0x8, 0xef, 0x5f, 0xdb, 0x7f, 0x99, 0x66, 0x87, 0x9e, 0x99, 0xf2, 0xec, 0x93, 0xf6, 0xb8, 0x20, 0x1c} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=22738 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:16:46.897 UTC [fsblkstorage] indexBlock -> DEBU 75e txid [] is a duplicate of a previous tx. Not indexing in txid-index" +peer0.org1.example.com | "2019-04-22 06:16:46.897 UTC [fsblkstorage] indexBlock -> DEBU 75f Adding txLoc [fileSuffixNum=0, offset=47700, bytesLength=22738] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:16:46.898 UTC [msp] getCertificationChain -> DEBU 760 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.898 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 761 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.899 UTC [msp] DeserializeIdentity -> DEBU 762 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.899 UTC [fsblkstorage] updateCheckpoint -> DEBU 763 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71375], isChainEmpty=[false], lastBlockNumber=[2]" +peer0.org1.example.com | "2019-04-22 06:16:46.899 UTC [pvtdatastorage] Commit -> DEBU 764 Committing private data for block [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 765 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.900 UTC [msp] DeserializeIdentity -> DEBU 766 Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b46 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b47 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b48 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b49 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b4a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b4b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b4c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b4d Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b4e Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b4f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b50 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b51 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b52 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b53 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b56 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b57 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b5f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b60 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b61 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b62 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:16:45.994 UTC [common.configtx] addToMap -> DEBU b63 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:16:45.994 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b65 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b66 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b67 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b68 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b69 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b6a Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.channelconfig] LogSanityChecks -> DEBU b6b As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:16:45.995 UTC [common.channelconfig] LogSanityChecks -> DEBU b6c As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b6d Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b6e Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b6f Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b70 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b71 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b72 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b73 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b74 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b75 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b76 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b77 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b78 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b79 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b7a Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b7b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [common.capabilities] Supported -> DEBU b7c Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:45.997 UTC [common.capabilities] Supported -> DEBU b7d Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [orderer.common.server] func1 -> DEBU b7e Executing callback to update root CAs" +peer0.org1.example.com | "2019-04-22 06:16:46.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 767 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 768 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 769 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [policies] Evaluate -> DEBU 76a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [policies] Evaluate -> DEBU 76b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [policies] Evaluate -> DEBU 76c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [cauthdsl] func1 -> DEBU 76d 0xc0022d9750 gate 1555913806901899800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [cauthdsl] func2 -> DEBU 76e 0xc0022d9750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.901 UTC [cauthdsl] func2 -> DEBU 76f 0xc0022d9750 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.902 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 770 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:46.902 UTC [msp] Validate -> DEBU 771 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:46.902 UTC [msp] getCertificationChain -> DEBU 772 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:46.903 UTC [cauthdsl] func2 -> DEBU 773 0xc0022d9750 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.903 UTC [pvtdatastorage] Commit -> DEBU 774 Committed private data for block [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.903 UTC [msp.identity] Verify -> DEBU 775 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:16:46.904 UTC [kvledger] CommitWithPvtData -> DEBU 776 [businesschannel] Committing block [2] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.904 UTC [lockbasedtxmgr] Commit -> DEBU 777 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.904 UTC [lockbasedtxmgr] Commit -> DEBU 778 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.904 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 779 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:16:46.905 UTC [lockbasedtxmgr] Commit -> DEBU 77b Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:46.905 UTC [stateleveldb] ApplyUpdates -> DEBU 77c Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-04-22 06:16:46.904 UTC [msp.identity] Verify -> DEBU 77a Verify: sig = 00000000 30 44 02 20 62 54 e2 cc a1 34 15 76 ea 67 e9 66 |0D. bT...4.v.g.f| +peer0.org1.example.com | 00000010 ab 67 e1 a0 ee 00 ef 67 70 6d 7e 89 10 47 84 de |.g.....gpm~..G..| +peer0.org1.example.com | 00000020 b6 d3 86 12 02 20 01 0a a9 b4 30 1b 25 30 de 95 |..... ....0.%0..| +peer0.org1.example.com | 00000030 c8 63 a2 66 c8 46 0e 05 1e 7f f3 c0 06 b5 7e ca |.c.f.F........~.| +peer0.org1.example.com | 00000040 00 c5 16 44 a4 e0 |...D..|" +peer0.org1.example.com | "2019-04-22 06:16:46.906 UTC [cauthdsl] func2 -> DEBU 77d 0xc0022d9750 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.906 UTC [cauthdsl] func1 -> DEBU 77e 0xc0022d9750 gate 1555913806901899800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.906 UTC [policies] Evaluate -> DEBU 77f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.907 UTC [policies] Evaluate -> DEBU 780 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.907 UTC [policies] Evaluate -> DEBU 781 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.907 UTC [policies] Evaluate -> DEBU 782 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.907 UTC [gossip.comm] authenticateRemotePeer -> DEBU 783 Authenticated 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.908 UTC [gossip.comm] createConnection -> DEBU 784 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.908 UTC [gossip.comm] sendToEndpoint -> DEBU 785 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.909 UTC [lockbasedtxmgr] Commit -> DEBU 786 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:16:46.909 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 787 Preparing potential purge list working-set for expiringAtBlk [3]" +peer0.org1.example.com | "2019-04-22 06:16:46.909 UTC [leveldbhelper] GetIterator -> DEBU 788 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:16:46.909 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 789 No expiry entry found for expiringAtBlk [3]" +peer0.org1.example.com | "2019-04-22 06:16:46.910 UTC [lockbasedtxmgr] func1 -> DEBU 78a launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:16:46.910 UTC [kvledger] CommitWithPvtData -> DEBU 78b [businesschannel] Committing block [2] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:16:46.910 UTC [historyleveldb] Commit -> DEBU 78c Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:16:46.911 UTC [historyleveldb] Commit -> DEBU 78d Skipping transaction [0] since it is not an endorsement transaction" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b7f updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b80 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b81 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b82 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b83 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b84 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [msp.identity] Sign -> DEBU b85 Sign: plaintext: 0A020802120B0A090A03010203100418...888F637BCE14A17492920A32E1B0C350 " +orderer0.example.com | "2019-04-22 06:16:45.998 UTC [msp.identity] Sign -> DEBU b86 Sign: digest: 9172803ED5D480DB989C37A261F97EF8DF9A19BC44871E398C3D696398128B75 " +orderer0.example.com | "2019-04-22 06:16:46.001 UTC [fsblkstorage] indexBlock -> DEBU b87 Indexing block [blockNum=2, blockHash=[]byte{0x6d, 0x11, 0xeb, 0x2e, 0x10, 0x1a, 0x3a, 0x96, 0x4e, 0x56, 0x1f, 0x50, 0xec, 0x8f, 0x61, 0x8, 0xef, 0x5f, 0xdb, 0x7f, 0x99, 0x66, 0x87, 0x9e, 0x99, 0xf2, 0xec, 0x93, 0xf6, 0xb8, 0x20, 0x1c} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=22738 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:46.003 UTC [fsblkstorage] updateCheckpoint -> DEBU b88 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71372], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2019-04-22 06:16:46.003 UTC [orderer.commmon.multichannel] commitBlock -> DEBU b89 [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2019-04-22 06:16:46.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b8a Sending msg of 28 bytes to 2 on channel businesschannel took 43.1µs" +orderer0.example.com | "2019-04-22 06:16:46.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b8b Sending msg of 28 bytes to 3 on channel businesschannel took 34.4µs" +orderer0.example.com | "2019-04-22 06:16:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU b8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 561.2µs " +orderer0.example.com | "2019-04-22 06:16:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU b8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 990.3µs " +orderer0.example.com | "2019-04-22 06:16:46.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU b8e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:46.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU b8f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:46.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU b90 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:46.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b91 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2019-04-22 06:16:46.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU b92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.9µs " +orderer0.example.com | "2019-04-22 06:16:46.511 UTC [orderer.common.server] Deliver -> DEBU b93 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:46.511 UTC [common.deliver] Handle -> DEBU b94 Starting new deliver loop for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:16:46.511 UTC [common.deliver] Handle -> DEBU b95 Attempting to read seek info message from 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:16:46.514 UTC [policies] Evaluate -> DEBU b96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:16:46.515 UTC [policies] Evaluate -> DEBU b97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:46.515 UTC [policies] Evaluate -> DEBU b98 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:16:46.516 UTC [policies] Evaluate -> DEBU b99 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:46.516 UTC [policies] Evaluate -> DEBU b9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:16:46.516 UTC [msp] DeserializeIdentity -> DEBU b9b Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:46.517 UTC [msp.identity] newIdentity -> DEBU b9c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +orderer0.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +orderer0.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | "2019-04-22 06:16:46.912 UTC [gossip.pull] Hello -> DEBU 78e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.912 UTC [gossip.comm] Send -> DEBU 78f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 790 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.913 UTC [gossip.comm] createConnection -> DEBU 791 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:46.914 UTC [grpc] DialContext -> DEBU 792 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:16:46.915 UTC [grpc] DialContext -> DEBU 793 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:16:46.915 UTC [historyleveldb] Commit -> DEBU 794 Channel [businesschannel]: Updates committed to history database for blockNo [2]" +peer0.org1.example.com | "2019-04-22 06:16:46.915 UTC [kvledger] CommitWithPvtData -> INFO 795 [businesschannel] Committed block [2] with 1 transaction(s) in 34ms (state_validation=5ms block_commit=17ms state_commit=6ms)" +peer0.org1.example.com | "2019-04-22 06:16:46.915 UTC [grpc] NewAddress -> DEBU 796 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:16:46.916 UTC [grpc] switchBalancer -> DEBU 799 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:16:46.916 UTC [msp.identity] Sign -> DEBU 79a Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020803 " +peer0.org1.example.com | "2019-04-22 06:16:46.917 UTC [msp.identity] Sign -> DEBU 79b Sign: digest: 6059121B8483FCD27325D7BF52C7DD1AB6157EFA82B30E9F7AB971FF972DA4F4 " +peer0.org1.example.com | "2019-04-22 06:16:46.917 UTC [gossip.state] commitBlock -> DEBU 79c [businesschannel] Committed block [2] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:16:46.915 UTC [msp.identity] Sign -> DEBU 797 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151011 " +peer0.org1.example.com | "2019-04-22 06:16:46.917 UTC [msp.identity] Sign -> DEBU 79d Sign: digest: 22A1A57694F45418A97B3FE640CECD9F8DF7F7C8D689224317FF420B3F987371 " +peer0.org1.example.com | "2019-04-22 06:16:46.918 UTC [msp.identity] Sign -> DEBU 79e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:46.918 UTC [msp.identity] Sign -> DEBU 79f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:46.918 UTC [grpc] HandleSubConnStateChange -> DEBU 7a0 pickfirstBalancer: HandleSubConnStateChange: 0xc002486840, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:16:46.918 UTC [gossip.comm] Send -> DEBU 7a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:46.918 UTC [gossip.comm] sendToEndpoint -> DEBU 7a2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.916 UTC [gossip.comm] func1 -> DEBU 798 Got message: GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.919 UTC [gossip.gossip] handleMessage -> DEBU 7a3 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.919 UTC [gossip.gossip] handleMessage -> DEBU 7a4 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7a5 Got message: GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.919 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:46.919 UTC [msp.identity] Verify -> DEBU 7a7 Verify: digest = 00000000 12 50 ec 7c 87 c9 97 07 75 a8 02 27 63 9d 53 3f |.P.|....u..'c.S?| +peer0.org1.example.com | 00000010 13 57 2b 72 a5 c3 41 71 9c 13 f9 36 9b 5e f1 5e |.W+r..Aq...6.^.^|" +peer0.org1.example.com | "2019-04-22 06:16:46.920 UTC [msp.identity] Verify -> DEBU 7a8 Verify: sig = 00000000 30 45 02 21 00 dd bb d7 ca 17 47 2c c0 d2 30 3c |0E.!......G,..0<| +peer0.org1.example.com | 00000010 cb 9d f7 aa f9 3f 8a 24 3c 6d 4b 08 aa 4c bd 83 |.....?.$]L..S.,.| +peer0.org1.example.com | 00000030 08 c2 e2 6a ce c7 b3 d7 86 f9 36 f5 9f df 0a 4f |...j......6....O| +peer0.org1.example.com | 00000040 00 9b 68 96 ad fc 93 |..h....|" +peer0.org1.example.com | "2019-04-22 06:16:46.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.920 UTC [gossip.discovery] isSentByMe -> DEBU 7aa Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ab Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7ac Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:46.921 UTC [msp.identity] Verify -> DEBU 7ad Verify: digest = 00000000 8d 76 57 8c b6 3c 1f dd a3 67 4f 3c 84 05 cb 50 |.vW..<...gO<...P| +peer0.org1.example.com | 00000010 76 ed b4 dc 66 16 c4 a5 57 b9 95 f2 43 58 5a 3c |v...f...W...CXZ<|" +peer0.org1.example.com | "2019-04-22 06:16:46.921 UTC [msp.identity] Verify -> DEBU 7ae Verify: sig = 00000000 30 45 02 21 00 a0 65 4c 71 a3 4f 30 3b ed 35 bc |0E.!..eLq.O0;.5.| +peer0.org1.example.com | 00000010 a0 36 7c 07 3b 09 64 99 56 53 b7 92 e4 dc d2 26 |.6|.;.d.VS.....&| +peer0.org1.example.com | 00000020 12 60 18 a9 00 02 20 60 18 2d a6 39 06 33 ab ba |.`.... `.-.9.3..| +peer0.org1.example.com | 00000030 a7 f0 a1 96 7a 58 eb 6a 4a eb 92 65 48 3d 9c 03 |....zX.jJ..eH=..| +peer0.org1.example.com | 00000040 e6 c5 5f 4a c9 1d 1c |.._J...|" +orderer0.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +orderer0.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:46.518 UTC [cauthdsl] func1 -> DEBU b9d 0xc000bf6270 gate 1555913806518563200 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:46.518 UTC [cauthdsl] func2 -> DEBU b9e 0xc000bf6270 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:46.519 UTC [cauthdsl] func2 -> DEBU b9f 0xc000bf6270 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:46.519 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ba0 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:46.519 UTC [msp] Validate -> DEBU ba1 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:46.520 UTC [msp] getCertificationChain -> DEBU ba2 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:46.521 UTC [cauthdsl] func2 -> DEBU ba3 0xc000bf6270 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:46.521 UTC [msp.identity] Verify -> DEBU ba4 Verify: digest = 00000000 f5 67 6f e9 01 86 e2 3b c8 c3 da b3 68 f5 8e f8 |.go....;....h...| +orderer0.example.com | 00000010 97 ff f5 66 85 53 d6 fb 68 48 fc 80 60 00 ca ec |...f.S..hH..`...|" +orderer0.example.com | "2019-04-22 06:16:46.521 UTC [msp.identity] Verify -> DEBU ba5 Verify: sig = 00000000 30 45 02 21 00 ff 48 53 40 33 74 a0 e7 2f cb 63 |0E.!..HS@3t../.c| +orderer0.example.com | 00000010 2c c2 18 3c 3a 49 87 98 a3 b5 93 5b c6 a2 3f 1b |,..<:I.....[..?.| +orderer0.example.com | 00000020 04 66 be c4 fc 02 20 78 12 cf 92 fa c0 9c 22 db |.f.... x......".| +orderer0.example.com | 00000030 33 27 db bc c9 3c f6 4c 29 19 6a 33 00 69 69 94 |3'...<.L).j3.ii.| +orderer0.example.com | 00000040 c9 7a e7 f9 61 c4 ba |.z..a..|" +orderer0.example.com | "2019-04-22 06:16:46.522 UTC [cauthdsl] func2 -> DEBU ba6 0xc000bf6270 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:46.522 UTC [cauthdsl] func1 -> DEBU ba7 0xc000bf6270 gate 1555913806518563200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:46.523 UTC [policies] Evaluate -> DEBU ba8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:46.523 UTC [policies] Evaluate -> DEBU ba9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:46.523 UTC [policies] Evaluate -> DEBU baa Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:46.524 UTC [policies] Evaluate -> DEBU bab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:46.524 UTC [policies] Evaluate -> DEBU bac Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:46.524 UTC [policies] Evaluate -> DEBU bad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:46.525 UTC [common.deliver] deliverBlocks -> DEBU bae [channel: businesschannel] Received seekInfo (0xc000dd6c40) start: > stop: > from 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:16:46.525 UTC [fsblkstorage] Next -> DEBU baf Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +orderer0.example.com | "2019-04-22 06:16:46.525 UTC [fsblkstorage] newBlockfileStream -> DEBU bb0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +orderer0.example.com | "2019-04-22 06:16:46.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb1 Remaining bytes=[47432], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:46.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb2 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +orderer0.example.com | "2019-04-22 06:16:46.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb3 blockbytes [23684] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:46.527 UTC [common.deliver] deliverBlocks -> DEBU bb4 [channel: businesschannel] Delivering block [1] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:16:46.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb5 Remaining bytes=[23745], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:46.530 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb6 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +orderer0.example.com | "2019-04-22 06:16:46.530 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb7 blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:46.531 UTC [common.deliver] deliverBlocks -> DEBU bb8 [channel: businesschannel] Delivering block [2] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:16:46.532 UTC [fsblkstorage] waitForBlock -> DEBU bb9 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-04-22 06:16:46.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bba Sending msg of 28 bytes to 2 on channel businesschannel took 160µs" +orderer0.example.com | "2019-04-22 06:16:46.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bbd Sending msg of 28 bytes to 3 on channel businesschannel took 116.5µs" +orderer0.example.com | "2019-04-22 06:16:46.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 331.4µs " +orderer0.example.com | "2019-04-22 06:16:46.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 252.9µs " +orderer0.example.com | "2019-04-22 06:16:46.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbc Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:46.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:46.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:46.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc1 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +orderer0.example.com | "2019-04-22 06:16:46.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.7µs " +orderer0.example.com | "2019-04-22 06:16:46.984 UTC [orderer.common.server] Deliver -> DEBU bc3 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:16:46.984 UTC [common.deliver] Handle -> DEBU bc4 Starting new deliver loop for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:16:46.985 UTC [common.deliver] Handle -> DEBU bc5 Attempting to read seek info message from 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:16:46.988 UTC [policies] Evaluate -> DEBU bc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:16:46.988 UTC [policies] Evaluate -> DEBU bc7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:46.989 UTC [policies] Evaluate -> DEBU bc8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:16:46.990 UTC [policies] Evaluate -> DEBU bc9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:46.991 UTC [policies] Evaluate -> DEBU bca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:16:46.992 UTC [msp] DeserializeIdentity -> DEBU bcb Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:46.993 UTC [msp.identity] newIdentity -> DEBU bcc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:46.994 UTC [cauthdsl] func1 -> DEBU bcd 0xc000c06e10 gate 1555913806994777600 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:46.995 UTC [cauthdsl] func2 -> DEBU bce 0xc000c06e10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:46.996 UTC [cauthdsl] func2 -> DEBU bcf 0xc000c06e10 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:46.996 UTC [cauthdsl] func2 -> DEBU bd0 0xc000c06e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-04-22 06:16:46.996 UTC [cauthdsl] func2 -> DEBU bd1 0xc000c06e10 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:16:46.997 UTC [cauthdsl] func1 -> DEBU bd2 0xc000c06e10 gate 1555913806994777600 evaluation fails" +orderer0.example.com | "2019-04-22 06:16:46.998 UTC [policies] Evaluate -> DEBU bd3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:46.998 UTC [policies] Evaluate -> DEBU bd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:46.998 UTC [policies] Evaluate -> DEBU bd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:16:46.999 UTC [cauthdsl] func1 -> DEBU bd6 0xc000c07fe0 gate 1555913806999168600 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:46.999 UTC [cauthdsl] func2 -> DEBU bd7 0xc000c07fe0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:47.000 UTC [cauthdsl] func2 -> DEBU bd8 0xc000c07fe0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:47.000 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bd9 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:47.000 UTC [msp] Validate -> DEBU bda MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:47.002 UTC [msp] getCertificationChain -> DEBU bdb MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:47.003 UTC [cauthdsl] func2 -> DEBU bdc 0xc000c07fe0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:47.003 UTC [msp.identity] Verify -> DEBU bdd Verify: digest = 00000000 af 5a b7 0c 05 3e dc 52 32 17 c5 ce ce f1 59 7f |.Z...>.R2.....Y.| +orderer0.example.com | 00000010 66 ce f9 49 f2 db ac 98 ac b0 19 02 b5 d4 ea 2c |f..I...........,|" +orderer0.example.com | "2019-04-22 06:16:47.004 UTC [msp.identity] Verify -> DEBU bde Verify: sig = 00000000 30 45 02 21 00 af 56 2b 74 f2 e4 ce 5d 2b 83 c7 |0E.!..V+t...]+..| +orderer0.example.com | 00000010 40 f6 33 6f c2 f5 25 75 8d 97 0d 5d 91 92 7e bf |@.3o..%u...]..~.| +orderer0.example.com | 00000020 62 d2 37 18 6f 02 20 70 7d 92 3b 3e 04 df 9f df |b.7.o. p}.;>....| +orderer0.example.com | 00000030 3f 93 89 c1 34 da 73 ae 2b c7 d1 0a ad 7d ac fb |?...4.s.+....}..| +orderer0.example.com | 00000040 af b9 e7 2d 88 a7 ce |...-...|" +orderer0.example.com | "2019-04-22 06:16:47.005 UTC [cauthdsl] func2 -> DEBU bdf 0xc000c07fe0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:47.005 UTC [cauthdsl] func1 -> DEBU be0 0xc000c07fe0 gate 1555913806999168600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:47.006 UTC [policies] Evaluate -> DEBU be1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be3 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be5 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:47.008 UTC [policies] Evaluate -> DEBU be6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:16:47.008 UTC [common.deliver] deliverBlocks -> DEBU be7 [channel: businesschannel] Received seekInfo (0xc000dd7b40) start: > stop: > from 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:16:47.009 UTC [fsblkstorage] Next -> DEBU be8 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +orderer0.example.com | "2019-04-22 06:16:47.009 UTC [fsblkstorage] newBlockfileStream -> DEBU be9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +orderer0.example.com | "2019-04-22 06:16:47.009 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bea Remaining bytes=[47432], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:47.010 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU beb Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +orderer0.example.com | "2019-04-22 06:16:47.011 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bec blockbytes [23684] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:47.012 UTC [common.deliver] deliverBlocks -> DEBU bed [channel: businesschannel] Delivering block [1] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:16:47.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bee Remaining bytes=[23745], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:47.014 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bef Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +orderer0.example.com | "2019-04-22 06:16:47.014 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bf0 blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:47.015 UTC [common.deliver] deliverBlocks -> DEBU bf1 [channel: businesschannel] Delivering block [2] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:16:47.017 UTC [fsblkstorage] waitForBlock -> DEBU bf2 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-04-22 06:16:47.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf3 Sending msg of 28 bytes to 3 on channel businesschannel took 89.2µs" +orderer0.example.com | "2019-04-22 06:16:47.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf4 Sending msg of 28 bytes to 2 on channel businesschannel took 178.8µs" +orderer0.example.com | "2019-04-22 06:16:47.184 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.3µs " +orderer0.example.com | "2019-04-22 06:16:47.187 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 354.9µs " +orderer0.example.com | "2019-04-22 06:16:47.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:47.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:47.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:47.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfa Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +orderer0.example.com | "2019-04-22 06:16:47.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU bfb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.6µs " +orderer0.example.com | "2019-04-22 06:16:47.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfc Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" +orderer0.example.com | "2019-04-22 06:16:47.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfd Sending msg of 28 bytes to 3 on channel businesschannel took 48.2µs" +orderer0.example.com | "2019-04-22 06:16:47.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU bfe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 413.4µs " +orderer0.example.com | "2019-04-22 06:16:47.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU bff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5993ms " +orderer0.example.com | "2019-04-22 06:16:47.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU c00 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:47.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU c01 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:47.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU c02 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:47.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c03 Sending msg of 28 bytes to 3 on channel testchainid took 38.6µs" +orderer0.example.com | "2019-04-22 06:16:47.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU c04 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " +orderer0.example.com | "2019-04-22 06:16:48.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c05 Sending msg of 28 bytes to 2 on channel businesschannel took 122.8µs" +orderer0.example.com | "2019-04-22 06:16:48.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c06 Sending msg of 28 bytes to 3 on channel businesschannel took 110.4µs" +orderer0.example.com | "2019-04-22 06:16:48.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.4µs " +orderer0.example.com | "2019-04-22 06:16:48.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.7µs " +orderer0.example.com | "2019-04-22 06:16:48.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU c09 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:48.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:48.336 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:48.356 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 719.3µs " +orderer0.example.com | "2019-04-22 06:16:48.355 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0d Sending msg of 28 bytes to 3 on channel testchainid took 126µs" +orderer0.example.com | "2019-04-22 06:16:48.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0e Sending msg of 28 bytes to 2 on channel businesschannel took 336.6µs" +orderer0.example.com | "2019-04-22 06:16:48.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU c10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 279.7µs " +orderer0.example.com | "2019-04-22 06:16:48.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c11 Sending msg of 28 bytes to 3 on channel businesschannel took 2.2231ms" +orderer0.example.com | "2019-04-22 06:16:48.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 301.8µs " +orderer0.example.com | "2019-04-22 06:16:48.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU c12 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:48.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU c13 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:48.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU c14 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:48.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c15 Sending msg of 28 bytes to 3 on channel testchainid took 33.1µs" +orderer0.example.com | "2019-04-22 06:16:48.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU c16 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.2µs " +orderer0.example.com | "2019-04-22 06:16:49.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c17 Sending msg of 28 bytes to 2 on channel businesschannel took 116.3µs" +orderer0.example.com | "2019-04-22 06:16:49.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c18 Sending msg of 28 bytes to 3 on channel businesschannel took 87.5µs" +orderer0.example.com | "2019-04-22 06:16:49.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU c19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1578ms " +orderer0.example.com | "2019-04-22 06:16:49.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 316µs " +orderer0.example.com | "2019-04-22 06:16:49.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:49.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:49.332 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:49.333 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c1e Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +orderer0.example.com | "2019-04-22 06:16:49.333 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.2µs " +orderer0.example.com | "2019-04-22 06:16:49.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c20 Sending msg of 28 bytes to 2 on channel businesschannel took 991.3µs" +orderer0.example.com | "2019-04-22 06:16:49.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c21 Sending msg of 28 bytes to 3 on channel businesschannel took 1.3356ms" +orderer0.example.com | "2019-04-22 06:16:49.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU c22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 416.2µs " +orderer0.example.com | "2019-04-22 06:16:49.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU c23 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:49.683 UTC [orderer.common.cluster.step] sendMessage -> DEBU c24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.5855ms " +orderer0.example.com | "2019-04-22 06:16:49.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU c25 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:49.832 UTC [orderer.common.cluster.step] handleMessage -> DEBU c26 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:49.832 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c27 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +orderer0.example.com | "2019-04-22 06:16:49.833 UTC [orderer.common.cluster.step] sendMessage -> DEBU c28 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.8µs " +orderer0.example.com | "2019-04-22 06:16:50.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c29 Sending msg of 28 bytes to 3 on channel businesschannel took 101.3µs" +orderer0.example.com | "2019-04-22 06:16:50.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2a Sending msg of 28 bytes to 2 on channel businesschannel took 58.4µs" +orderer0.example.com | "2019-04-22 06:16:50.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 408.5µs " +orderer0.example.com | "2019-04-22 06:16:50.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:50.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 371.3µs " +orderer0.example.com | "2019-04-22 06:16:50.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:50.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:50.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c30 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +orderer0.example.com | "2019-04-22 06:16:50.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU c31 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.4µs " +orderer0.example.com | "2019-04-22 06:16:50.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c32 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2019-04-22 06:16:50.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c33 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +orderer0.example.com | "2019-04-22 06:16:50.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU c34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +orderer0.example.com | "2019-04-22 06:16:50.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU c35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.3µs " +orderer0.example.com | "2019-04-22 06:16:50.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU c36 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:50.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU c37 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:50.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU c38 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:50.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c39 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2019-04-22 06:16:50.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1122ms " +orderer0.example.com | "2019-04-22 06:16:51.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3b Sending msg of 28 bytes to 3 on channel businesschannel took 500.8µs" +orderer0.example.com | "2019-04-22 06:16:51.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3c Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-04-22 06:16:51.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.6µs " +orderer0.example.com | "2019-04-22 06:16:51.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +orderer0.example.com | "2019-04-22 06:16:51.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:51.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU c40 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:51.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU c41 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:51.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c42 Sending msg of 28 bytes to 3 on channel testchainid took 73.1µs" +orderer0.example.com | "2019-04-22 06:16:51.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU c43 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.5µs " +orderer0.example.com | "2019-04-22 06:16:51.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU c44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.8µs " +orderer0.example.com | "2019-04-22 06:16:51.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU c45 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:16:46.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 7af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b1 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 " +peer0.org1.example.com | "2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 " +peer0.org1.example.com | "2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b4 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 7b5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7b6 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:46.922 UTC [msp] DeserializeIdentity -> DEBU 7b7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:46.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:46.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ba Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:46.923 UTC [policies] Evaluate -> DEBU 7bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.923 UTC [policies] Evaluate -> DEBU 7bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:46.924 UTC [policies] Evaluate -> DEBU 7bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:46.924 UTC [cauthdsl] func1 -> DEBU 7be 0xc002536940 gate 1555913806924412300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:46.924 UTC [cauthdsl] func2 -> DEBU 7bf 0xc002536940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:46.925 UTC [cauthdsl] func2 -> DEBU 7c0 0xc002536940 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:46.925 UTC [cauthdsl] func2 -> DEBU 7c1 0xc002536940 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.925 UTC [msp.identity] Verify -> DEBU 7c2 Verify: digest = 00000000 7a 86 ad 70 ec 83 fd 7f 78 60 fb 6c c4 be 15 97 |z..p....x`.l....| +peer0.org1.example.com | 00000010 51 9a 14 86 97 84 3f a8 ac 45 26 61 60 c3 8f e1 |Q.....?..E&a`...|" +peer0.org1.example.com | "2019-04-22 06:16:46.925 UTC [msp.identity] Verify -> DEBU 7c3 Verify: sig = 00000000 30 44 02 20 5f 3c 13 52 f5 3f 17 83 c0 83 ac 05 |0D. _<.R.?......| +peer0.org1.example.com | 00000010 ba 61 01 94 34 6b cb f9 6e 5f d2 a2 62 de 19 44 |.a..4k..n_..b..D| +peer0.org1.example.com | 00000020 af c6 2c a6 02 20 15 59 63 a5 51 fc 69 27 e9 4b |..,.. .Yc.Q.i'.K| +peer0.org1.example.com | 00000030 26 c5 0e 04 49 7f e5 3e 1b 57 ae 67 b1 53 f1 82 |&...I..>.W.g.S..| +peer0.org1.example.com | 00000040 cc a6 15 1c d9 c9 |......|" +peer0.org1.example.com | "2019-04-22 06:16:46.926 UTC [cauthdsl] func2 -> DEBU 7c4 0xc002536940 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:46.926 UTC [cauthdsl] func1 -> DEBU 7c5 0xc002536940 gate 1555913806924412300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:46.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ca Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.928 UTC [gossip.discovery] learnNewMembers -> DEBU 7cb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-04-22 06:16:46.928 UTC [gossip.discovery] learnNewMembers -> DEBU 7cc Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.928 UTC [gossip.discovery] learnNewMembers -> DEBU 7cd Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ce Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7cf Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.931 UTC [grpc] HandleSubConnStateChange -> DEBU 7d0 pickfirstBalancer: HandleSubConnStateChange: 0xc002486840, READY" +peer0.org1.example.com | "2019-04-22 06:16:46.933 UTC [msp.identity] Sign -> DEBU 7d1 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:46.933 UTC [msp.identity] Sign -> DEBU 7d2 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:46.933 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d3 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.934 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d4 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.937 UTC [msp.identity] Verify -> DEBU 7d5 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:16:46.937 UTC [msp.identity] Verify -> DEBU 7d6 Verify: sig = 00000000 30 45 02 21 00 de 07 f7 58 8f 6e be 26 43 85 81 |0E.!....X.n.&C..| +peer0.org1.example.com | 00000010 94 87 aa b3 b7 f1 38 54 98 16 8b 83 56 ea 42 77 |......8T....V.Bw| +peer0.org1.example.com | 00000020 6c 4d ef 10 96 02 20 67 54 66 04 83 18 8c fa 2e |lM.... gTf......| +peer0.org1.example.com | 00000030 c7 1c 9d 4c 35 22 86 ad e4 49 6a a2 75 5e 11 f8 |...L5"...Ij.u^..| +peer0.org1.example.com | 00000040 ff 03 29 1f ac f7 b2 |..)....|" +peer0.org1.example.com | "2019-04-22 06:16:46.937 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d7 Authenticated 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:16:46.938 UTC [gossip.comm] createConnection -> DEBU 7d8 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.939 UTC [gossip.comm] sendToEndpoint -> DEBU 7d9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.939 UTC [gossip.comm] sendToEndpoint -> DEBU 7da Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.942 UTC [gossip.comm] func1 -> DEBU 7db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9139101219121245228 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.943 UTC [gossip.gossip] handleMessage -> DEBU 7dc Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9139101219121245228 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.944 UTC [gossip.pull] HandleMessage -> DEBU 7dd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9139101219121245228 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.944 UTC [gossip.gossip] handleMessage -> DEBU 7de Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.945 UTC [gossip.comm] func1 -> DEBU 7df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.946 UTC [gossip.gossip] handleMessage -> DEBU 7e0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7e2 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:46.947 UTC [msp.identity] Verify -> DEBU 7e3 Verify: digest = 00000000 22 a1 a5 76 94 f4 54 18 a9 7b 3f e6 40 ce cd 9f |"..v..T..{?.@...| +peer0.org1.example.com | 00000010 8d f7 f7 c8 d6 89 22 43 17 ff 42 0b 3f 98 73 71 |......"C..B.?.sq|" +peer0.org1.example.com | "2019-04-22 06:16:46.948 UTC [msp.identity] Verify -> DEBU 7e4 Verify: sig = 00000000 30 44 02 20 25 c4 ad c3 45 f8 cb 65 8d 71 66 1a |0D. %...E..e.qf.| +peer0.org1.example.com | 00000010 9c ee 83 9a 64 fa 59 42 ef 5d 1c 2c 96 cd 2a 9b |....d.YB.].,..*.| +peer0.org1.example.com | 00000020 a6 29 d3 4f 02 20 5f 7e f7 31 dd fb 3b 77 2d 57 |.).O. _~.1..;w-W| +peer0.org1.example.com | 00000030 72 25 da 10 60 24 5d 1d 7b fb 8a 03 24 a1 3b 90 |r%..`$].{...$.;.| +peer0.org1.example.com | 00000040 7e 1d b9 51 17 0d |~..Q..|" +peer0.org1.example.com | "2019-04-22 06:16:46.948 UTC [msp.identity] Verify -> DEBU 7e5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:16:46.948 UTC [msp.identity] Verify -> DEBU 7e6 Verify: sig = 00000000 30 44 02 20 4c 39 15 01 c9 ac c7 09 b6 c9 bb 40 |0D. L9.........@| +peer0.org1.example.com | 00000010 9d 9a 91 fc d5 3b 14 70 f1 36 0e 10 8a 09 ff d1 |.....;.p.6......| +peer0.org1.example.com | 00000020 e2 c0 95 49 02 20 53 02 11 c7 b1 3c 72 a2 b9 af |...I. S.... DEBU 7e7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.949 UTC [gossip.discovery] isSentByMe -> DEBU 7e8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:46.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 7e9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7ea Exiting" +peer0.org1.example.com | "2019-04-22 06:16:46.947 UTC [gossip.gossip] handleMessage -> DEBU 7eb Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.053 UTC [comm.grpc.server] 1 -> INFO 7ec unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.053Z grpc.peer_address=192.168.224.8:55136 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144.4µs +peer0.org1.example.com | "2019-04-22 06:16:47.056 UTC [msp.identity] Sign -> DEBU 7ed Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:47.056 UTC [msp.identity] Sign -> DEBU 7ee Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:47.057 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.8:55136" +peer0.org1.example.com | "2019-04-22 06:16:47.058 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7f0 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55136" +peer0.org1.example.com | "2019-04-22 06:16:47.058 UTC [msp] DeserializeIdentity -> DEBU 7f1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.058 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.058 UTC [msp] DeserializeIdentity -> DEBU 7f3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.059 UTC [msp] DeserializeIdentity -> DEBU 7f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7f7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7f8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.060 UTC [policies] Evaluate -> DEBU 7f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.060 UTC [policies] Evaluate -> DEBU 7fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.060 UTC [policies] Evaluate -> DEBU 7fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.061 UTC [cauthdsl] func1 -> DEBU 7fc 0xc0026655e0 gate 1555913807061199500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.061 UTC [cauthdsl] func2 -> DEBU 7fd 0xc0026655e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.061 UTC [cauthdsl] func2 -> DEBU 7fe 0xc0026655e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.061 UTC [cauthdsl] func2 -> DEBU 7ff 0xc0026655e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.061 UTC [msp.identity] Verify -> DEBU 800 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:16:47.062 UTC [msp.identity] Verify -> DEBU 801 Verify: sig = 00000000 30 44 02 20 6d 50 50 d4 f6 38 1c aa 8a d8 c8 fa |0D. mPP..8......| +peer0.org1.example.com | 00000010 c6 5c 2c d2 96 ec e2 f7 e1 3a 6f 7e cd 78 d7 b3 |.\,......:o~.x..| +peer0.org1.example.com | 00000020 10 43 1d 54 02 20 3d 60 46 e4 7e d2 e2 6e f8 34 |.C.T. =`F.~..n.4| +peer0.org1.example.com | 00000030 06 3b a2 55 d4 d8 1c 88 93 a1 a1 5a 66 f7 d0 8a |.;.U.......Zf...| +peer0.org1.example.com | 00000040 dc e7 7b a1 2a bd |..{.*.|" +peer0.org1.example.com | "2019-04-22 06:16:47.064 UTC [cauthdsl] func2 -> DEBU 802 0xc0026655e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.065 UTC [cauthdsl] func1 -> DEBU 803 0xc0026655e0 gate 1555913807061199500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.065 UTC [policies] Evaluate -> DEBU 804 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.065 UTC [policies] Evaluate -> DEBU 805 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.066 UTC [policies] Evaluate -> DEBU 806 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.066 UTC [policies] Evaluate -> DEBU 807 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.066 UTC [gossip.comm] authenticateRemotePeer -> DEBU 808 Authenticated 192.168.224.8:55136" +peer0.org1.example.com | "2019-04-22 06:16:47.066 UTC [gossip.comm] GossipStream -> DEBU 809 Servicing 192.168.224.8:55136" +peer0.org1.example.com | "2019-04-22 06:16:47.066 UTC [gossip.comm] writeToStream -> DEBU 80a Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.066 UTC [gossip.comm] serviceConnection -> DEBU 80b Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:16:47.067 UTC [grpc] infof -> DEBU 80c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.067 UTC [gossip.comm] readFromStream -> DEBU 80d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:16:47.069 UTC [gossip.comm] readFromStream -> DEBU 80e Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:16:47.070 UTC [gossip.comm] func2 -> DEBU 80f Client 192.168.224.8:55136 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:47.070 UTC [comm.grpc.server] 1 -> INFO 810 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.055Z grpc.peer_address=192.168.224.8:55136 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.5207ms +peer0.org1.example.com | "2019-04-22 06:16:47.071 UTC [gossip.comm] writeToStream -> DEBU 811 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.073 UTC [grpc] infof -> DEBU 812 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.084 UTC [gossip.comm] func1 -> DEBU 813 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.084 UTC [gossip.gossip] handleMessage -> DEBU 814 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.085 UTC [gossip.gossip] handleMessage -> DEBU 815 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 816 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 817 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:47.085 UTC [msp] DeserializeIdentity -> DEBU 818 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.085 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 819 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 81a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 81b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.086 UTC [policies] Evaluate -> DEBU 81c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.086 UTC [policies] Evaluate -> DEBU 81d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.087 UTC [policies] Evaluate -> DEBU 81e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.087 UTC [cauthdsl] func1 -> DEBU 81f 0xc0026dd620 gate 1555913807087485700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.087 UTC [cauthdsl] func2 -> DEBU 820 0xc0026dd620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.088 UTC [cauthdsl] func2 -> DEBU 821 0xc0026dd620 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.088 UTC [cauthdsl] func2 -> DEBU 822 0xc0026dd620 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.089 UTC [msp.identity] Verify -> DEBU 823 Verify: digest = 00000000 35 74 0b 48 82 25 af 63 b9 20 bb c3 a8 dd 5a 6f |5t.H.%.c. ....Zo| +peer0.org1.example.com | 00000010 7b e0 07 ba 8e 10 85 ed ee d6 a6 70 e8 64 d2 5c |{..........p.d.\|" +peer0.org1.example.com | "2019-04-22 06:16:47.089 UTC [msp.identity] Verify -> DEBU 824 Verify: sig = 00000000 30 45 02 21 00 df 37 94 e9 e6 01 7d ae 11 d4 18 |0E.!..7....}....| +peer0.org1.example.com | 00000010 04 b0 fb af 91 0b 68 51 74 18 a6 a9 74 22 97 d6 |......hQt...t"..| +peer0.org1.example.com | 00000020 e5 9a 47 31 d8 02 20 42 04 5b b5 23 fd 2b 16 7f |..G1.. B.[.#.+..| +peer0.org1.example.com | 00000030 cc 38 30 c1 b5 86 ab 5c 51 ea 65 da 5b 98 86 de |.80....\Q.e.[...| +peer0.org1.example.com | 00000040 23 58 f0 1e 35 be d3 |#X..5..|" +peer0.org1.example.com | "2019-04-22 06:16:47.089 UTC [cauthdsl] func2 -> DEBU 825 0xc0026dd620 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.090 UTC [cauthdsl] func1 -> DEBU 826 0xc0026dd620 gate 1555913807087485700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 827 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 828 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 829 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 82a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.091 UTC [gossip.discovery] handleAliveMessage -> DEBU 82b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 82c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 82d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 " +peer0.org1.example.com | "2019-04-22 06:16:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 82e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 " +peer0.org1.example.com | "2019-04-22 06:16:47.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 82f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:47.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 830 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 831 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.092 UTC [gossip.discovery] handleMsgFromComm -> DEBU 832 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.096 UTC [msp] DeserializeIdentity -> DEBU 833 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.097 UTC [msp] DeserializeIdentity -> DEBU 834 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.097 UTC [msp] DeserializeIdentity -> DEBU 835 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.097 UTC [msp] DeserializeIdentity -> DEBU 836 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.098 UTC [msp] DeserializeIdentity -> DEBU 837 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.098 UTC [gossip.comm] Send -> DEBU 838 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:47.099 UTC [gossip.comm] sendToEndpoint -> DEBU 839 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.099 UTC [gossip.comm] createConnection -> DEBU 83a Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:47.102 UTC [comm.grpc.server] 1 -> INFO 83b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.101Z grpc.peer_address=192.168.224.8:55138 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.3µs +peer0.org1.example.com | "2019-04-22 06:16:47.105 UTC [msp.identity] Sign -> DEBU 83c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:47.105 UTC [msp.identity] Sign -> DEBU 83d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:47.106 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:55138" +peer0.org1.example.com | "2019-04-22 06:16:47.106 UTC [grpc] DialContext -> DEBU 83e parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:16:47.106 UTC [grpc] DialContext -> DEBU 840 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:16:47.106 UTC [grpc] NewAddress -> DEBU 841 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:16:47.109 UTC [grpc] switchBalancer -> DEBU 843 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:16:47.110 UTC [grpc] HandleSubConnStateChange -> DEBU 844 pickfirstBalancer: HandleSubConnStateChange: 0xc002769ae0, CONNECTING" +orderer0.example.com | "2019-04-22 06:16:51.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c46 Sending msg of 28 bytes to 2 on channel businesschannel took 76.5µs" +orderer0.example.com | "2019-04-22 06:16:51.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c47 Sending msg of 28 bytes to 3 on channel businesschannel took 188.8µs" +orderer0.example.com | "2019-04-22 06:16:51.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU c48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.7µs " +orderer0.example.com | "2019-04-22 06:16:51.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU c49 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:51.828 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:51.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4b Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +orderer0.example.com | "2019-04-22 06:16:51.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.5µs " +orderer0.example.com | "2019-04-22 06:16:52.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4d Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-04-22 06:16:52.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4e Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +orderer0.example.com | "2019-04-22 06:16:52.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " +orderer0.example.com | "2019-04-22 06:16:52.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.2µs " +orderer0.example.com | "2019-04-22 06:16:52.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c51 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:52.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c52 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:52.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU c53 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:52.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c54 Sending msg of 28 bytes to 3 on channel testchainid took 43.4µs" +orderer0.example.com | "2019-04-22 06:16:52.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU c55 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.4µs " +orderer0.example.com | "2019-04-22 06:16:52.488 UTC [orderer.common.server] Broadcast -> DEBU c56 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:16:52.488 UTC [orderer.common.broadcast] Handle -> DEBU c57 Starting new broadcast loop for 192.168.224.9:34594" +orderer0.example.com | "2019-04-22 06:16:52.550 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c58 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34594 with txid 'e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:52.551 UTC [msp] DeserializeIdentity -> DEBU c5e Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:52.551 UTC [msp.identity] newIdentity -> DEBU c5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [cauthdsl] func1 -> DEBU c60 0xc0003e69e0 gate 1555913812552173100 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [cauthdsl] func2 -> DEBU c61 0xc0003e69e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [cauthdsl] func2 -> DEBU c62 0xc0003e69e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c63 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [msp] Validate -> DEBU c64 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [msp] getCertificationChain -> DEBU c65 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [cauthdsl] func2 -> DEBU c66 0xc0003e69e0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:52.552 UTC [msp.identity] Verify -> DEBU c67 Verify: digest = 00000000 2b 6f 41 49 fb 44 0e 83 27 95 01 46 f8 23 4a 80 |+oAI.D..'..F.#J.| +orderer0.example.com | 00000010 a6 4d ee fe e2 53 6d 4f e8 9a 60 16 70 60 e8 25 |.M...SmO..`.p`.%|" +orderer0.example.com | "2019-04-22 06:16:52.553 UTC [msp.identity] Verify -> DEBU c68 Verify: sig = 00000000 30 44 02 20 42 d4 d3 c1 5d bf df 8a 4b 70 63 3e |0D. B...]...Kpc>| +orderer0.example.com | 00000010 a3 94 4b db 89 0c 23 b0 a7 72 1b e5 13 ed cc 63 |..K...#..r.....c| +orderer0.example.com | 00000020 84 2c b6 46 02 20 25 d9 f3 e5 c2 bb 10 7a ef 12 |.,.F. %......z..| +orderer0.example.com | 00000030 99 bc 91 e0 9c bf d6 30 69 bd e9 0f 9c d1 68 c5 |.......0i.....h.| +orderer0.example.com | 00000040 49 3c d5 68 e7 b0 |I<.h..|" +orderer0.example.com | "2019-04-22 06:16:52.553 UTC [cauthdsl] func2 -> DEBU c69 0xc0003e69e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:52.553 UTC [cauthdsl] func1 -> DEBU c6a 0xc0003e69e0 gate 1555913812552173100 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:52.553 UTC [policies] Evaluate -> DEBU c6b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:47.107 UTC [gossip.comm] authenticateRemotePeer -> DEBU 842 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55138" +peer0.org1.example.com | "2019-04-22 06:16:47.111 UTC [msp] DeserializeIdentity -> DEBU 845 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.112 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 846 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.112 UTC [msp] DeserializeIdentity -> DEBU 847 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.113 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 848 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.113 UTC [msp] DeserializeIdentity -> DEBU 849 Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6d Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6f Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:52.554 UTC [orderer.common.blockcutter] Ordered -> DEBU c71 Enqueuing message into batch" +orderer0.example.com | "2019-04-22 06:16:52.554 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c72 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34594" +orderer0.example.com | "2019-04-22 06:16:52.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c73 Sending msg of 28 bytes to 3 on channel businesschannel took 53.6µs" +orderer0.example.com | "2019-04-22 06:16:52.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c74 Sending msg of 28 bytes to 2 on channel businesschannel took 39.6µs" +orderer0.example.com | "2019-04-22 06:16:52.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU c75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.8µs " +orderer0.example.com | "2019-04-22 06:16:52.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU c76 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:52.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU c77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.4µs " +orderer0.example.com | "2019-04-22 06:16:52.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU c78 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:52.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU c79 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:52.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7a Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +orderer0.example.com | "2019-04-22 06:16:52.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.9µs " +orderer0.example.com | "2019-04-22 06:16:53.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7c Sending msg of 28 bytes to 2 on channel businesschannel took 37.1µs" +orderer0.example.com | "2019-04-22 06:16:53.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7d Sending msg of 28 bytes to 3 on channel businesschannel took 36.7µs" +orderer0.example.com | "2019-04-22 06:16:53.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.9µs " +orderer0.example.com | "2019-04-22 06:16:53.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 746.1µs " +orderer0.example.com | "2019-04-22 06:16:53.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU c80 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:53.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c81 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:53.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU c82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:53.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c83 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +orderer0.example.com | "2019-04-22 06:16:53.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU c84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.3µs " +orderer0.example.com | "2019-04-22 06:16:53.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c85 Sending msg of 28 bytes to 2 on channel businesschannel took 36.5µs" +orderer0.example.com | "2019-04-22 06:16:53.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c86 Sending msg of 28 bytes to 3 on channel businesschannel took 30.1µs" +orderer0.example.com | "2019-04-22 06:16:53.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU c87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.1µs " +orderer0.example.com | "2019-04-22 06:16:53.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU c88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.7µs " +orderer0.example.com | "2019-04-22 06:16:53.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU c89 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:53.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:53.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:53.796 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8c Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +orderer0.example.com | "2019-04-22 06:16:53.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.7µs " +orderer0.example.com | "2019-04-22 06:16:54.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8e Sending msg of 28 bytes to 2 on channel businesschannel took 50.1µs" +orderer0.example.com | "2019-04-22 06:16:54.144 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 3 on channel businesschannel took 41.6µs" +orderer0.example.com | "2019-04-22 06:16:54.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4729ms " +orderer0.example.com | "2019-04-22 06:16:54.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU c91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.108ms " +orderer0.example.com | "2019-04-22 06:16:54.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU c92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU c93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:16:47.114 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 84a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 84b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 84c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.115 UTC [policies] Evaluate -> DEBU 84d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.115 UTC [policies] Evaluate -> DEBU 84e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.116 UTC [policies] Evaluate -> DEBU 84f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.116 UTC [cauthdsl] func1 -> DEBU 850 0xc002e79530 gate 1555913807116817600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.118 UTC [cauthdsl] func2 -> DEBU 851 0xc002e79530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.119 UTC [cauthdsl] func2 -> DEBU 852 0xc002e79530 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.120 UTC [cauthdsl] func2 -> DEBU 853 0xc002e79530 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.120 UTC [msp.identity] Verify -> DEBU 854 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:16:47.121 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 45 02 21 00 89 21 4f aa b5 52 53 fc 27 fe 94 |0E.!..!O..RS.'..| +peer0.org1.example.com | 00000010 de 23 09 f0 3f 82 71 68 43 cc 2a 14 6d d0 9e b2 |.#..?.qhC.*.m...| +peer0.org1.example.com | 00000020 9d 27 2f a1 3b 02 20 0d f1 45 2e cb 65 ba 3a cd |.'/.;. ..E..e.:.| +peer0.org1.example.com | 00000030 44 6f e2 cd 4b d9 9a 7c df 5e 44 6e cd 57 61 af |Do..K..|.^Dn.Wa.| +peer0.org1.example.com | 00000040 4e 35 c4 5a 58 52 2f |N5.ZXR/|" +peer0.org1.example.com | "2019-04-22 06:16:47.123 UTC [cauthdsl] func2 -> DEBU 856 0xc002e79530 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.123 UTC [cauthdsl] func1 -> DEBU 857 0xc002e79530 gate 1555913807116817600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.123 UTC [policies] Evaluate -> DEBU 858 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.123 UTC [policies] Evaluate -> DEBU 859 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.124 UTC [grpc] HandleSubConnStateChange -> DEBU 85a pickfirstBalancer: HandleSubConnStateChange: 0xc002769ae0, READY" +peer0.org1.example.com | "2019-04-22 06:16:47.124 UTC [policies] Evaluate -> DEBU 85b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.125 UTC [policies] Evaluate -> DEBU 85c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.126 UTC [gossip.comm] authenticateRemotePeer -> DEBU 85d Authenticated 192.168.224.8:55138" +peer0.org1.example.com | "2019-04-22 06:16:47.126 UTC [gossip.comm] GossipStream -> DEBU 85e Servicing 192.168.224.8:55138" +peer0.org1.example.com | "2019-04-22 06:16:47.127 UTC [gossip.gossip] handleMessage -> DEBU 85f Entering, 192.168.224.8:55138 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.127 UTC [gossip.gossip] handleMessage -> DEBU 860 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.128 UTC [msp.identity] Sign -> DEBU 861 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:47.128 UTC [msp.identity] Sign -> DEBU 862 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:47.129 UTC [gossip.comm] authenticateRemotePeer -> DEBU 863 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:16:47.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU 864 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU 865 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.133 UTC [gossip.comm] authenticateRemotePeer -> DEBU 866 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +orderer0.example.com | "2019-04-22 06:16:54.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU c94 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c95 Sending msg of 28 bytes to 3 on channel testchainid took 70.8µs" +orderer0.example.com | "2019-04-22 06:16:54.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU c96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.9µs " +orderer0.example.com | "2019-04-22 06:16:54.523 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU c97 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:54.523 UTC [orderer.consensus.etcdraft] propose -> INFO c98 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:54.523 UTC [orderer.consensus.etcdraft] 2 -> DEBU c99 Proposed block [3] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:54.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9a Sending msg of 3829 bytes to 2 on channel businesschannel took 32.9µs" +orderer0.example.com | "2019-04-22 06:16:54.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9b Sending msg of 3829 bytes to 3 on channel businesschannel took 24µs" +orderer0.example.com | "2019-04-22 06:16:54.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9c Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer2.example.com(orderer2.example.com:7050) took 114.6µs " +orderer0.example.com | "2019-04-22 06:16:54.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9d Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer1.example.com(orderer1.example.com:7050) took 79.6µs " +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca0 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca1 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.6µs " +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ca3 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ca4 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [msp.identity] Sign -> DEBU ca5 Sign: plaintext: 0A020802120B0A090A03010203100418...B6E429FD114B22B1C8CAD98BE5FB8B0D " +orderer0.example.com | "2019-04-22 06:16:54.533 UTC [msp.identity] Sign -> DEBU ca6 Sign: digest: 6CD11B2FD01980D1422251EBB6B9BC7659C73CCEB30E8B0B8F907167347704DA " +orderer0.example.com | "2019-04-22 06:16:54.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +orderer0.example.com | "2019-04-22 06:16:54.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.541 UTC [fsblkstorage] indexBlock -> DEBU ca9 Indexing block [blockNum=3, blockHash=[]byte{0x74, 0x44, 0x89, 0x23, 0x4f, 0x72, 0x94, 0x3a, 0x8a, 0x3a, 0x90, 0x5b, 0x48, 0x2, 0x23, 0x87, 0x42, 0x1b, 0x92, 0x93, 0x84, 0xb, 0xa0, 0x22, 0x97, 0x21, 0x7, 0x5f, 0x9d, 0x35, 0xac, 0x69} txOffsets= +orderer0.example.com | txId=e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a locPointer=offset=70, bytesLength=3703 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:54.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.545 UTC [fsblkstorage] updateCheckpoint -> DEBU cab Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76082], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2019-04-22 06:16:54.546 UTC [orderer.commmon.multichannel] commitBlock -> DEBU cac [channel: businesschannel] Wrote block [3]" +orderer0.example.com | "2019-04-22 06:16:54.546 UTC [fsblkstorage] waitForBlock -> DEBU cad Came out of wait. maxAvailaBlockNumber=[3]" +orderer0.example.com | "2019-04-22 06:16:54.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cae Remaining bytes=[4710], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:54.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU caf Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +orderer0.example.com | "2019-04-22 06:16:54.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb0 blockbytes [4708] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [common.deliver] deliverBlocks -> DEBU cb1 [channel: businesschannel] Delivering block [3] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [fsblkstorage] waitForBlock -> DEBU cb2 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [fsblkstorage] waitForBlock -> DEBU cb3 Came out of wait. maxAvailaBlockNumber=[3]" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb4 Remaining bytes=[4710], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb5 Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb6 blockbytes [4708] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [common.deliver] deliverBlocks -> DEBU cb7 [channel: businesschannel] Delivering block [3] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:16:54.547 UTC [fsblkstorage] waitForBlock -> DEBU cb8 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +orderer0.example.com | "2019-04-22 06:16:54.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb9 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-04-22 06:16:54.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cba Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-04-22 06:16:54.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.3µs " +orderer0.example.com | "2019-04-22 06:16:54.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.9µs " +orderer0.example.com | "2019-04-22 06:16:54.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:16:47.133 UTC [gossip.comm] readFromStream -> DEBU 867 Got error, aborting: EOF" +peer0.org1.example.com | "2019-04-22 06:16:47.134 UTC [gossip.comm] func2 -> DEBU 868 Client 192.168.224.8:55138 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:47.134 UTC [comm.grpc.server] 1 -> INFO 869 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.8:55138 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=29.2265ms +peer0.org1.example.com | "2019-04-22 06:16:47.133 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.135 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.135 UTC [msp] DeserializeIdentity -> DEBU 86c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.136 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.136 UTC [msp] DeserializeIdentity -> DEBU 86f Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:54.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.680 UTC [orderer.common.broadcast] Handle -> WARN cbf Error reading from 192.168.224.9:34594: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:16:54.681 UTC [orderer.common.server] func1 -> DEBU cc0 Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:16:54.682 UTC [comm.grpc.server] 1 -> INFO cc1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34594 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.2262394s +orderer0.example.com | "2019-04-22 06:16:54.683 UTC [grpc] infof -> DEBU cc2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:16:54.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:54.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc4 Sending msg of 28 bytes to 3 on channel testchainid took 47.4µs" +orderer0.example.com | "2019-04-22 06:16:54.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.7µs " +orderer0.example.com | "2019-04-22 06:16:55.085 UTC [orderer.common.server] Broadcast -> DEBU cc6 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:16:55.086 UTC [orderer.common.broadcast] Handle -> DEBU cc7 Starting new broadcast loop for 192.168.224.9:34604" +orderer0.example.com | "2019-04-22 06:16:55.102 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cc8 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34604 with txid '5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-04-22 06:16:55.103 UTC [policies] Evaluate -> DEBU cc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:55.104 UTC [policies] Evaluate -> DEBU cca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:55.104 UTC [policies] Evaluate -> DEBU ccb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:16:55.105 UTC [policies] Evaluate -> DEBU ccc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:55.105 UTC [policies] Evaluate -> DEBU ccd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:55.106 UTC [msp] DeserializeIdentity -> DEBU cce Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:55.106 UTC [msp.identity] newIdentity -> DEBU ccf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:16:55.107 UTC [cauthdsl] func1 -> DEBU cd0 0xc00026bd10 gate 1555913815107708500 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:55.108 UTC [cauthdsl] func2 -> DEBU cd1 0xc00026bd10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:55.108 UTC [cauthdsl] func2 -> DEBU cd2 0xc00026bd10 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:55.109 UTC [cauthdsl] func2 -> DEBU cd3 0xc00026bd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-04-22 06:16:55.109 UTC [cauthdsl] func2 -> DEBU cd4 0xc00026bd10 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:16:55.110 UTC [cauthdsl] func1 -> DEBU cd5 0xc00026bd10 gate 1555913815107708500 evaluation fails" +orderer0.example.com | "2019-04-22 06:16:55.110 UTC [policies] Evaluate -> DEBU cd6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:55.111 UTC [policies] Evaluate -> DEBU cd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:55.112 UTC [policies] Evaluate -> DEBU cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:55.112 UTC [cauthdsl] func1 -> DEBU cd9 0xc0003d1000 gate 1555913815112528000 evaluation starts" +orderer0.example.com | "2019-04-22 06:16:55.113 UTC [cauthdsl] func2 -> DEBU cda 0xc0003d1000 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:55.113 UTC [cauthdsl] func2 -> DEBU cdb 0xc0003d1000 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:55.114 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cdc Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-04-22 06:16:55.114 UTC [msp] Validate -> DEBU cdd MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:16:55.115 UTC [msp] getCertificationChain -> DEBU cde MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:16:55.115 UTC [cauthdsl] func2 -> DEBU cdf 0xc0003d1000 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:55.116 UTC [msp.identity] Verify -> DEBU ce0 Verify: digest = 00000000 9a e4 d0 0f d4 55 79 7d d5 a1 3f 48 f4 6a cd 96 |.....Uy}..?H.j..| +orderer0.example.com | 00000010 d4 d3 0b 7e 9e 3a d1 94 33 3d 05 87 b1 87 f6 ce |...~.:..3=......|" +orderer0.example.com | "2019-04-22 06:16:55.116 UTC [msp.identity] Verify -> DEBU ce1 Verify: sig = 00000000 30 44 02 20 26 57 c8 26 3a a7 0a af 07 00 5a 93 |0D. &W.&:.....Z.| +orderer0.example.com | 00000010 83 76 3e 2b db a9 a0 07 8b ab e8 66 e5 cf 97 a4 |.v>+.......f....| +orderer0.example.com | 00000020 be 1f 68 54 02 20 0e c2 b7 75 b5 33 90 08 33 a7 |..hT. ...u.3..3.| +orderer0.example.com | 00000030 e7 a4 cc b5 60 44 4a 87 4b ae b8 87 82 29 c8 94 |....`DJ.K....)..| +orderer0.example.com | 00000040 6b 45 2b 9b c0 82 |kE+...|" +orderer0.example.com | "2019-04-22 06:16:55.117 UTC [cauthdsl] func2 -> DEBU ce2 0xc0003d1000 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:55.117 UTC [cauthdsl] func1 -> DEBU ce3 0xc0003d1000 gate 1555913815112528000 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce6 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce8 Signature set satisfies policy /Channel/Writers" +peer0.org1.example.com | "2019-04-22 06:16:47.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 870 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 871 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 872 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.137 UTC [policies] Evaluate -> DEBU 873 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.138 UTC [policies] Evaluate -> DEBU 874 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.138 UTC [policies] Evaluate -> DEBU 875 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.138 UTC [cauthdsl] func1 -> DEBU 876 0xc002ee5900 gate 1555913807138546100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.138 UTC [cauthdsl] func2 -> DEBU 877 0xc002ee5900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.138 UTC [cauthdsl] func2 -> DEBU 878 0xc002ee5900 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.139 UTC [cauthdsl] func2 -> DEBU 879 0xc002ee5900 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.139 UTC [msp.identity] Verify -> DEBU 87a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:16:47.139 UTC [msp.identity] Verify -> DEBU 87b Verify: sig = 00000000 30 45 02 21 00 97 0b 8e 45 78 4a a7 b0 bf 2a 17 |0E.!....ExJ...*.| +peer0.org1.example.com | 00000010 1d 83 b1 4e 03 33 2f 6c 07 8f 7a 78 3d a8 63 b3 |...N.3/l..zx=.c.| +peer0.org1.example.com | 00000020 21 10 2b 9b b0 02 20 25 40 37 4b 27 07 62 1a 1f |!.+... %@7K'.b..| +peer0.org1.example.com | 00000030 9e 84 c2 e4 95 fb 56 7d 14 aa 2a 5b 72 c9 19 7c |......V}..*[r..|| +peer0.org1.example.com | 00000040 a8 19 e1 c1 e8 a8 57 |......W|" +peer0.org1.example.com | "2019-04-22 06:16:47.139 UTC [cauthdsl] func2 -> DEBU 87c 0xc002ee5900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.140 UTC [cauthdsl] func1 -> DEBU 87d 0xc002ee5900 gate 1555913807138546100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.136 UTC [gossip.comm] writeToStream -> DEBU 86d Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.141 UTC [grpc] infof -> DEBU 87e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.146 UTC [policies] Evaluate -> DEBU 87f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.146 UTC [policies] Evaluate -> DEBU 880 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.147 UTC [policies] Evaluate -> DEBU 881 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.147 UTC [policies] Evaluate -> DEBU 882 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.147 UTC [gossip.comm] authenticateRemotePeer -> DEBU 883 Authenticated 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:16:47.147 UTC [gossip.comm] createConnection -> DEBU 884 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.148 UTC [gossip.comm] sendToEndpoint -> DEBU 885 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.165 UTC [comm.grpc.server] 1 -> INFO 886 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.165Z grpc.peer_address=192.168.224.8:55142 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.8µs +peer0.org1.example.com | "2019-04-22 06:16:47.169 UTC [msp.identity] Sign -> DEBU 887 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:47.175 UTC [msp.identity] Sign -> DEBU 888 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:47.201 UTC [gossip.comm] func1 -> DEBU 889 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.203 UTC [gossip.comm] authenticateRemotePeer -> DEBU 88b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.8:55142" +peer0.org1.example.com | "2019-04-22 06:16:47.201 UTC [gossip.gossip] handleMessage -> DEBU 88a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.205 UTC [gossip.pull] HandleMessage -> DEBU 88d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.205 UTC [gossip.pull] SendDigest -> DEBU 88e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:47.206 UTC [gossip.gossip] handleMessage -> DEBU 88f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.204 UTC [gossip.comm] func1 -> DEBU 88c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:55.119 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cea [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34604" +orderer0.example.com | "2019-04-22 06:16:55.119 UTC [orderer.common.blockcutter] Ordered -> DEBU ceb Enqueuing message into batch" +orderer0.example.com | "2019-04-22 06:16:55.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 2 on channel businesschannel took 58.3µs" +orderer0.example.com | "2019-04-22 06:16:55.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 3 on channel businesschannel took 47µs" +orderer0.example.com | "2019-04-22 06:16:55.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU cee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.2µs " +orderer0.example.com | "2019-04-22 06:16:55.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.3µs " +orderer0.example.com | "2019-04-22 06:16:55.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:55.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:55.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:55.300 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf3 Sending msg of 28 bytes to 3 on channel testchainid took 49.1µs" +orderer0.example.com | "2019-04-22 06:16:55.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.1µs " +orderer0.example.com | "2019-04-22 06:16:55.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2019-04-22 06:16:55.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +orderer0.example.com | "2019-04-22 06:16:55.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129µs " +orderer0.example.com | "2019-04-22 06:16:55.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 784.3µs " +orderer0.example.com | "2019-04-22 06:16:55.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:55.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:55.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:55.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfc Sending msg of 28 bytes to 3 on channel testchainid took 55.3µs" +orderer0.example.com | "2019-04-22 06:16:55.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.5µs " +orderer0.example.com | "2019-04-22 06:16:56.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +orderer0.example.com | "2019-04-22 06:16:56.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cff Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-04-22 06:16:56.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU d00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.7µs " +orderer0.example.com | "2019-04-22 06:16:56.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.5µs " +orderer0.example.com | "2019-04-22 06:16:56.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU d02 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:56.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU d03 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:56.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:56.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d05 Sending msg of 28 bytes to 3 on channel testchainid took 681.8µs" +orderer0.example.com | "2019-04-22 06:16:56.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU d06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.3µs " +orderer0.example.com | "2019-04-22 06:16:56.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 2 on channel businesschannel took 288.4µs" +orderer0.example.com | "2019-04-22 06:16:56.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d08 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-04-22 06:16:56.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU d09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 619.3µs " +orderer0.example.com | "2019-04-22 06:16:56.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.1µs " +orderer0.example.com | "2019-04-22 06:16:56.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:56.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:56.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:56.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0e Sending msg of 28 bytes to 3 on channel testchainid took 43.3µs" +peer0.org1.example.com | "2019-04-22 06:16:47.208 UTC [gossip.gossip] handleMessage -> DEBU 890 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.208 UTC [gossip.gossip] handleMessage -> DEBU 891 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.208 UTC [gossip.discovery] handleMsgFromComm -> DEBU 892 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.209 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 893 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:47.209 UTC [msp.identity] Verify -> DEBU 894 Verify: digest = 00000000 be 3f 6a d6 63 4b e0 6e 21 99 e8 e4 90 68 d0 57 |.?j.cK.n!....h.W| +peer0.org1.example.com | 00000010 62 b4 27 3a 63 f3 30 22 e6 23 e4 e8 cd e7 42 8f |b.':c.0".#....B.|" +peer0.org1.example.com | "2019-04-22 06:16:47.209 UTC [msp.identity] Verify -> DEBU 895 Verify: sig = 00000000 30 45 02 21 00 ba 03 da 46 30 5c f6 f0 2d c0 57 |0E.!....F0\..-.W| +peer0.org1.example.com | 00000010 00 bb 4c fd 58 7e a2 eb b7 08 d3 b9 09 cb 4e 1a |..L.X~........N.| +peer0.org1.example.com | 00000020 99 d0 5d a1 e6 02 20 30 f2 78 e9 56 2d 13 2f 59 |..]... 0.x.V-./Y| +peer0.org1.example.com | 00000030 6c b0 cb bb 50 8f 25 76 b1 1f 8c 0b 71 f5 93 30 |l...P.%v....q..0| +peer0.org1.example.com | 00000040 c4 b6 54 2c fa d6 e6 |..T,...|" +peer0.org1.example.com | "2019-04-22 06:16:47.211 UTC [msp.identity] Verify -> DEBU 896 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:47.211 UTC [msp.identity] Verify -> DEBU 897 Verify: sig = 00000000 30 44 02 20 44 67 0e 45 74 cc a4 f4 26 bf e0 cd |0D. Dg.Et...&...| +peer0.org1.example.com | 00000010 d7 16 3f 7f 72 fa e2 71 39 ec 85 63 9f 9e 77 47 |..?.r..q9..c..wG| +peer0.org1.example.com | 00000020 26 45 d5 8b 02 20 52 17 90 00 81 2f ea 15 62 f6 |&E... R..../..b.| +peer0.org1.example.com | 00000030 41 e2 e0 93 e5 a1 4a 4c f8 ed c5 3f 66 32 0d e5 |A.....JL...?f2..| +peer0.org1.example.com | 00000040 11 17 53 e0 a2 9f |..S...|" +peer0.org1.example.com | "2019-04-22 06:16:47.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 898 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 899 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:47.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 89a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 " +peer0.org1.example.com | "2019-04-22 06:16:47.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 89b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 " +peer0.org1.example.com | "2019-04-22 06:16:47.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 89c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:47.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 89d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.213 UTC [gossip.discovery] handleAliveMessage -> DEBU 89e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 89f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.213 UTC [gossip.discovery] sendMemResponse -> DEBU 8a0 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:47.213 UTC [msp] DeserializeIdentity -> DEBU 8a1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.215 UTC [gossip.comm] Send -> DEBU 8a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:47.217 UTC [gossip.discovery] sendMemResponse -> DEBU 8a3 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:47.218 UTC [gossip.comm] sendToEndpoint -> DEBU 8a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.218 UTC [gossip.comm] sendToEndpoint -> DEBU 8a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.229 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8a6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55142" +peer0.org1.example.com | "2019-04-22 06:16:47.230 UTC [msp] DeserializeIdentity -> DEBU 8a7 Obtaining identity" +orderer0.example.com | "2019-04-22 06:16:56.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.4µs " +orderer0.example.com | "2019-04-22 06:16:57.121 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d10 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:57.121 UTC [orderer.consensus.etcdraft] propose -> INFO d11 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:57.122 UTC [orderer.consensus.etcdraft] 2 -> DEBU d12 Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:57.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 3829 bytes to 2 on channel businesschannel took 33.3µs" +orderer0.example.com | "2019-04-22 06:16:57.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d14 Sending msg of 3829 bytes to 3 on channel businesschannel took 35.7µs" +orderer0.example.com | "2019-04-22 06:16:57.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer2.example.com(orderer2.example.com:7050) took 114.7µs " +orderer0.example.com | "2019-04-22 06:16:57.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU d16 Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer1.example.com(orderer1.example.com:7050) took 209.6µs " +orderer0.example.com | "2019-04-22 06:16:57.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d18 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +orderer0.example.com | "2019-04-22 06:16:57.135 UTC [orderer.common.cluster.step] sendMessage -> DEBU d19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 161.3µs " +orderer0.example.com | "2019-04-22 06:16:57.135 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d1a Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:16:57.135 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d1b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-04-22 06:16:57.135 UTC [msp.identity] Sign -> DEBU d1c Sign: plaintext: 0A020802120B0A090A03010203100418...D04CF396B45DFFD4EDB78F8FD3011014 " +orderer0.example.com | "2019-04-22 06:16:57.135 UTC [msp.identity] Sign -> DEBU d1d Sign: digest: 7A39D260F2DEC302B60456877223CD5D32ED4B0F64548E9E15B3783D9254EBA5 " +orderer0.example.com | "2019-04-22 06:16:57.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1f Sending msg of 28 bytes to 3 on channel businesschannel took 25.2µs" +orderer0.example.com | "2019-04-22 06:16:57.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU d20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.3µs " +orderer0.example.com | "2019-04-22 06:16:57.139 UTC [fsblkstorage] indexBlock -> DEBU d21 Indexing block [blockNum=4, blockHash=[]byte{0xf0, 0xcc, 0x1a, 0x99, 0xb6, 0xf2, 0x1c, 0x57, 0xc4, 0x65, 0xdc, 0xe5, 0xfd, 0x17, 0x4c, 0x10, 0xd, 0xda, 0x45, 0x9e, 0x46, 0x7c, 0x52, 0x8f, 0x16, 0x48, 0xbc, 0xa8, 0x52, 0x64, 0x75, 0x8e} txOffsets= +orderer0.example.com | txId=5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91 locPointer=offset=70, bytesLength=3703 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:16:57.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d22 Sending msg of 28 bytes to 2 on channel businesschannel took 41.3µs" +orderer0.example.com | "2019-04-22 06:16:57.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 3 on channel businesschannel took 34.1µs" +orderer0.example.com | "2019-04-22 06:16:57.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU d24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.6µs " +orderer0.example.com | "2019-04-22 06:16:57.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 230.9µs " +orderer0.example.com | "2019-04-22 06:16:57.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU d26 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.147 UTC [fsblkstorage] updateCheckpoint -> DEBU d27 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80791], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2019-04-22 06:16:57.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU d28 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.149 UTC [fsblkstorage] waitForBlock -> DEBU d29 Came out of wait. maxAvailaBlockNumber=[4]" +orderer0.example.com | "2019-04-22 06:16:57.149 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d2a Remaining bytes=[4709], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:57.149 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d2b Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +orderer0.example.com | "2019-04-22 06:16:57.149 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d2c [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2019-04-22 06:16:57.149 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d2d blockbytes [4707] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:57.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU d30 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.151 UTC [fsblkstorage] waitForBlock -> DEBU d2e Came out of wait. maxAvailaBlockNumber=[4]" +orderer0.example.com | "2019-04-22 06:16:57.152 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d31 Remaining bytes=[4709], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:16:57.152 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d32 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +orderer0.example.com | "2019-04-22 06:16:57.153 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d33 blockbytes [4707] read from file [0]" +orderer0.example.com | "2019-04-22 06:16:57.153 UTC [common.deliver] deliverBlocks -> DEBU d34 [channel: businesschannel] Delivering block [4] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:16:57.153 UTC [common.deliver] deliverBlocks -> DEBU d35 [channel: businesschannel] Delivering block [4] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:16:57.153 UTC [fsblkstorage] waitForBlock -> DEBU d36 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +orderer0.example.com | "2019-04-22 06:16:57.155 UTC [fsblkstorage] waitForBlock -> DEBU d37 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +orderer0.example.com | "2019-04-22 06:16:57.260 UTC [grpc] infof -> DEBU d38 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.231 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.231 UTC [msp] DeserializeIdentity -> DEBU 8a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.235 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.236 UTC [msp] DeserializeIdentity -> DEBU 8ab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.236 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8ac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.236 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8ad Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.237 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8ae Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.237 UTC [policies] Evaluate -> DEBU 8af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.237 UTC [policies] Evaluate -> DEBU 8b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.237 UTC [policies] Evaluate -> DEBU 8b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.238 UTC [cauthdsl] func1 -> DEBU 8b2 0xc002fb0720 gate 1555913807238033200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.238 UTC [cauthdsl] func2 -> DEBU 8b3 0xc002fb0720 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:57.260 UTC [orderer.common.broadcast] Handle -> WARN d39 Error reading from 192.168.224.9:34604: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:16:57.260 UTC [orderer.common.server] func1 -> DEBU d3a Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:16:57.260 UTC [comm.grpc.server] 1 -> INFO d3b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34604 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1750147s +orderer0.example.com | "2019-04-22 06:16:57.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3d Sending msg of 28 bytes to 3 on channel testchainid took 36.2µs" +orderer0.example.com | "2019-04-22 06:16:57.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.7µs " +orderer0.example.com | "2019-04-22 06:16:57.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel businesschannel took 132.3µs" +orderer0.example.com | "2019-04-22 06:16:57.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d40 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-04-22 06:16:57.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU d41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.7µs " +orderer0.example.com | "2019-04-22 06:16:57.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU d42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.1µs " +orderer0.example.com | "2019-04-22 06:16:57.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU d43 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU d44 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:57.796 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +orderer0.example.com | "2019-04-22 06:16:57.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +orderer0.example.com | "2019-04-22 06:16:58.084 UTC [orderer.common.server] replicateDisabledChains -> DEBU d48 No inactive chains to try to replicate" +orderer0.example.com | "2019-04-22 06:16:58.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d49 Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +orderer0.example.com | "2019-04-22 06:16:58.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 3 on channel businesschannel took 36.4µs" +orderer0.example.com | "2019-04-22 06:16:58.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.6µs " +orderer0.example.com | "2019-04-22 06:16:58.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.1µs " +orderer0.example.com | "2019-04-22 06:16:58.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:58.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:58.299 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:58.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d50 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +orderer0.example.com | "2019-04-22 06:16:58.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.2µs " +orderer0.example.com | "2019-04-22 06:16:58.608 UTC [orderer.common.server] Broadcast -> DEBU d52 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:16:58.609 UTC [orderer.common.broadcast] Handle -> DEBU d53 Starting new broadcast loop for 192.168.224.9:34634" +orderer0.example.com | "2019-04-22 06:16:58.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d54 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +orderer0.example.com | "2019-04-22 06:16:58.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d55 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-04-22 06:16:58.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.4µs " +orderer0.example.com | "2019-04-22 06:16:58.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU d57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.8µs " +orderer0.example.com | "2019-04-22 06:16:58.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:58.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU d59 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:58.647 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d5a [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34634 with txid '7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [cauthdsl] func1 -> DEBU d60 0xc000ec8bf0 gate 1555913818649077200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.238 UTC [cauthdsl] func2 -> DEBU 8b4 0xc002fb0720 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.238 UTC [cauthdsl] func2 -> DEBU 8b5 0xc002fb0720 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.241 UTC [grpc] infof -> DEBU 8b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.243 UTC [gossip.comm] func1 -> DEBU 8b7 Got message: GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.244 UTC [gossip.gossip] handleMessage -> DEBU 8b8 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.244 UTC [gossip.gossip] handleMessage -> DEBU 8b9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.245 UTC [gossip.discovery] handleMsgFromComm -> DEBU 8ba Got message: GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.245 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 8bb Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:47.246 UTC [msp] DeserializeIdentity -> DEBU 8bc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.247 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8be Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8bf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.247 UTC [policies] Evaluate -> DEBU 8c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.247 UTC [policies] Evaluate -> DEBU 8c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.248 UTC [policies] Evaluate -> DEBU 8c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.248 UTC [cauthdsl] func1 -> DEBU 8c3 0xc002f454b0 gate 1555913807248438400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.248 UTC [cauthdsl] func2 -> DEBU 8c4 0xc002f454b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.248 UTC [cauthdsl] func2 -> DEBU 8c5 0xc002f454b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.248 UTC [cauthdsl] func2 -> DEBU 8c6 0xc002f454b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [msp.identity] Verify -> DEBU 8c7 Verify: digest = 00000000 7f 58 8e c5 64 5d 0a 09 f4 20 27 06 2d cd 9a 10 |.X..d]... '.-...| +peer0.org1.example.com | 00000010 2c 8f 13 7a 70 7d 9b bb b6 32 6c e7 62 bc a2 de |,..zp}...2l.b...|" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [msp.identity] Verify -> DEBU 8c8 Verify: sig = 00000000 30 44 02 20 15 ff c7 29 a2 2b bc af 47 fd 45 60 |0D. ...).+..G.E`| +peer0.org1.example.com | 00000010 2b 0b db bf da 4f e3 ef 38 ad 76 c6 1c 29 15 cd |+....O..8.v..)..| +peer0.org1.example.com | 00000020 d6 cb e2 5d 02 20 46 c0 0d 40 c3 4e 97 59 e2 61 |...]. F..@.N.Y.a| +peer0.org1.example.com | 00000030 b3 8e 40 13 02 26 b6 25 99 65 41 34 3c 8a de d4 |..@..&.%.eA4<...| +peer0.org1.example.com | 00000040 d8 5a b4 7a 17 fc |.Z.z..|" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [cauthdsl] func2 -> DEBU 8c9 0xc002f454b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [cauthdsl] func1 -> DEBU 8ca 0xc002f454b0 gate 1555913807248438400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d61 0xc000ec8bf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d62 0xc000ec8bf0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d63 0xc000ec8bf0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [msp.identity] Verify -> DEBU d64 Verify: digest = 00000000 40 4c 26 4c fb 34 d1 c3 d2 5f f2 5e 28 85 0a 26 |@L&L.4..._.^(..&| +orderer0.example.com | 00000010 54 e4 8b e2 03 db 5d dc ca 5f 9a 06 d2 68 86 b9 |T.....].._...h..|" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [msp.identity] Verify -> DEBU d65 Verify: sig = 00000000 30 44 02 20 2b 6f d0 55 6c 20 6d a0 ad fd fc 45 |0D. +o.Ul m....E| +orderer0.example.com | 00000010 1a 21 7f 2e 86 57 96 c0 73 80 19 3d 4f 01 9f ac |.!...W..s..=O...| +orderer0.example.com | 00000020 02 40 0e 2d 02 20 0c 0a a3 dc 20 5d 41 73 23 0c |.@.-. .... ]As#.| +orderer0.example.com | 00000030 6a 4f b3 00 27 41 21 da 7e f7 1c cd c0 ca d9 2d |jO..'A!.~......-| +orderer0.example.com | 00000040 c8 3d 55 08 7b 14 |.=U.{.|" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d66 0xc000ec8bf0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [cauthdsl] func1 -> DEBU d67 0xc000ec8bf0 gate 1555913818649077200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d68 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6a Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6c Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:16:58.650 UTC [orderer.common.blockcutter] Ordered -> DEBU d6e Enqueuing message into batch" +orderer0.example.com | "2019-04-22 06:16:58.650 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d6f [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34634" +orderer0.example.com | "2019-04-22 06:16:58.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU d70 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:58.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel testchainid took 134.7µs" +orderer0.example.com | "2019-04-22 06:16:58.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.4µs " +orderer0.example.com | "2019-04-22 06:16:59.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 2 on channel businesschannel took 67.2µs" +orderer0.example.com | "2019-04-22 06:16:59.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel businesschannel took 185µs" +orderer0.example.com | "2019-04-22 06:16:59.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.6µs " +orderer0.example.com | "2019-04-22 06:16:59.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU d76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.3µs " +orderer0.example.com | "2019-04-22 06:16:59.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU d77 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:59.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU d78 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:59.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU d79 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:59.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel testchainid took 32.5µs" +orderer0.example.com | "2019-04-22 06:16:59.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +orderer0.example.com | "2019-04-22 06:16:59.646 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7c Sending msg of 28 bytes to 2 on channel businesschannel took 81µs" +orderer0.example.com | "2019-04-22 06:16:59.647 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-04-22 06:16:59.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.8µs " +orderer0.example.com | "2019-04-22 06:16:59.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 332.2µs " +orderer0.example.com | "2019-04-22 06:16:59.650 UTC [orderer.common.cluster.step] handleMessage -> DEBU d80 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:59.651 UTC [orderer.common.cluster.step] handleMessage -> DEBU d81 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:59.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU d82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:16:59.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +orderer0.example.com | "2019-04-22 06:16:59.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.9µs " +orderer0.example.com | "2019-04-22 06:17:00.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 2 on channel businesschannel took 39.4µs" +orderer0.example.com | "2019-04-22 06:17:00.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel businesschannel took 40.6µs" +orderer0.example.com | "2019-04-22 06:17:00.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.3µs " +orderer0.example.com | "2019-04-22 06:17:00.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU d88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 212.2µs " +orderer0.example.com | "2019-04-22 06:17:00.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:16:47.250 UTC [gossip.discovery] handleAliveMessage -> DEBU 8cf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 " +peer0.org1.example.com | "2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 " +peer0.org1.example.com | "2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d4 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.251 UTC [gossip.discovery] handleAliveMessage -> DEBU 8d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.251 UTC [gossip.discovery] handleMsgFromComm -> DEBU 8d6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.251 UTC [gossip.discovery] sendMemResponse -> DEBU 8d7 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:47.251 UTC [msp] DeserializeIdentity -> DEBU 8d8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.251 UTC [msp] DeserializeIdentity -> DEBU 8d9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.251 UTC [gossip.comm] Send -> DEBU 8da Entering, sending GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:47.251 UTC [gossip.discovery] sendMemResponse -> DEBU 8db Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:47.252 UTC [gossip.comm] sendToEndpoint -> DEBU 8dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.252 UTC [gossip.comm] sendToEndpoint -> DEBU 8dd Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.238 UTC [msp.identity] Verify -> DEBU 8de Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:16:47.252 UTC [msp.identity] Verify -> DEBU 8df Verify: sig = 00000000 30 44 02 20 61 91 59 62 ae d7 f0 15 64 27 e2 19 |0D. a.Yb....d'..| +peer0.org1.example.com | 00000010 a7 9a e6 8c 87 b5 22 88 2d 81 07 71 57 03 f8 51 |......".-..qW..Q| +peer0.org1.example.com | 00000020 7b 93 c7 08 02 20 4c 21 7c b9 e5 a0 7e 27 83 ef |{.... L!|...~'..| +peer0.org1.example.com | 00000030 75 89 69 9a ad b2 90 b5 e5 6a 0a 50 82 da b0 c3 |u.i......j.P....| +peer0.org1.example.com | 00000040 b4 19 69 7f e8 dc |..i...|" +peer0.org1.example.com | "2019-04-22 06:16:47.252 UTC [cauthdsl] func2 -> DEBU 8e0 0xc002fb0720 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.252 UTC [cauthdsl] func1 -> DEBU 8e1 0xc002fb0720 gate 1555913807238033200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.252 UTC [policies] Evaluate -> DEBU 8e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.253 UTC [policies] Evaluate -> DEBU 8e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.253 UTC [policies] Evaluate -> DEBU 8e4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.253 UTC [policies] Evaluate -> DEBU 8e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.253 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8e6 Authenticated 192.168.224.8:55142" +peer0.org1.example.com | "2019-04-22 06:16:47.253 UTC [gossip.comm] GossipStream -> DEBU 8e7 Servicing 192.168.224.8:55142" +peer0.org1.example.com | "2019-04-22 06:16:47.253 UTC [gossip.comm] serviceConnection -> DEBU 8e8 Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:16:47.253 UTC [gossip.comm] writeToStream -> DEBU 8e9 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.254 UTC [gossip.comm] readFromStream -> DEBU 8ea 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:16:47.254 UTC [gossip.comm] readFromStream -> DEBU 8eb Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:16:47.254 UTC [gossip.comm] func2 -> DEBU 8ec Client 192.168.224.8:55142 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:47.254 UTC [comm.grpc.server] 1 -> INFO 8ed streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.168Z grpc.peer_address=192.168.224.8:55142 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.7894ms +peer0.org1.example.com | "2019-04-22 06:16:47.254 UTC [gossip.comm] writeToStream -> DEBU 8ee Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.257 UTC [grpc] infof -> DEBU 8ef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.273 UTC [comm.grpc.server] 1 -> INFO 8f0 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.271Z grpc.peer_address=192.168.224.7:48242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=722.5µs +peer0.org1.example.com | "2019-04-22 06:16:47.276 UTC [msp.identity] Sign -> DEBU 8f1 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:47.276 UTC [msp.identity] Sign -> DEBU 8f2 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +orderer0.example.com | "2019-04-22 06:17:00.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +orderer0.example.com | "2019-04-22 06:17:00.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +orderer0.example.com | "2019-04-22 06:17:00.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8e Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" +orderer0.example.com | "2019-04-22 06:17:00.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +orderer0.example.com | "2019-04-22 06:17:00.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 510.1µs " +orderer0.example.com | "2019-04-22 06:17:00.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU d91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3323ms " +orderer0.example.com | "2019-04-22 06:17:00.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU d92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU d93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.650 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d94 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:00.651 UTC [orderer.consensus.etcdraft] propose -> INFO d95 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:00.652 UTC [orderer.consensus.etcdraft] 2 -> DEBU d96 Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:00.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel testchainid took 152.9µs" +orderer0.example.com | "2019-04-22 06:17:00.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 859.7µs " +orderer0.example.com | "2019-04-22 06:17:00.920 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9a Send of ConsensusRequest for channel businesschannel with payload of size 4833 to orderer1.example.com(orderer1.example.com:7050) took 170.8µs " +orderer0.example.com | "2019-04-22 06:17:00.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 4833 bytes to 2 on channel businesschannel took 165.9µs" +orderer0.example.com | "2019-04-22 06:17:00.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 4833 bytes to 3 on channel businesschannel took 47.9µs" +orderer0.example.com | "2019-04-22 06:17:00.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9d Send of ConsensusRequest for channel businesschannel with payload of size 4833 to orderer2.example.com(orderer2.example.com:7050) took 115µs " +orderer0.example.com | "2019-04-22 06:17:00.928 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9f Sending msg of 28 bytes to 3 on channel businesschannel took 27µs" +orderer0.example.com | "2019-04-22 06:17:00.929 UTC [orderer.consensus.etcdraft] writeBlock -> INFO da0 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:00.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-04-22 06:17:00.930 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.4µs " +orderer0.example.com | "2019-04-22 06:17:00.930 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU da3 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-04-22 06:17:00.930 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.6µs " +orderer0.example.com | "2019-04-22 06:17:00.931 UTC [msp.identity] Sign -> DEBU da5 Sign: plaintext: 0A020802120B0A090A03010203100418...30564CF1B61162A1884B7944D76AC61E " +orderer0.example.com | "2019-04-22 06:17:00.931 UTC [msp.identity] Sign -> DEBU da6 Sign: digest: 84FDAB8DF26B37C0FD651B79A07F4A24C04A2763663E585AB59A6D1F3AEBD873 " +orderer0.example.com | "2019-04-22 06:17:00.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU da8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:00.941 UTC [fsblkstorage] indexBlock -> DEBU daa Indexing block [blockNum=5, blockHash=[]byte{0xf, 0x5a, 0xbc, 0x96, 0x5a, 0x90, 0x27, 0x82, 0xd2, 0x66, 0x93, 0xf6, 0xa4, 0x7b, 0xd3, 0x45, 0x68, 0xc2, 0x57, 0xa8, 0xb7, 0xa4, 0x2b, 0xc8, 0x69, 0x86, 0x9a, 0xd3, 0xd0, 0x37, 0x56, 0x39} txOffsets= +orderer0.example.com | txId=7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869 locPointer=offset=70, bytesLength=4707 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:17:00.944 UTC [fsblkstorage] updateCheckpoint -> DEBU dab Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86505], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2019-04-22 06:17:00.944 UTC [fsblkstorage] waitForBlock -> DEBU dac Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-04-22 06:17:00.945 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dae Remaining bytes=[5714], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:00.945 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU daf Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +orderer0.example.com | "2019-04-22 06:17:00.945 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db0 blockbytes [5712] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:00.944 UTC [orderer.commmon.multichannel] commitBlock -> DEBU dad [channel: businesschannel] Wrote block [5]" +peer0.org1.example.com | "2019-04-22 06:16:47.276 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f3 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.7:48242" +peer0.org1.example.com | "2019-04-22 06:16:47.277 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f4 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48242" +peer0.org1.example.com | "2019-04-22 06:16:47.278 UTC [msp] DeserializeIdentity -> DEBU 8f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.278 UTC [msp] DeserializeIdentity -> DEBU 8f6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.279 UTC [msp.identity] newIdentity -> DEBU 8f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:47.279 UTC [msp] Validate -> DEBU 8f8 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:47.280 UTC [msp] getCertificationChain -> DEBU 8f9 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:47.282 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.282 UTC [msp] DeserializeIdentity -> DEBU 8fb Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:00.946 UTC [common.deliver] deliverBlocks -> DEBU db1 [channel: businesschannel] Delivering block [5] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:17:00.946 UTC [fsblkstorage] waitForBlock -> DEBU db2 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-04-22 06:17:00.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db4 Remaining bytes=[5714], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:00.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db5 Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +orderer0.example.com | "2019-04-22 06:17:00.948 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db6 blockbytes [5712] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:00.947 UTC [fsblkstorage] waitForBlock -> DEBU db3 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-04-22 06:17:00.949 UTC [common.deliver] deliverBlocks -> DEBU db7 [channel: businesschannel] Delivering block [5] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:17:00.950 UTC [fsblkstorage] waitForBlock -> DEBU db8 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-04-22 06:17:01.072 UTC [orderer.common.broadcast] Handle -> WARN db9 Error reading from 192.168.224.9:34634: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:01.072 UTC [orderer.common.server] func1 -> DEBU dba Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:17:01.072 UTC [comm.grpc.server] 1 -> INFO dbb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34634 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.4635303s +orderer0.example.com | "2019-04-22 06:17:01.074 UTC [grpc] infof -> DEBU dbc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:01.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbd Sending msg of 28 bytes to 2 on channel businesschannel took 39.9µs" +orderer0.example.com | "2019-04-22 06:17:01.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 3 on channel businesschannel took 38.3µs" +orderer0.example.com | "2019-04-22 06:17:01.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.4µs " +orderer0.example.com | "2019-04-22 06:17:01.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.6µs " +orderer0.example.com | "2019-04-22 06:17:01.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:01.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:01.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:01.296 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc4 Sending msg of 28 bytes to 3 on channel testchainid took 31.3µs" +orderer0.example.com | "2019-04-22 06:17:01.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.8µs " +orderer0.example.com | "2019-04-22 06:17:01.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc6 Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +orderer0.example.com | "2019-04-22 06:17:01.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-04-22 06:17:01.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.6µs " +orderer0.example.com | "2019-04-22 06:17:01.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.8µs " +orderer0.example.com | "2019-04-22 06:17:01.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU dca Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:01.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:01.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:01.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcd Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2019-04-22 06:17:01.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU dce Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +orderer0.example.com | "2019-04-22 06:17:02.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 2 on channel businesschannel took 40.7µs" +orderer0.example.com | "2019-04-22 06:17:02.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +orderer0.example.com | "2019-04-22 06:17:02.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106µs " +orderer0.example.com | "2019-04-22 06:17:02.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +orderer0.example.com | "2019-04-22 06:17:02.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:02.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:02.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:02.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd6 Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +orderer0.example.com | "2019-04-22 06:17:02.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 921µs " +orderer0.example.com | "2019-04-22 06:17:02.380 UTC [orderer.common.server] Broadcast -> DEBU dd8 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:17:02.381 UTC [orderer.common.broadcast] Handle -> DEBU dd9 Starting new broadcast loop for 192.168.224.9:34648" +peer0.org1.example.com | "2019-04-22 06:16:47.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.284 UTC [msp] DeserializeIdentity -> DEBU 8fd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.285 UTC [grpc] infof -> DEBU 8ff transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.284 UTC [msp] DeserializeIdentity -> DEBU 8fe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 900 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 901 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 902 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.289 UTC [policies] Evaluate -> DEBU 903 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.289 UTC [policies] Evaluate -> DEBU 904 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.290 UTC [policies] Evaluate -> DEBU 905 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.290 UTC [cauthdsl] func1 -> DEBU 906 0xc003022510 gate 1555913807290863000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.290 UTC [cauthdsl] func2 -> DEBU 907 0xc003022510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.291 UTC [cauthdsl] func2 -> DEBU 908 0xc003022510 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.291 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 909 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:16:47.291 UTC [msp] Validate -> DEBU 90a MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:47.291 UTC [msp] getCertificationChain -> DEBU 90b MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:47.291 UTC [cauthdsl] func2 -> DEBU 90c 0xc003022510 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.292 UTC [msp.identity] Verify -> DEBU 90d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-04-22 06:16:47.292 UTC [msp.identity] Verify -> DEBU 90e Verify: sig = 00000000 30 45 02 21 00 fe 3f d8 0e 56 b4 cf 78 91 02 cf |0E.!..?..V..x...| +peer0.org1.example.com | 00000010 c0 e0 a3 b4 c6 8f 6c 92 5b bd 04 81 7d 61 dc 65 |......l.[...}a.e| +peer0.org1.example.com | 00000020 67 8d 64 7f c0 02 20 2c 77 f1 d9 dd 4d e7 a4 74 |g.d... ,w...M..t| +peer0.org1.example.com | 00000030 71 19 67 37 82 9b bb ee 07 2d 7d a8 9b 7e 7c b7 |q.g7.....-}..~|.| +peer0.org1.example.com | 00000040 29 14 82 cd bf 2e 71 |).....q|" +peer0.org1.example.com | "2019-04-22 06:16:47.292 UTC [cauthdsl] func2 -> DEBU 90f 0xc003022510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.292 UTC [cauthdsl] func1 -> DEBU 910 0xc003022510 gate 1555913807290863000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.292 UTC [policies] Evaluate -> DEBU 911 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.292 UTC [policies] Evaluate -> DEBU 912 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.293 UTC [policies] Evaluate -> DEBU 913 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.293 UTC [policies] Evaluate -> DEBU 914 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.293 UTC [gossip.comm] authenticateRemotePeer -> DEBU 915 Authenticated 192.168.224.7:48242" +peer0.org1.example.com | "2019-04-22 06:16:47.294 UTC [gossip.comm] GossipStream -> DEBU 916 Servicing 192.168.224.7:48242" +peer0.org1.example.com | "2019-04-22 06:16:47.294 UTC [gossip.comm] readFromStream -> DEBU 917 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:16:47.294 UTC [gossip.comm] func2 -> DEBU 918 Client 192.168.224.7:48242 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:47.295 UTC [comm.grpc.server] 1 -> INFO 919 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.275Z grpc.peer_address=192.168.224.7:48242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.2103ms +peer0.org1.example.com | "2019-04-22 06:16:47.295 UTC [gossip.comm] writeToStream -> DEBU 91a Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.296 UTC [comm.grpc.server] 1 -> INFO 91b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.295Z grpc.peer_address=192.168.224.7:48244 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=125.1µs +peer0.org1.example.com | "2019-04-22 06:16:47.299 UTC [msp.identity] Sign -> DEBU 91c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +orderer0.example.com | "2019-04-22 06:17:02.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 2 on channel businesschannel took 38.8µs" +orderer0.example.com | "2019-04-22 06:17:02.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddb Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" +orderer0.example.com | "2019-04-22 06:17:02.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.5µs " +orderer0.example.com | "2019-04-22 06:17:02.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.8µs " +orderer0.example.com | "2019-04-22 06:17:02.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU dde Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:02.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:02.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:02.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de1 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2019-04-22 06:17:02.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +orderer0.example.com | "2019-04-22 06:17:03.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 2 on channel businesschannel took 38.9µs" +orderer0.example.com | "2019-04-22 06:17:03.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-04-22 06:17:03.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU de5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.6µs " +orderer0.example.com | "2019-04-22 06:17:03.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115.8µs " +orderer0.example.com | "2019-04-22 06:17:03.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:03.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:03.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:03.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dea Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +orderer0.example.com | "2019-04-22 06:17:03.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU deb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.8µs " +orderer0.example.com | "2019-04-22 06:17:03.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 2 on channel businesschannel took 35.1µs" +orderer0.example.com | "2019-04-22 06:17:03.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 3 on channel businesschannel took 102.1µs" +orderer0.example.com | "2019-04-22 06:17:03.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU dee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 155.4µs " +orderer0.example.com | "2019-04-22 06:17:03.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +orderer0.example.com | "2019-04-22 06:17:03.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU df0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:03.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:03.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:03.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df3 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +orderer0.example.com | "2019-04-22 06:17:03.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.3µs " +orderer0.example.com | "2019-04-22 06:17:04.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +orderer0.example.com | "2019-04-22 06:17:04.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 3 on channel businesschannel took 25µs" +orderer0.example.com | "2019-04-22 06:17:04.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.3µs " +orderer0.example.com | "2019-04-22 06:17:04.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.8µs " +orderer0.example.com | "2019-04-22 06:17:04.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU df9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:04.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:04.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:04.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfc Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-04-22 06:17:04.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.5µs " +orderer0.example.com | "2019-04-22 06:17:04.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +orderer0.example.com | "2019-04-22 06:17:04.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +peer0.org1.example.com | "2019-04-22 06:16:47.299 UTC [msp.identity] Sign -> DEBU 91d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:47.299 UTC [gossip.comm] authenticateRemotePeer -> DEBU 91e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.7:48244" +peer0.org1.example.com | "2019-04-22 06:16:47.300 UTC [gossip.comm] authenticateRemotePeer -> DEBU 91f Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48244" +peer0.org1.example.com | "2019-04-22 06:16:47.300 UTC [msp] DeserializeIdentity -> DEBU 920 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.303 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 921 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.304 UTC [msp] DeserializeIdentity -> DEBU 922 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 923 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.304 UTC [msp] DeserializeIdentity -> DEBU 924 Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:04.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.2µs " +orderer0.example.com | "2019-04-22 06:17:04.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0375ms " +orderer0.example.com | "2019-04-22 06:17:04.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e02 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:04.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:04.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:04.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e05 Sending msg of 28 bytes to 3 on channel testchainid took 34.4µs" +orderer0.example.com | "2019-04-22 06:17:04.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU e06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 363.7µs " +orderer0.example.com | "2019-04-22 06:17:05.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 2 on channel businesschannel took 57µs" +orderer0.example.com | "2019-04-22 06:17:05.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 460.7µs " +orderer0.example.com | "2019-04-22 06:17:05.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 3 on channel businesschannel took 97.4µs" +orderer0.example.com | "2019-04-22 06:17:05.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:05.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.3µs " +orderer0.example.com | "2019-04-22 06:17:05.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:05.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:05.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +orderer0.example.com | "2019-04-22 06:17:05.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 898.9µs " +orderer0.example.com | "2019-04-22 06:17:05.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-04-22 06:17:05.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +orderer0.example.com | "2019-04-22 06:17:05.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114µs " +orderer0.example.com | "2019-04-22 06:17:05.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 234µs " +orderer0.example.com | "2019-04-22 06:17:05.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:05.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:05.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:05.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e17 Sending msg of 28 bytes to 3 on channel testchainid took 200.4µs" +orderer0.example.com | "2019-04-22 06:17:05.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.8µs " +orderer0.example.com | "2019-04-22 06:17:06.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 2 on channel businesschannel took 33.2µs" +orderer0.example.com | "2019-04-22 06:17:06.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 3 on channel businesschannel took 194.9µs" +orderer0.example.com | "2019-04-22 06:17:06.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " +orderer0.example.com | "2019-04-22 06:17:06.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 365.8µs " +orderer0.example.com | "2019-04-22 06:17:06.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:06.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:06.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:06.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e20 Sending msg of 28 bytes to 3 on channel testchainid took 400.1µs" +orderer0.example.com | "2019-04-22 06:17:06.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 939.1µs " +orderer0.example.com | "2019-04-22 06:17:06.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-04-22 06:17:06.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 3 on channel businesschannel took 218.3µs" +orderer0.example.com | "2019-04-22 06:17:06.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.3µs " +orderer0.example.com | "2019-04-22 06:17:06.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e25 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:06.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:06.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +orderer0.example.com | "2019-04-22 06:17:06.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:06.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e29 Sending msg of 28 bytes to 3 on channel testchainid took 109.3µs" +orderer0.example.com | "2019-04-22 06:17:06.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2797ms " +orderer0.example.com | "2019-04-22 06:17:07.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +orderer0.example.com | "2019-04-22 06:17:07.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-04-22 06:17:07.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +orderer0.example.com | "2019-04-22 06:17:07.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.2µs " +orderer0.example.com | "2019-04-22 06:17:07.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:07.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:07.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:07.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e32 Sending msg of 28 bytes to 3 on channel testchainid took 117.2µs" +orderer0.example.com | "2019-04-22 06:17:07.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +orderer0.example.com | "2019-04-22 06:17:07.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel businesschannel took 42.1µs" +orderer0.example.com | "2019-04-22 06:17:07.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 2 on channel businesschannel took 134.9µs" +orderer0.example.com | "2019-04-22 06:17:07.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.5µs " +orderer0.example.com | "2019-04-22 06:17:07.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.9µs " +orderer0.example.com | "2019-04-22 06:17:07.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:07.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:07.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:07.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3b Sending msg of 28 bytes to 3 on channel testchainid took 92.6µs" +orderer0.example.com | "2019-04-22 06:17:07.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " +orderer0.example.com | "2019-04-22 06:17:08.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 2 on channel businesschannel took 86.2µs" +orderer0.example.com | "2019-04-22 06:17:08.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-04-22 06:17:08.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.1µs " +orderer0.example.com | "2019-04-22 06:17:08.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.4µs " +orderer0.example.com | "2019-04-22 06:17:08.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:08.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:08.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:08.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e44 Sending msg of 28 bytes to 3 on channel testchainid took 58.7µs" +orderer0.example.com | "2019-04-22 06:17:08.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 582.2µs " +orderer0.example.com | "2019-04-22 06:17:08.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 2 on channel businesschannel took 35.1µs" +orderer0.example.com | "2019-04-22 06:17:08.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.7µs " +orderer0.example.com | "2019-04-22 06:17:08.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 3 on channel businesschannel took 915.6µs" +orderer0.example.com | "2019-04-22 06:17:08.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.1µs " +orderer0.example.com | "2019-04-22 06:17:08.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:08.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 925 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 926 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 927 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [policies] Evaluate -> DEBU 928 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [policies] Evaluate -> DEBU 929 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [policies] Evaluate -> DEBU 92a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [cauthdsl] func1 -> DEBU 92b 0xc00305f860 gate 1555913807305738200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [cauthdsl] func2 -> DEBU 92c 0xc00305f860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [cauthdsl] func2 -> DEBU 92d 0xc00305f860 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.305 UTC [cauthdsl] func2 -> DEBU 92e 0xc00305f860 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.306 UTC [msp.identity] Verify -> DEBU 92f Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-04-22 06:16:47.306 UTC [msp.identity] Verify -> DEBU 930 Verify: sig = 00000000 30 44 02 20 25 ed b0 d7 25 4e a6 48 e2 6b a1 0f |0D. %...%N.H.k..| +peer0.org1.example.com | 00000010 79 f4 dc 26 65 f0 59 74 6b ff 57 89 95 87 69 cb |y..&e.Ytk.W...i.| +peer0.org1.example.com | 00000020 4d 5d 0e d9 02 20 7d e5 9e 8f 65 f0 05 08 f0 1e |M]... }...e.....| +peer0.org1.example.com | 00000030 b7 91 86 94 39 db 40 ef f4 16 c4 96 89 c8 75 a9 |....9.@.......u.| +peer0.org1.example.com | 00000040 93 54 52 dd 2d 17 |.TR.-.|" +peer0.org1.example.com | "2019-04-22 06:16:47.306 UTC [cauthdsl] func2 -> DEBU 931 0xc00305f860 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.307 UTC [cauthdsl] func1 -> DEBU 932 0xc00305f860 gate 1555913807305738200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.307 UTC [policies] Evaluate -> DEBU 933 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.309 UTC [policies] Evaluate -> DEBU 934 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.309 UTC [policies] Evaluate -> DEBU 935 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.310 UTC [policies] Evaluate -> DEBU 936 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.310 UTC [gossip.comm] authenticateRemotePeer -> DEBU 937 Authenticated 192.168.224.7:48244" +peer0.org1.example.com | "2019-04-22 06:16:47.310 UTC [gossip.comm] GossipStream -> DEBU 938 Servicing 192.168.224.7:48244" +peer0.org1.example.com | "2019-04-22 06:16:47.311 UTC [gossip.gossip] handleMessage -> DEBU 939 Entering, 192.168.224.7:48244 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.311 UTC [gossip.gossip] handleMessage -> DEBU 93a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 93b Got message: GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 93c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:47.312 UTC [msp] DeserializeIdentity -> DEBU 93d Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:08.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:08.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4d Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2019-04-22 06:17:08.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +orderer0.example.com | "2019-04-22 06:17:09.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 2 on channel businesschannel took 39.9µs" +orderer0.example.com | "2019-04-22 06:17:09.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 35.4µs" +orderer0.example.com | "2019-04-22 06:17:09.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 354.5µs " +orderer0.example.com | "2019-04-22 06:17:09.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:09.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.2µs " +orderer0.example.com | "2019-04-22 06:17:09.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:09.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:09.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.6µs " +orderer0.example.com | "2019-04-22 06:17:09.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel testchainid took 163.8µs" +orderer0.example.com | "2019-04-22 06:17:09.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 2 on channel businesschannel took 45.7µs" +orderer0.example.com | "2019-04-22 06:17:09.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" +orderer0.example.com | "2019-04-22 06:17:09.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.6µs " +orderer0.example.com | "2019-04-22 06:17:09.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.9µs " +orderer0.example.com | "2019-04-22 06:17:09.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:09.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:09.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:09.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5f Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +orderer0.example.com | "2019-04-22 06:17:09.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU e60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 666.2µs " +orderer0.example.com | "2019-04-22 06:17:10.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 2 on channel businesschannel took 47.2µs" +orderer0.example.com | "2019-04-22 06:17:10.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.1µs " +orderer0.example.com | "2019-04-22 06:17:10.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.5µs " +orderer0.example.com | "2019-04-22 06:17:10.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel businesschannel took 1.5774ms" +orderer0.example.com | "2019-04-22 06:17:10.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e65 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:10.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:10.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:10.296 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e68 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2019-04-22 06:17:10.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU e69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.5µs " +orderer0.example.com | "2019-04-22 06:17:10.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 3 on channel businesschannel took 31.4µs" +orderer0.example.com | "2019-04-22 06:17:10.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +orderer0.example.com | "2019-04-22 06:17:10.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232.1µs " +orderer0.example.com | "2019-04-22 06:17:10.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6993ms " +orderer0.example.com | "2019-04-22 06:17:10.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:10.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:10.799 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:10.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e71 Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +peer0.org1.example.com | "2019-04-22 06:16:47.313 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 93e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 93f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 940 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.313 UTC [policies] Evaluate -> DEBU 941 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.313 UTC [policies] Evaluate -> DEBU 942 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.313 UTC [policies] Evaluate -> DEBU 943 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.314 UTC [cauthdsl] func1 -> DEBU 944 0xc003069830 gate 1555913807314521200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.314 UTC [cauthdsl] func2 -> DEBU 945 0xc003069830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.314 UTC [cauthdsl] func2 -> DEBU 946 0xc003069830 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.314 UTC [cauthdsl] func2 -> DEBU 947 0xc003069830 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.315 UTC [msp.identity] Verify -> DEBU 948 Verify: digest = 00000000 b4 40 48 cb 6b e8 46 35 30 d0 2d cd b2 48 ce c8 |.@H.k.F50.-..H..| +peer0.org1.example.com | 00000010 de df 06 8a 98 d0 33 3a fa c0 e1 92 fd c5 f7 dd |......3:........|" +peer0.org1.example.com | "2019-04-22 06:16:47.315 UTC [msp.identity] Verify -> DEBU 949 Verify: sig = 00000000 30 44 02 20 30 f3 92 7d f1 9b c2 bd 42 46 26 7d |0D. 0..}....BF&}| +peer0.org1.example.com | 00000010 96 ed da 18 f4 38 9c 54 5a 5e 53 b7 e2 55 b5 77 |.....8.TZ^S..U.w| +peer0.org1.example.com | 00000020 51 50 3b 9d 02 20 6c 58 c0 18 fa 0b bb ad 69 6f |QP;.. lX......io| +peer0.org1.example.com | 00000030 1c 53 4d 98 f4 44 25 15 d9 99 e2 5e fe 85 4d 3d |.SM..D%....^..M=| +peer0.org1.example.com | 00000040 15 0b 83 95 98 8a |......|" +peer0.org1.example.com | "2019-04-22 06:16:47.315 UTC [cauthdsl] func2 -> DEBU 94a 0xc003069830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.315 UTC [cauthdsl] func1 -> DEBU 94b 0xc003069830 gate 1555913807314521200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 950 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.317 UTC [gossip.discovery] learnNewMembers -> DEBU 951 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-04-22 06:16:47.318 UTC [gossip.discovery] learnNewMembers -> DEBU 952 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.318 UTC [gossip.discovery] learnNewMembers -> DEBU 953 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.318 UTC [gossip.discovery] handleAliveMessage -> DEBU 954 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.320 UTC [gossip.discovery] sendMemResponse -> DEBU 955 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:47.320 UTC [msp] DeserializeIdentity -> DEBU 956 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.320 UTC [msp] DeserializeIdentity -> DEBU 957 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.321 UTC [msp] DeserializeIdentity -> DEBU 958 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.321 UTC [gossip.comm] Send -> DEBU 95a Entering, sending GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:47.321 UTC [gossip.discovery] sendMemResponse -> DEBU 95b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:47.321 UTC [gossip.comm] sendToEndpoint -> DEBU 95c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:47.321 UTC [gossip.comm] sendToEndpoint -> DEBU 95d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 959 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:47.388 UTC [comm.grpc.server] 1 -> INFO 95e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.388Z grpc.peer_address=192.168.224.7:48248 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.7µs +peer0.org1.example.com | "2019-04-22 06:16:47.392 UTC [msp.identity] Sign -> DEBU 95f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +orderer0.example.com | "2019-04-22 06:17:10.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU e72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +orderer0.example.com | "2019-04-22 06:17:11.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 2 on channel businesschannel took 49µs" +orderer0.example.com | "2019-04-22 06:17:11.144 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 3 on channel businesschannel took 33.3µs" +orderer0.example.com | "2019-04-22 06:17:11.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU e74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.3µs " +orderer0.example.com | "2019-04-22 06:17:11.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.1µs " +orderer0.example.com | "2019-04-22 06:17:11.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU e77 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:11.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:11.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:11.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +orderer0.example.com | "2019-04-22 06:17:11.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 444.7µs " +orderer0.example.com | "2019-04-22 06:17:11.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2019-04-22 06:17:11.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +orderer0.example.com | "2019-04-22 06:17:11.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.9µs " +orderer0.example.com | "2019-04-22 06:17:11.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.5µs " +orderer0.example.com | "2019-04-22 06:17:11.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e80 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:11.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:11.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:11.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e83 Sending msg of 28 bytes to 3 on channel testchainid took 192.1µs" +orderer0.example.com | "2019-04-22 06:17:11.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 643.7µs " +orderer0.example.com | "2019-04-22 06:17:12.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-04-22 06:17:12.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-04-22 06:17:12.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU e88 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:12.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.8µs " +orderer0.example.com | "2019-04-22 06:17:12.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +orderer0.example.com | "2019-04-22 06:17:12.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:12.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:12.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8c Sending msg of 28 bytes to 3 on channel testchainid took 59µs" +orderer0.example.com | "2019-04-22 06:17:12.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.3µs " +orderer0.example.com | "2019-04-22 06:17:12.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8e Sending msg of 28 bytes to 2 on channel businesschannel took 55.6µs" +orderer0.example.com | "2019-04-22 06:17:12.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +orderer0.example.com | "2019-04-22 06:17:12.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.4µs " +orderer0.example.com | "2019-04-22 06:17:12.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.1µs " +orderer0.example.com | "2019-04-22 06:17:12.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:12.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:12.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:12.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +orderer0.example.com | "2019-04-22 06:17:12.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +orderer0.example.com | "2019-04-22 06:17:13.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-04-22 06:17:13.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.2µs " +orderer0.example.com | "2019-04-22 06:17:13.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.6µs " +orderer0.example.com | "2019-04-22 06:17:13.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:13.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:13.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9c Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-04-22 06:17:13.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:13.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9e Sending msg of 28 bytes to 3 on channel testchainid took 29.7µs" +orderer0.example.com | "2019-04-22 06:17:13.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106µs " +orderer0.example.com | "2019-04-22 06:17:13.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 2 on channel businesschannel took 30.2µs" +orderer0.example.com | "2019-04-22 06:17:13.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 257.2µs " +orderer0.example.com | "2019-04-22 06:17:13.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.2µs " +orderer0.example.com | "2019-04-22 06:17:13.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +orderer0.example.com | "2019-04-22 06:17:13.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:13.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:13.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:13.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea7 Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +orderer0.example.com | "2019-04-22 06:17:13.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.7µs " +orderer0.example.com | "2019-04-22 06:17:14.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea9 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-04-22 06:17:14.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-04-22 06:17:14.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.5µs " +orderer0.example.com | "2019-04-22 06:17:14.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240µs " +orderer0.example.com | "2019-04-22 06:17:14.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU ead Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:14.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:14.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:14.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb0 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +orderer0.example.com | "2019-04-22 06:17:14.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148µs " +orderer0.example.com | "2019-04-22 06:17:14.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb2 Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +orderer0.example.com | "2019-04-22 06:17:14.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278.3µs " +orderer0.example.com | "2019-04-22 06:17:14.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb4 Sending msg of 28 bytes to 2 on channel businesschannel took 718.8µs" +orderer0.example.com | "2019-04-22 06:17:14.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:14.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 358µs " +orderer0.example.com | "2019-04-22 06:17:14.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:14.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:14.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb9 Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +orderer0.example.com | "2019-04-22 06:17:14.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU eba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.5µs " +orderer0.example.com | "2019-04-22 06:17:15.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +orderer0.example.com | "2019-04-22 06:17:15.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-04-22 06:17:15.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.6µs " +peer0.org1.example.com | "2019-04-22 06:16:47.392 UTC [msp.identity] Sign -> DEBU 960 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:47.393 UTC [gossip.comm] authenticateRemotePeer -> DEBU 961 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.7:48248" +peer0.org1.example.com | "2019-04-22 06:16:47.394 UTC [gossip.comm] authenticateRemotePeer -> DEBU 962 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48248" +peer0.org1.example.com | "2019-04-22 06:16:47.394 UTC [msp] DeserializeIdentity -> DEBU 963 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 964 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.394 UTC [msp] DeserializeIdentity -> DEBU 965 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 966 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.395 UTC [msp] DeserializeIdentity -> DEBU 967 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:47.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 968 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:47.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 969 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 96a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:47.396 UTC [policies] Evaluate -> DEBU 96b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.397 UTC [policies] Evaluate -> DEBU 96c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:47.397 UTC [policies] Evaluate -> DEBU 96d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:47.397 UTC [cauthdsl] func1 -> DEBU 96e 0xc0030b5060 gate 1555913807397427500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:47.397 UTC [cauthdsl] func2 -> DEBU 96f 0xc0030b5060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:47.397 UTC [cauthdsl] func2 -> DEBU 970 0xc0030b5060 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:47.398 UTC [cauthdsl] func2 -> DEBU 971 0xc0030b5060 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.398 UTC [msp.identity] Verify -> DEBU 972 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-04-22 06:16:47.398 UTC [msp.identity] Verify -> DEBU 973 Verify: sig = 00000000 30 45 02 21 00 92 01 18 07 3f bb 46 9b 88 94 3a |0E.!.....?.F...:| +peer0.org1.example.com | 00000010 7f 38 9f fd 0f fa 83 7c b1 f5 73 d7 5b 81 61 d5 |.8.....|..s.[.a.| +peer0.org1.example.com | 00000020 25 d2 7f b4 61 02 20 64 14 cc 67 f5 07 dc b9 30 |%...a. d..g....0| +peer0.org1.example.com | 00000030 ee e7 88 97 6f 88 19 56 f3 fa d3 09 6e 82 7b d1 |....o..V....n.{.| +peer0.org1.example.com | 00000040 c7 04 5e 67 bf 3b e6 |..^g.;.|" +peer0.org1.example.com | "2019-04-22 06:16:47.400 UTC [cauthdsl] func2 -> DEBU 974 0xc0030b5060 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:47.401 UTC [cauthdsl] func1 -> DEBU 975 0xc0030b5060 gate 1555913807397427500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:47.403 UTC [policies] Evaluate -> DEBU 976 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.403 UTC [policies] Evaluate -> DEBU 977 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.403 UTC [policies] Evaluate -> DEBU 978 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.404 UTC [policies] Evaluate -> DEBU 979 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:47.405 UTC [gossip.comm] authenticateRemotePeer -> DEBU 97a Authenticated 192.168.224.7:48248" +peer0.org1.example.com | "2019-04-22 06:16:47.406 UTC [gossip.comm] GossipStream -> DEBU 97b Servicing 192.168.224.7:48248" +peer0.org1.example.com | "2019-04-22 06:16:47.410 UTC [gossip.comm] readFromStream -> DEBU 97c 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:16:47.406 UTC [gossip.comm] serviceConnection -> DEBU 97d Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:16:47.413 UTC [gossip.comm] func2 -> DEBU 981 Client 192.168.224.7:48244 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:47.411 UTC [grpc] infof -> DEBU 97e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:47.411 UTC [gossip.comm] readFromStream -> DEBU 97f Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:16:47.411 UTC [gossip.comm] func2 -> DEBU 980 Client 192.168.224.7:48248 disconnected" +peer0.org1.example.com | "2019-04-22 06:16:47.413 UTC [gossip.comm] writeToStream -> DEBU 982 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.415 UTC [comm.grpc.server] 1 -> INFO 984 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.392Z grpc.peer_address=192.168.224.7:48248 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.5186ms +peer0.org1.example.com | "2019-04-22 06:16:47.413 UTC [comm.grpc.server] 1 -> INFO 983 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:48244 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=115.3997ms +peer0.org1.example.com | "2019-04-22 06:16:47.415 UTC [gossip.comm] writeToStream -> DEBU 985 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:16:47.649 UTC [grpc] infof -> DEBU 986 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:48.089 UTC [comm.grpc.server] 1 -> INFO 987 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:50.089Z grpc.peer_address=192.168.224.8:55156 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=196.1µs +peer0.org1.example.com | "2019-04-22 06:16:48.092 UTC [msp.identity] Sign -> DEBU 988 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:48.092 UTC [msp.identity] Sign -> DEBU 989 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:16:48.092 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:55156" +peer0.org1.example.com | "2019-04-22 06:16:48.102 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98b Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55156" +peer0.org1.example.com | "2019-04-22 06:16:48.102 UTC [msp] DeserializeIdentity -> DEBU 98c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.102 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 98d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.102 UTC [msp] DeserializeIdentity -> DEBU 98e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.103 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 98f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.103 UTC [msp] DeserializeIdentity -> DEBU 990 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.104 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 991 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.105 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 992 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.105 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 993 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [policies] Evaluate -> DEBU 994 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [policies] Evaluate -> DEBU 995 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [policies] Evaluate -> DEBU 996 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [cauthdsl] func1 -> DEBU 997 0xc003172790 gate 1555913808106629600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [cauthdsl] func2 -> DEBU 998 0xc003172790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [cauthdsl] func2 -> DEBU 999 0xc003172790 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [cauthdsl] func2 -> DEBU 99a 0xc003172790 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [msp.identity] Verify -> DEBU 99b Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:16:48.106 UTC [msp.identity] Verify -> DEBU 99c Verify: sig = 00000000 30 44 02 20 45 aa ca 19 a2 af 31 f7 4d b7 bc 18 |0D. E.....1.M...| +peer0.org1.example.com | 00000010 24 48 9b 5e 74 9f 6f 43 e8 4b c0 a0 a8 68 a9 7a |$H.^t.oC.K...h.z| +peer0.org1.example.com | 00000020 03 a0 83 41 02 20 01 72 df 8e 14 a4 68 86 4d 9a |...A. .r....h.M.| +peer0.org1.example.com | 00000030 c1 39 c8 9d 7f c8 57 a1 6e ae 6e 47 49 be 84 63 |.9....W.n.nGI..c| +peer0.org1.example.com | 00000040 9f b2 d9 90 8e 22 |....."|" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [cauthdsl] func2 -> DEBU 99d 0xc003172790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [cauthdsl] func1 -> DEBU 99e 0xc003172790 gate 1555913808106629600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 99f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 9a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 9a1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 9a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9a3 Authenticated 192.168.224.8:55156" +peer0.org1.example.com | "2019-04-22 06:16:48.107 UTC [gossip.comm] GossipStream -> DEBU 9a4 Servicing 192.168.224.8:55156" +peer0.org1.example.com | "2019-04-22 06:16:48.122 UTC [gossip.gossip] handleMessage -> DEBU 9a5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.122 UTC [gossip.pull] HandleMessage -> DEBU 9a6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.122 UTC [msp] DeserializeIdentity -> DEBU 9a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.122 UTC [msp] DeserializeIdentity -> DEBU 9a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.122 UTC [gossip.pull] SendDigest -> DEBU 9a9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:48.122 UTC [gossip.gossip] handleMessage -> DEBU 9aa Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.123 UTC [gossip.gossip] handleMessage -> DEBU 9ab Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.123 UTC [gossip.gossip] handleMessage -> DEBU 9ac Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.124 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9ae Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:48.124 UTC [msp] DeserializeIdentity -> DEBU 9af Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.124 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.132 UTC [policies] Evaluate -> DEBU 9b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.133 UTC [policies] Evaluate -> DEBU 9b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.133 UTC [policies] Evaluate -> DEBU 9b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.133 UTC [cauthdsl] func1 -> DEBU 9b6 0xc0032a7720 gate 1555913808133564400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.133 UTC [cauthdsl] func2 -> DEBU 9b7 0xc0032a7720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.133 UTC [cauthdsl] func2 -> DEBU 9b8 0xc0032a7720 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.136 UTC [cauthdsl] func2 -> DEBU 9b9 0xc0032a7720 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.136 UTC [msp.identity] Verify -> DEBU 9ba Verify: digest = 00000000 73 fa a8 c1 ef 4c f5 0d 41 2e c9 1c ae 94 73 f8 |s....L..A.....s.| +peer0.org1.example.com | 00000010 4e 51 20 10 a6 ff 84 7f 5e 17 74 29 fb 5f dc 1d |NQ .....^.t)._..|" +peer0.org1.example.com | "2019-04-22 06:16:48.136 UTC [msp.identity] Verify -> DEBU 9bb Verify: sig = 00000000 30 44 02 20 29 3f 19 bc 29 69 4a 8a 85 54 a9 c9 |0D. )?..)iJ..T..| +peer0.org1.example.com | 00000010 82 6a 72 fb 95 68 d8 cf 15 7e 5b 6b 95 41 7d 89 |.jr..h...~[k.A}.| +peer0.org1.example.com | 00000020 19 82 83 c5 02 20 70 a9 ca bb 80 2f ba 95 6e d6 |..... p..../..n.| +peer0.org1.example.com | 00000030 45 da ca c5 3b 92 19 45 64 93 d0 bb cb 80 34 09 |E...;..Ed.....4.| +peer0.org1.example.com | 00000040 0e 62 ee af 91 5a |.b...Z|" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [cauthdsl] func2 -> DEBU 9bc 0xc0032a7720 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [cauthdsl] func1 -> DEBU 9bd 0xc0032a7720 gate 1555913808133564400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9c0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] handleAliveMessage -> DEBU 9c2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 " +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 " +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c7 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] handleAliveMessage -> DEBU 9c8 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] sendMemResponse -> DEBU 9c9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:48.138 UTC [msp] DeserializeIdentity -> DEBU 9ca Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.138 UTC [msp] DeserializeIdentity -> DEBU 9cb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.138 UTC [msp] DeserializeIdentity -> DEBU 9cc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.138 UTC [gossip.comm] Send -> DEBU 9cd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:48.138 UTC [gossip.discovery] sendMemResponse -> DEBU 9ce Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:48.138 UTC [gossip.comm] sendToEndpoint -> DEBU 9cf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.138 UTC [gossip.comm] sendToEndpoint -> DEBU 9d0 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9d1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.455 UTC [msp] DeserializeIdentity -> DEBU 9d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.456 UTC [msp] DeserializeIdentity -> DEBU 9d3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.456 UTC [gossip.comm] Send -> DEBU 9d4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:16:48.457 UTC [gossip.comm] sendToEndpoint -> DEBU 9d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.457 UTC [gossip.comm] createConnection -> DEBU 9d6 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:48.462 UTC [grpc] DialContext -> DEBU 9d7 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:16:48.463 UTC [grpc] DialContext -> DEBU 9d8 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:16:48.463 UTC [grpc] NewAddress -> DEBU 9d9 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:16:48.463 UTC [grpc] switchBalancer -> DEBU 9da ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:16:48.463 UTC [gossip.comm] sendToEndpoint -> DEBU 9db Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.464 UTC [gossip.comm] sendToEndpoint -> DEBU 9dc Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.465 UTC [grpc] HandleSubConnStateChange -> DEBU 9dd pickfirstBalancer: HandleSubConnStateChange: 0xc00337f1e0, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:16:48.466 UTC [gossip.pull] Hello -> DEBU 9de Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:48.473 UTC [gossip.comm] Send -> DEBU 9e1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:48.476 UTC [gossip.comm] sendToEndpoint -> DEBU 9e2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.483 UTC [msp] DeserializeIdentity -> DEBU 9e3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.483 UTC [msp] DeserializeIdentity -> DEBU 9e4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.485 UTC [gossip.comm] Send -> DEBU 9e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:16:48.485 UTC [msp] DeserializeIdentity -> DEBU 9e6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.486 UTC [msp] DeserializeIdentity -> DEBU 9e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.487 UTC [gossip.comm] sendToEndpoint -> DEBU 9e8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.487 UTC [gossip.comm] sendToEndpoint -> DEBU 9e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.487 UTC [gossip.comm] sendToEndpoint -> DEBU 9ea Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.488 UTC [gossip.comm] sendToEndpoint -> DEBU 9eb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.489 UTC [gossip.comm] sendToEndpoint -> DEBU 9ec Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.468 UTC [gossip.comm] func1 -> DEBU 9df Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.496 UTC [gossip.gossip] handleMessage -> DEBU 9ed Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.497 UTC [msp.identity] Verify -> DEBU 9ee Verify: digest = 00000000 21 17 0f 53 43 d6 0f 5e 74 17 04 ec 35 a6 fc e2 |!..SC..^t...5...| +peer0.org1.example.com | 00000010 99 66 0f 5f c9 b2 9a 8d 4b cf c4 68 4b 01 57 c2 |.f._....K..hK.W.|" +peer0.org1.example.com | "2019-04-22 06:16:48.498 UTC [msp.identity] Verify -> DEBU 9ef Verify: sig = 00000000 30 44 02 20 1d ce d6 ae 46 64 65 f1 c0 fc 5c f1 |0D. ....Fde...\.| +peer0.org1.example.com | 00000010 cd 99 a0 64 0b c7 98 49 a5 08 b1 e0 f9 f1 05 b3 |...d...I........| +peer0.org1.example.com | 00000020 ef 40 44 98 02 20 6d 17 a3 9f 68 71 e1 dd 77 5b |.@D.. m...hq..w[| +peer0.org1.example.com | 00000030 ec 02 39 77 97 28 8b 6d 66 da 72 c9 3f 90 7e f0 |..9w.(.mf.r.?.~.| +peer0.org1.example.com | 00000040 da 6e 11 1d 2f 45 |.n../E|" +peer0.org1.example.com | "2019-04-22 06:16:48.499 UTC [msp.identity] Verify -> DEBU 9f0 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +peer0.org1.example.com | "2019-04-22 06:16:48.499 UTC [msp.identity] Verify -> DEBU 9f1 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:48.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9f2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9f3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.501 UTC [policies] Evaluate -> DEBU 9f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.501 UTC [policies] Evaluate -> DEBU 9f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.502 UTC [policies] Evaluate -> DEBU 9f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.502 UTC [msp] DeserializeIdentity -> DEBU 9f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.503 UTC [msp.identity] newIdentity -> DEBU 9f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:48.504 UTC [cauthdsl] func1 -> DEBU 9f9 0xc00354a590 gate 1555913808504098600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.504 UTC [cauthdsl] func2 -> DEBU 9fa 0xc00354a590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.506 UTC [cauthdsl] func2 -> DEBU 9fc 0xc00354a590 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.506 UTC [cauthdsl] func2 -> DEBU 9fd 0xc00354a590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:48.476 UTC [gossip.comm] sendToEndpoint -> DEBU 9fe Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.506 UTC [cauthdsl] func2 -> DEBU 9ff 0xc00354a590 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:48.507 UTC [cauthdsl] func1 -> DEBU a00 0xc00354a590 gate 1555913808504098600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:48.468 UTC [gossip.comm] sendToEndpoint -> DEBU 9e0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.509 UTC [gossip.comm] sendToEndpoint -> DEBU a01 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.508 UTC [policies] Evaluate -> DEBU a02 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.505 UTC [gossip.comm] func1 -> DEBU 9fb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.515 UTC [policies] Evaluate -> DEBU a04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.516 UTC [policies] Evaluate -> DEBU a05 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.516 UTC [cauthdsl] func1 -> DEBU a06 0xc0035aa9a0 gate 1555913808516182900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.516 UTC [cauthdsl] func2 -> DEBU a07 0xc0035aa9a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.516 UTC [cauthdsl] func2 -> DEBU a08 0xc0035aa9a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.516 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a09 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:48.516 UTC [msp] Validate -> DEBU a0a MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:48.515 UTC [grpc] HandleSubConnStateChange -> DEBU a03 pickfirstBalancer: HandleSubConnStateChange: 0xc00337f1e0, READY" +peer0.org1.example.com | "2019-04-22 06:16:48.515 UTC [gossip.comm] func1 -> DEBU a0c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12155449189822060432 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.517 UTC [msp] getCertificationChain -> DEBU a0b MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:48.519 UTC [cauthdsl] func2 -> DEBU a0d 0xc0035aa9a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.519 UTC [msp.identity] Verify -> DEBU a0e Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +peer0.org1.example.com | "2019-04-22 06:16:48.520 UTC [msp.identity] Verify -> DEBU a0f Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +orderer0.example.com | "2019-04-22 06:17:15.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.9µs " +orderer0.example.com | "2019-04-22 06:17:15.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:15.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:15.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:15.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2019-04-22 06:17:15.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.1µs " +orderer0.example.com | "2019-04-22 06:17:15.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +orderer0.example.com | "2019-04-22 06:17:15.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.5µs " +orderer0.example.com | "2019-04-22 06:17:15.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.6µs " +orderer0.example.com | "2019-04-22 06:17:15.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +orderer0.example.com | "2019-04-22 06:17:15.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:15.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:15.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:15.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecb Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +orderer0.example.com | "2019-04-22 06:17:15.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 566.4µs " +orderer0.example.com | "2019-04-22 06:17:16.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-04-22 06:17:16.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-04-22 06:17:16.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 297.1µs " +orderer0.example.com | "2019-04-22 06:17:16.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.3µs " +orderer0.example.com | "2019-04-22 06:17:16.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:16.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:16.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:16.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +orderer0.example.com | "2019-04-22 06:17:16.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.9µs " +orderer0.example.com | "2019-04-22 06:17:16.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +orderer0.example.com | "2019-04-22 06:17:16.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 3 on channel businesschannel took 199.4µs" +orderer0.example.com | "2019-04-22 06:17:16.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 336.5µs " +orderer0.example.com | "2019-04-22 06:17:16.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.6µs " +orderer0.example.com | "2019-04-22 06:17:16.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU eda Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:16.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:16.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:16.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edd Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +orderer0.example.com | "2019-04-22 06:17:16.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +orderer0.example.com | "2019-04-22 06:17:17.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-04-22 06:17:17.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.3µs " +orderer0.example.com | "2019-04-22 06:17:17.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:17.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-04-22 06:17:17.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " +orderer0.example.com | "2019-04-22 06:17:17.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:17.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:17.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.9µs " +orderer0.example.com | "2019-04-22 06:17:17.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel testchainid took 42.2µs" +orderer0.example.com | "2019-04-22 06:17:17.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee8 Sending msg of 28 bytes to 2 on channel businesschannel took 39.4µs" +orderer0.example.com | "2019-04-22 06:17:17.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" +orderer0.example.com | "2019-04-22 06:17:17.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.1µs " +orderer0.example.com | "2019-04-22 06:17:17.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0976ms " +orderer0.example.com | "2019-04-22 06:17:17.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU eec Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:17.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:17.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:17.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +orderer0.example.com | "2019-04-22 06:17:17.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 779.1µs " +orderer0.example.com | "2019-04-22 06:17:18.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" +orderer0.example.com | "2019-04-22 06:17:18.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel businesschannel took 27.4µs" +orderer0.example.com | "2019-04-22 06:17:18.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 314.2µs " +orderer0.example.com | "2019-04-22 06:17:18.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:18.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.6µs " +orderer0.example.com | "2019-04-22 06:17:18.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:18.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:18.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef8 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2019-04-22 06:17:18.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6476ms " +orderer0.example.com | "2019-04-22 06:17:18.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 28 bytes to 2 on channel businesschannel took 34.5µs" +orderer0.example.com | "2019-04-22 06:17:18.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +orderer0.example.com | "2019-04-22 06:17:18.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +orderer0.example.com | "2019-04-22 06:17:18.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.9µs " +orderer0.example.com | "2019-04-22 06:17:18.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:18.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:18.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:18.796 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f01 Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" +orderer0.example.com | "2019-04-22 06:17:18.796 UTC [orderer.common.cluster.step] sendMessage -> DEBU f02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +orderer0.example.com | "2019-04-22 06:17:19.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f03 Sending msg of 28 bytes to 2 on channel businesschannel took 75.3µs" +orderer0.example.com | "2019-04-22 06:17:19.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 3 on channel businesschannel took 47.2µs" +orderer0.example.com | "2019-04-22 06:17:19.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 162.6µs " +orderer0.example.com | "2019-04-22 06:17:19.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU f06 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:19.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 823.9µs " +orderer0.example.com | "2019-04-22 06:17:19.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:19.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:19.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0a Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +orderer0.example.com | "2019-04-22 06:17:19.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 480.2µs " +orderer0.example.com | "2019-04-22 06:17:19.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0c Sending msg of 28 bytes to 2 on channel businesschannel took 37.1µs" +orderer0.example.com | "2019-04-22 06:17:19.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel businesschannel took 90.3µs" +orderer0.example.com | "2019-04-22 06:17:19.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.2µs " +orderer0.example.com | "2019-04-22 06:17:19.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.5µs " +orderer0.example.com | "2019-04-22 06:17:19.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f10 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:19.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:19.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:19.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f13 Sending msg of 28 bytes to 3 on channel testchainid took 46.1µs" +orderer0.example.com | "2019-04-22 06:17:19.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU f14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.7µs " +orderer0.example.com | "2019-04-22 06:17:20.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f15 Sending msg of 28 bytes to 3 on channel businesschannel took 30.9µs" +orderer0.example.com | "2019-04-22 06:17:20.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.6µs " +orderer0.example.com | "2019-04-22 06:17:20.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 2 on channel businesschannel took 26.4µs" +orderer0.example.com | "2019-04-22 06:17:20.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.5µs " +orderer0.example.com | "2019-04-22 06:17:20.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f19 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:20.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:20.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:20.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1c Sending msg of 28 bytes to 3 on channel testchainid took 26.8µs" +orderer0.example.com | "2019-04-22 06:17:20.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.6µs " +orderer0.example.com | "2019-04-22 06:17:20.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1e Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +orderer0.example.com | "2019-04-22 06:17:20.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" +orderer0.example.com | "2019-04-22 06:17:20.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f21 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:20.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.8µs " +orderer0.example.com | "2019-04-22 06:17:20.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU f22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 275.5µs " +orderer0.example.com | "2019-04-22 06:17:20.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:20.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:20.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f25 Sending msg of 28 bytes to 3 on channel testchainid took 241.2µs" +orderer0.example.com | "2019-04-22 06:17:20.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU f26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 232.8µs " +orderer0.example.com | "2019-04-22 06:17:21.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f27 Sending msg of 28 bytes to 3 on channel businesschannel took 54.3µs" +orderer0.example.com | "2019-04-22 06:17:21.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 33.7µs" +orderer0.example.com | "2019-04-22 06:17:21.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 267µs " +orderer0.example.com | "2019-04-22 06:17:21.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.1596ms " +orderer0.example.com | "2019-04-22 06:17:21.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:21.149 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:21.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:21.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2e Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +orderer0.example.com | "2019-04-22 06:17:21.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.8µs " +orderer0.example.com | "2019-04-22 06:17:21.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f30 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +orderer0.example.com | "2019-04-22 06:17:21.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-04-22 06:17:21.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.9µs " +orderer0.example.com | "2019-04-22 06:17:21.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU f34 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:21.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 547.8µs " +orderer0.example.com | "2019-04-22 06:17:21.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:21.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:21.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f37 Sending msg of 28 bytes to 3 on channel testchainid took 27.8µs" +orderer0.example.com | "2019-04-22 06:17:21.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU f38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.4µs " +orderer0.example.com | "2019-04-22 06:17:22.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f39 Sending msg of 28 bytes to 3 on channel businesschannel took 41.7µs" +orderer0.example.com | "2019-04-22 06:17:22.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-04-22 06:17:22.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.9µs " +orderer0.example.com | "2019-04-22 06:17:22.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 524.8µs " +orderer0.example.com | "2019-04-22 06:17:22.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:22.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:22.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:22.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f40 Sending msg of 28 bytes to 3 on channel testchainid took 27.5µs" +orderer0.example.com | "2019-04-22 06:17:22.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 314.9µs " +orderer0.example.com | "2019-04-22 06:17:22.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f42 Sending msg of 28 bytes to 2 on channel businesschannel took 30.2µs" +orderer0.example.com | "2019-04-22 06:17:22.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU f43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 268.6µs " +orderer0.example.com | "2019-04-22 06:17:22.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f44 Sending msg of 28 bytes to 3 on channel businesschannel took 149.5µs" +orderer0.example.com | "2019-04-22 06:17:22.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.2µs " +orderer0.example.com | "2019-04-22 06:17:22.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f46 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:22.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:22.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:22.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f49 Sending msg of 28 bytes to 3 on channel testchainid took 41.3µs" +orderer0.example.com | "2019-04-22 06:17:22.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.5µs " +orderer0.example.com | "2019-04-22 06:17:23.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4b Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +orderer0.example.com | "2019-04-22 06:17:23.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +orderer0.example.com | "2019-04-22 06:17:23.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 486.6µs " +orderer0.example.com | "2019-04-22 06:17:23.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " +orderer0.example.com | "2019-04-22 06:17:23.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:23.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:23.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:23.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel testchainid took 27.7µs" +orderer0.example.com | "2019-04-22 06:17:23.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU f53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188µs " +orderer0.example.com | "2019-04-22 06:17:23.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f54 Sending msg of 28 bytes to 2 on channel businesschannel took 421µs" +orderer0.example.com | "2019-04-22 06:17:23.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-04-22 06:17:23.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.7µs " +orderer0.example.com | "2019-04-22 06:17:23.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 220.2µs " +orderer0.example.com | "2019-04-22 06:17:23.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:23.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:23.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:23.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +orderer0.example.com | "2019-04-22 06:17:23.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5c Sending msg of 28 bytes to 3 on channel testchainid took 444.7µs" +orderer0.example.com | "2019-04-22 06:17:24.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5d Sending msg of 28 bytes to 2 on channel businesschannel took 54.2µs" +orderer0.example.com | "2019-04-22 06:17:24.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" +orderer0.example.com | "2019-04-22 06:17:24.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " +orderer0.example.com | "2019-04-22 06:17:24.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +orderer0.example.com | "2019-04-22 06:17:24.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU f61 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:24.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:24.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:24.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f64 Sending msg of 28 bytes to 3 on channel testchainid took 52.3µs" +orderer0.example.com | "2019-04-22 06:17:24.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU f65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230µs " +orderer0.example.com | "2019-04-22 06:17:24.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f66 Sending msg of 28 bytes to 2 on channel businesschannel took 42.4µs" +orderer0.example.com | "2019-04-22 06:17:24.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +orderer0.example.com | "2019-04-22 06:17:24.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.5µs " +orderer0.example.com | "2019-04-22 06:17:24.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 853.9µs " +orderer0.example.com | "2019-04-22 06:17:24.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:24.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:24.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:24.765 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6d Sending msg of 28 bytes to 3 on channel testchainid took 345.6µs" +orderer0.example.com | "2019-04-22 06:17:24.767 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.7µs " +orderer0.example.com | "2019-04-22 06:17:25.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6f Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-04-22 06:17:25.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.3µs " +orderer0.example.com | "2019-04-22 06:17:25.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-04-22 06:17:25.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.8µs " +orderer0.example.com | "2019-04-22 06:17:25.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU f73 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:25.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:25.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:25.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f76 Sending msg of 28 bytes to 3 on channel testchainid took 34.9µs" +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:48.520 UTC [msp.identity] Sign -> DEBU a10 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:16:48.521 UTC [msp.identity] Sign -> DEBU a11 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +orderer0.example.com | "2019-04-22 06:17:25.263 UTC [orderer.common.cluster.step] sendMessage -> DEBU f77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.5µs " +orderer0.example.com | "2019-04-22 06:17:25.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f78 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" +orderer0.example.com | "2019-04-22 06:17:25.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7a Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-04-22 06:17:25.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:25.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.4µs " +peer0.org1.example.com | "2019-04-22 06:16:48.521 UTC [gossip.comm] authenticateRemotePeer -> DEBU a12 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:16:48.523 UTC [gossip.comm] authenticateRemotePeer -> DEBU a13 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:16:48.524 UTC [msp] DeserializeIdentity -> DEBU a14 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.525 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.525 UTC [msp] DeserializeIdentity -> DEBU a16 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.524 UTC [cauthdsl] func2 -> DEBU a17 0xc0035aa9a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.525 UTC [cauthdsl] func1 -> DEBU a18 0xc0035aa9a0 gate 1555913808516182900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.526 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a19 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.526 UTC [policies] Evaluate -> DEBU a1a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.526 UTC [policies] Evaluate -> DEBU a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.526 UTC [msp] DeserializeIdentity -> DEBU a1c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.527 UTC [policies] Evaluate -> DEBU a1d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.528 UTC [policies] Evaluate -> DEBU a1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.528 UTC [gossip.gossip] handleMessage -> DEBU a1f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.529 UTC [gossip.gossip] handleMessage -> DEBU a20 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.529 UTC [msp] DeserializeIdentity -> DEBU a21 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.530 UTC [msp] DeserializeIdentity -> DEBU a22 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.530 UTC [msp] DeserializeIdentity -> DEBU a23 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a25 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a26 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.531 UTC [policies] Evaluate -> DEBU a27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.531 UTC [policies] Evaluate -> DEBU a28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.532 UTC [policies] Evaluate -> DEBU a29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.532 UTC [cauthdsl] func1 -> DEBU a2a 0xc003658a40 gate 1555913808532462700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.532 UTC [cauthdsl] func2 -> DEBU a2b 0xc003658a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.532 UTC [cauthdsl] func2 -> DEBU a2c 0xc003658a40 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.533 UTC [cauthdsl] func2 -> DEBU a2d 0xc003658a40 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.533 UTC [msp.identity] Verify -> DEBU a2e Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:48.533 UTC [msp.identity] Verify -> DEBU a2f Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:48.535 UTC [cauthdsl] func2 -> DEBU a30 0xc003658a40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.535 UTC [cauthdsl] func1 -> DEBU a31 0xc003658a40 gate 1555913808532462700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.535 UTC [policies] Evaluate -> DEBU a32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.536 UTC [policies] Evaluate -> DEBU a33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.536 UTC [policies] Evaluate -> DEBU a34 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:25.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +orderer0.example.com | "2019-04-22 06:17:25.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:25.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:25.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel testchainid took 31.7µs" +orderer0.example.com | "2019-04-22 06:17:25.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.8µs " +orderer0.example.com | "2019-04-22 06:17:26.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f81 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2019-04-22 06:17:26.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2019-04-22 06:17:26.111 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.9648ms " +orderer0.example.com | "2019-04-22 06:17:26.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.7µs " +orderer0.example.com | "2019-04-22 06:17:26.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU f85 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:26.114 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:26.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:26.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 3 on channel testchainid took 30.2µs" +orderer0.example.com | "2019-04-22 06:17:26.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.5µs " +orderer0.example.com | "2019-04-22 06:17:26.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8a Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +orderer0.example.com | "2019-04-22 06:17:26.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel businesschannel took 49.7µs" +orderer0.example.com | "2019-04-22 06:17:26.610 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.9287ms " +orderer0.example.com | "2019-04-22 06:17:26.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:26.610 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +orderer0.example.com | "2019-04-22 06:17:26.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:26.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU f90 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:26.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f91 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +orderer0.example.com | "2019-04-22 06:17:26.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU f92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.6µs " +orderer0.example.com | "2019-04-22 06:17:27.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f93 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +orderer0.example.com | "2019-04-22 06:17:27.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +orderer0.example.com | "2019-04-22 06:17:27.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.1µs " +orderer0.example.com | "2019-04-22 06:17:27.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU f96 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:27.110 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.9987ms " +orderer0.example.com | "2019-04-22 06:17:27.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU f98 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:27.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:27.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9a Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +orderer0.example.com | "2019-04-22 06:17:27.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 612µs " +orderer0.example.com | "2019-04-22 06:17:27.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9c Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-04-22 06:17:27.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-04-22 06:17:27.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.3µs " +orderer0.example.com | "2019-04-22 06:17:27.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.1µs " +orderer0.example.com | "2019-04-22 06:17:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:16:48.537 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.537 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a36 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.538 UTC [policies] Evaluate -> DEBU a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.539 UTC [msp] DeserializeIdentity -> DEBU a38 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a39 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a3a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.539 UTC [policies] Evaluate -> DEBU a3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.540 UTC [policies] Evaluate -> DEBU a3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.540 UTC [policies] Evaluate -> DEBU a3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.540 UTC [cauthdsl] func1 -> DEBU a3e 0xc003659be0 gate 1555913808540297200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.540 UTC [cauthdsl] func2 -> DEBU a3f 0xc003659be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.540 UTC [cauthdsl] func2 -> DEBU a40 0xc003659be0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.540 UTC [cauthdsl] func2 -> DEBU a41 0xc003659be0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.541 UTC [msp.identity] Verify -> DEBU a42 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:48.541 UTC [msp.identity] Verify -> DEBU a43 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:48.541 UTC [cauthdsl] func2 -> DEBU a44 0xc003659be0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.541 UTC [cauthdsl] func1 -> DEBU a45 0xc003659be0 gate 1555913808540297200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.541 UTC [policies] Evaluate -> DEBU a46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.542 UTC [policies] Evaluate -> DEBU a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.542 UTC [policies] Evaluate -> DEBU a48 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.542 UTC [policies] Evaluate -> DEBU a49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a4a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.543 UTC [policies] Evaluate -> DEBU a4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.543 UTC [msp.identity] Verify -> DEBU a4c Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:48.544 UTC [msp.identity] Verify -> DEBU a4e Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:48.545 UTC [gossip.gossip] handleMessage -> DEBU a4f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.543 UTC [policies] Evaluate -> DEBU a4d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.550 UTC [gossip.gossip] handleMessage -> DEBU a50 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.551 UTC [msp.identity] Verify -> DEBU a52 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:48.551 UTC [msp.identity] Verify -> DEBU a53 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:48.551 UTC [gossip.gossip] handleMessage -> DEBU a54 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.552 UTC [gossip.gossip] handleMessage -> DEBU a55 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12155449189822060432 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.552 UTC [gossip.pull] HandleMessage -> DEBU a56 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12155449189822060432 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.552 UTC [gossip.gossip] handleMessage -> DEBU a57 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.550 UTC [policies] Evaluate -> DEBU a51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.553 UTC [cauthdsl] func1 -> DEBU a58 0xc0036a5d00 gate 1555913808553082900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.553 UTC [cauthdsl] func2 -> DEBU a59 0xc0036a5d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.553 UTC [cauthdsl] func2 -> DEBU a5a 0xc0036a5d00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.553 UTC [cauthdsl] func2 -> DEBU a5b 0xc0036a5d00 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:27.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:27.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa3 Sending msg of 28 bytes to 3 on channel testchainid took 31.4µs" +orderer0.example.com | "2019-04-22 06:17:27.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110µs " +orderer0.example.com | "2019-04-22 06:17:28.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa5 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +orderer0.example.com | "2019-04-22 06:17:28.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +orderer0.example.com | "2019-04-22 06:17:28.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104µs " +orderer0.example.com | "2019-04-22 06:17:28.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 885.3µs " +orderer0.example.com | "2019-04-22 06:17:28.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:28.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU faa Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:28.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU fab Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:28.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fac Sending msg of 28 bytes to 3 on channel testchainid took 32.9µs" +orderer0.example.com | "2019-04-22 06:17:28.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU fad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.3µs " +orderer0.example.com | "2019-04-22 06:17:28.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fae Sending msg of 28 bytes to 3 on channel businesschannel took 33µs" +orderer0.example.com | "2019-04-22 06:17:28.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-04-22 06:17:28.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.8µs " +orderer0.example.com | "2019-04-22 06:17:28.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.5µs " +orderer0.example.com | "2019-04-22 06:17:28.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb2 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:28.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:28.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:28.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb5 Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +orderer0.example.com | "2019-04-22 06:17:28.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.5µs " +orderer0.example.com | "2019-04-22 06:17:29.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb7 Sending msg of 28 bytes to 2 on channel businesschannel took 31.3µs" +orderer0.example.com | "2019-04-22 06:17:29.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-04-22 06:17:29.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105µs " +orderer0.example.com | "2019-04-22 06:17:29.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.1µs " +orderer0.example.com | "2019-04-22 06:17:29.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:29.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:29.267 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:29.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbe Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +orderer0.example.com | "2019-04-22 06:17:29.269 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 379.6µs " +orderer0.example.com | "2019-04-22 06:17:29.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc0 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +orderer0.example.com | "2019-04-22 06:17:29.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel businesschannel took 31.1µs" +orderer0.example.com | "2019-04-22 06:17:29.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.7µs " +orderer0.example.com | "2019-04-22 06:17:29.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +orderer0.example.com | "2019-04-22 06:17:29.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:29.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:29.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:29.762 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc7 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +peer0.org1.example.com | "2019-04-22 06:16:48.553 UTC [msp.identity] Verify -> DEBU a5c Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +orderer0.example.com | "2019-04-22 06:17:29.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +orderer0.example.com | "2019-04-22 06:17:30.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc9 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +orderer0.example.com | "2019-04-22 06:17:30.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 3 on channel businesschannel took 38.9µs" +orderer0.example.com | "2019-04-22 06:17:30.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcc Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:30.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180µs " +orderer0.example.com | "2019-04-22 06:17:30.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.9µs " +orderer0.example.com | "2019-04-22 06:17:30.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:30.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:30.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd0 Sending msg of 28 bytes to 3 on channel testchainid took 36.2µs" +orderer0.example.com | "2019-04-22 06:17:30.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.2µs " +orderer0.example.com | "2019-04-22 06:17:30.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd2 Sending msg of 28 bytes to 2 on channel businesschannel took 50.2µs" +orderer0.example.com | "2019-04-22 06:17:30.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +orderer0.example.com | "2019-04-22 06:17:30.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.4µs " +orderer0.example.com | "2019-04-22 06:17:30.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120.3µs " +orderer0.example.com | "2019-04-22 06:17:30.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:30.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:30.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:30.762 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd9 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +orderer0.example.com | "2019-04-22 06:17:30.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU fda Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +orderer0.example.com | "2019-04-22 06:17:31.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdb Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +orderer0.example.com | "2019-04-22 06:17:31.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 396.5µs " +orderer0.example.com | "2019-04-22 06:17:31.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-04-22 06:17:31.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 461µs " +orderer0.example.com | "2019-04-22 06:17:31.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:31.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:31.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:31.272 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe2 Sending msg of 28 bytes to 3 on channel testchainid took 74.5µs" +orderer0.example.com | "2019-04-22 06:17:31.272 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190µs " +orderer0.example.com | "2019-04-22 06:17:31.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe4 Sending msg of 28 bytes to 3 on channel businesschannel took 34.1µs" +orderer0.example.com | "2019-04-22 06:17:31.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe5 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-04-22 06:17:31.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.5µs " +orderer0.example.com | "2019-04-22 06:17:31.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.5µs " +orderer0.example.com | "2019-04-22 06:17:31.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:31.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:31.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU fea Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:31.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU feb Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +orderer0.example.com | "2019-04-22 06:17:31.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU fec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 438.9µs " +orderer0.example.com | "2019-04-22 06:17:32.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fed Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +peer0.org1.example.com | "2019-04-22 06:16:48.554 UTC [msp.identity] Verify -> DEBU a5d Verify: sig = 00000000 30 44 02 20 6c 8d 0f c9 4b e2 4b b2 77 b8 94 14 |0D. l...K.K.w...| +peer0.org1.example.com | 00000010 8a 2f 05 75 70 a1 26 a6 9a 15 af 95 c1 87 b1 d8 |./.up.&.........| +peer0.org1.example.com | 00000020 f6 ff 33 b3 02 20 2b 9f 4f a8 68 2b 59 c4 11 b9 |..3.. +.O.h+Y...| +peer0.org1.example.com | 00000030 cb b5 d4 9e b0 97 01 b9 15 90 d6 ec ad ce 59 ef |..............Y.| +peer0.org1.example.com | 00000040 00 20 3e 1c 43 ce |. >.C.|" +peer0.org1.example.com | "2019-04-22 06:16:48.555 UTC [cauthdsl] func2 -> DEBU a5e 0xc0036a5d00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.555 UTC [cauthdsl] func1 -> DEBU a5f 0xc0036a5d00 gate 1555913808553082900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.556 UTC [policies] Evaluate -> DEBU a60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.556 UTC [policies] Evaluate -> DEBU a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.556 UTC [policies] Evaluate -> DEBU a62 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.557 UTC [policies] Evaluate -> DEBU a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.557 UTC [gossip.comm] authenticateRemotePeer -> DEBU a64 Authenticated 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:16:48.557 UTC [gossip.comm] createConnection -> DEBU a65 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.558 UTC [gossip.comm] sendToEndpoint -> DEBU a66 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.558 UTC [gossip.comm] sendToEndpoint -> DEBU a67 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.561 UTC [gossip.comm] func1 -> DEBU a68 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.561 UTC [gossip.gossip] handleMessage -> DEBU a69 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.561 UTC [msp] DeserializeIdentity -> DEBU a6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.562 UTC [msp] DeserializeIdentity -> DEBU a6b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.562 UTC [msp] DeserializeIdentity -> DEBU a6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.563 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a6d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.563 UTC [policies] Evaluate -> DEBU a70 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.563 UTC [policies] Evaluate -> DEBU a71 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.564 UTC [policies] Evaluate -> DEBU a72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.564 UTC [cauthdsl] func1 -> DEBU a73 0xc003604780 gate 1555913808564285600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.564 UTC [cauthdsl] func2 -> DEBU a74 0xc003604780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.564 UTC [cauthdsl] func2 -> DEBU a75 0xc003604780 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.565 UTC [cauthdsl] func2 -> DEBU a76 0xc003604780 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.565 UTC [msp.identity] Verify -> DEBU a77 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +peer0.org1.example.com | 00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +peer0.org1.example.com | "2019-04-22 06:16:48.566 UTC [msp.identity] Verify -> DEBU a78 Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +peer0.org1.example.com | 00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +peer0.org1.example.com | 00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +peer0.org1.example.com | 00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +peer0.org1.example.com | 00000040 4b b6 4c fc 03 1a |K.L...|" +peer0.org1.example.com | "2019-04-22 06:16:48.567 UTC [cauthdsl] func2 -> DEBU a79 0xc003604780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.567 UTC [cauthdsl] func1 -> DEBU a7a 0xc003604780 gate 1555913808564285600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.567 UTC [policies] Evaluate -> DEBU a7b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.568 UTC [policies] Evaluate -> DEBU a7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.568 UTC [policies] Evaluate -> DEBU a7d Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:32.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fee Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-04-22 06:17:32.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 281.2µs " +orderer0.example.com | "2019-04-22 06:17:32.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 476µs " +orderer0.example.com | "2019-04-22 06:17:32.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:32.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:32.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:32.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff4 Sending msg of 28 bytes to 3 on channel testchainid took 50.4µs" +orderer0.example.com | "2019-04-22 06:17:32.263 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.2µs " +orderer0.example.com | "2019-04-22 06:17:32.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff6 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +orderer0.example.com | "2019-04-22 06:17:32.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff7 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +orderer0.example.com | "2019-04-22 06:17:32.606 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.9µs " +orderer0.example.com | "2019-04-22 06:17:32.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.6µs " +orderer0.example.com | "2019-04-22 06:17:32.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:32.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:32.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:32.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffd Sending msg of 28 bytes to 3 on channel testchainid took 30.5µs" +orderer0.example.com | "2019-04-22 06:17:32.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " +orderer0.example.com | "2019-04-22 06:17:33.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fff Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-04-22 06:17:33.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-04-22 06:17:33.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.8µs " +orderer0.example.com | "2019-04-22 06:17:33.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1002 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:33.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1003 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.424ms " +orderer0.example.com | "2019-04-22 06:17:33.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1004 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:33.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1005 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:33.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1006 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +orderer0.example.com | "2019-04-22 06:17:33.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1007 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.3µs " +orderer0.example.com | "2019-04-22 06:17:33.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +orderer0.example.com | "2019-04-22 06:17:33.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1009 Sending msg of 28 bytes to 3 on channel businesschannel took 68.8µs" +orderer0.example.com | "2019-04-22 06:17:33.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.1µs " +orderer0.example.com | "2019-04-22 06:17:33.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 381.4µs " +orderer0.example.com | "2019-04-22 06:17:33.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:33.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:33.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:33.762 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100f Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +orderer0.example.com | "2019-04-22 06:17:33.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +orderer0.example.com | "2019-04-22 06:17:34.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 2 on channel businesschannel took 33.2µs" +orderer0.example.com | "2019-04-22 06:17:34.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1012 Sending msg of 28 bytes to 3 on channel businesschannel took 60µs" +orderer0.example.com | "2019-04-22 06:17:34.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.1µs " +peer0.org1.example.com | "2019-04-22 06:16:48.568 UTC [policies] Evaluate -> DEBU a7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.570 UTC [msp] DeserializeIdentity -> DEBU a7f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.570 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a80 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a81 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.571 UTC [policies] Evaluate -> DEBU a82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.572 UTC [policies] Evaluate -> DEBU a83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.572 UTC [policies] Evaluate -> DEBU a84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.572 UTC [cauthdsl] func1 -> DEBU a85 0xc003605860 gate 1555913808572587700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.573 UTC [cauthdsl] func2 -> DEBU a86 0xc003605860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.573 UTC [cauthdsl] func2 -> DEBU a87 0xc003605860 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.573 UTC [cauthdsl] func2 -> DEBU a88 0xc003605860 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.573 UTC [msp.identity] Verify -> DEBU a89 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +peer0.org1.example.com | 00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +peer0.org1.example.com | "2019-04-22 06:16:48.574 UTC [msp.identity] Verify -> DEBU a8a Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +peer0.org1.example.com | 00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +peer0.org1.example.com | 00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +peer0.org1.example.com | 00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +peer0.org1.example.com | 00000040 4b b6 4c fc 03 1a |K.L...|" +peer0.org1.example.com | "2019-04-22 06:16:48.575 UTC [cauthdsl] func2 -> DEBU a8b 0xc003605860 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.575 UTC [cauthdsl] func1 -> DEBU a8c 0xc003605860 gate 1555913808572587700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.575 UTC [policies] Evaluate -> DEBU a8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.576 UTC [policies] Evaluate -> DEBU a8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.576 UTC [policies] Evaluate -> DEBU a8f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.576 UTC [policies] Evaluate -> DEBU a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.577 UTC [msp.identity] Verify -> DEBU a91 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:48.577 UTC [msp.identity] Verify -> DEBU a92 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:48.578 UTC [gossip.gossip] handleMessage -> DEBU a93 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.713 UTC [gossip.comm] func1 -> DEBU a94 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.713 UTC [gossip.gossip] handleMessage -> DEBU a95 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.715 UTC [msp] DeserializeIdentity -> DEBU a96 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.715 UTC [msp] DeserializeIdentity -> DEBU a97 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.715 UTC [gossip.gossip] handleMessage -> DEBU a98 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.718 UTC [gossip.comm] func1 -> DEBU a99 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.719 UTC [gossip.comm] func1 -> DEBU a9a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.719 UTC [gossip.gossip] handleMessage -> DEBU a9b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.720 UTC [gossip.pull] HandleMessage -> DEBU a9c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.720 UTC [gossip.pull] SendDigest -> DEBU a9d Sending BLOCK_MSG digest: [1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:48.721 UTC [gossip.gossip] handleMessage -> DEBU a9e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.721 UTC [gossip.gossip] handleMessage -> DEBU a9f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.721 UTC [msp.identity] Verify -> DEBU aa0 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +peer0.org1.example.com | "2019-04-22 06:16:48.722 UTC [msp.identity] Verify -> DEBU aa1 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:48.724 UTC [gossip.gossip] handleMessage -> DEBU aa2 Exiting" +orderer0.example.com | "2019-04-22 06:17:34.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138µs " +orderer0.example.com | "2019-04-22 06:17:34.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1015 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:34.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1016 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:34.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1017 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:34.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1018 Sending msg of 28 bytes to 3 on channel testchainid took 29.4µs" +orderer0.example.com | "2019-04-22 06:17:34.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1019 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.8µs " +orderer0.example.com | "2019-04-22 06:17:34.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101a Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-04-22 06:17:34.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101b Sending msg of 28 bytes to 3 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-04-22 06:17:34.606 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.1µs " +orderer0.example.com | "2019-04-22 06:17:34.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 709.5µs " +orderer0.example.com | "2019-04-22 06:17:34.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:34.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:34.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1020 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:34.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1021 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +orderer0.example.com | "2019-04-22 06:17:34.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.7µs " +orderer0.example.com | "2019-04-22 06:17:35.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1023 Sending msg of 28 bytes to 3 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-04-22 06:17:35.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1024 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-04-22 06:17:35.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1025 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216.4µs " +orderer0.example.com | "2019-04-22 06:17:35.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.9µs " +orderer0.example.com | "2019-04-22 06:17:35.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1027 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:35.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1028 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:35.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:35.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102a Sending msg of 28 bytes to 3 on channel testchainid took 43.2µs" +orderer0.example.com | "2019-04-22 06:17:35.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.5µs " +orderer0.example.com | "2019-04-22 06:17:35.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102c Sending msg of 28 bytes to 3 on channel businesschannel took 93.3µs" +orderer0.example.com | "2019-04-22 06:17:35.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102d Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +orderer0.example.com | "2019-04-22 06:17:35.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.7µs " +orderer0.example.com | "2019-04-22 06:17:35.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.7µs " +orderer0.example.com | "2019-04-22 06:17:35.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1030 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:35.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1031 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:35.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:35.766 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1033 Sending msg of 28 bytes to 3 on channel testchainid took 44.4µs" +orderer0.example.com | "2019-04-22 06:17:35.766 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.8µs " +orderer0.example.com | "2019-04-22 06:17:36.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1035 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-04-22 06:17:36.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1036 Sending msg of 28 bytes to 3 on channel businesschannel took 26.2µs" +orderer0.example.com | "2019-04-22 06:17:36.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1037 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.9µs " +orderer0.example.com | "2019-04-22 06:17:36.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.3261ms " +peer0.org1.example.com | "2019-04-22 06:16:48.725 UTC [gossip.gossip] handleMessage -> DEBU aa3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.727 UTC [msp.identity] Verify -> DEBU aa4 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +peer0.org1.example.com | "2019-04-22 06:16:48.727 UTC [msp.identity] Verify -> DEBU aa5 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:48.727 UTC [msp] DeserializeIdentity -> DEBU aa6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.727 UTC [gossip.gossip] handleMessage -> DEBU aa7 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.938 UTC [gossip.gossip] handleMessage -> DEBU aa8 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.938 UTC [msp] DeserializeIdentity -> DEBU aa9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.939 UTC [msp] DeserializeIdentity -> DEBU aaa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.940 UTC [msp] DeserializeIdentity -> DEBU aab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.940 UTC [gossip.gossip] handleMessage -> DEBU aac Exiting" +peer0.org1.example.com | "2019-04-22 06:16:48.945 UTC [gossip.gossip] handleMessage -> DEBU aad Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913807246287600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:48.945 UTC [msp] DeserializeIdentity -> DEBU aae Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.947 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU aaf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:48.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:48.948 UTC [policies] Evaluate -> DEBU ab2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.948 UTC [policies] Evaluate -> DEBU ab3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:48.948 UTC [policies] Evaluate -> DEBU ab4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:48.949 UTC [cauthdsl] func1 -> DEBU ab5 0xc002445370 gate 1555913808949732900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:48.949 UTC [cauthdsl] func2 -> DEBU ab6 0xc002445370 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:48.949 UTC [cauthdsl] func2 -> DEBU ab7 0xc002445370 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:48.950 UTC [cauthdsl] func2 -> DEBU ab8 0xc002445370 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.951 UTC [msp.identity] Verify -> DEBU ab9 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:48.951 UTC [msp.identity] Verify -> DEBU aba Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:48.952 UTC [cauthdsl] func2 -> DEBU abb 0xc002445370 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:48.952 UTC [cauthdsl] func1 -> DEBU abc 0xc002445370 gate 1555913808949732900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:48.953 UTC [policies] Evaluate -> DEBU abd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.953 UTC [policies] Evaluate -> DEBU abe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.954 UTC [policies] Evaluate -> DEBU abf Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:36.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1039 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:36.113 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:36.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:36.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" +orderer0.example.com | "2019-04-22 06:17:36.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +orderer0.example.com | "2019-04-22 06:17:36.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2019-04-22 06:17:36.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-04-22 06:17:36.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.4µs " +orderer0.example.com | "2019-04-22 06:17:36.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71µs " +orderer0.example.com | "2019-04-22 06:17:36.613 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1042 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:36.613 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:36.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:36.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2019-04-22 06:17:36.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.1µs " +orderer0.example.com | "2019-04-22 06:17:37.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-04-22 06:17:37.109 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1048 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +orderer0.example.com | "2019-04-22 06:17:37.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +orderer0.example.com | "2019-04-22 06:17:37.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 544.3µs " +orderer0.example.com | "2019-04-22 06:17:37.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:37.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:37.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:37.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2019-04-22 06:17:37.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.7µs " +orderer0.example.com | "2019-04-22 06:17:37.567 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1050 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34648 with txid 'b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-04-22 06:17:37.567 UTC [policies] Evaluate -> DEBU 1051 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:17:37.567 UTC [policies] Evaluate -> DEBU 1052 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:37.567 UTC [policies] Evaluate -> DEBU 1053 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:17:37.568 UTC [policies] Evaluate -> DEBU 1054 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:37.568 UTC [policies] Evaluate -> DEBU 1055 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:17:37.568 UTC [cauthdsl] func1 -> DEBU 1056 0xc000d5c0c0 gate 1555913857568152500 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:37.568 UTC [cauthdsl] func2 -> DEBU 1057 0xc000d5c0c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:37.568 UTC [cauthdsl] func2 -> DEBU 1058 0xc000d5c0c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:37.568 UTC [cauthdsl] func2 -> DEBU 1059 0xc000d5c0c0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:37.569 UTC [msp.identity] Verify -> DEBU 105a Verify: digest = 00000000 85 7c a1 d9 67 9c de 88 5d fb 97 8c eb 4a 43 fa |.|..g...]....JC.| +orderer0.example.com | 00000010 75 1a d2 7a 6c 28 ae 49 bd f7 17 83 f5 67 5f 12 |u..zl(.I.....g_.|" +orderer0.example.com | "2019-04-22 06:17:37.569 UTC [msp.identity] Verify -> DEBU 105b Verify: sig = 00000000 30 44 02 20 79 64 5c 7c 1e dc 81 c1 b7 3b 78 d7 |0D. yd\|.....;x.| +orderer0.example.com | 00000010 64 4c e9 28 a7 bc f9 86 92 37 84 cf 1a 4f 83 25 |dL.(.....7...O.%| +orderer0.example.com | 00000020 64 3c 6d 63 02 20 39 67 37 2b 83 57 e7 ca 9b ca |d DEBU 105c 0xc000d5c0c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:37.571 UTC [cauthdsl] func1 -> DEBU 105d 0xc000d5c0c0 gate 1555913857568152500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 105e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 105f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 1060 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:48.954 UTC [policies] Evaluate -> DEBU ac0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:48.954 UTC [msp] DeserializeIdentity -> DEBU ac1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:48.954 UTC [gossip.gossip] handleMessage -> DEBU ac2 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:49.063 UTC [gossip.gossip] handleMessage -> DEBU ac3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 5040783096894389777 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:49.063 UTC [gossip.pull] HandleMessage -> DEBU ac4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 5040783096894389777 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:49.063 UTC [msp] DeserializeIdentity -> DEBU ac5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:49.064 UTC [gossip.gossip] handleMessage -> DEBU ac6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:49.064 UTC [gossip.pull] SendRes -> DEBU ac7 Sending 1 IDENTITY_MSG items to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:49.277 UTC [endorser] ProcessProposal -> DEBU ac8 Entering: request from 192.168.224.9:49214" +peer0.org1.example.com | "2019-04-22 06:16:49.277 UTC [protoutils] ValidateProposalMessage -> DEBU ac9 ValidateProposalMessage starts for signed proposal 0xc003020c80" +peer0.org1.example.com | "2019-04-22 06:16:49.278 UTC [protoutils] validateChannelHeader -> DEBU aca validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:49.278 UTC [protoutils] checkSignatureFromCreator -> DEBU acb begin" +peer0.org1.example.com | "2019-04-22 06:16:49.278 UTC [protoutils] checkSignatureFromCreator -> DEBU acc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:49.278 UTC [protoutils] checkSignatureFromCreator -> DEBU acd creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:49.278 UTC [msp.identity] Verify -> DEBU ace Verify: digest = 00000000 1d de 59 1e 8b f3 57 3c 4f 1f 2f 85 09 30 3f 66 |..Y...W DEBU acf Verify: sig = 00000000 30 45 02 21 00 a4 cf 88 22 7e 8e 1a 34 3e e7 02 |0E.!...."~..4>..| +peer0.org1.example.com | 00000010 44 1b df 91 9f 04 ba 8e 30 b6 4b 62 fd 33 ad 3b |D.......0.Kb.3.;| +peer0.org1.example.com | 00000020 8a a0 09 08 dd 02 20 29 dc d7 11 92 03 c5 a4 64 |...... ).......d| +peer0.org1.example.com | 00000030 89 86 9b e4 54 f5 cc d3 36 22 67 02 29 70 37 78 |....T...6"g.)p7x| +peer0.org1.example.com | 00000040 b0 ab cc eb 6e cd 2a |....n.*|" +peer0.org1.example.com | "2019-04-22 06:16:49.279 UTC [protoutils] checkSignatureFromCreator -> DEBU ad0 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:49.279 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ad1 validateChaincodeProposalMessage starts for proposal 0xc002330a80, header 0xc003021770" +peer0.org1.example.com | "2019-04-22 06:16:49.279 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ad2 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:49.280 UTC [endorser] preProcess -> DEBU ad3 [][3c7619ea] processing txid: 3c7619ea8d385e9772cee298e107f1d82a2430604cfe889905f47f4f1107942c" +peer0.org1.example.com | "2019-04-22 06:16:49.280 UTC [endorser] SimulateProposal -> DEBU ad4 [][3c7619ea] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:49.280 UTC [endorser] callChaincode -> INFO ad5 [][3c7619ea] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:49.280 UTC [chaincode] Execute -> DEBU ad6 Entry" +peer0.org1.example.com | "2019-04-22 06:16:49.281 UTC [msp.identity] Verify -> DEBU ad7 Verify: digest = 00000000 1d de 59 1e 8b f3 57 3c 4f 1f 2f 85 09 30 3f 66 |..Y...W DEBU ad8 Verify: sig = 00000000 30 45 02 21 00 a4 cf 88 22 7e 8e 1a 34 3e e7 02 |0E.!...."~..4>..| +peer0.org1.example.com | 00000010 44 1b df 91 9f 04 ba 8e 30 b6 4b 62 fd 33 ad 3b |D.......0.Kb.3.;| +peer0.org1.example.com | 00000020 8a a0 09 08 dd 02 20 29 dc d7 11 92 03 c5 a4 64 |...... ).......d| +peer0.org1.example.com | 00000030 89 86 9b e4 54 f5 cc d3 36 22 67 02 29 70 37 78 |....T...6"g.)p7x| +peer0.org1.example.com | 00000040 b0 ab cc eb 6e cd 2a |....n.*|" +peer0.org1.example.com | "2019-04-22 06:16:49.282 UTC [lifecycle] InstallChaincode -> DEBU ad9 received invocation of InstallChaincode for install package 1f8b08000000000000ffecd66750d3d9fa07f08044a58a59a40882040129920412a46b..." +peer0.org1.example.com | "2019-04-22 06:16:49.283 UTC [chaincode] handleMessage -> DEBU ada [3c7619ea] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:49.283 UTC [chaincode] Notify -> DEBU adb [3c7619ea] notifying Txid:3c7619ea8d385e9772cee298e107f1d82a2430604cfe889905f47f4f1107942c, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:49.283 UTC [chaincode] Execute -> DEBU adc Exit" +peer0.org1.example.com | "2019-04-22 06:16:49.284 UTC [endorser] callChaincode -> INFO add [][3c7619ea] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org1.example.com | "2019-04-22 06:16:49.284 UTC [endorser] SimulateProposal -> DEBU ade [][3c7619ea] Exit" +peer0.org1.example.com | "2019-04-22 06:16:49.284 UTC [endorser] func1 -> DEBU adf Exit: request from 192.168.224.9:49214" +peer0.org1.example.com | "2019-04-22 06:16:49.284 UTC [comm.grpc.server] 1 -> INFO ae0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49214 grpc.code=OK grpc.call_duration=8.1725ms +peer0.org1.example.com | "2019-04-22 06:16:49.293 UTC [grpc] infof -> DEBU ae1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:49.293 UTC [grpc] infof -> DEBU ae2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:50.458 UTC [gossip.channel] reportMembershipChanges -> INFO ae3 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-04-22 06:16:50.878 UTC [msp.identity] Sign -> DEBU ae4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151012 " +peer0.org1.example.com | "2019-04-22 06:16:50.878 UTC [msp.identity] Sign -> DEBU ae5 Sign: digest: F4D5FD7233C00BA5DAE807A6787F501AC11FC01EB207B2FD2BB2F8808A627E29 " +peer0.org1.example.com | "2019-04-22 06:16:50.879 UTC [msp.identity] Sign -> DEBU ae6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:50.879 UTC [msp.identity] Sign -> DEBU ae7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:50.879 UTC [gossip.discovery] periodicalSendAlive -> DEBU ae8 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:16:50.884 UTC [msp] DeserializeIdentity -> DEBU ae9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.885 UTC [msp] DeserializeIdentity -> DEBU aea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.885 UTC [msp] DeserializeIdentity -> DEBU aeb Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 1061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:17:37.572 UTC [policies] Evaluate -> DEBU 1062 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:17:37.572 UTC [policies] Evaluate -> DEBU 1063 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:17:37.573 UTC [orderer.common.blockcutter] Ordered -> DEBU 1064 Enqueuing message into batch" +orderer0.example.com | "2019-04-22 06:17:37.573 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1065 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34648" +orderer0.example.com | "2019-04-22 06:17:37.578 UTC [grpc] warningf -> DEBU 1066 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.4:7050->192.168.224.9:34648: read: connection reset by peer" +orderer0.example.com | "2019-04-22 06:17:37.580 UTC [grpc] infof -> DEBU 1067 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:37.581 UTC [orderer.common.broadcast] Handle -> WARN 1068 Error reading from 192.168.224.9:34648: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:37.581 UTC [orderer.common.server] func1 -> DEBU 1069 Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:17:37.582 UTC [comm.grpc.server] 1 -> INFO 106a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34648 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.2365565s +orderer0.example.com | "2019-04-22 06:17:37.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106b Sending msg of 28 bytes to 2 on channel businesschannel took 52.5µs" +orderer0.example.com | "2019-04-22 06:17:37.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106c Sending msg of 28 bytes to 3 on channel businesschannel took 50.2µs" +orderer0.example.com | "2019-04-22 06:17:37.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 251.6µs " +orderer0.example.com | "2019-04-22 06:17:37.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:37.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283µs " +orderer0.example.com | "2019-04-22 06:17:37.614 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1070 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:37.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1071 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:37.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1072 Sending msg of 28 bytes to 3 on channel testchainid took 43.1µs" +orderer0.example.com | "2019-04-22 06:17:37.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1073 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.1µs " +orderer0.example.com | "2019-04-22 06:17:38.051 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1074 No inactive chains to try to replicate" +orderer0.example.com | "2019-04-22 06:17:38.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1075 Sending msg of 28 bytes to 3 on channel businesschannel took 31.3µs" +orderer0.example.com | "2019-04-22 06:17:38.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1076 Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +orderer0.example.com | "2019-04-22 06:17:38.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1077 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 275.5µs " +orderer0.example.com | "2019-04-22 06:17:38.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1078 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.1µs " +orderer0.example.com | "2019-04-22 06:17:38.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1079 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:38.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:38.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:38.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107c Sending msg of 28 bytes to 3 on channel testchainid took 32.3µs" +orderer0.example.com | "2019-04-22 06:17:38.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0536ms " +orderer0.example.com | "2019-04-22 06:17:38.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107e Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +orderer0.example.com | "2019-04-22 06:17:38.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107f Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-04-22 06:17:38.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1080 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.3µs " +orderer0.example.com | "2019-04-22 06:17:38.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1081 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2642ms " +orderer0.example.com | "2019-04-22 06:17:38.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1082 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:38.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1083 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:38.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1084 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:38.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1085 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +orderer0.example.com | "2019-04-22 06:17:38.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 389.7µs " +orderer0.example.com | "2019-04-22 06:17:39.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1087 Sending msg of 28 bytes to 2 on channel businesschannel took 33.5µs" +orderer0.example.com | "2019-04-22 06:17:39.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1088 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +peer0.org1.example.com | "2019-04-22 06:16:50.885 UTC [gossip.comm] Send -> DEBU aec Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.886 UTC [msp] DeserializeIdentity -> DEBU aed Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.886 UTC [gossip.comm] Send -> DEBU aee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.886 UTC [gossip.comm] Send -> DEBU aef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.886 UTC [gossip.comm] sendToEndpoint -> DEBU af0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.886 UTC [gossip.comm] sendToEndpoint -> DEBU af1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.886 UTC [gossip.comm] sendToEndpoint -> DEBU af2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.887 UTC [gossip.comm] sendToEndpoint -> DEBU af3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.887 UTC [gossip.comm] sendToEndpoint -> DEBU af4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.887 UTC [gossip.comm] sendToEndpoint -> DEBU af5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.913 UTC [gossip.pull] Hello -> DEBU af6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:50.913 UTC [gossip.comm] Send -> DEBU af7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.914 UTC [gossip.pull] Hello -> DEBU af8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:50.914 UTC [gossip.comm] sendToEndpoint -> DEBU af9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.914 UTC [gossip.comm] sendToEndpoint -> DEBU afa Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.915 UTC [gossip.comm] Send -> DEBU afb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.915 UTC [gossip.pull] Hello -> DEBU afc Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.comm] Send -> DEBU afd Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.comm] sendToEndpoint -> DEBU afe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.comm] sendToEndpoint -> DEBU aff Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.comm] func1 -> DEBU b00 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9745119100338543403 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.gossip] handleMessage -> DEBU b02 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9745119100338543403 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.pull] HandleMessage -> DEBU b03 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9745119100338543403 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.gossip] handleMessage -> DEBU b04 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.916 UTC [gossip.comm] sendToEndpoint -> DEBU b01 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.917 UTC [gossip.comm] sendToEndpoint -> DEBU b05 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.918 UTC [gossip.comm] func1 -> DEBU b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7713117138295123738 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.918 UTC [gossip.gossip] handleMessage -> DEBU b07 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.918 UTC [gossip.pull] HandleMessage -> DEBU b08 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.919 UTC [gossip.gossip] handleMessage -> DEBU b09 Exiting" +orderer0.example.com | "2019-04-22 06:17:39.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1089 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +orderer0.example.com | "2019-04-22 06:17:39.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130µs " +orderer0.example.com | "2019-04-22 06:17:39.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108e Sending msg of 28 bytes to 3 on channel testchainid took 29µs" +orderer0.example.com | "2019-04-22 06:17:39.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " +orderer0.example.com | "2019-04-22 06:17:39.576 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1090 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:39.576 UTC [orderer.consensus.etcdraft] propose -> INFO 1091 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:39.578 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1092 Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:39.581 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1093 Sending msg of 3179 bytes to 2 on channel businesschannel took 31.2µs" +orderer0.example.com | "2019-04-22 06:17:39.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 3179 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2019-04-22 06:17:39.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1095 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " +orderer0.example.com | "2019-04-22 06:17:39.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1096 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer1.example.com(orderer1.example.com:7050) took 83.4µs " +orderer0.example.com | "2019-04-22 06:17:39.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1097 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1098 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-04-22 06:17:39.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1099 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-04-22 06:17:39.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +orderer0.example.com | "2019-04-22 06:17:39.587 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 109b Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:39.588 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.6µs " +orderer0.example.com | "2019-04-22 06:17:39.589 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.596 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 109f [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-04-22 06:17:39.597 UTC [msp.identity] Sign -> DEBU 10a1 Sign: plaintext: 0A020802120B0A090A03010203100418...1F70144612D1A38A382DE6C8F8A97DE5 " +orderer0.example.com | "2019-04-22 06:17:39.597 UTC [msp.identity] Sign -> DEBU 10a2 Sign: digest: 5ACE71EDE5F5D2642780F3FAFC9C009018FABF7D5D6B04D4882E59E6B6F22470 " +orderer0.example.com | "2019-04-22 06:17:39.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a3 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +orderer0.example.com | "2019-04-22 06:17:39.608 UTC [fsblkstorage] indexBlock -> DEBU 10a5 Indexing block [blockNum=6, blockHash=[]byte{0x89, 0x22, 0x9f, 0x2d, 0xa7, 0x77, 0x8a, 0xc2, 0xd3, 0xc7, 0xbe, 0x3a, 0x97, 0x4d, 0xd2, 0xe2, 0xa9, 0xcf, 0xa6, 0xc0, 0x51, 0xd, 0x23, 0x40, 0x9d, 0x6b, 0xd2, 0xb5, 0x3f, 0x68, 0x94, 0xfe} txOffsets= +orderer0.example.com | txId=b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead locPointer=offset=70, bytesLength=3053 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:17:39.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 484.9µs " +orderer0.example.com | "2019-04-22 06:17:39.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a6 Sending msg of 28 bytes to 3 on channel businesschannel took 31.4µs" +orderer0.example.com | "2019-04-22 06:17:39.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 223.8µs " +orderer0.example.com | "2019-04-22 06:17:39.612 UTC [fsblkstorage] updateCheckpoint -> DEBU 10a9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90565], isChainEmpty=[false], lastBlockNumber=[6]" +orderer0.example.com | "2019-04-22 06:17:39.613 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10aa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.614 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ab [channel: businesschannel] Wrote block [6]" +orderer0.example.com | "2019-04-22 06:17:39.614 UTC [fsblkstorage] waitForBlock -> DEBU 10ac Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-04-22 06:17:39.615 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ad Remaining bytes=[4060], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:39.616 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ae Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +orderer0.example.com | "2019-04-22 06:17:39.616 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10af blockbytes [4058] read from file [0]" +peer0.org1.example.com | "2019-04-22 06:16:50.919 UTC [gossip.gossip] handleMessage -> DEBU b0a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7713117138295123738 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.919 UTC [gossip.pull] HandleMessage -> DEBU b0b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7713117138295123738 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.919 UTC [gossip.gossip] handleMessage -> DEBU b0c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b0d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151013 " +peer0.org1.example.com | "2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b0e Sign: digest: 6CD5289E4348F681393A2ABD412D096823F7D6FD03D7A59D0669C55A85F3B032 " +peer0.org1.example.com | "2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b0f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b10 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:50.921 UTC [gossip.comm] Send -> DEBU b11 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.921 UTC [msp] DeserializeIdentity -> DEBU b12 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.921 UTC [gossip.comm] Send -> DEBU b13 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.921 UTC [msp] DeserializeIdentity -> DEBU b14 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.922 UTC [gossip.comm] Send -> DEBU b15 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:50.922 UTC [gossip.comm] sendToEndpoint -> DEBU b16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.923 UTC [gossip.comm] sendToEndpoint -> DEBU b17 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.923 UTC [gossip.comm] sendToEndpoint -> DEBU b18 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.924 UTC [gossip.comm] sendToEndpoint -> DEBU b19 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.923 UTC [gossip.comm] sendToEndpoint -> DEBU b1a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.924 UTC [gossip.comm] sendToEndpoint -> DEBU b1b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.933 UTC [gossip.comm] func1 -> DEBU b1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.934 UTC [gossip.comm] func1 -> DEBU b1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.934 UTC [gossip.gossip] handleMessage -> DEBU b1e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.935 UTC [gossip.gossip] handleMessage -> DEBU b1f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.935 UTC [gossip.gossip] handleMessage -> DEBU b20 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU b21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b22 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:50.935 UTC [msp] DeserializeIdentity -> DEBU b23 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:50.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b25 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:50.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b26 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:50.937 UTC [policies] Evaluate -> DEBU b27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:50.938 UTC [policies] Evaluate -> DEBU b28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:50.939 UTC [policies] Evaluate -> DEBU b29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:50.940 UTC [cauthdsl] func1 -> DEBU b2a 0xc003747d90 gate 1555913810940061400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:50.940 UTC [cauthdsl] func2 -> DEBU b2b 0xc003747d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:50.940 UTC [cauthdsl] func2 -> DEBU b2c 0xc003747d90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:50.940 UTC [cauthdsl] func2 -> DEBU b2d 0xc003747d90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:50.941 UTC [msp.identity] Verify -> DEBU b2e Verify: digest = 00000000 6f 41 f9 21 12 e5 f4 fd 30 03 8f 7a 63 96 b3 c1 |oA.!....0..zc...| +peer0.org1.example.com | 00000010 54 c6 af 52 34 a5 e2 ad b7 55 46 6d 8c 0e fb b7 |T..R4....UFm....|" +peer0.org1.example.com | "2019-04-22 06:16:50.941 UTC [msp.identity] Verify -> DEBU b2f Verify: sig = 00000000 30 44 02 20 77 50 47 54 f5 4f e5 ae c3 18 f5 a1 |0D. wPGT.O......| +peer0.org1.example.com | 00000010 8e 6c d5 6f 45 96 7a 20 d3 1c 20 03 b8 9e 53 dd |.l.oE.z .. ...S.| +peer0.org1.example.com | 00000020 36 5a 29 5d 02 20 4b 11 13 cf a4 cf e5 71 ee 07 |6Z)]. K......q..| +peer0.org1.example.com | 00000030 f1 a4 f1 e8 3b d1 a1 cb 2f 60 0f d3 67 d1 3d 34 |....;.../`..g.=4| +peer0.org1.example.com | 00000040 82 99 fb 40 d4 80 |...@..|" +peer0.org1.example.com | "2019-04-22 06:16:50.942 UTC [cauthdsl] func2 -> DEBU b30 0xc003747d90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:50.943 UTC [cauthdsl] func1 -> DEBU b31 0xc003747d90 gate 1555913810940061400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:50.944 UTC [policies] Evaluate -> DEBU b32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.944 UTC [policies] Evaluate -> DEBU b33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.944 UTC [policies] Evaluate -> DEBU b34 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.945 UTC [policies] Evaluate -> DEBU b35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.945 UTC [gossip.discovery] handleAliveMessage -> DEBU b36 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.945 UTC [gossip.discovery] learnExistingMembers -> DEBU b37 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b38 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 " +orderer0.example.com | "2019-04-22 06:17:39.617 UTC [common.deliver] deliverBlocks -> DEBU 10b1 [channel: businesschannel] Delivering block [6] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:17:39.616 UTC [fsblkstorage] waitForBlock -> DEBU 10b0 Came out of wait. maxAvailaBlockNumber=[6]" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b39 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 " +orderer0.example.com | "2019-04-22 06:17:39.630 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10b2 Remaining bytes=[4060], Going to peek [8] bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b3a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b3b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [gossip.discovery] handleAliveMessage -> DEBU b3c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b3d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [msp.identity] Verify -> DEBU b3e Verify: digest = 00000000 be 3f 6a d6 63 4b e0 6e 21 99 e8 e4 90 68 d0 57 |.?j.cK.n!....h.W| +peer0.org1.example.com | 00000010 62 b4 27 3a 63 f3 30 22 e6 23 e4 e8 cd e7 42 8f |b.':c.0".#....B.|" +peer0.org1.example.com | "2019-04-22 06:16:50.946 UTC [msp.identity] Verify -> DEBU b3f Verify: sig = 00000000 30 45 02 21 00 ba 03 da 46 30 5c f6 f0 2d c0 57 |0E.!....F0\..-.W| +peer0.org1.example.com | 00000010 00 bb 4c fd 58 7e a2 eb b7 08 d3 b9 09 cb 4e 1a |..L.X~........N.| +peer0.org1.example.com | 00000020 99 d0 5d a1 e6 02 20 30 f2 78 e9 56 2d 13 2f 59 |..]... 0.x.V-./Y| +peer0.org1.example.com | 00000030 6c b0 cb bb 50 8f 25 76 b1 1f 8c 0b 71 f5 93 30 |l...P.%v....q..0| +peer0.org1.example.com | 00000040 c4 b6 54 2c fa d6 e6 |..T,...|" +peer0.org1.example.com | "2019-04-22 06:16:50.947 UTC [gossip.discovery] handleAliveMessage -> DEBU b40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.947 UTC [gossip.discovery] handleAliveMessage -> DEBU b41 Exiting" +orderer0.example.com | "2019-04-22 06:17:39.630 UTC [fsblkstorage] waitForBlock -> DEBU 10b3 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-04-22 06:17:39.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10b4 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +orderer0.example.com | "2019-04-22 06:17:39.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10b5 blockbytes [4058] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:39.649 UTC [common.deliver] deliverBlocks -> DEBU 10b6 [channel: businesschannel] Delivering block [6] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:17:39.675 UTC [fsblkstorage] waitForBlock -> DEBU 10b7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-04-22 06:17:39.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:39.766 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b9 Sending msg of 28 bytes to 3 on channel testchainid took 375.4µs" +orderer0.example.com | "2019-04-22 06:17:39.766 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.2µs " +orderer0.example.com | "2019-04-22 06:17:40.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bb Sending msg of 28 bytes to 2 on channel businesschannel took 51.4µs" +orderer0.example.com | "2019-04-22 06:17:40.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bc Sending msg of 28 bytes to 3 on channel businesschannel took 43.8µs" +orderer0.example.com | "2019-04-22 06:17:40.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265µs " +orderer0.example.com | "2019-04-22 06:17:40.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.2µs " +orderer0.example.com | "2019-04-22 06:17:40.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:40.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:40.265 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:40.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c2 Sending msg of 28 bytes to 3 on channel testchainid took 37.8µs" +orderer0.example.com | "2019-04-22 06:17:40.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.8µs " +orderer0.example.com | "2019-04-22 06:17:40.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c4 Sending msg of 28 bytes to 2 on channel businesschannel took 37.9µs" +orderer0.example.com | "2019-04-22 06:17:40.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c5 Sending msg of 28 bytes to 3 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-04-22 06:17:40.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 283.2µs " +orderer0.example.com | "2019-04-22 06:17:40.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +orderer0.example.com | "2019-04-22 06:17:40.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:40.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:40.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ca Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:40.765 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2019-04-22 06:17:40.767 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.8µs " +orderer0.example.com | "2019-04-22 06:17:41.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cd Sending msg of 28 bytes to 2 on channel businesschannel took 128.3µs" +orderer0.example.com | "2019-04-22 06:17:41.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-04-22 06:17:41.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " +orderer0.example.com | "2019-04-22 06:17:41.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 314.1µs " +orderer0.example.com | "2019-04-22 06:17:41.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:41.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:41.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:41.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d4 Sending msg of 28 bytes to 3 on channel testchainid took 25.6µs" +orderer0.example.com | "2019-04-22 06:17:41.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 676µs " +peer0.org1.example.com | "2019-04-22 06:16:50.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b42 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:50.947 UTC [msp.identity] Verify -> DEBU b43 Verify: digest = 00000000 6c d5 28 9e 43 48 f6 81 39 3a 2a bd 41 2d 09 68 |l.(.CH..9:*.A-.h| +peer0.org1.example.com | 00000010 23 f7 d6 fd 03 d7 a5 9d 06 69 c5 5a 85 f3 b0 32 |#........i.Z...2|" +peer0.org1.example.com | "2019-04-22 06:16:50.947 UTC [msp.identity] Verify -> DEBU b44 Verify: sig = 00000000 30 45 02 21 00 92 fc 3f d4 b2 d3 b1 5e 4d 17 40 |0E.!...?....^M.@| +peer0.org1.example.com | 00000010 37 62 52 70 40 27 aa ef c3 48 0d 87 f8 68 68 e9 |7bRp@'...H...hh.| +peer0.org1.example.com | 00000020 1c 9d 32 2e a9 02 20 3a e0 22 47 d8 56 33 46 fe |..2... :."G.V3F.| +peer0.org1.example.com | 00000030 45 13 7d 74 22 06 4f 9f ed 8d 64 54 b8 7f 1f 3e |E.}t".O...dT...>| +peer0.org1.example.com | 00000040 f0 dc 78 51 15 50 9d |..xQ.P.|" +peer0.org1.example.com | "2019-04-22 06:16:50.948 UTC [gossip.discovery] handleAliveMessage -> DEBU b45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.948 UTC [gossip.discovery] isSentByMe -> DEBU b46 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.948 UTC [gossip.discovery] handleAliveMessage -> DEBU b47 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU b48 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU b49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b4a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:50.950 UTC [gossip.gossip] handleMessage -> DEBU b4b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.950 UTC [gossip.gossip] handleMessage -> DEBU b4c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.951 UTC [msp.identity] Verify -> DEBU b4d Verify: digest = 00000000 6c d5 28 9e 43 48 f6 81 39 3a 2a bd 41 2d 09 68 |l.(.CH..9:*.A-.h| +peer0.org1.example.com | 00000010 23 f7 d6 fd 03 d7 a5 9d 06 69 c5 5a 85 f3 b0 32 |#........i.Z...2|" +peer0.org1.example.com | "2019-04-22 06:16:50.951 UTC [msp.identity] Verify -> DEBU b4e Verify: sig = 00000000 30 45 02 21 00 92 fc 3f d4 b2 d3 b1 5e 4d 17 40 |0E.!...?....^M.@| +peer0.org1.example.com | 00000010 37 62 52 70 40 27 aa ef c3 48 0d 87 f8 68 68 e9 |7bRp@'...H...hh.| +peer0.org1.example.com | 00000020 1c 9d 32 2e a9 02 20 3a e0 22 47 d8 56 33 46 fe |..2... :."G.V3F.| +peer0.org1.example.com | 00000030 45 13 7d 74 22 06 4f 9f ed 8d 64 54 b8 7f 1f 3e |E.}t".O...dT...>| +peer0.org1.example.com | 00000040 f0 dc 78 51 15 50 9d |..xQ.P.|" +peer0.org1.example.com | "2019-04-22 06:16:50.952 UTC [msp.identity] Verify -> DEBU b4f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:16:50.952 UTC [msp.identity] Verify -> DEBU b50 Verify: sig = 00000000 30 45 02 21 00 92 9d ae 4e 1d fc 53 13 97 88 15 |0E.!....N..S....| +peer0.org1.example.com | 00000010 3b 18 38 4a 50 f1 ff bf 3e 7e 99 94 39 28 a5 27 |;.8JP...>~..9(.'| +peer0.org1.example.com | 00000020 74 5b 0c 4c 3b 02 20 55 31 d2 4a 06 a8 22 c2 fb |t[.L;. U1.J.."..| +peer0.org1.example.com | 00000030 f9 85 7f 33 a5 e2 c4 f5 b5 50 5b de 7b ad f0 f4 |...3.....P[.{...| +peer0.org1.example.com | 00000040 c0 c1 cb f0 5c ac ae |....\..|" +peer0.org1.example.com | "2019-04-22 06:16:50.952 UTC [gossip.discovery] handleAliveMessage -> DEBU b51 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.952 UTC [gossip.discovery] isSentByMe -> DEBU b52 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.952 UTC [gossip.discovery] handleAliveMessage -> DEBU b53 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU b54 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.953 UTC [gossip.gossip] handleMessage -> DEBU b55 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU b56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b57 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:50.954 UTC [msp.identity] Verify -> DEBU b58 Verify: digest = 00000000 6c d5 28 9e 43 48 f6 81 39 3a 2a bd 41 2d 09 68 |l.(.CH..9:*.A-.h| +peer0.org1.example.com | 00000010 23 f7 d6 fd 03 d7 a5 9d 06 69 c5 5a 85 f3 b0 32 |#........i.Z...2|" +peer0.org1.example.com | "2019-04-22 06:16:50.954 UTC [msp.identity] Verify -> DEBU b59 Verify: sig = 00000000 30 45 02 21 00 92 fc 3f d4 b2 d3 b1 5e 4d 17 40 |0E.!...?....^M.@| +peer0.org1.example.com | 00000010 37 62 52 70 40 27 aa ef c3 48 0d 87 f8 68 68 e9 |7bRp@'...H...hh.| +peer0.org1.example.com | 00000020 1c 9d 32 2e a9 02 20 3a e0 22 47 d8 56 33 46 fe |..2... :."G.V3F.| +peer0.org1.example.com | 00000030 45 13 7d 74 22 06 4f 9f ed 8d 64 54 b8 7f 1f 3e |E.}t".O...dT...>| +peer0.org1.example.com | 00000040 f0 dc 78 51 15 50 9d |..xQ.P.|" +peer0.org1.example.com | "2019-04-22 06:16:50.955 UTC [gossip.discovery] handleAliveMessage -> DEBU b5a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.955 UTC [gossip.discovery] isSentByMe -> DEBU b5b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.956 UTC [gossip.discovery] handleAliveMessage -> DEBU b5c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b5d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:50.956 UTC [msp] DeserializeIdentity -> DEBU b5e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.957 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b5f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b60 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b61 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:50.957 UTC [policies] Evaluate -> DEBU b62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:50.957 UTC [policies] Evaluate -> DEBU b63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:50.957 UTC [policies] Evaluate -> DEBU b64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:50.958 UTC [cauthdsl] func1 -> DEBU b65 0xc00275d060 gate 1555913810958139800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:50.958 UTC [cauthdsl] func2 -> DEBU b66 0xc00275d060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:50.959 UTC [cauthdsl] func2 -> DEBU b67 0xc00275d060 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:50.959 UTC [cauthdsl] func2 -> DEBU b68 0xc00275d060 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:50.959 UTC [msp.identity] Verify -> DEBU b69 Verify: digest = 00000000 73 fa a8 c1 ef 4c f5 0d 41 2e c9 1c ae 94 73 f8 |s....L..A.....s.| +peer0.org1.example.com | 00000010 4e 51 20 10 a6 ff 84 7f 5e 17 74 29 fb 5f dc 1d |NQ .....^.t)._..|" +peer0.org1.example.com | "2019-04-22 06:16:50.960 UTC [msp.identity] Verify -> DEBU b6a Verify: sig = 00000000 30 44 02 20 29 3f 19 bc 29 69 4a 8a 85 54 a9 c9 |0D. )?..)iJ..T..| +peer0.org1.example.com | 00000010 82 6a 72 fb 95 68 d8 cf 15 7e 5b 6b 95 41 7d 89 |.jr..h...~[k.A}.| +peer0.org1.example.com | 00000020 19 82 83 c5 02 20 70 a9 ca bb 80 2f ba 95 6e d6 |..... p..../..n.| +peer0.org1.example.com | 00000030 45 da ca c5 3b 92 19 45 64 93 d0 bb cb 80 34 09 |E...;..Ed.....4.| +peer0.org1.example.com | 00000040 0e 62 ee af 91 5a |.b...Z|" +peer0.org1.example.com | "2019-04-22 06:16:50.960 UTC [cauthdsl] func2 -> DEBU b6b 0xc00275d060 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:50.961 UTC [cauthdsl] func1 -> DEBU b6c 0xc00275d060 gate 1555913810958139800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b6f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.962 UTC [gossip.discovery] handleAliveMessage -> DEBU b71 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.962 UTC [gossip.discovery] handleAliveMessage -> DEBU b72 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b73 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:50.963 UTC [msp] DeserializeIdentity -> DEBU b74 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:50.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:50.964 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b76 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:50.964 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b77 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:50.964 UTC [policies] Evaluate -> DEBU b78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:50.964 UTC [policies] Evaluate -> DEBU b79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:50.964 UTC [policies] Evaluate -> DEBU b7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:50.965 UTC [cauthdsl] func1 -> DEBU b7b 0xc002586a90 gate 1555913810965547400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:50.966 UTC [cauthdsl] func2 -> DEBU b7c 0xc002586a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:50.966 UTC [cauthdsl] func2 -> DEBU b7d 0xc002586a90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:50.966 UTC [cauthdsl] func2 -> DEBU b7e 0xc002586a90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:50.966 UTC [msp.identity] Verify -> DEBU b7f Verify: digest = 00000000 f6 12 b9 e1 b1 a2 37 e7 c7 95 62 f5 48 17 a1 de |......7...b.H...| +orderer0.example.com | "2019-04-22 06:17:41.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d6 Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +orderer0.example.com | "2019-04-22 06:17:41.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +peer0.org1.example.com | 00000010 79 a5 86 cc 74 ab a0 7b 23 b6 fd fc 36 2f 49 ac |y...t..{#...6/I.|" +peer0.org1.example.com | "2019-04-22 06:16:50.967 UTC [msp.identity] Verify -> DEBU b80 Verify: sig = 00000000 30 45 02 21 00 fe 36 ef bd 62 d9 e1 16 77 59 aa |0E.!..6..b...wY.| +peer0.org1.example.com | 00000010 d5 8c 35 cc c1 ee a7 4e 42 10 e9 f7 5e 44 a5 06 |..5....NB...^D..| +peer0.org1.example.com | 00000020 12 64 4f 2c 8b 02 20 21 e6 a4 c8 d1 e8 c6 ae a2 |.dO,.. !........| +peer0.org1.example.com | 00000030 1e 99 af aa 55 8d 51 e1 a2 35 4f 93 3b 90 90 d2 |....U.Q..5O.;...| +peer0.org1.example.com | 00000040 16 34 cd 10 7d 2f 7a |.4..}/z|" +peer0.org1.example.com | "2019-04-22 06:16:50.968 UTC [cauthdsl] func2 -> DEBU b81 0xc002586a90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:50.968 UTC [cauthdsl] func1 -> DEBU b82 0xc002586a90 gate 1555913810965547400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:50.968 UTC [policies] Evaluate -> DEBU b83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.970 UTC [policies] Evaluate -> DEBU b84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.971 UTC [policies] Evaluate -> DEBU b85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.971 UTC [policies] Evaluate -> DEBU b86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:50.973 UTC [gossip.discovery] handleAliveMessage -> DEBU b87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:50.978 UTC [gossip.discovery] handleAliveMessage -> DEBU b88 got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1555913791637475800, 20 but got ts: inc_num:1555913791637475800 seq_num:8 " +peer0.org1.example.com | "2019-04-22 06:16:50.979 UTC [gossip.discovery] handleAliveMessage -> DEBU b89 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:50.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.165 UTC [gossip.comm] func1 -> DEBU b8b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.165 UTC [gossip.gossip] handleMessage -> DEBU b8c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.166 UTC [gossip.gossip] handleMessage -> DEBU b8d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b8f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:51.168 UTC [msp.identity] Verify -> DEBU b90 Verify: digest = 00000000 88 f1 f3 5c 66 e9 95 45 89 58 af 48 7d 8f 66 4d |...\f..E.X.H}.fM| +peer0.org1.example.com | 00000010 fb 9d ed 2f 35 b1 15 d3 4b 69 f1 28 ba af 66 fe |.../5...Ki.(..f.|" +peer0.org1.example.com | "2019-04-22 06:16:51.168 UTC [msp.identity] Verify -> DEBU b91 Verify: sig = 00000000 30 44 02 20 3d 6f e6 2f d6 5f d7 64 0d 9d 84 b7 |0D. =o./._.d....| +peer0.org1.example.com | 00000010 66 0a 55 60 02 e0 ef b5 26 a4 82 4c 4f ff 1c d6 |f.U`....&..LO...| +peer0.org1.example.com | 00000020 be 60 9b 2a 02 20 54 06 07 de 46 b5 43 0f ac d1 |.`.*. T...F.C...| +peer0.org1.example.com | 00000030 5e f5 55 6c 48 32 44 b0 8e 7c 73 84 06 cf 9e ac |^.UlH2D..|s.....| +peer0.org1.example.com | 00000040 5b 12 eb de bb b8 |[.....|" +peer0.org1.example.com | "2019-04-22 06:16:51.169 UTC [msp.identity] Verify -> DEBU b92 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:51.169 UTC [msp.identity] Verify -> DEBU b93 Verify: sig = 00000000 30 45 02 21 00 d9 a6 a5 af 0a b3 d4 d0 b6 a8 9e |0E.!............| +peer0.org1.example.com | 00000010 17 a4 8e fe 84 29 0e 4c a4 cc 8e c0 70 be 58 ef |.....).L....p.X.| +peer0.org1.example.com | 00000020 c6 ff e2 2b 66 02 20 27 cd 92 9d 47 24 16 c0 3b |...+f. '...G$..;| +peer0.org1.example.com | 00000030 7e 9e 7a a7 64 ff 34 0c 01 26 c9 e5 db f0 57 b0 |~.z.d.4..&....W.| +peer0.org1.example.com | 00000040 1a 0e af 7f 44 4f 0c |....DO.|" +orderer0.example.com | "2019-04-22 06:17:41.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.2µs " +orderer0.example.com | "2019-04-22 06:17:41.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.7µs " +orderer0.example.com | "2019-04-22 06:17:41.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10da Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:41.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10db Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:41.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:41.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10dd Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +orderer0.example.com | "2019-04-22 06:17:41.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +orderer0.example.com | "2019-04-22 06:17:42.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10df Sending msg of 28 bytes to 2 on channel businesschannel took 33.1µs" +orderer0.example.com | "2019-04-22 06:17:42.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e0 Sending msg of 28 bytes to 3 on channel businesschannel took 108.7µs" +orderer0.example.com | "2019-04-22 06:17:42.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.3µs " +orderer0.example.com | "2019-04-22 06:17:42.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 391.6µs " +orderer0.example.com | "2019-04-22 06:17:42.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e3 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:42.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:42.265 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:42.266 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e6 Sending msg of 28 bytes to 3 on channel testchainid took 44.5µs" +orderer0.example.com | "2019-04-22 06:17:42.267 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184µs " +orderer0.example.com | "2019-04-22 06:17:42.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e8 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +orderer0.example.com | "2019-04-22 06:17:42.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e9 Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-04-22 06:17:42.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +orderer0.example.com | "2019-04-22 06:17:42.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.5µs " +orderer0.example.com | "2019-04-22 06:17:42.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ec Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:42.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ed Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:42.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ee Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:42.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ef Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +orderer0.example.com | "2019-04-22 06:17:42.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.7µs " +orderer0.example.com | "2019-04-22 06:17:43.043 UTC [orderer.common.server] Broadcast -> DEBU 10f1 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:17:43.044 UTC [orderer.common.broadcast] Handle -> DEBU 10f2 Starting new broadcast loop for 192.168.224.9:34660" +orderer0.example.com | "2019-04-22 06:17:43.069 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10f3 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34660 with txid '1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:43.071 UTC [policies] Evaluate -> DEBU 10f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:17:43.071 UTC [cauthdsl] func1 -> DEBU 10f9 0xc000e746c0 gate 1555913863071506300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:43.071 UTC [cauthdsl] func2 -> DEBU 10fa 0xc000e746c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:43.072 UTC [cauthdsl] func2 -> DEBU 10fb 0xc000e746c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:43.072 UTC [cauthdsl] func2 -> DEBU 10fc 0xc000e746c0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:43.072 UTC [msp.identity] Verify -> DEBU 10fd Verify: digest = 00000000 48 8d bd 48 0c 7c ca e2 08 87 5c 32 af 4e e3 c5 |H..H.|....\2.N..| +orderer0.example.com | 00000010 bb b1 a5 1f 70 06 8e 72 99 02 e4 10 7c 98 c6 2e |....p..r....|...|" +orderer0.example.com | "2019-04-22 06:17:43.073 UTC [msp.identity] Verify -> DEBU 10fe Verify: sig = 00000000 30 45 02 21 00 90 08 0c 73 59 fc ff da 6e 8f f2 |0E.!....sY...n..| +orderer0.example.com | 00000010 40 56 fe 2e 8d 7e 9f 7a ee 87 d3 6c 8e 9d a1 c3 |@V...~.z...l....| +orderer0.example.com | 00000020 ca 6c 03 e5 fa 02 20 00 c6 c0 c6 15 55 e1 47 3e |.l.... .....U.G>| +orderer0.example.com | 00000030 a7 41 71 4f ae bf 1a cd 91 6d d6 c4 f4 65 06 4f |.AqO.....m...e.O| +orderer0.example.com | 00000040 87 e3 04 18 9f 65 ab |.....e.|" +peer0.org1.example.com | "2019-04-22 06:16:51.169 UTC [gossip.discovery] handleAliveMessage -> DEBU b94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.169 UTC [gossip.discovery] learnExistingMembers -> DEBU b95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:51.170 UTC [gossip.discovery] learnExistingMembers -> DEBU b96 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 " +peer0.org1.example.com | "2019-04-22 06:16:51.170 UTC [gossip.discovery] learnExistingMembers -> DEBU b97 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 " +peer0.org1.example.com | "2019-04-22 06:16:51.170 UTC [gossip.discovery] learnExistingMembers -> DEBU b98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:51.171 UTC [gossip.discovery] learnExistingMembers -> DEBU b99 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.171 UTC [gossip.discovery] handleAliveMessage -> DEBU b9a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU b9b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.172 UTC [msp] DeserializeIdentity -> DEBU b9c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.178 UTC [msp] DeserializeIdentity -> DEBU b9d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.180 UTC [msp] DeserializeIdentity -> DEBU b9e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.182 UTC [gossip.comm] Send -> DEBU b9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.183 UTC [gossip.gossip] handleMessage -> DEBU ba0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.183 UTC [gossip.gossip] handleMessage -> DEBU ba1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.186 UTC [gossip.comm] sendToEndpoint -> DEBU ba5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.187 UTC [gossip.comm] sendToEndpoint -> DEBU ba6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.182 UTC [msp] DeserializeIdentity -> DEBU ba4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.187 UTC [gossip.comm] func1 -> DEBU ba7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.188 UTC [gossip.gossip] handleMessage -> DEBU ba9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.187 UTC [gossip.comm] Send -> DEBU ba8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.189 UTC [gossip.comm] sendToEndpoint -> DEBU bab Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.188 UTC [gossip.pull] HandleMessage -> DEBU baa GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.189 UTC [gossip.pull] SendDigest -> DEBU bac Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:51.190 UTC [gossip.gossip] handleMessage -> DEBU bad Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.189 UTC [gossip.comm] sendToEndpoint -> DEBU bae Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.201 UTC [gossip.comm] func1 -> DEBU baf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.201 UTC [gossip.gossip] handleMessage -> DEBU bb0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.201 UTC [gossip.gossip] handleMessage -> DEBU bb1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU bb2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.202 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bb3 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:51.202 UTC [msp.identity] Verify -> DEBU bb4 Verify: digest = 00000000 f3 34 6d d5 c4 64 e7 73 33 68 bd 6a f8 96 23 91 |.4m..d.s3h.j..#.| +peer0.org1.example.com | 00000010 c7 d7 3e a2 ef 90 8c 38 c0 cd 38 4f 68 8a f0 e0 |..>....8..8Oh...|" +peer0.org1.example.com | "2019-04-22 06:16:51.203 UTC [msp.identity] Verify -> DEBU bb5 Verify: sig = 00000000 30 44 02 20 02 c2 2f 91 8b 46 af 18 a8 23 cb 0a |0D. ../..F...#..| +peer0.org1.example.com | 00000010 46 7f 40 25 6e 85 2f e8 4a ff 39 f3 d7 db f5 04 |F.@%n./.J.9.....| +peer0.org1.example.com | 00000020 4f fb 5a 45 02 20 27 b9 9b c8 e0 9e fe 33 f3 ed |O.ZE. '......3..| +peer0.org1.example.com | 00000030 9a 13 16 ad 51 7c 87 0e 02 66 b5 49 ac 5d fc 3b |....Q|...f.I.].;| +peer0.org1.example.com | 00000040 04 88 5c 78 0b 7d |..\x.}|" +peer0.org1.example.com | "2019-04-22 06:16:51.204 UTC [msp.identity] Verify -> DEBU bb6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:51.204 UTC [msp.identity] Verify -> DEBU bb7 Verify: sig = 00000000 30 44 02 20 0f 69 7c 64 bf cf 51 0c ca 9f e6 b5 |0D. .i|d..Q.....| +peer0.org1.example.com | 00000010 3a ed 36 ed 7c 1b 84 05 41 69 96 6e 46 d2 de c2 |:.6.|...Ai.nF...| +peer0.org1.example.com | 00000020 0d 3c df d6 02 20 43 d5 c1 c3 59 a5 51 fc fa 2d |.<... C...Y.Q..-| +peer0.org1.example.com | 00000030 6d 0b d9 a9 ac 28 b0 f9 b5 6b 7f 49 5f c3 c7 a3 |m....(...k.I_...| +peer0.org1.example.com | 00000040 84 41 fc 76 4f fa |.A.vO.|" +peer0.org1.example.com | "2019-04-22 06:16:51.204 UTC [gossip.discovery] handleAliveMessage -> DEBU bb8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.204 UTC [gossip.discovery] learnExistingMembers -> DEBU bb9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bba updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 " +peer0.org1.example.com | "2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bbb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 " +peer0.org1.example.com | "2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bbc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bbd Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.205 UTC [gossip.discovery] handleAliveMessage -> DEBU bbe Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.206 UTC [gossip.discovery] sendMemResponse -> DEBU bbf Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:51.206 UTC [msp] DeserializeIdentity -> DEBU bc0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.206 UTC [msp] DeserializeIdentity -> DEBU bc1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.207 UTC [gossip.comm] Send -> DEBU bc2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.207 UTC [gossip.discovery] sendMemResponse -> DEBU bc3 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:51.207 UTC [gossip.comm] sendToEndpoint -> DEBU bc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.207 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU bc6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.499 UTC [gossip.election] waitForInterrupt -> DEBU bc7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.500 UTC [gossip.election] IsLeader -> DEBU bc8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:16:51.500 UTC [msp.identity] Sign -> DEBU bc9 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510031801 " +peer0.org1.example.com | "2019-04-22 06:16:51.500 UTC [msp.identity] Sign -> DEBU bca Sign: digest: E539525C8BD91B0F9E1DCCB57E4EF9F216608FF7F83D8AA1E01A1AB038825860 " +peer0.org1.example.com | "2019-04-22 06:16:51.501 UTC [gossip.election] waitForInterrupt -> DEBU bcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:51.506 UTC [msp] DeserializeIdentity -> DEBU bcc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.506 UTC [msp] DeserializeIdentity -> DEBU bcd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.507 UTC [msp] DeserializeIdentity -> DEBU bce Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.507 UTC [msp] DeserializeIdentity -> DEBU bcf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.507 UTC [gossip.comm] Send -> DEBU bd0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.508 UTC [msp] DeserializeIdentity -> DEBU bd1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.508 UTC [msp] DeserializeIdentity -> DEBU bd2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.508 UTC [gossip.comm] sendToEndpoint -> DEBU bd3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.508 UTC [gossip.comm] sendToEndpoint -> DEBU bd4 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.649 UTC [gossip.comm] func1 -> DEBU bd5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:17:43.073 UTC [cauthdsl] func2 -> DEBU 10ff 0xc000e746c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:43.073 UTC [cauthdsl] func1 -> DEBU 1100 0xc000e746c0 gate 1555913863071506300 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:43.074 UTC [policies] Evaluate -> DEBU 1101 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:17:43.074 UTC [policies] Evaluate -> DEBU 1102 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:17:43.074 UTC [policies] Evaluate -> DEBU 1103 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:17:43.075 UTC [policies] Evaluate -> DEBU 1104 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:17:43.075 UTC [policies] Evaluate -> DEBU 1105 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:17:43.076 UTC [policies] Evaluate -> DEBU 1106 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:17:43.076 UTC [orderer.common.blockcutter] Ordered -> DEBU 1107 Enqueuing message into batch" +orderer0.example.com | "2019-04-22 06:17:43.077 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1108 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34660" +orderer0.example.com | "2019-04-22 06:17:43.082 UTC [orderer.common.broadcast] Handle -> WARN 1109 Error reading from 192.168.224.9:34660: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:43.082 UTC [orderer.common.server] func1 -> DEBU 110a Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:17:43.082 UTC [comm.grpc.server] 1 -> INFO 110b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34660 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.1587ms +orderer0.example.com | "2019-04-22 06:17:43.083 UTC [grpc] infof -> DEBU 110c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:43.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110d Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" +orderer0.example.com | "2019-04-22 06:17:43.113 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel businesschannel took 42.7µs" +orderer0.example.com | "2019-04-22 06:17:43.114 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.7µs " +orderer0.example.com | "2019-04-22 06:17:43.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:43.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 570.5µs " +orderer0.example.com | "2019-04-22 06:17:43.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1112 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:43.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1113 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:43.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1114 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2019-04-22 06:17:43.263 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1115 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.7µs " +orderer0.example.com | "2019-04-22 06:17:43.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1116 Sending msg of 28 bytes to 2 on channel businesschannel took 46.6µs" +orderer0.example.com | "2019-04-22 06:17:43.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +orderer0.example.com | "2019-04-22 06:17:43.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.2µs " +orderer0.example.com | "2019-04-22 06:17:43.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1119 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.8µs " +orderer0.example.com | "2019-04-22 06:17:43.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:43.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:43.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:43.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111d Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" +orderer0.example.com | "2019-04-22 06:17:43.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.2µs " +orderer0.example.com | "2019-04-22 06:17:44.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111f Sending msg of 28 bytes to 2 on channel businesschannel took 63.2µs" +orderer0.example.com | "2019-04-22 06:17:44.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel businesschannel took 43.4µs" +orderer0.example.com | "2019-04-22 06:17:44.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.1µs " +orderer0.example.com | "2019-04-22 06:17:44.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1122 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3821ms " +orderer0.example.com | "2019-04-22 06:17:44.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1123 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:44.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1124 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1125 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:44.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1126 Sending msg of 28 bytes to 3 on channel testchainid took 50.6µs" +orderer0.example.com | "2019-04-22 06:17:44.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1127 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.9µs " +orderer0.example.com | "2019-04-22 06:17:44.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1128 Sending msg of 28 bytes to 2 on channel businesschannel took 59.4µs" +peer0.org1.example.com | "2019-04-22 06:16:51.649 UTC [gossip.gossip] handleMessage -> DEBU bd6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.649 UTC [gossip.pull] HandleMessage -> DEBU bd7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.649 UTC [msp] DeserializeIdentity -> DEBU bd8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.650 UTC [msp] DeserializeIdentity -> DEBU bd9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.650 UTC [gossip.pull] SendDigest -> DEBU bda Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:51.651 UTC [gossip.gossip] handleMessage -> DEBU bdb Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.657 UTC [gossip.comm] func1 -> DEBU bdc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.657 UTC [gossip.gossip] handleMessage -> DEBU bdd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.657 UTC [gossip.gossip] handleMessage -> DEBU bde Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [gossip.gossip] ValidateAliveMsg -> DEBU be0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [msp] DeserializeIdentity -> DEBU be1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU be2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU be3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU be4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [policies] Evaluate -> DEBU be5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [policies] Evaluate -> DEBU be6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [policies] Evaluate -> DEBU be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [cauthdsl] func1 -> DEBU be8 0xc0027b9140 gate 1555913811658575200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU be9 0xc0027b9140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU bea 0xc0027b9140 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU beb 0xc0027b9140 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [msp.identity] Verify -> DEBU bec Verify: digest = 00000000 f1 2f 14 2c 1c 0f e1 93 7d 8a d3 71 31 a5 7a 74 |./.,....}..q1.zt| +peer0.org1.example.com | 00000010 57 f6 e7 3b 09 ed 15 5c 76 00 f0 39 3a 9a a5 c6 |W..;...\v..9:...|" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [msp.identity] Verify -> DEBU bed Verify: sig = 00000000 30 44 02 20 45 24 ce b0 1a aa 23 99 23 b2 30 9b |0D. E$....#.#.0.| +peer0.org1.example.com | 00000010 33 ea d7 8d 98 ee ee 6e b5 15 95 51 92 ad 6e a4 |3......n...Q..n.| +peer0.org1.example.com | 00000020 39 f1 f2 dd 02 20 43 53 d1 af 0a 30 40 09 fd 5a |9.... CS...0@..Z| +peer0.org1.example.com | 00000030 e5 48 d5 bb e3 35 f2 20 fe b7 74 d3 ae 1a 58 89 |.H...5. ..t...X.| +peer0.org1.example.com | 00000040 8e d2 df b6 c7 5f |....._|" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU bee 0xc0027b9140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.658 UTC [cauthdsl] func1 -> DEBU bef 0xc0027b9140 gate 1555913811658575200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:44.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1129 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.9µs " +orderer0.example.com | "2019-04-22 06:17:44.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112a Sending msg of 28 bytes to 3 on channel businesschannel took 184.4µs" +orderer0.example.com | "2019-04-22 06:17:44.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.8µs " +orderer0.example.com | "2019-04-22 06:17:44.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:44.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:44.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:44.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112f Sending msg of 28 bytes to 3 on channel testchainid took 119.4µs" +orderer0.example.com | "2019-04-22 06:17:44.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1130 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +orderer0.example.com | "2019-04-22 06:17:45.077 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1131 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:45.077 UTC [orderer.consensus.etcdraft] propose -> INFO 1132 Created block [7], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:45.078 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1133 Proposed block [7] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:45.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 3170 bytes to 2 on channel businesschannel took 39µs" +orderer0.example.com | "2019-04-22 06:17:45.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 3170 bytes to 3 on channel businesschannel took 19µs" +orderer0.example.com | "2019-04-22 06:17:45.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 363.7µs " +orderer0.example.com | "2019-04-22 06:17:45.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 134.9µs " +orderer0.example.com | "2019-04-22 06:17:45.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113a Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +orderer0.example.com | "2019-04-22 06:17:45.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113b Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-04-22 06:17:45.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.4µs " +orderer0.example.com | "2019-04-22 06:17:45.088 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 113d Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:45.089 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 113e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-04-22 06:17:45.089 UTC [msp.identity] Sign -> DEBU 113f Sign: plaintext: 0A020802120B0A090A03010203100418...17B6CF0E32EB2DE82B5A6A3B1AB47C40 " +orderer0.example.com | "2019-04-22 06:17:45.089 UTC [msp.identity] Sign -> DEBU 1140 Sign: digest: 348783A2DE32BAE9357CD2C05609E64C96221319D5BB3F963F14FE1316B37446 " +orderer0.example.com | "2019-04-22 06:17:45.092 UTC [fsblkstorage] indexBlock -> DEBU 1141 Indexing block [blockNum=7, blockHash=[]byte{0xd7, 0x34, 0x1e, 0x62, 0x39, 0xbe, 0xee, 0x16, 0x6f, 0xda, 0xea, 0x22, 0xab, 0x75, 0xfa, 0xd, 0x35, 0x82, 0x21, 0x40, 0xe, 0x98, 0xb1, 0x94, 0xf5, 0x18, 0xa4, 0x3, 0xb3, 0x41, 0xea, 0x27} txOffsets= +orderer0.example.com | txId=1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a locPointer=offset=70, bytesLength=3044 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:17:45.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1142 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.8µs " +orderer0.example.com | "2019-04-22 06:17:45.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1143 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1144 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.104 UTC [fsblkstorage] updateCheckpoint -> DEBU 1145 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94615], isChainEmpty=[false], lastBlockNumber=[7]" +orderer0.example.com | "2019-04-22 06:17:45.104 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1146 [channel: businesschannel] Wrote block [7]" +orderer0.example.com | "2019-04-22 06:17:45.104 UTC [fsblkstorage] waitForBlock -> DEBU 1147 Came out of wait. maxAvailaBlockNumber=[7]" +orderer0.example.com | "2019-04-22 06:17:45.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1148 Remaining bytes=[4050], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:45.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1149 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +orderer0.example.com | "2019-04-22 06:17:45.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 114a blockbytes [4048] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:45.106 UTC [common.deliver] deliverBlocks -> DEBU 114b [channel: businesschannel] Delivering block [7] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:17:45.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114d Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +orderer0.example.com | "2019-04-22 06:17:45.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114e Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-04-22 06:17:45.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.7µs " +orderer0.example.com | "2019-04-22 06:17:45.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1150 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 428.9µs " +orderer0.example.com | "2019-04-22 06:17:45.106 UTC [fsblkstorage] waitForBlock -> DEBU 114c Going to wait for newer blocks. maxAvailaBlockNumber=[7], waitForBlockNum=[8]" +orderer0.example.com | "2019-04-22 06:17:45.111 UTC [fsblkstorage] waitForBlock -> DEBU 1151 Came out of wait. maxAvailaBlockNumber=[7]" +orderer0.example.com | "2019-04-22 06:17:45.111 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1152 Remaining bytes=[4050], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:45.112 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1153 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +orderer0.example.com | "2019-04-22 06:17:45.112 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1154 blockbytes [4048] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:45.112 UTC [common.deliver] deliverBlocks -> DEBU 1155 [channel: businesschannel] Delivering block [7] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:17:45.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1156 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.112 UTC [fsblkstorage] waitForBlock -> DEBU 1157 Going to wait for newer blocks. maxAvailaBlockNumber=[7], waitForBlockNum=[8]" +orderer0.example.com | "2019-04-22 06:17:45.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1159 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115a Sending msg of 28 bytes to 3 on channel testchainid took 46.9µs" +orderer0.example.com | "2019-04-22 06:17:45.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249.4µs " +orderer0.example.com | "2019-04-22 06:17:45.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115c Sending msg of 28 bytes to 2 on channel businesschannel took 96.3µs" +orderer0.example.com | "2019-04-22 06:17:45.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115d Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-04-22 06:17:45.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 468.1µs " +orderer0.example.com | "2019-04-22 06:17:45.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 342.9µs " +orderer0.example.com | "2019-04-22 06:17:45.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1161 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.730 UTC [orderer.common.server] Broadcast -> DEBU 1162 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:17:45.730 UTC [orderer.common.broadcast] Handle -> DEBU 1163 Starting new broadcast loop for 192.168.224.9:34674" +orderer0.example.com | "2019-04-22 06:17:45.753 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1164 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34674 with txid '8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1165 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1166 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1167 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1168 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1169 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:17:45.754 UTC [cauthdsl] func1 -> DEBU 116a 0xc0010d44e0 gate 1555913865754027900 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116b 0xc0010d44e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116c 0xc0010d44e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116d 0xc0010d44e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116e 0xc0010d44e0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:45.754 UTC [cauthdsl] func1 -> DEBU 116f 0xc0010d44e0 gate 1555913865754027900 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:45.755 UTC [policies] Evaluate -> DEBU 1170 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:17:45.755 UTC [policies] Evaluate -> DEBU 1171 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:17:45.755 UTC [policies] Evaluate -> DEBU 1172 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:17:45.755 UTC [cauthdsl] func1 -> DEBU 1173 0xc0010d4d20 gate 1555913865755917900 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:45.756 UTC [cauthdsl] func2 -> DEBU 1174 0xc0010d4d20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:45.756 UTC [cauthdsl] func2 -> DEBU 1175 0xc0010d4d20 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:45.756 UTC [cauthdsl] func2 -> DEBU 1176 0xc0010d4d20 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:45.757 UTC [msp.identity] Verify -> DEBU 1177 Verify: digest = 00000000 f2 d4 db 3b b3 ca 9f 40 f7 11 6c 72 45 c4 67 85 |...;...@..lrE.g.| +orderer0.example.com | 00000010 0b 4a 90 ec e8 56 ba 7e 04 cd 72 b3 ed 52 98 aa |.J...V.~..r..R..|" +orderer0.example.com | "2019-04-22 06:17:45.757 UTC [msp.identity] Verify -> DEBU 1178 Verify: sig = 00000000 30 45 02 21 00 d0 3d 02 05 ea 88 3c 8e 0f 48 f1 |0E.!..=....<..H.| +orderer0.example.com | 00000010 1e 84 5c ad 57 64 5d b7 51 d6 68 d5 a7 77 f3 c7 |..\.Wd].Q.h..w..| +orderer0.example.com | 00000020 6c 95 c1 fb 3a 02 20 69 6d 41 17 6a c3 75 f0 a8 |l...:. imA.j.u..| +orderer0.example.com | 00000030 9a 3a 16 27 b5 75 34 43 2f e8 04 c2 fd 9a 2f c1 |.:.'.u4C/...../.| +orderer0.example.com | 00000040 39 6c be 0b 61 f4 aa |9l..a..|" +orderer0.example.com | "2019-04-22 06:17:45.757 UTC [cauthdsl] func2 -> DEBU 1179 0xc0010d4d20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:45.757 UTC [cauthdsl] func1 -> DEBU 117a 0xc0010d4d20 gate 1555913865755917900 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] handleAliveMessage -> DEBU bf4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf6 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 " +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 " +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] handleAliveMessage -> DEBU bfa Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] handleMsgFromComm -> DEBU bfb Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [gossip.discovery] sendMemResponse -> DEBU bfc Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [msp] DeserializeIdentity -> DEBU bfd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [msp] DeserializeIdentity -> DEBU bfe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.659 UTC [msp] DeserializeIdentity -> DEBU bff Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.663 UTC [gossip.comm] Send -> DEBU c00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.663 UTC [gossip.comm] sendToEndpoint -> DEBU c01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.663 UTC [gossip.comm] sendToEndpoint -> DEBU c02 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.663 UTC [gossip.discovery] sendMemResponse -> DEBU c03 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:51.686 UTC [gossip.comm] func1 -> DEBU c04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.686 UTC [gossip.gossip] handleMessage -> DEBU c05 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.687 UTC [gossip.gossip] handleMessage -> DEBU c06 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.687 UTC [gossip.discovery] handleMsgFromComm -> DEBU c07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.688 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c08 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:51.688 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.689 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.689 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.689 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.689 UTC [policies] Evaluate -> DEBU c0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.689 UTC [policies] Evaluate -> DEBU c0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:51.689 UTC [policies] Evaluate -> DEBU c0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.689 UTC [cauthdsl] func1 -> DEBU c10 0xc0031b92b0 gate 1555913811689941400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:51.690 UTC [cauthdsl] func2 -> DEBU c11 0xc0031b92b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:51.690 UTC [cauthdsl] func2 -> DEBU c12 0xc0031b92b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:51.690 UTC [cauthdsl] func2 -> DEBU c13 0xc0031b92b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.691 UTC [msp.identity] Verify -> DEBU c14 Verify: digest = 00000000 c7 37 28 b4 c7 8a d3 fe 47 f3 12 2a 1c 73 88 a5 |.7(.....G..*.s..| +peer0.org1.example.com | 00000010 75 94 72 fc 39 57 e4 81 09 65 71 6f b1 42 96 c1 |u.r.9W...eqo.B..|" +peer0.org1.example.com | "2019-04-22 06:16:51.691 UTC [msp.identity] Verify -> DEBU c15 Verify: sig = 00000000 30 45 02 21 00 d8 67 de d8 3e 95 fe 7e 92 bc b3 |0E.!..g..>..~...| +peer0.org1.example.com | 00000010 69 27 10 89 b9 62 38 78 83 b4 2a 53 c0 55 ae 49 |i'...b8x..*S.U.I| +peer0.org1.example.com | 00000020 92 39 4d 89 aa 02 20 05 10 3f ff 50 70 fd e5 c9 |.9M... ..?.Pp...| +peer0.org1.example.com | 00000030 29 17 28 a7 12 8d 5e e8 ce 8f ba 11 78 1b ce 77 |).(...^.....x..w| +peer0.org1.example.com | 00000040 cd ff fc 61 f0 b7 f8 |...a...|" +peer0.org1.example.com | "2019-04-22 06:16:51.691 UTC [cauthdsl] func2 -> DEBU c16 0xc0031b92b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.691 UTC [cauthdsl] func1 -> DEBU c17 0xc0031b92b0 gate 1555913811689941400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:51.691 UTC [policies] Evaluate -> DEBU c18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.694 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.697 UTC [policies] Evaluate -> DEBU c1a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.697 UTC [policies] Evaluate -> DEBU c1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.697 UTC [gossip.discovery] handleAliveMessage -> DEBU c1c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.698 UTC [gossip.discovery] handleAliveMessage -> DEBU c1d got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1555913791637475800, 22 but got ts: inc_num:1555913791637475800 seq_num:21 " +peer0.org1.example.com | "2019-04-22 06:16:51.698 UTC [gossip.discovery] handleAliveMessage -> DEBU c1e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU c1f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.707 UTC [msp] DeserializeIdentity -> DEBU c20 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.708 UTC [msp] DeserializeIdentity -> DEBU c21 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.708 UTC [msp] DeserializeIdentity -> DEBU c22 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.709 UTC [msp] DeserializeIdentity -> DEBU c23 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.709 UTC [msp] DeserializeIdentity -> DEBU c24 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.710 UTC [msp] DeserializeIdentity -> DEBU c25 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.710 UTC [msp] DeserializeIdentity -> DEBU c26 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.711 UTC [gossip.comm] Send -> DEBU c27 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.711 UTC [msp] DeserializeIdentity -> DEBU c28 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.712 UTC [gossip.comm] Send -> DEBU c29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU c2a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU c2b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.713 UTC [gossip.comm] sendToEndpoint -> DEBU c2c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.713 UTC [gossip.comm] sendToEndpoint -> DEBU c2d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.718 UTC [gossip.gossip] handleMessage -> DEBU c2e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.718 UTC [gossip.gossip] handleMessage -> DEBU c2f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU c30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.719 UTC [gossip.discovery] handleMsgFromComm -> DEBU c31 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.916 UTC [gossip.pull] SendReq -> DEBU c32 Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +orderer0.example.com | "2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117d Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117f Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:17:45.759 UTC [policies] Evaluate -> DEBU 1180 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:17:45.759 UTC [orderer.common.blockcutter] Ordered -> DEBU 1181 Enqueuing message into batch" +orderer0.example.com | "2019-04-22 06:17:45.759 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1182 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34674" +orderer0.example.com | "2019-04-22 06:17:45.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:45.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1184 Sending msg of 28 bytes to 3 on channel testchainid took 30.9µs" +orderer0.example.com | "2019-04-22 06:17:45.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1185 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.4µs " +orderer0.example.com | "2019-04-22 06:17:45.767 UTC [orderer.common.broadcast] Handle -> WARN 1186 Error reading from 192.168.224.9:34674: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:45.767 UTC [orderer.common.server] func1 -> DEBU 1188 Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:17:45.767 UTC [comm.grpc.server] 1 -> INFO 1189 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34674 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.0367ms +orderer0.example.com | "2019-04-22 06:17:45.767 UTC [grpc] infof -> DEBU 1187 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:46.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118a Sending msg of 28 bytes to 2 on channel businesschannel took 74.8µs" +orderer0.example.com | "2019-04-22 06:17:46.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118b Sending msg of 28 bytes to 3 on channel businesschannel took 34.9µs" +orderer0.example.com | "2019-04-22 06:17:46.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.2µs " +orderer0.example.com | "2019-04-22 06:17:46.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.6µs " +orderer0.example.com | "2019-04-22 06:17:46.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:46.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:46.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1190 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:46.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 3 on channel testchainid took 33µs" +orderer0.example.com | "2019-04-22 06:17:46.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1192 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 618.8µs " +orderer0.example.com | "2019-04-22 06:17:46.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1193 Sending msg of 28 bytes to 3 on channel businesschannel took 59.8µs" +orderer0.example.com | "2019-04-22 06:17:46.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1194 Sending msg of 28 bytes to 2 on channel businesschannel took 282.3µs" +orderer0.example.com | "2019-04-22 06:17:46.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.3µs " +orderer0.example.com | "2019-04-22 06:17:46.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1196 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.5µs " +orderer0.example.com | "2019-04-22 06:17:46.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:46.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1198 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:46.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1199 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:46.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119a Sending msg of 28 bytes to 3 on channel testchainid took 25.9µs" +orderer0.example.com | "2019-04-22 06:17:46.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 626.8µs " +orderer0.example.com | "2019-04-22 06:17:47.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119c Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +orderer0.example.com | "2019-04-22 06:17:47.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119d Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" +orderer0.example.com | "2019-04-22 06:17:47.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.4µs " +orderer0.example.com | "2019-04-22 06:17:47.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.8µs " +orderer0.example.com | "2019-04-22 06:17:47.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.265 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a3 Sending msg of 28 bytes to 3 on channel testchainid took 35.5µs" +orderer0.example.com | "2019-04-22 06:17:47.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 359.2µs " +orderer0.example.com | "2019-04-22 06:17:47.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a5 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +orderer0.example.com | "2019-04-22 06:17:47.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a6 Sending msg of 28 bytes to 3 on channel businesschannel took 38.7µs" +orderer0.example.com | "2019-04-22 06:17:47.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 800.3µs " +orderer0.example.com | "2019-04-22 06:17:47.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.8µs " +orderer0.example.com | "2019-04-22 06:17:47.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11aa Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.760 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 11ab Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:47.762 UTC [orderer.consensus.etcdraft] propose -> INFO 11ac Created block [8], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:47.763 UTC [orderer.consensus.etcdraft] 2 -> DEBU 11ad Proposed block [8] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:47.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ae Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11af Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +orderer0.example.com | "2019-04-22 06:17:47.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.4µs " +orderer0.example.com | "2019-04-22 06:17:47.768 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b1 Sending msg of 3171 bytes to 2 on channel businesschannel took 30.5µs" +orderer0.example.com | "2019-04-22 06:17:47.769 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b2 Sending msg of 3171 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-04-22 06:17:47.769 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b3 Send of ConsensusRequest for channel businesschannel with payload of size 3171 to orderer1.example.com(orderer1.example.com:7050) took 397.8µs " +orderer0.example.com | "2019-04-22 06:17:47.769 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b4 Send of ConsensusRequest for channel businesschannel with payload of size 3171 to orderer2.example.com(orderer2.example.com:7050) took 81.4µs " +orderer0.example.com | "2019-04-22 06:17:47.773 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.773 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b6 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +orderer0.example.com | "2019-04-22 06:17:47.773 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b7 Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-04-22 06:17:47.773 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.7µs " +orderer0.example.com | "2019-04-22 06:17:47.774 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 11b9 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:17:47.774 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 11ba [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-04-22 06:17:47.774 UTC [msp.identity] Sign -> DEBU 11bb Sign: plaintext: 0A020802120B0A090A03010203100418...A36F0C7C254B197F4377A8DDB3C48DB0 " +orderer0.example.com | "2019-04-22 06:17:47.774 UTC [msp.identity] Sign -> DEBU 11bc Sign: digest: BEEBAFEEEB741A6DD530758BF02839570B84EF8C35096F9919FBC3C69BB3D004 " +orderer0.example.com | "2019-04-22 06:17:47.775 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 595.4µs " +orderer0.example.com | "2019-04-22 06:17:47.778 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11be Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.781 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.780 UTC [fsblkstorage] indexBlock -> DEBU 11bf Indexing block [blockNum=8, blockHash=[]byte{0x87, 0x28, 0x3f, 0xd, 0x8c, 0x94, 0xcd, 0x21, 0x3f, 0x1, 0x49, 0xc1, 0xa, 0x2c, 0x32, 0xd1, 0x8, 0xa0, 0xc4, 0x5, 0x90, 0x89, 0x28, 0x51, 0x8e, 0x5a, 0xbc, 0x5, 0xe0, 0x40, 0x4d, 0xbb} txOffsets= +orderer0.example.com | txId=8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff locPointer=offset=70, bytesLength=3045 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:17:47.780 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c0 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:47.784 UTC [fsblkstorage] updateCheckpoint -> DEBU 11c2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98666], isChainEmpty=[false], lastBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:47.785 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 11c3 [channel: businesschannel] Wrote block [8]" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] waitForBlock -> DEBU 11c4 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c5 Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c6 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c7 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [common.deliver] deliverBlocks -> DEBU 11c8 [channel: businesschannel] Delivering block [8] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] waitForBlock -> DEBU 11c9 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] waitForBlock -> DEBU 11ca Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11cb Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11cc Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +peer0.org1.example.com | "2019-04-22 06:16:51.916 UTC [gossip.comm] Send -> DEBU c33 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:51.917 UTC [gossip.comm] sendToEndpoint -> DEBU c34 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.917 UTC [gossip.comm] sendToEndpoint -> DEBU c35 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:51.918 UTC [gossip.gossip] handleMessage -> DEBU c36 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 10465502825874617774, Envelope: 1896 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [msp] DeserializeIdentity -> DEBU c37 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c39 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c3a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [policies] Evaluate -> DEBU c3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [policies] Evaluate -> DEBU c3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [policies] Evaluate -> DEBU c3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [cauthdsl] func1 -> DEBU c3e 0xc00315e470 gate 1555913811919599000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [cauthdsl] func2 -> DEBU c3f 0xc00315e470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [cauthdsl] func2 -> DEBU c40 0xc00315e470 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [cauthdsl] func2 -> DEBU c41 0xc00315e470 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [msp.identity] Verify -> DEBU c42 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +peer0.org1.example.com | 00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" +peer0.org1.example.com | "2019-04-22 06:16:51.919 UTC [msp.identity] Verify -> DEBU c43 Verify: sig = 00000000 30 44 02 20 72 c5 da 43 9a ec 68 e4 96 ad 11 51 |0D. r..C..h....Q| +peer0.org1.example.com | 00000010 3c 53 2e da f0 a1 3b b2 2a 76 45 12 46 01 3f c3 | DEBU c44 0xc00315e470 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [cauthdsl] func1 -> DEBU c45 0xc00315e470 gate 1555913811919599000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c48 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [msp] DeserializeIdentity -> DEBU c4a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c4b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [msp] DeserializeIdentity -> DEBU c4c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c4e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c4f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [cauthdsl] func1 -> DEBU c53 0xc003452210 gate 1555913811921223600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c54 0xc003452210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c55 0xc003452210 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c56 0xc003452210 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [msp.identity] Verify -> DEBU c57 Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +peer0.org1.example.com | 00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [msp.identity] Verify -> DEBU c58 Verify: sig = 00000000 30 44 02 20 3c 3e a5 63 cd 12 b9 1f 58 f8 d5 6e |0D. <>.c....X..n| +peer0.org1.example.com | 00000010 71 b3 61 70 11 36 7d 9a c9 4c b5 fd 3e e5 f3 df |q.ap.6}..L..>...| +peer0.org1.example.com | 00000020 4e fc 73 9d 02 20 5e e4 45 54 4a 82 04 83 a4 eb |N.s.. ^.ETJ.....| +peer0.org1.example.com | 00000030 30 3b 3e 6d 87 7f 6e eb d2 db 08 59 05 24 0b e8 |0;>m..n....Y.$..| +peer0.org1.example.com | 00000040 82 11 4b 08 cc 41 |..K..A|" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c59 0xc003452210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [cauthdsl] func1 -> DEBU c5a 0xc003452210 gate 1555913811921223600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c5d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [policies] Evaluate -> DEBU c5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [msp] DeserializeIdentity -> DEBU c5f Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11cd blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:47.787 UTC [common.deliver] deliverBlocks -> DEBU 11ce [channel: businesschannel] Delivering block [8] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:17:47.787 UTC [fsblkstorage] waitForBlock -> DEBU 11cf Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:48.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d0 Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +orderer0.example.com | "2019-04-22 06:17:48.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d1 Sending msg of 28 bytes to 3 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-04-22 06:17:48.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 436.8µs " +orderer0.example.com | "2019-04-22 06:17:48.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " +orderer0.example.com | "2019-04-22 06:17:48.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:48.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:48.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:48.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d7 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +orderer0.example.com | "2019-04-22 06:17:48.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.3µs " +orderer0.example.com | "2019-04-22 06:17:48.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d9 Sending msg of 28 bytes to 3 on channel businesschannel took 115.8µs" +orderer0.example.com | "2019-04-22 06:17:48.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0986ms " +orderer0.example.com | "2019-04-22 06:17:48.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11db Sending msg of 28 bytes to 2 on channel businesschannel took 947.3µs" +orderer0.example.com | "2019-04-22 06:17:48.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6527ms " +orderer0.example.com | "2019-04-22 06:17:48.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11dd Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:48.616 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11de Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:48.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11df Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:48.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e0 Sending msg of 28 bytes to 3 on channel testchainid took 333µs" +orderer0.example.com | "2019-04-22 06:17:48.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 487µs " +orderer0.example.com | "2019-04-22 06:17:50.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e2 Sending msg of 28 bytes to 2 on channel businesschannel took 50.5µs" +orderer0.example.com | "2019-04-22 06:17:50.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e3 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-04-22 06:17:50.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.4µs " +orderer0.example.com | "2019-04-22 06:17:50.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.2µs " +orderer0.example.com | "2019-04-22 06:17:50.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.096 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e9 Sending msg of 28 bytes to 3 on channel testchainid took 30µs" +orderer0.example.com | "2019-04-22 06:17:50.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.2µs " +orderer0.example.com | "2019-04-22 06:17:50.110 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11eb Sending msg of 28 bytes to 2 on channel businesschannel took 37.7µs" +orderer0.example.com | "2019-04-22 06:17:50.110 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ec Sending msg of 28 bytes to 3 on channel businesschannel took 29.4µs" +orderer0.example.com | "2019-04-22 06:17:50.110 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.8µs " +orderer0.example.com | "2019-04-22 06:17:50.110 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 206.6µs " +orderer0.example.com | "2019-04-22 06:17:50.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ef Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f2 Sending msg of 28 bytes to 3 on channel testchainid took 30.2µs" +orderer0.example.com | "2019-04-22 06:17:50.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [gossip.pull] HandleMessage -> DEBU c61 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 10465502825874617774, Envelope: 1896 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [msp] DeserializeIdentity -> DEBU c62 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c63 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [msp] DeserializeIdentity -> DEBU c64 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c65 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +orderer0.example.com | "2019-04-22 06:17:50.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +orderer0.example.com | "2019-04-22 06:17:50.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f6 Sending msg of 28 bytes to 3 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-04-22 06:17:50.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.8µs " +orderer0.example.com | "2019-04-22 06:17:50.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 899.1µs " +orderer0.example.com | "2019-04-22 06:17:50.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11fa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:50.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fb Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2019-04-22 06:17:50.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.3µs " +orderer0.example.com | "2019-04-22 06:17:51.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fd Sending msg of 28 bytes to 2 on channel businesschannel took 48.3µs" +orderer0.example.com | "2019-04-22 06:17:51.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ff Sending msg of 28 bytes to 3 on channel businesschannel took 30.4µs" +orderer0.example.com | "2019-04-22 06:17:51.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1201 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:51.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1200 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.1µs " +orderer0.example.com | "2019-04-22 06:17:51.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +orderer0.example.com | "2019-04-22 06:17:51.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1202 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:51.267 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1203 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:51.267 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1204 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +orderer0.example.com | "2019-04-22 06:17:51.268 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1205 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.8µs " +orderer0.example.com | "2019-04-22 06:17:51.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +orderer0.example.com | "2019-04-22 06:17:51.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +orderer0.example.com | "2019-04-22 06:17:51.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1208 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2019-04-22 06:17:51.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1209 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.3µs " +orderer0.example.com | "2019-04-22 06:17:51.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:51.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:51.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:51.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120d Sending msg of 28 bytes to 3 on channel testchainid took 342.4µs" +orderer0.example.com | "2019-04-22 06:17:51.766 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 905.4µs " +orderer0.example.com | "2019-04-22 06:17:51.798 UTC [orderer.common.server] Deliver -> DEBU 120f Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:51.798 UTC [common.deliver] Handle -> DEBU 1210 Starting new deliver loop for 192.168.224.9:34704" +orderer0.example.com | "2019-04-22 06:17:51.799 UTC [common.deliver] Handle -> DEBU 1211 Attempting to read seek info message from 192.168.224.9:34704" +orderer0.example.com | "2019-04-22 06:17:51.799 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:51.800 UTC [policies] Evaluate -> DEBU 1213 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:51.800 UTC [policies] Evaluate -> DEBU 1214 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:51.800 UTC [policies] Evaluate -> DEBU 1215 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:51.801 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:51.801 UTC [msp] DeserializeIdentity -> DEBU 1217 Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:51.802 UTC [msp.identity] newIdentity -> DEBU 1218 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:17:51.803 UTC [cauthdsl] func1 -> DEBU 1219 0xc001345aa0 gate 1555913871803291300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:51.803 UTC [cauthdsl] func2 -> DEBU 121a 0xc001345aa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:51.805 UTC [cauthdsl] func2 -> DEBU 121b 0xc001345aa0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:51.806 UTC [cauthdsl] func2 -> DEBU 121c 0xc001345aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [gossip.gossip] func2 -> DEBU c66 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-04-22 06:16:51.922 UTC [gossip.pull] HandleMessage -> DEBU c67 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" +peer0.org1.example.com | "2019-04-22 06:16:51.923 UTC [msp] DeserializeIdentity -> DEBU c68 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c69 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:51.923 UTC [msp] DeserializeIdentity -> DEBU c6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:51.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +orderer0.example.com | "2019-04-22 06:17:51.807 UTC [cauthdsl] func2 -> DEBU 121d 0xc001345aa0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:51.807 UTC [cauthdsl] func1 -> DEBU 121e 0xc001345aa0 gate 1555913871803291300 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:51.807 UTC [policies] Evaluate -> DEBU 121f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:51.808 UTC [policies] Evaluate -> DEBU 1220 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:51.808 UTC [policies] Evaluate -> DEBU 1221 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:51.809 UTC [cauthdsl] func1 -> DEBU 1222 0xc00138cbf0 gate 1555913871809012200 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:51.809 UTC [cauthdsl] func2 -> DEBU 1223 0xc00138cbf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:51.809 UTC [cauthdsl] func2 -> DEBU 1224 0xc00138cbf0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:51.810 UTC [cauthdsl] func2 -> DEBU 1225 0xc00138cbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:51.811 UTC [cauthdsl] func2 -> DEBU 1226 0xc00138cbf0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:51.811 UTC [cauthdsl] func1 -> DEBU 1227 0xc00138cbf0 gate 1555913871809012200 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:51.811 UTC [policies] Evaluate -> DEBU 1228 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:51.812 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:51.812 UTC [policies] func1 -> DEBU 122a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:51.812 UTC [policies] Evaluate -> DEBU 122b Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:51.813 UTC [policies] Evaluate -> DEBU 122c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:51.813 UTC [policies] Evaluate -> DEBU 122d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:51.814 UTC [policies] Evaluate -> DEBU 122e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:51.814 UTC [policies] Evaluate -> DEBU 122f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:51.815 UTC [cauthdsl] func1 -> DEBU 1230 0xc00138d900 gate 1555913871814987800 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:51.815 UTC [cauthdsl] func2 -> DEBU 1231 0xc00138d900 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:51.815 UTC [cauthdsl] func2 -> DEBU 1232 0xc00138d900 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:51.824 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1233 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-04-22 06:17:51.824 UTC [msp] Validate -> DEBU 1234 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:17:51.825 UTC [cauthdsl] func2 -> DEBU 1235 0xc00138d900 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:51.825 UTC [msp.identity] Verify -> DEBU 1236 Verify: digest = 00000000 35 d2 88 0c f7 7a 9d cb 80 7a d6 72 ad a8 7c ee |5....z...z.r..|.| +orderer0.example.com | 00000010 94 6a 63 78 79 3c 72 b5 e8 9a 0f 8b 2b 7f ef e4 |.jcxy DEBU 1237 Verify: sig = 00000000 30 44 02 20 51 47 90 2e 92 68 e4 52 c7 34 38 d8 |0D. QG...h.R.48.| +orderer0.example.com | 00000010 fe 73 6c 6c 4f d7 f7 47 9a a2 66 8e a6 00 fc d4 |.sllO..G..f.....| +orderer0.example.com | 00000020 2c f9 fa 23 02 20 2d 58 cc 37 6a 91 93 f0 0d 0d |,..#. -X.7j.....| +orderer0.example.com | 00000030 cb 69 ce 64 64 52 31 a6 14 f6 22 85 70 50 b3 c8 |.i.ddR1...".pP..| +orderer0.example.com | 00000040 55 cf 50 d6 3d e9 |U.P.=.|" +orderer0.example.com | "2019-04-22 06:17:51.827 UTC [cauthdsl] func2 -> DEBU 1238 0xc00138d900 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:51.827 UTC [cauthdsl] func1 -> DEBU 1239 0xc00138d900 gate 1555913871814987800 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:51.828 UTC [policies] Evaluate -> DEBU 123a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:51.828 UTC [policies] Evaluate -> DEBU 123b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:51.829 UTC [policies] Evaluate -> DEBU 123c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:51.829 UTC [policies] Evaluate -> DEBU 123d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:51.829 UTC [policies] Evaluate -> DEBU 123e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:51.830 UTC [policies] Evaluate -> DEBU 123f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:51.830 UTC [common.deliver] deliverBlocks -> DEBU 1240 [channel: businesschannel] Received seekInfo (0xc0012b5c40) start: > stop: > from 192.168.224.9:34704" +orderer0.example.com | "2019-04-22 06:17:51.831 UTC [fsblkstorage] Next -> DEBU 1241 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:51.831 UTC [fsblkstorage] newBlockfileStream -> DEBU 1242 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +peer0.org1.example.com | "2019-04-22 06:16:51.923 UTC [gossip.gossip] func2 -> DEBU c6c Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-04-22 06:16:51.923 UTC [gossip.pull] HandleMessage -> DEBU c6d Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" +peer0.org1.example.com | "2019-04-22 06:16:51.923 UTC [gossip.gossip] handleMessage -> DEBU c6e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.063 UTC [gossip.gossip] handleMessage -> DEBU c6f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.063 UTC [gossip.pull] HandleMessage -> DEBU c70 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c71 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c72 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c73 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c74 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c75 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.064 UTC [msp] DeserializeIdentity -> DEBU c76 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.064 UTC [gossip.pull] SendDigest -> DEBU c77 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:52.064 UTC [gossip.gossip] handleMessage -> DEBU c78 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.078 UTC [gossip.gossip] handleMessage -> DEBU c79 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.078 UTC [gossip.gossip] handleMessage -> DEBU c7a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.078 UTC [gossip.discovery] handleMsgFromComm -> DEBU c7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.079 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c7c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:52.079 UTC [msp] DeserializeIdentity -> DEBU c7d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.081 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:52.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c7f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c80 Got reader policy for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-04-22 06:17:51.832 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1243 Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:51.832 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1244 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +orderer0.example.com | "2019-04-22 06:17:51.832 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1245 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:51.833 UTC [common.deliver] deliverBlocks -> DEBU 1246 [channel: businesschannel] Delivering block [8] for (0xc0012b5c40) for 192.168.224.9:34704" +orderer0.example.com | "2019-04-22 06:17:51.834 UTC [common.deliver] deliverBlocks -> DEBU 1247 [channel: businesschannel] Done delivering to 192.168.224.9:34704 for (0xc0012b5c40)" +orderer0.example.com | "2019-04-22 06:17:51.834 UTC [common.deliver] Handle -> DEBU 1248 Waiting for new SeekInfo from 192.168.224.9:34704" +orderer0.example.com | "2019-04-22 06:17:51.835 UTC [common.deliver] Handle -> DEBU 1249 Attempting to read seek info message from 192.168.224.9:34704" +orderer0.example.com | "2019-04-22 06:17:51.835 UTC [fsblkstorage] waitForBlock -> DEBU 124a Came out of wait. maxAvailaBlockNumber=[8]" +peer0.org1.example.com | "2019-04-22 06:16:52.081 UTC [policies] Evaluate -> DEBU c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.081 UTC [policies] Evaluate -> DEBU c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.082 UTC [policies] Evaluate -> DEBU c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.082 UTC [cauthdsl] func1 -> DEBU c84 0xc00359a650 gate 1555913812082284200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.091 UTC [cauthdsl] func2 -> DEBU c85 0xc00359a650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.091 UTC [cauthdsl] func2 -> DEBU c86 0xc00359a650 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.092 UTC [cauthdsl] func2 -> DEBU c87 0xc00359a650 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.092 UTC [msp.identity] Verify -> DEBU c88 Verify: digest = 00000000 2f 21 46 38 56 f6 f4 ed 06 c9 49 2e 0a 36 d2 d1 |/!F8V.....I..6..| +peer0.org1.example.com | 00000010 b4 67 a1 32 02 ef c2 cc 17 ff 37 0a 6f 1f 1b 42 |.g.2......7.o..B|" +peer0.org1.example.com | "2019-04-22 06:16:52.095 UTC [msp.identity] Verify -> DEBU c89 Verify: sig = 00000000 30 45 02 21 00 a3 25 64 63 f1 d5 6f fb 5d 61 9b |0E.!..%dc..o.]a.| +peer0.org1.example.com | 00000010 ae 55 35 d0 49 b8 af 5b 50 18 15 d9 30 55 b0 fd |.U5.I..[P...0U..| +peer0.org1.example.com | 00000020 3c 4c 10 34 7a 02 20 15 15 c2 ed 8c f7 0a 16 98 | DEBU c8a 0xc00359a650 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.095 UTC [cauthdsl] func1 -> DEBU c8b 0xc00359a650 gate 1555913812082284200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.095 UTC [policies] Evaluate -> DEBU c8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.098 UTC [policies] Evaluate -> DEBU c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.098 UTC [policies] Evaluate -> DEBU c8e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.099 UTC [policies] Evaluate -> DEBU c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.099 UTC [gossip.discovery] handleAliveMessage -> DEBU c90 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.099 UTC [gossip.discovery] learnExistingMembers -> DEBU c91 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:52.100 UTC [gossip.discovery] learnExistingMembers -> DEBU c92 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 " +peer0.org1.example.com | "2019-04-22 06:16:52.100 UTC [gossip.discovery] learnExistingMembers -> DEBU c93 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 " +peer0.org1.example.com | "2019-04-22 06:16:52.100 UTC [gossip.discovery] learnExistingMembers -> DEBU c94 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:52.101 UTC [gossip.discovery] learnExistingMembers -> DEBU c95 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.101 UTC [gossip.discovery] handleAliveMessage -> DEBU c96 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.103 UTC [gossip.discovery] handleMsgFromComm -> DEBU c97 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.103 UTC [gossip.gossip] handleMessage -> DEBU c98 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.104 UTC [gossip.gossip] handleMessage -> DEBU c99 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU c9a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c9b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:52.105 UTC [msp] DeserializeIdentity -> DEBU c9c Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:51.835 UTC [fsblkstorage] waitForBlock -> DEBU 124b Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:51.836 UTC [fsblkstorage] waitForBlock -> DEBU 124c Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:51.837 UTC [fsblkstorage] waitForBlock -> DEBU 124d Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:51.840 UTC [common.deliver] Handle -> WARN 124e Error reading from 192.168.224.9:34704: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:51.840 UTC [orderer.common.server] func1 -> DEBU 124f Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:51.840 UTC [comm.grpc.server] 1 -> INFO 1250 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34704 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.4084ms +orderer0.example.com | "2019-04-22 06:17:51.840 UTC [grpc] infof -> DEBU 1251 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:52.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1252 Sending msg of 28 bytes to 2 on channel businesschannel took 30.9µs" +orderer0.example.com | "2019-04-22 06:17:52.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1253 Sending msg of 28 bytes to 3 on channel businesschannel took 20.6µs" +orderer0.example.com | "2019-04-22 06:17:52.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1254 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.3µs " +orderer0.example.com | "2019-04-22 06:17:52.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1255 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.3µs " +orderer0.example.com | "2019-04-22 06:17:52.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1256 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:52.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1257 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:52.177 UTC [orderer.common.server] Deliver -> DEBU 1258 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:52.177 UTC [common.deliver] Handle -> DEBU 1259 Starting new deliver loop for 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.177 UTC [common.deliver] Handle -> DEBU 125a Attempting to read seek info message from 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [cauthdsl] func1 -> DEBU 1260 0xc001222720 gate 1555913872178370200 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [cauthdsl] func2 -> DEBU 1261 0xc001222720 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [cauthdsl] func2 -> DEBU 1262 0xc001222720 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.178 UTC [cauthdsl] func2 -> DEBU 1263 0xc001222720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.179 UTC [cauthdsl] func2 -> DEBU 1264 0xc001222720 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.179 UTC [cauthdsl] func1 -> DEBU 1265 0xc001222720 gate 1555913872178370200 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.179 UTC [policies] Evaluate -> DEBU 1266 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [policies] Evaluate -> DEBU 1267 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [policies] Evaluate -> DEBU 1268 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [cauthdsl] func1 -> DEBU 1269 0xc001222f60 gate 1555913872180512300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126a 0xc001222f60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126b 0xc001222f60 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126c 0xc001222f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126d 0xc001222f60 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [cauthdsl] func1 -> DEBU 126e 0xc001222f60 gate 1555913872180512300 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.180 UTC [policies] Evaluate -> DEBU 126f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1270 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.181 UTC [policies] func1 -> DEBU 1271 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1272 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1273 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.182 UTC [policies] Evaluate -> DEBU 1276 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.182 UTC [cauthdsl] func1 -> DEBU 1277 0xc001223e40 gate 1555913872182336700 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.182 UTC [cauthdsl] func2 -> DEBU 1278 0xc001223e40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.182 UTC [cauthdsl] func2 -> DEBU 1279 0xc001223e40 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.182 UTC [cauthdsl] func2 -> DEBU 127a 0xc001223e40 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:52.183 UTC [msp.identity] Verify -> DEBU 127b Verify: digest = 00000000 73 bc 62 1b f9 66 ba 0b 97 51 b4 54 2c 26 2b 0e |s.b..f...Q.T,&+.| +orderer0.example.com | 00000010 52 54 01 b3 e2 76 b6 6c 29 68 8c 74 d4 67 0e fb |RT...v.l)h.t.g..|" +orderer0.example.com | "2019-04-22 06:17:52.183 UTC [msp.identity] Verify -> DEBU 127c Verify: sig = 00000000 30 44 02 20 76 c7 fd 6a ee 0c 8a 50 72 63 97 b1 |0D. v..j...Prc..| +peer0.org1.example.com | "2019-04-22 06:16:52.106 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:52.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.107 UTC [policies] Evaluate -> DEBU ca0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.107 UTC [policies] Evaluate -> DEBU ca1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.107 UTC [msp] DeserializeIdentity -> DEBU ca2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.108 UTC [msp] DeserializeIdentity -> DEBU ca3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.108 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.109 UTC [msp] DeserializeIdentity -> DEBU ca5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.109 UTC [msp] DeserializeIdentity -> DEBU ca6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.110 UTC [msp] DeserializeIdentity -> DEBU ca7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.110 UTC [msp] DeserializeIdentity -> DEBU ca8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.111 UTC [gossip.comm] Send -> DEBU ca9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:52.111 UTC [msp] DeserializeIdentity -> DEBU caa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.111 UTC [gossip.comm] Send -> DEBU cab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU cac Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU cad Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU cae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU caf Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.113 UTC [gossip.comm] func1 -> DEBU cb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.113 UTC [gossip.gossip] handleMessage -> DEBU cb1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.107 UTC [policies] Evaluate -> DEBU cb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.114 UTC [cauthdsl] func1 -> DEBU cb3 0xc00371ac50 gate 1555913812114584700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.114 UTC [cauthdsl] func2 -> DEBU cb4 0xc00371ac50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.114 UTC [gossip.comm] func1 -> DEBU cb5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.115 UTC [cauthdsl] func2 -> DEBU cb6 0xc00371ac50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.117 UTC [cauthdsl] func2 -> DEBU cb7 0xc00371ac50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.117 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 bd 0b e1 d2 5c d0 f2 c1 1c 08 8f 57 9e 5c 24 2d |....\......W.\$-| +peer0.org1.example.com | 00000010 04 90 bc d8 18 36 70 e0 ce 55 c7 e6 d1 3d 70 2c |.....6p..U...=p,|" +peer0.org1.example.com | "2019-04-22 06:16:52.117 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 44 02 20 23 e4 b9 a0 c6 cb 10 14 e9 31 93 22 |0D. #........1."| +peer0.org1.example.com | 00000010 0f 0c 58 07 14 fe 60 db 59 bf 92 71 c9 15 4a 63 |..X...`.Y..q..Jc| +peer0.org1.example.com | 00000020 02 81 3a b9 02 20 0a e0 80 ef bb e5 ab e7 29 64 |..:.. ........)d| +peer0.org1.example.com | 00000030 7f 72 eb 85 5b 19 17 fe 20 41 dd 9e 8a 38 85 f4 |.r..[... A...8..| +peer0.org1.example.com | 00000040 fe 9a 6c 7f a4 f6 |..l...|" +peer0.org1.example.com | "2019-04-22 06:16:52.118 UTC [cauthdsl] func2 -> DEBU cba 0xc00371ac50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.118 UTC [cauthdsl] func1 -> DEBU cbb 0xc00371ac50 gate 1555913812114584700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.118 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.119 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.119 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.119 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.119 UTC [gossip.discovery] handleAliveMessage -> DEBU cc0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | 00000010 a5 33 c4 26 48 73 01 a4 07 cc ff 39 0b 48 9d 31 |.3.&Hs.....9.H.1| +orderer0.example.com | 00000020 9d 60 91 ed 02 20 78 6f 3a 95 24 65 92 fb 99 65 |.`... xo:.$e...e| +orderer0.example.com | 00000030 7c 08 e7 ec 9e 5a dd c0 4c 3e 57 f9 a0 42 af f2 ||....Z..L>W..B..| +orderer0.example.com | 00000040 3f 3e 6d 47 22 58 |?>mG"X|" +orderer0.example.com | "2019-04-22 06:17:52.183 UTC [cauthdsl] func2 -> DEBU 127d 0xc001223e40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:52.183 UTC [cauthdsl] func1 -> DEBU 127e 0xc001223e40 gate 1555913872182336700 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:52.184 UTC [policies] Evaluate -> DEBU 127f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.184 UTC [policies] Evaluate -> DEBU 1280 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.184 UTC [policies] Evaluate -> DEBU 1281 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.185 UTC [policies] Evaluate -> DEBU 1282 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.185 UTC [policies] Evaluate -> DEBU 1283 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.185 UTC [policies] Evaluate -> DEBU 1284 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.185 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Received seekInfo (0xc000dd6700) start: > stop: > from 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.185 UTC [fsblkstorage] Next -> DEBU 1286 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:52.185 UTC [fsblkstorage] newBlockfileStream -> DEBU 1287 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +orderer0.example.com | "2019-04-22 06:17:52.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1288 Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:52.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1289 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +orderer0.example.com | "2019-04-22 06:17:52.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 128a blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:52.186 UTC [common.deliver] deliverBlocks -> DEBU 128b [channel: businesschannel] Delivering block [8] for (0xc000dd6700) for 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.187 UTC [common.deliver] deliverBlocks -> DEBU 128c [channel: businesschannel] Done delivering to 192.168.224.9:34706 for (0xc000dd6700)" +orderer0.example.com | "2019-04-22 06:17:52.187 UTC [common.deliver] Handle -> DEBU 128d Waiting for new SeekInfo from 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.187 UTC [common.deliver] Handle -> DEBU 128e Attempting to read seek info message from 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 128f Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 1290 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 1291 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 1292 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1296 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [cauthdsl] func1 -> DEBU 1298 0xc000e7fef0 gate 1555913872189612900 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 1299 0xc000e7fef0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 129a 0xc000e7fef0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 129b 0xc000e7fef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 129c 0xc000e7fef0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [cauthdsl] func1 -> DEBU 129d 0xc000e7fef0 gate 1555913872189612900 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 129e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 12a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.189 UTC [cauthdsl] func1 -> DEBU 12a1 0xc000c2e8d0 gate 1555913872189958600 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a2 0xc000c2e8d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a3 0xc000c2e8d0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a4 0xc000c2e8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a5 0xc000c2e8d0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func1 -> DEBU 12a6 0xc000c2e8d0 gate 1555913872189958600 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12a7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] func1 -> DEBU 12a9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12aa Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ae == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func1 -> DEBU 12af 0xc000c2f5c0 gate 1555913872190471500 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b0 0xc000c2f5c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b1 0xc000c2f5c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b2 0xc000c2f5c0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [msp.identity] Verify -> DEBU 12b3 Verify: digest = 00000000 1d f5 f9 66 ff 1f a1 81 f8 de 62 4b 4f 76 45 e7 |...f......bKOvE.| +orderer0.example.com | 00000010 5b f5 b3 31 59 7c 8d e6 7a 83 49 17 90 8f ae 45 |[..1Y|..z.I....E|" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [msp.identity] Verify -> DEBU 12b4 Verify: sig = 00000000 30 45 02 21 00 e7 01 dd 71 b2 46 9a c2 ab 0e a5 |0E.!....q.F.....| +orderer0.example.com | 00000010 f1 c7 00 c1 b5 2d 65 08 94 34 a0 78 d4 85 33 23 |.....-e..4.x..3#| +orderer0.example.com | 00000020 c9 52 df 14 36 02 20 0d 08 0d 45 9b 6e db 12 b9 |.R..6. ...E.n...| +orderer0.example.com | 00000030 f0 8f 86 38 6a 56 95 d7 0b b9 ba 11 ef 2a 78 02 |...8jV.......*x.| +orderer0.example.com | 00000040 57 9b 05 35 31 e8 e1 |W..51..|" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b5 0xc000c2f5c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:52.190 UTC [cauthdsl] func1 -> DEBU 12b6 0xc000c2f5c0 gate 1555913872190471500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:52.191 UTC [policies] Evaluate -> DEBU 12b7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.191 UTC [policies] Evaluate -> DEBU 12b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.192 UTC [policies] Evaluate -> DEBU 12b9 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.192 UTC [policies] Evaluate -> DEBU 12ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.192 UTC [policies] Evaluate -> DEBU 12bb Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.193 UTC [policies] Evaluate -> DEBU 12bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.193 UTC [common.deliver] deliverBlocks -> DEBU 12bd [channel: businesschannel] Received seekInfo (0xc000a58340) start: > stop: > from 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.194 UTC [fsblkstorage] Next -> DEBU 12be Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:52.194 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47627]" +orderer0.example.com | "2019-04-22 06:17:52.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c0 Remaining bytes=[51039], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:52.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c1 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +orderer0.example.com | "2019-04-22 06:17:52.196 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c2 blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:52.196 UTC [common.deliver] deliverBlocks -> DEBU 12c3 [channel: businesschannel] Delivering block [2] for (0xc000a58340) for 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.197 UTC [common.deliver] deliverBlocks -> DEBU 12c4 [channel: businesschannel] Done delivering to 192.168.224.9:34706 for (0xc000a58340)" +orderer0.example.com | "2019-04-22 06:17:52.197 UTC [common.deliver] Handle -> DEBU 12c5 Waiting for new SeekInfo from 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.198 UTC [common.deliver] Handle -> DEBU 12c7 Attempting to read seek info message from 192.168.224.9:34706" +orderer0.example.com | "2019-04-22 06:17:52.197 UTC [fsblkstorage] waitForBlock -> DEBU 12c6 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.199 UTC [fsblkstorage] waitForBlock -> DEBU 12c8 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.202 UTC [fsblkstorage] waitForBlock -> DEBU 12c9 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.207 UTC [fsblkstorage] waitForBlock -> DEBU 12ca Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.207 UTC [common.deliver] Handle -> WARN 12cb Error reading from 192.168.224.9:34706: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:52.207 UTC [orderer.common.server] func1 -> DEBU 12cc Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:52.208 UTC [comm.grpc.server] 1 -> INFO 12cd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34706 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.8908ms +orderer0.example.com | "2019-04-22 06:17:52.207 UTC [grpc] infof -> DEBU 12ce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:52.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:52.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d0 Sending msg of 28 bytes to 3 on channel testchainid took 253.4µs" +orderer0.example.com | "2019-04-22 06:17:52.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 636.8µs " +orderer0.example.com | "2019-04-22 06:17:52.335 UTC [orderer.common.server] Deliver -> DEBU 12d2 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:52.336 UTC [common.deliver] Handle -> DEBU 12d3 Starting new deliver loop for 192.168.224.9:34708" +orderer0.example.com | "2019-04-22 06:17:52.336 UTC [common.deliver] Handle -> DEBU 12d4 Attempting to read seek info message from 192.168.224.9:34708" +orderer0.example.com | "2019-04-22 06:17:52.337 UTC [policies] Evaluate -> DEBU 12d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.338 UTC [policies] Evaluate -> DEBU 12d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.338 UTC [policies] Evaluate -> DEBU 12d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.338 UTC [policies] Evaluate -> DEBU 12d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.339 UTC [policies] Evaluate -> DEBU 12d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.339 UTC [cauthdsl] func1 -> DEBU 12da 0xc0011f4610 gate 1555913872339395400 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.339 UTC [cauthdsl] func2 -> DEBU 12db 0xc0011f4610 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.339 UTC [cauthdsl] func2 -> DEBU 12dc 0xc0011f4610 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.340 UTC [cauthdsl] func2 -> DEBU 12dd 0xc0011f4610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.340 UTC [cauthdsl] func2 -> DEBU 12de 0xc0011f4610 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.119 UTC [gossip.discovery] learnExistingMembers -> DEBU cc1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:52.120 UTC [gossip.discovery] learnExistingMembers -> DEBU cc2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 " +peer0.org1.example.com | "2019-04-22 06:16:52.120 UTC [gossip.discovery] learnExistingMembers -> DEBU cc3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 " +peer0.org1.example.com | "2019-04-22 06:16:52.120 UTC [gossip.discovery] learnExistingMembers -> DEBU cc4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:52.121 UTC [gossip.discovery] learnExistingMembers -> DEBU cc5 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.121 UTC [gossip.discovery] handleAliveMessage -> DEBU cc6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.122 UTC [gossip.discovery] sendMemResponse -> DEBU cc7 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:52.123 UTC [msp] DeserializeIdentity -> DEBU cc8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.123 UTC [msp] DeserializeIdentity -> DEBU cc9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.124 UTC [msp] DeserializeIdentity -> DEBU cca Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.124 UTC [gossip.comm] Send -> DEBU ccb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:52.125 UTC [gossip.discovery] sendMemResponse -> DEBU ccc Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:52.126 UTC [gossip.comm] sendToEndpoint -> DEBU ccd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.127 UTC [gossip.comm] sendToEndpoint -> DEBU cce Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU ccf Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.128 UTC [gossip.gossip] handleMessage -> DEBU cd0 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.129 UTC [gossip.gossip] handleMessage -> DEBU cd1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.131 UTC [gossip.gossip] handleMessage -> DEBU cd4 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.133 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.259 UTC [endorser] ProcessProposal -> DEBU cd7 Entering: request from 192.168.224.9:49230" +peer0.org1.example.com | "2019-04-22 06:16:52.260 UTC [protoutils] ValidateProposalMessage -> DEBU cd8 ValidateProposalMessage starts for signed proposal 0xc003357a40" +peer0.org1.example.com | "2019-04-22 06:16:52.260 UTC [protoutils] validateChannelHeader -> DEBU cd9 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:52.260 UTC [protoutils] checkSignatureFromCreator -> DEBU cda begin" +peer0.org1.example.com | "2019-04-22 06:16:52.261 UTC [protoutils] checkSignatureFromCreator -> DEBU cdb creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:52.261 UTC [protoutils] checkSignatureFromCreator -> DEBU cdc creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:52.261 UTC [msp.identity] Verify -> DEBU cdd Verify: digest = 00000000 ac 51 ee 5e 3a d8 3a 5b ad 83 05 73 e6 be 85 ec |.Q.^:.:[...s....| +peer0.org1.example.com | 00000010 9d 03 8c 50 b3 6e 9e 67 a8 58 f5 f5 87 fe 09 5f |...P.n.g.X....._|" +peer0.org1.example.com | "2019-04-22 06:16:52.262 UTC [msp.identity] Verify -> DEBU cde Verify: sig = 00000000 30 45 02 21 00 85 c5 b2 97 10 be 03 ff c4 8e 5d |0E.!...........]| +peer0.org1.example.com | 00000010 e0 ee a0 b2 b2 48 59 33 3e c1 00 b7 ce 84 79 8b |.....HY3>.....y.| +peer0.org1.example.com | 00000020 ee 13 49 a9 5b 02 20 5c e3 51 df fd c6 ba d6 5e |..I.[. \.Q.....^| +peer0.org1.example.com | 00000030 d9 f7 c7 15 3a b2 b3 45 6f 55 c4 fa 12 da 28 d1 |....:..EoU....(.| +peer0.org1.example.com | 00000040 92 1f 39 29 00 a3 54 |..9)..T|" +peer0.org1.example.com | "2019-04-22 06:16:52.262 UTC [protoutils] checkSignatureFromCreator -> DEBU cdf exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:52.262 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ce0 validateChaincodeProposalMessage starts for proposal 0xc002441880, header 0xc003357ea0" +peer0.org1.example.com | "2019-04-22 06:16:52.263 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ce1 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:52.263 UTC [endorser] preProcess -> DEBU ce2 [][e792347c] processing txid: e792347c429d95340d4ba3ad563c714ff7fa8ff4d989749dc66519df6c51c532" +peer0.org1.example.com | "2019-04-22 06:16:52.263 UTC [endorser] SimulateProposal -> DEBU ce3 [][e792347c] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:52.264 UTC [endorser] callChaincode -> INFO ce4 [][e792347c] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:52.264 UTC [chaincode] Execute -> DEBU ce5 Entry" +peer0.org1.example.com | "2019-04-22 06:16:52.264 UTC [msp.identity] Verify -> DEBU ce6 Verify: digest = 00000000 ac 51 ee 5e 3a d8 3a 5b ad 83 05 73 e6 be 85 ec |.Q.^:.:[...s....| +peer0.org1.example.com | 00000010 9d 03 8c 50 b3 6e 9e 67 a8 58 f5 f5 87 fe 09 5f |...P.n.g.X....._|" +peer0.org1.example.com | "2019-04-22 06:16:52.264 UTC [msp.identity] Verify -> DEBU ce7 Verify: sig = 00000000 30 45 02 21 00 85 c5 b2 97 10 be 03 ff c4 8e 5d |0E.!...........]| +peer0.org1.example.com | 00000010 e0 ee a0 b2 b2 48 59 33 3e c1 00 b7 ce 84 79 8b |.....HY3>.....y.| +peer0.org1.example.com | 00000020 ee 13 49 a9 5b 02 20 5c e3 51 df fd c6 ba d6 5e |..I.[. \.Q.....^| +peer0.org1.example.com | 00000030 d9 f7 c7 15 3a b2 b3 45 6f 55 c4 fa 12 da 28 d1 |....:..EoU....(.| +peer0.org1.example.com | 00000040 92 1f 39 29 00 a3 54 |..9)..T|" +peer0.org1.example.com | "2019-04-22 06:16:52.265 UTC [lifecycle] QueryInstalledChaincodes -> DEBU ce8 received invocation of QueryInstalledChaincodes" +peer0.org1.example.com | "2019-04-22 06:16:52.266 UTC [chaincode] handleMessage -> DEBU ce9 [e792347c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.266 UTC [chaincode] Notify -> DEBU cea [e792347c] notifying Txid:e792347c429d95340d4ba3ad563c714ff7fa8ff4d989749dc66519df6c51c532, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:52.266 UTC [chaincode] Execute -> DEBU ceb Exit" +peer0.org1.example.com | "2019-04-22 06:16:52.266 UTC [endorser] callChaincode -> INFO cec [][e792347c] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org1.example.com | "2019-04-22 06:16:52.267 UTC [endorser] SimulateProposal -> DEBU ced [][e792347c] Exit" +peer0.org1.example.com | "2019-04-22 06:16:52.267 UTC [endorser] func1 -> DEBU cee Exit: request from 192.168.224.9:49230" +peer0.org1.example.com | "2019-04-22 06:16:52.267 UTC [comm.grpc.server] 1 -> INFO cef unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49230 grpc.code=OK grpc.call_duration=7.9442ms +peer0.org1.example.com | "2019-04-22 06:16:52.271 UTC [grpc] infof -> DEBU cf0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:52.272 UTC [grpc] infof -> DEBU cf1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:52.421 UTC [endorser] ProcessProposal -> DEBU cf2 Entering: request from 192.168.224.9:49234" +peer0.org1.example.com | "2019-04-22 06:16:52.421 UTC [protoutils] ValidateProposalMessage -> DEBU cf3 ValidateProposalMessage starts for signed proposal 0xc003240a50" +peer0.org1.example.com | "2019-04-22 06:16:52.422 UTC [protoutils] validateChannelHeader -> DEBU cf4 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-04-22 06:16:52.422 UTC [protoutils] checkSignatureFromCreator -> DEBU cf5 begin" +peer0.org1.example.com | "2019-04-22 06:16:52.422 UTC [protoutils] checkSignatureFromCreator -> DEBU cf6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:52.423 UTC [protoutils] checkSignatureFromCreator -> DEBU cf7 creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:52.423 UTC [msp.identity] Verify -> DEBU cf8 Verify: digest = 00000000 66 ef 7b c6 04 88 fa 46 b9 f0 fd 0c fd 11 ce 08 |f.{....F........| +peer0.org1.example.com | 00000010 2f 89 ea 0d 36 db fd 3d d8 95 b0 a6 b2 04 fb 70 |/...6..=.......p|" +peer0.org1.example.com | "2019-04-22 06:16:52.423 UTC [msp.identity] Verify -> DEBU cf9 Verify: sig = 00000000 30 44 02 20 49 bd c4 2c e1 c9 fe 78 3a 45 2d f1 |0D. I..,...x:E-.| +peer0.org1.example.com | 00000010 87 f3 bb 0e bd fe be be ce f2 bc 51 af fd 0d d0 |...........Q....| +peer0.org1.example.com | 00000020 01 ab 7d 5b 02 20 2c 5e 7f d7 6a 3e 19 03 7f 9e |..}[. ,^..j>....| +peer0.org1.example.com | 00000030 d0 0e 92 a9 83 6c 94 82 7c 69 09 7e 85 1d 45 53 |.....l..|i.~..ES| +peer0.org1.example.com | 00000040 c5 d2 bd 9f 63 5c |....c\|" +peer0.org1.example.com | "2019-04-22 06:16:52.424 UTC [protoutils] checkSignatureFromCreator -> DEBU cfa exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:52.424 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfb validateChaincodeProposalMessage starts for proposal 0xc002608620, header 0xc003240e60" +peer0.org1.example.com | "2019-04-22 06:16:52.424 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfc validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:52.424 UTC [endorser] preProcess -> DEBU cfd [][a217c702] processing txid: a217c702ad3a7b912c47d54f7e2dcf75896e45a71d4bd010d86666ceca6bde36" +peer0.org1.example.com | "2019-04-22 06:16:52.424 UTC [endorser] SimulateProposal -> DEBU cfe [][a217c702] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:52.425 UTC [endorser] callChaincode -> INFO cff [][a217c702] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:16:52.425 UTC [chaincode] Execute -> DEBU d00 Entry" +peer0.org1.example.com | "2019-04-22 06:16:52.426 UTC [cscc] Invoke -> DEBU d01 Invoke function: GetConfigBlock" +peer0.org1.example.com | "2019-04-22 06:16:52.426 UTC [aclmgmt] CheckACL -> DEBU d02 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +peer0.org1.example.com | "2019-04-22 06:16:52.426 UTC [aclmgmt] CheckACL -> DEBU d03 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:16:52.426 UTC [policies] Evaluate -> DEBU d04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.426 UTC [policies] Evaluate -> DEBU d05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.426 UTC [policies] Evaluate -> DEBU d06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.427 UTC [msp] DeserializeIdentity -> DEBU d07 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.427 UTC [msp.identity] newIdentity -> DEBU d08 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:52.428 UTC [cauthdsl] func1 -> DEBU d09 0xc00299d630 gate 1555913812428324500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.428 UTC [cauthdsl] func2 -> DEBU d0a 0xc00299d630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.428 UTC [cauthdsl] func2 -> DEBU d0b 0xc00299d630 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.429 UTC [cauthdsl] func2 -> DEBU d0c 0xc00299d630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:52.429 UTC [cauthdsl] func2 -> DEBU d0d 0xc00299d630 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.429 UTC [cauthdsl] func1 -> DEBU d0e 0xc00299d630 gate 1555913812428324500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.429 UTC [policies] Evaluate -> DEBU d0f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.429 UTC [policies] Evaluate -> DEBU d10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.430 UTC [policies] Evaluate -> DEBU d11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.430 UTC [cauthdsl] func1 -> DEBU d12 0xc0005147b0 gate 1555913812430838500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.431 UTC [cauthdsl] func2 -> DEBU d13 0xc0005147b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.431 UTC [cauthdsl] func2 -> DEBU d14 0xc0005147b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.431 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d15 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:52.431 UTC [msp] Validate -> DEBU d16 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:52.432 UTC [msp] getCertificationChain -> DEBU d17 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:52.433 UTC [cauthdsl] func2 -> DEBU d18 0xc0005147b0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:52.340 UTC [cauthdsl] func1 -> DEBU 12df 0xc0011f4610 gate 1555913872339395400 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.341 UTC [policies] Evaluate -> DEBU 12e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.341 UTC [policies] Evaluate -> DEBU 12e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.341 UTC [policies] Evaluate -> DEBU 12e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.342 UTC [cauthdsl] func1 -> DEBU 12e3 0xc0011f4f70 gate 1555913872342486100 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.342 UTC [cauthdsl] func2 -> DEBU 12e4 0xc0011f4f70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.343 UTC [cauthdsl] func2 -> DEBU 12e5 0xc0011f4f70 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.343 UTC [cauthdsl] func2 -> DEBU 12e6 0xc0011f4f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.344 UTC [cauthdsl] func2 -> DEBU 12e7 0xc0011f4f70 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.344 UTC [cauthdsl] func1 -> DEBU 12e8 0xc0011f4f70 gate 1555913872342486100 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.345 UTC [policies] Evaluate -> DEBU 12e9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.345 UTC [policies] Evaluate -> DEBU 12ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.345 UTC [policies] func1 -> DEBU 12eb Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:52.346 UTC [policies] Evaluate -> DEBU 12ec Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.346 UTC [policies] Evaluate -> DEBU 12ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.346 UTC [policies] Evaluate -> DEBU 12ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.347 UTC [policies] Evaluate -> DEBU 12ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.347 UTC [policies] Evaluate -> DEBU 12f0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.347 UTC [cauthdsl] func1 -> DEBU 12f1 0xc0011f5c60 gate 1555913872347464900 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.347 UTC [cauthdsl] func2 -> DEBU 12f2 0xc0011f5c60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.348 UTC [cauthdsl] func2 -> DEBU 12f3 0xc0011f5c60 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.348 UTC [cauthdsl] func2 -> DEBU 12f4 0xc0011f5c60 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:52.348 UTC [msp.identity] Verify -> DEBU 12f5 Verify: digest = 00000000 4e 38 d5 a5 0b c5 a2 84 ff 2b 62 71 29 a4 18 58 |N8.......+bq)..X| +orderer0.example.com | 00000010 f7 53 7e 2e 8c e9 d6 a6 39 6f b7 a1 4e 87 42 92 |.S~.....9o..N.B.|" +orderer0.example.com | "2019-04-22 06:17:52.349 UTC [msp.identity] Verify -> DEBU 12f6 Verify: sig = 00000000 30 44 02 20 5c d2 f4 4c e2 46 bd 19 a4 5a f5 65 |0D. \..L.F...Z.e| +orderer0.example.com | 00000010 33 4b ac 9b f4 75 1a 16 8f 89 b9 1d 35 81 5c 45 |3K...u......5.\E| +orderer0.example.com | 00000020 63 84 c3 6e 02 20 7e fb 4c 08 6c ce 40 f1 c3 34 |c..n. ~.L.l.@..4| +orderer0.example.com | 00000030 dc 1b 9e bb 47 b9 ec 7d 3b eb 28 e4 56 27 9a 13 |....G..};.(.V'..| +orderer0.example.com | 00000040 11 a8 35 fe 97 40 |..5..@|" +orderer0.example.com | "2019-04-22 06:17:52.349 UTC [cauthdsl] func2 -> DEBU 12f7 0xc0011f5c60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:52.349 UTC [cauthdsl] func1 -> DEBU 12f8 0xc0011f5c60 gate 1555913872347464900 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12f9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12fa == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12fb Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.351 UTC [policies] Evaluate -> DEBU 12fd Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.351 UTC [policies] Evaluate -> DEBU 12fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.351 UTC [common.deliver] deliverBlocks -> DEBU 12ff [channel: businesschannel] Received seekInfo (0xc000dd7140) start: > stop: > from 192.168.224.9:34708" +orderer0.example.com | "2019-04-22 06:17:52.352 UTC [fsblkstorage] Next -> DEBU 1300 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:52.352 UTC [fsblkstorage] newBlockfileStream -> DEBU 1301 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:17:52.352 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1302 Remaining bytes=[98666], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:52.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1303 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:17:52.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1304 blockbytes [23937] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:52.353 UTC [common.deliver] deliverBlocks -> DEBU 1305 [channel: businesschannel] Delivering block [0] for (0xc000dd7140) for 192.168.224.9:34708" +orderer0.example.com | "2019-04-22 06:17:52.354 UTC [common.deliver] deliverBlocks -> DEBU 1306 [channel: businesschannel] Done delivering to 192.168.224.9:34708 for (0xc000dd7140)" +orderer0.example.com | "2019-04-22 06:17:52.354 UTC [fsblkstorage] waitForBlock -> DEBU 1307 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.354 UTC [fsblkstorage] waitForBlock -> DEBU 1308 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.354 UTC [fsblkstorage] waitForBlock -> DEBU 1309 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.355 UTC [fsblkstorage] waitForBlock -> DEBU 130a Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.355 UTC [common.deliver] Handle -> DEBU 130b Waiting for new SeekInfo from 192.168.224.9:34708" +orderer0.example.com | "2019-04-22 06:17:52.355 UTC [common.deliver] Handle -> DEBU 130c Attempting to read seek info message from 192.168.224.9:34708" +orderer0.example.com | "2019-04-22 06:17:52.367 UTC [grpc] infof -> DEBU 130d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:52.368 UTC [common.deliver] Handle -> WARN 130e Error reading from 192.168.224.9:34708: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:52.368 UTC [orderer.common.server] func1 -> DEBU 130f Closing Deliver stream" +peer0.org1.example.com | "2019-04-22 06:16:52.433 UTC [msp.identity] Verify -> DEBU d19 Verify: digest = 00000000 66 ef 7b c6 04 88 fa 46 b9 f0 fd 0c fd 11 ce 08 |f.{....F........| +peer0.org1.example.com | 00000010 2f 89 ea 0d 36 db fd 3d d8 95 b0 a6 b2 04 fb 70 |/...6..=.......p|" +peer0.org1.example.com | "2019-04-22 06:16:52.433 UTC [msp.identity] Verify -> DEBU d1a Verify: sig = 00000000 30 44 02 20 49 bd c4 2c e1 c9 fe 78 3a 45 2d f1 |0D. I..,...x:E-.| +peer0.org1.example.com | 00000010 87 f3 bb 0e bd fe be be ce f2 bc 51 af fd 0d d0 |...........Q....| +peer0.org1.example.com | 00000020 01 ab 7d 5b 02 20 2c 5e 7f d7 6a 3e 19 03 7f 9e |..}[. ,^..j>....| +peer0.org1.example.com | 00000030 d0 0e 92 a9 83 6c 94 82 7c 69 09 7e 85 1d 45 53 |.....l..|i.~..ES| +peer0.org1.example.com | 00000040 c5 d2 bd 9f 63 5c |....c\|" +peer0.org1.example.com | "2019-04-22 06:16:52.434 UTC [cauthdsl] func2 -> DEBU d1b 0xc0005147b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.434 UTC [cauthdsl] func1 -> DEBU d1c 0xc0005147b0 gate 1555913812430838500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d1d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d1f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.435 UTC [chaincode] handleMessage -> DEBU d21 [a217c702] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.435 UTC [chaincode] Notify -> DEBU d22 [a217c702] notifying Txid:a217c702ad3a7b912c47d54f7e2dcf75896e45a71d4bd010d86666ceca6bde36, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:52.435 UTC [chaincode] Execute -> DEBU d23 Exit" +peer0.org1.example.com | "2019-04-22 06:16:52.436 UTC [endorser] callChaincode -> INFO d24 [][a217c702] Exit chaincode: name:"cscc" (11ms)" +peer0.org1.example.com | "2019-04-22 06:16:52.436 UTC [endorser] SimulateProposal -> DEBU d25 [][a217c702] Exit" +peer0.org1.example.com | "2019-04-22 06:16:52.437 UTC [endorser] func1 -> DEBU d26 Exit: request from 192.168.224.9:49234" +peer0.org1.example.com | "2019-04-22 06:16:52.437 UTC [comm.grpc.server] 1 -> INFO d27 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49234 grpc.code=OK grpc.call_duration=15.7761ms +peer0.org1.example.com | "2019-04-22 06:16:52.455 UTC [msp] DeserializeIdentity -> DEBU d28 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.457 UTC [msp] DeserializeIdentity -> DEBU d29 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.457 UTC [gossip.comm] Send -> DEBU d2a Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:16:52.457 UTC [gossip.comm] sendToEndpoint -> DEBU d2b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.458 UTC [gossip.comm] sendToEndpoint -> DEBU d2c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.458 UTC [gossip.comm] sendToEndpoint -> DEBU d2d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.459 UTC [gossip.comm] sendToEndpoint -> DEBU d2e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.459 UTC [gossip.comm] sendToEndpoint -> DEBU d2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.459 UTC [gossip.comm] sendToEndpoint -> DEBU d30 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.462 UTC [gossip.comm] func1 -> DEBU d31 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.462 UTC [gossip.gossip] handleMessage -> DEBU d32 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.463 UTC [msp.identity] Verify -> DEBU d33 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +peer0.org1.example.com | "2019-04-22 06:16:52.463 UTC [msp.identity] Verify -> DEBU d34 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:52.463 UTC [msp.identity] Verify -> DEBU d35 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:52.464 UTC [msp.identity] Verify -> DEBU d36 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:52.465 UTC [msp] DeserializeIdentity -> DEBU d37 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.465 UTC [msp] DeserializeIdentity -> DEBU d38 Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:52.369 UTC [comm.grpc.server] 1 -> INFO 1310 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34708 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5733ms +orderer0.example.com | "2019-04-22 06:17:52.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1311 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2019-04-22 06:17:52.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1312 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-04-22 06:17:52.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1313 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 508.2µs " +orderer0.example.com | "2019-04-22 06:17:52.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1314 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1322ms " +orderer0.example.com | "2019-04-22 06:17:52.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1315 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:52.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1316 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:52.616 UTC [orderer.common.server] Deliver -> DEBU 1317 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:52.616 UTC [common.deliver] Handle -> DEBU 1318 Starting new deliver loop for 192.168.224.9:34710" +orderer0.example.com | "2019-04-22 06:17:52.616 UTC [common.deliver] Handle -> DEBU 1319 Attempting to read seek info message from 192.168.224.9:34710" +orderer0.example.com | "2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.617 UTC [policies] Evaluate -> DEBU 131e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.617 UTC [cauthdsl] func1 -> DEBU 131f 0xc000dd83e0 gate 1555913872617627700 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1320 0xc000dd83e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1321 0xc000dd83e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1322 0xc000dd83e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1323 0xc000dd83e0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.618 UTC [cauthdsl] func1 -> DEBU 1324 0xc000dd83e0 gate 1555913872617627700 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.619 UTC [policies] Evaluate -> DEBU 1325 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.619 UTC [policies] Evaluate -> DEBU 1326 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.619 UTC [policies] Evaluate -> DEBU 1327 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.619 UTC [cauthdsl] func1 -> DEBU 1328 0xc000dd8d30 gate 1555913872619849300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.619 UTC [cauthdsl] func2 -> DEBU 1329 0xc000dd8d30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.619 UTC [cauthdsl] func2 -> DEBU 132a 0xc000dd8d30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.619 UTC [cauthdsl] func2 -> DEBU 132b 0xc000dd8d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.620 UTC [cauthdsl] func2 -> DEBU 132c 0xc000dd8d30 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.620 UTC [cauthdsl] func1 -> DEBU 132d 0xc000dd8d30 gate 1555913872619849300 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.620 UTC [policies] Evaluate -> DEBU 132e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.620 UTC [policies] Evaluate -> DEBU 132f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.620 UTC [policies] func1 -> DEBU 1330 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:52.621 UTC [policies] Evaluate -> DEBU 1331 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.621 UTC [policies] Evaluate -> DEBU 1332 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.621 UTC [policies] Evaluate -> DEBU 1333 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.622 UTC [policies] Evaluate -> DEBU 1334 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.622 UTC [policies] Evaluate -> DEBU 1335 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.622 UTC [cauthdsl] func1 -> DEBU 1336 0xc000dd9b10 gate 1555913872622810200 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.623 UTC [cauthdsl] func2 -> DEBU 1337 0xc000dd9b10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.623 UTC [cauthdsl] func2 -> DEBU 1338 0xc000dd9b10 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.623 UTC [cauthdsl] func2 -> DEBU 1339 0xc000dd9b10 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:52.623 UTC [msp.identity] Verify -> DEBU 133a Verify: digest = 00000000 f6 98 b2 8b 7d 72 e5 87 20 4a 67 62 3f 31 b2 54 |....}r.. Jgb?1.T| +orderer0.example.com | 00000010 1b d3 d8 ea cb 62 a9 cb a8 92 1c 96 65 83 44 7a |.....b......e.Dz|" +orderer0.example.com | "2019-04-22 06:17:52.623 UTC [msp.identity] Verify -> DEBU 133b Verify: sig = 00000000 30 45 02 21 00 89 68 cc 63 a8 42 dc 9c 0c db bc |0E.!..h.c.B.....| +orderer0.example.com | 00000010 45 fe ef 28 15 4a 08 34 bd 28 1f 39 83 ec 6b f9 |E..(.J.4.(.9..k.| +orderer0.example.com | 00000020 a7 d1 fc 5a ac 02 20 7d 3d 39 e1 4f 02 e7 b3 88 |...Z.. }=9.O....| +orderer0.example.com | 00000030 97 f7 12 24 33 c3 49 6b 6b 60 45 a6 1c e1 2a 35 |...$3.Ikk`E...*5| +orderer0.example.com | 00000040 87 6d b2 09 be a8 8e |.m.....|" +orderer0.example.com | "2019-04-22 06:17:52.624 UTC [cauthdsl] func2 -> DEBU 133c 0xc000dd9b10 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:52.624 UTC [cauthdsl] func1 -> DEBU 133d 0xc000dd9b10 gate 1555913872622810200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:52.624 UTC [policies] Evaluate -> DEBU 133e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.624 UTC [policies] Evaluate -> DEBU 133f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.624 UTC [policies] Evaluate -> DEBU 1340 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.625 UTC [policies] Evaluate -> DEBU 1341 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.625 UTC [policies] Evaluate -> DEBU 1342 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.625 UTC [policies] Evaluate -> DEBU 1343 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.625 UTC [common.deliver] deliverBlocks -> DEBU 1344 [channel: businesschannel] Received seekInfo (0xc0011d82c0) start: > stop: > from 192.168.224.9:34710" +orderer0.example.com | "2019-04-22 06:17:52.626 UTC [fsblkstorage] Next -> DEBU 1345 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:52.626 UTC [fsblkstorage] newBlockfileStream -> DEBU 1346 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +orderer0.example.com | "2019-04-22 06:17:52.626 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1347 Remaining bytes=[74726], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:52.627 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1348 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +orderer0.example.com | "2019-04-22 06:17:52.627 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1349 blockbytes [23684] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:52.627 UTC [common.deliver] deliverBlocks -> DEBU 134a [channel: businesschannel] Delivering block [1] for (0xc0011d82c0) for 192.168.224.9:34710" +orderer0.example.com | "2019-04-22 06:17:52.627 UTC [common.deliver] deliverBlocks -> DEBU 134b [channel: businesschannel] Done delivering to 192.168.224.9:34710 for (0xc0011d82c0)" +orderer0.example.com | "2019-04-22 06:17:52.628 UTC [common.deliver] Handle -> DEBU 134c Waiting for new SeekInfo from 192.168.224.9:34710" +orderer0.example.com | "2019-04-22 06:17:52.628 UTC [common.deliver] Handle -> DEBU 134d Attempting to read seek info message from 192.168.224.9:34710" +orderer0.example.com | "2019-04-22 06:17:52.628 UTC [fsblkstorage] waitForBlock -> DEBU 134e Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.630 UTC [fsblkstorage] waitForBlock -> DEBU 134f Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.630 UTC [fsblkstorage] waitForBlock -> DEBU 1350 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.630 UTC [fsblkstorage] waitForBlock -> DEBU 1351 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.636 UTC [common.deliver] Handle -> WARN 1352 Error reading from 192.168.224.9:34710: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:52.636 UTC [orderer.common.server] func1 -> DEBU 1353 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:52.636 UTC [comm.grpc.server] 1 -> INFO 1354 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34710 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.8044ms +orderer0.example.com | "2019-04-22 06:17:52.636 UTC [grpc] infof -> DEBU 1355 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:52.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1356 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:52.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1357 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +orderer0.example.com | "2019-04-22 06:17:52.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1358 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +orderer0.example.com | "2019-04-22 06:17:52.829 UTC [orderer.common.server] Deliver -> DEBU 1359 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:52.829 UTC [common.deliver] Handle -> DEBU 135a Starting new deliver loop for 192.168.224.9:34712" +orderer0.example.com | "2019-04-22 06:17:52.829 UTC [common.deliver] Handle -> DEBU 135b Attempting to read seek info message from 192.168.224.9:34712" +orderer0.example.com | "2019-04-22 06:17:52.829 UTC [policies] Evaluate -> DEBU 135c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 135d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 135e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 135f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 1360 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [cauthdsl] func1 -> DEBU 1361 0xc000ea4930 gate 1555913872830419900 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [cauthdsl] func2 -> DEBU 1362 0xc000ea4930 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [cauthdsl] func2 -> DEBU 1363 0xc000ea4930 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.830 UTC [cauthdsl] func2 -> DEBU 1364 0xc000ea4930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.831 UTC [cauthdsl] func2 -> DEBU 1365 0xc000ea4930 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.831 UTC [cauthdsl] func1 -> DEBU 1366 0xc000ea4930 gate 1555913872830419900 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.831 UTC [policies] Evaluate -> DEBU 1367 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.831 UTC [policies] Evaluate -> DEBU 1368 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.831 UTC [policies] Evaluate -> DEBU 1369 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.832 UTC [cauthdsl] func1 -> DEBU 136a 0xc000ea5230 gate 1555913872831930700 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136b 0xc000ea5230 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136c 0xc000ea5230 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136d 0xc000ea5230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136e 0xc000ea5230 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.832 UTC [cauthdsl] func1 -> DEBU 136f 0xc000ea5230 gate 1555913872831930700 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:52.832 UTC [policies] Evaluate -> DEBU 1370 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1371 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:52.833 UTC [policies] func1 -> DEBU 1372 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +peer0.org1.example.com | "2019-04-22 06:16:52.466 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:52.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d3a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d3b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.467 UTC [policies] Evaluate -> DEBU d3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.467 UTC [policies] Evaluate -> DEBU d3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.467 UTC [policies] Evaluate -> DEBU d3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.468 UTC [cauthdsl] func1 -> DEBU d3f 0xc000246ec0 gate 1555913812468919500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.469 UTC [cauthdsl] func2 -> DEBU d40 0xc000246ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.469 UTC [cauthdsl] func2 -> DEBU d41 0xc000246ec0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.469 UTC [cauthdsl] func2 -> DEBU d42 0xc000246ec0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.470 UTC [msp.identity] Verify -> DEBU d43 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:52.471 UTC [msp.identity] Verify -> DEBU d44 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:52.472 UTC [cauthdsl] func2 -> DEBU d45 0xc000246ec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.472 UTC [cauthdsl] func1 -> DEBU d46 0xc000246ec0 gate 1555913812468919500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.472 UTC [policies] Evaluate -> DEBU d47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.472 UTC [policies] Evaluate -> DEBU d48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.473 UTC [policies] Evaluate -> DEBU d49 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.473 UTC [policies] Evaluate -> DEBU d4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.474 UTC [gossip.gossip] handleMessage -> DEBU d4b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.475 UTC [gossip.gossip] handleMessage -> DEBU d4c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.475 UTC [msp] DeserializeIdentity -> DEBU d4d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.477 UTC [msp] DeserializeIdentity -> DEBU d4e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.478 UTC [msp] DeserializeIdentity -> DEBU d4f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.480 UTC [gossip.pull] Hello -> DEBU d51 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:52.481 UTC [msp] DeserializeIdentity -> DEBU d52 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.481 UTC [msp] DeserializeIdentity -> DEBU d53 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.481 UTC [gossip.comm] Send -> DEBU d54 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:52.482 UTC [gossip.comm] sendToEndpoint -> DEBU d55 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.482 UTC [gossip.comm] sendToEndpoint -> DEBU d56 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.479 UTC [gossip.comm] func1 -> DEBU d50 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.484 UTC [msp] DeserializeIdentity -> DEBU d57 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.484 UTC [gossip.comm] func1 -> DEBU d58 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3323425233133937166 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.485 UTC [msp] DeserializeIdentity -> DEBU d59 Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1373 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1374 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1375 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1376 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:52.834 UTC [policies] Evaluate -> DEBU 1377 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:52.834 UTC [cauthdsl] func1 -> DEBU 1378 0xc000ea5f20 gate 1555913872834437200 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:52.834 UTC [cauthdsl] func2 -> DEBU 1379 0xc000ea5f20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:52.834 UTC [cauthdsl] func2 -> DEBU 137a 0xc000ea5f20 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:52.834 UTC [cauthdsl] func2 -> DEBU 137b 0xc000ea5f20 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:52.834 UTC [msp.identity] Verify -> DEBU 137c Verify: digest = 00000000 3c 1e 3c cf d8 96 cb 84 45 19 11 86 22 9b 11 27 |<.<.....E..."..'| +orderer0.example.com | 00000010 ef eb 74 d3 30 d3 54 38 2d 01 e2 6b 4e 3b 42 4c |..t.0.T8-..kN;BL|" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [msp.identity] Verify -> DEBU 137d Verify: sig = 00000000 30 44 02 20 29 89 73 33 cd 99 c8 da e4 ce d5 42 |0D. ).s3.......B| +orderer0.example.com | 00000010 ce 2b 2c b6 05 a0 4a 9e e6 73 62 10 6c cd 41 27 |.+,...J..sb.l.A'| +orderer0.example.com | 00000020 3b 6d db ef 02 20 2f 0f 07 78 7a 1f 53 6c 80 54 |;m... /..xz.Sl.T| +orderer0.example.com | 00000030 5a 7d f3 2c 82 ad 08 ef e2 db 94 3a cb 89 6b a0 |Z}.,.......:..k.| +orderer0.example.com | 00000040 90 c5 11 03 a2 69 |.....i|" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [cauthdsl] func2 -> DEBU 137e 0xc000ea5f20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [cauthdsl] func1 -> DEBU 137f 0xc000ea5f20 gate 1555913872834437200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1380 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1381 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1382 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1383 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1384 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1385 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:52.836 UTC [common.deliver] deliverBlocks -> DEBU 1386 [channel: businesschannel] Received seekInfo (0xc0011d8bc0) start: > stop: > from 192.168.224.9:34712" +orderer0.example.com | "2019-04-22 06:17:52.836 UTC [fsblkstorage] Next -> DEBU 1387 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:52.836 UTC [fsblkstorage] newBlockfileStream -> DEBU 1388 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47627]" +orderer0.example.com | "2019-04-22 06:17:52.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1389 Remaining bytes=[51039], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:52.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 138a Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +orderer0.example.com | "2019-04-22 06:17:52.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 138b blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [common.deliver] deliverBlocks -> DEBU 138c [channel: businesschannel] Delivering block [2] for (0xc0011d8bc0) for 192.168.224.9:34712" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [common.deliver] deliverBlocks -> DEBU 138d [channel: businesschannel] Done delivering to 192.168.224.9:34712 for (0xc0011d8bc0)" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [common.deliver] Handle -> DEBU 138e Waiting for new SeekInfo from 192.168.224.9:34712" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [common.deliver] Handle -> DEBU 138f Attempting to read seek info message from 192.168.224.9:34712" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1390 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1391 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1392 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1393 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:52.845 UTC [common.deliver] Handle -> WARN 1394 Error reading from 192.168.224.9:34712: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:52.846 UTC [orderer.common.server] func1 -> DEBU 1395 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:52.846 UTC [comm.grpc.server] 1 -> INFO 1396 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34712 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.978ms +orderer0.example.com | "2019-04-22 06:17:52.850 UTC [grpc] infof -> DEBU 1397 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:53.071 UTC [orderer.common.server] Deliver -> DEBU 1398 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:53.071 UTC [common.deliver] Handle -> DEBU 1399 Starting new deliver loop for 192.168.224.9:34714" +orderer0.example.com | "2019-04-22 06:17:53.071 UTC [common.deliver] Handle -> DEBU 139a Attempting to read seek info message from 192.168.224.9:34714" +orderer0.example.com | "2019-04-22 06:17:53.072 UTC [policies] Evaluate -> DEBU 139b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.074 UTC [cauthdsl] func1 -> DEBU 13a0 0xc000d28aa0 gate 1555913873074356300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:52.487 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d5b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d5c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.488 UTC [policies] Evaluate -> DEBU d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.490 UTC [endorser] ProcessProposal -> DEBU d5e Entering: request from 192.168.224.9:49234" +peer0.org1.example.com | "2019-04-22 06:16:52.490 UTC [protoutils] ValidateProposalMessage -> DEBU d5f ValidateProposalMessage starts for signed proposal 0xc000244c30" +peer0.org1.example.com | "2019-04-22 06:16:52.490 UTC [protoutils] validateChannelHeader -> DEBU d60 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:52.491 UTC [protoutils] checkSignatureFromCreator -> DEBU d61 begin" +peer0.org1.example.com | "2019-04-22 06:16:52.491 UTC [msp] GetManagerForChain -> DEBU d62 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:52.491 UTC [protoutils] checkSignatureFromCreator -> DEBU d63 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:52.492 UTC [msp] Validate -> DEBU d64 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:52.493 UTC [msp] getCertificationChain -> DEBU d65 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:52.493 UTC [protoutils] checkSignatureFromCreator -> DEBU d66 creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:52.493 UTC [msp.identity] Verify -> DEBU d67 Verify: digest = 00000000 15 d1 14 43 8a c4 6e c4 55 09 03 11 c9 04 c4 51 |...C..n.U......Q| +peer0.org1.example.com | 00000010 e3 2c 87 d4 44 37 cd c2 89 ce a0 a4 61 29 31 e6 |.,..D7......a)1.|" +peer0.org1.example.com | "2019-04-22 06:16:52.493 UTC [msp.identity] Verify -> DEBU d68 Verify: sig = 00000000 30 45 02 21 00 b7 88 e6 08 2c 1f fb 28 c8 79 37 |0E.!.....,..(.y7| +peer0.org1.example.com | 00000010 8d 06 77 b2 10 fa 24 d5 12 75 ff fa de ef fe 15 |..w...$..u......| +peer0.org1.example.com | 00000020 80 5f c7 12 57 02 20 16 48 a9 79 b7 3e 90 f1 c8 |._..W. .H.y.>...| +peer0.org1.example.com | 00000030 02 e6 bf e7 85 8f b2 2a 32 6f 6c ef 42 89 7f 7e |.......*2ol.B..~| +peer0.org1.example.com | 00000040 6e 26 01 d4 3b 3b 3f |n&..;;?|" +peer0.org1.example.com | "2019-04-22 06:16:52.489 UTC [policies] Evaluate -> DEBU d69 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.494 UTC [policies] Evaluate -> DEBU d6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.494 UTC [cauthdsl] func1 -> DEBU d6b 0xc0023a9900 gate 1555913812494576600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.495 UTC [cauthdsl] func2 -> DEBU d6c 0xc0023a9900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.495 UTC [cauthdsl] func2 -> DEBU d6d 0xc0023a9900 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.496 UTC [cauthdsl] func2 -> DEBU d6e 0xc0023a9900 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.497 UTC [msp.identity] Verify -> DEBU d6f Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:52.497 UTC [msp.identity] Verify -> DEBU d70 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:52.496 UTC [protoutils] checkSignatureFromCreator -> DEBU d71 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:52.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d72 validateChaincodeProposalMessage starts for proposal 0xc0025a8e00, header 0xc000245040" +peer0.org1.example.com | "2019-04-22 06:16:52.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d73 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:52.498 UTC [endorser] preProcess -> DEBU d75 [businesschannel][e31d3c96] processing txid: e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a" +peer0.org1.example.com | "2019-04-22 06:16:52.499 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d76 retrieveTransactionByID() - txId = [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +peer0.org1.example.com | "2019-04-22 06:16:52.498 UTC [cauthdsl] func2 -> DEBU d74 0xc0023a9900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.499 UTC [cauthdsl] func1 -> DEBU d77 0xc0023a9900 gate 1555913812494576600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.499 UTC [policies] Evaluate -> DEBU d78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.499 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d79 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:52.499 UTC [policies] Evaluate -> DEBU d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.500 UTC [policies] Evaluate -> DEBU d7c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.500 UTC [policies] Evaluate -> DEBU d7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.500 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d7b constructing new tx simulator txid = [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +peer0.org1.example.com | "2019-04-22 06:16:52.501 UTC [endorser] SimulateProposal -> DEBU d7e [businesschannel][e31d3c96] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:52.501 UTC [endorser] callChaincode -> INFO d7f [businesschannel][e31d3c96] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:52.501 UTC [chaincode] Execute -> DEBU d80 Entry" +peer0.org1.example.com | "2019-04-22 06:16:52.502 UTC [msp.identity] Verify -> DEBU d81 Verify: digest = 00000000 15 d1 14 43 8a c4 6e c4 55 09 03 11 c9 04 c4 51 |...C..n.U......Q| +peer0.org1.example.com | 00000010 e3 2c 87 d4 44 37 cd c2 89 ce a0 a4 61 29 31 e6 |.,..D7......a)1.|" +peer0.org1.example.com | "2019-04-22 06:16:52.502 UTC [msp.identity] Verify -> DEBU d82 Verify: sig = 00000000 30 45 02 21 00 b7 88 e6 08 2c 1f fb 28 c8 79 37 |0E.!.....,..(.y7| +peer0.org1.example.com | 00000010 8d 06 77 b2 10 fa 24 d5 12 75 ff fa de ef fe 15 |..w...$..u......| +orderer0.example.com | "2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a1 0xc000d28aa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a2 0xc000d28aa0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a3 0xc000d28aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | 00000020 80 5f c7 12 57 02 20 16 48 a9 79 b7 3e 90 f1 c8 |._..W. .H.y.>...| +peer0.org1.example.com | 00000030 02 e6 bf e7 85 8f b2 2a 32 6f 6c ef 42 89 7f 7e |.......*2ol.B..~| +peer0.org1.example.com | 00000040 6e 26 01 d4 3b 3b 3f |n&..;;?|" +peer0.org1.example.com | "2019-04-22 06:16:52.503 UTC [lifecycle] ApproveChaincodeDefinitionForMyOrg -> DEBU d83 received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +peer0.org1.example.com | "2019-04-22 06:16:52.503 UTC [chaincode] handleMessage -> DEBU d84 [e31d3c96] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.503 UTC [chaincode] HandleTransaction -> DEBU d85 [e31d3c96] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.503 UTC [chaincode] HandleGetState -> DEBU d86 [e31d3c96] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:52.504 UTC [stateleveldb] GetState -> DEBU d87 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:16:52.504 UTC [chaincode] HandleGetState -> DEBU d88 [e31d3c96] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-04-22 06:16:52.504 UTC [chaincode] HandleTransaction -> DEBU d89 [e31d3c96] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.505 UTC [chaincode] handleMessage -> DEBU d8a [e31d3c96] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.505 UTC [chaincode] HandleTransaction -> DEBU d8b [e31d3c96] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.505 UTC [chaincode] HandleGetState -> DEBU d8c [e31d3c96] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:52.506 UTC [msp] GetManagerForChain -> DEBU d8d Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:52.506 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d8e retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:52.507 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d8f retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:52.507 UTC [stateleveldb] GetState -> DEBU d90 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1" +peer0.org1.example.com | "2019-04-22 06:16:52.507 UTC [stateleveldb] GetState -> DEBU d91 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:16:52.507 UTC [chaincode] HandleGetState -> DEBU d92 [e31d3c96] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-04-22 06:16:52.507 UTC [chaincode] HandleTransaction -> DEBU d93 [e31d3c96] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.508 UTC [chaincode] handleMessage -> DEBU d94 [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.508 UTC [chaincode] HandleTransaction -> DEBU d95 [e31d3c96] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.508 UTC [chaincode] HandleTransaction -> DEBU d96 [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.509 UTC [chaincode] handleMessage -> DEBU d97 [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.510 UTC [chaincode] HandleTransaction -> DEBU d98 [e31d3c96] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.510 UTC [chaincode] HandleTransaction -> DEBU d99 [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.511 UTC [chaincode] handleMessage -> DEBU d9a [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.511 UTC [chaincode] HandleTransaction -> DEBU d9b [e31d3c96] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.511 UTC [chaincode] HandleTransaction -> DEBU d9c [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.511 UTC [chaincode] handleMessage -> DEBU d9d [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.512 UTC [chaincode] HandleTransaction -> DEBU d9e [e31d3c96] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.512 UTC [chaincode] HandleTransaction -> DEBU d9f [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.513 UTC [chaincode] handleMessage -> DEBU da0 [e31d3c96] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.513 UTC [chaincode] HandleTransaction -> DEBU da1 [e31d3c96] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.513 UTC [chaincode] HandleGetState -> DEBU da2 [e31d3c96] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:52.513 UTC [stateleveldb] GetState -> DEBU da3 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1" +peer0.org1.example.com | "2019-04-22 06:16:52.514 UTC [stateleveldb] GetState -> DEBU da4 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-04-22 06:16:52.514 UTC [chaincode] HandleGetState -> DEBU da5 [e31d3c96] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-04-22 06:16:52.515 UTC [msp.identity] Verify -> DEBU da7 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:52.515 UTC [msp.identity] Verify -> DEBU da8 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:52.514 UTC [chaincode] HandleTransaction -> DEBU da6 [e31d3c96] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.515 UTC [chaincode] handleMessage -> DEBU da9 [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.515 UTC [chaincode] HandleTransaction -> DEBU daa [e31d3c96] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.516 UTC [msp.identity] Verify -> DEBU dab Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +peer0.org1.example.com | "2019-04-22 06:16:52.516 UTC [msp.identity] Verify -> DEBU dac Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +orderer0.example.com | "2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a4 0xc000d28aa0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.075 UTC [cauthdsl] func1 -> DEBU 13a5 0xc000d28aa0 gate 1555913873074356300 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.075 UTC [policies] Evaluate -> DEBU 13a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.075 UTC [policies] Evaluate -> DEBU 13a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.075 UTC [policies] Evaluate -> DEBU 13a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.075 UTC [cauthdsl] func1 -> DEBU 13a9 0xc000d293f0 gate 1555913873075942100 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13aa 0xc000d293f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13ab 0xc000d293f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13ac 0xc000d293f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13ad 0xc000d293f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [cauthdsl] func1 -> DEBU 13ae 0xc000d293f0 gate 1555913873075942100 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [policies] Evaluate -> DEBU 13af Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [policies] Evaluate -> DEBU 13b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.076 UTC [policies] func1 -> DEBU 13b1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b2 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.078 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.078 UTC [cauthdsl] func1 -> DEBU 13b7 0xc000d101e0 gate 1555913873078214300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.078 UTC [cauthdsl] func2 -> DEBU 13b8 0xc000d101e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.078 UTC [cauthdsl] func2 -> DEBU 13b9 0xc000d101e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.078 UTC [cauthdsl] func2 -> DEBU 13ba 0xc000d101e0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:53.079 UTC [msp.identity] Verify -> DEBU 13bb Verify: digest = 00000000 60 a8 21 ee 28 63 a5 5b 2e 70 09 9b bb 7a ba a6 |`.!.(c.[.p...z..| +orderer0.example.com | 00000010 d3 41 64 80 55 ee 48 1a 82 5c 09 fa e3 44 ef 27 |.Ad.U.H..\...D.'|" +orderer0.example.com | "2019-04-22 06:17:53.079 UTC [msp.identity] Verify -> DEBU 13bc Verify: sig = 00000000 30 45 02 21 00 e7 6a 3a e4 78 e6 2e 33 66 6e ff |0E.!..j:.x..3fn.| +orderer0.example.com | 00000010 73 a3 82 8e f1 e7 58 c2 f3 7c 11 43 af 97 e1 2c |s.....X..|.C...,| +orderer0.example.com | 00000020 c7 2f 5a 60 d5 02 20 04 e9 47 7c 42 29 cd 14 07 |./Z`.. ..G|B)...| +orderer0.example.com | 00000030 dc 26 b6 c1 c4 ae ea d5 50 08 70 69 e9 37 70 b1 |.&......P.pi.7p.| +orderer0.example.com | 00000040 17 2f 0f 47 b1 34 da |./.G.4.|" +orderer0.example.com | "2019-04-22 06:17:53.080 UTC [cauthdsl] func2 -> DEBU 13bd 0xc000d101e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:53.080 UTC [cauthdsl] func1 -> DEBU 13be 0xc000d101e0 gate 1555913873078214300 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:53.080 UTC [policies] Evaluate -> DEBU 13bf Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.080 UTC [policies] Evaluate -> DEBU 13c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.080 UTC [policies] Evaluate -> DEBU 13c1 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.081 UTC [policies] Evaluate -> DEBU 13c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.081 UTC [policies] Evaluate -> DEBU 13c3 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.081 UTC [policies] Evaluate -> DEBU 13c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.081 UTC [common.deliver] deliverBlocks -> DEBU 13c5 [channel: businesschannel] Received seekInfo (0xc0011d9b40) start: > stop: > from 192.168.224.9:34714" +orderer0.example.com | "2019-04-22 06:17:53.081 UTC [fsblkstorage] Next -> DEBU 13c6 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:53.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 13c7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71372]" +orderer0.example.com | "2019-04-22 06:17:53.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c8 Remaining bytes=[27294], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:53.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c9 Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +orderer0.example.com | "2019-04-22 06:17:53.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13ca blockbytes [4708] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:53.083 UTC [common.deliver] deliverBlocks -> DEBU 13cb [channel: businesschannel] Delivering block [3] for (0xc0011d9b40) for 192.168.224.9:34714" +orderer0.example.com | "2019-04-22 06:17:53.084 UTC [common.deliver] deliverBlocks -> DEBU 13cc [channel: businesschannel] Done delivering to 192.168.224.9:34714 for (0xc0011d9b40)" +orderer0.example.com | "2019-04-22 06:17:53.084 UTC [common.deliver] Handle -> DEBU 13cd Waiting for new SeekInfo from 192.168.224.9:34714" +orderer0.example.com | "2019-04-22 06:17:53.084 UTC [common.deliver] Handle -> DEBU 13ce Attempting to read seek info message from 192.168.224.9:34714" +orderer0.example.com | "2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13cf Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13d0 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13d1 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13d2 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.105 UTC [grpc] infof -> DEBU 13d3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:53.107 UTC [common.deliver] Handle -> WARN 13d4 Error reading from 192.168.224.9:34714: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:53.107 UTC [orderer.common.server] func1 -> DEBU 13d6 Closing Deliver stream" +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:52.517 UTC [chaincode] HandleTransaction -> DEBU dad [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.517 UTC [chaincode] handleMessage -> DEBU dae [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.518 UTC [msp] DeserializeIdentity -> DEBU daf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.518 UTC [msp] DeserializeIdentity -> DEBU db0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.517 UTC [chaincode] HandleTransaction -> DEBU db1 [e31d3c96] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:52.518 UTC [chaincode] HandleTransaction -> DEBU db2 [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:52.519 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU db3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:52.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.519 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO db5 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:52.520 UTC [chaincode] handleMessage -> DEBU db6 [e31d3c96] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:52.520 UTC [chaincode] Notify -> DEBU db7 [e31d3c96] notifying Txid:e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:52.520 UTC [chaincode] Execute -> DEBU db8 Exit" +peer0.org1.example.com | "2019-04-22 06:16:52.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.520 UTC [policies] Evaluate -> DEBU dba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.521 UTC [policies] Evaluate -> DEBU dbb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.521 UTC [policies] Evaluate -> DEBU dbc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.521 UTC [cauthdsl] func1 -> DEBU dbd 0xc00266d100 gate 1555913812521506000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.521 UTC [cauthdsl] func2 -> DEBU dbe 0xc00266d100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.521 UTC [cauthdsl] func2 -> DEBU dbf 0xc00266d100 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.520 UTC [endorser] callChaincode -> INFO dc0 [businesschannel][e31d3c96] Exit chaincode: name:"_lifecycle" (19ms)" +peer0.org1.example.com | "2019-04-22 06:16:52.522 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU dc1 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:16:52.521 UTC [cauthdsl] func2 -> DEBU dc2 0xc00266d100 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.522 UTC [msp.identity] Verify -> DEBU dc3 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +peer0.org1.example.com | 00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +peer0.org1.example.com | "2019-04-22 06:16:52.523 UTC [lockbasedtxmgr] Done -> DEBU dc4 Done with transaction simulation / query execution [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +peer0.org1.example.com | "2019-04-22 06:16:52.523 UTC [msp] GetManagerForChain -> DEBU dc5 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:52.522 UTC [msp.identity] Verify -> DEBU dc6 Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +peer0.org1.example.com | 00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +peer0.org1.example.com | 00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +peer0.org1.example.com | 00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +peer0.org1.example.com | 00000040 4b b6 4c fc 03 1a |K.L...|" +peer0.org1.example.com | "2019-04-22 06:16:52.524 UTC [cauthdsl] func2 -> DEBU dc7 0xc00266d100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.525 UTC [cauthdsl] func1 -> DEBU dc8 0xc002673150 gate 1555913812525124500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.525 UTC [cauthdsl] func2 -> DEBU dc9 0xc002673150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.525 UTC [cauthdsl] func2 -> DEBU dca 0xc002673150 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.525 UTC [cauthdsl] func1 -> DEBU dcb 0xc00266d100 gate 1555913812521506000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.525 UTC [policies] Evaluate -> DEBU dcc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.525 UTC [policies] Evaluate -> DEBU dcd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.526 UTC [policies] Evaluate -> DEBU dce Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.526 UTC [policies] Evaluate -> DEBU dcf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.526 UTC [gossip.gossip] handleMessage -> DEBU dd0 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.526 UTC [gossip.gossip] handleMessage -> DEBU dd1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.526 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.527 UTC [msp] DeserializeIdentity -> DEBU dd3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.527 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.528 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU dd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:52.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dd6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dd7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.528 UTC [policies] Evaluate -> DEBU dd8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.529 UTC [policies] Evaluate -> DEBU dd9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.529 UTC [policies] Evaluate -> DEBU dda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.529 UTC [cauthdsl] func1 -> DEBU ddb 0xc002690c10 gate 1555913812529557000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.529 UTC [cauthdsl] func2 -> DEBU ddc 0xc002690c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.529 UTC [cauthdsl] func2 -> DEBU ddd 0xc002690c10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.529 UTC [cauthdsl] func2 -> DEBU dde 0xc002690c10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.530 UTC [cauthdsl] func2 -> DEBU ddf 0xc002673150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:16:52.530 UTC [cauthdsl] func2 -> DEBU de0 0xc002673150 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.531 UTC [cauthdsl] func1 -> DEBU de1 0xc002673150 gate 1555913812525124500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.530 UTC [msp.identity] Verify -> DEBU de2 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +peer0.org1.example.com | 00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +peer0.org1.example.com | "2019-04-22 06:16:52.531 UTC [msp.identity] Verify -> DEBU de4 Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +peer0.org1.example.com | 00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +peer0.org1.example.com | 00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +peer0.org1.example.com | 00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +peer0.org1.example.com | 00000040 4b b6 4c fc 03 1a |K.L...|" +peer0.org1.example.com | "2019-04-22 06:16:52.531 UTC [cauthdsl] func2 -> DEBU de5 0xc002690c10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.531 UTC [cauthdsl] func1 -> DEBU de6 0xc002690c10 gate 1555913812529557000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU de7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU de8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU de9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU dea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.532 UTC [msp.identity] Verify -> DEBU deb Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:52.533 UTC [msp.identity] Verify -> DEBU dec Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:52.533 UTC [msp] DeserializeIdentity -> DEBU ded Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:53.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 399.7µs " +orderer0.example.com | "2019-04-22 06:17:53.107 UTC [comm.grpc.server] 1 -> INFO 13d8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34714 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.4039ms +orderer0.example.com | "2019-04-22 06:17:53.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:53.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d5 Sending msg of 28 bytes to 2 on channel businesschannel took 36.8µs" +orderer0.example.com | "2019-04-22 06:17:53.110 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13da Sending msg of 28 bytes to 3 on channel businesschannel took 29.3µs" +orderer0.example.com | "2019-04-22 06:17:53.111 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 684.1µs " +orderer0.example.com | "2019-04-22 06:17:53.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:53.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:53.231 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 3 on channel testchainid took 29.1µs" +orderer0.example.com | "2019-04-22 06:17:53.231 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.1µs " +orderer0.example.com | "2019-04-22 06:17:53.263 UTC [orderer.common.server] Deliver -> DEBU 13e0 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:53.263 UTC [common.deliver] Handle -> DEBU 13e1 Starting new deliver loop for 192.168.224.9:34716" +orderer0.example.com | "2019-04-22 06:17:53.263 UTC [common.deliver] Handle -> DEBU 13e2 Attempting to read seek info message from 192.168.224.9:34716" +orderer0.example.com | "2019-04-22 06:17:53.264 UTC [policies] Evaluate -> DEBU 13e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.264 UTC [policies] Evaluate -> DEBU 13e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.265 UTC [policies] Evaluate -> DEBU 13e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.265 UTC [policies] Evaluate -> DEBU 13e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.265 UTC [policies] Evaluate -> DEBU 13e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.266 UTC [cauthdsl] func1 -> DEBU 13e8 0xc0003d0880 gate 1555913873265990000 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.266 UTC [cauthdsl] func2 -> DEBU 13e9 0xc0003d0880 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.266 UTC [cauthdsl] func2 -> DEBU 13ea 0xc0003d0880 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.266 UTC [cauthdsl] func2 -> DEBU 13eb 0xc0003d0880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.267 UTC [cauthdsl] func2 -> DEBU 13ec 0xc0003d0880 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.267 UTC [cauthdsl] func1 -> DEBU 13ed 0xc0003d0880 gate 1555913873265990000 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.267 UTC [policies] Evaluate -> DEBU 13ee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.267 UTC [policies] Evaluate -> DEBU 13ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.267 UTC [policies] Evaluate -> DEBU 13f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.268 UTC [cauthdsl] func1 -> DEBU 13f1 0xc0003d10c0 gate 1555913873268205000 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.268 UTC [cauthdsl] func2 -> DEBU 13f2 0xc0003d10c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.268 UTC [cauthdsl] func2 -> DEBU 13f3 0xc0003d10c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.269 UTC [cauthdsl] func2 -> DEBU 13f4 0xc0003d10c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.269 UTC [cauthdsl] func2 -> DEBU 13f5 0xc0003d10c0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.270 UTC [cauthdsl] func1 -> DEBU 13f6 0xc0003d10c0 gate 1555913873268205000 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.270 UTC [policies] Evaluate -> DEBU 13f7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.270 UTC [policies] Evaluate -> DEBU 13f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.271 UTC [policies] func1 -> DEBU 13f9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:53.272 UTC [policies] Evaluate -> DEBU 13fa Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.272 UTC [policies] Evaluate -> DEBU 13fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.272 UTC [policies] Evaluate -> DEBU 13fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.273 UTC [policies] Evaluate -> DEBU 13fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.274 UTC [policies] Evaluate -> DEBU 13fe == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.274 UTC [cauthdsl] func1 -> DEBU 13ff 0xc0003d1db0 gate 1555913873274838200 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.275 UTC [cauthdsl] func2 -> DEBU 1400 0xc0003d1db0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.275 UTC [cauthdsl] func2 -> DEBU 1401 0xc0003d1db0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.275 UTC [cauthdsl] func2 -> DEBU 1402 0xc0003d1db0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:53.276 UTC [msp.identity] Verify -> DEBU 1403 Verify: digest = 00000000 40 af f7 bd b7 d1 17 93 29 72 55 02 0a dd 14 61 |@.......)rU....a| +orderer0.example.com | 00000010 29 88 08 ec 46 1d 1c d6 8c a0 1e 59 ea 13 ba 9f |)...F......Y....|" +orderer0.example.com | "2019-04-22 06:17:53.276 UTC [msp.identity] Verify -> DEBU 1404 Verify: sig = 00000000 30 44 02 20 77 3c f2 d8 ce dc 34 0c ad a6 38 b0 |0D. w<....4...8.| +orderer0.example.com | 00000010 7c df d9 72 e4 bb e8 df 50 53 c5 b5 d6 18 45 bb ||..r....PS....E.| +orderer0.example.com | 00000020 79 29 4a ff 02 20 1f cc e4 a8 93 a9 da 5a fd 5e |y)J.. .......Z.^| +orderer0.example.com | 00000030 9c 85 ed 4a 06 e8 7c d2 cc c7 1c 79 98 ba e2 7e |...J..|....y...~| +peer0.org1.example.com | "2019-04-22 06:16:52.533 UTC [msp] DeserializeIdentity -> DEBU dee Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU def Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:52.533 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:52.534 UTC [policies] Evaluate -> DEBU df2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.534 UTC [policies] Evaluate -> DEBU df3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.534 UTC [policies] Evaluate -> DEBU df4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.534 UTC [cauthdsl] func1 -> DEBU df5 0xc0033c8b00 gate 1555913812534596700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.534 UTC [cauthdsl] func2 -> DEBU df6 0xc0033c8b00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.534 UTC [cauthdsl] func2 -> DEBU df7 0xc0033c8b00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.535 UTC [cauthdsl] func2 -> DEBU df8 0xc0033c8b00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.535 UTC [msp.identity] Verify -> DEBU df9 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:52.535 UTC [msp.identity] Verify -> DEBU dfa Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:52.535 UTC [cauthdsl] func2 -> DEBU dfb 0xc0033c8b00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.536 UTC [cauthdsl] func1 -> DEBU dfc 0xc0033c8b00 gate 1555913812534596700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU dfd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU dfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU dff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU e00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.536 UTC [gossip.gossip] handleMessage -> DEBU e01 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.537 UTC [gossip.gossip] handleMessage -> DEBU e02 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3323425233133937166 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.537 UTC [gossip.pull] HandleMessage -> DEBU e03 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3323425233133937166 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.537 UTC [gossip.gossip] handleMessage -> DEBU e04 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.531 UTC [cauthdsl] func1 -> DEBU de3 0xc0026736e0 gate 1555913812531395800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.537 UTC [cauthdsl] func2 -> DEBU e05 0xc0026736e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.538 UTC [cauthdsl] func2 -> DEBU e06 0xc0026736e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.538 UTC [cauthdsl] func2 -> DEBU e07 0xc0026736e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:16:52.538 UTC [cauthdsl] func2 -> DEBU e08 0xc0026736e0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.538 UTC [cauthdsl] func1 -> DEBU e09 0xc0026736e0 gate 1555913812531395800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.539 UTC [cauthdsl] func1 -> DEBU e0a 0xc002673c70 gate 1555913812539012400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.539 UTC [cauthdsl] func2 -> DEBU e0b 0xc002673c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.539 UTC [cauthdsl] func2 -> DEBU e0c 0xc002673c70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.539 UTC [cauthdsl] func2 -> DEBU e0d 0xc002673c70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.539 UTC [msp.identity] Verify -> DEBU e0e Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +orderer0.example.com | 00000040 c4 a5 8e 42 5d d9 |...B].|" +orderer0.example.com | "2019-04-22 06:17:53.277 UTC [cauthdsl] func2 -> DEBU 1405 0xc0003d1db0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:53.277 UTC [cauthdsl] func1 -> DEBU 1406 0xc0003d1db0 gate 1555913873274838200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:53.277 UTC [policies] Evaluate -> DEBU 1407 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.277 UTC [policies] Evaluate -> DEBU 1408 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.278 UTC [policies] Evaluate -> DEBU 1409 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.278 UTC [policies] Evaluate -> DEBU 140a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.279 UTC [policies] Evaluate -> DEBU 140b Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.279 UTC [policies] Evaluate -> DEBU 140c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.279 UTC [common.deliver] deliverBlocks -> DEBU 140d [channel: businesschannel] Received seekInfo (0xc000a58f80) start: > stop: > from 192.168.224.9:34716" +orderer0.example.com | "2019-04-22 06:17:53.280 UTC [fsblkstorage] Next -> DEBU 140e Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:53.280 UTC [fsblkstorage] newBlockfileStream -> DEBU 140f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" +orderer0.example.com | "2019-04-22 06:17:53.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1410 Remaining bytes=[22584], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:53.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1411 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +orderer0.example.com | "2019-04-22 06:17:53.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1412 blockbytes [4707] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:53.282 UTC [common.deliver] deliverBlocks -> DEBU 1413 [channel: businesschannel] Delivering block [4] for (0xc000a58f80) for 192.168.224.9:34716" +orderer0.example.com | "2019-04-22 06:17:53.282 UTC [common.deliver] deliverBlocks -> DEBU 1414 [channel: businesschannel] Done delivering to 192.168.224.9:34716 for (0xc000a58f80)" +orderer0.example.com | "2019-04-22 06:17:53.283 UTC [fsblkstorage] waitForBlock -> DEBU 1415 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.283 UTC [fsblkstorage] waitForBlock -> DEBU 1416 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.284 UTC [fsblkstorage] waitForBlock -> DEBU 1417 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.284 UTC [fsblkstorage] waitForBlock -> DEBU 1418 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.285 UTC [common.deliver] Handle -> DEBU 1419 Waiting for new SeekInfo from 192.168.224.9:34716" +orderer0.example.com | "2019-04-22 06:17:53.285 UTC [common.deliver] Handle -> DEBU 141a Attempting to read seek info message from 192.168.224.9:34716" +orderer0.example.com | "2019-04-22 06:17:53.300 UTC [common.deliver] Handle -> WARN 141b Error reading from 192.168.224.9:34716: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:53.301 UTC [orderer.common.server] func1 -> DEBU 141c Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:53.301 UTC [comm.grpc.server] 1 -> INFO 141d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34716 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.1761ms +orderer0.example.com | "2019-04-22 06:17:53.302 UTC [grpc] infof -> DEBU 141e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:53.475 UTC [orderer.common.server] Deliver -> DEBU 141f Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:53.476 UTC [common.deliver] Handle -> DEBU 1420 Starting new deliver loop for 192.168.224.9:34718" +orderer0.example.com | "2019-04-22 06:17:53.476 UTC [common.deliver] Handle -> DEBU 1421 Attempting to read seek info message from 192.168.224.9:34718" +orderer0.example.com | "2019-04-22 06:17:53.478 UTC [policies] Evaluate -> DEBU 1422 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.478 UTC [policies] Evaluate -> DEBU 1423 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.478 UTC [policies] Evaluate -> DEBU 1424 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.479 UTC [policies] Evaluate -> DEBU 1425 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.479 UTC [policies] Evaluate -> DEBU 1426 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.479 UTC [cauthdsl] func1 -> DEBU 1427 0xc00026b630 gate 1555913873479563700 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.479 UTC [cauthdsl] func2 -> DEBU 1428 0xc00026b630 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.480 UTC [cauthdsl] func2 -> DEBU 1429 0xc00026b630 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.480 UTC [cauthdsl] func2 -> DEBU 142a 0xc00026b630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.480 UTC [cauthdsl] func2 -> DEBU 142b 0xc00026b630 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.481 UTC [cauthdsl] func1 -> DEBU 142c 0xc00026b630 gate 1555913873479563700 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.481 UTC [policies] Evaluate -> DEBU 142d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.481 UTC [policies] Evaluate -> DEBU 142e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.481 UTC [policies] Evaluate -> DEBU 142f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.482 UTC [cauthdsl] func1 -> DEBU 1430 0xc00024e100 gate 1555913873482286000 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.482 UTC [cauthdsl] func2 -> DEBU 1431 0xc00024e100 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.482 UTC [cauthdsl] func2 -> DEBU 1432 0xc00024e100 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.483 UTC [cauthdsl] func2 -> DEBU 1433 0xc00024e100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.483 UTC [cauthdsl] func2 -> DEBU 1434 0xc00024e100 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.483 UTC [cauthdsl] func1 -> DEBU 1435 0xc00024e100 gate 1555913873482286000 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.484 UTC [policies] Evaluate -> DEBU 1436 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.484 UTC [policies] Evaluate -> DEBU 1437 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.539 UTC [msp.identity] Verify -> DEBU e0f Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:52.540 UTC [cauthdsl] func2 -> DEBU e10 0xc002673c70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.540 UTC [cauthdsl] func1 -> DEBU e11 0xc002673c70 gate 1555913812539012400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.540 UTC [transientstore] PersistWithConfig -> DEBU e12 Persisting private data to transient store for txid [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] at block height [3]" +peer0.org1.example.com | "2019-04-22 06:16:52.545 UTC [lockbasedtxmgr] Done -> DEBU e13 Done with transaction simulation / query execution [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +peer0.org1.example.com | "2019-04-22 06:16:52.545 UTC [endorser] SimulateProposal -> DEBU e14 [businesschannel][e31d3c96] Exit" +peer0.org1.example.com | "2019-04-22 06:16:52.546 UTC [endorser] endorseProposal -> DEBU e15 [businesschannel][e31d3c96] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:52.546 UTC [endorser] endorseProposal -> DEBU e16 [businesschannel][e31d3c96] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-04-22 06:16:52.546 UTC [endorser] EndorseWithPlugin -> DEBU e17 Entering endorsement for {plugin: escc, channel: businesschannel, tx: e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:16:52.546 UTC [msp.identity] Sign -> DEBU e18 Sign: plaintext: 0A206124F5BA4D8EAFF570BFC1D5132A...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:52.546 UTC [msp.identity] Sign -> DEBU e19 Sign: digest: 8E382B464FE6257D9D449B24CB2E75ED9BFB5779F6002D9A363498D60C09020B " +peer0.org1.example.com | "2019-04-22 06:16:52.547 UTC [endorser] EndorseWithPlugin -> DEBU e1a Exiting {plugin: escc, channel: businesschannel, tx: e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:16:52.547 UTC [endorser] endorseProposal -> DEBU e1b [businesschannel][e31d3c96] Exit" +peer0.org1.example.com | "2019-04-22 06:16:52.547 UTC [lockbasedtxmgr] Done -> DEBU e1c Done with transaction simulation / query execution [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +peer0.org1.example.com | "2019-04-22 06:16:52.547 UTC [endorser] func1 -> DEBU e1d Exit: request from 192.168.224.9:49234" +peer0.org1.example.com | "2019-04-22 06:16:52.547 UTC [comm.grpc.server] 1 -> INFO e1e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49234 grpc.code=OK grpc.call_duration=57.7918ms +peer0.org1.example.com | "2019-04-22 06:16:52.556 UTC [common.deliverevents] DeliverFiltered -> DEBU e1f Starting new DeliverFiltered handler" +peer0.org1.example.com | "2019-04-22 06:16:52.556 UTC [common.deliver] Handle -> DEBU e20 Starting new deliver loop for 192.168.224.9:49236" +peer0.org1.example.com | "2019-04-22 06:16:52.556 UTC [common.deliver] Handle -> DEBU e21 Attempting to read seek info message from 192.168.224.9:49236" +peer0.org1.example.com | "2019-04-22 06:16:52.557 UTC [aclmgmt] CheckACL -> DEBU e22 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +peer0.org1.example.com | "2019-04-22 06:16:52.557 UTC [aclmgmt] CheckACL -> DEBU e23 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:16:52.557 UTC [policies] Evaluate -> DEBU e24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.557 UTC [policies] Evaluate -> DEBU e25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:52.557 UTC [policies] Evaluate -> DEBU e26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.557 UTC [cauthdsl] func1 -> DEBU e27 0xc00370ca00 gate 1555913812557917100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e28 0xc00370ca00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e29 0xc00370ca00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e2a 0xc00370ca00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e2b 0xc00370ca00 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.559 UTC [cauthdsl] func1 -> DEBU e2c 0xc00370ca00 gate 1555913812557917100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:52.559 UTC [policies] Evaluate -> DEBU e2d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.559 UTC [policies] Evaluate -> DEBU e2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.559 UTC [policies] Evaluate -> DEBU e2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:52.559 UTC [cauthdsl] func1 -> DEBU e30 0xc00370d240 gate 1555913812559595200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:52.559 UTC [cauthdsl] func2 -> DEBU e31 0xc00370d240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:52.559 UTC [cauthdsl] func2 -> DEBU e32 0xc00370d240 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [cauthdsl] func2 -> DEBU e33 0xc00370d240 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [msp.identity] Verify -> DEBU e34 Verify: digest = 00000000 e7 4f 7f 5f 46 f9 b8 e1 2c 5e 30 42 f8 4e cd 1e |.O._F...,^0B.N..| +peer0.org1.example.com | 00000010 1f 58 06 ab 17 4b 1e 75 6f 23 5e fb 88 68 fe a4 |.X...K.uo#^..h..|" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [msp.identity] Verify -> DEBU e35 Verify: sig = 00000000 30 44 02 20 53 d2 60 bd 3c 31 53 81 08 db 64 46 |0D. S.`.<1S...dF| +peer0.org1.example.com | 00000010 6c 32 ed e4 b8 50 43 a3 96 48 96 3b 45 bb 3e 5b |l2...PC..H.;E.>[| +peer0.org1.example.com | 00000020 87 93 16 49 02 20 39 f4 4e 1a fa ba ec 10 45 13 |...I. 9.N.....E.| +peer0.org1.example.com | 00000030 2d 39 6e ad 57 f2 91 6a 50 84 d6 a7 09 2f 15 bb |-9n.W..jP..../..| +peer0.org1.example.com | 00000040 76 f3 a3 d5 8d a1 |v.....|" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [cauthdsl] func2 -> DEBU e36 0xc00370d240 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [cauthdsl] func1 -> DEBU e37 0xc00370d240 gate 1555913812559595200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [policies] Evaluate -> DEBU e38 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [policies] Evaluate -> DEBU e39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.560 UTC [policies] Evaluate -> DEBU e3a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.561 UTC [policies] Evaluate -> DEBU e3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:52.561 UTC [common.deliver] deliverBlocks -> DEBU e3c [channel: businesschannel] Received seekInfo (0xc0036aba80) start: > stop: > from 192.168.224.9:49236" +peer0.org1.example.com | "2019-04-22 06:16:52.561 UTC [fsblkstorage] Next -> DEBU e3d Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +orderer0.example.com | "2019-04-22 06:17:53.485 UTC [policies] func1 -> DEBU 1438 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:53.485 UTC [policies] Evaluate -> DEBU 1439 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.485 UTC [policies] Evaluate -> DEBU 143a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.486 UTC [policies] Evaluate -> DEBU 143b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.486 UTC [policies] Evaluate -> DEBU 143c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.486 UTC [policies] Evaluate -> DEBU 143d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.487 UTC [cauthdsl] func1 -> DEBU 143e 0xc0001f0de0 gate 1555913873487647300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.487 UTC [cauthdsl] func2 -> DEBU 143f 0xc0001f0de0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.488 UTC [cauthdsl] func2 -> DEBU 1440 0xc0001f0de0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.488 UTC [cauthdsl] func2 -> DEBU 1441 0xc0001f0de0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:53.489 UTC [msp.identity] Verify -> DEBU 1442 Verify: digest = 00000000 db b7 f3 83 29 b0 24 71 76 a3 1d 39 38 6f e9 bb |....).$qv..98o..| +orderer0.example.com | 00000010 06 b7 50 0c 9d 95 59 2c f7 36 3c 76 b9 44 2f d8 |..P...Y,.6 DEBU 1443 Verify: sig = 00000000 30 44 02 20 2c 62 78 ea e1 21 c8 f9 e8 e7 97 bf |0D. ,bx..!......| +orderer0.example.com | 00000010 d9 fa 8e bb 74 2a 6f ea ce 32 9e ab be c3 c7 e4 |....t*o..2......| +orderer0.example.com | 00000020 0b 36 ee af 02 20 43 9f 01 11 aa 77 41 2f 89 2f |.6... C....wA/./| +orderer0.example.com | 00000030 e0 c8 f3 48 19 3f 68 e7 4b 1c 9e 37 e7 d7 b7 bc |...H.?h.K..7....| +orderer0.example.com | 00000040 7d 07 45 4f 41 4f |}.EOAO|" +orderer0.example.com | "2019-04-22 06:17:53.490 UTC [cauthdsl] func2 -> DEBU 1444 0xc0001f0de0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:53.490 UTC [cauthdsl] func1 -> DEBU 1445 0xc0001f0de0 gate 1555913873487647300 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:53.490 UTC [policies] Evaluate -> DEBU 1446 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.491 UTC [policies] Evaluate -> DEBU 1447 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.491 UTC [policies] Evaluate -> DEBU 1448 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.492 UTC [policies] Evaluate -> DEBU 1449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.492 UTC [policies] Evaluate -> DEBU 144a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.492 UTC [policies] Evaluate -> DEBU 144b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.492 UTC [common.deliver] deliverBlocks -> DEBU 144c [channel: businesschannel] Received seekInfo (0xc000a59440) start: > stop: > from 192.168.224.9:34718" +orderer0.example.com | "2019-04-22 06:17:53.493 UTC [fsblkstorage] Next -> DEBU 144d Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:53.493 UTC [fsblkstorage] newBlockfileStream -> DEBU 144e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80791]" +orderer0.example.com | "2019-04-22 06:17:53.494 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 144f Remaining bytes=[17875], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:53.494 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1450 Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +orderer0.example.com | "2019-04-22 06:17:53.494 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1451 blockbytes [5712] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:53.495 UTC [common.deliver] deliverBlocks -> DEBU 1452 [channel: businesschannel] Delivering block [5] for (0xc000a59440) for 192.168.224.9:34718" +orderer0.example.com | "2019-04-22 06:17:53.496 UTC [common.deliver] deliverBlocks -> DEBU 1453 [channel: businesschannel] Done delivering to 192.168.224.9:34718 for (0xc000a59440)" +orderer0.example.com | "2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1454 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1455 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1456 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1457 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.497 UTC [common.deliver] Handle -> DEBU 1458 Waiting for new SeekInfo from 192.168.224.9:34718" +orderer0.example.com | "2019-04-22 06:17:53.499 UTC [common.deliver] Handle -> DEBU 1459 Attempting to read seek info message from 192.168.224.9:34718" +orderer0.example.com | "2019-04-22 06:17:53.503 UTC [common.deliver] Handle -> WARN 145a Error reading from 192.168.224.9:34718: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:53.503 UTC [orderer.common.server] func1 -> DEBU 145b Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:53.503 UTC [comm.grpc.server] 1 -> INFO 145c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34718 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.1986ms +orderer0.example.com | "2019-04-22 06:17:53.503 UTC [grpc] infof -> DEBU 145d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:53.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel businesschannel took 36.1µs" +orderer0.example.com | "2019-04-22 06:17:53.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145f Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +orderer0.example.com | "2019-04-22 06:17:53.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1460 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.1µs " +orderer0.example.com | "2019-04-22 06:17:53.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1461 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.9µs " +peer0.org1.example.com | "2019-04-22 06:16:52.561 UTC [fsblkstorage] newBlockfileStream -> DEBU e3e newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47629]" +peer0.org1.example.com | "2019-04-22 06:16:52.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e3f Remaining bytes=[23746], Going to peek [8] bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e40 Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47629], bytesOffset=[47632]}" +peer0.org1.example.com | "2019-04-22 06:16:52.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e41 blockbytes [23743] read from file [0]" +peer0.org1.example.com | "2019-04-22 06:16:52.563 UTC [common.deliver] deliverBlocks -> DEBU e42 [channel: businesschannel] Delivering block [2] for (0xc0036aba80) for 192.168.224.9:49236" +peer0.org1.example.com | "2019-04-22 06:16:52.563 UTC [fsblkstorage] waitForBlock -> DEBU e43 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +peer0.org1.example.com | "2019-04-22 06:16:52.714 UTC [gossip.comm] func1 -> DEBU e44 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.714 UTC [gossip.gossip] handleMessage -> DEBU e45 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.714 UTC [msp] DeserializeIdentity -> DEBU e46 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.714 UTC [msp] DeserializeIdentity -> DEBU e47 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.715 UTC [gossip.gossip] handleMessage -> DEBU e48 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.716 UTC [gossip.comm] func1 -> DEBU e49 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.716 UTC [gossip.gossip] handleMessage -> DEBU e4a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.716 UTC [gossip.pull] HandleMessage -> DEBU e4b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.716 UTC [gossip.pull] SendDigest -> DEBU e4c Sending BLOCK_MSG digest: [2 1] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:52.716 UTC [gossip.gossip] handleMessage -> DEBU e4d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:52.938 UTC [gossip.gossip] handleMessage -> DEBU e4e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:52.939 UTC [msp] DeserializeIdentity -> DEBU e4f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.941 UTC [msp] DeserializeIdentity -> DEBU e50 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.941 UTC [msp] DeserializeIdentity -> DEBU e51 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:52.941 UTC [gossip.gossip] handleMessage -> DEBU e52 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:53.153 UTC [gossip.comm] func1 -> DEBU e53 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:53.153 UTC [gossip.gossip] handleMessage -> DEBU e54 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:53.155 UTC [msp] DeserializeIdentity -> DEBU e55 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:53.156 UTC [msp] DeserializeIdentity -> DEBU e56 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:53.156 UTC [msp] DeserializeIdentity -> DEBU e57 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:53.157 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.549 UTC [peer.gossip.mcs] VerifyBlock -> DEBU e59 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:54.550 UTC [peer.gossip.mcs] VerifyBlock -> DEBU e5a Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:54.550 UTC [policies] Evaluate -> DEBU e5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:16:54.552 UTC [policies] Evaluate -> DEBU e5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:54.552 UTC [policies] Evaluate -> DEBU e5d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.552 UTC [msp] DeserializeIdentity -> DEBU e5e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.553 UTC [msp.identity] newIdentity -> DEBU e5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +peer0.org1.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +peer0.org1.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +peer0.org1.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +peer0.org1.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +peer0.org1.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +peer0.org1.example.com | QQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:54.554 UTC [cauthdsl] func1 -> DEBU e60 0xc0031997b0 gate 1555913814553992900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.554 UTC [cauthdsl] func2 -> DEBU e61 0xc0031997b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:54.554 UTC [cauthdsl] func2 -> DEBU e62 0xc0031997b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:54.554 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU e63 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-04-22 06:16:54.554 UTC [msp] Validate -> DEBU e64 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:54.555 UTC [cauthdsl] func2 -> DEBU e65 0xc0031997b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.555 UTC [msp.identity] Verify -> DEBU e66 Verify: digest = 00000000 6c d1 1b 2f d0 19 80 d1 42 22 51 eb b6 b9 bc 76 |l../....B"Q....v| +peer0.org1.example.com | 00000010 59 c7 3c ce b3 0e 8b 0b 8f 90 71 67 34 77 04 da |Y.<.......qg4w..|" +peer0.org1.example.com | "2019-04-22 06:16:54.555 UTC [msp.identity] Verify -> DEBU e67 Verify: sig = 00000000 30 45 02 21 00 dd cb 43 f2 ab 9a 91 48 e5 d8 1f |0E.!...C....H...| +orderer0.example.com | "2019-04-22 06:17:53.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1462 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:53.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:53.696 UTC [orderer.common.server] Deliver -> DEBU 1464 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:53.696 UTC [common.deliver] Handle -> DEBU 1465 Starting new deliver loop for 192.168.224.9:34720" +orderer0.example.com | "2019-04-22 06:17:53.696 UTC [common.deliver] Handle -> DEBU 1466 Attempting to read seek info message from 192.168.224.9:34720" +orderer0.example.com | "2019-04-22 06:17:53.697 UTC [policies] Evaluate -> DEBU 1467 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.697 UTC [policies] Evaluate -> DEBU 1468 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.697 UTC [policies] Evaluate -> DEBU 1469 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.698 UTC [policies] Evaluate -> DEBU 146a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.698 UTC [policies] Evaluate -> DEBU 146b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.699 UTC [cauthdsl] func1 -> DEBU 146c 0xc000405810 gate 1555913873698879300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.699 UTC [cauthdsl] func2 -> DEBU 146d 0xc000405810 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.699 UTC [cauthdsl] func2 -> DEBU 146e 0xc000405810 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.699 UTC [cauthdsl] func2 -> DEBU 146f 0xc000405810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.700 UTC [cauthdsl] func2 -> DEBU 1470 0xc000405810 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.700 UTC [cauthdsl] func1 -> DEBU 1471 0xc000405810 gate 1555913873698879300 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.700 UTC [policies] Evaluate -> DEBU 1472 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.701 UTC [policies] Evaluate -> DEBU 1473 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.702 UTC [policies] Evaluate -> DEBU 1474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.702 UTC [cauthdsl] func1 -> DEBU 1475 0xc0003e67d0 gate 1555913873702437400 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.702 UTC [cauthdsl] func2 -> DEBU 1476 0xc0003e67d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.703 UTC [cauthdsl] func2 -> DEBU 1477 0xc0003e67d0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.703 UTC [cauthdsl] func2 -> DEBU 1478 0xc0003e67d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.703 UTC [cauthdsl] func2 -> DEBU 1479 0xc0003e67d0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.704 UTC [cauthdsl] func1 -> DEBU 147a 0xc0003e67d0 gate 1555913873702437400 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.704 UTC [policies] Evaluate -> DEBU 147b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.704 UTC [policies] Evaluate -> DEBU 147c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.705 UTC [policies] func1 -> DEBU 147d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:53.705 UTC [policies] Evaluate -> DEBU 147e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.705 UTC [policies] Evaluate -> DEBU 147f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.706 UTC [policies] Evaluate -> DEBU 1480 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.706 UTC [policies] Evaluate -> DEBU 1481 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.706 UTC [policies] Evaluate -> DEBU 1482 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.707 UTC [cauthdsl] func1 -> DEBU 1483 0xc0003e7870 gate 1555913873707322100 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.707 UTC [cauthdsl] func2 -> DEBU 1484 0xc0003e7870 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.708 UTC [cauthdsl] func2 -> DEBU 1485 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.708 UTC [cauthdsl] func2 -> DEBU 1486 0xc0003e7870 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:53.708 UTC [msp.identity] Verify -> DEBU 1487 Verify: digest = 00000000 b1 26 48 7b 88 50 dc f6 ca 94 bc 80 4a c2 da e3 |.&H{.P......J...| +orderer0.example.com | 00000010 13 96 02 4f 98 2b bf 20 28 a0 37 e5 c7 dd 2a af |...O.+. (.7...*.|" +orderer0.example.com | "2019-04-22 06:17:53.709 UTC [msp.identity] Verify -> DEBU 1488 Verify: sig = 00000000 30 45 02 21 00 dd 31 b4 a5 0d 04 87 ed 9d 03 42 |0E.!..1........B| +orderer0.example.com | 00000010 d7 20 c6 d6 ed 5e b9 ea e0 4a c4 99 d6 bf 45 cb |. ...^...J....E.| +orderer0.example.com | 00000020 0d 3d 9a 35 a2 02 20 6b e7 c9 71 1f 96 e2 3b e6 |.=.5.. k..q...;.| +orderer0.example.com | 00000030 3b 0b 37 35 a9 14 2e ff b5 f5 74 02 5b 8a 03 15 |;.75......t.[...| +orderer0.example.com | 00000040 e0 43 fa 4f ea d3 1a |.C.O...|" +orderer0.example.com | "2019-04-22 06:17:53.709 UTC [cauthdsl] func2 -> DEBU 1489 0xc0003e7870 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:53.709 UTC [cauthdsl] func1 -> DEBU 148a 0xc0003e7870 gate 1555913873707322100 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.711 UTC [policies] Evaluate -> DEBU 148f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.711 UTC [policies] Evaluate -> DEBU 1490 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.712 UTC [common.deliver] deliverBlocks -> DEBU 1491 [channel: businesschannel] Received seekInfo (0xc000a59b40) start: > stop: > from 192.168.224.9:34720" +orderer0.example.com | "2019-04-22 06:17:53.712 UTC [fsblkstorage] Next -> DEBU 1492 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +peer0.org1.example.com | 00000010 10 f4 be a2 b5 e0 b7 84 3c 14 73 07 aa fe 9c 8c |........<.s.....| +peer0.org1.example.com | 00000020 89 9e 14 26 79 02 20 7e 1b f6 93 95 bc 40 1d 31 |...&y. ~.....@.1| +peer0.org1.example.com | 00000030 49 2c 5f 36 67 0f 3f 38 88 d8 c2 7e e9 4e 44 e7 |I,_6g.?8...~.ND.| +peer0.org1.example.com | 00000040 5f ec 76 9f 19 42 d4 |_.v..B.|" +peer0.org1.example.com | "2019-04-22 06:16:54.556 UTC [cauthdsl] func2 -> DEBU e68 0xc0031997b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.556 UTC [cauthdsl] func1 -> DEBU e69 0xc0031997b0 gate 1555913814553992900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:54.556 UTC [policies] Evaluate -> DEBU e6a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:54.557 UTC [policies] Evaluate -> DEBU e6b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:54.557 UTC [policies] Evaluate -> DEBU e6c Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:54.557 UTC [policies] Evaluate -> DEBU e6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:54.557 UTC [blocksProvider] DeliverBlocks -> DEBU e6e [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.558 UTC [gossip.state] addPayload -> DEBU e6f [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.558 UTC [gossip.state] addPayload -> DEBU e70 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:16:54.558 UTC [blocksProvider] DeliverBlocks -> DEBU e71 [businesschannel] Gossiping block [3], peers number [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.559 UTC [gossip.channel] AddToMsgStore -> DEBU e73 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 3}, Envelope: 4752 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:16:54.559 UTC [gossip.pull] Add -> DEBU e74 Added 3, total items: 3" +peer0.org1.example.com | "2019-04-22 06:16:54.558 UTC [gossip.state] deliverPayloads -> DEBU e72 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.559 UTC [gossip.state] deliverPayloads -> DEBU e75 [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:16:54.560 UTC [gossip.privdata] StoreBlock -> INFO e76 [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-04-22 06:16:54.560 UTC [gossip.privdata] StoreBlock -> DEBU e77 [businesschannel] Validating block [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.560 UTC [committer.txvalidator] Validate -> DEBU e78 [businesschannel] START Block Validation for block [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.561 UTC [committer.txvalidator] Validate -> DEBU e79 expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:16:54.561 UTC [committer.txvalidator] validateTx -> DEBU e7a [businesschannel] validateTx starts for block 0xc002502480 env 0xc0024f0be0 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:54.561 UTC [protoutils] ValidateTransaction -> DEBU e7b ValidateTransactionEnvelope starts for envelope 0xc0024f0be0" +peer0.org1.example.com | "2019-04-22 06:16:54.561 UTC [protoutils] ValidateTransaction -> DEBU e7c Header is channel_header:"\010\003\032\014\010\324\270\365\345\005\020\204\230\214\351\001\"\017businesschannel*@e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\236k\347-2\t\327DH-)s4\227T\201\240\234\344\263\270\003\346" " +peer0.org1.example.com | "2019-04-22 06:16:54.562 UTC [protoutils] validateChannelHeader -> DEBU e7d validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:54.562 UTC [protoutils] checkSignatureFromCreator -> DEBU e7e begin" +peer0.org1.example.com | "2019-04-22 06:16:54.562 UTC [msp] GetManagerForChain -> DEBU e7f Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:54.562 UTC [protoutils] checkSignatureFromCreator -> DEBU e80 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:54.563 UTC [protoutils] checkSignatureFromCreator -> DEBU e81 creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:54.563 UTC [msp.identity] Verify -> DEBU e82 Verify: digest = 00000000 2b 6f 41 49 fb 44 0e 83 27 95 01 46 f8 23 4a 80 |+oAI.D..'..F.#J.| +peer0.org1.example.com | 00000010 a6 4d ee fe e2 53 6d 4f e8 9a 60 16 70 60 e8 25 |.M...SmO..`.p`.%|" +peer0.org1.example.com | "2019-04-22 06:16:54.563 UTC [msp.identity] Verify -> DEBU e83 Verify: sig = 00000000 30 44 02 20 42 d4 d3 c1 5d bf df 8a 4b 70 63 3e |0D. B...]...Kpc>| +peer0.org1.example.com | 00000010 a3 94 4b db 89 0c 23 b0 a7 72 1b e5 13 ed cc 63 |..K...#..r.....c| +peer0.org1.example.com | 00000020 84 2c b6 46 02 20 25 d9 f3 e5 c2 bb 10 7a ef 12 |.,.F. %......z..| +peer0.org1.example.com | 00000030 99 bc 91 e0 9c bf d6 30 69 bd e9 0f 9c d1 68 c5 |.......0i.....h.| +peer0.org1.example.com | 00000040 49 3c d5 68 e7 b0 |I<.h..|" +peer0.org1.example.com | "2019-04-22 06:16:54.564 UTC [protoutils] checkSignatureFromCreator -> DEBU e84 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:54.564 UTC [msp] DeserializeIdentity -> DEBU e85 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.564 UTC [msp] DeserializeIdentity -> DEBU e87 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.564 UTC [protoutils] validateEndorserTransaction -> DEBU e86 validateEndorserTransaction starts for data 0xc003212000, header channel_header:"\010\003\032\014\010\324\270\365\345\005\020\204\230\214\351\001\"\017businesschannel*@e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\236k\347-2\t\327DH-)s4\227T\201\240\234\344\263\270\003\346" " +peer0.org1.example.com | "2019-04-22 06:16:54.565 UTC [protoutils] validateEndorserTransaction -> DEBU e88 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-04-22 06:16:54.565 UTC [protoutils] validateEndorserTransaction -> DEBU e89 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-04-22 06:16:54.565 UTC [msp] DeserializeIdentity -> DEBU e8a Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:53.712 UTC [fsblkstorage] newBlockfileStream -> DEBU 1493 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86505]" +orderer0.example.com | "2019-04-22 06:17:53.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1494 Remaining bytes=[12161], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:53.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1495 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +orderer0.example.com | "2019-04-22 06:17:53.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1496 blockbytes [4058] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:53.714 UTC [common.deliver] deliverBlocks -> DEBU 1497 [channel: businesschannel] Delivering block [6] for (0xc000a59b40) for 192.168.224.9:34720" +orderer0.example.com | "2019-04-22 06:17:53.714 UTC [common.deliver] deliverBlocks -> DEBU 1498 [channel: businesschannel] Done delivering to 192.168.224.9:34720 for (0xc000a59b40)" +orderer0.example.com | "2019-04-22 06:17:53.714 UTC [common.deliver] Handle -> DEBU 1499 Waiting for new SeekInfo from 192.168.224.9:34720" +orderer0.example.com | "2019-04-22 06:17:53.715 UTC [common.deliver] Handle -> DEBU 149b Attempting to read seek info message from 192.168.224.9:34720" +orderer0.example.com | "2019-04-22 06:17:53.714 UTC [fsblkstorage] waitForBlock -> DEBU 149a Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.715 UTC [fsblkstorage] waitForBlock -> DEBU 149c Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.715 UTC [fsblkstorage] waitForBlock -> DEBU 149d Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.716 UTC [fsblkstorage] waitForBlock -> DEBU 149e Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.725 UTC [grpc] infof -> DEBU 149f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:53.725 UTC [common.deliver] Handle -> WARN 14a0 Error reading from 192.168.224.9:34720: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:53.725 UTC [orderer.common.server] func1 -> DEBU 14a1 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:53.725 UTC [comm.grpc.server] 1 -> INFO 14a2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34720 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.842ms +orderer0.example.com | "2019-04-22 06:17:53.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:53.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a4 Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +orderer0.example.com | "2019-04-22 06:17:53.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.4µs " +orderer0.example.com | "2019-04-22 06:17:53.918 UTC [orderer.common.server] Deliver -> DEBU 14a6 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:53.919 UTC [common.deliver] Handle -> DEBU 14a7 Starting new deliver loop for 192.168.224.9:34722" +orderer0.example.com | "2019-04-22 06:17:53.919 UTC [common.deliver] Handle -> DEBU 14a8 Attempting to read seek info message from 192.168.224.9:34722" +orderer0.example.com | "2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.921 UTC [cauthdsl] func1 -> DEBU 14ae 0xc0009e65c0 gate 1555913873921939600 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14af 0xc0009e65c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14b0 0xc0009e65c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14b1 0xc0009e65c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14b2 0xc0009e65c0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.922 UTC [cauthdsl] func1 -> DEBU 14b3 0xc0009e65c0 gate 1555913873921939600 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.923 UTC [policies] Evaluate -> DEBU 14b4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.923 UTC [policies] Evaluate -> DEBU 14b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.923 UTC [policies] Evaluate -> DEBU 14b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.923 UTC [cauthdsl] func1 -> DEBU 14b7 0xc0009e6e30 gate 1555913873923750000 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:53.923 UTC [cauthdsl] func2 -> DEBU 14b8 0xc0009e6e30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.924 UTC [cauthdsl] func2 -> DEBU 14b9 0xc0009e6e30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.924 UTC [cauthdsl] func2 -> DEBU 14ba 0xc0009e6e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:53.924 UTC [cauthdsl] func2 -> DEBU 14bb 0xc0009e6e30 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [cauthdsl] func1 -> DEBU 14bc 0xc0009e6e30 gate 1555913873923750000 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14bd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] func1 -> DEBU 14bf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c0 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:53.927 UTC [cauthdsl] func1 -> DEBU 14c5 0xc0009e7d80 gate 1555913873927397500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.566 UTC [msp] DeserializeIdentity -> DEBU e8b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.566 UTC [protoutils] ValidateTransaction -> DEBU e8c ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-04-22 06:16:54.566 UTC [gossip.comm] Send -> DEBU e8d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 3}, Envelope: 4752 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:54.566 UTC [msp] DeserializeIdentity -> DEBU e8f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.566 UTC [committer.txvalidator] validateTx -> DEBU e8e Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:54.567 UTC [fsblkstorage] retrieveTransactionByID -> DEBU e90 retrieveTransactionByID() - txId = [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +peer0.org1.example.com | "2019-04-22 06:16:54.567 UTC [msp] DeserializeIdentity -> DEBU e91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.567 UTC [committer.txvalidator] validateTx -> DEBU e92 Validating transaction with plugins" +peer0.org1.example.com | "2019-04-22 06:16:54.567 UTC [committer.txvalidator] Dispatch -> DEBU e93 [businesschannel] Dispatch starts for bytes 0xc00320a000" +peer0.org1.example.com | "2019-04-22 06:16:54.568 UTC [gossip.comm] sendToEndpoint -> DEBU e94 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 3}, Envelope: 4752 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.568 UTC [gossip.comm] sendToEndpoint -> DEBU e96 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.568 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU e95 constructing new query executor txid = [41f89b8b-afb8-44ec-be1f-251e9ee679b9]" +peer0.org1.example.com | "2019-04-22 06:16:54.569 UTC [lockbasedtxmgr] Done -> DEBU e97 Done with transaction simulation / query execution [41f89b8b-afb8-44ec-be1f-251e9ee679b9]" +peer0.org1.example.com | "2019-04-22 06:16:54.569 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU e98 Validating Tx e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-04-22 06:16:54.570 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU e99 constructing new query executor txid = [97ccd8a2-ea8c-4363-aa46-bf573bc413a0]" +peer0.org1.example.com | "2019-04-22 06:16:54.570 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU e9a retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:54.571 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU e9b retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:54.571 UTC [lockbasedtxmgr] Done -> DEBU e9c Done with transaction simulation / query execution [97ccd8a2-ea8c-4363-aa46-bf573bc413a0]" +peer0.org1.example.com | "2019-04-22 06:16:54.572 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU e9d constructing new query executor txid = [3df653a5-ef12-4e24-9822-bbe6d5d74472]" +peer0.org1.example.com | "2019-04-22 06:16:54.573 UTC [lockbasedtxmgr] Done -> DEBU e9e Done with transaction simulation / query execution [3df653a5-ef12-4e24-9822-bbe6d5d74472]" +peer0.org1.example.com | "2019-04-22 06:16:54.574 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +peer0.org1.example.com | "2019-04-22 06:16:54.574 UTC [msp] DeserializeIdentity -> DEBU ea0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.575 UTC [msp.identity] newIdentity -> DEBU ea1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +peer0.org1.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +peer0.org1.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +peer0.org1.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:54.576 UTC [cauthdsl] func1 -> DEBU ea2 0xc0032195f0 gate 1555913814576680100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.577 UTC [cauthdsl] func2 -> DEBU ea3 0xc0032195f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:54.577 UTC [cauthdsl] func2 -> DEBU ea4 0xc0032195f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:54.578 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ea5 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:16:54.578 UTC [msp] Validate -> DEBU ea6 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:54.579 UTC [msp] getCertificationChain -> DEBU ea7 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:54.579 UTC [cauthdsl] func2 -> DEBU ea8 0xc0032195f0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.580 UTC [msp.identity] Verify -> DEBU ea9 Verify: digest = 00000000 8e 38 2b 46 4f e6 25 7d 9d 44 9b 24 cb 2e 75 ed |.8+FO.%}.D.$..u.| +peer0.org1.example.com | 00000010 9b fb 57 79 f6 00 2d 9a 36 34 98 d6 0c 09 02 0b |..Wy..-.64......|" +peer0.org1.example.com | "2019-04-22 06:16:54.580 UTC [msp.identity] Verify -> DEBU eaa Verify: sig = 00000000 30 44 02 20 4b fe 23 71 85 c3 99 22 fe 25 72 4c |0D. K.#q...".%rL| +peer0.org1.example.com | 00000010 8d 82 b6 99 d1 f4 3a 62 ec 23 66 2f fb 6d cb 6f |......:b.#f/.m.o| +peer0.org1.example.com | 00000020 ac e2 68 93 02 20 13 70 06 e8 d3 cc 5b 7b af a0 |..h.. .p....[{..| +peer0.org1.example.com | 00000030 2a 11 a3 f2 63 a1 b4 eb 1c 31 b4 85 0f 25 f3 09 |*...c....1...%..| +peer0.org1.example.com | 00000040 a0 3f 4a f9 95 e7 |.?J...|" +peer0.org1.example.com | "2019-04-22 06:16:54.581 UTC [cauthdsl] func2 -> DEBU eab 0xc0032195f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.581 UTC [cauthdsl] func1 -> DEBU eac 0xc0032195f0 gate 1555913814576680100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:54.581 UTC [policies] Evaluate -> DEBU ead Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:54.582 UTC [policies] Evaluate -> DEBU eae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:54.582 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU eaf constructing new query executor txid = [cf90f1c5-88fa-4e56-964f-592619d82c11]" +peer0.org1.example.com | "2019-04-22 06:16:54.582 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU eb0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +orderer0.example.com | "2019-04-22 06:17:53.927 UTC [cauthdsl] func2 -> DEBU 14c6 0xc0009e7d80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:53.927 UTC [cauthdsl] func2 -> DEBU 14c7 0xc0009e7d80 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:53.928 UTC [cauthdsl] func2 -> DEBU 14c8 0xc0009e7d80 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:53.928 UTC [msp.identity] Verify -> DEBU 14c9 Verify: digest = 00000000 16 c0 ca e6 17 f2 4f 03 36 f7 d2 d0 0e 9b 71 7c |......O.6.....q|| +orderer0.example.com | 00000010 fb d6 c1 fd c7 9f 51 49 e2 87 fe 21 eb 10 fc 6b |......QI...!...k|" +orderer0.example.com | "2019-04-22 06:17:53.928 UTC [msp.identity] Verify -> DEBU 14ca Verify: sig = 00000000 30 44 02 20 6a 54 83 90 4f 22 8c ee c5 65 4b 3e |0D. jT..O"...eK>| +orderer0.example.com | 00000010 cc 05 ac d6 c9 67 fa 1c 3b e7 ea 39 ef 75 af 1e |.....g..;..9.u..| +orderer0.example.com | 00000020 24 7c 67 f7 02 20 46 97 34 89 02 3a 82 f7 f1 b1 |$|g.. F.4..:....| +orderer0.example.com | 00000030 00 2b 27 d1 a5 3e 80 19 37 25 be b9 ac 2a d5 39 |.+'..>..7%...*.9| +orderer0.example.com | 00000040 14 1b 6f 1a ba ac |..o...|" +orderer0.example.com | "2019-04-22 06:17:53.929 UTC [cauthdsl] func2 -> DEBU 14cb 0xc0009e7d80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:53.929 UTC [cauthdsl] func1 -> DEBU 14cc 0xc0009e7d80 gate 1555913873927397500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14cd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14ce == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14cf Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:53.930 UTC [policies] Evaluate -> DEBU 14d1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.930 UTC [policies] Evaluate -> DEBU 14d2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:53.931 UTC [common.deliver] deliverBlocks -> DEBU 14d3 [channel: businesschannel] Received seekInfo (0xc000086dc0) start: > stop: > from 192.168.224.9:34722" +orderer0.example.com | "2019-04-22 06:17:53.931 UTC [fsblkstorage] Next -> DEBU 14d4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:53.931 UTC [fsblkstorage] newBlockfileStream -> DEBU 14d5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90565]" +orderer0.example.com | "2019-04-22 06:17:53.932 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14d6 Remaining bytes=[8101], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:53.932 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14d7 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +orderer0.example.com | "2019-04-22 06:17:53.932 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14d8 blockbytes [4048] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:53.932 UTC [common.deliver] deliverBlocks -> DEBU 14d9 [channel: businesschannel] Delivering block [7] for (0xc000086dc0) for 192.168.224.9:34722" +orderer0.example.com | "2019-04-22 06:17:53.932 UTC [common.deliver] deliverBlocks -> DEBU 14da [channel: businesschannel] Done delivering to 192.168.224.9:34722 for (0xc000086dc0)" +orderer0.example.com | "2019-04-22 06:17:53.933 UTC [fsblkstorage] waitForBlock -> DEBU 14db Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.933 UTC [fsblkstorage] waitForBlock -> DEBU 14dc Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.934 UTC [fsblkstorage] waitForBlock -> DEBU 14dd Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:53.934 UTC [fsblkstorage] waitForBlock -> DEBU 14de Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:53.934 UTC [common.deliver] Handle -> DEBU 14df Waiting for new SeekInfo from 192.168.224.9:34722" +orderer0.example.com | "2019-04-22 06:17:53.936 UTC [common.deliver] Handle -> DEBU 14e0 Attempting to read seek info message from 192.168.224.9:34722" +orderer0.example.com | "2019-04-22 06:17:53.943 UTC [common.deliver] Handle -> WARN 14e1 Error reading from 192.168.224.9:34722: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:53.943 UTC [orderer.common.server] func1 -> DEBU 14e2 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:53.943 UTC [comm.grpc.server] 1 -> INFO 14e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34722 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1651ms +orderer0.example.com | "2019-04-22 06:17:53.943 UTC [grpc] infof -> DEBU 14e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:54.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e5 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" +orderer0.example.com | "2019-04-22 06:17:54.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e6 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-04-22 06:17:54.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.7µs " +orderer0.example.com | "2019-04-22 06:17:54.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 926µs " +orderer0.example.com | "2019-04-22 06:17:54.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:54.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ea Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:54.166 UTC [orderer.common.server] Deliver -> DEBU 14eb Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:54.166 UTC [common.deliver] Handle -> DEBU 14ec Starting new deliver loop for 192.168.224.9:34724" +orderer0.example.com | "2019-04-22 06:17:54.166 UTC [common.deliver] Handle -> DEBU 14ed Attempting to read seek info message from 192.168.224.9:34724" +orderer0.example.com | "2019-04-22 06:17:54.167 UTC [policies] Evaluate -> DEBU 14ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.167 UTC [policies] Evaluate -> DEBU 14ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.168 UTC [policies] Evaluate -> DEBU 14f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.168 UTC [policies] Evaluate -> DEBU 14f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.168 UTC [policies] Evaluate -> DEBU 14f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.169 UTC [cauthdsl] func1 -> DEBU 14f3 0xc000e2abe0 gate 1555913874169592500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.583 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU eb1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:54.583 UTC [lockbasedtxmgr] Done -> DEBU eb2 Done with transaction simulation / query execution [cf90f1c5-88fa-4e56-964f-592619d82c11]" +peer0.org1.example.com | "2019-04-22 06:16:54.583 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU eb3 constructing new query executor txid = [8c5bbe6b-4f35-44bf-9e63-f104b09f25b8]" +peer0.org1.example.com | "2019-04-22 06:16:54.584 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU eb4 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:54.588 UTC [gossip.comm] func1 -> DEBU eb5 Got message: GossipMessage: nonce:1987853991020680669 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 137 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.588 UTC [gossip.privdata] handleRequest -> DEBU eb6 Got GossipMessage: nonce:1987853991020680669 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 137 bytes, Signature: 0 bytes from 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:16:54.588 UTC [gossip.privdata] CollectionRWSet -> DEBU eb7 Current ledger height 3 is below requested block sequence number 3 retrieving private data from transient store" +peer0.org1.example.com | "2019-04-22 06:16:54.588 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU eb8 Getting private data from transient store for transaction e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a" +peer0.org1.example.com | "2019-04-22 06:16:54.589 UTC [leveldbhelper] GetIterator -> DEBU eb9 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0xff}]" +peer0.org1.example.com | "2019-04-22 06:16:54.589 UTC [gossip.privdata] filterNotEligible -> DEBU eba Found 1 for TxID e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a , collection _implicit_org_Org1MSP for 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:16:54.589 UTC [msp] GetManagerForChain -> DEBU ebb Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:54.590 UTC [cauthdsl] func1 -> DEBU ebc 0xc003209310 gate 1555913814590135100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.590 UTC [cauthdsl] func2 -> DEBU ebd 0xc003209310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:54.590 UTC [cauthdsl] func2 -> DEBU ebe 0xc003209310 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:54.591 UTC [cauthdsl] func2 -> DEBU ebf 0xc003209310 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.591 UTC [msp.identity] Verify -> DEBU ec0 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:16:54.591 UTC [msp.identity] Verify -> DEBU ec1 Verify: sig = 00000000 30 45 02 21 00 de 07 f7 58 8f 6e be 26 43 85 81 |0E.!....X.n.&C..| +peer0.org1.example.com | 00000010 94 87 aa b3 b7 f1 38 54 98 16 8b 83 56 ea 42 77 |......8T....V.Bw| +peer0.org1.example.com | 00000020 6c 4d ef 10 96 02 20 67 54 66 04 83 18 8c fa 2e |lM.... gTf......| +peer0.org1.example.com | 00000030 c7 1c 9d 4c 35 22 86 ad e4 49 6a a2 75 5e 11 f8 |...L5"...Ij.u^..| +peer0.org1.example.com | 00000040 ff 03 29 1f ac f7 b2 |..)....|" +peer0.org1.example.com | "2019-04-22 06:16:54.592 UTC [cauthdsl] func2 -> DEBU ec2 0xc003209310 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.592 UTC [cauthdsl] func1 -> DEBU ec3 0xc003209310 gate 1555913814590135100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:54.592 UTC [gossip.privdata] func1 -> DEBU ec4 Returning 192.168.224.5:7051 1 elements" +peer0.org1.example.com | "2019-04-22 06:16:54.600 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ec5 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:54.602 UTC [lockbasedtxmgr] Done -> DEBU ec6 Done with transaction simulation / query execution [8c5bbe6b-4f35-44bf-9e63-f104b09f25b8]" +peer0.org1.example.com | "2019-04-22 06:16:54.602 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ec7 constructing new query executor txid = [ac659963-916c-4a27-84c7-91ee2d1f1096]" +peer0.org1.example.com | "2019-04-22 06:16:54.602 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ec8 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:54.603 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ec9 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:54.603 UTC [lockbasedtxmgr] Done -> DEBU eca Done with transaction simulation / query execution [ac659963-916c-4a27-84c7-91ee2d1f1096]" +peer0.org1.example.com | "2019-04-22 06:16:54.604 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ecb constructing new query executor txid = [c9fc1102-87f6-4d1d-abd6-d6e7bc5d4bc0]" +peer0.org1.example.com | "2019-04-22 06:16:54.604 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ecc retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:54.607 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ecd retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:54.610 UTC [lockbasedtxmgr] Done -> DEBU ece Done with transaction simulation / query execution [c9fc1102-87f6-4d1d-abd6-d6e7bc5d4bc0]" +peer0.org1.example.com | "2019-04-22 06:16:54.611 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ecf constructing new query executor txid = [48d8ed1c-c20c-462d-b783-7548c8680a00]" +peer0.org1.example.com | "2019-04-22 06:16:54.611 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ed0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:54.613 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ed1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:54.614 UTC [lockbasedtxmgr] Done -> DEBU ed2 Done with transaction simulation / query execution [48d8ed1c-c20c-462d-b783-7548c8680a00]" +peer0.org1.example.com | "2019-04-22 06:16:54.614 UTC [vscc] Validate -> DEBU ed3 block 3, namespace: _lifecycle, tx 0 validation results is: " +peer0.org1.example.com | "2019-04-22 06:16:54.616 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU ed4 Transaction e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a appears to be valid" +peer0.org1.example.com | "2019-04-22 06:16:54.616 UTC [committer.txvalidator] Dispatch -> DEBU ed5 [businesschannel] Dispatch completes env bytes 0xc00320a000" +peer0.org1.example.com | "2019-04-22 06:16:54.620 UTC [committer.txvalidator] Validate -> DEBU ed6 got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:16:54.620 UTC [committer.txvalidator] Validate -> INFO ed7 [businesschannel] Validated block [3] in 59ms" +peer0.org1.example.com | "2019-04-22 06:16:54.620 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ed8 constructing new query executor txid = [d531c8ed-73ac-479c-937f-70e1741416a5]" +peer0.org1.example.com | "2019-04-22 06:16:54.620 UTC [lockbasedtxmgr] Done -> DEBU ed9 Done with transaction simulation / query execution [d531c8ed-73ac-479c-937f-70e1741416a5]" +peer0.org1.example.com | "2019-04-22 06:16:54.621 UTC [msp] GetManagerForChain -> DEBU eda Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:54.621 UTC [cauthdsl] func1 -> DEBU edb 0xc0034fe120 gate 1555913814621120800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.621 UTC [cauthdsl] func2 -> DEBU edc 0xc0034fe120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:54.621 UTC [cauthdsl] func2 -> DEBU edd 0xc0034fe120 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:54.621 UTC [cauthdsl] func2 -> DEBU ede 0xc0034fe120 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.621 UTC [msp.identity] Verify -> DEBU edf Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... | +peer0.org1.example.com | 00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|" +peer0.org1.example.com | "2019-04-22 06:16:54.622 UTC [msp.identity] Verify -> DEBU ee0 Verify: sig = 00000000 30 44 02 20 4d 77 fd 8e 03 14 6d 30 40 a0 da a9 |0D. Mw....m0@...| +peer0.org1.example.com | 00000010 66 44 48 8b 79 ff 53 b0 7b ab c4 15 e9 02 10 28 |fDH.y.S.{......(| +peer0.org1.example.com | 00000020 57 67 8f 8d 02 20 1b 75 00 72 83 05 bf de 40 4b |Wg... .u.r....@K| +peer0.org1.example.com | 00000030 30 95 62 82 87 58 cf 86 89 8c 1c 50 ca 0c bc d9 |0.b..X.....P....| +peer0.org1.example.com | 00000040 60 71 07 23 6c 5e |`q.#l^|" +peer0.org1.example.com | "2019-04-22 06:16:54.622 UTC [cauthdsl] func2 -> DEBU ee1 0xc0034fe120 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.622 UTC [cauthdsl] func1 -> DEBU ee2 0xc0034fe120 gate 1555913814621120800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:54.622 UTC [gossip.privdata] listMissingPrivateData -> DEBU ee3 Retrieving private write sets for 1 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:16:54.622 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU ee4 Getting private data from transient store for transaction e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a" +peer0.org1.example.com | "2019-04-22 06:16:54.622 UTC [leveldbhelper] GetIterator -> DEBU ee5 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0xff}]" +peer0.org1.example.com | "2019-04-22 06:16:54.623 UTC [gossip.privdata] StoreBlock -> DEBU ee6 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:16:54.623 UTC [gossip.privdata] StoreBlock -> DEBU ee7 [businesschannel] Added 1 namespace private write sets for block [3], tran [0]" +peer0.org1.example.com | "2019-04-22 06:16:54.622 UTC [committer.txvalidator] validateTx -> DEBU ee8 [businesschannel] validateTx completes for block 0xc002502480 env 0xc0024f0be0 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:54.624 UTC [kvledger] CommitWithPvtData -> DEBU ee9 [businesschannel] Validating state for block [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.624 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU eea Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:16:54.624 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU eeb lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:16:54.624 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU eec Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:16:54.624 UTC [valimpl] ValidateAndPrepareBatch -> DEBU eed ValidateAndPrepareBatch() for block number = [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.625 UTC [valimpl] ValidateAndPrepareBatch -> DEBU eee preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:54.625 UTC [valimpl] preprocessProtoBlock -> DEBU eef txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-04-22 06:16:54.625 UTC [stateleveldb] GetState -> DEBU ef0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:16:54.625 UTC [statebasedval] validateKVRead -> DEBU ef1 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-04-22 06:16:54.625 UTC [stateleveldb] GetState -> DEBU ef2 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-04-22 06:16:54.625 UTC [stateleveldb] GetState -> DEBU ef3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:16:54.625 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU ef4 Block [3] Transaction index [0] TxId [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] marked as valid by state validator. ContainsPostOrderWrites [false]" +orderer0.example.com | "2019-04-22 06:17:54.170 UTC [cauthdsl] func2 -> DEBU 14f4 0xc000e2abe0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:54.171 UTC [cauthdsl] func2 -> DEBU 14f5 0xc000e2abe0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:54.171 UTC [cauthdsl] func2 -> DEBU 14f6 0xc000e2abe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:54.172 UTC [cauthdsl] func2 -> DEBU 14f7 0xc000e2abe0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:54.172 UTC [cauthdsl] func1 -> DEBU 14f8 0xc000e2abe0 gate 1555913874169592500 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:54.172 UTC [policies] Evaluate -> DEBU 14f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:54.173 UTC [policies] Evaluate -> DEBU 14fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:54.173 UTC [policies] Evaluate -> DEBU 14fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.174 UTC [cauthdsl] func1 -> DEBU 14fc 0xc000e2b450 gate 1555913874174470100 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:54.174 UTC [cauthdsl] func2 -> DEBU 14fd 0xc000e2b450 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:54.175 UTC [cauthdsl] func2 -> DEBU 14fe 0xc000e2b450 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:54.175 UTC [cauthdsl] func2 -> DEBU 14ff 0xc000e2b450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:17:54.175 UTC [cauthdsl] func2 -> DEBU 1500 0xc000e2b450 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:17:54.176 UTC [cauthdsl] func1 -> DEBU 1501 0xc000e2b450 gate 1555913874174470100 evaluation fails" +orderer0.example.com | "2019-04-22 06:17:54.176 UTC [policies] Evaluate -> DEBU 1502 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:54.176 UTC [policies] Evaluate -> DEBU 1503 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:17:54.177 UTC [policies] func1 -> DEBU 1504 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:17:54.177 UTC [policies] Evaluate -> DEBU 1505 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:54.177 UTC [policies] Evaluate -> DEBU 1506 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:17:54.178 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.178 UTC [policies] Evaluate -> DEBU 1508 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.179 UTC [policies] Evaluate -> DEBU 1509 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.179 UTC [cauthdsl] func1 -> DEBU 150a 0xc0009d8400 gate 1555913874179768300 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:54.181 UTC [cauthdsl] func2 -> DEBU 150b 0xc0009d8400 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:54.182 UTC [cauthdsl] func2 -> DEBU 150c 0xc0009d8400 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:54.182 UTC [cauthdsl] func2 -> DEBU 150d 0xc0009d8400 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:54.183 UTC [msp.identity] Verify -> DEBU 150e Verify: digest = 00000000 4f 70 e5 c2 a6 fa 69 d3 8d 0f 03 f9 a8 67 4c e8 |Op....i......gL.| +orderer0.example.com | 00000010 04 35 cd f6 f6 f3 d8 4c 0c 85 b4 bb 65 e6 08 9c |.5.....L....e...|" +orderer0.example.com | "2019-04-22 06:17:54.183 UTC [msp.identity] Verify -> DEBU 150f Verify: sig = 00000000 30 44 02 20 77 a5 7f e7 f5 7b f1 98 b9 f2 b7 a3 |0D. w....{......| +orderer0.example.com | 00000010 2e b1 b4 62 48 e1 f4 2c 33 55 8d fc b7 9a 7e 68 |...bH..,3U....~h| +orderer0.example.com | 00000020 25 47 2f 25 02 20 57 36 f3 6d 23 6b 91 81 2b d4 |%G/%. W6.m#k..+.| +orderer0.example.com | 00000030 48 3e 2e 28 0b d9 bb 86 e0 96 70 bb d8 c2 61 3d |H>.(......p...a=| +orderer0.example.com | 00000040 b5 c8 d3 24 cb 3e |...$.>|" +orderer0.example.com | "2019-04-22 06:17:54.184 UTC [cauthdsl] func2 -> DEBU 1510 0xc0009d8400 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:54.185 UTC [cauthdsl] func1 -> DEBU 1511 0xc0009d8400 gate 1555913874179768300 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:54.185 UTC [policies] Evaluate -> DEBU 1512 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.185 UTC [policies] Evaluate -> DEBU 1513 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.186 UTC [policies] Evaluate -> DEBU 1514 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.186 UTC [policies] Evaluate -> DEBU 1515 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.187 UTC [policies] Evaluate -> DEBU 1516 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:54.187 UTC [policies] Evaluate -> DEBU 1517 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [valinternal] ApplyWriteSet -> DEBU ef5 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0024f5300), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0024f5340), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0024f5380), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0024f53c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0024f5440)}" +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [valimpl] ValidateAndPrepareBatch -> DEBU ef6 validating rwset..." +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [valimpl] ValidateAndPrepareBatch -> DEBU ef7 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [valimpl] ValidateAndPrepareBatch -> DEBU ef8 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU ef9 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x24ce6a0 0xc000413c00 0x25df440 0xc00000e380}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025e9880 map[]})]}" +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [cceventmgmt] HandleStateUpdates -> DEBU efa Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU efb Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +peer0.org1.example.com | "2019-04-22 06:16:54.626 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU efc Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440})}" +peer0.org1.example.com | "2019-04-22 06:16:54.629 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU efd Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 83 170 140 173 163 251 80 149 96 210 221 94 183 62 19 157 250 115 43 249 173 224 186 3 250 95 126 110 189 166 49 57 2 32 114 246 129 162 164 229 222 122 103 218 14 36 179 42 12 169 194 151 81 96 101 122 194 28 168 50 204 94 230 88 39 177]} 0x14d8920}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00265fa40 0xc002563680 0xc002654dc0})]}" +peer0.org1.example.com | "2019-04-22 06:16:54.629 UTC [confighistory] HandleStateUpdates -> ERRO efe Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00350cd80)}" +peer0.org1.example.com | "2019-04-22 06:16:54.629 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU eff Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*confighistory.dbProvider=&{0xc00000cb00})}" +peer0.org1.example.com | "2019-04-22 06:16:54.630 UTC [kvledger] CommitWithPvtData -> DEBU f00 [businesschannel] Committing block [3] to storage" +peer0.org1.example.com | "2019-04-22 06:16:54.630 UTC [ledgerstorage] CommitWithPvtData -> DEBU f01 Writing block [3] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:16:54.631 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU f02 constructing new query executor txid = [1d3a9a81-0630-40da-8345-77f5cc037243]" +peer0.org1.example.com | "2019-04-22 06:16:54.631 UTC [lockbasedtxmgr] Done -> DEBU f03 Done with transaction simulation / query execution [1d3a9a81-0630-40da-8345-77f5cc037243]" +peer0.org1.example.com | "2019-04-22 06:16:54.637 UTC [pvtdatastorage] Prepare -> DEBU f04 Saved 1 private data write sets for block [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.647 UTC [fsblkstorage] indexBlock -> DEBU f05 Indexing block [blockNum=3, blockHash=[]byte{0x74, 0x44, 0x89, 0x23, 0x4f, 0x72, 0x94, 0x3a, 0x8a, 0x3a, 0x90, 0x5b, 0x48, 0x2, 0x23, 0x87, 0x42, 0x1b, 0x92, 0x93, 0x84, 0xb, 0xa0, 0x22, 0x97, 0x21, 0x7, 0x5f, 0x9d, 0x35, 0xac, 0x69} txOffsets= +peer0.org1.example.com | txId=e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a locPointer=offset=70, bytesLength=3703 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:16:54.647 UTC [fsblkstorage] indexBlock -> DEBU f06 Adding txLoc [fileSuffixNum=0, offset=71445, bytesLength=3703] for tx ID: [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] to txid-index" +peer0.org1.example.com | "2019-04-22 06:16:54.648 UTC [fsblkstorage] indexBlock -> DEBU f07 Adding txLoc [fileSuffixNum=0, offset=71445, bytesLength=3703] for tx number:[0] ID: [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:16:54.651 UTC [fsblkstorage] updateCheckpoint -> DEBU f08 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76086], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2019-04-22 06:17:54.187 UTC [common.deliver] deliverBlocks -> DEBU 1518 [channel: businesschannel] Received seekInfo (0xc000d12bc0) start: > stop: > from 192.168.224.9:34724" +orderer0.example.com | "2019-04-22 06:17:54.188 UTC [fsblkstorage] Next -> DEBU 1519 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +orderer0.example.com | "2019-04-22 06:17:54.188 UTC [fsblkstorage] newBlockfileStream -> DEBU 151a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +orderer0.example.com | "2019-04-22 06:17:54.189 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 151b Remaining bytes=[4051], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:54.189 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 151c Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +orderer0.example.com | "2019-04-22 06:17:54.190 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 151d blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:54.190 UTC [common.deliver] deliverBlocks -> DEBU 151e [channel: businesschannel] Delivering block [8] for (0xc000d12bc0) for 192.168.224.9:34724" +orderer0.example.com | "2019-04-22 06:17:54.190 UTC [common.deliver] deliverBlocks -> DEBU 151f [channel: businesschannel] Done delivering to 192.168.224.9:34724 for (0xc000d12bc0)" +orderer0.example.com | "2019-04-22 06:17:54.193 UTC [fsblkstorage] waitForBlock -> DEBU 1520 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:54.194 UTC [fsblkstorage] waitForBlock -> DEBU 1521 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:54.194 UTC [fsblkstorage] waitForBlock -> DEBU 1522 Came out of wait. maxAvailaBlockNumber=[8]" +orderer0.example.com | "2019-04-22 06:17:54.194 UTC [fsblkstorage] waitForBlock -> DEBU 1523 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +orderer0.example.com | "2019-04-22 06:17:54.195 UTC [common.deliver] Handle -> DEBU 1524 Waiting for new SeekInfo from 192.168.224.9:34724" +orderer0.example.com | "2019-04-22 06:17:54.197 UTC [common.deliver] Handle -> DEBU 1525 Attempting to read seek info message from 192.168.224.9:34724" +orderer0.example.com | "2019-04-22 06:17:54.201 UTC [grpc] infof -> DEBU 1526 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:54.203 UTC [common.deliver] Handle -> WARN 1527 Error reading from 192.168.224.9:34724: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:54.203 UTC [orderer.common.server] func1 -> DEBU 1528 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:54.203 UTC [comm.grpc.server] 1 -> INFO 1529 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34724 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.6178ms +orderer0.example.com | "2019-04-22 06:17:54.231 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:54.231 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 152b Sending msg of 28 bytes to 3 on channel testchainid took 35.1µs" +orderer0.example.com | "2019-04-22 06:17:54.233 UTC [orderer.common.cluster.step] sendMessage -> DEBU 152c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 315.2µs " +orderer0.example.com | "2019-04-22 06:17:54.489 UTC [orderer.common.server] Deliver -> DEBU 152d Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:54.512 UTC [common.deliver] Handle -> DEBU 152e Starting new deliver loop for 192.168.224.9:34726" +orderer0.example.com | "2019-04-22 06:17:54.553 UTC [common.deliver] Handle -> DEBU 152f Attempting to read seek info message from 192.168.224.9:34726" +orderer0.example.com | "2019-04-22 06:17:54.556 UTC [policies] Evaluate -> DEBU 1530 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.556 UTC [policies] Evaluate -> DEBU 1531 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.557 UTC [policies] Evaluate -> DEBU 1532 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.557 UTC [policies] Evaluate -> DEBU 1533 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.558 UTC [policies] Evaluate -> DEBU 1534 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.558 UTC [msp] DeserializeIdentity -> DEBU 1535 Obtaining identity" +orderer0.example.com | "2019-04-22 06:17:54.558 UTC [msp.identity] newIdentity -> DEBU 1536 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:17:54.559 UTC [cauthdsl] func1 -> DEBU 1537 0xc000bf7160 gate 1555913874559720500 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:54.560 UTC [cauthdsl] func2 -> DEBU 1538 0xc000bf7160 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:54.560 UTC [cauthdsl] func2 -> DEBU 1539 0xc000bf7160 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:54.561 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 153a Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-04-22 06:17:54.561 UTC [msp] Validate -> DEBU 153b MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:17:54.561 UTC [cauthdsl] func2 -> DEBU 153c 0xc000bf7160 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.651 UTC [pvtdatastorage] Commit -> DEBU f09 Committing private data for block [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.651 UTC [fsblkstorage] waitForBlock -> DEBU f0a Came out of wait. maxAvailaBlockNumber=[3]" +peer0.org1.example.com | "2019-04-22 06:16:54.652 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f0b Remaining bytes=[4711], Going to peek [8] bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.652 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f0c Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71375], bytesOffset=[71377]}" +peer0.org1.example.com | "2019-04-22 06:16:54.654 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f0d blockbytes [4709] read from file [0]" +peer0.org1.example.com | "2019-04-22 06:16:54.656 UTC [pvtdatastorage] Commit -> DEBU f0e Committed private data for block [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.656 UTC [kvledger] CommitWithPvtData -> DEBU f0f [businesschannel] Committing block [3] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:16:54.656 UTC [lockbasedtxmgr] Commit -> DEBU f10 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:54.656 UTC [lockbasedtxmgr] Commit -> DEBU f11 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:54.657 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f12 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:16:54.657 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f13 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +peer0.org1.example.com | "2019-04-22 06:16:54.657 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f14 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +peer0.org1.example.com | "2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f15 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +peer0.org1.example.com | "2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f16 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +peer0.org1.example.com | "2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f17 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +peer0.org1.example.com | "2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f18 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +peer0.org1.example.com | "2019-04-22 06:16:54.658 UTC [lockbasedtxmgr] Commit -> DEBU f19 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:54.659 UTC [stateleveldb] ApplyUpdates -> DEBU f1a Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]" +peer0.org1.example.com | "2019-04-22 06:16:54.659 UTC [stateleveldb] ApplyUpdates -> DEBU f1b Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +peer0.org1.example.com | "2019-04-22 06:16:54.659 UTC [stateleveldb] ApplyUpdates -> DEBU f1c Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +peer0.org1.example.com | "2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f1d Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +peer0.org1.example.com | "2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f1e Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +peer0.org1.example.com | "2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f1f Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +peer0.org1.example.com | "2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f20 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +orderer0.example.com | "2019-04-22 06:17:54.561 UTC [msp.identity] Verify -> DEBU 153d Verify: digest = 00000000 7a 79 5f 82 80 f5 91 16 0d 32 c2 48 cd be 21 f1 |zy_......2.H..!.| +orderer0.example.com | 00000010 9b 02 07 26 ca bc d3 42 5d 0b 2b 89 59 74 5f a3 |...&...B].+.Yt_.|" +orderer0.example.com | "2019-04-22 06:17:54.561 UTC [msp.identity] Verify -> DEBU 153e Verify: sig = 00000000 30 45 02 21 00 9f c5 3d 1e 4c c7 48 03 d0 07 7f |0E.!...=.L.H....| +orderer0.example.com | 00000010 91 53 80 41 a5 5a 12 2e 14 b7 1d af 46 e4 9c 76 |.S.A.Z......F..v| +orderer0.example.com | 00000020 f5 09 74 e0 3e 02 20 36 30 27 66 3c a4 d3 c2 06 |..t.>. 60'f<....| +orderer0.example.com | 00000030 66 60 f8 83 d7 33 fb cf b3 fc b8 a6 5b b4 88 f0 |f`...3......[...| +orderer0.example.com | 00000040 b8 f0 f2 a0 fa 6c dc |.....l.|" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [cauthdsl] func2 -> DEBU 153f 0xc000bf7160 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [cauthdsl] func1 -> DEBU 1540 0xc000bf7160 gate 1555913874559720500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1541 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1542 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1543 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1544 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1545 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1546 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [common.deliver] deliverBlocks -> DEBU 1547 [channel: testchainid] Received seekInfo (0xc000d13300) start: > stop: > from 192.168.224.9:34726" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [fsblkstorage] Next -> DEBU 1548 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [fsblkstorage] newBlockfileStream -> DEBU 1549 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 154a Remaining bytes=[25828], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 154b Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 154c blockbytes [25825] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:54.562 UTC [common.deliver] deliverBlocks -> DEBU 154d [channel: testchainid] Delivering block [1] for (0xc000d13300) for 192.168.224.9:34726" +orderer0.example.com | "2019-04-22 06:17:54.563 UTC [common.deliver] deliverBlocks -> DEBU 154e [channel: testchainid] Done delivering to 192.168.224.9:34726 for (0xc000d13300)" +orderer0.example.com | "2019-04-22 06:17:54.563 UTC [common.deliver] Handle -> DEBU 154f Waiting for new SeekInfo from 192.168.224.9:34726" +orderer0.example.com | "2019-04-22 06:17:54.563 UTC [common.deliver] Handle -> DEBU 1550 Attempting to read seek info message from 192.168.224.9:34726" +peer0.org1.example.com | "2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f21 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +peer0.org1.example.com | "2019-04-22 06:16:54.661 UTC [stateleveldb] ApplyUpdates -> DEBU f22 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +peer0.org1.example.com | "2019-04-22 06:16:54.661 UTC [stateleveldb] ApplyUpdates -> DEBU f23 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���R���l� DEBU f24 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +peer0.org1.example.com | "2019-04-22 06:16:54.662 UTC [stateleveldb] ApplyUpdates -> DEBU f25 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +peer0.org1.example.com | "2019-04-22 06:16:54.668 UTC [lockbasedtxmgr] Commit -> DEBU f26 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:16:54.668 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU f27 Preparing potential purge list working-set for expiringAtBlk [4]" +peer0.org1.example.com | "2019-04-22 06:16:54.669 UTC [leveldbhelper] GetIterator -> DEBU f29 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:16:54.669 UTC [lockbasedtxmgr] func1 -> DEBU f28 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:16:54.670 UTC [kvledger] CommitWithPvtData -> DEBU f2a [businesschannel] Committing block [3] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:16:54.670 UTC [historyleveldb] Commit -> DEBU f2b Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:16:54.670 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU f2c No expiry entry found for expiringAtBlk [4]" +peer0.org1.example.com | "2019-04-22 06:16:54.673 UTC [historyleveldb] Commit -> DEBU f2d Channel [businesschannel]: Updates committed to history database for blockNo [3]" +peer0.org1.example.com | "2019-04-22 06:16:54.673 UTC [kvledger] CommitWithPvtData -> INFO f2e [businesschannel] Committed block [3] with 1 transaction(s) in 49ms (state_validation=6ms block_commit=26ms state_commit=13ms)" +peer0.org1.example.com | "2019-04-22 06:16:54.674 UTC [transientstore] PurgeByTxids -> DEBU f2f Purging private data from transient store for committed txids" +peer0.org1.example.com | "2019-04-22 06:16:54.674 UTC [leveldbhelper] GetIterator -> DEBU f30 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0xff}]" +peer0.org1.example.com | "2019-04-22 06:16:54.674 UTC [common.deliver] deliverBlocks -> DEBU f31 [channel: businesschannel] Delivering block [3] for (0xc0036aba80) for 192.168.224.9:49236" +peer0.org1.example.com | "2019-04-22 06:16:54.675 UTC [fsblkstorage] waitForBlock -> DEBU f32 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +peer0.org1.example.com | "2019-04-22 06:16:54.676 UTC [msp.identity] Sign -> DEBU f33 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020804 " +peer0.org1.example.com | "2019-04-22 06:16:54.676 UTC [msp.identity] Sign -> DEBU f34 Sign: digest: BCD5910C85D65EF8CACC46BB49A27E3082ABE84988D89C486435E9336520CA2E " +peer0.org1.example.com | "2019-04-22 06:16:54.677 UTC [gossip.state] commitBlock -> DEBU f35 [businesschannel] Committed block [3] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:16:54.684 UTC [common.deliver] deliverBlocks -> DEBU f36 Context canceled, aborting wait for next block" +peer0.org1.example.com | "2019-04-22 06:16:54.684 UTC [common.deliverevents] func1 -> DEBU f37 Closing Deliver stream" +peer0.org1.example.com | "2019-04-22 06:16:54.684 UTC [comm.grpc.server] 1 -> INFO f38 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:17:22.555Z grpc.peer_address=192.168.224.9:49236 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1609702s +peer0.org1.example.com | "2019-04-22 06:16:54.685 UTC [grpc] infof -> DEBU f39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:54.685 UTC [grpc] infof -> DEBU f3a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:54.685 UTC [fsblkstorage] waitForBlock -> DEBU f3b Came out of wait. maxAvailaBlockNumber=[3]" +peer0.org1.example.com | "2019-04-22 06:16:54.884 UTC [gossip.pull] Hello -> DEBU f3c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:54.884 UTC [gossip.comm] Send -> DEBU f3d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:54.884 UTC [gossip.pull] Hello -> DEBU f3e Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +orderer0.example.com | "2019-04-22 06:17:54.568 UTC [common.deliver] Handle -> WARN 1551 Error reading from 192.168.224.9:34726: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:54.569 UTC [orderer.common.server] func1 -> DEBU 1553 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:54.569 UTC [comm.grpc.server] 1 -> INFO 1554 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34726 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=80.7047ms +orderer0.example.com | "2019-04-22 06:17:54.569 UTC [grpc] infof -> DEBU 1552 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:54.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1555 Sending msg of 28 bytes to 3 on channel businesschannel took 689.3µs" +orderer0.example.com | "2019-04-22 06:17:54.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1556 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.7µs " +orderer0.example.com | "2019-04-22 06:17:54.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1557 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:54.581 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1558 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-04-22 06:17:54.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1559 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.1µs " +orderer0.example.com | "2019-04-22 06:17:54.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU 155a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:54.783 UTC [orderer.common.cluster.step] handleMessage -> DEBU 155b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:54.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155c Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +orderer0.example.com | "2019-04-22 06:17:54.784 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +orderer0.example.com | "2019-04-22 06:17:54.794 UTC [orderer.common.server] Deliver -> DEBU 155e Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:54.794 UTC [common.deliver] Handle -> DEBU 155f Starting new deliver loop for 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.794 UTC [common.deliver] Handle -> DEBU 1560 Attempting to read seek info message from 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.795 UTC [policies] Evaluate -> DEBU 1561 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.795 UTC [policies] Evaluate -> DEBU 1562 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.795 UTC [policies] Evaluate -> DEBU 1563 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.796 UTC [policies] Evaluate -> DEBU 1564 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.796 UTC [policies] Evaluate -> DEBU 1565 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.796 UTC [cauthdsl] func1 -> DEBU 1566 0xc00125c330 gate 1555913874796838100 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:54.797 UTC [cauthdsl] func2 -> DEBU 1567 0xc00125c330 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:54.797 UTC [cauthdsl] func2 -> DEBU 1568 0xc00125c330 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:54.797 UTC [cauthdsl] func2 -> DEBU 1569 0xc00125c330 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:54.797 UTC [msp.identity] Verify -> DEBU 156a Verify: digest = 00000000 c2 32 90 a5 cc b0 57 d8 e2 83 65 0b 53 1f 85 1e |.2....W...e.S...| +orderer0.example.com | 00000010 d5 ea cc 82 89 9c f1 5e 34 af 59 36 26 59 a9 5e |.......^4.Y6&Y.^|" +orderer0.example.com | "2019-04-22 06:17:54.798 UTC [msp.identity] Verify -> DEBU 156b Verify: sig = 00000000 30 45 02 21 00 c4 0a 7c 3f f0 cd 1f 35 16 a7 91 |0E.!...|?...5...| +orderer0.example.com | 00000010 a4 eb 5e 37 4e a0 bc 31 9d 0e f4 83 73 f6 11 f5 |..^7N..1....s...| +orderer0.example.com | 00000020 cd 9b 9f fa 0e 02 20 27 18 70 d0 16 bd cb 1c 2d |...... '.p.....-| +orderer0.example.com | 00000030 44 3c 1b 19 de 2c a6 a2 06 a9 c9 9e 02 15 27 f6 |D<...,........'.| +orderer0.example.com | 00000040 7e 8b 2a 53 af 98 77 |~.*S..w|" +orderer0.example.com | "2019-04-22 06:17:54.798 UTC [cauthdsl] func2 -> DEBU 156c 0xc00125c330 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:54.798 UTC [cauthdsl] func1 -> DEBU 156d 0xc00125c330 gate 1555913874796838100 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:54.799 UTC [policies] Evaluate -> DEBU 156e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.799 UTC [policies] Evaluate -> DEBU 156f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.799 UTC [policies] Evaluate -> DEBU 1570 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.800 UTC [policies] Evaluate -> DEBU 1571 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.800 UTC [policies] Evaluate -> DEBU 1572 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:54.801 UTC [policies] Evaluate -> DEBU 1573 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:54.801 UTC [common.deliver] deliverBlocks -> DEBU 1574 [channel: testchainid] Received seekInfo (0xc000d13a40) start: > stop: > from 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.801 UTC [fsblkstorage] Next -> DEBU 1575 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:17:54.802 UTC [fsblkstorage] newBlockfileStream -> DEBU 1576 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-04-22 06:17:54.802 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1577 Remaining bytes=[25828], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:54.802 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1578 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-04-22 06:17:54.802 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1579 blockbytes [25825] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:54.803 UTC [common.deliver] deliverBlocks -> DEBU 157a [channel: testchainid] Delivering block [1] for (0xc000d13a40) for 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.803 UTC [common.deliver] deliverBlocks -> DEBU 157b [channel: testchainid] Done delivering to 192.168.224.9:34728 for (0xc000d13a40)" +orderer0.example.com | "2019-04-22 06:17:54.804 UTC [common.deliver] Handle -> DEBU 157c Waiting for new SeekInfo from 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.804 UTC [common.deliver] Handle -> DEBU 157d Attempting to read seek info message from 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 157e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.885 UTC [gossip.comm] Send -> DEBU f3f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:54.885 UTC [gossip.pull] Hello -> DEBU f41 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:54.885 UTC [gossip.comm] Send -> DEBU f42 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:54.885 UTC [gossip.comm] sendToEndpoint -> DEBU f43 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.886 UTC [gossip.comm] sendToEndpoint -> DEBU f44 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.886 UTC [gossip.comm] sendToEndpoint -> DEBU f45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.886 UTC [gossip.comm] sendToEndpoint -> DEBU f46 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.885 UTC [gossip.comm] sendToEndpoint -> DEBU f40 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.887 UTC [gossip.comm] sendToEndpoint -> DEBU f47 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.891 UTC [gossip.gossip] handleMessage -> DEBU f48 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8121746611979298058 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.892 UTC [gossip.pull] HandleMessage -> DEBU f49 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8121746611979298058 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.892 UTC [gossip.gossip] handleMessage -> DEBU f4a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.893 UTC [gossip.comm] func1 -> DEBU f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15285500438109566118 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.893 UTC [gossip.gossip] handleMessage -> DEBU f4c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15285500438109566118 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.893 UTC [gossip.pull] HandleMessage -> DEBU f4d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15285500438109566118 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.893 UTC [gossip.gossip] handleMessage -> DEBU f4e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.894 UTC [gossip.comm] func1 -> DEBU f4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 341205638586266595 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.894 UTC [gossip.gossip] handleMessage -> DEBU f50 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 341205638586266595 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.894 UTC [gossip.pull] HandleMessage -> DEBU f51 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 341205638586266595 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.895 UTC [gossip.gossip] handleMessage -> DEBU f52 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.897 UTC [msp.identity] Sign -> DEBU f53 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151014 " +peer0.org1.example.com | "2019-04-22 06:16:54.897 UTC [msp.identity] Sign -> DEBU f54 Sign: digest: 7F1D118D8C1AEB40DA7473D50AEE85DCF7905E837B1A6AF0EC140A9626B47F64 " +peer0.org1.example.com | "2019-04-22 06:16:54.897 UTC [msp.identity] Sign -> DEBU f55 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:54.898 UTC [msp.identity] Sign -> DEBU f56 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:54.898 UTC [gossip.comm] Send -> DEBU f57 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:54.898 UTC [msp] DeserializeIdentity -> DEBU f58 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.899 UTC [gossip.comm] Send -> DEBU f5a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 157f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 1580 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 1581 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:54.807 UTC [policies] Evaluate -> DEBU 1582 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:54.807 UTC [cauthdsl] func1 -> DEBU 1583 0xc001268370 gate 1555913874807379600 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:54.807 UTC [cauthdsl] func2 -> DEBU 1584 0xc001268370 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:54.807 UTC [cauthdsl] func2 -> DEBU 1585 0xc001268370 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:54.808 UTC [cauthdsl] func2 -> DEBU 1586 0xc001268370 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:54.808 UTC [msp.identity] Verify -> DEBU 1587 Verify: digest = 00000000 c6 e0 ac d3 04 a7 b6 98 ea bc c2 1b b6 92 cc b5 |................| +orderer0.example.com | 00000010 ba fa 43 a5 5d 3b cd 44 b4 02 70 d3 33 39 44 51 |..C.];.D..p.39DQ|" +orderer0.example.com | "2019-04-22 06:17:54.809 UTC [msp.identity] Verify -> DEBU 1588 Verify: sig = 00000000 30 45 02 21 00 b1 24 e8 c4 23 a3 e8 4c 8d 9b 22 |0E.!..$..#..L.."| +orderer0.example.com | 00000010 46 6c 33 af 51 5b 1b 11 e1 85 59 4f da ba d8 f0 |Fl3.Q[....YO....| +orderer0.example.com | 00000020 95 27 be 74 9a 02 20 6b 6e 91 47 99 87 59 ac d3 |.'.t.. kn.G..Y..| +orderer0.example.com | 00000030 0e cf b0 84 13 13 0a 03 70 d8 dc 75 a2 0d a9 78 |........p..u...x| +orderer0.example.com | 00000040 d9 3f 4c 69 15 d5 9b |.?Li...|" +orderer0.example.com | "2019-04-22 06:17:54.810 UTC [cauthdsl] func2 -> DEBU 1589 0xc001268370 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:54.810 UTC [cauthdsl] func1 -> DEBU 158a 0xc001268370 gate 1555913874807379600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:54.811 UTC [policies] Evaluate -> DEBU 158b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.811 UTC [policies] Evaluate -> DEBU 158c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:54.812 UTC [policies] Evaluate -> DEBU 158d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.812 UTC [policies] Evaluate -> DEBU 158e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:54.813 UTC [policies] Evaluate -> DEBU 158f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:54.813 UTC [policies] Evaluate -> DEBU 1590 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:54.814 UTC [common.deliver] deliverBlocks -> DEBU 1591 [channel: testchainid] Received seekInfo (0xc000d13e80) start: > stop: > from 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.814 UTC [fsblkstorage] Next -> DEBU 1592 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:17:54.815 UTC [fsblkstorage] newBlockfileStream -> DEBU 1593 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:17:54.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1594 Remaining bytes=[44243], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:54.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1595 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:17:54.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1596 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:54.816 UTC [common.deliver] deliverBlocks -> DEBU 1597 [channel: testchainid] Delivering block [0] for (0xc000d13e80) for 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.817 UTC [common.deliver] deliverBlocks -> DEBU 1598 [channel: testchainid] Done delivering to 192.168.224.9:34728 for (0xc000d13e80)" +orderer0.example.com | "2019-04-22 06:17:54.817 UTC [common.deliver] Handle -> DEBU 1599 Waiting for new SeekInfo from 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.818 UTC [common.deliver] Handle -> DEBU 159a Attempting to read seek info message from 192.168.224.9:34728" +orderer0.example.com | "2019-04-22 06:17:54.829 UTC [common.deliver] Handle -> WARN 159b Error reading from 192.168.224.9:34728: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:54.830 UTC [orderer.common.server] func1 -> DEBU 159c Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:54.830 UTC [comm.grpc.server] 1 -> INFO 159d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34728 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.7249ms +orderer0.example.com | "2019-04-22 06:17:54.829 UTC [grpc] infof -> DEBU 159e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:55.040 UTC [orderer.common.server] Deliver -> DEBU 159f Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:55.040 UTC [common.deliver] Handle -> DEBU 15a0 Starting new deliver loop for 192.168.224.9:34730" +orderer0.example.com | "2019-04-22 06:17:55.040 UTC [common.deliver] Handle -> DEBU 15a1 Attempting to read seek info message from 192.168.224.9:34730" +orderer0.example.com | "2019-04-22 06:17:55.041 UTC [policies] Evaluate -> DEBU 15a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.899 UTC [gossip.comm] sendToEndpoint -> DEBU f59 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.899 UTC [gossip.comm] sendToEndpoint -> DEBU f5b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.899 UTC [msp] DeserializeIdentity -> DEBU f5c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.901 UTC [gossip.comm] sendToEndpoint -> DEBU f5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.902 UTC [gossip.comm] sendToEndpoint -> DEBU f5e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.912 UTC [gossip.gossip] handleMessage -> DEBU f5f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.913 UTC [gossip.gossip] handleMessage -> DEBU f60 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU f61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.914 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f62 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:54.914 UTC [msp.identity] Verify -> DEBU f63 Verify: digest = 00000000 7f 1d 11 8d 8c 1a eb 40 da 74 73 d5 0a ee 85 dc |.......@.ts.....| +peer0.org1.example.com | 00000010 f7 90 5e 83 7b 1a 6a f0 ec 14 0a 96 26 b4 7f 64 |..^.{.j.....&..d|" +peer0.org1.example.com | "2019-04-22 06:16:54.914 UTC [msp.identity] Verify -> DEBU f64 Verify: sig = 00000000 30 44 02 20 06 b4 d9 d9 ad 81 6c 89 44 72 30 a9 |0D. ......l.Dr0.| +peer0.org1.example.com | 00000010 b2 21 ca b8 78 8a 9f fc cc a9 f9 e6 53 6a 97 15 |.!..x.......Sj..| +peer0.org1.example.com | 00000020 00 26 6e ad 02 20 4b 2a 91 22 8d 86 bb 19 df ca |.&n.. K*."......| +peer0.org1.example.com | 00000030 78 3c 07 60 e5 aa 71 25 8d 36 aa e5 1e c0 27 a6 |x<.`..q%.6....'.| +peer0.org1.example.com | 00000040 d0 77 cc 34 d9 a0 |.w.4..|" +peer0.org1.example.com | "2019-04-22 06:16:54.915 UTC [gossip.comm] func1 -> DEBU f65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.915 UTC [gossip.gossip] handleMessage -> DEBU f66 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.916 UTC [gossip.discovery] handleAliveMessage -> DEBU f67 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.916 UTC [gossip.discovery] isSentByMe -> DEBU f68 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.916 UTC [gossip.comm] Send -> DEBU f69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:54.916 UTC [gossip.discovery] handleAliveMessage -> DEBU f6a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f6b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:54.917 UTC [msp] DeserializeIdentity -> DEBU f6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.916 UTC [gossip.comm] sendToEndpoint -> DEBU f6d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:55.042 UTC [cauthdsl] func1 -> DEBU 15a7 0xc001344840 gate 1555913875042953100 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:55.043 UTC [cauthdsl] func2 -> DEBU 15a8 0xc001344840 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:55.043 UTC [cauthdsl] func2 -> DEBU 15a9 0xc001344840 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:55.043 UTC [cauthdsl] func2 -> DEBU 15aa 0xc001344840 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:55.044 UTC [msp.identity] Verify -> DEBU 15ab Verify: digest = 00000000 7f b6 9a 93 ff 1f ce da e4 eb cd 7c 31 c6 7d a2 |...........|1.}.| +orderer0.example.com | 00000010 97 75 34 8a 3b 53 5c 4b 42 85 4b 1a fd e8 a3 26 |.u4.;S\KB.K....&|" +orderer0.example.com | "2019-04-22 06:17:55.044 UTC [msp.identity] Verify -> DEBU 15ac Verify: sig = 00000000 30 45 02 21 00 dd c7 59 b7 48 ea 67 f7 17 e0 ac |0E.!...Y.H.g....| +orderer0.example.com | 00000010 37 84 20 53 29 f0 9a d6 89 b2 9e cb 98 a8 df 29 |7. S)..........)| +orderer0.example.com | 00000020 f9 13 75 57 04 02 20 51 02 07 0a e3 eb b0 dd a0 |..uW.. Q........| +orderer0.example.com | 00000030 8b 14 fb 43 14 0b cb cc e6 2e ff d7 be 6a d3 5a |...C.........j.Z| +orderer0.example.com | 00000040 c7 ef 94 e8 50 2c 4e |....P,N|" +orderer0.example.com | "2019-04-22 06:17:55.044 UTC [cauthdsl] func2 -> DEBU 15ad 0xc001344840 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:55.044 UTC [cauthdsl] func1 -> DEBU 15ae 0xc001344840 gate 1555913875042953100 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15af Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15b1 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:55.046 UTC [policies] Evaluate -> DEBU 15b3 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:55.046 UTC [policies] Evaluate -> DEBU 15b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:55.046 UTC [common.deliver] deliverBlocks -> DEBU 15b5 [channel: testchainid] Received seekInfo (0xc000259340) start: > stop: > from 192.168.224.9:34730" +orderer0.example.com | "2019-04-22 06:17:55.046 UTC [fsblkstorage] Next -> DEBU 15b6 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:17:55.047 UTC [fsblkstorage] newBlockfileStream -> DEBU 15b7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:17:55.047 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15b8 Remaining bytes=[44243], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:55.047 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15b9 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:17:55.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15ba blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:55.049 UTC [common.deliver] deliverBlocks -> DEBU 15bb [channel: testchainid] Delivering block [0] for (0xc000259340) for 192.168.224.9:34730" +orderer0.example.com | "2019-04-22 06:17:55.050 UTC [common.deliver] deliverBlocks -> DEBU 15bc [channel: testchainid] Done delivering to 192.168.224.9:34730 for (0xc000259340)" +orderer0.example.com | "2019-04-22 06:17:55.051 UTC [common.deliver] Handle -> DEBU 15bd Waiting for new SeekInfo from 192.168.224.9:34730" +orderer0.example.com | "2019-04-22 06:17:55.052 UTC [common.deliver] Handle -> DEBU 15be Attempting to read seek info message from 192.168.224.9:34730" +orderer0.example.com | "2019-04-22 06:17:55.072 UTC [common.deliver] Handle -> WARN 15bf Error reading from 192.168.224.9:34730: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:55.073 UTC [orderer.common.server] func1 -> DEBU 15c0 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:55.073 UTC [comm.grpc.server] 1 -> INFO 15c1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34730 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.0478ms +orderer0.example.com | "2019-04-22 06:17:55.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15c2 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +orderer0.example.com | "2019-04-22 06:17:55.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15c5 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +orderer0.example.com | "2019-04-22 06:17:55.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.7µs " +orderer0.example.com | "2019-04-22 06:17:55.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15c4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:55.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265µs " +orderer0.example.com | "2019-04-22 06:17:55.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15c7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:55.069 UTC [grpc] infof -> DEBU 15c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:55.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15c9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:55.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ca Sending msg of 28 bytes to 3 on channel testchainid took 35µs" +orderer0.example.com | "2019-04-22 06:17:55.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.3µs " +orderer0.example.com | "2019-04-22 06:17:55.303 UTC [orderer.common.server] Deliver -> DEBU 15cc Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:17:55.304 UTC [common.deliver] Handle -> DEBU 15cd Starting new deliver loop for 192.168.224.9:34732" +orderer0.example.com | "2019-04-22 06:17:55.304 UTC [common.deliver] Handle -> DEBU 15ce Attempting to read seek info message from 192.168.224.9:34732" +orderer0.example.com | "2019-04-22 06:17:55.305 UTC [policies] Evaluate -> DEBU 15cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:54.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f6f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:54.917 UTC [gossip.comm] sendToEndpoint -> DEBU f70 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f71 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:54.921 UTC [policies] Evaluate -> DEBU f72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.921 UTC [gossip.comm] func1 -> DEBU f73 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.921 UTC [policies] Evaluate -> DEBU f74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:54.921 UTC [policies] Evaluate -> DEBU f75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.922 UTC [cauthdsl] func1 -> DEBU f76 0xc0029011b0 gate 1555913814922436400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.922 UTC [cauthdsl] func2 -> DEBU f77 0xc0029011b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:54.923 UTC [cauthdsl] func2 -> DEBU f78 0xc0029011b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:54.923 UTC [cauthdsl] func2 -> DEBU f79 0xc0029011b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.923 UTC [msp.identity] Verify -> DEBU f7a Verify: digest = 00000000 f1 2f 14 2c 1c 0f e1 93 7d 8a d3 71 31 a5 7a 74 |./.,....}..q1.zt| +peer0.org1.example.com | 00000010 57 f6 e7 3b 09 ed 15 5c 76 00 f0 39 3a 9a a5 c6 |W..;...\v..9:...|" +peer0.org1.example.com | "2019-04-22 06:16:54.923 UTC [msp.identity] Verify -> DEBU f7b Verify: sig = 00000000 30 44 02 20 45 24 ce b0 1a aa 23 99 23 b2 30 9b |0D. E$....#.#.0.| +peer0.org1.example.com | 00000010 33 ea d7 8d 98 ee ee 6e b5 15 95 51 92 ad 6e a4 |3......n...Q..n.| +peer0.org1.example.com | 00000020 39 f1 f2 dd 02 20 43 53 d1 af 0a 30 40 09 fd 5a |9.... CS...0@..Z| +peer0.org1.example.com | 00000030 e5 48 d5 bb e3 35 f2 20 fe b7 74 d3 ae 1a 58 89 |.H...5. ..t...X.| +peer0.org1.example.com | 00000040 8e d2 df b6 c7 5f |....._|" +peer0.org1.example.com | "2019-04-22 06:16:54.924 UTC [cauthdsl] func2 -> DEBU f7c 0xc0029011b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.924 UTC [cauthdsl] func1 -> DEBU f7d 0xc0029011b0 gate 1555913814922436400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f80 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.926 UTC [gossip.discovery] handleAliveMessage -> DEBU f82 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.926 UTC [gossip.discovery] handleAliveMessage -> DEBU f83 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.927 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f84 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:54.927 UTC [msp.identity] Verify -> DEBU f85 Verify: digest = 00000000 f3 34 6d d5 c4 64 e7 73 33 68 bd 6a f8 96 23 91 |.4m..d.s3h.j..#.| +peer0.org1.example.com | 00000010 c7 d7 3e a2 ef 90 8c 38 c0 cd 38 4f 68 8a f0 e0 |..>....8..8Oh...|" +peer0.org1.example.com | "2019-04-22 06:16:54.927 UTC [msp.identity] Verify -> DEBU f86 Verify: sig = 00000000 30 44 02 20 02 c2 2f 91 8b 46 af 18 a8 23 cb 0a |0D. ../..F...#..| +peer0.org1.example.com | 00000010 46 7f 40 25 6e 85 2f e8 4a ff 39 f3 d7 db f5 04 |F.@%n./.J.9.....| +peer0.org1.example.com | 00000020 4f fb 5a 45 02 20 27 b9 9b c8 e0 9e fe 33 f3 ed |O.ZE. '......3..| +peer0.org1.example.com | 00000030 9a 13 16 ad 51 7c 87 0e 02 66 b5 49 ac 5d fc 3b |....Q|...f.I.].;| +peer0.org1.example.com | 00000040 04 88 5c 78 0b 7d |..\x.}|" +peer0.org1.example.com | "2019-04-22 06:16:54.928 UTC [gossip.discovery] handleAliveMessage -> DEBU f87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.928 UTC [gossip.discovery] handleAliveMessage -> DEBU f88 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU f89 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.928 UTC [gossip.gossip] handleMessage -> DEBU f8a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.928 UTC [gossip.gossip] handleMessage -> DEBU f8b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.929 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f8d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f8e Verify: digest = 00000000 7f 1d 11 8d 8c 1a eb 40 da 74 73 d5 0a ee 85 dc |.......@.ts.....| +peer0.org1.example.com | 00000010 f7 90 5e 83 7b 1a 6a f0 ec 14 0a 96 26 b4 7f 64 |..^.{.j.....&..d|" +peer0.org1.example.com | "2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f8f Verify: sig = 00000000 30 44 02 20 06 b4 d9 d9 ad 81 6c 89 44 72 30 a9 |0D. ......l.Dr0.| +peer0.org1.example.com | 00000010 b2 21 ca b8 78 8a 9f fc cc a9 f9 e6 53 6a 97 15 |.!..x.......Sj..| +peer0.org1.example.com | 00000020 00 26 6e ad 02 20 4b 2a 91 22 8d 86 bb 19 df ca |.&n.. K*."......| +peer0.org1.example.com | 00000030 78 3c 07 60 e5 aa 71 25 8d 36 aa e5 1e c0 27 a6 |x<.`..q%.6....'.| +peer0.org1.example.com | 00000040 d0 77 cc 34 d9 a0 |.w.4..|" +peer0.org1.example.com | "2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f90 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f91 Verify: sig = 00000000 30 45 02 21 00 a9 68 0b b9 8e 74 f0 15 c5 e5 bc |0E.!..h...t.....| +peer0.org1.example.com | 00000010 86 80 59 df 97 7d 11 3b 22 ca 01 e9 c7 16 bf fc |..Y..}.;".......| +peer0.org1.example.com | 00000020 8e 74 98 18 0d 02 20 10 77 6d 70 c8 de 28 e0 15 |.t.... .wmp..(..| +peer0.org1.example.com | 00000030 1a 48 2b fb f2 15 d2 55 1d 2f 60 2e 0f 78 ed 15 |.H+....U./`..x..| +peer0.org1.example.com | 00000040 c0 03 29 6f 6b b7 d6 |..)ok..|" +peer0.org1.example.com | "2019-04-22 06:16:54.931 UTC [gossip.discovery] handleAliveMessage -> DEBU f92 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.931 UTC [gossip.discovery] isSentByMe -> DEBU f93 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.931 UTC [gossip.discovery] handleAliveMessage -> DEBU f94 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU f95 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU f96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.932 UTC [gossip.gossip] handleMessage -> DEBU f97 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f98 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:54.933 UTC [msp.identity] Verify -> DEBU f99 Verify: digest = 00000000 7f 1d 11 8d 8c 1a eb 40 da 74 73 d5 0a ee 85 dc |.......@.ts.....| +peer0.org1.example.com | 00000010 f7 90 5e 83 7b 1a 6a f0 ec 14 0a 96 26 b4 7f 64 |..^.{.j.....&..d|" +peer0.org1.example.com | "2019-04-22 06:16:54.934 UTC [msp.identity] Verify -> DEBU f9a Verify: sig = 00000000 30 44 02 20 06 b4 d9 d9 ad 81 6c 89 44 72 30 a9 |0D. ......l.Dr0.| +peer0.org1.example.com | 00000010 b2 21 ca b8 78 8a 9f fc cc a9 f9 e6 53 6a 97 15 |.!..x.......Sj..| +peer0.org1.example.com | 00000020 00 26 6e ad 02 20 4b 2a 91 22 8d 86 bb 19 df ca |.&n.. K*."......| +peer0.org1.example.com | 00000030 78 3c 07 60 e5 aa 71 25 8d 36 aa e5 1e c0 27 a6 |x<.`..q%.6....'.| +peer0.org1.example.com | 00000040 d0 77 cc 34 d9 a0 |.w.4..|" +peer0.org1.example.com | "2019-04-22 06:16:54.934 UTC [gossip.discovery] handleAliveMessage -> DEBU f9b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.934 UTC [gossip.discovery] isSentByMe -> DEBU f9c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.934 UTC [gossip.discovery] handleAliveMessage -> DEBU f9d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f9e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:54.935 UTC [msp] DeserializeIdentity -> DEBU f9f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:54.935 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fa0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:54.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:54.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:54.936 UTC [policies] Evaluate -> DEBU fa3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.936 UTC [policies] Evaluate -> DEBU fa4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:54.936 UTC [policies] Evaluate -> DEBU fa5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:54.937 UTC [cauthdsl] func1 -> DEBU fa6 0xc00292d9b0 gate 1555913814936958900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:54.937 UTC [cauthdsl] func2 -> DEBU fa7 0xc00292d9b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:54.937 UTC [cauthdsl] func2 -> DEBU fa8 0xc00292d9b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:54.937 UTC [cauthdsl] func2 -> DEBU fa9 0xc00292d9b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.938 UTC [msp.identity] Verify -> DEBU faa Verify: digest = 00000000 bd 0b e1 d2 5c d0 f2 c1 1c 08 8f 57 9e 5c 24 2d |....\......W.\$-| +peer0.org1.example.com | 00000010 04 90 bc d8 18 36 70 e0 ce 55 c7 e6 d1 3d 70 2c |.....6p..U...=p,|" +peer0.org1.example.com | "2019-04-22 06:16:54.938 UTC [msp.identity] Verify -> DEBU fab Verify: sig = 00000000 30 44 02 20 23 e4 b9 a0 c6 cb 10 14 e9 31 93 22 |0D. #........1."| +peer0.org1.example.com | 00000010 0f 0c 58 07 14 fe 60 db 59 bf 92 71 c9 15 4a 63 |..X...`.Y..q..Jc| +orderer0.example.com | "2019-04-22 06:17:55.306 UTC [policies] Evaluate -> DEBU 15d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:55.306 UTC [policies] Evaluate -> DEBU 15d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:17:55.307 UTC [policies] Evaluate -> DEBU 15d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:17:55.307 UTC [policies] Evaluate -> DEBU 15d3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:17:55.307 UTC [cauthdsl] func1 -> DEBU 15d4 0xc001347400 gate 1555913875307867000 evaluation starts" +orderer0.example.com | "2019-04-22 06:17:55.308 UTC [cauthdsl] func2 -> DEBU 15d5 0xc001347400 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:17:55.308 UTC [cauthdsl] func2 -> DEBU 15d6 0xc001347400 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:17:55.308 UTC [cauthdsl] func2 -> DEBU 15d7 0xc001347400 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:17:55.309 UTC [msp.identity] Verify -> DEBU 15d8 Verify: digest = 00000000 a0 27 70 eb c4 dc bc 86 54 02 e2 8b cf 41 2e 3f |.'p.....T....A.?| +orderer0.example.com | 00000010 15 4a 1b f6 e0 8c 40 1f 8a c3 6c 47 8a d8 fa 07 |.J....@...lG....|" +orderer0.example.com | "2019-04-22 06:17:55.309 UTC [msp.identity] Verify -> DEBU 15d9 Verify: sig = 00000000 30 45 02 21 00 f9 ff 90 10 1f 22 be 8a d4 18 06 |0E.!......".....| +orderer0.example.com | 00000010 84 6d cf 69 89 94 e7 b0 27 65 50 c9 69 48 00 e1 |.m.i....'eP.iH..| +orderer0.example.com | 00000020 20 00 e1 60 12 02 20 68 62 95 71 c5 5d 08 37 ea | ..`.. hb.q.].7.| +orderer0.example.com | 00000030 7c 22 bd 48 c7 3c 7b 7e 42 1c 84 be 94 03 d8 dd ||".H.<{~B.......| +orderer0.example.com | 00000040 f0 dd a5 69 6c 0b c4 |...il..|" +orderer0.example.com | "2019-04-22 06:17:55.309 UTC [cauthdsl] func2 -> DEBU 15da 0xc001347400 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:17:55.310 UTC [cauthdsl] func1 -> DEBU 15db 0xc001347400 gate 1555913875307867000 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:17:55.310 UTC [policies] Evaluate -> DEBU 15dc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:55.311 UTC [policies] Evaluate -> DEBU 15dd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:17:55.311 UTC [policies] Evaluate -> DEBU 15de Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:55.311 UTC [policies] Evaluate -> DEBU 15df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:17:55.312 UTC [policies] Evaluate -> DEBU 15e0 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:55.312 UTC [policies] Evaluate -> DEBU 15e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:17:55.312 UTC [common.deliver] deliverBlocks -> DEBU 15e2 [channel: testchainid] Received seekInfo (0xc0004164c0) start: > stop: > from 192.168.224.9:34732" +orderer0.example.com | "2019-04-22 06:17:55.313 UTC [fsblkstorage] Next -> DEBU 15e3 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:17:55.313 UTC [fsblkstorage] newBlockfileStream -> DEBU 15e4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-04-22 06:17:55.313 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15e5 Remaining bytes=[25828], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:17:55.314 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15e6 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-04-22 06:17:55.315 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15e7 blockbytes [25825] read from file [0]" +orderer0.example.com | "2019-04-22 06:17:55.315 UTC [common.deliver] deliverBlocks -> DEBU 15e8 [channel: testchainid] Delivering block [1] for (0xc0004164c0) for 192.168.224.9:34732" +orderer0.example.com | "2019-04-22 06:17:55.316 UTC [common.deliver] deliverBlocks -> DEBU 15e9 [channel: testchainid] Done delivering to 192.168.224.9:34732 for (0xc0004164c0)" +orderer0.example.com | "2019-04-22 06:17:55.317 UTC [common.deliver] Handle -> DEBU 15ea Waiting for new SeekInfo from 192.168.224.9:34732" +orderer0.example.com | "2019-04-22 06:17:55.317 UTC [common.deliver] Handle -> DEBU 15eb Attempting to read seek info message from 192.168.224.9:34732" +orderer0.example.com | "2019-04-22 06:17:55.325 UTC [common.deliver] Handle -> WARN 15ec Error reading from 192.168.224.9:34732: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:17:55.325 UTC [orderer.common.server] func1 -> DEBU 15ee Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:17:55.326 UTC [comm.grpc.server] 1 -> INFO 15ef streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34732 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.7476ms +orderer0.example.com | "2019-04-22 06:17:55.325 UTC [grpc] infof -> DEBU 15ed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:17:55.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f0 Sending msg of 28 bytes to 2 on channel businesschannel took 77.2µs" +orderer0.example.com | "2019-04-22 06:17:55.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f1 Sending msg of 28 bytes to 3 on channel businesschannel took 32.8µs" +orderer0.example.com | "2019-04-22 06:17:55.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.3µs " +orderer0.example.com | "2019-04-22 06:17:55.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.7µs " +orderer0.example.com | "2019-04-22 06:17:55.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:55.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:55.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:55.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f7 Sending msg of 28 bytes to 3 on channel testchainid took 32.1µs" +orderer0.example.com | "2019-04-22 06:17:55.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.4µs " +orderer0.example.com | "2019-04-22 06:17:56.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f9 Sending msg of 28 bytes to 2 on channel businesschannel took 58.2µs" +orderer0.example.com | "2019-04-22 06:17:56.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fb Sending msg of 28 bytes to 3 on channel businesschannel took 42.7µs" +orderer0.example.com | "2019-04-22 06:17:56.073 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +orderer0.example.com | "2019-04-22 06:17:56.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.8µs " +orderer0.example.com | "2019-04-22 06:17:56.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fd Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:56.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:56.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ff Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:56.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1600 Sending msg of 28 bytes to 3 on channel testchainid took 523.5µs" +orderer0.example.com | "2019-04-22 06:17:56.237 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1601 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.7µs " +orderer0.example.com | "2019-04-22 06:17:56.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1602 Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +orderer0.example.com | "2019-04-22 06:17:56.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1604 Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" +orderer0.example.com | "2019-04-22 06:17:56.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1605 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150µs " +orderer0.example.com | "2019-04-22 06:17:56.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1603 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.9µs " +orderer0.example.com | "2019-04-22 06:17:56.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1606 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:56.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1607 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:56.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1608 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:56.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1609 Sending msg of 28 bytes to 3 on channel testchainid took 30.8µs" +orderer0.example.com | "2019-04-22 06:17:56.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " +orderer0.example.com | "2019-04-22 06:17:57.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160b Sending msg of 28 bytes to 2 on channel businesschannel took 35.9µs" +orderer0.example.com | "2019-04-22 06:17:57.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160d Sending msg of 28 bytes to 3 on channel businesschannel took 956.7µs" +orderer0.example.com | "2019-04-22 06:17:57.082 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 744.9µs " +orderer0.example.com | "2019-04-22 06:17:57.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 758.6µs " +orderer0.example.com | "2019-04-22 06:17:57.089 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:57.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1610 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:57.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1611 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:57.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1612 Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +orderer0.example.com | "2019-04-22 06:17:57.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1613 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.4µs " +orderer0.example.com | "2019-04-22 06:17:57.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1614 Sending msg of 28 bytes to 2 on channel businesschannel took 36.2µs" +orderer0.example.com | "2019-04-22 06:17:57.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1616 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-04-22 06:17:57.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1617 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.5µs " +orderer0.example.com | "2019-04-22 06:17:57.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1615 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.6µs " +orderer0.example.com | "2019-04-22 06:17:57.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1618 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:57.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1619 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:57.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:57.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161b Sending msg of 28 bytes to 3 on channel testchainid took 27.7µs" +orderer0.example.com | "2019-04-22 06:17:57.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +orderer0.example.com | "2019-04-22 06:17:58.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161d Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +orderer0.example.com | "2019-04-22 06:17:58.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161e Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +orderer0.example.com | "2019-04-22 06:17:58.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.1µs " +orderer0.example.com | "2019-04-22 06:17:58.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1620 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +orderer0.example.com | "2019-04-22 06:17:58.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1621 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000020 02 81 3a b9 02 20 0a e0 80 ef bb e5 ab e7 29 64 |..:.. ........)d| +peer0.org1.example.com | 00000030 7f 72 eb 85 5b 19 17 fe 20 41 dd 9e 8a 38 85 f4 |.r..[... A...8..| +peer0.org1.example.com | 00000040 fe 9a 6c 7f a4 f6 |..l...|" +peer0.org1.example.com | "2019-04-22 06:16:54.938 UTC [cauthdsl] func2 -> DEBU fac 0xc00292d9b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:54.938 UTC [cauthdsl] func1 -> DEBU fad 0xc00292d9b0 gate 1555913814936958900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:54.938 UTC [policies] Evaluate -> DEBU fae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.939 UTC [policies] Evaluate -> DEBU faf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.939 UTC [policies] Evaluate -> DEBU fb0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.939 UTC [policies] Evaluate -> DEBU fb1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:54.939 UTC [gossip.discovery] handleAliveMessage -> DEBU fb2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:54.940 UTC [gossip.discovery] handleAliveMessage -> DEBU fb3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:54.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb4 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.156 UTC [gossip.comm] func1 -> DEBU fb5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.157 UTC [gossip.gossip] handleMessage -> DEBU fb6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.157 UTC [gossip.pull] HandleMessage -> DEBU fb7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.157 UTC [gossip.pull] SendDigest -> DEBU fb8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:55.157 UTC [gossip.gossip] handleMessage -> DEBU fb9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.170 UTC [gossip.comm] func1 -> DEBU fba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.170 UTC [gossip.gossip] handleMessage -> DEBU fbb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.170 UTC [gossip.gossip] handleMessage -> DEBU fbc Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU fbd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fbe Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:55.172 UTC [msp.identity] Verify -> DEBU fbf Verify: digest = 00000000 28 9c ad 91 34 ac 50 21 f9 3e c6 da 91 1d e8 46 |(...4.P!.>.....F| +peer0.org1.example.com | 00000010 79 60 63 97 85 4d 36 54 58 08 9d ba 9a fb 91 d3 |y`c..M6TX.......|" +peer0.org1.example.com | "2019-04-22 06:16:55.172 UTC [msp.identity] Verify -> DEBU fc0 Verify: sig = 00000000 30 45 02 21 00 a0 71 48 7c 64 0f fb a0 b5 71 cd |0E.!..qH|d....q.| +peer0.org1.example.com | 00000010 24 7d 95 c0 d4 3a ce 95 90 c8 72 b7 df 5c 5d 96 |$}...:....r..\].| +peer0.org1.example.com | 00000020 f9 ba 94 4c 7c 02 20 03 b7 6d a2 0a 23 50 e0 e3 |...L|. ..m..#P..| +peer0.org1.example.com | 00000030 a4 03 0c b9 84 3f b9 97 04 19 7c 08 5f ba 54 31 |.....?....|._.T1| +peer0.org1.example.com | 00000040 41 bf 29 79 7f 8c dc |A.)y...|" +peer0.org1.example.com | "2019-04-22 06:16:55.173 UTC [msp.identity] Verify -> DEBU fc1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:55.173 UTC [msp.identity] Verify -> DEBU fc2 Verify: sig = 00000000 30 44 02 20 0a 1a 71 63 e7 cf 21 5b 08 c4 11 8b |0D. ..qc..![....| +peer0.org1.example.com | 00000010 78 83 dd 3f 97 95 a6 ed 83 67 cd ef 98 78 19 12 |x..?.....g...x..| +peer0.org1.example.com | 00000020 bc ec 1d 1f 02 20 05 30 b2 62 7f 2e 40 14 c1 49 |..... .0.b..@..I| +peer0.org1.example.com | 00000030 a8 2a 2c 53 a4 7f e9 a0 ad d7 d9 a1 ae a0 ba 3f |.*,S...........?| +peer0.org1.example.com | 00000040 3b a0 3c 46 6d d2 |;. DEBU fc3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc5 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 " +orderer0.example.com | "2019-04-22 06:17:58.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1622 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:58.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1623 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:58.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1624 Sending msg of 28 bytes to 3 on channel testchainid took 42.8µs" +orderer0.example.com | "2019-04-22 06:17:58.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1625 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.5µs " +orderer0.example.com | "2019-04-22 06:17:58.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1626 Sending msg of 28 bytes to 2 on channel businesschannel took 53.1µs" +orderer0.example.com | "2019-04-22 06:17:58.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1628 Sending msg of 28 bytes to 3 on channel businesschannel took 49.8µs" +orderer0.example.com | "2019-04-22 06:17:58.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1627 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 456.6µs " +orderer0.example.com | "2019-04-22 06:17:58.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1629 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 326.6µs " +orderer0.example.com | "2019-04-22 06:17:58.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:58.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:58.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:58.731 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162d Sending msg of 28 bytes to 3 on channel testchainid took 37µs" +orderer0.example.com | "2019-04-22 06:17:58.732 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.9µs " +orderer0.example.com | "2019-04-22 06:17:59.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162f Sending msg of 28 bytes to 3 on channel businesschannel took 54.9µs" +orderer0.example.com | "2019-04-22 06:17:59.073 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1630 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 577.5µs " +orderer0.example.com | "2019-04-22 06:17:59.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1631 Sending msg of 28 bytes to 2 on channel businesschannel took 52.4µs" +orderer0.example.com | "2019-04-22 06:17:59.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1632 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2641ms " +orderer0.example.com | "2019-04-22 06:17:59.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1633 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:59.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1634 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:59.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1635 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:59.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1636 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +orderer0.example.com | "2019-04-22 06:17:59.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1637 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.4µs " +orderer0.example.com | "2019-04-22 06:17:59.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1638 Sending msg of 28 bytes to 3 on channel businesschannel took 39.5µs" +orderer0.example.com | "2019-04-22 06:17:59.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1639 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" +orderer0.example.com | "2019-04-22 06:17:59.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.6µs " +orderer0.example.com | "2019-04-22 06:17:59.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188.3µs " +orderer0.example.com | "2019-04-22 06:17:59.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:59.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:59.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:17:59.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163f Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +orderer0.example.com | "2019-04-22 06:17:59.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1640 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.7µs " +orderer0.example.com | "2019-04-22 06:18:00.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1641 Sending msg of 28 bytes to 2 on channel businesschannel took 63.4µs" +orderer0.example.com | "2019-04-22 06:18:00.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1642 Sending msg of 28 bytes to 3 on channel businesschannel took 46.9µs" +orderer0.example.com | "2019-04-22 06:18:00.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1643 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4527ms " +orderer0.example.com | "2019-04-22 06:18:00.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1644 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 669.9µs " +orderer0.example.com | "2019-04-22 06:18:00.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1645 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:00.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1646 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:00.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1647 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:00.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1648 Sending msg of 28 bytes to 3 on channel testchainid took 79.5µs" +orderer0.example.com | "2019-04-22 06:18:00.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1649 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +orderer0.example.com | "2019-04-22 06:18:00.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164a Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" +orderer0.example.com | "2019-04-22 06:18:00.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164b Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +orderer0.example.com | "2019-04-22 06:18:00.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +orderer0.example.com | "2019-04-22 06:18:00.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.1µs " +orderer0.example.com | "2019-04-22 06:18:00.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:00.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:00.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1650 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:00.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1651 Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +orderer0.example.com | "2019-04-22 06:18:00.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1652 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +orderer0.example.com | "2019-04-22 06:18:01.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1653 Sending msg of 28 bytes to 2 on channel businesschannel took 55.1µs" +orderer0.example.com | "2019-04-22 06:18:01.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1654 Sending msg of 28 bytes to 3 on channel businesschannel took 46.7µs" +orderer0.example.com | "2019-04-22 06:18:01.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1655 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.2µs " +orderer0.example.com | "2019-04-22 06:18:01.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1656 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.3µs " +orderer0.example.com | "2019-04-22 06:18:01.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1657 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:01.089 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1658 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:01.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1659 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:01.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165a Sending msg of 28 bytes to 3 on channel testchainid took 32.5µs" +orderer0.example.com | "2019-04-22 06:18:01.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +orderer0.example.com | "2019-04-22 06:18:01.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165c Sending msg of 28 bytes to 2 on channel businesschannel took 160.9µs" +orderer0.example.com | "2019-04-22 06:18:01.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165d Sending msg of 28 bytes to 3 on channel businesschannel took 159.5µs" +orderer0.example.com | "2019-04-22 06:18:01.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 358.1µs " +orderer0.example.com | "2019-04-22 06:18:01.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 468.5µs " +orderer0.example.com | "2019-04-22 06:18:01.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1660 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:01.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1661 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:01.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1662 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:01.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1663 Sending msg of 28 bytes to 3 on channel testchainid took 127.4µs" +orderer0.example.com | "2019-04-22 06:18:01.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1664 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92µs " +orderer0.example.com | "2019-04-22 06:18:02.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1665 Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-04-22 06:18:02.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1666 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-04-22 06:18:02.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1667 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.1µs " +orderer0.example.com | "2019-04-22 06:18:02.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1668 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.3µs " +orderer0.example.com | "2019-04-22 06:18:02.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1669 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:02.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:02.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166c Sending msg of 28 bytes to 3 on channel testchainid took 32.8µs" +peer0.org1.example.com | "2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 " +peer0.org1.example.com | "2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:55.175 UTC [gossip.discovery] learnExistingMembers -> DEBU fc8 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.175 UTC [gossip.discovery] handleAliveMessage -> DEBU fc9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU fca Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.176 UTC [gossip.discovery] sendMemResponse -> DEBU fcb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:55.176 UTC [msp] DeserializeIdentity -> DEBU fcc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.177 UTC [msp] DeserializeIdentity -> DEBU fcd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.177 UTC [gossip.comm] Send -> DEBU fce Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:55.177 UTC [gossip.discovery] sendMemResponse -> DEBU fcf Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:55.178 UTC [gossip.comm] sendToEndpoint -> DEBU fd0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.178 UTC [gossip.comm] sendToEndpoint -> DEBU fd1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.617 UTC [gossip.comm] func1 -> DEBU fd2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.617 UTC [gossip.gossip] handleMessage -> DEBU fd3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.617 UTC [gossip.pull] HandleMessage -> DEBU fd4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.618 UTC [msp] DeserializeIdentity -> DEBU fd5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.620 UTC [msp] DeserializeIdentity -> DEBU fda Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.620 UTC [gossip.pull] SendDigest -> DEBU fdb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:55.620 UTC [gossip.gossip] handleMessage -> DEBU fdc Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.625 UTC [gossip.comm] func1 -> DEBU fdd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.625 UTC [gossip.gossip] handleMessage -> DEBU fde Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.625 UTC [gossip.gossip] handleMessage -> DEBU fdf Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU fe0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.626 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fe1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:55.626 UTC [msp] DeserializeIdentity -> DEBU fe2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:55.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:55.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:55.628 UTC [policies] Evaluate -> DEBU fe6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:55.628 UTC [policies] Evaluate -> DEBU fe7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:55.628 UTC [policies] Evaluate -> DEBU fe8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:55.629 UTC [cauthdsl] func1 -> DEBU fe9 0xc0034a48c0 gate 1555913815628926000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:55.629 UTC [cauthdsl] func2 -> DEBU fea 0xc0034a48c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:55.629 UTC [cauthdsl] func2 -> DEBU feb 0xc0034a48c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:55.629 UTC [cauthdsl] func2 -> DEBU fec 0xc0034a48c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:55.630 UTC [msp.identity] Verify -> DEBU fed Verify: digest = 00000000 b6 b5 ef 2b 3b aa 01 9a 9c 4f 63 aa 0e c7 38 5e |...+;....Oc...8^| +peer0.org1.example.com | 00000010 49 f4 26 6a be 2b 03 1b 72 66 80 df 33 0a 53 fa |I.&j.+..rf..3.S.|" +peer0.org1.example.com | "2019-04-22 06:16:55.630 UTC [msp.identity] Verify -> DEBU fee Verify: sig = 00000000 30 44 02 20 6e 1a f3 c3 a6 c7 c2 aa e5 15 fa 3d |0D. n..........=| +peer0.org1.example.com | 00000010 57 d4 5e 7e ba 9a 40 7b 44 7c 33 4d 93 6a a6 fd |W.^~..@{D|3M.j..| +peer0.org1.example.com | 00000020 89 66 f9 00 02 20 64 d2 e5 0c 43 2f cc 4e 65 c0 |.f... d...C/.Ne.| +peer0.org1.example.com | 00000030 93 ff ba 61 69 bf 5e fb ab 37 e7 a6 e2 70 8f 8a |...ai.^..7...p..| +peer0.org1.example.com | 00000040 e7 63 5d 1b b9 87 |.c]...|" +peer0.org1.example.com | "2019-04-22 06:16:55.631 UTC [cauthdsl] func2 -> DEBU fef 0xc0034a48c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:55.631 UTC [cauthdsl] func1 -> DEBU ff0 0xc0034a48c0 gate 1555913815628926000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:55.631 UTC [policies] Evaluate -> DEBU ff1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:55.632 UTC [policies] Evaluate -> DEBU ff2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:55.633 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:55.633 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:55.633 UTC [gossip.discovery] handleAliveMessage -> DEBU ff5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.633 UTC [gossip.discovery] learnExistingMembers -> DEBU ff6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:55.634 UTC [gossip.discovery] learnExistingMembers -> DEBU ff7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 " +peer0.org1.example.com | "2019-04-22 06:16:55.634 UTC [gossip.discovery] learnExistingMembers -> DEBU ff8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 " +peer0.org1.example.com | "2019-04-22 06:16:55.634 UTC [gossip.discovery] learnExistingMembers -> DEBU ff9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:55.635 UTC [gossip.discovery] learnExistingMembers -> DEBU ffa Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.635 UTC [gossip.discovery] handleAliveMessage -> DEBU ffb Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU ffc Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.635 UTC [gossip.discovery] sendMemResponse -> DEBU ffd Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:55.635 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.636 UTC [msp] DeserializeIdentity -> DEBU fff Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.636 UTC [msp] DeserializeIdentity -> DEBU 1000 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.636 UTC [gossip.comm] Send -> DEBU 1001 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:55.637 UTC [gossip.discovery] sendMemResponse -> DEBU 1002 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:55.637 UTC [gossip.comm] sendToEndpoint -> DEBU 1003 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.637 UTC [gossip.comm] sendToEndpoint -> DEBU 1004 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.840 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1005 Sleeping 25s" +peer0.org1.example.com | "2019-04-22 06:16:55.848 UTC [msp.identity] Sign -> DEBU 1006 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151015 " +peer0.org1.example.com | "2019-04-22 06:16:55.848 UTC [msp.identity] Sign -> DEBU 1007 Sign: digest: D985D05B1EA56F93E3BCC0CCE32BC811838783BF0E58711B13E5A46AC75699DB " +peer0.org1.example.com | "2019-04-22 06:16:55.849 UTC [msp.identity] Sign -> DEBU 1008 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:55.849 UTC [msp.identity] Sign -> DEBU 1009 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:55.849 UTC [gossip.discovery] periodicalSendAlive -> DEBU 100a Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 100b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 100c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 100d Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:02.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.6µs " +orderer0.example.com | "2019-04-22 06:18:02.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166e Sending msg of 28 bytes to 2 on channel businesschannel took 40.1µs" +orderer0.example.com | "2019-04-22 06:18:02.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166f Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +orderer0.example.com | "2019-04-22 06:18:02.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1670 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.9µs " +orderer0.example.com | "2019-04-22 06:18:02.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1671 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs " +orderer0.example.com | "2019-04-22 06:18:02.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1672 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:02.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1673 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:02.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1674 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:02.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 28 bytes to 3 on channel testchainid took 56.2µs" +orderer0.example.com | "2019-04-22 06:18:02.732 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5273ms " +orderer0.example.com | "2019-04-22 06:18:03.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1677 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +orderer0.example.com | "2019-04-22 06:18:03.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1678 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 299.4µs " +orderer0.example.com | "2019-04-22 06:18:03.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1679 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +orderer0.example.com | "2019-04-22 06:18:03.073 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-04-22 06:18:03.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.158 UTC [orderer.common.server] Deliver -> DEBU 167d Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:03.159 UTC [common.deliver] Handle -> DEBU 167e Starting new deliver loop for 192.168.224.9:34734" +orderer0.example.com | "2019-04-22 06:18:03.160 UTC [common.deliver] Handle -> DEBU 167f Attempting to read seek info message from 192.168.224.9:34734" +orderer0.example.com | "2019-04-22 06:18:03.173 UTC [orderer.common.server] Broadcast -> DEBU 1680 Starting new Broadcast handler" +orderer0.example.com | "2019-04-22 06:18:03.174 UTC [orderer.common.broadcast] Handle -> DEBU 1681 Starting new broadcast loop for 192.168.224.9:34736" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1682 [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34736" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1683 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1684 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1685 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1686 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1687 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1688 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [cauthdsl] func1 -> DEBU 1689 0xc00105dc00 gate 1555913883175666500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [cauthdsl] func2 -> DEBU 168a 0xc00105dc00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [cauthdsl] func2 -> DEBU 168b 0xc00105dc00 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [cauthdsl] func2 -> DEBU 168c 0xc00105dc00 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [msp.identity] Verify -> DEBU 168d Verify: digest = 00000000 fb 29 18 1a 8e b9 2e e7 c2 d4 57 c2 93 71 af d6 |.)........W..q..| +orderer0.example.com | 00000010 d2 8f 55 88 f6 f1 7a b5 7c 04 a9 13 83 c9 28 c4 |..U...z.|.....(.|" +orderer0.example.com | "2019-04-22 06:18:03.175 UTC [msp.identity] Verify -> DEBU 168e Verify: sig = 00000000 30 45 02 21 00 95 bc 46 50 b4 2e fd 43 db df 26 |0E.!...FP...C..&| +orderer0.example.com | 00000010 2e 76 67 57 8c 12 7d 7e 1a fd db 4c 80 b4 ae 4e |.vgW..}~...L...N| +orderer0.example.com | 00000020 0a 67 fd 73 11 02 20 60 24 3d d3 50 10 7e a0 b8 |.g.s.. `$=.P.~..| +orderer0.example.com | 00000030 20 10 78 fb 06 f8 be 23 b5 87 b1 26 95 70 e6 05 | .x....#...&.p..| +orderer0.example.com | 00000040 41 a6 97 21 24 59 29 |A..!$Y)|" +peer0.org1.example.com | "2019-04-22 06:16:55.855 UTC [gossip.comm] Send -> DEBU 100e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:55.855 UTC [gossip.comm] Send -> DEBU 100f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 1010 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:55.856 UTC [gossip.comm] Send -> DEBU 1011 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1012 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1013 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1014 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1015 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1016 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1017 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.032 UTC [gossip.gossip] handleMessage -> DEBU 1018 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.033 UTC [gossip.pull] HandleMessage -> DEBU 1019 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.033 UTC [msp] DeserializeIdentity -> DEBU 101a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.034 UTC [msp] DeserializeIdentity -> DEBU 101b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.034 UTC [msp] DeserializeIdentity -> DEBU 101c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.035 UTC [msp] DeserializeIdentity -> DEBU 101d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.035 UTC [msp] DeserializeIdentity -> DEBU 101e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.036 UTC [msp] DeserializeIdentity -> DEBU 101f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.037 UTC [gossip.pull] SendDigest -> DEBU 1020 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:56.038 UTC [gossip.gossip] handleMessage -> DEBU 1021 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.049 UTC [gossip.gossip] handleMessage -> DEBU 1022 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.050 UTC [gossip.gossip] handleMessage -> DEBU 1023 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.051 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1024 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.051 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1025 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:56.052 UTC [msp] DeserializeIdentity -> DEBU 1026 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [cauthdsl] func2 -> DEBU 168f 0xc00105dc00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [cauthdsl] func1 -> DEBU 1690 0xc00105dc00 gate 1555913883175666500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1691 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1692 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1693 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1694 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1695 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1696 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 1697 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 1698 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 1699 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169a Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169b Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169c Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169d Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169e Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a0 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a1 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a2 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a3 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a6 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a7 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16aa Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ab Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ac Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ad Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ae Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16af Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16b0 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [common.configtx] addToMap -> DEBU 16b1 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [common.configtx] addToMap -> DEBU 16b2 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b4 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b5 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b6 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [common.configtx] policyForItem -> DEBU 16b7 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16b8 Manager Channel looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16b9 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16ba Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bb Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bc Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bd Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16be Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bf Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16c0 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Evaluate -> DEBU 16c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-04-22 06:18:03.178 UTC [policies] Evaluate -> DEBU 16c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [policies] Evaluate -> DEBU 16c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [cauthdsl] deduplicate -> WARN 16c4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [cauthdsl] func1 -> DEBU 16c5 0xc001286600 gate 1555913883179522200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c6 0xc001286600 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-04-22 06:16:56.053 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1027 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1028 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1029 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.054 UTC [policies] Evaluate -> DEBU 102a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.055 UTC [policies] Evaluate -> DEBU 102b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.055 UTC [policies] Evaluate -> DEBU 102c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.056 UTC [cauthdsl] func1 -> DEBU 102d 0xc002828a50 gate 1555913816056425400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.056 UTC [cauthdsl] func2 -> DEBU 102e 0xc002828a50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.056 UTC [cauthdsl] func2 -> DEBU 102f 0xc002828a50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.057 UTC [cauthdsl] func2 -> DEBU 1030 0xc002828a50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.057 UTC [msp.identity] Verify -> DEBU 1031 Verify: digest = 00000000 41 2a 8b 48 df ae bd 4c f1 c8 49 46 82 7c a9 b4 |A*.H...L..IF.|..| +peer0.org1.example.com | 00000010 6c ba ea fd ad 4a 5c 60 a8 c9 12 d2 cb 9a d3 59 |l....J\`.......Y|" +peer0.org1.example.com | "2019-04-22 06:16:56.058 UTC [msp.identity] Verify -> DEBU 1032 Verify: sig = 00000000 30 44 02 20 79 c2 d1 02 4b b0 62 3d b8 89 cd f2 |0D. y...K.b=....| +peer0.org1.example.com | 00000010 33 5f ed 49 a1 a3 fb 4f 44 02 d6 99 da 4f bf 2c |3_.I...OD....O.,| +peer0.org1.example.com | 00000020 08 fd 06 9e 02 20 19 53 ad 2b 52 ff 2d 1e 8f 2d |..... .S.+R.-..-| +peer0.org1.example.com | 00000030 4b b0 94 f7 5f 42 53 76 a2 c3 ad 9d 9b 73 f0 46 |K..._BSv.....s.F| +peer0.org1.example.com | 00000040 ee 51 f3 fa fd 7e |.Q...~|" +peer0.org1.example.com | "2019-04-22 06:16:56.058 UTC [cauthdsl] func2 -> DEBU 1033 0xc002828a50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.059 UTC [cauthdsl] func1 -> DEBU 1034 0xc002828a50 gate 1555913816056425400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.059 UTC [policies] Evaluate -> DEBU 1035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.059 UTC [policies] Evaluate -> DEBU 1036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.060 UTC [policies] Evaluate -> DEBU 1037 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.060 UTC [policies] Evaluate -> DEBU 1038 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 1039 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 103a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:56.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 103b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 " +peer0.org1.example.com | "2019-04-22 06:16:56.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 103c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 " +peer0.org1.example.com | "2019-04-22 06:16:56.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 103d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:56.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 103e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.062 UTC [gossip.discovery] handleAliveMessage -> DEBU 103f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.062 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1040 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.062 UTC [gossip.discovery] sendMemResponse -> DEBU 1041 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:16:56.063 UTC [msp] DeserializeIdentity -> DEBU 1042 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.063 UTC [msp] DeserializeIdentity -> DEBU 1043 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.063 UTC [msp] DeserializeIdentity -> DEBU 1044 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.064 UTC [gossip.comm] Send -> DEBU 1045 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.064 UTC [gossip.comm] sendToEndpoint -> DEBU 1046 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.065 UTC [gossip.comm] sendToEndpoint -> DEBU 1047 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.065 UTC [gossip.discovery] sendMemResponse -> DEBU 1048 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:56.137 UTC [gossip.comm] func1 -> DEBU 1049 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.137 UTC [gossip.gossip] handleMessage -> DEBU 104a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c7 0xc001286600 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c8 0xc001286600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c9 0xc001286600 processing identity 1 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16ca Checking if identity satisfies ADMIN role for Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16cb 0xc001286600 principal matched by identity 1" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [msp.identity] Verify -> DEBU 16cc Verify: digest = 00000000 0c fd 1f e5 b1 9b db 02 57 c4 82 57 bc d0 0c 4b |........W..W...K| +orderer0.example.com | 00000010 97 87 a9 3b ca 23 a8 c2 03 3c f3 1a f8 a3 07 57 |...;.#...<.....W|" +orderer0.example.com | "2019-04-22 06:18:03.179 UTC [msp.identity] Verify -> DEBU 16cd Verify: sig = 00000000 30 45 02 21 00 d6 e0 8c 37 df 62 cb 69 f9 ca 73 |0E.!....7.b.i..s| +orderer0.example.com | 00000010 04 64 61 bf 99 26 93 ca 3d 45 f6 6f 0f 3d b9 61 |.da..&..=E.o.=.a| +orderer0.example.com | 00000020 7a af 77 b9 12 02 20 4a 16 64 bd 85 6e 43 d5 e7 |z.w... J.d..nC..| +orderer0.example.com | 00000030 28 07 12 4c 58 19 bf 43 c2 12 88 2a bf 28 75 09 |(..LX..C...*.(u.| +orderer0.example.com | 00000040 a5 e6 fa 2b 77 6d e3 |...+wm.|" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [cauthdsl] func2 -> DEBU 16ce 0xc001286600 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [cauthdsl] func1 -> DEBU 16cf 0xc001286600 gate 1555913883179522200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [policies] Evaluate -> DEBU 16d0 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [policies] Evaluate -> DEBU 16d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [policies] Evaluate -> DEBU 16d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [cauthdsl] deduplicate -> WARN 16d3 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [cauthdsl] func1 -> DEBU 16d4 0xc001286cf0 gate 1555913883180445600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [cauthdsl] func2 -> DEBU 16d5 0xc001286cf0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [cauthdsl] func2 -> DEBU 16d6 0xc001286cf0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.180 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16d7 Checking if identity satisfies ADMIN role for Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [cauthdsl] func2 -> DEBU 16d8 0xc001286cf0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [msp.identity] Verify -> DEBU 16d9 Verify: digest = 00000000 8e 73 57 0e b7 c7 1b 71 9b 02 5f bd 37 50 74 25 |.sW....q.._.7Pt%| +orderer0.example.com | 00000010 06 6a 52 6c ef f6 86 21 8c 54 e2 73 5f 3d 4d 90 |.jRl...!.T.s_=M.|" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [msp.identity] Verify -> DEBU 16da Verify: sig = 00000000 30 45 02 21 00 f2 fa 21 f5 b5 4e 2e de a8 55 bd |0E.!...!..N...U.| +orderer0.example.com | 00000010 a8 cc 6e 98 b5 33 37 87 be c9 27 42 cf 21 2b 5f |..n..37...'B.!+_| +orderer0.example.com | 00000020 54 69 eb ed 1a 02 20 0b 2a d2 c7 e1 11 a3 64 cc |Ti.... .*.....d.| +orderer0.example.com | 00000030 0e 42 62 c5 f0 de 23 74 4d 0c 1a 46 43 50 06 27 |.Bb...#tM..FCP.'| +orderer0.example.com | 00000040 0b 25 bf 2c 59 22 e1 |.%.,Y".|" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [cauthdsl] func2 -> DEBU 16db 0xc001286cf0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [cauthdsl] func1 -> DEBU 16dc 0xc001286cf0 gate 1555913883180445600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16dd Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16df Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [common.configtx] verifyDeltaSet -> DEBU 16e1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [common.configtx] verifyDeltaSet -> DEBU 16e2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.181 UTC [common.configtx] verifyDeltaSet -> DEBU 16e3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e6 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e7 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e8 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16ea Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16eb Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16ec Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16ee Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:16:56.138 UTC [gossip.discovery] handleMsgFromComm -> DEBU 104b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.138 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 104c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:56.139 UTC [msp.identity] Verify -> DEBU 104d Verify: digest = 00000000 9b ce 81 e7 f0 0f 12 fc f4 87 7a 7f 71 5d 3e 8d |..........z.q]>.| +peer0.org1.example.com | 00000010 3c 49 ee 8d c6 91 29 6b 1c d2 28 ad 6d 2b f7 0b | DEBU 104e Verify: sig = 00000000 30 45 02 21 00 87 23 23 c1 ed 4f 42 63 27 46 c1 |0E.!..##..OBc'F.| +peer0.org1.example.com | 00000010 93 d2 de a9 ed 81 38 df 39 f2 47 94 da 6e e8 1a |......8.9.G..n..| +peer0.org1.example.com | 00000020 3e f4 80 ba 24 02 20 0f fe 8c 00 18 1d d5 d9 bd |>...$. .........| +peer0.org1.example.com | 00000030 11 1a a4 46 30 dd f2 41 45 54 23 89 c8 17 a3 8a |...F0..AET#.....| +peer0.org1.example.com | 00000040 d4 b5 ee 4b 27 7a b9 |...K'z.|" +peer0.org1.example.com | "2019-04-22 06:16:56.140 UTC [msp.identity] Verify -> DEBU 104f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:56.140 UTC [msp.identity] Verify -> DEBU 1050 Verify: sig = 00000000 30 44 02 20 6a b4 4b 19 f5 0e 3c e2 60 4e d6 37 |0D. j.K...<.`N.7| +peer0.org1.example.com | 00000010 d2 11 ff b5 02 37 f0 49 a1 e0 b9 a4 14 11 85 b8 |.....7.I........| +peer0.org1.example.com | 00000020 fb 4f 51 76 02 20 04 c8 15 4e 5c 67 03 72 99 be |.OQv. ...N\g.r..| +peer0.org1.example.com | 00000030 a9 24 b3 29 82 1e ac 1b 83 c2 1f ba 4f d7 95 a9 |.$.)........O...| +peer0.org1.example.com | 00000040 28 4c 28 f7 36 db |(L(.6.|" +peer0.org1.example.com | "2019-04-22 06:16:56.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 1051 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 1052 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:56.143 UTC [gossip.discovery] learnExistingMembers -> DEBU 1053 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 " +peer0.org1.example.com | "2019-04-22 06:16:56.143 UTC [gossip.discovery] learnExistingMembers -> DEBU 1054 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 " +peer0.org1.example.com | "2019-04-22 06:16:56.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 1055 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:56.147 UTC [gossip.discovery] learnExistingMembers -> DEBU 1057 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.138 UTC [gossip.gossip] handleMessage -> DEBU 1056 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.148 UTC [gossip.gossip] handleMessage -> DEBU 1058 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.147 UTC [gossip.discovery] handleAliveMessage -> DEBU 1059 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 105a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.148 UTC [gossip.gossip] handleMessage -> DEBU 105c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 105b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.149 UTC [gossip.discovery] handleMsgFromComm -> DEBU 105d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.154 UTC [msp] DeserializeIdentity -> DEBU 105e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.154 UTC [msp] DeserializeIdentity -> DEBU 105f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.155 UTC [msp] DeserializeIdentity -> DEBU 1060 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.155 UTC [gossip.comm] Send -> DEBU 1061 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.156 UTC [msp] DeserializeIdentity -> DEBU 1062 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.156 UTC [gossip.comm] Send -> DEBU 1063 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.156 UTC [gossip.comm] sendToEndpoint -> DEBU 1064 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.157 UTC [gossip.comm] sendToEndpoint -> DEBU 1065 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.157 UTC [gossip.comm] sendToEndpoint -> DEBU 1066 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.157 UTC [gossip.comm] sendToEndpoint -> DEBU 1067 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.158 UTC [gossip.comm] func1 -> DEBU 1068 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16ef Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f0 Setting policy for key Writers to " +orderer0.example.com | "2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f1 Setting policy for key Admins to " +orderer0.example.com | "2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f2 Setting policy for key Endorsement to " +orderer0.example.com | "2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f3 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f4 Setting policy for key Readers to " +orderer0.example.com | "2019-04-22 06:18:03.188 UTC [common.configtx] recurseConfigMap -> DEBU 16f5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f6 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f7 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f8 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.190 UTC [common.configtx] recurseConfigMap -> DEBU 16fa Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.190 UTC [common.configtx] recurseConfigMap -> DEBU 16fb Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.190 UTC [common.configtx] recurseConfigMap -> DEBU 16fc Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.191 UTC [common.configtx] recurseConfigMap -> DEBU 16fd Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.191 UTC [common.configtx] recurseConfigMap -> DEBU 16fe Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.191 UTC [common.channelconfig] NewStandardValues -> DEBU 16ff Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:18:03.191 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1700 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:18:03.191 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1701 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:18:03.191 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1702 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1703 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1704 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.192 UTC [common.channelconfig] NewStandardValues -> DEBU 1705 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1706 Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1707 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.192 UTC [common.channelconfig] NewStandardValues -> DEBU 1708 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.193 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1709 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.193 UTC [common.channelconfig] NewStandardValues -> DEBU 170a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.193 UTC [common.channelconfig] initializeProtosStruct -> DEBU 170b Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.193 UTC [common.channelconfig] Validate -> DEBU 170c Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:18:03.194 UTC [common.channelconfig] validateMSP -> DEBU 170d Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.194 UTC [msp] newBccspMsp -> DEBU 170e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.194 UTC [msp] New -> DEBU 170f Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.194 UTC [msp] Setup -> DEBU 1710 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.195 UTC [msp.identity] newIdentity -> DEBU 1711 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.196 UTC [msp.identity] newIdentity -> DEBU 1712 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | "2019-04-22 06:16:56.159 UTC [gossip.gossip] handleMessage -> DEBU 1069 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.159 UTC [gossip.gossip] handleMessage -> DEBU 106a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.425 UTC [msp] DeserializeIdentity -> DEBU 106d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.426 UTC [msp] DeserializeIdentity -> DEBU 106e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.426 UTC [gossip.comm] Send -> DEBU 106f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1070 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1071 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1072 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1073 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1074 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1075 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.430 UTC [gossip.gossip] handleMessage -> DEBU 1076 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.430 UTC [msp] DeserializeIdentity -> DEBU 1077 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.430 UTC [gossip.comm] func1 -> DEBU 1078 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.430 UTC [gossip.comm] func1 -> DEBU 1079 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.431 UTC [msp.identity] Verify -> DEBU 107a Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:56.431 UTC [msp.identity] Verify -> DEBU 107b Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:56.432 UTC [msp.identity] Verify -> DEBU 107c Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +peer0.org1.example.com | 00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +peer0.org1.example.com | "2019-04-22 06:16:56.432 UTC [msp.identity] Verify -> DEBU 107d Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +peer0.org1.example.com | 00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +peer0.org1.example.com | 00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +peer0.org1.example.com | 00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +peer0.org1.example.com | 00000040 47 2b 0f d5 7d b2 |G+..}.|" +peer0.org1.example.com | "2019-04-22 06:16:56.432 UTC [msp] DeserializeIdentity -> DEBU 107e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.432 UTC [msp] DeserializeIdentity -> DEBU 107f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1080 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.196 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1713 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.197 UTC [msp] Validate -> DEBU 1714 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.201 UTC [msp] getCertificationChain -> DEBU 1715 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.202 UTC [msp] hasOURole -> DEBU 1716 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:18:03.202 UTC [msp] getCertificationChain -> DEBU 1717 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.202 UTC [common.channelconfig] NewStandardValues -> DEBU 1718 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1719 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.203 UTC [common.channelconfig] NewStandardValues -> DEBU 171a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 171b Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.204 UTC [common.channelconfig] Validate -> DEBU 171c Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-04-22 06:18:03.205 UTC [common.channelconfig] validateMSP -> DEBU 171d Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.205 UTC [msp] newBccspMsp -> DEBU 171e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.206 UTC [msp] New -> DEBU 171f Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.206 UTC [msp] Setup -> DEBU 1720 Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.207 UTC [msp.identity] newIdentity -> DEBU 1721 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.208 UTC [msp.identity] newIdentity -> DEBU 1722 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.210 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1723 Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.210 UTC [msp] Validate -> DEBU 1724 MSP Org3MSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.211 UTC [msp] getCertificationChain -> DEBU 1725 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.212 UTC [msp] hasOURole -> DEBU 1726 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:18:03.212 UTC [msp] getCertificationChain -> DEBU 1727 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.213 UTC [common.channelconfig] NewStandardValues -> DEBU 1728 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1729 Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.213 UTC [common.channelconfig] NewStandardValues -> DEBU 172a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.214 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172b Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.215 UTC [common.channelconfig] Validate -> DEBU 172c Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:18:03.215 UTC [common.channelconfig] validateMSP -> DEBU 172d Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.216 UTC [msp] newBccspMsp -> DEBU 172e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.216 UTC [msp] New -> DEBU 172f Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.216 UTC [msp] Setup -> DEBU 1730 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.217 UTC [msp.identity] newIdentity -> DEBU 1731 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1081 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1082 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [policies] Evaluate -> DEBU 1083 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [policies] Evaluate -> DEBU 1084 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [policies] Evaluate -> DEBU 1085 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [cauthdsl] func1 -> DEBU 1086 0xc00286f730 gate 1555913816433554700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [cauthdsl] func2 -> DEBU 1087 0xc00286f730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [cauthdsl] func2 -> DEBU 1088 0xc00286f730 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [cauthdsl] func2 -> DEBU 1089 0xc00286f730 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.433 UTC [msp.identity] Verify -> DEBU 108a Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +peer0.org1.example.com | 00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [msp.identity] Verify -> DEBU 108b Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +peer0.org1.example.com | 00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +peer0.org1.example.com | 00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +peer0.org1.example.com | 00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +peer0.org1.example.com | 00000040 4b b6 4c fc 03 1a |K.L...|" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [cauthdsl] func2 -> DEBU 108c 0xc00286f730 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [cauthdsl] func1 -> DEBU 108d 0xc00286f730 gate 1555913816433554700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 108e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 108f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 1090 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 1091 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.432 UTC [msp] DeserializeIdentity -> DEBU 1092 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.435 UTC [msp] DeserializeIdentity -> DEBU 1094 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.434 UTC [msp] DeserializeIdentity -> DEBU 1093 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.435 UTC [gossip.comm] Send -> DEBU 1095 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.436 UTC [msp] DeserializeIdentity -> DEBU 1096 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.436 UTC [gossip.comm] sendToEndpoint -> DEBU 1099 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.437 UTC [gossip.comm] sendToEndpoint -> DEBU 109a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.436 UTC [msp] DeserializeIdentity -> DEBU 1098 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.437 UTC [gossip.comm] sendToEndpoint -> DEBU 109b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.438 UTC [gossip.comm] sendToEndpoint -> DEBU 109d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.437 UTC [gossip.comm] sendToEndpoint -> DEBU 109c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.440 UTC [gossip.comm] sendToEndpoint -> DEBU 109e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.436 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.441 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 109f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10a0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10a1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.441 UTC [policies] Evaluate -> DEBU 10a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.441 UTC [policies] Evaluate -> DEBU 10a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.441 UTC [policies] Evaluate -> DEBU 10a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.443 UTC [cauthdsl] func1 -> DEBU 10a5 0xc00288d660 gate 1555913816441810500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.443 UTC [cauthdsl] func2 -> DEBU 10a6 0xc00288d660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.443 UTC [cauthdsl] func2 -> DEBU 10a7 0xc00288d660 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [cauthdsl] func2 -> DEBU 10a8 0xc00288d660 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [msp.identity] Verify -> DEBU 10a9 Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +peer0.org1.example.com | 00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [msp.identity] Verify -> DEBU 10aa Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +peer0.org1.example.com | 00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +peer0.org1.example.com | 00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +peer0.org1.example.com | 00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +peer0.org1.example.com | 00000040 aa 36 98 36 42 e6 |.6.6B.|" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [cauthdsl] func2 -> DEBU 10ab 0xc00288d660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [cauthdsl] func1 -> DEBU 10ac 0xc00288d660 gate 1555913816441810500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [policies] Evaluate -> DEBU 10ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [policies] Evaluate -> DEBU 10ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.444 UTC [policies] Evaluate -> DEBU 10af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [msp] DeserializeIdentity -> DEBU 10b1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [cauthdsl] func1 -> DEBU 10b7 0xc0028a8740 gate 1555913816445403800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10b8 0xc0028a8740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10b9 0xc0028a8740 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10ba 0xc0028a8740 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [msp.identity] Verify -> DEBU 10bb Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +peer0.org1.example.com | 00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [msp.identity] Verify -> DEBU 10bc Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +peer0.org1.example.com | 00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +peer0.org1.example.com | 00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +peer0.org1.example.com | 00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +peer0.org1.example.com | 00000040 aa 36 98 36 42 e6 |.6.6B.|" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10bd 0xc0028a8740 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [cauthdsl] func1 -> DEBU 10be 0xc0028a8740 gate 1555913816445403800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10c1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.446 UTC [policies] Evaluate -> DEBU 10c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.446 UTC [gossip.gossip] handleMessage -> DEBU 10c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.446 UTC [gossip.gossip] handleMessage -> DEBU 10c4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.446 UTC [msp.identity] Verify -> DEBU 10c5 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:56.446 UTC [msp.identity] Verify -> DEBU 10c6 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:56.446 UTC [msp] DeserializeIdentity -> DEBU 10c7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.446 UTC [msp] DeserializeIdentity -> DEBU 10c8 Obtaining identity" +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.217 UTC [msp.identity] newIdentity -> DEBU 1732 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.219 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1733 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.219 UTC [msp] Validate -> DEBU 1734 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.220 UTC [msp] getCertificationChain -> DEBU 1735 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.220 UTC [msp] hasOURole -> DEBU 1736 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:18:03.221 UTC [msp] getCertificationChain -> DEBU 1737 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.221 UTC [common.channelconfig] NewStandardValues -> DEBU 1738 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:18:03.222 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1739 Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:18:03.222 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173a Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:18:03.222 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173b Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:18:03.223 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173c Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:18:03.223 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173d Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:18:03.223 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173e Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.223 UTC [common.channelconfig] NewStandardValues -> DEBU 173f Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.224 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1740 Processing field: Endpoints" +orderer0.example.com | "2019-04-22 06:18:03.224 UTC [common.channelconfig] NewStandardValues -> DEBU 1741 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.225 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1742 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.225 UTC [common.channelconfig] validateMSP -> DEBU 1743 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.225 UTC [msp] newBccspMsp -> DEBU 1744 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.226 UTC [msp] New -> DEBU 1745 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.228 UTC [msp] Setup -> DEBU 1747 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:18:03.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1746 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1748 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +orderer0.example.com | "2019-04-22 06:18:03.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1749 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.5µs " +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10ca Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10cb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [policies] Evaluate -> DEBU 10cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [policies] Evaluate -> DEBU 10cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [policies] Evaluate -> DEBU 10ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [cauthdsl] func1 -> DEBU 10cf 0xc0028bc870 gate 1555913816447314900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [cauthdsl] func2 -> DEBU 10d0 0xc0028bc870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [cauthdsl] func2 -> DEBU 10d1 0xc0028bc870 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [cauthdsl] func2 -> DEBU 10d2 0xc0028bc870 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.447 UTC [msp.identity] Verify -> DEBU 10d3 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:56.448 UTC [msp.identity] Verify -> DEBU 10d4 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:56.448 UTC [cauthdsl] func2 -> DEBU 10d5 0xc0028bc870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.448 UTC [cauthdsl] func1 -> DEBU 10d6 0xc0028bc870 gate 1555913816447314900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [msp.identity] Verify -> DEBU 10db Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +peer0.org1.example.com | 00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [msp.identity] Verify -> DEBU 10dc Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +peer0.org1.example.com | 00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +peer0.org1.example.com | 00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +peer0.org1.example.com | 00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +peer0.org1.example.com | 00000040 aa dd 99 2d 62 37 1c |...-b7.|" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10dd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10de Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func1 -> DEBU 10e2 0xc0028bdf70 gate 1555913816449573400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e3 0xc0028bdf70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e4 0xc0028bdf70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e5 0xc0028bdf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e6 0xc0028bdf70 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func1 -> DEBU 10e7 0xc0028bdf70 gate 1555913816449573400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.231 UTC [msp.identity] newIdentity -> DEBU 174a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.232 UTC [msp.identity] newIdentity -> DEBU 174b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.233 UTC [msp] Validate -> DEBU 174c MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.233 UTC [msp] Setup -> DEBU 174d Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-04-22 06:18:03.234 UTC [msp] Setup -> DEBU 174e MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-04-22 06:18:03.234 UTC [policies] NewManagerImpl -> DEBU 174f Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.235 UTC [policies] NewManagerImpl -> DEBU 1750 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.235 UTC [policies] NewManagerImpl -> DEBU 1751 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.235 UTC [policies] NewManagerImpl -> DEBU 1752 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.236 UTC [policies] NewManagerImpl -> DEBU 1753 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.236 UTC [policies] NewManagerImpl -> DEBU 1754 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.237 UTC [policies] NewManagerImpl -> DEBU 1755 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.237 UTC [policies] NewManagerImpl -> DEBU 1756 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.237 UTC [policies] NewManagerImpl -> DEBU 1757 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.238 UTC [policies] NewManagerImpl -> DEBU 1758 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.239 UTC [policies] NewManagerImpl -> DEBU 1759 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.239 UTC [policies] NewManagerImpl -> DEBU 175a Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.239 UTC [policies] NewManagerImpl -> DEBU 175b Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.240 UTC [policies] NewManagerImpl -> DEBU 175c Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.240 UTC [policies] NewManagerImpl -> DEBU 175d Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.240 UTC [policies] NewManagerImpl -> DEBU 175e Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.241 UTC [policies] NewManagerImpl -> DEBU 175f Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.241 UTC [policies] NewManagerImpl -> DEBU 1760 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.241 UTC [policies] NewManagerImpl -> DEBU 1761 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.242 UTC [policies] NewManagerImpl -> DEBU 1762 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.242 UTC [policies] NewManagerImpl -> DEBU 1763 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.242 UTC [policies] NewManagerImpl -> DEBU 1764 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1765 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func1 -> DEBU 10eb 0xc0028d07b0 gate 1555913816449930300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10ec 0xc0028d07b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [cauthdsl] func2 -> DEBU 10ed 0xc0028d07b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [cauthdsl] func2 -> DEBU 10ee 0xc0028d07b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [msp.identity] Verify -> DEBU 10ef Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +peer0.org1.example.com | 00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [msp.identity] Verify -> DEBU 10f0 Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +peer0.org1.example.com | 00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +peer0.org1.example.com | 00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +peer0.org1.example.com | 00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +peer0.org1.example.com | 00000040 aa dd 99 2d 62 37 1c |...-b7.|" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [cauthdsl] func2 -> DEBU 10f1 0xc0028d07b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [cauthdsl] func1 -> DEBU 10f2 0xc0028d07b0 gate 1555913816449930300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f3 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [gossip.gossip] handleMessage -> DEBU 10f7 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.450 UTC [gossip.gossip] handleMessage -> DEBU 10f8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.451 UTC [msp] DeserializeIdentity -> DEBU 10f9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.451 UTC [msp.identity] Verify -> DEBU 10fa Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +peer0.org1.example.com | 00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +peer0.org1.example.com | "2019-04-22 06:16:56.451 UTC [msp.identity] Verify -> DEBU 10fb Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +peer0.org1.example.com | 00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +peer0.org1.example.com | 00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +peer0.org1.example.com | 00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +peer0.org1.example.com | 00000040 cc d9 fe a5 bf 9f 6e |......n|" +peer0.org1.example.com | "2019-04-22 06:16:56.451 UTC [msp] DeserializeIdentity -> DEBU 10fc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [msp] DeserializeIdentity -> DEBU 10fd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10ff Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1100 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [policies] Evaluate -> DEBU 1101 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [policies] Evaluate -> DEBU 1102 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [policies] Evaluate -> DEBU 1103 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.452 UTC [cauthdsl] func1 -> DEBU 1104 0xc0028e49e0 gate 1555913816452931900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 1105 0xc0028e49e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 1106 0xc0028e49e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 1107 0xc0028e49e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [msp.identity] Verify -> DEBU 1108 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +peer0.org1.example.com | 00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [msp.identity] Verify -> DEBU 1109 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +peer0.org1.example.com | 00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1766 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1767 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1768 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1769 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176c Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1770 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1771 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1772 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1773 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1774 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1775 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1776 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1777 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1778 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1779 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177b Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177f Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1780 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1781 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1782 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1783 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1784 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1785 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1786 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1787 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1788 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1789 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178e Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.246 UTC [common.configtx] addToMap -> DEBU 178f Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:18:03.246 UTC [common.configtx] addToMap -> DEBU 1790 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:18:03.247 UTC [common.configtx] addToMap -> DEBU 1791 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:18:03.247 UTC [common.configtx] addToMap -> DEBU 1792 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:18:03.247 UTC [common.configtx] addToMap -> DEBU 1793 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:18:03.248 UTC [common.configtx] addToMap -> DEBU 1794 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:03.248 UTC [common.configtx] addToMap -> DEBU 1795 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:18:03.249 UTC [common.configtx] addToMap -> DEBU 1796 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.249 UTC [common.configtx] addToMap -> DEBU 1797 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:18:03.250 UTC [common.configtx] addToMap -> DEBU 1798 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:18:03.250 UTC [common.configtx] addToMap -> DEBU 1799 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:18:03.251 UTC [common.configtx] addToMap -> DEBU 179a Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:18:03.251 UTC [common.configtx] addToMap -> DEBU 179b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:18:03.251 UTC [common.configtx] addToMap -> DEBU 179c Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:18:03.252 UTC [common.configtx] addToMap -> DEBU 179d Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:03.252 UTC [common.channelconfig] LogSanityChecks -> DEBU 179e As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:18:03.252 UTC [common.channelconfig] LogSanityChecks -> DEBU 179f As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:18:03.253 UTC [policies] Manager -> DEBU 17a0 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:18:03.253 UTC [policies] Manager -> DEBU 17a1 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.253 UTC [policies] Manager -> DEBU 17a2 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a3 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a4 Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a5 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a6 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17a7 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17a8 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17a9 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17aa Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ab Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ac Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ad Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ae Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17af As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [common.capabilities] Supported -> DEBU 17b0 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:18:03.254 UTC [common.capabilities] Supported -> DEBU 17b1 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [msp.identity] Sign -> DEBU 17b2 Sign: plaintext: 0AD2060A1B08011A06089BB9F5E50522...23B587B1269570E60541A69721245929 " +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [msp.identity] Sign -> DEBU 17b3 Sign: digest: 4727605DEACC667F41E938852730211E20B5E0BD4B22AF9E916EF85470C3753C " +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:03.255 UTC [msp.identity] newIdentity -> DEBU 17ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +orderer0.example.com | CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +orderer0.example.com | 4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +orderer0.example.com | gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +orderer0.example.com | 4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +orderer0.example.com | N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +orderer0.example.com | QQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000404180 gate 1555913883256007700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000404180 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000404180 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17be 0xc000404180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000404180 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000404180 gate 1555913883256007700 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17c4 0xc000446a30 gate 1555913883256373000 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c5 0xc000446a30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c6 0xc000446a30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c7 0xc000446a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c8 0xc000446a30 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17c9 0xc000446a30 gate 1555913883256373000 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17ca Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] func1 -> DEBU 17cc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17cd Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | 00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +peer0.org1.example.com | 00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +peer0.org1.example.com | 00000040 c6 b2 69 37 7f 42 |..i7.B|" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 110a 0xc0028e49e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [cauthdsl] func1 -> DEBU 110b 0xc0028e49e0 gate 1555913816452931900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [policies] Evaluate -> DEBU 110c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [policies] Evaluate -> DEBU 110d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.453 UTC [policies] Evaluate -> DEBU 110e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.454 UTC [policies] Evaluate -> DEBU 110f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.454 UTC [msp] DeserializeIdentity -> DEBU 1110 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.454 UTC [msp] DeserializeIdentity -> DEBU 1111 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.454 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1112 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1113 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1114 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.454 UTC [policies] Evaluate -> DEBU 1115 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.455 UTC [policies] Evaluate -> DEBU 1116 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.455 UTC [policies] Evaluate -> DEBU 1117 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.455 UTC [cauthdsl] func1 -> DEBU 1118 0xc0028f81b0 gate 1555913816455196300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.455 UTC [cauthdsl] func2 -> DEBU 1119 0xc0028f81b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.455 UTC [cauthdsl] func2 -> DEBU 111a 0xc0028f81b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.455 UTC [cauthdsl] func2 -> DEBU 111b 0xc0028f81b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.455 UTC [msp.identity] Verify -> DEBU 111c Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +peer0.org1.example.com | 00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [msp.identity] Verify -> DEBU 111d Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +peer0.org1.example.com | 00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +peer0.org1.example.com | 00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +peer0.org1.example.com | 00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +peer0.org1.example.com | 00000040 90 96 41 3c ce b6 f2 |..A<...|" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [cauthdsl] func2 -> DEBU 111e 0xc0028f81b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [cauthdsl] func1 -> DEBU 111f 0xc0028f81b0 gate 1555913816455196300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1120 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1121 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1122 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1123 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.456 UTC [msp] DeserializeIdentity -> DEBU 1124 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1125 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1126 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [policies] Evaluate -> DEBU 1127 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [policies] Evaluate -> DEBU 1128 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [policies] Evaluate -> DEBU 1129 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [cauthdsl] func1 -> DEBU 112a 0xc0028f9290 gate 1555913816457352700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [cauthdsl] func2 -> DEBU 112b 0xc0028f9290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [cauthdsl] func2 -> DEBU 112c 0xc0028f9290 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [cauthdsl] func2 -> DEBU 112d 0xc0028f9290 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [msp.identity] Verify -> DEBU 112e Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +peer0.org1.example.com | 00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +peer0.org1.example.com | "2019-04-22 06:16:56.457 UTC [msp.identity] Verify -> DEBU 112f Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +peer0.org1.example.com | 00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +peer0.org1.example.com | 00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +peer0.org1.example.com | 00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +peer0.org1.example.com | 00000040 90 96 41 3c ce b6 f2 |..A<...|" +peer0.org1.example.com | "2019-04-22 06:16:56.458 UTC [cauthdsl] func2 -> DEBU 1130 0xc0028f9290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1131 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1132 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.459 UTC [gossip.pull] Hello -> DEBU 1133 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1134 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1135 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.460 UTC [gossip.comm] Send -> DEBU 1136 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.460 UTC [gossip.comm] sendToEndpoint -> DEBU 1137 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.460 UTC [gossip.comm] sendToEndpoint -> DEBU 1138 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.461 UTC [cauthdsl] func1 -> DEBU 1139 0xc0028f9290 gate 1555913816457352700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.461 UTC [gossip.gossip] handleMessage -> DEBU 113e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.462 UTC [gossip.gossip] handleMessage -> DEBU 113f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.462 UTC [msp.identity] Verify -> DEBU 1140 Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +peer0.org1.example.com | 00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +peer0.org1.example.com | "2019-04-22 06:16:56.463 UTC [msp.identity] Verify -> DEBU 1141 Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +peer0.org1.example.com | 00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +peer0.org1.example.com | 00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +peer0.org1.example.com | 00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +peer0.org1.example.com | 00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +peer0.org1.example.com | "2019-04-22 06:16:56.463 UTC [msp] DeserializeIdentity -> DEBU 1142 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.463 UTC [gossip.gossip] handleMessage -> DEBU 1143 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.465 UTC [gossip.comm] func1 -> DEBU 1144 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2396584452137601230 , Msg_type: BLOCK_MSG, digests: [2 3 1], Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.465 UTC [gossip.gossip] handleMessage -> DEBU 1145 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2396584452137601230 , Msg_type: BLOCK_MSG, digests: [2 3 1], Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.465 UTC [gossip.pull] HandleMessage -> DEBU 1146 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2396584452137601230 , Msg_type: BLOCK_MSG, digests: [2 3 1], Envelope: 42 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.465 UTC [gossip.gossip] handleMessage -> DEBU 1147 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.470 UTC [gossip.election] waitForInterrupt -> DEBU 1148 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.470 UTC [gossip.election] IsLeader -> DEBU 1149 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:16:56.470 UTC [msp.identity] Sign -> DEBU 114a Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510041801 " +peer0.org1.example.com | "2019-04-22 06:16:56.470 UTC [msp.identity] Sign -> DEBU 114b Sign: digest: BB3D8BEE5AD7904E6B8CF3C4A42A8011AABDE6B642BAAA695495B16EA497F873 " +peer0.org1.example.com | "2019-04-22 06:16:56.470 UTC [gossip.election] waitForInterrupt -> DEBU 114c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 114d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 114e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 114f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 1150 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.471 UTC [gossip.comm] Send -> DEBU 1151 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 1152 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 1153 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.472 UTC [gossip.comm] sendToEndpoint -> DEBU 1154 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.472 UTC [gossip.comm] sendToEndpoint -> DEBU 1155 Exiting" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17d1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17d2 0xc0004479b0 gate 1555913883256886700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17d3 0xc0004479b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17d4 0xc0004479b0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.257 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17d5 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-04-22 06:18:03.257 UTC [msp] Validate -> DEBU 17d6 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.257 UTC [cauthdsl] func2 -> DEBU 17d7 0xc0004479b0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:03.257 UTC [msp.identity] Verify -> DEBU 17d8 Verify: digest = 00000000 47 27 60 5d ea cc 66 7f 41 e9 38 85 27 30 21 1e |G'`]..f.A.8.'0!.| +orderer0.example.com | 00000010 20 b5 e0 bd 4b 22 af 9e 91 6e f8 54 70 c3 75 3c | ...K"...n.Tp.u<|" +orderer0.example.com | "2019-04-22 06:18:03.257 UTC [msp.identity] Verify -> DEBU 17d9 Verify: sig = 00000000 30 44 02 20 31 5b e1 29 5d be 8a 00 a9 b9 6f 8b |0D. 1[.)].....o.| +orderer0.example.com | 00000010 06 fd 2d 3d 49 13 e4 86 ff b1 e3 7b bb 11 2f a7 |..-=I......{../.| +orderer0.example.com | 00000020 e8 4c 2c 00 02 20 2b 39 58 25 37 44 b6 da 79 71 |.L,.. +9X%7D..yq| +orderer0.example.com | 00000030 55 e6 d5 98 ff 2b be b5 48 14 67 53 8a 79 75 1d |U....+..H.gS.yu.| +orderer0.example.com | 00000040 aa ab fd c0 f2 f7 |......|" +orderer0.example.com | "2019-04-22 06:18:03.257 UTC [cauthdsl] func2 -> DEBU 17da 0xc0004479b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:03.258 UTC [cauthdsl] func1 -> DEBU 17db 0xc0004479b0 gate 1555913883256886700 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.258 UTC [policies] Evaluate -> DEBU 17dc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17dd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17de Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17e0 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-04-22 06:18:03.259 UTC [orderer.consensus.etcdraft] propose -> INFO 17e2 Created block [9], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:18:03.259 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 17e3 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:18:03.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e4 Sending msg of 34122 bytes to 3 on channel businesschannel took 99.1µs" +orderer0.example.com | "2019-04-22 06:18:03.263 UTC [orderer.consensus.etcdraft] 2 -> DEBU 17e5 Proposed block [9] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:18:03.264 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 17e6 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34736" +orderer0.example.com | "2019-04-22 06:18:03.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 34122 to orderer1.example.com(orderer1.example.com:7050) took 374.8µs " +orderer0.example.com | "2019-04-22 06:18:03.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e8 Send of ConsensusRequest for channel businesschannel with payload of size 34122 to orderer2.example.com(orderer2.example.com:7050) took 272µs " +orderer0.example.com | "2019-04-22 06:18:03.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e9 Sending msg of 34122 bytes to 2 on channel businesschannel took 23.1µs" +orderer0.example.com | "2019-04-22 06:18:03.273 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.274 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17eb Sending msg of 28 bytes to 2 on channel businesschannel took 188.6µs" +orderer0.example.com | "2019-04-22 06:18:03.274 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ec Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +orderer0.example.com | "2019-04-22 06:18:03.274 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.9µs " +orderer0.example.com | "2019-04-22 06:18:03.274 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 17ee Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17ef Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17f0 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17f1 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17f2 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f3 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f4 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f5 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f6 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f7 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f8 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f9 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17fa Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17fb Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17fc Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 17fd Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 17fe Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 17ff Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 1800 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.278 UTC [common.configtx] addToMap -> DEBU 1801 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1802 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1803 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1804 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1805 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1806 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1807 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.280 UTC [common.configtx] addToMap -> DEBU 1808 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.280 UTC [common.configtx] addToMap -> DEBU 1809 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:18:03.280 UTC [common.configtx] addToMap -> DEBU 180a Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.280 UTC [common.configtx] verifyDeltaSet -> DEBU 180b Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.280 UTC [common.configtx] verifyDeltaSet -> DEBU 180c Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.281 UTC [common.configtx] verifyDeltaSet -> DEBU 180d Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.281 UTC [common.configtx] verifyDeltaSet -> DEBU 180e Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.281 UTC [common.configtx] verifyDeltaSet -> DEBU 180f Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.281 UTC [common.configtx] policyForItem -> DEBU 1810 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-04-22 06:18:03.281 UTC [policies] Manager -> DEBU 1811 Manager Channel looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1812 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1813 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1814 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1815 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1816 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1817 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1818 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.283 UTC [policies] Manager -> DEBU 1819 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.283 UTC [policies] Evaluate -> DEBU 181a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-04-22 06:18:03.283 UTC [policies] Evaluate -> DEBU 181b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.283 UTC [policies] Evaluate -> DEBU 181c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:18:03.285 UTC [orderer.common.cluster.step] handleMessage -> DEBU 181d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.283 UTC [cauthdsl] deduplicate -> WARN 181e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:18:03.285 UTC [cauthdsl] func1 -> DEBU 181f 0xc000421470 gate 1555913883285910900 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.286 UTC [cauthdsl] func2 -> DEBU 1820 0xc000421470 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-04-22 06:18:03.286 UTC [cauthdsl] func2 -> DEBU 1821 0xc000421470 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.286 UTC [cauthdsl] func2 -> DEBU 1822 0xc000421470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1823 0xc000421470 processing identity 1 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1824 0xc000421470 principal matched by identity 1" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1825 Verify: digest = 00000000 0c fd 1f e5 b1 9b db 02 57 c4 82 57 bc d0 0c 4b |........W..W...K| +orderer0.example.com | 00000010 97 87 a9 3b ca 23 a8 c2 03 3c f3 1a f8 a3 07 57 |...;.#...<.....W|" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1826 Verify: sig = 00000000 30 45 02 21 00 d6 e0 8c 37 df 62 cb 69 f9 ca 73 |0E.!....7.b.i..s| +orderer0.example.com | 00000010 04 64 61 bf 99 26 93 ca 3d 45 f6 6f 0f 3d b9 61 |.da..&..=E.o.=.a| +orderer0.example.com | 00000020 7a af 77 b9 12 02 20 4a 16 64 bd 85 6e 43 d5 e7 |z.w... J.d..nC..| +orderer0.example.com | 00000030 28 07 12 4c 58 19 bf 43 c2 12 88 2a bf 28 75 09 |(..LX..C...*.(u.| +orderer0.example.com | 00000040 a5 e6 fa 2b 77 6d e3 |...+wm.|" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1827 0xc000421470 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func1 -> DEBU 1828 0xc000421470 gate 1555913883285910900 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [common.deliver] Handle -> WARN 1829 Error reading from 192.168.224.9:34734: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [policies] Evaluate -> DEBU 182a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [orderer.common.server] func1 -> DEBU 182b Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [policies] Evaluate -> DEBU 182c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [policies] Evaluate -> DEBU 182e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [comm.grpc.server] 1 -> INFO 182d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34734 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=129.5927ms +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] deduplicate -> WARN 182f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func1 -> DEBU 1830 0xc0003ce270 gate 1555913883287592400 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1831 0xc0003ce270 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-04-22 06:16:56.626 UTC [gossip.comm] func1 -> DEBU 1156 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.626 UTC [gossip.gossip] handleMessage -> DEBU 1157 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.626 UTC [gossip.gossip] handleMessage -> DEBU 1158 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1159 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 115a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [msp] DeserializeIdentity -> DEBU 115b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 115c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [policies] Evaluate -> DEBU 115f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [policies] Evaluate -> DEBU 1160 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.627 UTC [policies] Evaluate -> DEBU 1161 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.628 UTC [cauthdsl] func1 -> DEBU 1162 0xc0037d40b0 gate 1555913816628109800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.628 UTC [cauthdsl] func2 -> DEBU 1163 0xc0037d40b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.628 UTC [cauthdsl] func2 -> DEBU 1164 0xc0037d40b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.628 UTC [cauthdsl] func2 -> DEBU 1165 0xc0037d40b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.628 UTC [msp.identity] Verify -> DEBU 1166 Verify: digest = 00000000 c8 84 d4 e1 f6 e0 9c 32 62 dc dd fc cd f2 29 97 |.......2b.....).| +peer0.org1.example.com | 00000010 26 18 c9 f8 f2 b1 e8 6a 90 73 ad 12 bf fa 02 8f |&......j.s......|" +peer0.org1.example.com | "2019-04-22 06:16:56.628 UTC [msp.identity] Verify -> DEBU 1167 Verify: sig = 00000000 30 45 02 21 00 b5 dd 8a b7 98 47 38 01 b8 f0 e2 |0E.!......G8....| +peer0.org1.example.com | 00000010 14 05 ab 70 0b 6d 99 c9 4c 32 20 bd 87 7f 0c be |...p.m..L2 .....| +peer0.org1.example.com | 00000020 e1 5f 9f 97 1d 02 20 4b a2 0c 66 e5 75 55 4e cc |._.... K..f.uUN.| +peer0.org1.example.com | 00000030 93 dc ed c7 08 d9 3c df 4e e1 14 12 c2 6d 87 f6 |......<.N....m..| +peer0.org1.example.com | 00000040 b9 7e 35 61 c0 8d 31 |.~5a..1|" +peer0.org1.example.com | "2019-04-22 06:16:56.629 UTC [cauthdsl] func2 -> DEBU 1168 0xc0037d40b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.629 UTC [cauthdsl] func1 -> DEBU 1169 0xc0037d40b0 gate 1555913816628109800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 116e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 116f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [grpc] warningf -> DEBU 1832 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.4:7050->192.168.224.9:34736: read: connection reset by peer" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1833 0xc0003ce270 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1834 0xc0003ce270 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [orderer.common.broadcast] Handle -> WARN 1835 Error reading from 192.168.224.9:34736: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1836 Verify: digest = 00000000 8e 73 57 0e b7 c7 1b 71 9b 02 5f bd 37 50 74 25 |.sW....q.._.7Pt%| +orderer0.example.com | 00000010 06 6a 52 6c ef f6 86 21 8c 54 e2 73 5f 3d 4d 90 |.jRl...!.T.s_=M.|" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [orderer.common.server] func1 -> DEBU 1837 Closing Broadcast stream" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1838 Verify: sig = 00000000 30 45 02 21 00 f2 fa 21 f5 b5 4e 2e de a8 55 bd |0E.!...!..N...U.| +orderer0.example.com | 00000010 a8 cc 6e 98 b5 33 37 87 be c9 27 42 cf 21 2b 5f |..n..37...'B.!+_| +orderer0.example.com | 00000020 54 69 eb ed 1a 02 20 0b 2a d2 c7 e1 11 a3 64 cc |Ti.... .*.....d.| +orderer0.example.com | 00000030 0e 42 62 c5 f0 de 23 74 4d 0c 1a 46 43 50 06 27 |.Bb...#tM..FCP.'| +orderer0.example.com | 00000040 0b 25 bf 2c 59 22 e1 |.%.,Y".|" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [comm.grpc.server] 1 -> INFO 1839 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34736 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=114.3443ms +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 183a 0xc0003ce270 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [grpc] infof -> DEBU 183b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:03.287 UTC [cauthdsl] func1 -> DEBU 183c 0xc0003ce270 gate 1555913883287592400 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 183d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.288 UTC [grpc] infof -> DEBU 183e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 1840 Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 1841 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.291 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1842 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.292 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1843 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 291.9µs " +orderer0.example.com | "2019-04-22 06:18:03.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1844 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.288 UTC [common.configtx] verifyDeltaSet -> DEBU 1845 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.303 UTC [common.configtx] verifyDeltaSet -> DEBU 1846 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.303 UTC [common.configtx] recurseConfigMap -> DEBU 1847 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.304 UTC [common.configtx] recurseConfigMap -> DEBU 1848 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.304 UTC [common.configtx] recurseConfigMap -> DEBU 1849 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.304 UTC [common.configtx] recurseConfigMap -> DEBU 184a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.313 UTC [common.configtx] recurseConfigMap -> DEBU 184f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.313 UTC [common.configtx] recurseConfigMap -> DEBU 1850 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.313 UTC [common.configtx] recurseConfigMap -> DEBU 1851 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1852 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1853 Setting policy for key Admins to " +orderer0.example.com | "2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1854 Setting policy for key Endorsement to " +orderer0.example.com | "2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1855 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-04-22 06:18:03.315 UTC [common.configtx] recurseConfigMap -> DEBU 1856 Setting policy for key Readers to " +orderer0.example.com | "2019-04-22 06:18:03.315 UTC [common.configtx] recurseConfigMap -> DEBU 1857 Setting policy for key Writers to " +orderer0.example.com | "2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 1858 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 1859 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.324 UTC [common.configtx] recurseConfigMap -> DEBU 185e Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.325 UTC [common.configtx] recurseConfigMap -> DEBU 185f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.325 UTC [common.configtx] recurseConfigMap -> DEBU 1860 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.326 UTC [common.configtx] recurseConfigMap -> DEBU 1861 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-04-22 06:18:03.327 UTC [common.channelconfig] NewStandardValues -> DEBU 1862 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-04-22 06:18:03.328 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1863 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:18:03.329 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1864 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:18:03.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1865 Processing field: OrdererAddresses" +orderer0.example.com | "2019-04-22 06:18:03.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1866 Processing field: Consortium" +orderer0.example.com | "2019-04-22 06:18:03.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1867 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1868 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-04-22 06:18:03.336 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1869 Processing field: ACLs" +orderer0.example.com | "2019-04-22 06:18:03.337 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186a Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.337 UTC [common.channelconfig] NewStandardValues -> DEBU 186b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.337 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186c Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.338 UTC [common.channelconfig] NewStandardValues -> DEBU 186d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.338 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186e Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.338 UTC [common.channelconfig] Validate -> DEBU 186f Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:18:03.338 UTC [common.channelconfig] validateMSP -> DEBU 1870 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.339 UTC [msp] newBccspMsp -> DEBU 1871 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.339 UTC [msp] New -> DEBU 1872 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.339 UTC [msp] Setup -> DEBU 1873 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.340 UTC [msp.identity] newIdentity -> DEBU 1874 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +orderer0.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +orderer0.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.340 UTC [msp.identity] newIdentity -> DEBU 1875 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +orderer0.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +orderer0.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +orderer0.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.341 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1876 Checking if identity satisfies role [CLIENT] for Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.341 UTC [msp] Validate -> DEBU 1877 MSP Org2MSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.341 UTC [msp] getCertificationChain -> DEBU 1878 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.342 UTC [msp] hasOURole -> DEBU 1879 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:18:03.342 UTC [msp] getCertificationChain -> DEBU 187a MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.343 UTC [common.channelconfig] NewStandardValues -> DEBU 187b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.343 UTC [common.channelconfig] initializeProtosStruct -> DEBU 187c Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.343 UTC [common.channelconfig] NewStandardValues -> DEBU 187d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.343 UTC [common.channelconfig] initializeProtosStruct -> DEBU 187e Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.344 UTC [common.channelconfig] Validate -> DEBU 187f Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-04-22 06:18:03.344 UTC [common.channelconfig] validateMSP -> DEBU 1880 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.344 UTC [msp] newBccspMsp -> DEBU 1881 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.344 UTC [msp] New -> DEBU 1882 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.344 UTC [msp] Setup -> DEBU 1883 Setting up MSP instance Org3MSP" +peer0.org1.example.com | "2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1170 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 " +peer0.org1.example.com | "2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1171 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 " +peer0.org1.example.com | "2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1172 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1173 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 1174 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1175 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.634 UTC [msp] DeserializeIdentity -> DEBU 1176 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.635 UTC [msp] DeserializeIdentity -> DEBU 1177 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.635 UTC [msp] DeserializeIdentity -> DEBU 1178 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.636 UTC [msp] DeserializeIdentity -> DEBU 1179 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.636 UTC [msp] DeserializeIdentity -> DEBU 117a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.637 UTC [msp] DeserializeIdentity -> DEBU 117b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.637 UTC [gossip.comm] Send -> DEBU 117c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.637 UTC [msp] DeserializeIdentity -> DEBU 117d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.638 UTC [msp] DeserializeIdentity -> DEBU 117e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.638 UTC [gossip.comm] func1 -> DEBU 117f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.639 UTC [gossip.comm] Send -> DEBU 1180 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:56.639 UTC [gossip.comm] sendToEndpoint -> DEBU 1182 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.640 UTC [gossip.comm] sendToEndpoint -> DEBU 1183 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.639 UTC [gossip.gossip] handleMessage -> DEBU 1181 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.641 UTC [gossip.gossip] handleMessage -> DEBU 1184 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.641 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1185 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1186 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.646 UTC [gossip.gossip] handleMessage -> DEBU 1187 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.646 UTC [gossip.gossip] handleMessage -> DEBU 1189 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.646 UTC [gossip.comm] sendToEndpoint -> DEBU 1188 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.648 UTC [gossip.comm] sendToEndpoint -> DEBU 118b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.684 UTC [gossip.comm] func1 -> DEBU 118d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.685 UTC [gossip.comm] func1 -> DEBU 118e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.685 UTC [gossip.gossip] handleMessage -> DEBU 118f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.686 UTC [msp] DeserializeIdentity -> DEBU 1190 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.686 UTC [msp] DeserializeIdentity -> DEBU 1191 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.686 UTC [gossip.gossip] handleMessage -> DEBU 1192 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.687 UTC [gossip.gossip] handleMessage -> DEBU 1193 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.687 UTC [gossip.pull] HandleMessage -> DEBU 1194 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:18:03.345 UTC [msp.identity] newIdentity -> DEBU 1884 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +orderer0.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +orderer0.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +orderer0.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.345 UTC [msp.identity] newIdentity -> DEBU 1885 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +orderer0.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +orderer0.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +orderer0.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.346 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1886 Checking if identity satisfies role [CLIENT] for Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.346 UTC [msp] Validate -> DEBU 1887 MSP Org3MSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.346 UTC [msp] getCertificationChain -> DEBU 1888 MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.347 UTC [msp] hasOURole -> DEBU 1889 MSP Org3MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:18:03.347 UTC [msp] getCertificationChain -> DEBU 188a MSP Org3MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.348 UTC [common.channelconfig] NewStandardValues -> DEBU 188b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.348 UTC [common.channelconfig] initializeProtosStruct -> DEBU 188c Processing field: AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.348 UTC [common.channelconfig] NewStandardValues -> DEBU 188d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.349 UTC [common.channelconfig] initializeProtosStruct -> DEBU 188e Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.349 UTC [common.channelconfig] Validate -> DEBU 188f Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-04-22 06:18:03.349 UTC [common.channelconfig] validateMSP -> DEBU 1890 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.349 UTC [msp] newBccspMsp -> DEBU 1891 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.349 UTC [msp] New -> DEBU 1892 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.350 UTC [msp] Setup -> DEBU 1893 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.350 UTC [msp.identity] newIdentity -> DEBU 1894 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +orderer0.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +orderer0.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +orderer0.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +orderer0.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +orderer0.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +orderer0.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +orderer0.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.350 UTC [msp.identity] newIdentity -> DEBU 1895 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +orderer0.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +orderer0.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +orderer0.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +orderer0.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +orderer0.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +orderer0.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +orderer0.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.351 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1896 Checking if identity satisfies role [CLIENT] for Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.351 UTC [msp] Validate -> DEBU 1897 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.352 UTC [msp] getCertificationChain -> DEBU 1898 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.352 UTC [msp] hasOURole -> DEBU 1899 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-04-22 06:18:03.352 UTC [msp] getCertificationChain -> DEBU 189a MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.352 UTC [common.channelconfig] NewStandardValues -> DEBU 189b Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-04-22 06:18:03.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189c Processing field: ConsensusType" +orderer0.example.com | "2019-04-22 06:18:03.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189d Processing field: BatchSize" +orderer0.example.com | "2019-04-22 06:18:03.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189e Processing field: BatchTimeout" +orderer0.example.com | "2019-04-22 06:18:03.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189f Processing field: KafkaBrokers" +orderer0.example.com | "2019-04-22 06:18:03.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a0 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:18:03.355 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a1 Processing field: Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.356 UTC [common.channelconfig] NewStandardValues -> DEBU 18a2 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-04-22 06:18:03.356 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a3 Processing field: Endpoints" +peer0.org1.example.com | "2019-04-22 06:16:56.687 UTC [gossip.pull] SendDigest -> DEBU 1195 Sending BLOCK_MSG digest: [3 1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:56.688 UTC [gossip.gossip] handleMessage -> DEBU 1196 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.695 UTC [gossip.comm] func1 -> DEBU 1197 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.696 UTC [gossip.gossip] handleMessage -> DEBU 1198 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.696 UTC [msp.identity] Verify -> DEBU 1199 Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +peer0.org1.example.com | 00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +peer0.org1.example.com | "2019-04-22 06:16:56.697 UTC [msp.identity] Verify -> DEBU 119a Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +peer0.org1.example.com | 00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +peer0.org1.example.com | 00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +peer0.org1.example.com | 00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +peer0.org1.example.com | 00000040 aa dd 99 2d 62 37 1c |...-b7.|" +peer0.org1.example.com | "2019-04-22 06:16:56.698 UTC [gossip.gossip] handleMessage -> DEBU 119b Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.700 UTC [gossip.gossip] handleMessage -> DEBU 119c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.700 UTC [msp.identity] Verify -> DEBU 119d Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +peer0.org1.example.com | 00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +peer0.org1.example.com | "2019-04-22 06:16:56.700 UTC [msp.identity] Verify -> DEBU 119e Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +peer0.org1.example.com | 00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +peer0.org1.example.com | 00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +peer0.org1.example.com | 00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +peer0.org1.example.com | 00000040 aa dd 99 2d 62 37 1c |...-b7.|" +peer0.org1.example.com | "2019-04-22 06:16:56.701 UTC [msp] DeserializeIdentity -> DEBU 119f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.701 UTC [gossip.gossip] handleMessage -> DEBU 11a0 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.704 UTC [gossip.comm] func1 -> DEBU 11a1 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.705 UTC [gossip.gossip] handleMessage -> DEBU 11a2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.705 UTC [msp.identity] Verify -> DEBU 11a3 Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +peer0.org1.example.com | 00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +peer0.org1.example.com | "2019-04-22 06:16:56.705 UTC [msp.identity] Verify -> DEBU 11a4 Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +peer0.org1.example.com | 00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +peer0.org1.example.com | 00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +peer0.org1.example.com | 00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +peer0.org1.example.com | 00000040 aa dd 99 2d 62 37 1c |...-b7.|" +peer0.org1.example.com | "2019-04-22 06:16:56.706 UTC [msp] DeserializeIdentity -> DEBU 11a5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.706 UTC [gossip.gossip] handleMessage -> DEBU 11a6 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.908 UTC [gossip.gossip] handleMessage -> DEBU 11a7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.908 UTC [msp] DeserializeIdentity -> DEBU 11a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.909 UTC [msp] DeserializeIdentity -> DEBU 11a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.909 UTC [msp] DeserializeIdentity -> DEBU 11aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.910 UTC [gossip.gossip] handleMessage -> DEBU 11ab Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.914 UTC [gossip.gossip] handleMessage -> DEBU 11ac Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913814637443300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.914 UTC [msp] DeserializeIdentity -> DEBU 11ad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11ae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11af Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.916 UTC [policies] Evaluate -> DEBU 11b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.917 UTC [policies] Evaluate -> DEBU 11b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.917 UTC [policies] Evaluate -> DEBU 11b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.917 UTC [cauthdsl] func1 -> DEBU 11b4 0xc00382aed0 gate 1555913816917295900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.917 UTC [cauthdsl] func2 -> DEBU 11b5 0xc00382aed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.917 UTC [cauthdsl] func2 -> DEBU 11b6 0xc00382aed0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.918 UTC [cauthdsl] func2 -> DEBU 11b7 0xc00382aed0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.919 UTC [msp.identity] Verify -> DEBU 11b8 Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +peer0.org1.example.com | 00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +peer0.org1.example.com | "2019-04-22 06:16:56.919 UTC [msp.identity] Verify -> DEBU 11b9 Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +peer0.org1.example.com | 00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +peer0.org1.example.com | 00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +peer0.org1.example.com | 00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +peer0.org1.example.com | 00000040 aa 36 98 36 42 e6 |.6.6B.|" +peer0.org1.example.com | "2019-04-22 06:16:56.919 UTC [cauthdsl] func2 -> DEBU 11ba 0xc00382aed0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.919 UTC [cauthdsl] func1 -> DEBU 11bb 0xc00382aed0 gate 1555913816917295900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.919 UTC [policies] Evaluate -> DEBU 11bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.919 UTC [policies] Evaluate -> DEBU 11bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.920 UTC [policies] Evaluate -> DEBU 11be Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.920 UTC [policies] Evaluate -> DEBU 11bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.920 UTC [msp] DeserializeIdentity -> DEBU 11c0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.920 UTC [gossip.gossip] handleMessage -> DEBU 11c1 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:56.925 UTC [gossip.comm] func1 -> DEBU 11c2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913814637443300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.925 UTC [gossip.gossip] handleMessage -> DEBU 11c3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913814637443300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:56.925 UTC [msp] DeserializeIdentity -> DEBU 11c4 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:03.357 UTC [common.channelconfig] NewStandardValues -> DEBU 18a4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-04-22 06:18:03.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a5 Processing field: MSP" +orderer0.example.com | "2019-04-22 06:18:03.359 UTC [common.channelconfig] validateMSP -> DEBU 18a6 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.360 UTC [msp] newBccspMsp -> DEBU 18a7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.360 UTC [msp] New -> DEBU 18a8 Creating Cache-MSP instance" +orderer0.example.com | "2019-04-22 06:18:03.361 UTC [msp] Setup -> DEBU 18a9 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-04-22 06:18:03.362 UTC [msp.identity] newIdentity -> DEBU 18aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +orderer0.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +orderer0.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +orderer0.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +orderer0.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +orderer0.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +orderer0.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.363 UTC [msp.identity] newIdentity -> DEBU 18ab Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.366 UTC [msp] Validate -> DEBU 18ac MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.367 UTC [msp] Setup -> DEBU 18ad Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-04-22 06:18:03.367 UTC [msp] Setup -> DEBU 18ae MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18af Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18b0 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18b1 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18b2 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b4 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b5 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b6 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18b7 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18b8 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18b9 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18ba Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18bb Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.371 UTC [policies] NewManagerImpl -> DEBU 18bc Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.371 UTC [policies] NewManagerImpl -> DEBU 18bd Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.371 UTC [policies] NewManagerImpl -> DEBU 18be Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.373 UTC [policies] NewManagerImpl -> DEBU 18bf Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c0 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c1 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c3 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c4 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c5 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c6 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c7 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-04-22 06:18:03.376 UTC [policies] NewManagerImpl -> DEBU 18c8 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-04-22 06:18:03.376 UTC [policies] NewManagerImpl -> DEBU 18c9 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-04-22 06:18:03.376 UTC [common.configtx] addToMap -> DEBU 18ca Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-04-22 06:18:03.377 UTC [common.configtx] addToMap -> DEBU 18cb Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-04-22 06:18:03.377 UTC [common.configtx] addToMap -> DEBU 18cc Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.379 UTC [common.configtx] addToMap -> DEBU 18cd Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.380 UTC [common.configtx] addToMap -> DEBU 18ce Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.381 UTC [common.configtx] addToMap -> DEBU 18cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.381 UTC [common.configtx] addToMap -> DEBU 18d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.382 UTC [common.configtx] addToMap -> DEBU 18d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.382 UTC [common.configtx] addToMap -> DEBU 18d2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.383 UTC [common.configtx] addToMap -> DEBU 18d3 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.383 UTC [common.configtx] addToMap -> DEBU 18d4 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.383 UTC [common.configtx] addToMap -> DEBU 18d5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.384 UTC [common.configtx] addToMap -> DEBU 18d6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.384 UTC [common.configtx] addToMap -> DEBU 18d7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.384 UTC [common.configtx] addToMap -> DEBU 18d8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18d9 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18da Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18db Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.386 UTC [common.configtx] addToMap -> DEBU 18dd Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.386 UTC [common.configtx] addToMap -> DEBU 18de Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-04-22 06:18:03.386 UTC [common.configtx] addToMap -> DEBU 18df Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-04-22 06:18:03.387 UTC [common.configtx] addToMap -> DEBU 18e0 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-04-22 06:18:03.387 UTC [common.configtx] addToMap -> DEBU 18e1 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.387 UTC [common.configtx] addToMap -> DEBU 18e2 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-04-22 06:18:03.388 UTC [common.configtx] addToMap -> DEBU 18e3 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-04-22 06:18:03.388 UTC [common.configtx] addToMap -> DEBU 18e4 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.388 UTC [common.configtx] addToMap -> DEBU 18e5 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e6 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18eb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18ec Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18ed Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18ee Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18ef Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18f0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18f1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f2 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f3 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f4 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f6 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f7 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f8 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f9 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fa Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fb Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fc Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fd Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-04-22 06:18:03.395 UTC [common.channelconfig] LogSanityChecks -> DEBU 18fe As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-04-22 06:18:03.395 UTC [common.channelconfig] LogSanityChecks -> DEBU 18ff As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-04-22 06:18:03.395 UTC [policies] Manager -> DEBU 1900 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-04-22 06:18:03.395 UTC [policies] Manager -> DEBU 1901 Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.395 UTC [policies] Manager -> DEBU 1902 Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1903 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1904 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1905 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1906 Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-04-22 06:18:03.396 UTC [common.channelconfig] LogSanityChecks -> DEBU 1907 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-04-22 06:18:03.396 UTC [common.channelconfig] LogSanityChecks -> DEBU 1908 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-04-22 06:18:03.397 UTC [common.channelconfig] LogSanityChecks -> DEBU 1909 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190a Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [policies] Evaluate -> DEBU 11c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [policies] Evaluate -> DEBU 11c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [policies] Evaluate -> DEBU 11ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [cauthdsl] func1 -> DEBU 11cb 0xc00384c4b0 gate 1555913816926654100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [cauthdsl] func2 -> DEBU 11cc 0xc00384c4b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:56.926 UTC [cauthdsl] func2 -> DEBU 11cd 0xc00384c4b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:56.927 UTC [cauthdsl] func2 -> DEBU 11ce 0xc00384c4b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.927 UTC [msp.identity] Verify -> DEBU 11cf Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +peer0.org1.example.com | 00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +peer0.org1.example.com | "2019-04-22 06:16:56.927 UTC [msp.identity] Verify -> DEBU 11d0 Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +peer0.org1.example.com | 00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +peer0.org1.example.com | 00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +peer0.org1.example.com | 00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +peer0.org1.example.com | 00000040 aa 36 98 36 42 e6 |.6.6B.|" +peer0.org1.example.com | "2019-04-22 06:16:56.927 UTC [cauthdsl] func2 -> DEBU 11d1 0xc00384c4b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:56.927 UTC [cauthdsl] func1 -> DEBU 11d2 0xc00384c4b0 gate 1555913816926654100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:56.927 UTC [policies] Evaluate -> DEBU 11d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.927 UTC [policies] Evaluate -> DEBU 11d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.928 UTC [policies] Evaluate -> DEBU 11d5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.928 UTC [policies] Evaluate -> DEBU 11d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:56.928 UTC [msp] DeserializeIdentity -> DEBU 11d7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:56.928 UTC [gossip.gossip] handleMessage -> DEBU 11d8 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.045 UTC [gossip.gossip] handleMessage -> DEBU 11d9 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.046 UTC [gossip.gossip] handleMessage -> DEBU 11da Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.046 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.046 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11dc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:57.047 UTC [msp] DeserializeIdentity -> DEBU 11dd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:57.048 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11df Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:57.048 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:57.048 UTC [policies] Evaluate -> DEBU 11e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.048 UTC [policies] Evaluate -> DEBU 11e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:57.048 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190b Manager Channel has managers Orderer" +orderer0.example.com | "2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190c Manager Channel has managers Application" +orderer0.example.com | "2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190d Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-04-22 06:18:03.398 UTC [policies] Manager -> DEBU 190e Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-04-22 06:18:03.398 UTC [common.channelconfig] LogSanityChecks -> DEBU 190f As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-04-22 06:18:03.399 UTC [common.capabilities] Supported -> DEBU 1910 Orderer capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:18:03.399 UTC [common.capabilities] Supported -> DEBU 1911 Channel capability V2_0 is supported and is enabled" +orderer0.example.com | "2019-04-22 06:18:03.399 UTC [orderer.common.server] func1 -> DEBU 1912 Executing callback to update root CAs" +orderer0.example.com | "2019-04-22 06:18:03.399 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1913 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1914 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1915 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1916 adding app root CAs for MSP [Org3MSP]" +orderer0.example.com | "2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1917 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-04-22 06:18:03.401 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1918 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 9" +orderer0.example.com | "2019-04-22 06:18:03.401 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1919 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 9" +orderer0.example.com | "2019-04-22 06:18:03.402 UTC [msp.identity] Sign -> DEBU 191a Sign: plaintext: 0A020809120B0A090A03010203100418...5FAD23AFCEB1D5B20F0307D9DCE27EF7 " +orderer0.example.com | "2019-04-22 06:18:03.402 UTC [msp.identity] Sign -> DEBU 191b Sign: digest: 70BF915B60505EDC480E067112B3B75FEB2535CBB0E083BD6977DEACAACDD484 " +orderer0.example.com | "2019-04-22 06:18:03.406 UTC [fsblkstorage] indexBlock -> DEBU 191c Indexing block [blockNum=9, blockHash=[]byte{0x78, 0x7a, 0x67, 0xb8, 0x41, 0xd5, 0x69, 0x5a, 0xe5, 0xed, 0xc7, 0x2, 0x28, 0x9c, 0x7e, 0xe2, 0xc1, 0x3a, 0x7, 0xce, 0xc4, 0xf8, 0x4f, 0x8e, 0xe3, 0x8b, 0xa5, 0x79, 0x20, 0x3, 0xac, 0xeb} txOffsets= +orderer0.example.com | txId= locPointer=offset=71, bytesLength=33993 +orderer0.example.com | ]" +orderer0.example.com | "2019-04-22 06:18:03.409 UTC [fsblkstorage] updateCheckpoint -> DEBU 191d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133667], isChainEmpty=[false], lastBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:03.410 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 191e [channel: businesschannel] Wrote block [9]" +orderer0.example.com | "2019-04-22 06:18:03.410 UTC [fsblkstorage] waitForBlock -> DEBU 191f Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:03.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1920 Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:03.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1922 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:03.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1923 blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:03.411 UTC [fsblkstorage] waitForBlock -> DEBU 1921 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:03.412 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1924 Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:03.412 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1925 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:03.412 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1926 blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 1927 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 1928 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 1929 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 192a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 192b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.413 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [msp.identity] newIdentity -> DEBU 192d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +orderer0.example.com | FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +orderer0.example.com | 5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +orderer0.example.com | whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [cauthdsl] func1 -> DEBU 192e 0xc000e7e2c0 gate 1555913883414314500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [cauthdsl] func2 -> DEBU 192f 0xc000e7e2c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [cauthdsl] func2 -> DEBU 1930 0xc000e7e2c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1931 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [msp] Validate -> DEBU 1932 MSP Org1MSP validating identity" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [msp] getCertificationChain -> DEBU 1933 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.414 UTC [policies] Evaluate -> DEBU 1934 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.415 UTC [policies] Evaluate -> DEBU 1935 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:03.415 UTC [policies] Evaluate -> DEBU 1936 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.415 UTC [policies] Evaluate -> DEBU 1938 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:57.049 UTC [cauthdsl] func1 -> DEBU 11e4 0xc00385c250 gate 1555913817049159500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:57.049 UTC [cauthdsl] func2 -> DEBU 11e5 0xc00385c250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:57.049 UTC [cauthdsl] func2 -> DEBU 11e6 0xc00385c250 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:57.049 UTC [cauthdsl] func2 -> DEBU 11e7 0xc00385c250 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.050 UTC [msp.identity] Verify -> DEBU 11e8 Verify: digest = 00000000 69 7b de cc 65 26 f4 6e 15 c9 12 47 ac 1d da 72 |i{..e&.n...G...r| +peer0.org1.example.com | 00000010 54 0c 8f 86 5b 2d b4 f3 46 33 e6 20 ce 6b 21 b4 |T...[-..F3. .k!.|" +peer0.org1.example.com | "2019-04-22 06:16:57.050 UTC [msp.identity] Verify -> DEBU 11e9 Verify: sig = 00000000 30 44 02 20 33 c4 3e f1 89 54 d2 40 b6 9a 20 e1 |0D. 3.>..T.@.. .| +peer0.org1.example.com | 00000010 e7 4f f0 3f 9e 52 8f 01 77 c4 da 3b 9f ed f3 73 |.O.?.R..w..;...s| +peer0.org1.example.com | 00000020 b1 16 f4 99 02 20 0a 0a 1d 39 6e 24 3d 44 7b 14 |..... ...9n$=D{.| +peer0.org1.example.com | 00000030 ab 0b 2a 8f f8 53 d0 58 5e 3c 3e 06 c8 75 06 62 |..*..S.X^<>..u.b| +peer0.org1.example.com | 00000040 66 9c 54 a7 ff 03 |f.T...|" +peer0.org1.example.com | "2019-04-22 06:16:57.050 UTC [cauthdsl] func2 -> DEBU 11ea 0xc00385c250 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.050 UTC [cauthdsl] func1 -> DEBU 11eb 0xc00385c250 gate 1555913817049159500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.052 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.053 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:57.054 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f3 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 " +peer0.org1.example.com | "2019-04-22 06:16:57.053 UTC [gossip.comm] func1 -> DEBU 11f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.054 UTC [gossip.gossip] handleMessage -> DEBU 11f4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 " +peer0.org1.example.com | "2019-04-22 06:16:57.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:57.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f7 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f8 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.056 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11fb Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.057 UTC [gossip.gossip] handleMessage -> DEBU 11fc Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.059 UTC [gossip.comm] func1 -> DEBU 11fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.060 UTC [gossip.gossip] handleMessage -> DEBU 11fe Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.060 UTC [gossip.gossip] handleMessage -> DEBU 11ff Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.060 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1200 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.061 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1201 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.062 UTC [msp] DeserializeIdentity -> DEBU 1202 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1203 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1204 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1205 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1206 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.064 UTC [msp] DeserializeIdentity -> DEBU 1207 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.064 UTC [msp] DeserializeIdentity -> DEBU 1208 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:03.416 UTC [policies] Evaluate -> DEBU 1939 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.416 UTC [msp] DeserializeIdentity -> DEBU 193a Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:03.416 UTC [msp.identity] newIdentity -> DEBU 193b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +orderer0.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +orderer0.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +orderer0.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:03.415 UTC [cauthdsl] func2 -> DEBU 1937 0xc000e7e2c0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:03.417 UTC [cauthdsl] func1 -> DEBU 193c 0xc001223d20 gate 1555913883417527800 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.418 UTC [msp.identity] Verify -> DEBU 193d Verify: digest = 00000000 f5 67 6f e9 01 86 e2 3b c8 c3 da b3 68 f5 8e f8 |.go....;....h...| +orderer0.example.com | 00000010 97 ff f5 66 85 53 d6 fb 68 48 fc 80 60 00 ca ec |...f.S..hH..`...|" +orderer0.example.com | "2019-04-22 06:18:03.418 UTC [msp.identity] Verify -> DEBU 193e Verify: sig = 00000000 30 45 02 21 00 ff 48 53 40 33 74 a0 e7 2f cb 63 |0E.!..HS@3t../.c| +orderer0.example.com | 00000010 2c c2 18 3c 3a 49 87 98 a3 b5 93 5b c6 a2 3f 1b |,..<:I.....[..?.| +orderer0.example.com | 00000020 04 66 be c4 fc 02 20 78 12 cf 92 fa c0 9c 22 db |.f.... x......".| +orderer0.example.com | 00000030 33 27 db bc c9 3c f6 4c 29 19 6a 33 00 69 69 94 |3'...<.L).j3.ii.| +orderer0.example.com | 00000040 c9 7a e7 f9 61 c4 ba |.z..a..|" +orderer0.example.com | "2019-04-22 06:18:03.418 UTC [cauthdsl] func2 -> DEBU 193f 0xc001223d20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:03.419 UTC [cauthdsl] func2 -> DEBU 1940 0xc001223d20 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.419 UTC [cauthdsl] func2 -> DEBU 1941 0xc000e7e2c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:03.419 UTC [cauthdsl] func1 -> DEBU 1942 0xc000e7e2c0 gate 1555913883414314500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1943 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1946 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1948 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1949 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:03.420 UTC [common.deliver] deliverBlocks -> DEBU 194a [channel: businesschannel] Delivering block [9] for (0xc000dd6c40) for 192.168.224.6:57810" +orderer0.example.com | "2019-04-22 06:18:03.422 UTC [fsblkstorage] waitForBlock -> DEBU 194b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:03.419 UTC [cauthdsl] func2 -> DEBU 1944 0xc001223d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-04-22 06:18:03.423 UTC [cauthdsl] func2 -> DEBU 194c 0xc001223d20 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:03.423 UTC [cauthdsl] func1 -> DEBU 194d 0xc001223d20 gate 1555913883417527800 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:03.423 UTC [policies] Evaluate -> DEBU 194e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.423 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.423 UTC [policies] Evaluate -> DEBU 1950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:03.423 UTC [cauthdsl] func1 -> DEBU 1951 0xc000bcf670 gate 1555913883423821600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:03.424 UTC [cauthdsl] func2 -> DEBU 1952 0xc000bcf670 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:03.424 UTC [cauthdsl] func2 -> DEBU 1953 0xc000bcf670 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:03.424 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1954 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-04-22 06:18:03.424 UTC [msp] Validate -> DEBU 1955 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:57.064 UTC [gossip.comm] Send -> DEBU 1209 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:57.064 UTC [msp] DeserializeIdentity -> DEBU 120a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.065 UTC [gossip.comm] Send -> DEBU 120b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:57.065 UTC [gossip.comm] sendToEndpoint -> DEBU 120c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.065 UTC [gossip.comm] sendToEndpoint -> DEBU 120d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.065 UTC [gossip.comm] sendToEndpoint -> DEBU 120e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.066 UTC [gossip.comm] sendToEndpoint -> DEBU 120f Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.123 UTC [gossip.comm] func1 -> DEBU 1210 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.124 UTC [gossip.gossip] handleMessage -> DEBU 1211 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.124 UTC [msp] DeserializeIdentity -> DEBU 1212 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.124 UTC [msp] DeserializeIdentity -> DEBU 1213 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.124 UTC [msp] DeserializeIdentity -> DEBU 1214 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.125 UTC [gossip.gossip] handleMessage -> DEBU 1215 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.141 UTC [gossip.comm] func1 -> DEBU 1216 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913814645849600 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.143 UTC [gossip.gossip] handleMessage -> DEBU 1217 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913814645849600 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.155 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1218 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:57.158 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1219 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:57.158 UTC [policies] Evaluate -> DEBU 121a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:16:57.159 UTC [policies] Evaluate -> DEBU 121b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:57.162 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.162 UTC [cauthdsl] func1 -> DEBU 121d 0xc003871980 gate 1555913817162648800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:57.163 UTC [cauthdsl] func2 -> DEBU 121e 0xc003871980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:57.164 UTC [cauthdsl] func2 -> DEBU 1220 0xc003871980 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:57.166 UTC [cauthdsl] func2 -> DEBU 1221 0xc003871980 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.146 UTC [msp] DeserializeIdentity -> DEBU 121f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.168 UTC [msp.identity] Verify -> DEBU 1222 Verify: digest = 00000000 7a 39 d2 60 f2 de c3 02 b6 04 56 87 72 23 cd 5d |z9.`......V.r#.]| +peer0.org1.example.com | 00000010 32 ed 4b 0f 64 54 8e 9e 15 b3 78 3d 92 54 eb a5 |2.K.dT....x=.T..|" +peer0.org1.example.com | "2019-04-22 06:16:57.169 UTC [msp.identity] Verify -> DEBU 1223 Verify: sig = 00000000 30 44 02 20 3b a3 fd e3 68 22 3e ed f5 47 29 61 |0D. ;...h">..G)a| +peer0.org1.example.com | 00000010 c5 bf 1b 15 56 21 a5 54 59 46 bc 30 4d 3b fe f0 |....V!.TYF.0M;..| +peer0.org1.example.com | 00000020 d7 d6 d1 97 02 20 12 2e ab d0 9d f7 a3 42 e3 e4 |..... .......B..| +peer0.org1.example.com | 00000030 8b 88 2f d8 2c 21 82 c4 65 be 28 ad 20 83 71 63 |../.,!..e.(. .qc| +peer0.org1.example.com | 00000040 f8 92 7c fb b0 7f |..|...|" +peer0.org1.example.com | "2019-04-22 06:16:57.171 UTC [cauthdsl] func2 -> DEBU 1224 0xc003871980 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.172 UTC [cauthdsl] func1 -> DEBU 1225 0xc003871980 gate 1555913817162648800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:57.173 UTC [policies] Evaluate -> DEBU 1226 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:16:57.173 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-04-22 06:18:03.424 UTC [msp] getCertificationChain -> DEBU 1956 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-04-22 06:18:03.425 UTC [cauthdsl] func2 -> DEBU 1957 0xc000bcf670 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:03.425 UTC [msp.identity] Verify -> DEBU 1958 Verify: digest = 00000000 af 5a b7 0c 05 3e dc 52 32 17 c5 ce ce f1 59 7f |.Z...>.R2.....Y.| +orderer0.example.com | 00000010 66 ce f9 49 f2 db ac 98 ac b0 19 02 b5 d4 ea 2c |f..I...........,|" +orderer0.example.com | "2019-04-22 06:18:03.425 UTC [msp.identity] Verify -> DEBU 1959 Verify: sig = 00000000 30 45 02 21 00 af 56 2b 74 f2 e4 ce 5d 2b 83 c7 |0E.!..V+t...]+..| +orderer0.example.com | 00000010 40 f6 33 6f c2 f5 25 75 8d 97 0d 5d 91 92 7e bf |@.3o..%u...]..~.| +orderer0.example.com | 00000020 62 d2 37 18 6f 02 20 70 7d 92 3b 3e 04 df 9f df |b.7.o. p}.;>....| +orderer0.example.com | 00000030 3f 93 89 c1 34 da 73 ae 2b c7 d1 0a ad 7d ac fb |?...4.s.+....}..| +orderer0.example.com | 00000040 af b9 e7 2d 88 a7 ce |...-...|" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [cauthdsl] func2 -> DEBU 195a 0xc000bcf670 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [cauthdsl] func1 -> DEBU 195b 0xc000bcf670 gate 1555913883423821600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195e Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 1960 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 1961 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:03.426 UTC [common.deliver] deliverBlocks -> DEBU 1962 [channel: businesschannel] Delivering block [9] for (0xc000dd7b40) for 192.168.224.8:43620" +orderer0.example.com | "2019-04-22 06:18:03.427 UTC [fsblkstorage] waitForBlock -> DEBU 1963 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:03.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1964 Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +orderer0.example.com | "2019-04-22 06:18:03.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1965 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-04-22 06:18:03.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1966 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 250.7µs " +orderer0.example.com | "2019-04-22 06:18:03.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1967 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1968 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.777ms " +orderer0.example.com | "2019-04-22 06:18:03.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1969 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 196a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:03.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 196b Sending msg of 28 bytes to 3 on channel testchainid took 27.6µs" +orderer0.example.com | "2019-04-22 06:18:03.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 196c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.7µs " +orderer0.example.com | "2019-04-22 06:18:04.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 196d Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +orderer0.example.com | "2019-04-22 06:18:04.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 196e Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +orderer0.example.com | "2019-04-22 06:18:04.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1970 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.6µs " +orderer0.example.com | "2019-04-22 06:18:04.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 196f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " +orderer0.example.com | "2019-04-22 06:18:04.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1971 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:04.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1972 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:04.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1973 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:04.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1974 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +orderer0.example.com | "2019-04-22 06:18:04.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1975 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2345ms " +peer0.org1.example.com | "2019-04-22 06:16:57.169 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1227 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:57.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 122a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:57.173 UTC [policies] Evaluate -> DEBU 1229 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:57.175 UTC [policies] Evaluate -> DEBU 122b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:16:57.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 122c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:57.176 UTC [blocksProvider] DeliverBlocks -> DEBU 122d [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.176 UTC [gossip.state] addPayload -> DEBU 122e [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.176 UTC [policies] Evaluate -> DEBU 122f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.177 UTC [policies] Evaluate -> DEBU 1232 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:57.177 UTC [gossip.state] addPayload -> DEBU 1230 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:16:57.179 UTC [blocksProvider] DeliverBlocks -> DEBU 1233 [businesschannel] Gossiping block [4], peers number [3]" +peer0.org1.example.com | "2019-04-22 06:16:57.179 UTC [gossip.channel] AddToMsgStore -> DEBU 1235 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:16:57.179 UTC [gossip.pull] Add -> DEBU 1236 Added 4, total items: 4" +peer0.org1.example.com | "2019-04-22 06:16:57.177 UTC [gossip.state] deliverPayloads -> DEBU 1231 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.179 UTC [gossip.state] deliverPayloads -> DEBU 1237 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:16:57.179 UTC [gossip.privdata] StoreBlock -> INFO 1238 [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-04-22 06:16:57.179 UTC [gossip.privdata] StoreBlock -> DEBU 1239 [businesschannel] Validating block [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.180 UTC [committer.txvalidator] Validate -> DEBU 123a [businesschannel] START Block Validation for block [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.177 UTC [policies] Evaluate -> DEBU 1234 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.180 UTC [committer.txvalidator] Validate -> DEBU 123b expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:16:57.181 UTC [cauthdsl] func1 -> DEBU 123c 0xc003881280 gate 1555913817180978800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:57.181 UTC [committer.txvalidator] validateTx -> DEBU 123d [businesschannel] validateTx starts for block 0xc003183bc0 env 0xc003884410 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:57.181 UTC [protoutils] ValidateTransaction -> DEBU 123e ValidateTransactionEnvelope starts for envelope 0xc003884410" +peer0.org1.example.com | "2019-04-22 06:16:57.181 UTC [cauthdsl] func2 -> DEBU 123f 0xc003881280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:57.183 UTC [protoutils] ValidateTransaction -> DEBU 1240 Header is channel_header:"\010\003\032\013\010\327\270\365\345\005\020\230\335\243)\"\017businesschannel*@5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\337\232P\360\000\t\276c\177\320\225\036t\357\376%\277\320\335\354\315\364u" " +peer0.org1.example.com | "2019-04-22 06:16:57.183 UTC [protoutils] validateChannelHeader -> DEBU 1241 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:57.186 UTC [protoutils] checkSignatureFromCreator -> DEBU 1242 begin" +peer0.org1.example.com | "2019-04-22 06:16:57.183 UTC [cauthdsl] func2 -> DEBU 1243 0xc003881280 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:57.187 UTC [msp] GetManagerForChain -> DEBU 1244 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:57.190 UTC [msp] DeserializeIdentity -> DEBU 1245 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.190 UTC [msp.identity] newIdentity -> DEBU 1246 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:16:57.191 UTC [protoutils] checkSignatureFromCreator -> DEBU 1247 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-04-22 06:16:57.191 UTC [msp] Validate -> DEBU 1248 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:16:57.192 UTC [msp] getCertificationChain -> DEBU 1249 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:16:57.192 UTC [protoutils] checkSignatureFromCreator -> DEBU 124a creator is valid" +orderer0.example.com | "2019-04-22 06:18:04.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1976 Sending msg of 28 bytes to 2 on channel businesschannel took 53.8µs" +orderer0.example.com | "2019-04-22 06:18:04.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1978 Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" +orderer0.example.com | "2019-04-22 06:18:04.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1979 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:04.578 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 882.5µs " +orderer0.example.com | "2019-04-22 06:18:04.574 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1977 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 269.8µs " +orderer0.example.com | "2019-04-22 06:18:04.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:04.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:04.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197d Sending msg of 28 bytes to 3 on channel testchainid took 163.3µs" +orderer0.example.com | "2019-04-22 06:18:04.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.4µs " +orderer0.example.com | "2019-04-22 06:18:05.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197f Sending msg of 28 bytes to 2 on channel businesschannel took 40.7µs" +orderer0.example.com | "2019-04-22 06:18:05.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1981 Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-04-22 06:18:05.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1982 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " +orderer0.example.com | "2019-04-22 06:18:05.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1980 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.1µs " +orderer0.example.com | "2019-04-22 06:18:05.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1983 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:05.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1984 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:05.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1985 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:05.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1986 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +orderer0.example.com | "2019-04-22 06:18:05.231 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1987 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +orderer0.example.com | "2019-04-22 06:18:05.519 UTC [orderer.common.server] Deliver -> DEBU 1988 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:05.519 UTC [common.deliver] Handle -> DEBU 1989 Starting new deliver loop for 192.168.224.9:34764" +orderer0.example.com | "2019-04-22 06:18:05.519 UTC [common.deliver] Handle -> DEBU 198a Attempting to read seek info message from 192.168.224.9:34764" +peer0.org1.example.com | "2019-04-22 06:16:57.192 UTC [msp.identity] Verify -> DEBU 124b Verify: digest = 00000000 9a e4 d0 0f d4 55 79 7d d5 a1 3f 48 f4 6a cd 96 |.....Uy}..?H.j..| +peer0.org1.example.com | 00000010 d4 d3 0b 7e 9e 3a d1 94 33 3d 05 87 b1 87 f6 ce |...~.:..3=......|" +peer0.org1.example.com | "2019-04-22 06:16:57.193 UTC [msp.identity] Verify -> DEBU 124c Verify: sig = 00000000 30 44 02 20 26 57 c8 26 3a a7 0a af 07 00 5a 93 |0D. &W.&:.....Z.| +peer0.org1.example.com | 00000010 83 76 3e 2b db a9 a0 07 8b ab e8 66 e5 cf 97 a4 |.v>+.......f....| +peer0.org1.example.com | 00000020 be 1f 68 54 02 20 0e c2 b7 75 b5 33 90 08 33 a7 |..hT. ...u.3..3.| +peer0.org1.example.com | 00000030 e7 a4 cc b5 60 44 4a 87 4b ae b8 87 82 29 c8 94 |....`DJ.K....)..| +peer0.org1.example.com | 00000040 6b 45 2b 9b c0 82 |kE+...|" +peer0.org1.example.com | "2019-04-22 06:16:57.194 UTC [protoutils] checkSignatureFromCreator -> DEBU 124d exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:57.195 UTC [protoutils] validateEndorserTransaction -> DEBU 124e validateEndorserTransaction starts for data 0xc00385b500, header channel_header:"\010\003\032\013\010\327\270\365\345\005\020\230\335\243)\"\017businesschannel*@5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\337\232P\360\000\t\276c\177\320\225\036t\357\376%\277\320\335\354\315\364u" " +peer0.org1.example.com | "2019-04-22 06:16:57.195 UTC [protoutils] validateEndorserTransaction -> DEBU 124f validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-04-22 06:16:57.195 UTC [protoutils] validateEndorserTransaction -> DEBU 1250 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-04-22 06:16:57.196 UTC [protoutils] ValidateTransaction -> DEBU 1251 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-04-22 06:16:57.196 UTC [committer.txvalidator] validateTx -> DEBU 1252 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.196 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1253 retrieveTransactionByID() - txId = [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91]" +peer0.org1.example.com | "2019-04-22 06:16:57.197 UTC [committer.txvalidator] validateTx -> DEBU 1254 Validating transaction with plugins" +peer0.org1.example.com | "2019-04-22 06:16:57.197 UTC [committer.txvalidator] Dispatch -> DEBU 1255 [businesschannel] Dispatch starts for bytes 0xc0038a0000" +peer0.org1.example.com | "2019-04-22 06:16:57.198 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1256 constructing new query executor txid = [ae8e659e-85a2-4fbb-8d15-ed56bccc3cd5]" +peer0.org1.example.com | "2019-04-22 06:16:57.198 UTC [cauthdsl] func2 -> DEBU 1257 0xc003881280 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.198 UTC [lockbasedtxmgr] Done -> DEBU 1258 Done with transaction simulation / query execution [ae8e659e-85a2-4fbb-8d15-ed56bccc3cd5]" +peer0.org1.example.com | "2019-04-22 06:16:57.200 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 125b Validating Tx 5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-04-22 06:16:57.199 UTC [msp.identity] Verify -> DEBU 1259 Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +peer0.org1.example.com | 00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +peer0.org1.example.com | "2019-04-22 06:16:57.200 UTC [msp.identity] Verify -> DEBU 125c Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +peer0.org1.example.com | 00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +peer0.org1.example.com | 00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +peer0.org1.example.com | 00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +peer0.org1.example.com | 00000040 90 96 41 3c ce b6 f2 |..A<...|" +peer0.org1.example.com | "2019-04-22 06:16:57.200 UTC [cauthdsl] func2 -> DEBU 125d 0xc003881280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.200 UTC [cauthdsl] func1 -> DEBU 125e 0xc003881280 gate 1555913817180978800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:57.201 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 125f constructing new query executor txid = [bb8625b6-fe7e-4f35-a7b4-b481873af063]" +peer0.org1.example.com | "2019-04-22 06:16:57.201 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1260 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:57.200 UTC [policies] Evaluate -> DEBU 1261 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.201 UTC [policies] Evaluate -> DEBU 1262 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1264 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] Done -> DEBU 1265 Done with transaction simulation / query execution [bb8625b6-fe7e-4f35-a7b4-b481873af063]" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1266 constructing new query executor txid = [afacacc2-75d7-4cd3-a124-d1759f46e168]" +peer0.org1.example.com | "2019-04-22 06:16:57.201 UTC [policies] Evaluate -> DEBU 1263 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [policies] Evaluate -> DEBU 1267 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [msp] DeserializeIdentity -> DEBU 1268 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] Done -> DEBU 1269 Done with transaction simulation / query execution [afacacc2-75d7-4cd3-a124-d1759f46e168]" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [gossip.gossip] handleMessage -> DEBU 126a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.199 UTC [msp] DeserializeIdentity -> DEBU 125a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [msp] DeserializeIdentity -> DEBU 126b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 126c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 126d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.203 UTC [gossip.comm] Send -> DEBU 126e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 126f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 1270 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:05.521 UTC [policies] Evaluate -> DEBU 198b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.522 UTC [policies] Evaluate -> DEBU 198c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:05.522 UTC [policies] Evaluate -> DEBU 198d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.523 UTC [policies] Evaluate -> DEBU 198e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:05.523 UTC [policies] Evaluate -> DEBU 198f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.523 UTC [msp] DeserializeIdentity -> DEBU 1990 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:05.524 UTC [msp.identity] newIdentity -> DEBU 1991 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +orderer0.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +orderer0.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +orderer0.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +orderer0.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +orderer0.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-04-22 06:18:05.526 UTC [cauthdsl] func1 -> DEBU 1992 0xc000c3eb70 gate 1555913885526446900 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.527 UTC [cauthdsl] func2 -> DEBU 1993 0xc000c3eb70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.527 UTC [cauthdsl] func2 -> DEBU 1994 0xc000c3eb70 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.528 UTC [cauthdsl] func2 -> DEBU 1995 0xc000c3eb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.528 UTC [cauthdsl] func2 -> DEBU 1996 0xc000c3eb70 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.528 UTC [cauthdsl] func1 -> DEBU 1997 0xc000c3eb70 gate 1555913885526446900 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.529 UTC [policies] Evaluate -> DEBU 1998 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.529 UTC [policies] Evaluate -> DEBU 1999 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.530 UTC [policies] Evaluate -> DEBU 199a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.530 UTC [cauthdsl] func1 -> DEBU 199b 0xc000c3fef0 gate 1555913885530829900 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.531 UTC [cauthdsl] func2 -> DEBU 199c 0xc000c3fef0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.531 UTC [cauthdsl] func2 -> DEBU 199d 0xc000c3fef0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.533 UTC [cauthdsl] func2 -> DEBU 199e 0xc000c3fef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.533 UTC [cauthdsl] func2 -> DEBU 199f 0xc000c3fef0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.534 UTC [cauthdsl] func1 -> DEBU 19a0 0xc000c3fef0 gate 1555913885530829900 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.534 UTC [policies] Evaluate -> DEBU 19a1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.534 UTC [policies] Evaluate -> DEBU 19a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.534 UTC [policies] Evaluate -> DEBU 19a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.534 UTC [cauthdsl] func1 -> DEBU 19a4 0xc0011f47c0 gate 1555913885534894300 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.534 UTC [cauthdsl] func2 -> DEBU 19a5 0xc0011f47c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.534 UTC [cauthdsl] func2 -> DEBU 19a6 0xc0011f47c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19a7 0xc0011f47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19a8 0xc0011f47c0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19a9 0xc0011f47c0 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19aa 0xc0011f47c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ab 0xc0011f47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ac 0xc0011f47c0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0011f47c0 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ae 0xc0011f47c0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19af 0xc0011f47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19b0 0xc0011f47c0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.535 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0011f47c0 gate 1555913885534894300 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.537 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.538 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.538 UTC [policies] func1 -> DEBU 19b4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b5 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.539 UTC [cauthdsl] func1 -> DEBU 19ba 0xc0011f5c60 gate 1555913885539932000 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.539 UTC [cauthdsl] func2 -> DEBU 19bb 0xc0011f5c60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [cauthdsl] func2 -> DEBU 19bc 0xc0011f5c60 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 19bd Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [msp] Validate -> DEBU 19be MSP OrdererMSP validating identity" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [cauthdsl] func2 -> DEBU 19bf 0xc0011f5c60 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [msp.identity] Verify -> DEBU 19c0 Verify: digest = 00000000 80 a3 df bd 37 5f da f3 54 52 8a 55 f1 6a d6 d6 |....7_..TR.U.j..| +orderer0.example.com | 00000010 77 87 ca cc db 83 81 35 ba 49 46 f1 ed 5b d9 9e |w......5.IF..[..|" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [msp.identity] Verify -> DEBU 19c1 Verify: sig = 00000000 30 44 02 20 00 ff e7 03 f2 81 57 c3 ce ae c1 af |0D. ......W.....| +orderer0.example.com | 00000010 92 79 ca f8 94 8f 9b c5 2e 71 2b 00 bd 30 a8 57 |.y.......q+..0.W| +orderer0.example.com | 00000020 cc 1d 9e d9 02 20 7c 42 e2 80 2d 65 37 17 a8 6a |..... |B..-e7..j| +orderer0.example.com | 00000030 49 63 0e 7f e7 b1 1a bd 57 54 fa d7 24 6e 68 3a |Ic......WT..$nh:| +orderer0.example.com | 00000040 31 2c 39 b7 1b 1c |1,9...|" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [cauthdsl] func2 -> DEBU 19c2 0xc0011f5c60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [cauthdsl] func1 -> DEBU 19c3 0xc0011f5c60 gate 1555913885539932000 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-04-22 06:16:57.203 UTC [gossip.comm] sendToEndpoint -> DEBU 1271 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:57.203 UTC [gossip.comm] sendToEndpoint -> DEBU 1272 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:57.202 UTC [policies] Evaluate -> DEBU 1273 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [cauthdsl] func1 -> DEBU 1274 0xc0038b3600 gate 1555913817215207800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 1275 0xc0038b3600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 1276 0xc0038b3600 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 1277 0xc0038b3600 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [msp.identity] Verify -> DEBU 1278 Verify: digest = 00000000 46 78 20 3b fe 4f b3 b0 68 88 2a c3 00 e9 e1 82 |Fx ;.O..h.*.....| +peer0.org1.example.com | 00000010 36 cd 23 85 3e c0 23 e0 47 9b 00 bd 35 a1 7c 35 |6.#.>.#.G...5.|5|" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [msp.identity] Verify -> DEBU 1279 Verify: sig = 00000000 30 45 02 21 00 97 43 40 a6 e5 90 ed 17 6b 31 4c |0E.!..C@.....k1L| +peer0.org1.example.com | 00000010 4c 6e 55 53 12 b3 bd 69 94 db 83 15 96 de 99 3e |LnUS...i.......>| +peer0.org1.example.com | 00000020 3a ef e2 91 6a 02 20 2b be 78 18 5a 60 f5 9a 70 |:...j. +.x.Z`..p| +peer0.org1.example.com | 00000030 59 f7 6f bf 3d 48 fb 42 bc 7f 83 5d d1 43 e8 27 |Y.o.=H.B...].C.'| +peer0.org1.example.com | 00000040 fc bd 8d 7a 5f 9f f1 |...z_..|" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 127a 0xc0038b3600 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [cauthdsl] func1 -> DEBU 127b 0xc0038b3600 gate 1555913817215207800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [policies] Evaluate -> DEBU 127c Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [policies] Evaluate -> DEBU 127d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 127e constructing new query executor txid = [fd34dba8-8dce-4119-83f6-fbfc7e7bd410]" +peer0.org1.example.com | "2019-04-22 06:16:57.215 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 127f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1280 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 1281 Done with transaction simulation / query execution [fd34dba8-8dce-4119-83f6-fbfc7e7bd410]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1282 constructing new query executor txid = [436302e7-ba38-4ef5-a2e1-b3103188329d]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1283 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1284 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 1285 Done with transaction simulation / query execution [436302e7-ba38-4ef5-a2e1-b3103188329d]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1286 constructing new query executor txid = [df039e15-7596-453f-abc6-2b863c1bd165]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1287 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1288 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 1289 Done with transaction simulation / query execution [df039e15-7596-453f-abc6-2b863c1bd165]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 128a constructing new query executor txid = [445870ef-c3fd-4273-b8f4-46af4ec2be49]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 128d Done with transaction simulation / query execution [445870ef-c3fd-4273-b8f4-46af4ec2be49]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 128e constructing new query executor txid = [d0865e4b-f5cd-4f70-bc31-c770d0a01e69]" +peer0.org1.example.com | "2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:57.217 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1290 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:57.217 UTC [lockbasedtxmgr] Done -> DEBU 1291 Done with transaction simulation / query execution [d0865e4b-f5cd-4f70-bc31-c770d0a01e69]" +peer0.org1.example.com | "2019-04-22 06:16:57.217 UTC [vscc] Validate -> DEBU 1292 block 4, namespace: _lifecycle, tx 0 validation results is: " +peer0.org1.example.com | "2019-04-22 06:16:57.217 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1293 Transaction 5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91 appears to be valid" +peer0.org1.example.com | "2019-04-22 06:16:57.217 UTC [committer.txvalidator] Dispatch -> DEBU 1294 [businesschannel] Dispatch completes env bytes 0xc0038a0000" +peer0.org1.example.com | "2019-04-22 06:16:57.217 UTC [committer.txvalidator] validateTx -> DEBU 1295 [businesschannel] validateTx completes for block 0xc003183bc0 env 0xc003884410 txn 0" +peer0.org1.example.com | "2019-04-22 06:16:57.217 UTC [committer.txvalidator] Validate -> DEBU 1296 got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:16:57.218 UTC [committer.txvalidator] Validate -> INFO 1297 [businesschannel] Validated block [4] in 37ms" +peer0.org1.example.com | "2019-04-22 06:16:57.218 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1298 constructing new query executor txid = [381b10b1-5ff1-4f50-b7ed-5d902cfb2879]" +peer0.org1.example.com | "2019-04-22 06:16:57.219 UTC [lockbasedtxmgr] Done -> DEBU 1299 Done with transaction simulation / query execution [381b10b1-5ff1-4f50-b7ed-5d902cfb2879]" +peer0.org1.example.com | "2019-04-22 06:16:57.219 UTC [msp] GetManagerForChain -> DEBU 129a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:57.219 UTC [cauthdsl] func1 -> DEBU 129b 0xc0038ebbc0 gate 1555913817219826800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129c 0xc0038ebbc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129d 0xc0038ebbc0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129e 0xc0038ebbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129f 0xc0038ebbc0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [cauthdsl] func1 -> DEBU 12a0 0xc0038ebbc0 gate 1555913817219826800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [gossip.privdata] isEligible -> DEBU 12a1 Skipping namespace _lifecycle collection _implicit_org_Org2MSP because we're not eligible for the private data" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [gossip.privdata] inspectTransaction -> DEBU 12a2 Peer is not eligible for collection, channel [businesschannel], chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc0038edfe0), memberOrgs:[]string{"Org2MSP"}, conf:common.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*common.CollectionPolicyConfig)(0xc0038f8ae0), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping." +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [gossip.privdata] listMissingPrivateData -> DEBU 12a3 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:16:57.220 UTC [gossip.privdata] StoreBlock -> DEBU 12a4 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:16:57.221 UTC [kvledger] CommitWithPvtData -> DEBU 12a5 [businesschannel] Validating state for block [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.221 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12a6 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:16:57.221 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12a7 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:16:57.221 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12a8 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:16:57.221 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12a9 ValidateAndPrepareBatch() for block number = [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.221 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12aa preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:57.221 UTC [valimpl] preprocessProtoBlock -> DEBU 12ab txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [stateleveldb] GetState -> DEBU 12ac GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [statebasedval] validateKVRead -> DEBU 12ad Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [stateleveldb] GetState -> DEBU 12ae GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [stateleveldb] GetState -> DEBU 12af GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 12b0 Block [4] Transaction index [0] TxId [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [valinternal] ApplyWriteSet -> DEBU 12b1 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0038cb8c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0038cb900), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0038cb940), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0038cb9c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0038cb880)}" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b2 validating rwset..." +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b3 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b4 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12b5 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x24ce6a0 0xc000413c00 0x25df440 0xc00000e380}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025e9880 map[]})]}" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [cceventmgmt] HandleStateUpdates -> DEBU 12b6 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 12b7 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +peer0.org1.example.com | "2019-04-22 06:16:57.222 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12b8 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440})}" +peer0.org1.example.com | "2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12b9 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 83 170 140 173 163 251 80 149 96 210 221 94 183 62 19 157 250 115 43 249 173 224 186 3 250 95 126 110 189 166 49 57 2 32 114 246 129 162 164 229 222 122 103 218 14 36 179 42 12 169 194 151 81 96 101 122 194 28 168 50 204 94 230 88 39 177]} 0x14d8920}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00265fa40 0xc002563680 0xc002654dc0})]}" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c6 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c8 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [common.deliver] deliverBlocks -> DEBU 19ca [channel: businesschannel] Received seekInfo (0xc001068880) start: > stop: > from 192.168.224.9:34764" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [fsblkstorage] Next -> DEBU 19cb Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [fsblkstorage] newBlockfileStream -> DEBU 19cc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19cd Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19ce Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19cf blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [common.deliver] deliverBlocks -> DEBU 19d0 [channel: businesschannel] Delivering block [9] for (0xc001068880) for 192.168.224.9:34764" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [common.deliver] deliverBlocks -> DEBU 19d1 [channel: businesschannel] Done delivering to 192.168.224.9:34764 for (0xc001068880)" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [common.deliver] Handle -> DEBU 19d2 Waiting for new SeekInfo from 192.168.224.9:34764" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [common.deliver] Handle -> DEBU 19d3 Attempting to read seek info message from 192.168.224.9:34764" +orderer0.example.com | "2019-04-22 06:18:05.541 UTC [fsblkstorage] waitForBlock -> DEBU 19d4 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:05.542 UTC [fsblkstorage] waitForBlock -> DEBU 19d5 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:05.542 UTC [fsblkstorage] waitForBlock -> DEBU 19d6 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:05.542 UTC [fsblkstorage] waitForBlock -> DEBU 19d7 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:05.547 UTC [common.deliver] Handle -> WARN 19d8 Error reading from 192.168.224.9:34764: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:05.547 UTC [orderer.common.server] func1 -> DEBU 19d9 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:05.547 UTC [comm.grpc.server] 1 -> INFO 19da streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34764 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.0702ms +orderer0.example.com | "2019-04-22 06:18:05.547 UTC [grpc] infof -> DEBU 19db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:05.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dc Sending msg of 28 bytes to 2 on channel businesschannel took 538.5µs" +orderer0.example.com | "2019-04-22 06:18:05.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.3µs " +orderer0.example.com | "2019-04-22 06:18:05.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254.4µs " +orderer0.example.com | "2019-04-22 06:18:05.589 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19df Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:05.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:05.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e1 Sending msg of 28 bytes to 3 on channel businesschannel took 46.5µs" +orderer0.example.com | "2019-04-22 06:18:05.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:05.728 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e3 Sending msg of 28 bytes to 3 on channel testchainid took 63.4µs" +orderer0.example.com | "2019-04-22 06:18:05.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.1µs " +orderer0.example.com | "2019-04-22 06:18:05.745 UTC [orderer.common.server] Deliver -> DEBU 19e5 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:05.745 UTC [common.deliver] Handle -> DEBU 19e6 Starting new deliver loop for 192.168.224.9:34766" +orderer0.example.com | "2019-04-22 06:18:05.745 UTC [common.deliver] Handle -> DEBU 19e7 Attempting to read seek info message from 192.168.224.9:34766" +orderer0.example.com | "2019-04-22 06:18:05.745 UTC [policies] Evaluate -> DEBU 19e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.223 UTC [confighistory] HandleStateUpdates -> ERRO 12ba Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00391e240)}" +peer0.org1.example.com | "2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12bb Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*confighistory.dbProvider=&{0xc00000cb00})}" +peer0.org1.example.com | "2019-04-22 06:16:57.223 UTC [kvledger] CommitWithPvtData -> DEBU 12bc [businesschannel] Committing block [4] to storage" +peer0.org1.example.com | "2019-04-22 06:16:57.223 UTC [ledgerstorage] CommitWithPvtData -> DEBU 12bd Writing block [4] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12be constructing new query executor txid = [82114033-4596-4bc7-9571-74ce1bca484e]" +peer0.org1.example.com | "2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] Done -> DEBU 12bf Done with transaction simulation / query execution [82114033-4596-4bc7-9571-74ce1bca484e]" +peer0.org1.example.com | "2019-04-22 06:16:57.229 UTC [pvtdatastorage] Prepare -> DEBU 12c0 Saved 0 private data write sets for block [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.236 UTC [fsblkstorage] indexBlock -> DEBU 12c1 Indexing block [blockNum=4, blockHash=[]byte{0xf0, 0xcc, 0x1a, 0x99, 0xb6, 0xf2, 0x1c, 0x57, 0xc4, 0x65, 0xdc, 0xe5, 0xfd, 0x17, 0x4c, 0x10, 0xd, 0xda, 0x45, 0x9e, 0x46, 0x7c, 0x52, 0x8f, 0x16, 0x48, 0xbc, 0xa8, 0x52, 0x64, 0x75, 0x8e} txOffsets= +peer0.org1.example.com | txId=5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91 locPointer=offset=70, bytesLength=3703 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:16:57.236 UTC [fsblkstorage] indexBlock -> DEBU 12c2 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3703] for tx ID: [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] to txid-index" +peer0.org1.example.com | "2019-04-22 06:16:57.236 UTC [fsblkstorage] indexBlock -> DEBU 12c3 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3703] for tx number:[0] ID: [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:16:57.239 UTC [fsblkstorage] updateCheckpoint -> DEBU 12c4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80796], isChainEmpty=[false], lastBlockNumber=[4]" +peer0.org1.example.com | "2019-04-22 06:16:57.239 UTC [pvtdatastorage] Commit -> DEBU 12c5 Committing private data for block [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.244 UTC [pvtdatastorage] Commit -> DEBU 12c6 Committed private data for block [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.245 UTC [kvledger] CommitWithPvtData -> DEBU 12c7 [businesschannel] Committing block [4] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:16:57.245 UTC [lockbasedtxmgr] Commit -> DEBU 12c8 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:57.245 UTC [lockbasedtxmgr] Commit -> DEBU 12c9 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12ca Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cb Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +peer0.org1.example.com | "2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cc Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +peer0.org1.example.com | "2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cd Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +peer0.org1.example.com | "2019-04-22 06:16:57.246 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12ce Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +peer0.org1.example.com | "2019-04-22 06:16:57.246 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cf Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +peer0.org1.example.com | "2019-04-22 06:16:57.246 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d0 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +peer0.org1.example.com | "2019-04-22 06:16:57.246 UTC [lockbasedtxmgr] Commit -> DEBU 12d1 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:16:57.246 UTC [stateleveldb] ApplyUpdates -> DEBU 12d2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +peer0.org1.example.com | "2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d3 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +peer0.org1.example.com | "2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d4 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +peer0.org1.example.com | "2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d5 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���R���l� DEBU 12d6 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +peer0.org1.example.com | "2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d7 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +peer0.org1.example.com | "2019-04-22 06:16:57.250 UTC [lockbasedtxmgr] Commit -> DEBU 12d8 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:16:57.250 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12d9 Preparing potential purge list working-set for expiringAtBlk [5]" +peer0.org1.example.com | "2019-04-22 06:16:57.250 UTC [lockbasedtxmgr] func1 -> DEBU 12da launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:16:57.251 UTC [kvledger] CommitWithPvtData -> DEBU 12db [businesschannel] Committing block [4] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:16:57.251 UTC [historyleveldb] Commit -> DEBU 12dc Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:16:57.251 UTC [leveldbhelper] GetIterator -> DEBU 12dd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:16:57.252 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12de No expiry entry found for expiringAtBlk [5]" +peer0.org1.example.com | "2019-04-22 06:16:57.271 UTC [historyleveldb] Commit -> DEBU 12df Channel [businesschannel]: Updates committed to history database for blockNo [4]" +peer0.org1.example.com | "2019-04-22 06:16:57.276 UTC [kvledger] CommitWithPvtData -> INFO 12e0 [businesschannel] Committed block [4] with 1 transaction(s) in 55ms (state_validation=2ms block_commit=21ms state_commit=6ms)" +peer0.org1.example.com | "2019-04-22 06:16:57.276 UTC [msp.identity] Sign -> DEBU 12e1 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020805 " +peer0.org1.example.com | "2019-04-22 06:16:57.276 UTC [msp.identity] Sign -> DEBU 12e2 Sign: digest: 56D78E4BE61D85078641303305ED7A39E22EF40EF453ECDA408BC60D7CCD7733 " +peer0.org1.example.com | "2019-04-22 06:16:57.276 UTC [gossip.state] commitBlock -> DEBU 12e3 [businesschannel] Committed block [4] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:16:57.716 UTC [endorser] ProcessProposal -> DEBU 12e4 Entering: request from 192.168.224.9:49258" +peer0.org1.example.com | "2019-04-22 06:16:57.717 UTC [protoutils] ValidateProposalMessage -> DEBU 12e5 ValidateProposalMessage starts for signed proposal 0xc0038fb680" +peer0.org1.example.com | "2019-04-22 06:16:57.717 UTC [protoutils] validateChannelHeader -> DEBU 12e6 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:57.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 12e7 begin" +peer0.org1.example.com | "2019-04-22 06:16:57.717 UTC [msp] GetManagerForChain -> DEBU 12e8 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:57.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 12e9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:57.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 12ea creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:57.718 UTC [msp.identity] Verify -> DEBU 12eb Verify: digest = 00000000 cc 3a 1a 95 22 ef ca 33 f2 95 aa 3b 4e d7 fa 44 |.:.."..3...;N..D| +peer0.org1.example.com | 00000010 42 39 4c ef 55 8c ba 64 74 ba 0f 3e 46 85 a0 1c |B9L.U..dt..>F...|" +peer0.org1.example.com | "2019-04-22 06:16:57.718 UTC [msp.identity] Verify -> DEBU 12ec Verify: sig = 00000000 30 45 02 21 00 c1 b5 70 95 9d 04 b2 fe 0b 63 6e |0E.!...p......cn| +peer0.org1.example.com | 00000010 76 f9 bb 7a 5b 4f b7 2a 64 fe 8e 80 9e 1a f6 6d |v..z[O.*d......m| +peer0.org1.example.com | 00000020 70 f7 a4 95 03 02 20 69 eb 95 b7 85 05 e2 9b e4 |p..... i........| +peer0.org1.example.com | 00000030 32 6c 99 12 41 62 13 90 29 2b b9 c0 ef e0 df 38 |2l..Ab..)+.....8| +peer0.org1.example.com | 00000040 3b dd b0 e8 5a 38 e6 |;...Z8.|" +peer0.org1.example.com | "2019-04-22 06:16:57.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 12ed exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:57.719 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 12ee validateChaincodeProposalMessage starts for proposal 0xc0038e9ab0, header 0xc0038fba90" +peer0.org1.example.com | "2019-04-22 06:16:57.719 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 12ef validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:57.720 UTC [endorser] preProcess -> DEBU 12f0 [businesschannel][c1345847] processing txid: c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4" +peer0.org1.example.com | "2019-04-22 06:16:57.720 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 12f1 retrieveTransactionByID() - txId = [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +peer0.org1.example.com | "2019-04-22 06:16:57.720 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 12f2 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:57.721 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 12f3 constructing new tx simulator txid = [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +peer0.org1.example.com | "2019-04-22 06:16:57.721 UTC [endorser] SimulateProposal -> DEBU 12f4 [businesschannel][c1345847] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:57.721 UTC [endorser] callChaincode -> INFO 12f5 [businesschannel][c1345847] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:57.721 UTC [chaincode] Execute -> DEBU 12f6 Entry" +peer0.org1.example.com | "2019-04-22 06:16:57.722 UTC [aclmgmt] CheckACL -> DEBU 12f7 acl policy not found in config for resource _lifecycle/QueryApprovalStatus" +peer0.org1.example.com | "2019-04-22 06:16:57.722 UTC [policies] Evaluate -> DEBU 12f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.723 UTC [policies] Evaluate -> DEBU 12f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:57.723 UTC [policies] Evaluate -> DEBU 12fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.723 UTC [cauthdsl] func1 -> DEBU 12fb 0xc0038db5c0 gate 1555913817723532800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:57.723 UTC [cauthdsl] func2 -> DEBU 12fc 0xc0038db5c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:57.724 UTC [cauthdsl] func2 -> DEBU 12fd 0xc0038db5c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:57.724 UTC [cauthdsl] func2 -> DEBU 12fe 0xc0038db5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:57.724 UTC [cauthdsl] func2 -> DEBU 12ff 0xc0038db5c0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:57.724 UTC [cauthdsl] func1 -> DEBU 1300 0xc0038db5c0 gate 1555913817723532800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:57.725 UTC [policies] Evaluate -> DEBU 1301 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:57.725 UTC [policies] Evaluate -> DEBU 1302 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:57.725 UTC [policies] Evaluate -> DEBU 1303 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:57.725 UTC [cauthdsl] func1 -> DEBU 1304 0xc0038dbe00 gate 1555913817725881000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:57.726 UTC [cauthdsl] func2 -> DEBU 1305 0xc0038dbe00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:57.726 UTC [cauthdsl] func2 -> DEBU 1306 0xc0038dbe00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:57.726 UTC [cauthdsl] func2 -> DEBU 1307 0xc0038dbe00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.727 UTC [msp.identity] Verify -> DEBU 1308 Verify: digest = 00000000 cc 3a 1a 95 22 ef ca 33 f2 95 aa 3b 4e d7 fa 44 |.:.."..3...;N..D| +peer0.org1.example.com | 00000010 42 39 4c ef 55 8c ba 64 74 ba 0f 3e 46 85 a0 1c |B9L.U..dt..>F...|" +peer0.org1.example.com | "2019-04-22 06:16:57.727 UTC [msp.identity] Verify -> DEBU 1309 Verify: sig = 00000000 30 45 02 21 00 c1 b5 70 95 9d 04 b2 fe 0b 63 6e |0E.!...p......cn| +peer0.org1.example.com | 00000010 76 f9 bb 7a 5b 4f b7 2a 64 fe 8e 80 9e 1a f6 6d |v..z[O.*d......m| +peer0.org1.example.com | 00000020 70 f7 a4 95 03 02 20 69 eb 95 b7 85 05 e2 9b e4 |p..... i........| +peer0.org1.example.com | 00000030 32 6c 99 12 41 62 13 90 29 2b b9 c0 ef e0 df 38 |2l..Ab..)+.....8| +peer0.org1.example.com | 00000040 3b dd b0 e8 5a 38 e6 |;...Z8.|" +peer0.org1.example.com | "2019-04-22 06:16:57.728 UTC [cauthdsl] func2 -> DEBU 130a 0xc0038dbe00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:57.728 UTC [cauthdsl] func1 -> DEBU 130b 0xc0038dbe00 gate 1555913817725881000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130e Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:57.729 UTC [lifecycle] QueryApprovalStatus -> DEBU 1310 received invocation of QueryApprovalStatus on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: ()'" +peer0.org1.example.com | "2019-04-22 06:16:57.730 UTC [chaincode] handleMessage -> DEBU 1311 [c1345847] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.731 UTC [chaincode] HandleTransaction -> DEBU 1312 [c1345847] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.731 UTC [chaincode] HandleGetState -> DEBU 1313 [c1345847] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.731 UTC [stateleveldb] GetState -> DEBU 1314 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:16:57.731 UTC [chaincode] HandleGetState -> DEBU 1315 [c1345847] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-04-22 06:16:57.732 UTC [chaincode] HandleTransaction -> DEBU 1316 [c1345847] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.732 UTC [chaincode] handleMessage -> DEBU 1317 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.732 UTC [chaincode] HandleTransaction -> DEBU 1318 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.732 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1319 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.733 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 131a retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:57.733 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 131b retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:57.733 UTC [stateleveldb] GetState -> DEBU 131c GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:16:57.733 UTC [chaincode] HandleTransaction -> DEBU 131d [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.734 UTC [chaincode] handleMessage -> DEBU 131e [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.734 UTC [chaincode] HandleTransaction -> DEBU 131f [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.734 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1320 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.734 UTC [stateleveldb] GetState -> DEBU 1321 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-04-22 06:16:57.734 UTC [chaincode] HandleTransaction -> DEBU 1322 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.735 UTC [chaincode] handleMessage -> DEBU 1323 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.735 UTC [chaincode] HandleTransaction -> DEBU 1324 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.735 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1325 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.736 UTC [stateleveldb] GetState -> DEBU 1326 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1327 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.736 UTC [chaincode] handleMessage -> DEBU 1328 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.736 UTC [chaincode] HandleTransaction -> DEBU 1329 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.736 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 132a [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.737 UTC [stateleveldb] GetState -> DEBU 132b GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-04-22 06:16:57.737 UTC [chaincode] HandleTransaction -> DEBU 132c [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.737 UTC [chaincode] handleMessage -> DEBU 132d [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.737 UTC [chaincode] HandleTransaction -> DEBU 132e [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.738 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 132f [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.738 UTC [stateleveldb] GetState -> DEBU 1330 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:16:57.738 UTC [chaincode] HandleTransaction -> DEBU 1331 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.738 UTC [chaincode] handleMessage -> DEBU 1332 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.738 UTC [chaincode] HandleTransaction -> DEBU 1333 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.739 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1334 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.739 UTC [stateleveldb] GetState -> DEBU 1335 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-04-22 06:16:57.739 UTC [chaincode] HandleTransaction -> DEBU 1336 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.739 UTC [chaincode] handleMessage -> DEBU 1337 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.739 UTC [chaincode] HandleTransaction -> DEBU 1338 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.739 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1339 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.740 UTC [stateleveldb] GetState -> DEBU 133a GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 133b [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.740 UTC [chaincode] handleMessage -> DEBU 133c [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.740 UTC [chaincode] HandleTransaction -> DEBU 133d [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:57.740 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 133e [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.740 UTC [stateleveldb] GetState -> DEBU 133f GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [chaincode] HandleTransaction -> DEBU 1340 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [lifecycle] QueryApprovalStatus -> INFO 1341 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [chaincode] handleMessage -> DEBU 1342 [c1345847] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [chaincode] Notify -> DEBU 1343 [c1345847] notifying Txid:c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [chaincode] Execute -> DEBU 1344 Exit" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [endorser] callChaincode -> INFO 1345 [businesschannel][c1345847] Exit chaincode: name:"_lifecycle" (20ms)" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1346 Simulation completed, getting simulation results" +orderer0.example.com | "2019-04-22 06:18:05.746 UTC [policies] Evaluate -> DEBU 19e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:05.746 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.746 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:05.747 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.747 UTC [cauthdsl] func1 -> DEBU 19ed 0xc001032f30 gate 1555913885747742500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.747 UTC [cauthdsl] func2 -> DEBU 19ee 0xc001032f30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.747 UTC [cauthdsl] func2 -> DEBU 19ef 0xc001032f30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.748 UTC [cauthdsl] func2 -> DEBU 19f0 0xc001032f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.748 UTC [cauthdsl] func2 -> DEBU 19f1 0xc001032f30 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.748 UTC [cauthdsl] func1 -> DEBU 19f2 0xc001032f30 gate 1555913885747742500 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.748 UTC [policies] Evaluate -> DEBU 19f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.748 UTC [policies] Evaluate -> DEBU 19f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.748 UTC [policies] Evaluate -> DEBU 19f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.749 UTC [cauthdsl] func1 -> DEBU 19f6 0xc001033770 gate 1555913885749280600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.749 UTC [cauthdsl] func2 -> DEBU 19f7 0xc001033770 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.749 UTC [cauthdsl] func2 -> DEBU 19f8 0xc001033770 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.749 UTC [cauthdsl] func2 -> DEBU 19f9 0xc001033770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.750 UTC [cauthdsl] func2 -> DEBU 19fa 0xc001033770 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.750 UTC [cauthdsl] func1 -> DEBU 19fb 0xc001033770 gate 1555913885749280600 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.750 UTC [policies] Evaluate -> DEBU 19fc Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.750 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.751 UTC [policies] Evaluate -> DEBU 19fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.751 UTC [cauthdsl] func1 -> DEBU 19ff 0xc001033fe0 gate 1555913885751268400 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.751 UTC [cauthdsl] func2 -> DEBU 1a00 0xc001033fe0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.752 UTC [cauthdsl] func2 -> DEBU 1a01 0xc001033fe0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.752 UTC [cauthdsl] func2 -> DEBU 1a02 0xc001033fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.752 UTC [cauthdsl] func2 -> DEBU 1a03 0xc001033fe0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a04 0xc001033fe0 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a05 0xc001033fe0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a06 0xc001033fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a07 0xc001033fe0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a08 0xc001033fe0 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a09 0xc001033fe0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a0a 0xc001033fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a0b 0xc001033fe0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [cauthdsl] func1 -> DEBU 1a0c 0xc001033fe0 gate 1555913885751268400 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:05.753 UTC [policies] Evaluate -> DEBU 1a0d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.754 UTC [policies] Evaluate -> DEBU 1a0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:05.754 UTC [policies] func1 -> DEBU 1a0f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a10 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a11 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a14 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:05.755 UTC [cauthdsl] func1 -> DEBU 1a15 0xc000dd9800 gate 1555913885755754200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:05.755 UTC [cauthdsl] func2 -> DEBU 1a16 0xc000dd9800 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:05.756 UTC [cauthdsl] func2 -> DEBU 1a17 0xc000dd9800 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:05.756 UTC [cauthdsl] func2 -> DEBU 1a18 0xc000dd9800 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:05.756 UTC [msp.identity] Verify -> DEBU 1a19 Verify: digest = 00000000 e7 19 2e 39 0b 38 6b 78 3a 9f 70 1f 2d b8 14 78 |...9.8kx:.p.-..x| +orderer0.example.com | 00000010 ee 4f dc 79 b2 e1 57 29 9a c3 57 a1 b0 6b f7 44 |.O.y..W)..W..k.D|" +orderer0.example.com | "2019-04-22 06:18:05.756 UTC [msp.identity] Verify -> DEBU 1a1a Verify: sig = 00000000 30 45 02 21 00 d4 16 ab 2a 38 2e cf b2 bf df 56 |0E.!....*8.....V| +orderer0.example.com | 00000010 5f c5 18 a8 5e 7a 97 00 b8 b4 b7 fc 87 c4 ef 12 |_...^z..........| +orderer0.example.com | 00000020 f2 44 bf 1e 2a 02 20 12 2d a8 17 33 5a 56 21 13 |.D..*. .-..3ZV!.| +orderer0.example.com | 00000030 08 d0 1f cd 9e d6 79 e3 43 9f a6 76 4a ea 0b cc |......y.C..vJ...| +orderer0.example.com | 00000040 85 11 af 17 0f 15 41 |......A|" +orderer0.example.com | "2019-04-22 06:18:05.756 UTC [cauthdsl] func2 -> DEBU 1a1b 0xc000dd9800 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:05.756 UTC [cauthdsl] func1 -> DEBU 1a1c 0xc000dd9800 gate 1555913885755754200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a1d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a1e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a1f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a21 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:05.758 UTC [common.deliver] deliverBlocks -> DEBU 1a23 [channel: businesschannel] Received seekInfo (0xc001069680) start: > stop: > from 192.168.224.9:34766" +orderer0.example.com | "2019-04-22 06:18:05.758 UTC [fsblkstorage] Next -> DEBU 1a24 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:05.758 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a25 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +orderer0.example.com | "2019-04-22 06:18:05.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a26 Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:05.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a27 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:05.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a28 blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:05.758 UTC [common.deliver] deliverBlocks -> DEBU 1a29 [channel: businesschannel] Delivering block [9] for (0xc001069680) for 192.168.224.9:34766" +orderer0.example.com | "2019-04-22 06:18:05.759 UTC [common.deliver] deliverBlocks -> DEBU 1a2a [channel: businesschannel] Done delivering to 192.168.224.9:34766 for (0xc001069680)" +orderer0.example.com | "2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2b Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2c Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2d Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2e Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:05.760 UTC [common.deliver] Handle -> DEBU 1a2f Waiting for new SeekInfo from 192.168.224.9:34766" +orderer0.example.com | "2019-04-22 06:18:05.761 UTC [common.deliver] Handle -> DEBU 1a30 Attempting to read seek info message from 192.168.224.9:34766" +orderer0.example.com | "2019-04-22 06:18:05.764 UTC [grpc] infof -> DEBU 1a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:05.764 UTC [common.deliver] Handle -> WARN 1a32 Error reading from 192.168.224.9:34766: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:05.764 UTC [orderer.common.server] func1 -> DEBU 1a33 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:05.765 UTC [comm.grpc.server] 1 -> INFO 1a34 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34766 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.3872ms +orderer0.example.com | "2019-04-22 06:18:06.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a35 Sending msg of 28 bytes to 2 on channel businesschannel took 51.8µs" +orderer0.example.com | "2019-04-22 06:18:06.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a36 Sending msg of 28 bytes to 3 on channel businesschannel took 33.5µs" +orderer0.example.com | "2019-04-22 06:18:06.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.8µs " +orderer0.example.com | "2019-04-22 06:18:06.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.4µs " +orderer0.example.com | "2019-04-22 06:18:06.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a39 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:06.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:06.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:06.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3c Sending msg of 28 bytes to 3 on channel testchainid took 78.7µs" +orderer0.example.com | "2019-04-22 06:18:06.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.8µs " +orderer0.example.com | "2019-04-22 06:18:06.335 UTC [orderer.common.server] Deliver -> DEBU 1a3e Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:06.335 UTC [common.deliver] Handle -> DEBU 1a3f Starting new deliver loop for 192.168.224.9:34768" +orderer0.example.com | "2019-04-22 06:18:06.335 UTC [common.deliver] Handle -> DEBU 1a40 Attempting to read seek info message from 192.168.224.9:34768" +orderer0.example.com | "2019-04-22 06:18:06.336 UTC [policies] Evaluate -> DEBU 1a41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.337 UTC [policies] Evaluate -> DEBU 1a42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.337 UTC [policies] Evaluate -> DEBU 1a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.337 UTC [policies] Evaluate -> DEBU 1a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.338 UTC [policies] Evaluate -> DEBU 1a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.338 UTC [cauthdsl] func1 -> DEBU 1a46 0xc000ec9800 gate 1555913886338644100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.339 UTC [cauthdsl] func2 -> DEBU 1a47 0xc000ec9800 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.339 UTC [cauthdsl] func2 -> DEBU 1a48 0xc000ec9800 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.340 UTC [cauthdsl] func2 -> DEBU 1a49 0xc000ec9800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.340 UTC [cauthdsl] func2 -> DEBU 1a4a 0xc000ec9800 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.341 UTC [cauthdsl] func1 -> DEBU 1a4b 0xc000ec9800 gate 1555913886338644100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [lockbasedtxmgr] Done -> DEBU 1347 Done with transaction simulation / query execution [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [endorser] SimulateProposal -> DEBU 1348 [businesschannel][c1345847] Exit" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [endorser] endorseProposal -> DEBU 1349 [businesschannel][c1345847] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [endorser] endorseProposal -> DEBU 134a [businesschannel][c1345847] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [endorser] EndorseWithPlugin -> DEBU 134b Entering endorsement for {plugin: escc, channel: businesschannel, tx: c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [msp.identity] Sign -> DEBU 134c Sign: plaintext: 0A2067AE44B398FBDCFED6E83476A3D4...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [msp.identity] Sign -> DEBU 134d Sign: digest: F281C2AE2B578C2121F3DA0222AF36F09807357CD95EC92136D9031264CBD9CD " +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [endorser] EndorseWithPlugin -> DEBU 134e Exiting {plugin: escc, channel: businesschannel, tx: c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:16:57.741 UTC [endorser] endorseProposal -> DEBU 134f [businesschannel][c1345847] Exit" +peer0.org1.example.com | "2019-04-22 06:16:57.742 UTC [lockbasedtxmgr] Done -> DEBU 1350 Done with transaction simulation / query execution [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +peer0.org1.example.com | "2019-04-22 06:16:57.742 UTC [endorser] func1 -> DEBU 1351 Exit: request from 192.168.224.9:49258" +peer0.org1.example.com | "2019-04-22 06:16:57.742 UTC [comm.grpc.server] 1 -> INFO 1352 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49258 grpc.code=OK grpc.call_duration=25.7084ms +peer0.org1.example.com | "2019-04-22 06:16:57.751 UTC [grpc] infof -> DEBU 1353 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:57.750 UTC [grpc] infof -> DEBU 1354 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:58.417 UTC [endorser] ProcessProposal -> DEBU 1355 Entering: request from 192.168.224.9:49266" +peer0.org1.example.com | "2019-04-22 06:16:58.417 UTC [protoutils] ValidateProposalMessage -> DEBU 1356 ValidateProposalMessage starts for signed proposal 0xc0039ae4b0" +peer0.org1.example.com | "2019-04-22 06:16:58.417 UTC [protoutils] validateChannelHeader -> DEBU 1357 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:58.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 1358 begin" +peer0.org1.example.com | "2019-04-22 06:16:58.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 1359 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:58.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 135a creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:58.418 UTC [msp.identity] Verify -> DEBU 135b Verify: digest = 00000000 d5 19 33 4f 79 6f 85 e8 c1 7e 2e d8 2a 05 52 2c |..3Oyo...~..*.R,| +peer0.org1.example.com | 00000010 d3 68 1a 57 fe 52 ff f9 7e 40 35 be 57 f4 55 e9 |.h.W.R..~@5.W.U.|" +peer0.org1.example.com | "2019-04-22 06:16:58.418 UTC [msp.identity] Verify -> DEBU 135c Verify: sig = 00000000 30 44 02 20 25 bc 40 fc 14 bf dd c5 78 df 05 45 |0D. %.@.....x..E| +peer0.org1.example.com | 00000010 28 d9 d6 d7 3c e9 8b 07 7f 05 f3 64 e1 ee 37 98 |(...<......d..7.| +peer0.org1.example.com | 00000020 c6 c3 ad 25 02 20 74 28 b6 2b 17 12 39 b9 10 f3 |...%. t(.+..9...| +peer0.org1.example.com | 00000030 76 1a 5d 5f 5d 08 fd 61 bf 97 26 72 c0 b5 47 1a |v.]_]..a..&r..G.| +peer0.org1.example.com | 00000040 4d e3 94 c9 f8 18 |M.....|" +peer0.org1.example.com | "2019-04-22 06:16:58.419 UTC [protoutils] checkSignatureFromCreator -> DEBU 135d exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:58.419 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 135e validateChaincodeProposalMessage starts for proposal 0xc0039b0690, header 0xc0039ae8c0" +peer0.org1.example.com | "2019-04-22 06:16:58.419 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 135f validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:58.419 UTC [endorser] preProcess -> DEBU 1360 [][ad9556a2] processing txid: ad9556a20a67c292186e48eaec03a0650d11ef24c6d214d3286298954bb072b3" +peer0.org1.example.com | "2019-04-22 06:16:58.419 UTC [endorser] SimulateProposal -> DEBU 1361 [][ad9556a2] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:58.420 UTC [endorser] callChaincode -> INFO 1362 [][ad9556a2] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:58.420 UTC [chaincode] Execute -> DEBU 1363 Entry" +peer0.org1.example.com | "2019-04-22 06:16:58.421 UTC [msp.identity] Verify -> DEBU 1364 Verify: digest = 00000000 d5 19 33 4f 79 6f 85 e8 c1 7e 2e d8 2a 05 52 2c |..3Oyo...~..*.R,| +peer0.org1.example.com | 00000010 d3 68 1a 57 fe 52 ff f9 7e 40 35 be 57 f4 55 e9 |.h.W.R..~@5.W.U.|" +peer0.org1.example.com | "2019-04-22 06:16:58.421 UTC [msp.identity] Verify -> DEBU 1365 Verify: sig = 00000000 30 44 02 20 25 bc 40 fc 14 bf dd c5 78 df 05 45 |0D. %.@.....x..E| +peer0.org1.example.com | 00000010 28 d9 d6 d7 3c e9 8b 07 7f 05 f3 64 e1 ee 37 98 |(...<......d..7.| +peer0.org1.example.com | 00000020 c6 c3 ad 25 02 20 74 28 b6 2b 17 12 39 b9 10 f3 |...%. t(.+..9...| +peer0.org1.example.com | 00000030 76 1a 5d 5f 5d 08 fd 61 bf 97 26 72 c0 b5 47 1a |v.]_]..a..&r..G.| +peer0.org1.example.com | 00000040 4d e3 94 c9 f8 18 |M.....|" +peer0.org1.example.com | "2019-04-22 06:16:58.422 UTC [lifecycle] QueryInstalledChaincodes -> DEBU 1366 received invocation of QueryInstalledChaincodes" +peer0.org1.example.com | "2019-04-22 06:16:58.422 UTC [chaincode] handleMessage -> DEBU 1367 [ad9556a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.422 UTC [chaincode] Notify -> DEBU 1368 [ad9556a2] notifying Txid:ad9556a20a67c292186e48eaec03a0650d11ef24c6d214d3286298954bb072b3, channelID:" +peer0.org1.example.com | "2019-04-22 06:16:58.423 UTC [chaincode] Execute -> DEBU 1369 Exit" +peer0.org1.example.com | "2019-04-22 06:16:58.423 UTC [endorser] callChaincode -> INFO 136a [][ad9556a2] Exit chaincode: name:"_lifecycle" (3ms)" +peer0.org1.example.com | "2019-04-22 06:16:58.423 UTC [endorser] SimulateProposal -> DEBU 136b [][ad9556a2] Exit" +peer0.org1.example.com | "2019-04-22 06:16:58.423 UTC [endorser] func1 -> DEBU 136c Exit: request from 192.168.224.9:49266" +peer0.org1.example.com | "2019-04-22 06:16:58.423 UTC [comm.grpc.server] 1 -> INFO 136d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49266 grpc.code=OK grpc.call_duration=7.1225ms +peer0.org1.example.com | "2019-04-22 06:16:58.427 UTC [grpc] infof -> DEBU 136e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:58.428 UTC [grpc] infof -> DEBU 136f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:16:58.610 UTC [endorser] ProcessProposal -> DEBU 1370 Entering: request from 192.168.224.9:49270" +peer0.org1.example.com | "2019-04-22 06:16:58.610 UTC [protoutils] ValidateProposalMessage -> DEBU 1371 ValidateProposalMessage starts for signed proposal 0xc00399b900" +peer0.org1.example.com | "2019-04-22 06:16:58.610 UTC [protoutils] validateChannelHeader -> DEBU 1372 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:16:58.610 UTC [protoutils] checkSignatureFromCreator -> DEBU 1373 begin" +peer0.org1.example.com | "2019-04-22 06:16:58.610 UTC [msp] GetManagerForChain -> DEBU 1374 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:58.610 UTC [protoutils] checkSignatureFromCreator -> DEBU 1375 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:16:58.610 UTC [protoutils] checkSignatureFromCreator -> DEBU 1376 creator is valid" +peer0.org1.example.com | "2019-04-22 06:16:58.611 UTC [msp.identity] Verify -> DEBU 1377 Verify: digest = 00000000 65 95 a2 bd 8b 56 91 2d c1 7f 3e f0 87 82 41 47 |e....V.-..>...AG| +peer0.org1.example.com | 00000010 ec 96 7f a2 45 7a 15 d8 2c 14 5c 00 7d 50 71 4d |....Ez..,.\.}PqM|" +peer0.org1.example.com | "2019-04-22 06:16:58.611 UTC [msp.identity] Verify -> DEBU 1378 Verify: sig = 00000000 30 45 02 21 00 92 c8 1a 2b d2 ae 72 0c c8 ad 61 |0E.!....+..r...a| +peer0.org1.example.com | 00000010 e9 1d 23 d8 bf 14 c4 2d 45 d1 ab 33 b4 13 9f 12 |..#....-E..3....| +peer0.org1.example.com | 00000020 95 93 e8 22 58 02 20 37 36 16 67 5e 84 c7 97 88 |..."X. 76.g^....| +peer0.org1.example.com | 00000030 37 c6 87 b0 90 ae 6d e4 6c fb da a6 50 b1 c0 5f |7.....m.l...P.._| +peer0.org1.example.com | 00000040 a1 60 f5 97 72 f7 0c |.`..r..|" +peer0.org1.example.com | "2019-04-22 06:16:58.611 UTC [protoutils] checkSignatureFromCreator -> DEBU 1379 exits successfully" +peer0.org1.example.com | "2019-04-22 06:16:58.611 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 137a validateChaincodeProposalMessage starts for proposal 0xc00387f810, header 0xc00399bd10" +peer0.org1.example.com | "2019-04-22 06:16:58.611 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 137b validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:58.611 UTC [endorser] preProcess -> DEBU 137c [businesschannel][7771236d] processing txid: 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869" +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 137d retrieveTransactionByID() - txId = [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 137e constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 137f constructing new tx simulator txid = [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [endorser] SimulateProposal -> DEBU 1380 [businesschannel][7771236d] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [endorser] callChaincode -> INFO 1381 [businesschannel][7771236d] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [chaincode] Execute -> DEBU 1382 Entry" +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [aclmgmt] CheckACL -> DEBU 1383 acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition" +peer0.org1.example.com | "2019-04-22 06:16:58.612 UTC [aclmgmt] CheckACL -> DEBU 1384 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 1385 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 1386 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 1387 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [cauthdsl] func1 -> DEBU 1388 0xc003a893d0 gate 1555913818613219300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 1389 0xc003a893d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 138a 0xc003a893d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 138b 0xc003a893d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 138c 0xc003a893d0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [cauthdsl] func1 -> DEBU 138d 0xc003a893d0 gate 1555913818613219300 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 138e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [policies] Evaluate -> DEBU 138f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [policies] Evaluate -> DEBU 1390 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [cauthdsl] func1 -> DEBU 1391 0xc003a89c10 gate 1555913818614225800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [cauthdsl] func2 -> DEBU 1392 0xc003a89c10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [cauthdsl] func2 -> DEBU 1393 0xc003a89c10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [cauthdsl] func2 -> DEBU 1394 0xc003a89c10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [msp.identity] Verify -> DEBU 1395 Verify: digest = 00000000 65 95 a2 bd 8b 56 91 2d c1 7f 3e f0 87 82 41 47 |e....V.-..>...AG| +peer0.org1.example.com | 00000010 ec 96 7f a2 45 7a 15 d8 2c 14 5c 00 7d 50 71 4d |....Ez..,.\.}PqM|" +peer0.org1.example.com | "2019-04-22 06:16:58.614 UTC [msp.identity] Verify -> DEBU 1396 Verify: sig = 00000000 30 45 02 21 00 92 c8 1a 2b d2 ae 72 0c c8 ad 61 |0E.!....+..r...a| +peer0.org1.example.com | 00000010 e9 1d 23 d8 bf 14 c4 2d 45 d1 ab 33 b4 13 9f 12 |..#....-E..3....| +peer0.org1.example.com | 00000020 95 93 e8 22 58 02 20 37 36 16 67 5e 84 c7 97 88 |..."X. 76.g^....| +peer0.org1.example.com | 00000030 37 c6 87 b0 90 ae 6d e4 6c fb da a6 50 b1 c0 5f |7.....m.l...P.._| +peer0.org1.example.com | 00000040 a1 60 f5 97 72 f7 0c |.`..r..|" +peer0.org1.example.com | "2019-04-22 06:16:58.615 UTC [cauthdsl] func2 -> DEBU 1397 0xc003a89c10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:58.615 UTC [cauthdsl] func1 -> DEBU 1398 0xc003a89c10 gate 1555913818614225800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:58.615 UTC [policies] Evaluate -> DEBU 1399 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:58.615 UTC [policies] Evaluate -> DEBU 139a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:16:58.615 UTC [policies] Evaluate -> DEBU 139b Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:58.616 UTC [policies] Evaluate -> DEBU 139c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:16:58.616 UTC [lifecycle] CommitChaincodeDefinition -> DEBU 139d received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +peer0.org1.example.com | "2019-04-22 06:16:58.616 UTC [chaincode] handleMessage -> DEBU 139e [7771236d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.616 UTC [chaincode] HandleTransaction -> DEBU 139f [7771236d] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.616 UTC [chaincode] HandleGetState -> DEBU 13a0 [7771236d] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.616 UTC [stateleveldb] GetState -> DEBU 13a1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:16:58.617 UTC [chaincode] HandleGetState -> DEBU 13a2 [7771236d] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +orderer0.example.com | "2019-04-22 06:18:06.341 UTC [policies] Evaluate -> DEBU 1a4c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.342 UTC [policies] Evaluate -> DEBU 1a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.342 UTC [policies] Evaluate -> DEBU 1a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.343 UTC [cauthdsl] func1 -> DEBU 1a4f 0xc000e900f0 gate 1555913886343177500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.343 UTC [cauthdsl] func2 -> DEBU 1a50 0xc000e900f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.344 UTC [cauthdsl] func2 -> DEBU 1a51 0xc000e900f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.344 UTC [cauthdsl] func2 -> DEBU 1a52 0xc000e900f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.344 UTC [cauthdsl] func2 -> DEBU 1a53 0xc000e900f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.345 UTC [cauthdsl] func1 -> DEBU 1a54 0xc000e900f0 gate 1555913886343177500 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.345 UTC [policies] Evaluate -> DEBU 1a55 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.345 UTC [policies] Evaluate -> DEBU 1a56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.345 UTC [policies] Evaluate -> DEBU 1a57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.346 UTC [cauthdsl] func1 -> DEBU 1a58 0xc000e90c50 gate 1555913886346362700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.346 UTC [cauthdsl] func2 -> DEBU 1a59 0xc000e90c50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.346 UTC [cauthdsl] func2 -> DEBU 1a5a 0xc000e90c50 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.346 UTC [cauthdsl] func2 -> DEBU 1a5b 0xc000e90c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.347 UTC [cauthdsl] func2 -> DEBU 1a5c 0xc000e90c50 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.347 UTC [cauthdsl] func2 -> DEBU 1a5d 0xc000e90c50 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.347 UTC [cauthdsl] func2 -> DEBU 1a5e 0xc000e90c50 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.348 UTC [cauthdsl] func2 -> DEBU 1a5f 0xc000e90c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.348 UTC [cauthdsl] func2 -> DEBU 1a60 0xc000e90c50 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.349 UTC [cauthdsl] func2 -> DEBU 1a61 0xc000e90c50 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.349 UTC [cauthdsl] func2 -> DEBU 1a62 0xc000e90c50 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.350 UTC [cauthdsl] func2 -> DEBU 1a63 0xc000e90c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.350 UTC [cauthdsl] func2 -> DEBU 1a64 0xc000e90c50 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.351 UTC [cauthdsl] func1 -> DEBU 1a65 0xc000e90c50 gate 1555913886346362700 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.351 UTC [policies] Evaluate -> DEBU 1a66 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.352 UTC [policies] func1 -> DEBU 1a68 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a69 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a6a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.353 UTC [policies] Evaluate -> DEBU 1a6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.353 UTC [policies] Evaluate -> DEBU 1a6d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.353 UTC [cauthdsl] func1 -> DEBU 1a6e 0xc000d28040 gate 1555913886353901800 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.354 UTC [cauthdsl] func2 -> DEBU 1a6f 0xc000d28040 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.354 UTC [cauthdsl] func2 -> DEBU 1a70 0xc000d28040 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.354 UTC [cauthdsl] func2 -> DEBU 1a71 0xc000d28040 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:06.354 UTC [msp.identity] Verify -> DEBU 1a72 Verify: digest = 00000000 96 7a e4 83 f6 96 73 4c 8d d5 9a 8e e8 9d 0f 3b |.z....sL.......;| +orderer0.example.com | 00000010 41 06 bc 80 3a 01 66 20 83 2a ee b4 09 fd 91 7a |A...:.f .*.....z|" +orderer0.example.com | "2019-04-22 06:18:06.355 UTC [msp.identity] Verify -> DEBU 1a73 Verify: sig = 00000000 30 45 02 21 00 b2 ed 2a f3 a6 06 4d 02 a0 1d 63 |0E.!...*...M...c| +orderer0.example.com | 00000010 0c eb 89 8e c0 b1 83 4c 4e 64 60 38 93 f8 d6 46 |.......LNd`8...F| +orderer0.example.com | 00000020 3d a8 32 7b 11 02 20 26 c5 14 0b bd 60 91 29 42 |=.2{.. &....`.)B| +orderer0.example.com | 00000030 d2 6d 69 1f a9 40 82 02 eb bf 2c 80 0d cb 48 36 |.mi..@....,...H6| +orderer0.example.com | 00000040 0d 60 3e 18 dd 1d 5a |.`>...Z|" +orderer0.example.com | "2019-04-22 06:18:06.355 UTC [cauthdsl] func2 -> DEBU 1a74 0xc000d28040 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:06.355 UTC [cauthdsl] func1 -> DEBU 1a75 0xc000d28040 gate 1555913886353901800 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:06.355 UTC [policies] Evaluate -> DEBU 1a76 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a78 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a79 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a7a Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.357 UTC [policies] Evaluate -> DEBU 1a7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.357 UTC [common.deliver] deliverBlocks -> DEBU 1a7c [channel: businesschannel] Received seekInfo (0xc000363b40) start: > stop: > from 192.168.224.9:34768" +orderer0.example.com | "2019-04-22 06:18:06.357 UTC [fsblkstorage] Next -> DEBU 1a7d Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:06.357 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a7e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +peer0.org1.example.com | "2019-04-22 06:16:58.617 UTC [chaincode] HandleTransaction -> DEBU 13a3 [7771236d] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.617 UTC [chaincode] handleMessage -> DEBU 13a4 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.617 UTC [chaincode] HandleTransaction -> DEBU 13a5 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.617 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13a6 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.617 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 13a7 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +peer0.org1.example.com | "2019-04-22 06:16:58.618 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 13a8 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +peer0.org1.example.com | "2019-04-22 06:16:58.618 UTC [stateleveldb] GetState -> DEBU 13a9 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:16:58.618 UTC [chaincode] HandleTransaction -> DEBU 13aa [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.618 UTC [chaincode] handleMessage -> DEBU 13ab [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.618 UTC [chaincode] HandleTransaction -> DEBU 13ac [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.618 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13ad [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.618 UTC [stateleveldb] GetState -> DEBU 13ae GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-04-22 06:16:58.619 UTC [chaincode] HandleTransaction -> DEBU 13af [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.619 UTC [chaincode] handleMessage -> DEBU 13b0 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.619 UTC [chaincode] HandleTransaction -> DEBU 13b1 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.619 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13b2 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.619 UTC [stateleveldb] GetState -> DEBU 13b3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 13b4 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.620 UTC [chaincode] handleMessage -> DEBU 13b5 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.620 UTC [chaincode] HandleTransaction -> DEBU 13b6 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13b7 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [stateleveldb] GetState -> DEBU 13b8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [chaincode] HandleTransaction -> DEBU 13b9 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [chaincode] handleMessage -> DEBU 13ba [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [chaincode] HandleTransaction -> DEBU 13bb [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13bc [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [stateleveldb] GetState -> DEBU 13bd GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:16:58.621 UTC [chaincode] HandleTransaction -> DEBU 13be [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.622 UTC [chaincode] handleMessage -> DEBU 13bf [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.622 UTC [chaincode] HandleTransaction -> DEBU 13c0 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.622 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13c1 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.622 UTC [stateleveldb] GetState -> DEBU 13c2 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-04-22 06:16:58.622 UTC [chaincode] HandleTransaction -> DEBU 13c3 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.622 UTC [chaincode] handleMessage -> DEBU 13c4 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.622 UTC [chaincode] HandleTransaction -> DEBU 13c5 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.623 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13c6 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.623 UTC [stateleveldb] GetState -> DEBU 13c7 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 13c8 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +orderer0.example.com | "2019-04-22 06:18:06.358 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a7f Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:06.358 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a80 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:06.358 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a81 blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:06.359 UTC [common.deliver] deliverBlocks -> DEBU 1a82 [channel: businesschannel] Delivering block [9] for (0xc000363b40) for 192.168.224.9:34768" +orderer0.example.com | "2019-04-22 06:18:06.362 UTC [common.deliver] deliverBlocks -> DEBU 1a83 [channel: businesschannel] Done delivering to 192.168.224.9:34768 for (0xc000363b40)" +orderer0.example.com | "2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a84 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a86 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a87 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a88 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.368 UTC [grpc] infof -> DEBU 1a89 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:06.363 UTC [common.deliver] Handle -> DEBU 1a85 Waiting for new SeekInfo from 192.168.224.9:34768" +orderer0.example.com | "2019-04-22 06:18:06.369 UTC [common.deliver] Handle -> DEBU 1a8a Attempting to read seek info message from 192.168.224.9:34768" +orderer0.example.com | "2019-04-22 06:18:06.369 UTC [common.deliver] Handle -> WARN 1a8b Error reading from 192.168.224.9:34768: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:06.369 UTC [orderer.common.server] func1 -> DEBU 1a8c Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:06.370 UTC [comm.grpc.server] 1 -> INFO 1a8d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34768 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.8763ms +orderer0.example.com | "2019-04-22 06:18:06.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8e Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +orderer0.example.com | "2019-04-22 06:18:06.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8f Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-04-22 06:18:06.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.7µs " +orderer0.example.com | "2019-04-22 06:18:06.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183µs " +orderer0.example.com | "2019-04-22 06:18:06.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:06.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:06.600 UTC [orderer.common.server] Deliver -> DEBU 1a94 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:06.601 UTC [common.deliver] Handle -> DEBU 1a95 Starting new deliver loop for 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.607 UTC [common.deliver] Handle -> DEBU 1a96 Attempting to read seek info message from 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.608 UTC [policies] Evaluate -> DEBU 1a97 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.609 UTC [policies] Evaluate -> DEBU 1a98 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.611 UTC [policies] Evaluate -> DEBU 1a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.613 UTC [policies] Evaluate -> DEBU 1a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.613 UTC [policies] Evaluate -> DEBU 1a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.614 UTC [cauthdsl] func1 -> DEBU 1a9c 0xc000d11620 gate 1555913886614388300 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.614 UTC [cauthdsl] func2 -> DEBU 1a9d 0xc000d11620 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.615 UTC [cauthdsl] func2 -> DEBU 1a9e 0xc000d11620 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.615 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc000d11620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.616 UTC [cauthdsl] func2 -> DEBU 1aa0 0xc000d11620 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.617 UTC [cauthdsl] func1 -> DEBU 1aa1 0xc000d11620 gate 1555913886614388300 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.617 UTC [policies] Evaluate -> DEBU 1aa2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.618 UTC [policies] Evaluate -> DEBU 1aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.618 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.619 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc000d11e70 gate 1555913886619232800 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.619 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000d11e70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.620 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc000d11e70 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.621 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc000d11e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.622 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000d11e70 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.622 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000d11e70 gate 1555913886619232800 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.622 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.623 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.623 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.624 UTC [cauthdsl] func1 -> DEBU 1aae 0xc0003d07e0 gate 1555913886624550100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.624 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc0003d07e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.625 UTC [cauthdsl] func2 -> DEBU 1ab0 0xc0003d07e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.625 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0003d07e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.625 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0003d07e0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.626 UTC [cauthdsl] func2 -> DEBU 1ab3 0xc0003d07e0 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.626 UTC [cauthdsl] func2 -> DEBU 1ab4 0xc0003d07e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.627 UTC [cauthdsl] func2 -> DEBU 1ab5 0xc0003d07e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.627 UTC [cauthdsl] func2 -> DEBU 1ab6 0xc0003d07e0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.627 UTC [cauthdsl] func2 -> DEBU 1ab7 0xc0003d07e0 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.628 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc0003d07e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.628 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc0003d07e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.629 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0003d07e0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.629 UTC [cauthdsl] func1 -> DEBU 1abb 0xc0003d07e0 gate 1555913886624550100 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.629 UTC [policies] Evaluate -> DEBU 1abc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.630 UTC [policies] Evaluate -> DEBU 1abd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.630 UTC [policies] func1 -> DEBU 1abe Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:06.630 UTC [policies] Evaluate -> DEBU 1abf Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.630 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.631 UTC [policies] Evaluate -> DEBU 1ac1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.631 UTC [policies] Evaluate -> DEBU 1ac2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.631 UTC [policies] Evaluate -> DEBU 1ac3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.631 UTC [cauthdsl] func1 -> DEBU 1ac4 0xc0003d1c40 gate 1555913886631708800 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.631 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0003d1c40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.632 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0003d1c40 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.632 UTC [cauthdsl] func2 -> DEBU 1ac7 0xc0003d1c40 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:06.632 UTC [msp.identity] Verify -> DEBU 1ac8 Verify: digest = 00000000 bf ab e4 78 12 21 fb 5d e0 8c 96 7d b4 e9 e6 61 |...x.!.]...}...a| +orderer0.example.com | 00000010 f1 c3 de bc 2f fa d2 ee 95 2b 80 47 b4 cc 08 e8 |..../....+.G....|" +orderer0.example.com | "2019-04-22 06:18:06.632 UTC [msp.identity] Verify -> DEBU 1ac9 Verify: sig = 00000000 30 44 02 20 72 50 ce 9a 6f d6 3f 5d a6 bf d4 31 |0D. rP..o.?]...1| +orderer0.example.com | 00000010 b4 c1 01 4c 99 59 4e 98 71 a1 71 c5 5e f0 da 04 |...L.YN.q.q.^...| +orderer0.example.com | 00000020 46 8f f1 18 02 20 54 25 ce 9d d9 b9 ed 87 bd 22 |F.... T%......."| +orderer0.example.com | 00000030 ee 3f 04 74 7a 72 77 9d a2 38 21 2c 9a 96 ec 85 |.?.tzrw..8!,....| +orderer0.example.com | 00000040 1f e2 cc d7 dd cf |......|" +orderer0.example.com | "2019-04-22 06:18:06.633 UTC [cauthdsl] func2 -> DEBU 1aca 0xc0003d1c40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:06.633 UTC [cauthdsl] func1 -> DEBU 1acb 0xc0003d1c40 gate 1555913886631708800 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1acc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1acd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1ace Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1acf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1ad0 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.635 UTC [policies] Evaluate -> DEBU 1ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.635 UTC [common.deliver] deliverBlocks -> DEBU 1ad2 [channel: businesschannel] Received seekInfo (0xc0009ba200) start: > stop: > from 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.635 UTC [fsblkstorage] Next -> DEBU 1ad3 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:06.635 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +orderer0.example.com | "2019-04-22 06:18:06.636 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad5 Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:06.636 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad6 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:06.636 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad7 blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:06.637 UTC [common.deliver] deliverBlocks -> DEBU 1ad8 [channel: businesschannel] Delivering block [9] for (0xc0009ba200) for 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.637 UTC [common.deliver] deliverBlocks -> DEBU 1ad9 [channel: businesschannel] Done delivering to 192.168.224.9:34770 for (0xc0009ba200)" +orderer0.example.com | "2019-04-22 06:18:06.638 UTC [common.deliver] Handle -> DEBU 1ada Waiting for new SeekInfo from 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.638 UTC [common.deliver] Handle -> DEBU 1adb Attempting to read seek info message from 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.638 UTC [fsblkstorage] waitForBlock -> DEBU 1adc Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:06.639 UTC [fsblkstorage] waitForBlock -> DEBU 1add Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.639 UTC [fsblkstorage] waitForBlock -> DEBU 1ade Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:06.639 UTC [fsblkstorage] waitForBlock -> DEBU 1adf Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:58.623 UTC [chaincode] handleMessage -> DEBU 13c9 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.623 UTC [chaincode] HandleTransaction -> DEBU 13ca [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.623 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13cb [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.623 UTC [stateleveldb] GetState -> DEBU 13cc GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-04-22 06:16:58.624 UTC [chaincode] HandleTransaction -> DEBU 13cd [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.624 UTC [lifecycle] QueryApprovalStatus -> INFO 13ce successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:58.624 UTC [chaincode] handleMessage -> DEBU 13cf [7771236d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.625 UTC [chaincode] HandleTransaction -> DEBU 13d0 [7771236d] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.625 UTC [chaincode] HandleGetState -> DEBU 13d1 [7771236d] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.625 UTC [stateleveldb] GetState -> DEBU 13d2 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-04-22 06:16:58.625 UTC [chaincode] HandleGetState -> DEBU 13d3 [7771236d] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-04-22 06:16:58.626 UTC [chaincode] HandleTransaction -> DEBU 13d4 [7771236d] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.626 UTC [chaincode] handleMessage -> DEBU 13d5 [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.626 UTC [chaincode] HandleTransaction -> DEBU 13d6 [7771236d] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.627 UTC [chaincode] HandleTransaction -> DEBU 13d7 [7771236d] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.627 UTC [chaincode] handleMessage -> DEBU 13d8 [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.627 UTC [chaincode] HandleTransaction -> DEBU 13d9 [7771236d] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.627 UTC [chaincode] HandleTransaction -> DEBU 13da [7771236d] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.627 UTC [chaincode] handleMessage -> DEBU 13db [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.628 UTC [chaincode] HandleTransaction -> DEBU 13dc [7771236d] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.628 UTC [chaincode] HandleTransaction -> DEBU 13dd [7771236d] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.628 UTC [chaincode] handleMessage -> DEBU 13de [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.628 UTC [chaincode] HandleTransaction -> DEBU 13df [7771236d] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.629 UTC [chaincode] HandleTransaction -> DEBU 13e0 [7771236d] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.629 UTC [chaincode] handleMessage -> DEBU 13e1 [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.629 UTC [chaincode] HandleTransaction -> DEBU 13e2 [7771236d] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:16:58.630 UTC [chaincode] HandleTransaction -> DEBU 13e3 [7771236d] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:16:58.630 UTC [lifecycle] CommitChaincodeDefinition -> INFO 13e4 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [chaincode] handleMessage -> DEBU 13e5 [7771236d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [chaincode] Notify -> DEBU 13e6 [7771236d] notifying Txid:7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [chaincode] Execute -> DEBU 13e7 Exit" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [endorser] callChaincode -> INFO 13e8 [businesschannel][7771236d] Exit chaincode: name:"_lifecycle" (19ms)" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 13e9 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [lockbasedtxmgr] Done -> DEBU 13ea Done with transaction simulation / query execution [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [endorser] SimulateProposal -> DEBU 13eb [businesschannel][7771236d] Exit" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [endorser] endorseProposal -> DEBU 13ec [businesschannel][7771236d] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [endorser] endorseProposal -> DEBU 13ed [businesschannel][7771236d] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [endorser] EndorseWithPlugin -> DEBU 13ee Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [msp.identity] Sign -> DEBU 13ef Sign: plaintext: 0A2010A6C96C351DFF563F3FD4E86222...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [msp.identity] Sign -> DEBU 13f0 Sign: digest: 76FC96102592EED300D1D3F1BD51FAEB798F7C68FB010F15A112D60C54832E50 " +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [endorser] EndorseWithPlugin -> DEBU 13f1 Exiting {plugin: escc, channel: businesschannel, tx: 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [endorser] endorseProposal -> DEBU 13f2 [businesschannel][7771236d] Exit" +peer0.org1.example.com | "2019-04-22 06:16:58.631 UTC [lockbasedtxmgr] Done -> DEBU 13f3 Done with transaction simulation / query execution [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +peer0.org1.example.com | "2019-04-22 06:16:58.632 UTC [endorser] func1 -> DEBU 13f4 Exit: request from 192.168.224.9:49270" +peer0.org1.example.com | "2019-04-22 06:16:58.632 UTC [comm.grpc.server] 1 -> INFO 13f5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49270 grpc.code=OK grpc.call_duration=22.1126ms +peer0.org1.example.com | "2019-04-22 06:16:58.653 UTC [common.deliverevents] DeliverFiltered -> DEBU 13f6 Starting new DeliverFiltered handler" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [cauthdsl] func1 -> DEBU 1ae5 0xc00026b160 gate 1555913886640518800 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae6 0xc00026b160 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae7 0xc00026b160 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae8 0xc00026b160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae9 0xc00026b160 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [cauthdsl] func1 -> DEBU 1aea 0xc00026b160 gate 1555913886640518800 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1aeb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1aec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1aed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.640 UTC [cauthdsl] func1 -> DEBU 1aee 0xc00026bcf0 gate 1555913886640953200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1aef 0xc00026bcf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af0 0xc00026bcf0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af1 0xc00026bcf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af2 0xc00026bcf0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func1 -> DEBU 1af3 0xc00026bcf0 gate 1555913886640953200 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [policies] Evaluate -> DEBU 1af4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [policies] Evaluate -> DEBU 1af5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [policies] Evaluate -> DEBU 1af6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func1 -> DEBU 1af7 0xc00024e730 gate 1555913886641473700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af8 0xc00024e730 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af9 0xc00024e730 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afa 0xc00024e730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afb 0xc00024e730 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afc 0xc00024e730 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afd 0xc00024e730 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afe 0xc00024e730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1aff 0xc00024e730 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1b00 0xc00024e730 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b01 0xc00024e730 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b02 0xc00024e730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b03 0xc00024e730 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func1 -> DEBU 1b04 0xc00024e730 gate 1555913886641473700 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b05 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] func1 -> DEBU 1b07 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b08 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b0c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func1 -> DEBU 1b0d 0xc000446190 gate 1555913886642644500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b0e 0xc000446190 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc000446190 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b10 0xc000446190 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [msp.identity] Verify -> DEBU 1b11 Verify: digest = 00000000 33 e4 38 79 b8 6b 95 bb 44 85 f8 fa 78 6f 01 82 |3.8y.k..D...xo..| +orderer0.example.com | 00000010 0f eb b3 a6 6b c4 d6 fd 9b d2 49 d3 f0 10 ea be |....k.....I.....|" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [msp.identity] Verify -> DEBU 1b12 Verify: sig = 00000000 30 45 02 21 00 bc 0b ba 68 57 06 9a 16 a2 3c f0 |0E.!....hW....<.| +orderer0.example.com | 00000010 f9 12 3e 26 9d aa 68 9e 9e 3c 63 cf 12 2c 8d 9c |..>&..h.. DEBU 1b13 0xc000446190 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [cauthdsl] func1 -> DEBU 1b14 0xc000446190 gate 1555913886642644500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b15 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.653 UTC [common.deliver] Handle -> DEBU 13f7 Starting new deliver loop for 192.168.224.9:49272" +peer0.org1.example.com | "2019-04-22 06:16:58.653 UTC [common.deliver] Handle -> DEBU 13f8 Attempting to read seek info message from 192.168.224.9:49272" +peer0.org1.example.com | "2019-04-22 06:16:58.654 UTC [aclmgmt] CheckACL -> DEBU 13f9 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +peer0.org1.example.com | "2019-04-22 06:16:58.654 UTC [aclmgmt] CheckACL -> DEBU 13fa acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:16:58.654 UTC [policies] Evaluate -> DEBU 13fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:58.654 UTC [policies] Evaluate -> DEBU 13fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:58.655 UTC [policies] Evaluate -> DEBU 13fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:58.655 UTC [cauthdsl] func1 -> DEBU 13fe 0xc003ad6c00 gate 1555913818655325600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:58.655 UTC [cauthdsl] func2 -> DEBU 13ff 0xc003ad6c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:58.656 UTC [cauthdsl] func2 -> DEBU 1400 0xc003ad6c00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:58.656 UTC [cauthdsl] func2 -> DEBU 1401 0xc003ad6c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:16:58.657 UTC [cauthdsl] func2 -> DEBU 1402 0xc003ad6c00 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:58.657 UTC [cauthdsl] func1 -> DEBU 1403 0xc003ad6c00 gate 1555913818655325600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:58.658 UTC [policies] Evaluate -> DEBU 1404 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.658 UTC [policies] Evaluate -> DEBU 1405 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.658 UTC [policies] Evaluate -> DEBU 1406 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:58.659 UTC [cauthdsl] func1 -> DEBU 1407 0xc003ad7440 gate 1555913818659013200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:58.659 UTC [cauthdsl] func2 -> DEBU 1408 0xc003ad7440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:58.659 UTC [cauthdsl] func2 -> DEBU 1409 0xc003ad7440 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:58.659 UTC [cauthdsl] func2 -> DEBU 140a 0xc003ad7440 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:58.660 UTC [msp.identity] Verify -> DEBU 140b Verify: digest = 00000000 70 3c 94 76 77 52 c4 d1 a2 30 4d cd 25 dc 08 0e |p<.vwR...0M.%...| +peer0.org1.example.com | 00000010 d7 13 f7 3e 20 82 9c be 4d 0c ad 90 b0 9b 3a 1f |...> ...M.....:.|" +peer0.org1.example.com | "2019-04-22 06:16:58.660 UTC [msp.identity] Verify -> DEBU 140c Verify: sig = 00000000 30 45 02 21 00 82 78 0a c0 58 ca 3f 7a ea 47 95 |0E.!..x..X.?z.G.| +peer0.org1.example.com | 00000010 10 e3 cd 11 72 27 1a d5 bf 9d fa 2d 80 e8 50 81 |....r'.....-..P.| +peer0.org1.example.com | 00000020 6c 1d 82 17 f4 02 20 14 fa ab d8 0f ab e5 62 d2 |l..... .......b.| +peer0.org1.example.com | 00000030 9a 9d ec 4d d7 83 e5 30 c1 b8 9d a4 a3 d0 66 aa |...M...0......f.| +peer0.org1.example.com | 00000040 ef 74 e5 7c 31 c9 42 |.t.|1.B|" +peer0.org1.example.com | "2019-04-22 06:16:58.661 UTC [cauthdsl] func2 -> DEBU 140d 0xc003ad7440 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:58.661 UTC [cauthdsl] func1 -> DEBU 140e 0xc003ad7440 gate 1555913818659013200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 140f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 1411 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 1412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.663 UTC [common.deliver] deliverBlocks -> DEBU 1413 [channel: businesschannel] Received seekInfo (0xc00392bb80) start: > stop: > from 192.168.224.9:49272" +peer0.org1.example.com | "2019-04-22 06:16:58.663 UTC [fsblkstorage] Next -> DEBU 1414 Initializing block stream for iterator. itr.maxBlockNumAvailable=4" +peer0.org1.example.com | "2019-04-22 06:16:58.663 UTC [fsblkstorage] newBlockfileStream -> DEBU 1415 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76086]" +peer0.org1.example.com | "2019-04-22 06:16:58.664 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1416 Remaining bytes=[4710], Going to peek [8] bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.664 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1417 Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[76086], bytesOffset=[76088]}" +peer0.org1.example.com | "2019-04-22 06:16:58.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1418 blockbytes [4708] read from file [0]" +peer0.org1.example.com | "2019-04-22 06:16:58.665 UTC [common.deliver] deliverBlocks -> DEBU 1419 [channel: businesschannel] Delivering block [4] for (0xc00392bb80) for 192.168.224.9:49272" +peer0.org1.example.com | "2019-04-22 06:16:58.666 UTC [fsblkstorage] waitForBlock -> DEBU 141a Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +peer0.org1.example.com | "2019-04-22 06:16:58.888 UTC [gossip.pull] Hello -> DEBU 141b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:58.888 UTC [gossip.comm] Send -> DEBU 141c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:58.889 UTC [gossip.pull] Hello -> DEBU 141d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:58.889 UTC [gossip.comm] Send -> DEBU 141e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:58.889 UTC [gossip.pull] Hello -> DEBU 141f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:16:58.889 UTC [gossip.comm] Send -> DEBU 1420 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:58.889 UTC [gossip.comm] sendToEndpoint -> DEBU 1421 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1422 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1423 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1424 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.891 UTC [gossip.comm] sendToEndpoint -> DEBU 1425 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b16 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b17 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b19 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [common.deliver] deliverBlocks -> DEBU 1b1b [channel: businesschannel] Received seekInfo (0xc0009ba640) start: > stop: > from 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [fsblkstorage] Next -> DEBU 1b1c Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:06.643 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b1d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b1e Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b1f Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b20 blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [common.deliver] deliverBlocks -> DEBU 1b21 [channel: businesschannel] Delivering block [9] for (0xc0009ba640) for 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [common.deliver] deliverBlocks -> DEBU 1b22 [channel: businesschannel] Done delivering to 192.168.224.9:34770 for (0xc0009ba640)" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [common.deliver] Handle -> DEBU 1b23 Waiting for new SeekInfo from 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [common.deliver] Handle -> DEBU 1b24 Attempting to read seek info message from 192.168.224.9:34770" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [fsblkstorage] waitForBlock -> DEBU 1b25 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:06.644 UTC [fsblkstorage] waitForBlock -> DEBU 1b26 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.645 UTC [fsblkstorage] waitForBlock -> DEBU 1b27 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:06.645 UTC [fsblkstorage] waitForBlock -> DEBU 1b28 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.653 UTC [common.deliver] Handle -> WARN 1b29 Error reading from 192.168.224.9:34770: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:06.654 UTC [orderer.common.server] func1 -> DEBU 1b2a Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:06.654 UTC [comm.grpc.server] 1 -> INFO 1b2b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34770 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=53.7026ms +orderer0.example.com | "2019-04-22 06:18:06.654 UTC [grpc] infof -> DEBU 1b2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:06.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b2d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:06.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2e Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +orderer0.example.com | "2019-04-22 06:18:06.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.1µs " +orderer0.example.com | "2019-04-22 06:18:06.795 UTC [orderer.common.server] Deliver -> DEBU 1b30 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:06.795 UTC [common.deliver] Handle -> DEBU 1b31 Starting new deliver loop for 192.168.224.9:34772" +orderer0.example.com | "2019-04-22 06:18:06.795 UTC [common.deliver] Handle -> DEBU 1b32 Attempting to read seek info message from 192.168.224.9:34772" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [cauthdsl] func1 -> DEBU 1b38 0xc0003e6410 gate 1555913886797350100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [cauthdsl] func2 -> DEBU 1b39 0xc0003e6410 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [cauthdsl] func2 -> DEBU 1b3a 0xc0003e6410 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.797 UTC [cauthdsl] func2 -> DEBU 1b3b 0xc0003e6410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.798 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc0003e6410 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.798 UTC [cauthdsl] func1 -> DEBU 1b3d 0xc0003e6410 gate 1555913886797350100 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.799 UTC [policies] Evaluate -> DEBU 1b3e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.799 UTC [policies] Evaluate -> DEBU 1b3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.800 UTC [policies] Evaluate -> DEBU 1b40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.801 UTC [cauthdsl] func1 -> DEBU 1b41 0xc0003e6df0 gate 1555913886801164400 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.801 UTC [cauthdsl] func2 -> DEBU 1b42 0xc0003e6df0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.801 UTC [cauthdsl] func2 -> DEBU 1b43 0xc0003e6df0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.801 UTC [cauthdsl] func2 -> DEBU 1b44 0xc0003e6df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.802 UTC [cauthdsl] func2 -> DEBU 1b45 0xc0003e6df0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.802 UTC [cauthdsl] func1 -> DEBU 1b46 0xc0003e6df0 gate 1555913886801164400 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.802 UTC [policies] Evaluate -> DEBU 1b47 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:58.891 UTC [gossip.comm] sendToEndpoint -> DEBU 1426 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.892 UTC [gossip.comm] func1 -> DEBU 1427 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12318132908289043989 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.893 UTC [gossip.gossip] handleMessage -> DEBU 1428 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12318132908289043989 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.893 UTC [gossip.pull] HandleMessage -> DEBU 1429 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12318132908289043989 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.893 UTC [gossip.gossip] handleMessage -> DEBU 142a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.894 UTC [gossip.comm] func1 -> DEBU 142b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11051994609818616944 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.894 UTC [gossip.gossip] handleMessage -> DEBU 142c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11051994609818616944 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.895 UTC [gossip.pull] HandleMessage -> DEBU 142d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11051994609818616944 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.895 UTC [gossip.gossip] handleMessage -> DEBU 142e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.895 UTC [gossip.gossip] handleMessage -> DEBU 142f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16533584498481495631 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.895 UTC [gossip.pull] HandleMessage -> DEBU 1430 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16533584498481495631 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.895 UTC [gossip.gossip] handleMessage -> DEBU 1431 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.918 UTC [msp.identity] Sign -> DEBU 1432 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151016 " +peer0.org1.example.com | "2019-04-22 06:16:58.919 UTC [msp.identity] Sign -> DEBU 1433 Sign: digest: 53485231500E56B076979AE17E8A4E80FCA16060B13DCE8B5B9BECC85F1984A8 " +peer0.org1.example.com | "2019-04-22 06:16:58.919 UTC [msp.identity] Sign -> DEBU 1434 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:16:58.919 UTC [msp.identity] Sign -> DEBU 1435 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:16:58.920 UTC [gossip.comm] Send -> DEBU 1436 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:58.920 UTC [msp] DeserializeIdentity -> DEBU 1437 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:58.920 UTC [gossip.comm] Send -> DEBU 1438 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:58.920 UTC [msp] DeserializeIdentity -> DEBU 1439 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:58.920 UTC [gossip.comm] Send -> DEBU 143a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143c Exiting" +orderer0.example.com | "2019-04-22 06:18:06.802 UTC [policies] Evaluate -> DEBU 1b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.803 UTC [policies] Evaluate -> DEBU 1b49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.803 UTC [cauthdsl] func1 -> DEBU 1b4a 0xc0003e7870 gate 1555913886803261200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4b 0xc0003e7870 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc0003e7870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc0003e7870 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc0003e7870 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b50 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b51 0xc0003e7870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b52 0xc0003e7870 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b53 0xc0003e7870 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b54 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b55 0xc0003e7870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [cauthdsl] func2 -> DEBU 1b56 0xc0003e7870 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [cauthdsl] func1 -> DEBU 1b57 0xc0003e7870 gate 1555913886803261200 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b58 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [policies] func1 -> DEBU 1b5a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5b Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:06.806 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:06.806 UTC [cauthdsl] func1 -> DEBU 1b60 0xc000172f50 gate 1555913886806204600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:06.806 UTC [cauthdsl] func2 -> DEBU 1b61 0xc000172f50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:06.806 UTC [cauthdsl] func2 -> DEBU 1b62 0xc000172f50 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:06.807 UTC [cauthdsl] func2 -> DEBU 1b63 0xc000172f50 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:06.807 UTC [msp.identity] Verify -> DEBU 1b64 Verify: digest = 00000000 f7 bc f0 61 f3 fd 95 6d 39 20 36 e4 4f 01 11 76 |...a...m9 6.O..v| +orderer0.example.com | 00000010 d1 35 be 6f 85 b0 3d c0 95 55 f8 c0 63 5f cf d7 |.5.o..=..U..c_..|" +orderer0.example.com | "2019-04-22 06:18:06.807 UTC [msp.identity] Verify -> DEBU 1b65 Verify: sig = 00000000 30 44 02 20 39 97 37 33 c6 55 e6 d1 a5 13 dc a7 |0D. 9.73.U......| +orderer0.example.com | 00000010 a5 ad 8c 09 cc ac 90 57 fa d2 14 c4 ae b3 cb c6 |.......W........| +orderer0.example.com | 00000020 ae 5c be 68 02 20 76 3b e9 57 77 c6 6e 9e d0 35 |.\.h. v;.Ww.n..5| +orderer0.example.com | 00000030 e7 70 2b 66 8b 4c 95 16 5a b1 9d ca 8f 98 ab a3 |.p+f.L..Z.......| +orderer0.example.com | 00000040 48 d9 95 0e 77 d2 |H...w.|" +orderer0.example.com | "2019-04-22 06:18:06.807 UTC [cauthdsl] func2 -> DEBU 1b66 0xc000172f50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:06.807 UTC [cauthdsl] func1 -> DEBU 1b67 0xc000172f50 gate 1555913886806204600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:06.807 UTC [policies] Evaluate -> DEBU 1b68 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6c Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [common.deliver] deliverBlocks -> DEBU 1b6e [channel: businesschannel] Received seekInfo (0xc0009bab00) start: > stop: > from 192.168.224.9:34772" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [fsblkstorage] Next -> DEBU 1b6f Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b70 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b71 Remaining bytes=[133667], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b72 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b73 blockbytes [23937] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:06.808 UTC [common.deliver] deliverBlocks -> DEBU 1b74 [channel: businesschannel] Delivering block [0] for (0xc0009bab00) for 192.168.224.9:34772" +orderer0.example.com | "2019-04-22 06:18:06.809 UTC [common.deliver] deliverBlocks -> DEBU 1b75 [channel: businesschannel] Done delivering to 192.168.224.9:34772 for (0xc0009bab00)" +orderer0.example.com | "2019-04-22 06:18:06.809 UTC [common.deliver] Handle -> DEBU 1b76 Waiting for new SeekInfo from 192.168.224.9:34772" +orderer0.example.com | "2019-04-22 06:18:06.809 UTC [common.deliver] Handle -> DEBU 1b77 Attempting to read seek info message from 192.168.224.9:34772" +orderer0.example.com | "2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b78 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b79 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b7a Came out of wait. maxAvailaBlockNumber=[9]" +peer0.org1.example.com | "2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1440 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.924 UTC [gossip.comm] func1 -> DEBU 1441 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.924 UTC [gossip.gossip] handleMessage -> DEBU 1442 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.925 UTC [gossip.gossip] handleMessage -> DEBU 1443 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1444 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.925 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1445 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:58.926 UTC [msp.identity] Verify -> DEBU 1446 Verify: digest = 00000000 53 48 52 31 50 0e 56 b0 76 97 9a e1 7e 8a 4e 80 |SHR1P.V.v...~.N.| +peer0.org1.example.com | 00000010 fc a1 60 60 b1 3d ce 8b 5b 9b ec c8 5f 19 84 a8 |..``.=..[..._...|" +peer0.org1.example.com | "2019-04-22 06:16:58.926 UTC [msp.identity] Verify -> DEBU 1447 Verify: sig = 00000000 30 44 02 20 40 cc 1c 36 e1 7e 67 3d 72 42 aa 5f |0D. @..6.~g=rB._| +peer0.org1.example.com | 00000010 25 05 bc f9 a4 e9 e5 3e 6a ad fc 64 82 19 6d 75 |%......>j..d..mu| +peer0.org1.example.com | 00000020 21 af 1f e9 02 20 6b 76 4d e4 7e b3 d3 17 21 96 |!.... kvM.~...!.| +peer0.org1.example.com | 00000030 8e 4b 65 f2 e6 98 ff e4 29 22 da 2a 9c b1 10 08 |.Ke.....)".*....| +peer0.org1.example.com | 00000040 b2 b2 e1 e4 0f cb |......|" +peer0.org1.example.com | "2019-04-22 06:16:58.927 UTC [msp.identity] Verify -> DEBU 1448 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:16:58.927 UTC [msp.identity] Verify -> DEBU 1449 Verify: sig = 00000000 30 45 02 21 00 fc 4d fb 5a b5 f1 ab 03 2e af de |0E.!..M.Z.......| +peer0.org1.example.com | 00000010 85 ea b0 c6 38 0d 84 47 9c 97 9f a8 8e 4e cf 83 |....8..G.....N..| +peer0.org1.example.com | 00000020 96 8d 28 92 46 02 20 78 2a df 06 f1 cc bf a5 57 |..(.F. x*......W| +peer0.org1.example.com | 00000030 09 69 1e ee 4f 0a e3 55 51 ac b1 c6 8f 1e 5d 0b |.i..O..UQ.....].| +peer0.org1.example.com | 00000040 ec ef 83 a1 ef de 8b |.......|" +peer0.org1.example.com | "2019-04-22 06:16:58.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 144a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.928 UTC [gossip.discovery] isSentByMe -> DEBU 144b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 144c Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 144d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.930 UTC [gossip.comm] func1 -> DEBU 144e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.930 UTC [gossip.gossip] handleMessage -> DEBU 144f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.930 UTC [gossip.gossip] handleMessage -> DEBU 1450 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1451 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1452 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:58.932 UTC [msp.identity] Verify -> DEBU 1453 Verify: digest = 00000000 53 48 52 31 50 0e 56 b0 76 97 9a e1 7e 8a 4e 80 |SHR1P.V.v...~.N.| +peer0.org1.example.com | 00000010 fc a1 60 60 b1 3d ce 8b 5b 9b ec c8 5f 19 84 a8 |..``.=..[..._...|" +peer0.org1.example.com | "2019-04-22 06:16:58.932 UTC [msp.identity] Verify -> DEBU 1454 Verify: sig = 00000000 30 44 02 20 40 cc 1c 36 e1 7e 67 3d 72 42 aa 5f |0D. @..6.~g=rB._| +peer0.org1.example.com | 00000010 25 05 bc f9 a4 e9 e5 3e 6a ad fc 64 82 19 6d 75 |%......>j..d..mu| +peer0.org1.example.com | 00000020 21 af 1f e9 02 20 6b 76 4d e4 7e b3 d3 17 21 96 |!.... kvM.~...!.| +peer0.org1.example.com | 00000030 8e 4b 65 f2 e6 98 ff e4 29 22 da 2a 9c b1 10 08 |.Ke.....)".*....| +peer0.org1.example.com | 00000040 b2 b2 e1 e4 0f cb |......|" +peer0.org1.example.com | "2019-04-22 06:16:58.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1455 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +orderer0.example.com | "2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b7b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:06.817 UTC [common.deliver] Handle -> WARN 1b7c Error reading from 192.168.224.9:34772: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:06.817 UTC [orderer.common.server] func1 -> DEBU 1b7d Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:06.817 UTC [comm.grpc.server] 1 -> INFO 1b7f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34772 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.0118ms +orderer0.example.com | "2019-04-22 06:18:06.817 UTC [grpc] infof -> DEBU 1b7e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:07.067 UTC [orderer.common.server] Deliver -> DEBU 1b80 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:07.067 UTC [common.deliver] Handle -> DEBU 1b81 Starting new deliver loop for 192.168.224.9:34774" +orderer0.example.com | "2019-04-22 06:18:07.067 UTC [common.deliver] Handle -> DEBU 1b82 Attempting to read seek info message from 192.168.224.9:34774" +orderer0.example.com | "2019-04-22 06:18:07.069 UTC [policies] Evaluate -> DEBU 1b83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.069 UTC [policies] Evaluate -> DEBU 1b84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.069 UTC [policies] Evaluate -> DEBU 1b85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.070 UTC [policies] Evaluate -> DEBU 1b86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.071 UTC [policies] Evaluate -> DEBU 1b87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.071 UTC [cauthdsl] func1 -> DEBU 1b89 0xc0009e7cf0 gate 1555913887071564700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.071 UTC [cauthdsl] func2 -> DEBU 1b8b 0xc0009e7cf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.072 UTC [cauthdsl] func2 -> DEBU 1b8c 0xc0009e7cf0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.072 UTC [cauthdsl] func2 -> DEBU 1b8d 0xc0009e7cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.073 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc0009e7cf0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.073 UTC [cauthdsl] func1 -> DEBU 1b8f 0xc0009e7cf0 gate 1555913887071564700 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 269.6µs " +orderer0.example.com | "2019-04-22 06:18:07.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b88 Sending msg of 28 bytes to 2 on channel businesschannel took 32µs" +orderer0.example.com | "2019-04-22 06:18:07.073 UTC [policies] Evaluate -> DEBU 1b90 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b91 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:07.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b92 Sending msg of 28 bytes to 3 on channel businesschannel took 105.3µs" +orderer0.example.com | "2019-04-22 06:18:07.075 UTC [policies] Evaluate -> DEBU 1b93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.076 UTC [policies] Evaluate -> DEBU 1b94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.076 UTC [cauthdsl] func1 -> DEBU 1b95 0xc0001f1150 gate 1555913887076513600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b96 0xc0001f1150 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b97 0xc0001f1150 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b98 0xc0001f1150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b99 0xc0001f1150 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.076 UTC [cauthdsl] func1 -> DEBU 1b9a 0xc0001f1150 gate 1555913887076513600 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [policies] Evaluate -> DEBU 1b9b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [policies] Evaluate -> DEBU 1b9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [cauthdsl] func1 -> DEBU 1b9e 0xc0001f1a30 gate 1555913887077489000 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc0001f1a30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc0001f1a30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc0001f1a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1ba2 0xc0001f1a30 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.9836ms " +orderer0.example.com | "2019-04-22 06:18:07.078 UTC [cauthdsl] func2 -> DEBU 1ba4 0xc0001f1a30 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.079 UTC [cauthdsl] func2 -> DEBU 1ba5 0xc0001f1a30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba6 0xc0001f1a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba7 0xc0001f1a30 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc0001f1a30 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba9 0xc0001f1a30 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1baa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:07.081 UTC [cauthdsl] func2 -> DEBU 1bab 0xc0001f1a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.081 UTC [cauthdsl] func2 -> DEBU 1bac 0xc0001f1a30 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:16:58.933 UTC [gossip.discovery] isSentByMe -> DEBU 1456 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 1457 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1458 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.936 UTC [gossip.gossip] handleMessage -> DEBU 1459 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.936 UTC [gossip.gossip] handleMessage -> DEBU 145a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 145b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 145c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:16:58.936 UTC [msp.identity] Verify -> DEBU 145d Verify: digest = 00000000 53 48 52 31 50 0e 56 b0 76 97 9a e1 7e 8a 4e 80 |SHR1P.V.v...~.N.| +peer0.org1.example.com | 00000010 fc a1 60 60 b1 3d ce 8b 5b 9b ec c8 5f 19 84 a8 |..``.=..[..._...|" +peer0.org1.example.com | "2019-04-22 06:16:58.937 UTC [msp.identity] Verify -> DEBU 145e Verify: sig = 00000000 30 44 02 20 40 cc 1c 36 e1 7e 67 3d 72 42 aa 5f |0D. @..6.~g=rB._| +peer0.org1.example.com | 00000010 25 05 bc f9 a4 e9 e5 3e 6a ad fc 64 82 19 6d 75 |%......>j..d..mu| +peer0.org1.example.com | 00000020 21 af 1f e9 02 20 6b 76 4d e4 7e b3 d3 17 21 96 |!.... kvM.~...!.| +peer0.org1.example.com | 00000030 8e 4b 65 f2 e6 98 ff e4 29 22 da 2a 9c b1 10 08 |.Ke.....)".*....| +peer0.org1.example.com | 00000040 b2 b2 e1 e4 0f cb |......|" +peer0.org1.example.com | "2019-04-22 06:16:58.937 UTC [gossip.discovery] handleAliveMessage -> DEBU 145f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.938 UTC [gossip.discovery] isSentByMe -> DEBU 1460 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:58.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 1461 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:58.938 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1462 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.158 UTC [gossip.comm] func1 -> DEBU 1463 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.158 UTC [gossip.gossip] handleMessage -> DEBU 1464 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.159 UTC [gossip.pull] HandleMessage -> DEBU 1465 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.159 UTC [gossip.pull] SendDigest -> DEBU 1466 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:59.159 UTC [gossip.gossip] handleMessage -> DEBU 1467 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.177 UTC [gossip.comm] func1 -> DEBU 1468 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.180 UTC [gossip.gossip] handleMessage -> DEBU 1469 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.180 UTC [gossip.gossip] handleMessage -> DEBU 146a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.182 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 146c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:16:59.183 UTC [msp.identity] Verify -> DEBU 146d Verify: digest = 00000000 2b 45 51 6a ce fb e9 bc 2b 19 f2 b9 70 b3 25 a0 |+EQj....+...p.%.| +peer0.org1.example.com | 00000010 b2 cb 7e 09 7a ba 25 67 78 40 c8 a0 ec 40 f6 95 |..~.z.%gx@...@..|" +peer0.org1.example.com | "2019-04-22 06:16:59.183 UTC [msp.identity] Verify -> DEBU 146e Verify: sig = 00000000 30 45 02 21 00 aa 1a e4 1f 97 2f f9 89 d2 89 d2 |0E.!....../.....| +peer0.org1.example.com | 00000010 90 44 de 22 92 3a 14 1f ad 99 92 bc 9a 3f 3b 29 |.D.".:.......?;)| +peer0.org1.example.com | 00000020 9c eb a7 53 55 02 20 66 2d 41 67 29 7c df c1 9d |...SU. f-Ag)|...| +peer0.org1.example.com | 00000030 6d d5 02 5c 0e 72 81 78 21 32 c4 79 8e 94 dd 68 |m..\.r.x!2.y...h| +peer0.org1.example.com | 00000040 db 43 ea 9d 59 49 28 |.C..YI(|" +peer0.org1.example.com | "2019-04-22 06:16:59.186 UTC [msp.identity] Verify -> DEBU 146f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:16:59.187 UTC [msp.identity] Verify -> DEBU 1470 Verify: sig = 00000000 30 44 02 20 0a 12 5b 7d 0a 47 a9 78 59 51 bf 67 |0D. ..[}.G.xYQ.g| +peer0.org1.example.com | 00000010 63 3a f6 54 7c af 1a 8d 68 a4 ad aa 54 a3 5b ed |c:.T|...h...T.[.| +peer0.org1.example.com | 00000020 50 08 2e 0d 02 20 65 f2 fb f3 d2 c4 fb 72 08 1f |P.... e......r..| +peer0.org1.example.com | 00000030 59 78 56 16 d6 28 3b f2 f1 4b 2f 14 5a 4e 32 fe |YxV..(;..K/.ZN2.| +peer0.org1.example.com | 00000040 17 85 69 4a a5 75 |..iJ.u|" +orderer0.example.com | "2019-04-22 06:18:07.081 UTC [cauthdsl] func1 -> DEBU 1bad 0xc0001f1a30 gate 1555913887077489000 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.082 UTC [policies] Evaluate -> DEBU 1bae Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.082 UTC [policies] Evaluate -> DEBU 1baf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.082 UTC [policies] func1 -> DEBU 1bb0 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:07.082 UTC [policies] Evaluate -> DEBU 1bb1 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.083 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc000ee9300 gate 1555913887083856500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.084 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc000ee9300 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.084 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc000ee9300 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.084 UTC [cauthdsl] func2 -> DEBU 1bb9 0xc000ee9300 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:07.084 UTC [msp.identity] Verify -> DEBU 1bba Verify: digest = 00000000 f0 df 63 dc f8 a7 d1 59 84 02 8f db 75 19 42 57 |..c....Y....u.BW| +orderer0.example.com | 00000010 67 2d f3 5f a6 7e dd ad dd 84 c9 68 1b fe a5 ac |g-._.~.....h....|" +orderer0.example.com | "2019-04-22 06:18:07.085 UTC [msp.identity] Verify -> DEBU 1bbb Verify: sig = 00000000 30 45 02 21 00 ed c0 eb 32 3c e6 c7 e5 71 90 b4 |0E.!....2<...q..| +orderer0.example.com | 00000010 ea 81 2d be df a3 53 71 78 ad 04 24 1c 8e c3 4c |..-...Sqx..$...L| +orderer0.example.com | 00000020 4c fd 1b bc 6e 02 20 5e 31 47 57 9e 6e d2 92 93 |L...n. ^1GW.n...| +orderer0.example.com | 00000030 fe c9 37 42 79 57 9a 1c 74 0f 3d 3b 2a 03 0c 97 |..7ByW..t.=;*...| +orderer0.example.com | 00000040 1d 71 b6 f6 ac 18 7e |.q....~|" +orderer0.example.com | "2019-04-22 06:18:07.085 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc000ee9300 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:07.085 UTC [cauthdsl] func1 -> DEBU 1bbd 0xc000ee9300 gate 1555913887083856500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:07.086 UTC [policies] Evaluate -> DEBU 1bbe Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.086 UTC [policies] Evaluate -> DEBU 1bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.087 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.087 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.088 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.088 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.088 UTC [common.deliver] deliverBlocks -> DEBU 1bc4 [channel: businesschannel] Received seekInfo (0xc0009bb180) start: > stop: > from 192.168.224.9:34774" +orderer0.example.com | "2019-04-22 06:18:07.089 UTC [fsblkstorage] Next -> DEBU 1bc5 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:07.090 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +orderer0.example.com | "2019-04-22 06:18:07.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc7 Remaining bytes=[109727], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:07.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc8 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +orderer0.example.com | "2019-04-22 06:18:07.091 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 blockbytes [23684] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:07.091 UTC [common.deliver] deliverBlocks -> DEBU 1bca [channel: businesschannel] Delivering block [1] for (0xc0009bb180) for 192.168.224.9:34774" +orderer0.example.com | "2019-04-22 06:18:07.092 UTC [common.deliver] deliverBlocks -> DEBU 1bcb [channel: businesschannel] Done delivering to 192.168.224.9:34774 for (0xc0009bb180)" +orderer0.example.com | "2019-04-22 06:18:07.092 UTC [common.deliver] Handle -> DEBU 1bcc Waiting for new SeekInfo from 192.168.224.9:34774" +orderer0.example.com | "2019-04-22 06:18:07.092 UTC [common.deliver] Handle -> DEBU 1bcd Attempting to read seek info message from 192.168.224.9:34774" +orderer0.example.com | "2019-04-22 06:18:07.093 UTC [fsblkstorage] waitForBlock -> DEBU 1bce Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.093 UTC [fsblkstorage] waitForBlock -> DEBU 1bcf Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:07.093 UTC [fsblkstorage] waitForBlock -> DEBU 1bd0 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.094 UTC [fsblkstorage] waitForBlock -> DEBU 1bd1 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:07.105 UTC [common.deliver] Handle -> WARN 1bd2 Error reading from 192.168.224.9:34774: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:07.105 UTC [orderer.common.server] func1 -> DEBU 1bd4 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:07.106 UTC [comm.grpc.server] 1 -> INFO 1bd5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34774 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2754ms +orderer0.example.com | "2019-04-22 06:18:07.105 UTC [grpc] infof -> DEBU 1bd3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:07.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:07.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd7 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +orderer0.example.com | "2019-04-22 06:18:07.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 439.3µs " +orderer0.example.com | "2019-04-22 06:18:07.292 UTC [orderer.common.server] Deliver -> DEBU 1bd9 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:07.293 UTC [common.deliver] Handle -> DEBU 1bda Starting new deliver loop for 192.168.224.9:34776" +orderer0.example.com | "2019-04-22 06:18:07.293 UTC [common.deliver] Handle -> DEBU 1bdb Attempting to read seek info message from 192.168.224.9:34776" +orderer0.example.com | "2019-04-22 06:18:07.294 UTC [policies] Evaluate -> DEBU 1bdc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:59.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1471 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1472 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1473 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 " +peer0.org1.example.com | "2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1474 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 " +peer0.org1.example.com | "2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1475 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:59.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1476 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 1477 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1478 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.189 UTC [gossip.discovery] sendMemResponse -> DEBU 1479 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:16:59.190 UTC [msp] DeserializeIdentity -> DEBU 147a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.190 UTC [msp] DeserializeIdentity -> DEBU 147b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.190 UTC [gossip.comm] Send -> DEBU 147c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 147d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 147e Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.190 UTC [gossip.discovery] sendMemResponse -> DEBU 147f Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:59.618 UTC [gossip.comm] func1 -> DEBU 1480 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.618 UTC [gossip.gossip] handleMessage -> DEBU 1481 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.618 UTC [gossip.pull] HandleMessage -> DEBU 1482 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1483 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1484 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1485 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1486 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.620 UTC [msp] DeserializeIdentity -> DEBU 1487 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.620 UTC [msp] DeserializeIdentity -> DEBU 1488 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.620 UTC [gossip.pull] SendDigest -> DEBU 1489 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:59.620 UTC [gossip.gossip] handleMessage -> DEBU 148a Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.627 UTC [gossip.comm] func1 -> DEBU 148b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.628 UTC [gossip.gossip] handleMessage -> DEBU 148c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.628 UTC [gossip.gossip] handleMessage -> DEBU 148d Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 148e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 148f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:16:59.629 UTC [msp] DeserializeIdentity -> DEBU 1490 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:07.294 UTC [policies] Evaluate -> DEBU 1bdd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.295 UTC [policies] Evaluate -> DEBU 1bde == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.295 UTC [policies] Evaluate -> DEBU 1bdf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.295 UTC [policies] Evaluate -> DEBU 1be0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.296 UTC [cauthdsl] func1 -> DEBU 1be1 0xc000fb7920 gate 1555913887296625200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be2 0xc000fb7920 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be3 0xc000fb7920 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be4 0xc000fb7920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be5 0xc000fb7920 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.297 UTC [cauthdsl] func1 -> DEBU 1be6 0xc000fb7920 gate 1555913887296625200 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.297 UTC [policies] Evaluate -> DEBU 1be7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.298 UTC [policies] Evaluate -> DEBU 1be8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.298 UTC [policies] Evaluate -> DEBU 1be9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.298 UTC [cauthdsl] func1 -> DEBU 1bea 0xc0009d8160 gate 1555913887298480900 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.298 UTC [cauthdsl] func2 -> DEBU 1beb 0xc0009d8160 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.298 UTC [cauthdsl] func2 -> DEBU 1bec 0xc0009d8160 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.299 UTC [cauthdsl] func2 -> DEBU 1bed 0xc0009d8160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.299 UTC [cauthdsl] func2 -> DEBU 1bee 0xc0009d8160 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.299 UTC [cauthdsl] func1 -> DEBU 1bef 0xc0009d8160 gate 1555913887298480900 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.300 UTC [policies] Evaluate -> DEBU 1bf0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.300 UTC [policies] Evaluate -> DEBU 1bf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.300 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.300 UTC [cauthdsl] func1 -> DEBU 1bf3 0xc0009d89a0 gate 1555913887300283500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.300 UTC [cauthdsl] func2 -> DEBU 1bf4 0xc0009d89a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.300 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc0009d89a0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc0009d89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc0009d89a0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc0009d89a0 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf9 0xc0009d89a0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bfa 0xc0009d89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bfb 0xc0009d89a0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bfc 0xc0009d89a0 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [cauthdsl] func2 -> DEBU 1bfd 0xc0009d89a0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [cauthdsl] func2 -> DEBU 1bfe 0xc0009d89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [cauthdsl] func2 -> DEBU 1bff 0xc0009d89a0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [cauthdsl] func1 -> DEBU 1c00 0xc0009d89a0 gate 1555913887300283500 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c01 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [policies] func1 -> DEBU 1c03 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c04 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c05 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.303 UTC [policies] Evaluate -> DEBU 1c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.303 UTC [policies] Evaluate -> DEBU 1c08 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.303 UTC [cauthdsl] func1 -> DEBU 1c09 0xc0009d9f00 gate 1555913887303660700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.304 UTC [cauthdsl] func2 -> DEBU 1c0a 0xc0009d9f00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.304 UTC [cauthdsl] func2 -> DEBU 1c0b 0xc0009d9f00 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.304 UTC [cauthdsl] func2 -> DEBU 1c0c 0xc0009d9f00 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:07.304 UTC [msp.identity] Verify -> DEBU 1c0d Verify: digest = 00000000 f4 a0 3f b8 7e 4c 00 0d 9e 94 06 f4 f9 04 bd b3 |..?.~L..........| +orderer0.example.com | 00000010 0a 85 53 68 ec b0 8b 7f 0d 13 69 c9 8f 45 6d 54 |..Sh......i..EmT|" +orderer0.example.com | "2019-04-22 06:18:07.304 UTC [msp.identity] Verify -> DEBU 1c0e Verify: sig = 00000000 30 44 02 20 1b 29 81 e3 7c e2 f7 df c6 42 c8 cf |0D. .)..|....B..| +orderer0.example.com | 00000010 7d 83 4b 02 9d e2 dd 28 de 5e 4e 62 65 87 5f d2 |}.K....(.^Nbe._.| +orderer0.example.com | 00000020 fc 05 35 3c 02 20 2c 4e 67 a8 73 64 66 94 24 74 |..5<. ,Ng.sdf.$t| +orderer0.example.com | 00000030 d1 35 41 ec 5a 3f 52 7f ae b8 e7 a1 db 43 de 18 |.5A.Z?R......C..| +orderer0.example.com | 00000040 7e b9 ee 77 6e b5 |~..wn.|" +orderer0.example.com | "2019-04-22 06:18:07.305 UTC [cauthdsl] func2 -> DEBU 1c0f 0xc0009d9f00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:59.629 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1491 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:16:59.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1492 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:59.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1493 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:16:59.630 UTC [policies] Evaluate -> DEBU 1494 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:59.630 UTC [policies] Evaluate -> DEBU 1495 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:16:59.631 UTC [policies] Evaluate -> DEBU 1496 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:16:59.632 UTC [cauthdsl] func1 -> DEBU 1497 0xc003b821a0 gate 1555913819631969500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:16:59.632 UTC [cauthdsl] func2 -> DEBU 1498 0xc003b821a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:16:59.636 UTC [cauthdsl] func2 -> DEBU 1499 0xc003b821a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:16:59.636 UTC [cauthdsl] func2 -> DEBU 149a 0xc003b821a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:16:59.636 UTC [msp.identity] Verify -> DEBU 149b Verify: digest = 00000000 a8 1d 14 86 8c c9 43 28 65 75 1f 30 67 ad b2 79 |......C(eu.0g..y| +peer0.org1.example.com | 00000010 5e 7a 00 41 f5 8d ae 56 91 3f fc a9 a7 75 6d 35 |^z.A...V.?...um5|" +peer0.org1.example.com | "2019-04-22 06:16:59.637 UTC [msp.identity] Verify -> DEBU 149c Verify: sig = 00000000 30 45 02 21 00 9e 2c 0d 96 f6 2c 76 e1 38 75 74 |0E.!..,...,v.8ut| +peer0.org1.example.com | 00000010 54 1c f8 d5 07 d5 9b 9c 8c 91 4b 56 40 bd c8 e1 |T.........KV@...| +peer0.org1.example.com | 00000020 0e cc ea cf bc 02 20 51 7b 5e 72 45 fc f6 67 c0 |...... Q{^rE..g.| +peer0.org1.example.com | 00000030 dd e8 5e d0 fb bb d2 88 10 43 54 2a 27 3d 04 b0 |..^......CT*'=..| +peer0.org1.example.com | 00000040 21 1c d3 2a ae b3 e2 |!..*...|" +peer0.org1.example.com | "2019-04-22 06:16:59.637 UTC [cauthdsl] func2 -> DEBU 149d 0xc003b821a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:16:59.637 UTC [cauthdsl] func1 -> DEBU 149e 0xc003b821a0 gate 1555913819631969500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:16:59.637 UTC [policies] Evaluate -> DEBU 149f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [policies] Evaluate -> DEBU 14a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [policies] Evaluate -> DEBU 14a1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [policies] Evaluate -> DEBU 14a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a5 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 " +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 " +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a8 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a9 Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14aa Exiting" +peer0.org1.example.com | "2019-04-22 06:16:59.639 UTC [gossip.discovery] sendMemResponse -> DEBU 14ab Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:16:59.639 UTC [msp] DeserializeIdentity -> DEBU 14ac Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.639 UTC [msp] DeserializeIdentity -> DEBU 14ad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.639 UTC [msp] DeserializeIdentity -> DEBU 14ae Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:16:59.639 UTC [gossip.comm] Send -> DEBU 14af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:16:59.640 UTC [gossip.discovery] sendMemResponse -> DEBU 14b0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:16:59.640 UTC [gossip.comm] sendToEndpoint -> DEBU 14b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:16:59.640 UTC [gossip.comm] sendToEndpoint -> DEBU 14b2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.034 UTC [gossip.gossip] handleMessage -> DEBU 14b3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.035 UTC [gossip.pull] HandleMessage -> DEBU 14b4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.036 UTC [msp] DeserializeIdentity -> DEBU 14b5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.036 UTC [msp] DeserializeIdentity -> DEBU 14b6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.036 UTC [msp] DeserializeIdentity -> DEBU 14b7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.037 UTC [msp] DeserializeIdentity -> DEBU 14b8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.037 UTC [msp] DeserializeIdentity -> DEBU 14b9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.037 UTC [msp] DeserializeIdentity -> DEBU 14ba Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.037 UTC [gossip.pull] SendDigest -> DEBU 14bb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:00.038 UTC [gossip.gossip] handleMessage -> DEBU 14bc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.052 UTC [gossip.gossip] handleMessage -> DEBU 14bd Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.052 UTC [gossip.gossip] handleMessage -> DEBU 14be Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.054 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14c0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:00.056 UTC [msp] DeserializeIdentity -> DEBU 14c1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14c3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14c4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.057 UTC [policies] Evaluate -> DEBU 14c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.058 UTC [policies] Evaluate -> DEBU 14c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.058 UTC [policies] Evaluate -> DEBU 14c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.058 UTC [cauthdsl] func1 -> DEBU 14c8 0xc003bae480 gate 1555913820058796400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.059 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003bae480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.059 UTC [cauthdsl] func2 -> DEBU 14ca 0xc003bae480 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.059 UTC [cauthdsl] func2 -> DEBU 14cb 0xc003bae480 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.060 UTC [msp.identity] Verify -> DEBU 14cc Verify: digest = 00000000 28 f2 4f b2 dd aa 71 5e cf d2 6a 9d 9e e4 53 4d |(.O...q^..j...SM| +peer0.org1.example.com | 00000010 f3 c2 8d d5 75 6d c0 c7 9f bb 8b c9 5e 2c 99 24 |....um......^,.$|" +peer0.org1.example.com | "2019-04-22 06:17:00.060 UTC [msp.identity] Verify -> DEBU 14cd Verify: sig = 00000000 30 44 02 20 3c dc 5c cf d3 0a 93 fa 26 1b 9f 3c |0D. <.\.....&..<| +peer0.org1.example.com | 00000010 8e c6 32 85 9a 02 63 5b 1a 1d bf fb d1 65 21 f4 |..2...c[.....e!.| +peer0.org1.example.com | 00000020 25 c6 79 46 02 20 54 ec 00 d8 f6 dc 0b 93 47 99 |%.yF. T.......G.| +peer0.org1.example.com | 00000030 ec e6 83 91 64 10 bc 66 4e 55 f0 ed ec 0c 51 d7 |....d..fNU....Q.| +peer0.org1.example.com | 00000040 4c fe 0c 17 cd b9 |L.....|" +orderer0.example.com | "2019-04-22 06:18:07.305 UTC [cauthdsl] func1 -> DEBU 1c10 0xc0009d9f00 gate 1555913887303660700 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c11 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c12 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c13 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c15 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.306 UTC [policies] Evaluate -> DEBU 1c16 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [common.deliver] deliverBlocks -> DEBU 1c17 [channel: businesschannel] Received seekInfo (0xc000dd6c00) start: > stop: > from 192.168.224.9:34776" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [fsblkstorage] Next -> DEBU 1c18 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c19 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47627]" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c1a Remaining bytes=[86040], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c1b Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c1c blockbytes [23742] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [common.deliver] deliverBlocks -> DEBU 1c1d [channel: businesschannel] Delivering block [2] for (0xc000dd6c00) for 192.168.224.9:34776" +orderer0.example.com | "2019-04-22 06:18:07.307 UTC [common.deliver] deliverBlocks -> DEBU 1c1e [channel: businesschannel] Done delivering to 192.168.224.9:34776 for (0xc000dd6c00)" +orderer0.example.com | "2019-04-22 06:18:07.308 UTC [common.deliver] Handle -> DEBU 1c1f Waiting for new SeekInfo from 192.168.224.9:34776" +orderer0.example.com | "2019-04-22 06:18:07.308 UTC [common.deliver] Handle -> DEBU 1c20 Attempting to read seek info message from 192.168.224.9:34776" +orderer0.example.com | "2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c21 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c22 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c23 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c24 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:07.315 UTC [common.deliver] Handle -> WARN 1c25 Error reading from 192.168.224.9:34776: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:07.316 UTC [orderer.common.server] func1 -> DEBU 1c27 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:07.317 UTC [comm.grpc.server] 1 -> INFO 1c28 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34776 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.2501ms +orderer0.example.com | "2019-04-22 06:18:07.316 UTC [grpc] infof -> DEBU 1c26 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:07.552 UTC [orderer.common.server] Deliver -> DEBU 1c29 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:07.553 UTC [common.deliver] Handle -> DEBU 1c2a Starting new deliver loop for 192.168.224.9:34778" +orderer0.example.com | "2019-04-22 06:18:07.553 UTC [common.deliver] Handle -> DEBU 1c2b Attempting to read seek info message from 192.168.224.9:34778" +orderer0.example.com | "2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c30 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [cauthdsl] func1 -> DEBU 1c31 0xc000d76330 gate 1555913887555126400 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c32 0xc000d76330 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c33 0xc000d76330 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c34 0xc000d76330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c35 0xc000d76330 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [cauthdsl] func1 -> DEBU 1c36 0xc000d76330 gate 1555913887555126400 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [policies] Evaluate -> DEBU 1c37 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [policies] Evaluate -> DEBU 1c38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.555 UTC [policies] Evaluate -> DEBU 1c39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.556 UTC [cauthdsl] func1 -> DEBU 1c3a 0xc000d76b70 gate 1555913887556185400 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.556 UTC [cauthdsl] func2 -> DEBU 1c3b 0xc000d76b70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.556 UTC [cauthdsl] func2 -> DEBU 1c3c 0xc000d76b70 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.557 UTC [cauthdsl] func2 -> DEBU 1c3d 0xc000d76b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.557 UTC [cauthdsl] func2 -> DEBU 1c3e 0xc000d76b70 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.557 UTC [cauthdsl] func1 -> DEBU 1c3f 0xc000d76b70 gate 1555913887556185400 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.558 UTC [policies] Evaluate -> DEBU 1c40 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.558 UTC [policies] Evaluate -> DEBU 1c41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.558 UTC [policies] Evaluate -> DEBU 1c42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.558 UTC [cauthdsl] func1 -> DEBU 1c43 0xc000d773b0 gate 1555913887558762500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.061 UTC [cauthdsl] func2 -> DEBU 14ce 0xc003bae480 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.061 UTC [cauthdsl] func1 -> DEBU 14cf 0xc003bae480 gate 1555913820058796400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.061 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.062 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.062 UTC [policies] Evaluate -> DEBU 14d2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.062 UTC [policies] Evaluate -> DEBU 14d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.062 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:00.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d6 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 " +peer0.org1.example.com | "2019-04-22 06:17:00.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d7 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 " +peer0.org1.example.com | "2019-04-22 06:17:00.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:00.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 14da Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.063 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14db Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.063 UTC [gossip.discovery] sendMemResponse -> DEBU 14dc Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:00.064 UTC [msp] DeserializeIdentity -> DEBU 14dd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.064 UTC [msp] DeserializeIdentity -> DEBU 14de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.064 UTC [msp] DeserializeIdentity -> DEBU 14df Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.064 UTC [gossip.comm] Send -> DEBU 14e0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.065 UTC [gossip.discovery] sendMemResponse -> DEBU 14e1 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:00.065 UTC [gossip.comm] sendToEndpoint -> DEBU 14e2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.065 UTC [gossip.comm] sendToEndpoint -> DEBU 14e3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.425 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.426 UTC [msp] DeserializeIdentity -> DEBU 14e5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.426 UTC [gossip.comm] Send -> DEBU 14e6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.426 UTC [gossip.comm] sendToEndpoint -> DEBU 14e7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.427 UTC [gossip.comm] sendToEndpoint -> DEBU 14e8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.427 UTC [gossip.comm] sendToEndpoint -> DEBU 14e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.427 UTC [gossip.comm] sendToEndpoint -> DEBU 14ea Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.428 UTC [gossip.comm] sendToEndpoint -> DEBU 14eb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.430 UTC [gossip.comm] sendToEndpoint -> DEBU 14ee Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.429 UTC [msp] DeserializeIdentity -> DEBU 14ec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.430 UTC [gossip.comm] func1 -> DEBU 14ed Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.432 UTC [gossip.comm] func1 -> DEBU 14ef Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.433 UTC [gossip.gossip] handleMessage -> DEBU 14f0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.434 UTC [msp] DeserializeIdentity -> DEBU 14f1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.435 UTC [msp] DeserializeIdentity -> DEBU 14f2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.436 UTC [gossip.comm] Send -> DEBU 14f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.436 UTC [msp] DeserializeIdentity -> DEBU 14f4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.436 UTC [msp] DeserializeIdentity -> DEBU 14f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.437 UTC [msp.identity] Verify -> DEBU 14f6 Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +peer0.org1.example.com | 00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +peer0.org1.example.com | "2019-04-22 06:17:00.437 UTC [gossip.comm] sendToEndpoint -> DEBU 14f7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.437 UTC [gossip.comm] sendToEndpoint -> DEBU 14f9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.437 UTC [msp.identity] Verify -> DEBU 14f8 Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +peer0.org1.example.com | 00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +peer0.org1.example.com | 00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +peer0.org1.example.com | 00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +peer0.org1.example.com | 00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +peer0.org1.example.com | "2019-04-22 06:17:00.437 UTC [gossip.comm] sendToEndpoint -> DEBU 14fa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.438 UTC [gossip.comm] sendToEndpoint -> DEBU 14fc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.438 UTC [gossip.comm] sendToEndpoint -> DEBU 14fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.438 UTC [gossip.comm] sendToEndpoint -> DEBU 14fd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.442 UTC [msp.identity] Verify -> DEBU 14fe Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +peer0.org1.example.com | 00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +peer0.org1.example.com | "2019-04-22 06:17:00.442 UTC [msp.identity] Verify -> DEBU 14ff Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +peer0.org1.example.com | 00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +peer0.org1.example.com | 00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +peer0.org1.example.com | 00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +peer0.org1.example.com | 00000040 aa dd 99 2d 62 37 1c |...-b7.|" +peer0.org1.example.com | "2019-04-22 06:17:00.443 UTC [msp] DeserializeIdentity -> DEBU 1500 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.443 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.444 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1502 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.444 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1503 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.444 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1504 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.444 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.445 UTC [policies] Evaluate -> DEBU 1506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.445 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.445 UTC [cauthdsl] func1 -> DEBU 1508 0xc003bf0430 gate 1555913820445569200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.558 UTC [cauthdsl] func2 -> DEBU 1c44 0xc000d773b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.559 UTC [cauthdsl] func2 -> DEBU 1c45 0xc000d773b0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.559 UTC [cauthdsl] func2 -> DEBU 1c46 0xc000d773b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.559 UTC [cauthdsl] func2 -> DEBU 1c47 0xc000d773b0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c48 0xc000d773b0 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c49 0xc000d773b0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4a 0xc000d773b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4b 0xc000d773b0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc000d773b0 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4d 0xc000d773b0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4e 0xc000d773b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4f 0xc000d773b0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [cauthdsl] func1 -> DEBU 1c50 0xc000d773b0 gate 1555913887558762500 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [policies] Evaluate -> DEBU 1c51 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [policies] Evaluate -> DEBU 1c52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.560 UTC [policies] func1 -> DEBU 1c53 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c54 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c58 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [cauthdsl] func1 -> DEBU 1c59 0xc000cea7a0 gate 1555913887561505200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc000cea7a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [cauthdsl] func2 -> DEBU 1c5b 0xc000cea7a0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.561 UTC [cauthdsl] func2 -> DEBU 1c5c 0xc000cea7a0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:07.562 UTC [msp.identity] Verify -> DEBU 1c5d Verify: digest = 00000000 3f b8 bf 79 07 c8 f7 c7 90 aa 9c f6 d9 79 33 a0 |?..y.........y3.| +orderer0.example.com | 00000010 44 0b 68 e8 3e 6d ba 5f 2b ee 9b 47 e3 2c 5a e8 |D.h.>m._+..G.,Z.|" +orderer0.example.com | "2019-04-22 06:18:07.562 UTC [msp.identity] Verify -> DEBU 1c5e Verify: sig = 00000000 30 44 02 20 38 b9 83 a4 81 79 67 4f a8 49 fb df |0D. 8....ygO.I..| +orderer0.example.com | 00000010 d8 ac 5f 86 10 70 8f f4 66 4c 48 57 b4 ec df c6 |.._..p..fLHW....| +orderer0.example.com | 00000020 da db 8c bd 02 20 10 37 1f 47 29 23 58 1a b8 fd |..... .7.G)#X...| +orderer0.example.com | 00000030 0b 62 e9 3b ae bc 95 22 ca 9d 71 70 c9 db 6d c1 |.b.;..."..qp..m.| +orderer0.example.com | 00000040 b4 ed 24 16 50 06 |..$.P.|" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [cauthdsl] func2 -> DEBU 1c5f 0xc000cea7a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [cauthdsl] func1 -> DEBU 1c60 0xc000cea7a0 gate 1555913887561505200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c61 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c63 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c65 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.564 UTC [common.deliver] deliverBlocks -> DEBU 1c67 [channel: businesschannel] Received seekInfo (0xc000dd7f00) start: > stop: > from 192.168.224.9:34778" +orderer0.example.com | "2019-04-22 06:18:07.564 UTC [fsblkstorage] Next -> DEBU 1c68 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:07.564 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c69 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71372]" +orderer0.example.com | "2019-04-22 06:18:07.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6a Remaining bytes=[62295], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:07.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6b Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +orderer0.example.com | "2019-04-22 06:18:07.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6c blockbytes [4708] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:07.566 UTC [common.deliver] deliverBlocks -> DEBU 1c6d [channel: businesschannel] Delivering block [3] for (0xc000dd7f00) for 192.168.224.9:34778" +orderer0.example.com | "2019-04-22 06:18:07.566 UTC [common.deliver] deliverBlocks -> DEBU 1c6e [channel: businesschannel] Done delivering to 192.168.224.9:34778 for (0xc000dd7f00)" +orderer0.example.com | "2019-04-22 06:18:07.567 UTC [common.deliver] Handle -> DEBU 1c6f Waiting for new SeekInfo from 192.168.224.9:34778" +orderer0.example.com | "2019-04-22 06:18:07.567 UTC [common.deliver] Handle -> DEBU 1c70 Attempting to read seek info message from 192.168.224.9:34778" +orderer0.example.com | "2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c71 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c72 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c73 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c74 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +peer0.org1.example.com | "2019-04-22 06:17:00.445 UTC [cauthdsl] func2 -> DEBU 1509 0xc003bf0430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.446 UTC [cauthdsl] func2 -> DEBU 150a 0xc003bf0430 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.446 UTC [cauthdsl] func2 -> DEBU 150b 0xc003bf0430 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.446 UTC [msp.identity] Verify -> DEBU 150c Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +peer0.org1.example.com | 00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +peer0.org1.example.com | "2019-04-22 06:17:00.446 UTC [msp.identity] Verify -> DEBU 150d Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +peer0.org1.example.com | 00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +peer0.org1.example.com | 00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +peer0.org1.example.com | 00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +peer0.org1.example.com | 00000040 90 96 41 3c ce b6 f2 |..A<...|" +peer0.org1.example.com | "2019-04-22 06:17:00.447 UTC [cauthdsl] func2 -> DEBU 150e 0xc003bf0430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.447 UTC [cauthdsl] func1 -> DEBU 150f 0xc003bf0430 gate 1555913820445569200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.447 UTC [policies] Evaluate -> DEBU 1510 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.447 UTC [policies] Evaluate -> DEBU 1511 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.447 UTC [policies] Evaluate -> DEBU 1512 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.448 UTC [policies] Evaluate -> DEBU 1513 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.448 UTC [msp] DeserializeIdentity -> DEBU 1514 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.448 UTC [msp] DeserializeIdentity -> DEBU 1515 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.449 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1516 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1517 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1518 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.449 UTC [policies] Evaluate -> DEBU 1519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.449 UTC [policies] Evaluate -> DEBU 151a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.449 UTC [policies] Evaluate -> DEBU 151b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.450 UTC [cauthdsl] func1 -> DEBU 151c 0xc003bf1c00 gate 1555913820450214700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.450 UTC [cauthdsl] func2 -> DEBU 151d 0xc003bf1c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.450 UTC [cauthdsl] func2 -> DEBU 151e 0xc003bf1c00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.450 UTC [cauthdsl] func2 -> DEBU 151f 0xc003bf1c00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.451 UTC [msp.identity] Verify -> DEBU 1520 Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +peer0.org1.example.com | 00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +peer0.org1.example.com | "2019-04-22 06:17:00.451 UTC [msp.identity] Verify -> DEBU 1521 Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +peer0.org1.example.com | 00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +peer0.org1.example.com | 00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +peer0.org1.example.com | 00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +peer0.org1.example.com | 00000040 dc 88 1b 8e 89 e0 |......|" +peer0.org1.example.com | "2019-04-22 06:17:00.452 UTC [cauthdsl] func2 -> DEBU 1522 0xc003bf1c00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.452 UTC [cauthdsl] func1 -> DEBU 1523 0xc003bf1c00 gate 1555913820450214700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1524 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1525 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1526 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1527 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.453 UTC [msp] DeserializeIdentity -> DEBU 1528 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1529 Got policy manager for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-04-22 06:18:07.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c75 Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +orderer0.example.com | "2019-04-22 06:18:07.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c76 Sending msg of 28 bytes to 3 on channel businesschannel took 48.8µs" +orderer0.example.com | "2019-04-22 06:18:07.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.3µs " +orderer0.example.com | "2019-04-22 06:18:07.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.4µs " +orderer0.example.com | "2019-04-22 06:18:07.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c79 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:07.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:07.579 UTC [common.deliver] Handle -> WARN 1c7b Error reading from 192.168.224.9:34778: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:07.579 UTC [orderer.common.server] func1 -> DEBU 1c7c Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:07.579 UTC [comm.grpc.server] 1 -> INFO 1c7d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34778 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.501ms +orderer0.example.com | "2019-04-22 06:18:07.579 UTC [grpc] infof -> DEBU 1c7e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:07.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:07.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c80 Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" +orderer0.example.com | "2019-04-22 06:18:07.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 526.5µs " +orderer0.example.com | "2019-04-22 06:18:07.799 UTC [orderer.common.server] Deliver -> DEBU 1c82 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:07.799 UTC [common.deliver] Handle -> DEBU 1c83 Starting new deliver loop for 192.168.224.9:34780" +orderer0.example.com | "2019-04-22 06:18:07.799 UTC [common.deliver] Handle -> DEBU 1c84 Attempting to read seek info message from 192.168.224.9:34780" +orderer0.example.com | "2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.801 UTC [policies] Evaluate -> DEBU 1c89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.801 UTC [cauthdsl] func1 -> DEBU 1c8a 0xc000529570 gate 1555913887801390700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.801 UTC [cauthdsl] func2 -> DEBU 1c8b 0xc000529570 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.801 UTC [cauthdsl] func2 -> DEBU 1c8c 0xc000529570 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.802 UTC [cauthdsl] func2 -> DEBU 1c8d 0xc000529570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.802 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc000529570 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.802 UTC [cauthdsl] func1 -> DEBU 1c8f 0xc000529570 gate 1555913887801390700 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.802 UTC [policies] Evaluate -> DEBU 1c90 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.804 UTC [policies] Evaluate -> DEBU 1c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.804 UTC [policies] Evaluate -> DEBU 1c92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.804 UTC [cauthdsl] func1 -> DEBU 1c93 0xc000529db0 gate 1555913887804370900 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.804 UTC [cauthdsl] func2 -> DEBU 1c94 0xc000529db0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.804 UTC [cauthdsl] func2 -> DEBU 1c95 0xc000529db0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.805 UTC [cauthdsl] func2 -> DEBU 1c96 0xc000529db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.805 UTC [cauthdsl] func2 -> DEBU 1c97 0xc000529db0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.805 UTC [cauthdsl] func1 -> DEBU 1c98 0xc000529db0 gate 1555913887804370900 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.805 UTC [policies] Evaluate -> DEBU 1c99 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.805 UTC [policies] Evaluate -> DEBU 1c9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.805 UTC [policies] Evaluate -> DEBU 1c9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.805 UTC [cauthdsl] func1 -> DEBU 1c9c 0xc000ba45f0 gate 1555913887805862100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1c9d 0xc000ba45f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1c9e 0xc000ba45f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1c9f 0xc000ba45f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1ca0 0xc000ba45f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1ca1 0xc000ba45f0 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.807 UTC [cauthdsl] func2 -> DEBU 1ca2 0xc000ba45f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.807 UTC [cauthdsl] func2 -> DEBU 1ca3 0xc000ba45f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.807 UTC [cauthdsl] func2 -> DEBU 1ca4 0xc000ba45f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca5 0xc000ba45f0 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca6 0xc000ba45f0 processing identity 0 with bytes of ebaeb0" +peer0.org1.example.com | "2019-04-22 06:17:00.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 152a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.454 UTC [policies] Evaluate -> DEBU 152b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.454 UTC [policies] Evaluate -> DEBU 152c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.454 UTC [policies] Evaluate -> DEBU 152d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.455 UTC [cauthdsl] func1 -> DEBU 152e 0xc003c08ce0 gate 1555913820455061500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.455 UTC [cauthdsl] func2 -> DEBU 152f 0xc003c08ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.455 UTC [cauthdsl] func2 -> DEBU 1530 0xc003c08ce0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.455 UTC [cauthdsl] func2 -> DEBU 1531 0xc003c08ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.455 UTC [msp.identity] Verify -> DEBU 1532 Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +peer0.org1.example.com | 00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +peer0.org1.example.com | "2019-04-22 06:17:00.455 UTC [msp.identity] Verify -> DEBU 1533 Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +peer0.org1.example.com | 00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +peer0.org1.example.com | 00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +peer0.org1.example.com | 00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +peer0.org1.example.com | 00000040 dc 88 1b 8e 89 e0 |......|" +peer0.org1.example.com | "2019-04-22 06:17:00.456 UTC [cauthdsl] func2 -> DEBU 1534 0xc003c08ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.456 UTC [cauthdsl] func1 -> DEBU 1535 0xc003c08ce0 gate 1555913820455061500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1536 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1537 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1538 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1539 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.457 UTC [gossip.gossip] handleMessage -> DEBU 153a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.457 UTC [gossip.gossip] handleMessage -> DEBU 153b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.458 UTC [msp.identity] Verify -> DEBU 153c Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +peer0.org1.example.com | 00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +peer0.org1.example.com | "2019-04-22 06:17:00.458 UTC [msp.identity] Verify -> DEBU 153d Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +peer0.org1.example.com | 00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +peer0.org1.example.com | 00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +peer0.org1.example.com | 00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +peer0.org1.example.com | 00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +peer0.org1.example.com | "2019-04-22 06:17:00.458 UTC [msp] DeserializeIdentity -> DEBU 153e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.459 UTC [msp] DeserializeIdentity -> DEBU 153f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.459 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1540 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1541 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1542 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.460 UTC [policies] Evaluate -> DEBU 1543 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.460 UTC [policies] Evaluate -> DEBU 1544 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.460 UTC [policies] Evaluate -> DEBU 1545 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.460 UTC [cauthdsl] func1 -> DEBU 1546 0xc003c14e10 gate 1555913820460743700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.460 UTC [cauthdsl] func2 -> DEBU 1547 0xc003c14e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.460 UTC [msp] DeserializeIdentity -> DEBU 1549 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.461 UTC [cauthdsl] func2 -> DEBU 1548 0xc003c14e10 processing identity 0 with bytes of 10c48e0" +orderer0.example.com | "2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca7 0xc000ba45f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca8 0xc000ba45f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.809 UTC [cauthdsl] func1 -> DEBU 1ca9 0xc000ba45f0 gate 1555913887805862100 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:07.809 UTC [policies] Evaluate -> DEBU 1caa Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.809 UTC [policies] Evaluate -> DEBU 1cab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:07.809 UTC [policies] func1 -> DEBU 1cac Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cad Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1caf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cb0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cb1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:07.810 UTC [cauthdsl] func1 -> DEBU 1cb2 0xc000ba59e0 gate 1555913887810872400 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:07.811 UTC [cauthdsl] func2 -> DEBU 1cb3 0xc000ba59e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:07.811 UTC [cauthdsl] func2 -> DEBU 1cb4 0xc000ba59e0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:07.811 UTC [cauthdsl] func2 -> DEBU 1cb5 0xc000ba59e0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:07.812 UTC [msp.identity] Verify -> DEBU 1cb6 Verify: digest = 00000000 af 20 1a c7 15 c1 8c 65 38 80 f1 53 45 ab a5 54 |. .....e8..SE..T| +orderer0.example.com | 00000010 c1 52 a0 2f 21 49 fa fd 4b f0 af 77 03 22 18 39 |.R./!I..K..w.".9|" +orderer0.example.com | "2019-04-22 06:18:07.812 UTC [msp.identity] Verify -> DEBU 1cb7 Verify: sig = 00000000 30 44 02 20 4d ca 68 d3 9e 5a 21 2d cf 4d c1 47 |0D. M.h..Z!-.M.G| +orderer0.example.com | 00000010 61 b8 ea f6 6e 9f d8 85 c3 5f 96 22 f1 6f 41 7c |a...n...._.".oA|| +orderer0.example.com | 00000020 5f 01 9a 21 02 20 12 c5 0c b9 19 6b 6e aa 39 b7 |_..!. .....kn.9.| +orderer0.example.com | 00000030 96 d5 e5 46 f5 17 b4 27 91 fd a0 e4 f3 13 13 14 |...F...'........| +orderer0.example.com | 00000040 7f 46 36 1f 2b 2a |.F6.+*|" +orderer0.example.com | "2019-04-22 06:18:07.813 UTC [cauthdsl] func2 -> DEBU 1cb8 0xc000ba59e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:07.813 UTC [cauthdsl] func1 -> DEBU 1cb9 0xc000ba59e0 gate 1555913887810872400 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cba Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cbb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cbc Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cbd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:07.814 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.814 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:07.815 UTC [common.deliver] deliverBlocks -> DEBU 1cc0 [channel: businesschannel] Received seekInfo (0xc0011d87c0) start: > stop: > from 192.168.224.9:34780" +orderer0.example.com | "2019-04-22 06:18:07.815 UTC [fsblkstorage] Next -> DEBU 1cc1 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:07.815 UTC [fsblkstorage] newBlockfileStream -> DEBU 1cc2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" +orderer0.example.com | "2019-04-22 06:18:07.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc3 Remaining bytes=[57585], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:07.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc4 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +orderer0.example.com | "2019-04-22 06:18:07.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc5 blockbytes [4707] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:07.816 UTC [common.deliver] deliverBlocks -> DEBU 1cc6 [channel: businesschannel] Delivering block [4] for (0xc0011d87c0) for 192.168.224.9:34780" +orderer0.example.com | "2019-04-22 06:18:07.816 UTC [common.deliver] deliverBlocks -> DEBU 1cc7 [channel: businesschannel] Done delivering to 192.168.224.9:34780 for (0xc0011d87c0)" +orderer0.example.com | "2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1cc8 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1cc9 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1cca Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1ccb Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:07.817 UTC [common.deliver] Handle -> DEBU 1ccc Waiting for new SeekInfo from 192.168.224.9:34780" +orderer0.example.com | "2019-04-22 06:18:07.818 UTC [common.deliver] Handle -> DEBU 1ccd Attempting to read seek info message from 192.168.224.9:34780" +orderer0.example.com | "2019-04-22 06:18:07.824 UTC [grpc] infof -> DEBU 1cce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:07.824 UTC [common.deliver] Handle -> WARN 1ccf Error reading from 192.168.224.9:34780: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:07.824 UTC [orderer.common.server] func1 -> DEBU 1cd0 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:07.825 UTC [comm.grpc.server] 1 -> INFO 1cd1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34780 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.7018ms +orderer0.example.com | "2019-04-22 06:18:08.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +orderer0.example.com | "2019-04-22 06:18:08.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 3 on channel businesschannel took 146.4µs" +orderer0.example.com | "2019-04-22 06:18:08.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " +orderer0.example.com | "2019-04-22 06:18:08.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.7µs " +peer0.org1.example.com | "2019-04-22 06:17:00.462 UTC [cauthdsl] func2 -> DEBU 154a 0xc003c14e10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.462 UTC [msp.identity] Verify -> DEBU 154b Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +peer0.org1.example.com | 00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +peer0.org1.example.com | "2019-04-22 06:17:00.462 UTC [msp.identity] Verify -> DEBU 154c Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +peer0.org1.example.com | 00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +peer0.org1.example.com | 00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +peer0.org1.example.com | 00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +peer0.org1.example.com | 00000040 aa 36 98 36 42 e6 |.6.6B.|" +peer0.org1.example.com | "2019-04-22 06:17:00.463 UTC [cauthdsl] func2 -> DEBU 154d 0xc003c14e10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.463 UTC [cauthdsl] func1 -> DEBU 154e 0xc003c14e10 gate 1555913820460743700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.463 UTC [policies] Evaluate -> DEBU 154f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.463 UTC [policies] Evaluate -> DEBU 1550 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.464 UTC [policies] Evaluate -> DEBU 1551 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.464 UTC [policies] Evaluate -> DEBU 1552 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.465 UTC [msp] DeserializeIdentity -> DEBU 1553 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.465 UTC [msp] DeserializeIdentity -> DEBU 1554 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.466 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1555 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1556 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1557 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.467 UTC [policies] Evaluate -> DEBU 1558 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.467 UTC [policies] Evaluate -> DEBU 1559 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.467 UTC [policies] Evaluate -> DEBU 155a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.468 UTC [cauthdsl] func1 -> DEBU 155b 0xc003c2e5e0 gate 1555913820468081600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.468 UTC [cauthdsl] func2 -> DEBU 155c 0xc003c2e5e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.468 UTC [cauthdsl] func2 -> DEBU 155d 0xc003c2e5e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.468 UTC [cauthdsl] func2 -> DEBU 155e 0xc003c2e5e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.468 UTC [msp.identity] Verify -> DEBU 155f Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +peer0.org1.example.com | 00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +peer0.org1.example.com | "2019-04-22 06:17:00.469 UTC [msp.identity] Verify -> DEBU 1560 Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +peer0.org1.example.com | 00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +peer0.org1.example.com | 00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +peer0.org1.example.com | 00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +peer0.org1.example.com | 00000040 90 96 41 3c ce b6 f2 |..A<...|" +peer0.org1.example.com | "2019-04-22 06:17:00.469 UTC [cauthdsl] func2 -> DEBU 1561 0xc003c2e5e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.469 UTC [cauthdsl] func1 -> DEBU 1562 0xc003c2e5e0 gate 1555913820468081600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.469 UTC [policies] Evaluate -> DEBU 1563 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.470 UTC [policies] Evaluate -> DEBU 1564 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.470 UTC [policies] Evaluate -> DEBU 1565 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.470 UTC [policies] Evaluate -> DEBU 1566 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.471 UTC [msp.identity] Verify -> DEBU 1567 Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +peer0.org1.example.com | 00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +peer0.org1.example.com | "2019-04-22 06:17:00.471 UTC [msp.identity] Verify -> DEBU 1568 Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +peer0.org1.example.com | 00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +orderer0.example.com | "2019-04-22 06:18:08.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:08.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:08.076 UTC [orderer.common.server] Deliver -> DEBU 1cd8 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:08.076 UTC [common.deliver] Handle -> DEBU 1cd9 Starting new deliver loop for 192.168.224.9:34782" +orderer0.example.com | "2019-04-22 06:18:08.076 UTC [common.deliver] Handle -> DEBU 1cda Attempting to read seek info message from 192.168.224.9:34782" +orderer0.example.com | "2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cdb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cdc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cdd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.079 UTC [policies] Evaluate -> DEBU 1cdf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.079 UTC [cauthdsl] func1 -> DEBU 1ce0 0xc000b9c680 gate 1555913888079209100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.079 UTC [cauthdsl] func2 -> DEBU 1ce1 0xc000b9c680 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.080 UTC [cauthdsl] func2 -> DEBU 1ce2 0xc000b9c680 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.080 UTC [cauthdsl] func2 -> DEBU 1ce3 0xc000b9c680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.080 UTC [cauthdsl] func2 -> DEBU 1ce4 0xc000b9c680 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.081 UTC [cauthdsl] func1 -> DEBU 1ce5 0xc000b9c680 gate 1555913888079209100 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.081 UTC [policies] Evaluate -> DEBU 1ce6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.081 UTC [policies] Evaluate -> DEBU 1ce7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.082 UTC [policies] Evaluate -> DEBU 1ce8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.082 UTC [cauthdsl] func1 -> DEBU 1ce9 0xc000b9cec0 gate 1555913888082494100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.083 UTC [cauthdsl] func2 -> DEBU 1cea 0xc000b9cec0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.083 UTC [cauthdsl] func2 -> DEBU 1ceb 0xc000b9cec0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.083 UTC [cauthdsl] func2 -> DEBU 1cec 0xc000b9cec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.084 UTC [cauthdsl] func2 -> DEBU 1ced 0xc000b9cec0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.084 UTC [cauthdsl] func1 -> DEBU 1cee 0xc000b9cec0 gate 1555913888082494100 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.084 UTC [policies] Evaluate -> DEBU 1cef Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.085 UTC [policies] Evaluate -> DEBU 1cf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.085 UTC [policies] Evaluate -> DEBU 1cf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.085 UTC [cauthdsl] func1 -> DEBU 1cf2 0xc000b9d700 gate 1555913888085682200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.086 UTC [cauthdsl] func2 -> DEBU 1cf3 0xc000b9d700 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.086 UTC [cauthdsl] func2 -> DEBU 1cf4 0xc000b9d700 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf5 0xc000b9d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf6 0xc000b9d700 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf7 0xc000b9d700 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf8 0xc000b9d700 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.088 UTC [cauthdsl] func2 -> DEBU 1cf9 0xc000b9d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.088 UTC [cauthdsl] func2 -> DEBU 1cfa 0xc000b9d700 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.088 UTC [cauthdsl] func2 -> DEBU 1cfb 0xc000b9d700 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.089 UTC [cauthdsl] func2 -> DEBU 1cfc 0xc000b9d700 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.089 UTC [cauthdsl] func2 -> DEBU 1cfd 0xc000b9d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.089 UTC [cauthdsl] func2 -> DEBU 1cfe 0xc000b9d700 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.090 UTC [cauthdsl] func1 -> DEBU 1cff 0xc000b9d700 gate 1555913888085682200 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.090 UTC [policies] Evaluate -> DEBU 1d00 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.090 UTC [policies] Evaluate -> DEBU 1d01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.091 UTC [policies] func1 -> DEBU 1d02 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:08.091 UTC [policies] Evaluate -> DEBU 1d03 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.091 UTC [policies] Evaluate -> DEBU 1d04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d05 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d06 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d07 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [cauthdsl] func1 -> DEBU 1d08 0xc000e3caf0 gate 1555913888092122600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d09 0xc000e3caf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d0a 0xc000e3caf0 processing identity 0 with bytes of ebaeb0" +peer0.org1.example.com | 00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +peer0.org1.example.com | 00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +peer0.org1.example.com | 00000040 4d 34 56 e4 dd 25 |M4V..%|" +peer0.org1.example.com | "2019-04-22 06:17:00.472 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1569 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.472 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 156a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.472 UTC [policies] Evaluate -> DEBU 156b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.472 UTC [policies] Evaluate -> DEBU 156c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.473 UTC [policies] Evaluate -> DEBU 156d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.473 UTC [cauthdsl] func1 -> DEBU 156e 0xc003c2fce0 gate 1555913820473258100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.473 UTC [cauthdsl] func2 -> DEBU 156f 0xc003c2fce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.473 UTC [cauthdsl] func2 -> DEBU 1570 0xc003c2fce0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.473 UTC [cauthdsl] func2 -> DEBU 1571 0xc003c2fce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:00.474 UTC [cauthdsl] func2 -> DEBU 1572 0xc003c2fce0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:00.474 UTC [cauthdsl] func1 -> DEBU 1573 0xc003c2fce0 gate 1555913820473258100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:00.474 UTC [policies] Evaluate -> DEBU 1574 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.475 UTC [policies] Evaluate -> DEBU 1575 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.475 UTC [policies] Evaluate -> DEBU 1576 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.475 UTC [cauthdsl] func1 -> DEBU 1577 0xc003c44520 gate 1555913820475398200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.475 UTC [cauthdsl] func2 -> DEBU 1578 0xc003c44520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.476 UTC [cauthdsl] func2 -> DEBU 1579 0xc003c44520 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.476 UTC [cauthdsl] func2 -> DEBU 157a 0xc003c44520 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.476 UTC [msp.identity] Verify -> DEBU 157b Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +peer0.org1.example.com | 00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +peer0.org1.example.com | "2019-04-22 06:17:00.477 UTC [msp] DeserializeIdentity -> DEBU 157c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.477 UTC [gossip.pull] Hello -> DEBU 157d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:00.477 UTC [msp.identity] Verify -> DEBU 157e Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +peer0.org1.example.com | 00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +peer0.org1.example.com | 00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +peer0.org1.example.com | 00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +peer0.org1.example.com | 00000040 4d 34 56 e4 dd 25 |M4V..%|" +peer0.org1.example.com | "2019-04-22 06:17:00.478 UTC [cauthdsl] func2 -> DEBU 157f 0xc003c44520 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.478 UTC [cauthdsl] func1 -> DEBU 1581 0xc003c44520 gate 1555913820475398200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1582 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1583 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1584 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1585 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.478 UTC [msp] DeserializeIdentity -> DEBU 1580 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.480 UTC [gossip.gossip] handleMessage -> DEBU 1586 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.480 UTC [gossip.gossip] handleMessage -> DEBU 1587 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.480 UTC [msp] DeserializeIdentity -> DEBU 1589 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.480 UTC [msp] DeserializeIdentity -> DEBU 1588 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.481 UTC [gossip.comm] Send -> DEBU 158a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.481 UTC [msp.identity] Verify -> DEBU 158b Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +peer0.org1.example.com | 00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +peer0.org1.example.com | "2019-04-22 06:17:00.481 UTC [msp.identity] Verify -> DEBU 158d Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +peer0.org1.example.com | 00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +peer0.org1.example.com | 00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +peer0.org1.example.com | 00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +peer0.org1.example.com | 00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +peer0.org1.example.com | "2019-04-22 06:17:00.481 UTC [gossip.comm] sendToEndpoint -> DEBU 158c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.482 UTC [gossip.comm] sendToEndpoint -> DEBU 158e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.482 UTC [msp.identity] Verify -> DEBU 158f Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +peer0.org1.example.com | 00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +peer0.org1.example.com | "2019-04-22 06:17:00.484 UTC [msp.identity] Verify -> DEBU 1590 Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +peer0.org1.example.com | 00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +peer0.org1.example.com | 00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +peer0.org1.example.com | 00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +peer0.org1.example.com | 00000040 aa dd 99 2d 62 37 1c |...-b7.|" +peer0.org1.example.com | "2019-04-22 06:17:00.484 UTC [gossip.comm] func1 -> DEBU 1591 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17542010109647925644 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.485 UTC [msp] DeserializeIdentity -> DEBU 1592 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d0b 0xc000e3caf0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [msp.identity] Verify -> DEBU 1d0c Verify: digest = 00000000 10 af d8 fd 52 c2 06 67 fa ef bf 64 be 8d de b9 |....R..g...d....| +orderer0.example.com | 00000010 11 ec 73 6c 43 31 3f 31 2a 19 52 38 c5 dd ad cd |..slC1?1*.R8....|" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [msp.identity] Verify -> DEBU 1d0d Verify: sig = 00000000 30 45 02 21 00 f2 5d 01 44 5f a6 20 8f 58 e8 9b |0E.!..].D_. .X..| +orderer0.example.com | 00000010 45 f4 a4 0a 1b 3d 68 81 4c 61 fa bd 8f a3 7d e5 |E....=h.La....}.| +orderer0.example.com | 00000020 b6 60 6c e0 de 02 20 65 8a 25 e6 e9 27 7a 83 d1 |.`l... e.%..'z..| +orderer0.example.com | 00000030 71 01 c5 4f 73 ef 13 39 e4 aa 45 4c 0c 3c bb e4 |q..Os..9..EL.<..| +orderer0.example.com | 00000040 52 04 67 a0 b1 1c 3b |R.g...;|" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d0e 0xc000e3caf0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [cauthdsl] func1 -> DEBU 1d0f 0xc000e3caf0 gate 1555913888092122600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d10 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d11 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d12 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d14 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.092 UTC [common.deliver] deliverBlocks -> DEBU 1d16 [channel: businesschannel] Received seekInfo (0xc0009bbf40) start: > stop: > from 192.168.224.9:34782" +orderer0.example.com | "2019-04-22 06:18:08.094 UTC [fsblkstorage] Next -> DEBU 1d17 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:08.094 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d18 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80791]" +orderer0.example.com | "2019-04-22 06:18:08.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d19 Remaining bytes=[52876], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:08.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d1a Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +orderer0.example.com | "2019-04-22 06:18:08.096 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d1b blockbytes [5712] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:08.096 UTC [common.deliver] deliverBlocks -> DEBU 1d1c [channel: businesschannel] Delivering block [5] for (0xc0009bbf40) for 192.168.224.9:34782" +orderer0.example.com | "2019-04-22 06:18:08.097 UTC [common.deliver] deliverBlocks -> DEBU 1d1d [channel: businesschannel] Done delivering to 192.168.224.9:34782 for (0xc0009bbf40)" +orderer0.example.com | "2019-04-22 06:18:08.098 UTC [fsblkstorage] waitForBlock -> DEBU 1d1e Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.099 UTC [fsblkstorage] waitForBlock -> DEBU 1d1f Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.099 UTC [fsblkstorage] waitForBlock -> DEBU 1d20 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.099 UTC [fsblkstorage] waitForBlock -> DEBU 1d21 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.100 UTC [common.deliver] Handle -> DEBU 1d22 Waiting for new SeekInfo from 192.168.224.9:34782" +orderer0.example.com | "2019-04-22 06:18:08.101 UTC [common.deliver] Handle -> DEBU 1d23 Attempting to read seek info message from 192.168.224.9:34782" +orderer0.example.com | "2019-04-22 06:18:08.112 UTC [common.deliver] Handle -> WARN 1d24 Error reading from 192.168.224.9:34782: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:08.112 UTC [orderer.common.server] func1 -> DEBU 1d25 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:08.113 UTC [comm.grpc.server] 1 -> INFO 1d26 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34782 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.5344ms +orderer0.example.com | "2019-04-22 06:18:08.114 UTC [grpc] infof -> DEBU 1d27 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:08.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d28 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:08.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d29 Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +orderer0.example.com | "2019-04-22 06:18:08.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.4µs " +orderer0.example.com | "2019-04-22 06:18:08.312 UTC [orderer.common.server] Deliver -> DEBU 1d2b Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:08.312 UTC [common.deliver] Handle -> DEBU 1d2c Starting new deliver loop for 192.168.224.9:34784" +orderer0.example.com | "2019-04-22 06:18:08.313 UTC [common.deliver] Handle -> DEBU 1d2d Attempting to read seek info message from 192.168.224.9:34784" +orderer0.example.com | "2019-04-22 06:18:08.314 UTC [policies] Evaluate -> DEBU 1d2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.314 UTC [policies] Evaluate -> DEBU 1d2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.314 UTC [policies] Evaluate -> DEBU 1d30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.315 UTC [policies] Evaluate -> DEBU 1d31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.315 UTC [policies] Evaluate -> DEBU 1d32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.316 UTC [cauthdsl] func1 -> DEBU 1d33 0xc000c92a70 gate 1555913888316124500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.316 UTC [cauthdsl] func2 -> DEBU 1d34 0xc000c92a70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.316 UTC [cauthdsl] func2 -> DEBU 1d35 0xc000c92a70 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.317 UTC [cauthdsl] func2 -> DEBU 1d36 0xc000c92a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.317 UTC [cauthdsl] func2 -> DEBU 1d37 0xc000c92a70 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.318 UTC [cauthdsl] func1 -> DEBU 1d38 0xc000c92a70 gate 1555913888316124500 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.318 UTC [policies] Evaluate -> DEBU 1d39 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.318 UTC [policies] Evaluate -> DEBU 1d3a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.485 UTC [msp] DeserializeIdentity -> DEBU 1593 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.486 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1594 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.486 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1595 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.486 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1596 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.486 UTC [policies] Evaluate -> DEBU 1597 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.486 UTC [policies] Evaluate -> DEBU 1598 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.487 UTC [policies] Evaluate -> DEBU 1599 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.487 UTC [cauthdsl] func1 -> DEBU 159a 0xc003c5f570 gate 1555913820487137400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.487 UTC [cauthdsl] func2 -> DEBU 159b 0xc003c5f570 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.487 UTC [cauthdsl] func2 -> DEBU 159c 0xc003c5f570 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.488 UTC [cauthdsl] func2 -> DEBU 159d 0xc003c5f570 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.488 UTC [msp.identity] Verify -> DEBU 159e Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +peer0.org1.example.com | 00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +peer0.org1.example.com | "2019-04-22 06:17:00.488 UTC [msp.identity] Verify -> DEBU 159f Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +peer0.org1.example.com | 00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +peer0.org1.example.com | 00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +peer0.org1.example.com | 00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +peer0.org1.example.com | 00000040 aa 36 98 36 42 e6 |.6.6B.|" +peer0.org1.example.com | "2019-04-22 06:17:00.489 UTC [cauthdsl] func2 -> DEBU 15a0 0xc003c5f570 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.489 UTC [cauthdsl] func1 -> DEBU 15a1 0xc003c5f570 gate 1555913820487137400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.490 UTC [msp] DeserializeIdentity -> DEBU 15a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.490 UTC [msp] DeserializeIdentity -> DEBU 15a7 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:08.319 UTC [policies] Evaluate -> DEBU 1d3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.319 UTC [cauthdsl] func1 -> DEBU 1d3c 0xc000c932b0 gate 1555913888319774600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.320 UTC [cauthdsl] func2 -> DEBU 1d3d 0xc000c932b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.320 UTC [cauthdsl] func2 -> DEBU 1d3e 0xc000c932b0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.320 UTC [cauthdsl] func2 -> DEBU 1d3f 0xc000c932b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.321 UTC [cauthdsl] func2 -> DEBU 1d40 0xc000c932b0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.321 UTC [cauthdsl] func1 -> DEBU 1d41 0xc000c932b0 gate 1555913888319774600 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.322 UTC [policies] Evaluate -> DEBU 1d42 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.322 UTC [policies] Evaluate -> DEBU 1d43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.322 UTC [policies] Evaluate -> DEBU 1d44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.323 UTC [cauthdsl] func1 -> DEBU 1d45 0xc000c93af0 gate 1555913888323106900 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.323 UTC [cauthdsl] func2 -> DEBU 1d46 0xc000c93af0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.323 UTC [cauthdsl] func2 -> DEBU 1d47 0xc000c93af0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d48 0xc000c93af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d49 0xc000c93af0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4a 0xc000c93af0 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4b 0xc000c93af0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4c 0xc000c93af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4d 0xc000c93af0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4e 0xc000c93af0 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4f 0xc000c93af0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d50 0xc000c93af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d51 0xc000c93af0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [cauthdsl] func1 -> DEBU 1d52 0xc000c93af0 gate 1555913888323106900 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [policies] Evaluate -> DEBU 1d53 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [policies] Evaluate -> DEBU 1d54 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.324 UTC [policies] func1 -> DEBU 1d55 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:08.325 UTC [policies] Evaluate -> DEBU 1d56 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.325 UTC [policies] Evaluate -> DEBU 1d57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.325 UTC [policies] Evaluate -> DEBU 1d58 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.326 UTC [policies] Evaluate -> DEBU 1d59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.326 UTC [policies] Evaluate -> DEBU 1d5a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.326 UTC [cauthdsl] func1 -> DEBU 1d5b 0xc000fdeee0 gate 1555913888326691300 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.327 UTC [cauthdsl] func2 -> DEBU 1d5c 0xc000fdeee0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.327 UTC [cauthdsl] func2 -> DEBU 1d5d 0xc000fdeee0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.327 UTC [cauthdsl] func2 -> DEBU 1d5e 0xc000fdeee0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:08.327 UTC [msp.identity] Verify -> DEBU 1d5f Verify: digest = 00000000 06 40 57 42 75 ed 70 67 3c f6 dd ab 80 2b 94 d2 |.@WBu.pg<....+..| +orderer0.example.com | 00000010 e9 61 c1 e4 f5 66 29 e6 a9 ec 64 12 1f b4 ae 6f |.a...f)...d....o|" +orderer0.example.com | "2019-04-22 06:18:08.327 UTC [msp.identity] Verify -> DEBU 1d60 Verify: sig = 00000000 30 44 02 20 15 6f 95 3c 74 b7 6c b5 ec 15 f0 31 |0D. .o. DEBU 1d61 0xc000fdeee0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:08.328 UTC [cauthdsl] func1 -> DEBU 1d62 0xc000fdeee0 gate 1555913888326691300 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:08.328 UTC [policies] Evaluate -> DEBU 1d63 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.328 UTC [policies] Evaluate -> DEBU 1d64 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.328 UTC [policies] Evaluate -> DEBU 1d65 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.329 UTC [policies] Evaluate -> DEBU 1d66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.332 UTC [policies] Evaluate -> DEBU 1d67 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.332 UTC [policies] Evaluate -> DEBU 1d68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.332 UTC [common.deliver] deliverBlocks -> DEBU 1d69 [channel: businesschannel] Received seekInfo (0xc0011d8f80) start: > stop: > from 192.168.224.9:34784" +orderer0.example.com | "2019-04-22 06:18:08.333 UTC [fsblkstorage] Next -> DEBU 1d6a Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:08.333 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d6b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86505]" +orderer0.example.com | "2019-04-22 06:18:08.334 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d6c Remaining bytes=[47162], Going to peek [8] bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.491 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.491 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15a9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.491 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15aa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.491 UTC [policies] Evaluate -> DEBU 15ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.491 UTC [policies] Evaluate -> DEBU 15ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.492 UTC [policies] Evaluate -> DEBU 15ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.492 UTC [cauthdsl] func1 -> DEBU 15ae 0xc003c72d40 gate 1555913820492280300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.492 UTC [cauthdsl] func2 -> DEBU 15af 0xc003c72d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.492 UTC [cauthdsl] func2 -> DEBU 15b0 0xc003c72d40 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.492 UTC [cauthdsl] func2 -> DEBU 15b1 0xc003c72d40 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.493 UTC [msp.identity] Verify -> DEBU 15b2 Verify: digest = 00000000 82 84 ad 98 1e dd 70 2a 51 ec fa 32 8e 3d 9d e6 |......p*Q..2.=..| +peer0.org1.example.com | 00000010 af d4 c7 75 57 6f ea 33 67 5b 5a 17 af 6c 1b 9a |...uWo.3g[Z..l..|" +peer0.org1.example.com | "2019-04-22 06:17:00.493 UTC [msp.identity] Verify -> DEBU 15b3 Verify: sig = 00000000 30 44 02 20 51 c4 48 61 aa 06 39 f1 4b c3 41 fa |0D. Q.Ha..9.K.A.| +peer0.org1.example.com | 00000010 53 bc ae b0 70 b8 99 88 46 ce fb 7a c2 54 95 c1 |S...p...F..z.T..| +peer0.org1.example.com | 00000020 07 76 3e 9f 02 20 65 ea 05 41 fc 1b 38 e3 4a e4 |.v>.. e..A..8.J.| +peer0.org1.example.com | 00000030 cf d5 63 01 ec fe b9 8e 43 fc 3d 4a 50 01 b1 3e |..c.....C.=JP..>| +peer0.org1.example.com | 00000040 b3 8c 91 40 a7 e5 |...@..|" +peer0.org1.example.com | "2019-04-22 06:17:00.493 UTC [cauthdsl] func2 -> DEBU 15b4 0xc003c72d40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.494 UTC [cauthdsl] func1 -> DEBU 15b5 0xc003c72d40 gate 1555913820492280300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.494 UTC [policies] Evaluate -> DEBU 15b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.494 UTC [policies] Evaluate -> DEBU 15b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.494 UTC [policies] Evaluate -> DEBU 15b8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.495 UTC [policies] Evaluate -> DEBU 15b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.496 UTC [msp] DeserializeIdentity -> DEBU 15ba Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.497 UTC [policies] Evaluate -> DEBU 15bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.497 UTC [policies] Evaluate -> DEBU 15be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.497 UTC [policies] Evaluate -> DEBU 15bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.497 UTC [cauthdsl] func1 -> DEBU 15c0 0xc003c73e20 gate 1555913820497798600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.498 UTC [cauthdsl] func2 -> DEBU 15c1 0xc003c73e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.498 UTC [cauthdsl] func2 -> DEBU 15c2 0xc003c73e20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.498 UTC [cauthdsl] func2 -> DEBU 15c3 0xc003c73e20 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.498 UTC [msp.identity] Verify -> DEBU 15c4 Verify: digest = 00000000 82 84 ad 98 1e dd 70 2a 51 ec fa 32 8e 3d 9d e6 |......p*Q..2.=..| +peer0.org1.example.com | 00000010 af d4 c7 75 57 6f ea 33 67 5b 5a 17 af 6c 1b 9a |...uWo.3g[Z..l..|" +peer0.org1.example.com | "2019-04-22 06:17:00.499 UTC [msp.identity] Verify -> DEBU 15c5 Verify: sig = 00000000 30 44 02 20 51 c4 48 61 aa 06 39 f1 4b c3 41 fa |0D. Q.Ha..9.K.A.| +peer0.org1.example.com | 00000010 53 bc ae b0 70 b8 99 88 46 ce fb 7a c2 54 95 c1 |S...p...F..z.T..| +peer0.org1.example.com | 00000020 07 76 3e 9f 02 20 65 ea 05 41 fc 1b 38 e3 4a e4 |.v>.. e..A..8.J.| +peer0.org1.example.com | 00000030 cf d5 63 01 ec fe b9 8e 43 fc 3d 4a 50 01 b1 3e |..c.....C.=JP..>| +peer0.org1.example.com | 00000040 b3 8c 91 40 a7 e5 |...@..|" +peer0.org1.example.com | "2019-04-22 06:17:00.499 UTC [cauthdsl] func2 -> DEBU 15c6 0xc003c73e20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.499 UTC [cauthdsl] func1 -> DEBU 15c7 0xc003c73e20 gate 1555913820497798600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.499 UTC [policies] Evaluate -> DEBU 15c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.499 UTC [policies] Evaluate -> DEBU 15c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.500 UTC [policies] Evaluate -> DEBU 15ca Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.500 UTC [policies] Evaluate -> DEBU 15cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.500 UTC [gossip.gossip] handleMessage -> DEBU 15cc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.501 UTC [gossip.gossip] handleMessage -> DEBU 15cd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17542010109647925644 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.501 UTC [gossip.pull] HandleMessage -> DEBU 15ce GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17542010109647925644 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.501 UTC [gossip.gossip] handleMessage -> DEBU 15cf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.682 UTC [gossip.comm] func1 -> DEBU 15d0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.683 UTC [gossip.gossip] handleMessage -> DEBU 15d1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.684 UTC [msp] DeserializeIdentity -> DEBU 15d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.684 UTC [msp] DeserializeIdentity -> DEBU 15d3 Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:08.334 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d6d Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +orderer0.example.com | "2019-04-22 06:18:08.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d6e blockbytes [4058] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:08.335 UTC [common.deliver] deliverBlocks -> DEBU 1d6f [channel: businesschannel] Delivering block [6] for (0xc0011d8f80) for 192.168.224.9:34784" +orderer0.example.com | "2019-04-22 06:18:08.336 UTC [common.deliver] deliverBlocks -> DEBU 1d70 [channel: businesschannel] Done delivering to 192.168.224.9:34784 for (0xc0011d8f80)" +orderer0.example.com | "2019-04-22 06:18:08.336 UTC [fsblkstorage] waitForBlock -> DEBU 1d71 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.336 UTC [fsblkstorage] waitForBlock -> DEBU 1d72 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.336 UTC [fsblkstorage] waitForBlock -> DEBU 1d73 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.337 UTC [fsblkstorage] waitForBlock -> DEBU 1d74 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.336 UTC [common.deliver] Handle -> DEBU 1d75 Waiting for new SeekInfo from 192.168.224.9:34784" +orderer0.example.com | "2019-04-22 06:18:08.337 UTC [common.deliver] Handle -> DEBU 1d76 Attempting to read seek info message from 192.168.224.9:34784" +orderer0.example.com | "2019-04-22 06:18:08.345 UTC [common.deliver] Handle -> WARN 1d77 Error reading from 192.168.224.9:34784: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:08.345 UTC [orderer.common.server] func1 -> DEBU 1d78 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:08.345 UTC [comm.grpc.server] 1 -> INFO 1d79 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34784 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5955ms +orderer0.example.com | "2019-04-22 06:18:08.346 UTC [grpc] infof -> DEBU 1d7a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:08.570 UTC [orderer.common.server] Deliver -> DEBU 1d7b Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:08.570 UTC [common.deliver] Handle -> DEBU 1d7c Starting new deliver loop for 192.168.224.9:34786" +orderer0.example.com | "2019-04-22 06:18:08.571 UTC [common.deliver] Handle -> DEBU 1d7d Attempting to read seek info message from 192.168.224.9:34786" +orderer0.example.com | "2019-04-22 06:18:08.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7e Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-04-22 06:18:08.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7f Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +orderer0.example.com | "2019-04-22 06:18:08.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.8µs " +orderer0.example.com | "2019-04-22 06:18:08.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.1µs " +orderer0.example.com | "2019-04-22 06:18:08.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:08.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d83 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:08.576 UTC [policies] Evaluate -> DEBU 1d84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.577 UTC [policies] Evaluate -> DEBU 1d85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.577 UTC [policies] Evaluate -> DEBU 1d86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.577 UTC [policies] Evaluate -> DEBU 1d87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.578 UTC [policies] Evaluate -> DEBU 1d88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.578 UTC [cauthdsl] func1 -> DEBU 1d89 0xc0015918f0 gate 1555913888578618100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.579 UTC [cauthdsl] func2 -> DEBU 1d8a 0xc0015918f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.579 UTC [cauthdsl] func2 -> DEBU 1d8b 0xc0015918f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.579 UTC [cauthdsl] func2 -> DEBU 1d8c 0xc0015918f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.580 UTC [cauthdsl] func2 -> DEBU 1d8d 0xc0015918f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.580 UTC [cauthdsl] func1 -> DEBU 1d8e 0xc0015918f0 gate 1555913888578618100 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.581 UTC [policies] Evaluate -> DEBU 1d8f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.581 UTC [policies] Evaluate -> DEBU 1d90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.581 UTC [policies] Evaluate -> DEBU 1d91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.582 UTC [cauthdsl] func1 -> DEBU 1d92 0xc000198130 gate 1555913888582057700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.582 UTC [cauthdsl] func2 -> DEBU 1d93 0xc000198130 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.582 UTC [cauthdsl] func2 -> DEBU 1d94 0xc000198130 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.583 UTC [cauthdsl] func2 -> DEBU 1d95 0xc000198130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.583 UTC [cauthdsl] func2 -> DEBU 1d96 0xc000198130 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.583 UTC [cauthdsl] func1 -> DEBU 1d97 0xc000198130 gate 1555913888582057700 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.584 UTC [policies] Evaluate -> DEBU 1d98 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.584 UTC [policies] Evaluate -> DEBU 1d99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.584 UTC [policies] Evaluate -> DEBU 1d9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.584 UTC [cauthdsl] func1 -> DEBU 1d9b 0xc000198970 gate 1555913888584887100 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.585 UTC [cauthdsl] func2 -> DEBU 1d9c 0xc000198970 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.585 UTC [cauthdsl] func2 -> DEBU 1d9d 0xc000198970 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.586 UTC [cauthdsl] func2 -> DEBU 1d9e 0xc000198970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.586 UTC [cauthdsl] func2 -> DEBU 1d9f 0xc000198970 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.587 UTC [cauthdsl] func2 -> DEBU 1da0 0xc000198970 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.588 UTC [cauthdsl] func2 -> DEBU 1da1 0xc000198970 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.589 UTC [cauthdsl] func2 -> DEBU 1da2 0xc000198970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.589 UTC [cauthdsl] func2 -> DEBU 1da3 0xc000198970 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.589 UTC [cauthdsl] func2 -> DEBU 1da4 0xc000198970 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.590 UTC [cauthdsl] func2 -> DEBU 1da5 0xc000198970 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.590 UTC [cauthdsl] func2 -> DEBU 1da6 0xc000198970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.591 UTC [cauthdsl] func2 -> DEBU 1da7 0xc000198970 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.591 UTC [cauthdsl] func1 -> DEBU 1da8 0xc000198970 gate 1555913888584887100 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.592 UTC [policies] Evaluate -> DEBU 1da9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.592 UTC [policies] Evaluate -> DEBU 1daa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.592 UTC [policies] func1 -> DEBU 1dab Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:08.592 UTC [policies] Evaluate -> DEBU 1dac Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1dad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1dae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1daf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.685 UTC [gossip.gossip] handleMessage -> DEBU 15d4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.711 UTC [gossip.gossip] handleMessage -> DEBU 15d5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.711 UTC [msp.identity] Verify -> DEBU 15d6 Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +peer0.org1.example.com | 00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +peer0.org1.example.com | "2019-04-22 06:17:00.711 UTC [msp.identity] Verify -> DEBU 15d7 Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +peer0.org1.example.com | 00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +peer0.org1.example.com | 00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +peer0.org1.example.com | 00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +peer0.org1.example.com | 00000040 4d 34 56 e4 dd 25 |M4V..%|" +peer0.org1.example.com | "2019-04-22 06:17:00.712 UTC [msp] DeserializeIdentity -> DEBU 15d8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.712 UTC [gossip.gossip] handleMessage -> DEBU 15d9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.713 UTC [gossip.comm] func1 -> DEBU 15da Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.713 UTC [gossip.gossip] handleMessage -> DEBU 15db Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.714 UTC [msp.identity] Verify -> DEBU 15dc Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +peer0.org1.example.com | 00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +peer0.org1.example.com | "2019-04-22 06:17:00.714 UTC [msp.identity] Verify -> DEBU 15dd Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +peer0.org1.example.com | 00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +peer0.org1.example.com | 00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +peer0.org1.example.com | 00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +peer0.org1.example.com | 00000040 4d 34 56 e4 dd 25 |M4V..%|" +peer0.org1.example.com | "2019-04-22 06:17:00.715 UTC [msp] DeserializeIdentity -> DEBU 15de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.715 UTC [gossip.gossip] handleMessage -> DEBU 15df Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.715 UTC [gossip.comm] func1 -> DEBU 15e0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.716 UTC [gossip.comm] func1 -> DEBU 15e1 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.716 UTC [gossip.gossip] handleMessage -> DEBU 15e2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.717 UTC [gossip.pull] HandleMessage -> DEBU 15e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.717 UTC [gossip.pull] SendDigest -> DEBU 15e4 Sending BLOCK_MSG digest: [1 2 3 4] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:00.719 UTC [gossip.gossip] handleMessage -> DEBU 15e5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.719 UTC [gossip.gossip] handleMessage -> DEBU 15e6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.719 UTC [msp.identity] Verify -> DEBU 15e7 Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +peer0.org1.example.com | 00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +peer0.org1.example.com | "2019-04-22 06:17:00.719 UTC [msp.identity] Verify -> DEBU 15e8 Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +peer0.org1.example.com | 00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +peer0.org1.example.com | 00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +peer0.org1.example.com | 00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +peer0.org1.example.com | 00000040 4d 34 56 e4 dd 25 |M4V..%|" +peer0.org1.example.com | "2019-04-22 06:17:00.719 UTC [gossip.gossip] handleMessage -> DEBU 15e9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15ea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151017 " +peer0.org1.example.com | "2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15eb Sign: digest: 6BD237304AD2ADB7C08E1B15C6E287120F4886805257A5E268E1225AEEFDD75F " +peer0.org1.example.com | "2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15ec Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15ed Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:00.851 UTC [gossip.discovery] periodicalSendAlive -> DEBU 15ee Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:00.854 UTC [msp] DeserializeIdentity -> DEBU 15ef Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.854 UTC [msp] DeserializeIdentity -> DEBU 15f0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.855 UTC [msp] DeserializeIdentity -> DEBU 15f1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.855 UTC [gossip.comm] Send -> DEBU 15f2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.856 UTC [msp] DeserializeIdentity -> DEBU 15f3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.856 UTC [gossip.comm] Send -> DEBU 15f4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.856 UTC [gossip.comm] sendToEndpoint -> DEBU 15f5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.857 UTC [gossip.comm] sendToEndpoint -> DEBU 15f6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.857 UTC [gossip.comm] Send -> DEBU 15f7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.858 UTC [gossip.comm] sendToEndpoint -> DEBU 15f8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.858 UTC [gossip.comm] sendToEndpoint -> DEBU 15f9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.860 UTC [gossip.comm] sendToEndpoint -> DEBU 15fa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.861 UTC [gossip.comm] sendToEndpoint -> DEBU 15fb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.906 UTC [gossip.gossip] handleMessage -> DEBU 15fc Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.907 UTC [msp] DeserializeIdentity -> DEBU 15fd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.908 UTC [msp] DeserializeIdentity -> DEBU 15fe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.908 UTC [msp] DeserializeIdentity -> DEBU 15ff Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.909 UTC [gossip.gossip] handleMessage -> DEBU 1600 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.914 UTC [gossip.gossip] handleMessage -> DEBU 1601 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913817265788600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.914 UTC [msp] DeserializeIdentity -> DEBU 1602 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.915 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1603 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1604 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1605 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.916 UTC [policies] Evaluate -> DEBU 1606 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.916 UTC [policies] Evaluate -> DEBU 1607 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.917 UTC [policies] Evaluate -> DEBU 1608 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.917 UTC [cauthdsl] func1 -> DEBU 1609 0xc003caffd0 gate 1555913820917682500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.919 UTC [gossip.comm] func1 -> DEBU 160a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913817265788600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.938 UTC [cauthdsl] func2 -> DEBU 160b 0xc003caffd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.941 UTC [cauthdsl] func2 -> DEBU 160c 0xc003caffd0 processing identity 0 with bytes of 10c48e0" +orderer0.example.com | "2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1db0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.594 UTC [cauthdsl] func1 -> DEBU 1db1 0xc000199d60 gate 1555913888594277200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.594 UTC [cauthdsl] func2 -> DEBU 1db2 0xc000199d60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.594 UTC [cauthdsl] func2 -> DEBU 1db3 0xc000199d60 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.595 UTC [cauthdsl] func2 -> DEBU 1db4 0xc000199d60 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:08.595 UTC [msp.identity] Verify -> DEBU 1db5 Verify: digest = 00000000 b1 c9 57 7c 07 54 a0 86 3c 7e 95 5f 69 8a 9b 1b |..W|.T..<~._i...| +orderer0.example.com | 00000010 48 59 05 37 15 4b b0 e8 00 eb 06 25 1a 67 5d b8 |HY.7.K.....%.g].|" +orderer0.example.com | "2019-04-22 06:18:08.595 UTC [msp.identity] Verify -> DEBU 1db6 Verify: sig = 00000000 30 45 02 21 00 e5 c4 f2 04 ff af 3a 40 76 d7 26 |0E.!.......:@v.&| +orderer0.example.com | 00000010 01 5f aa 1a 70 8a 4c bd 9a ec db 96 8a 01 89 89 |._..p.L.........| +orderer0.example.com | 00000020 73 6b 0d 5a af 02 20 1c 1a da 19 12 06 7f 19 a3 |sk.Z.. .........| +orderer0.example.com | 00000030 9d 6d e3 c0 eb 8c 03 37 6a 9e 02 b9 70 13 5d d2 |.m.....7j...p.].| +orderer0.example.com | 00000040 d2 5c 8c 13 0f 7e fa |.\...~.|" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [cauthdsl] func2 -> DEBU 1db7 0xc000199d60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [cauthdsl] func1 -> DEBU 1db8 0xc000199d60 gate 1555913888594277200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1db9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dba == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbb Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbd Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [common.deliver] deliverBlocks -> DEBU 1dbf [channel: businesschannel] Received seekInfo (0xc0011d9740) start: > stop: > from 192.168.224.9:34786" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [fsblkstorage] Next -> DEBU 1dc0 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [fsblkstorage] newBlockfileStream -> DEBU 1dc1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90565]" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc2 Remaining bytes=[43102], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc3 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc4 blockbytes [4048] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [common.deliver] deliverBlocks -> DEBU 1dc5 [channel: businesschannel] Delivering block [7] for (0xc0011d9740) for 192.168.224.9:34786" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [common.deliver] deliverBlocks -> DEBU 1dc6 [channel: businesschannel] Done delivering to 192.168.224.9:34786 for (0xc0011d9740)" +orderer0.example.com | "2019-04-22 06:18:08.596 UTC [common.deliver] Handle -> DEBU 1dc7 Waiting for new SeekInfo from 192.168.224.9:34786" +orderer0.example.com | "2019-04-22 06:18:08.597 UTC [common.deliver] Handle -> DEBU 1dc8 Attempting to read seek info message from 192.168.224.9:34786" +orderer0.example.com | "2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dc9 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dca Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dcb Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dcc Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.604 UTC [common.deliver] Handle -> WARN 1dcd Error reading from 192.168.224.9:34786: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:08.604 UTC [orderer.common.server] func1 -> DEBU 1dce Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:08.605 UTC [comm.grpc.server] 1 -> INFO 1dcf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34786 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.8386ms +peer0.org1.example.com | "2019-04-22 06:17:00.942 UTC [cauthdsl] func2 -> DEBU 160d 0xc003caffd0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.943 UTC [msp.identity] Verify -> DEBU 160e Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +peer0.org1.example.com | 00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +peer0.org1.example.com | "2019-04-22 06:17:00.944 UTC [msp.identity] Verify -> DEBU 160f Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +peer0.org1.example.com | 00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +peer0.org1.example.com | 00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +peer0.org1.example.com | 00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +peer0.org1.example.com | 00000040 dc 88 1b 8e 89 e0 |......|" +peer0.org1.example.com | "2019-04-22 06:17:00.950 UTC [cauthdsl] func2 -> DEBU 1610 0xc003caffd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.951 UTC [cauthdsl] func1 -> DEBU 1611 0xc003caffd0 gate 1555913820917682500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.951 UTC [policies] Evaluate -> DEBU 1612 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.952 UTC [policies] Evaluate -> DEBU 1613 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.952 UTC [policies] Evaluate -> DEBU 1614 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.952 UTC [policies] Evaluate -> DEBU 1615 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.953 UTC [msp] DeserializeIdentity -> DEBU 1617 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.952 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1616 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1618 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [policies] Evaluate -> DEBU 1619 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [policies] Evaluate -> DEBU 161a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [policies] Evaluate -> DEBU 161b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [cauthdsl] func1 -> DEBU 161c 0xc003ce0e20 gate 1555913820956472700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [cauthdsl] func2 -> DEBU 161e 0xc003ce0e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [cauthdsl] func2 -> DEBU 161f 0xc003ce0e20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.956 UTC [cauthdsl] func2 -> DEBU 1620 0xc003ce0e20 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.957 UTC [msp.identity] Verify -> DEBU 1621 Verify: digest = 00000000 84 fd ab 8d f2 6b 37 c0 fd 65 1b 79 a0 7f 4a 24 |.....k7..e.y..J$| +peer0.org1.example.com | 00000010 c0 4a 27 63 66 3e 58 5a b5 9a 6d 1f 3a eb d8 73 |.J'cf>XZ..m.:..s|" +peer0.org1.example.com | "2019-04-22 06:17:00.957 UTC [msp.identity] Verify -> DEBU 1622 Verify: sig = 00000000 30 45 02 21 00 bb dd 4e 1d 38 68 52 af a8 bb d4 |0E.!...N.8hR....| +peer0.org1.example.com | 00000010 18 59 0c c4 e8 28 54 16 06 14 dd 37 87 f1 d3 e3 |.Y...(T....7....| +peer0.org1.example.com | 00000020 ff 68 bd da ee 02 20 16 46 94 ea 77 a3 36 07 57 |.h.... .F..w.6.W| +peer0.org1.example.com | 00000030 f6 4c cf 81 0f 47 55 a5 dd 1e d4 8d 25 6f e4 b2 |.L...GU.....%o..| +peer0.org1.example.com | 00000040 28 fe da c2 b2 f7 d8 |(......|" +peer0.org1.example.com | "2019-04-22 06:17:00.957 UTC [cauthdsl] func2 -> DEBU 1623 0xc003ce0e20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.957 UTC [cauthdsl] func1 -> DEBU 1624 0xc003ce0e20 gate 1555913820956472700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.957 UTC [policies] Evaluate -> DEBU 1625 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:00.957 UTC [policies] Evaluate -> DEBU 1626 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:00.957 UTC [policies] Evaluate -> DEBU 1627 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:00.958 UTC [policies] Evaluate -> DEBU 1628 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:00.958 UTC [blocksProvider] DeliverBlocks -> DEBU 1629 [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-04-22 06:17:00.958 UTC [gossip.state] addPayload -> DEBU 162a [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-04-22 06:17:00.958 UTC [gossip.state] addPayload -> DEBU 162b Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:17:00.958 UTC [blocksProvider] DeliverBlocks -> DEBU 162c [businesschannel] Gossiping block [5], peers number [3]" +peer0.org1.example.com | "2019-04-22 06:17:00.955 UTC [gossip.gossip] handleMessage -> DEBU 161d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.959 UTC [gossip.gossip] handleMessage -> DEBU 162e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913817265788600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.959 UTC [gossip.state] deliverPayloads -> DEBU 162f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +peer0.org1.example.com | "2019-04-22 06:17:00.959 UTC [gossip.state] deliverPayloads -> DEBU 1630 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:17:00.959 UTC [gossip.privdata] StoreBlock -> INFO 1631 [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-04-22 06:17:00.960 UTC [gossip.privdata] StoreBlock -> DEBU 1632 [businesschannel] Validating block [5]" +peer0.org1.example.com | "2019-04-22 06:17:00.960 UTC [committer.txvalidator] Validate -> DEBU 1633 [businesschannel] START Block Validation for block [5]" +peer0.org1.example.com | "2019-04-22 06:17:00.959 UTC [msp] DeserializeIdentity -> DEBU 1634 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.961 UTC [committer.txvalidator] validateTx -> DEBU 1636 [businesschannel] validateTx starts for block 0xc003b15a00 env 0xc003c27ea0 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:00.961 UTC [protoutils] ValidateTransaction -> DEBU 1637 ValidateTransactionEnvelope starts for envelope 0xc003c27ea0" +peer0.org1.example.com | "2019-04-22 06:17:00.961 UTC [protoutils] ValidateTransaction -> DEBU 1638 Header is channel_header:"\010\003\032\014\010\332\270\365\345\005\020\254\356\305\242\002\"\017businesschannel*@7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\0307\361D\354S\337KT\2032\335\364\314,\224c\216\362+\t\242\331\335." " +peer0.org1.example.com | "2019-04-22 06:17:00.961 UTC [protoutils] validateChannelHeader -> DEBU 1639 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:00.961 UTC [protoutils] checkSignatureFromCreator -> DEBU 163a begin" +peer0.org1.example.com | "2019-04-22 06:17:00.961 UTC [msp] GetManagerForChain -> DEBU 163b Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:00.962 UTC [protoutils] checkSignatureFromCreator -> DEBU 163c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:00.962 UTC [protoutils] checkSignatureFromCreator -> DEBU 163d creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:00.961 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 163e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:00.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1640 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.960 UTC [committer.txvalidator] Validate -> DEBU 1635 expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:17:00.962 UTC [msp.identity] Verify -> DEBU 163f Verify: digest = 00000000 40 4c 26 4c fb 34 d1 c3 d2 5f f2 5e 28 85 0a 26 |@L&L.4..._.^(..&| +peer0.org1.example.com | 00000010 54 e4 8b e2 03 db 5d dc ca 5f 9a 06 d2 68 86 b9 |T.....].._...h..|" +peer0.org1.example.com | "2019-04-22 06:17:00.959 UTC [gossip.channel] AddToMsgStore -> DEBU 162d Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5726 bytes, seq: 5}, Envelope: 5756 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:17:00.964 UTC [gossip.pull] Add -> DEBU 1643 Added 5, total items: 5" +peer0.org1.example.com | "2019-04-22 06:17:00.963 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1641 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:00.965 UTC [policies] Evaluate -> DEBU 1644 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.965 UTC [policies] Evaluate -> DEBU 1645 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.966 UTC [policies] Evaluate -> DEBU 1646 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:00.966 UTC [cauthdsl] func1 -> DEBU 1647 0xc003d14cb0 gate 1555913820966783000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.967 UTC [cauthdsl] func2 -> DEBU 1648 0xc003d14cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:00.968 UTC [cauthdsl] func2 -> DEBU 1649 0xc003d14cb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.968 UTC [cauthdsl] func2 -> DEBU 164a 0xc003d14cb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.969 UTC [msp.identity] Verify -> DEBU 164b Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +peer0.org1.example.com | 00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +peer0.org1.example.com | "2019-04-22 06:17:00.969 UTC [msp.identity] Verify -> DEBU 164c Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +peer0.org1.example.com | 00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +peer0.org1.example.com | 00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +peer0.org1.example.com | 00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +peer0.org1.example.com | 00000040 dc 88 1b 8e 89 e0 |......|" +peer0.org1.example.com | "2019-04-22 06:17:00.970 UTC [cauthdsl] func2 -> DEBU 164d 0xc003d14cb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.971 UTC [cauthdsl] func1 -> DEBU 164e 0xc003d14cb0 gate 1555913820966783000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.971 UTC [policies] Evaluate -> DEBU 164f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.972 UTC [policies] Evaluate -> DEBU 1650 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.972 UTC [policies] Evaluate -> DEBU 1651 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.973 UTC [policies] Evaluate -> DEBU 1652 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:00.973 UTC [msp] DeserializeIdentity -> DEBU 1653 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.974 UTC [gossip.gossip] handleMessage -> DEBU 1654 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1655 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1656 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1657 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.964 UTC [msp.identity] Verify -> DEBU 1642 Verify: sig = 00000000 30 44 02 20 2b 6f d0 55 6c 20 6d a0 ad fd fc 45 |0D. +o.Ul m....E| +orderer0.example.com | "2019-04-22 06:18:08.604 UTC [grpc] infof -> DEBU 1dd0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:08.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dd1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:08.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.2µs " +orderer0.example.com | "2019-04-22 06:18:08.730 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd3 Sending msg of 28 bytes to 3 on channel testchainid took 666.2µs" +orderer0.example.com | "2019-04-22 06:18:08.820 UTC [orderer.common.server] Deliver -> DEBU 1dd4 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:08.821 UTC [common.deliver] Handle -> DEBU 1dd5 Starting new deliver loop for 192.168.224.9:34788" +orderer0.example.com | "2019-04-22 06:18:08.822 UTC [common.deliver] Handle -> DEBU 1dd6 Attempting to read seek info message from 192.168.224.9:34788" +orderer0.example.com | "2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.824 UTC [policies] Evaluate -> DEBU 1ddb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.824 UTC [cauthdsl] func1 -> DEBU 1ddc 0xc0013580f0 gate 1555913888824312900 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1ddd 0xc0013580f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1dde 0xc0013580f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1ddf 0xc0013580f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1de0 0xc0013580f0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [cauthdsl] func1 -> DEBU 1de1 0xc0013580f0 gate 1555913888824312900 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [policies] Evaluate -> DEBU 1de2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [policies] Evaluate -> DEBU 1de3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [policies] Evaluate -> DEBU 1de4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [cauthdsl] func1 -> DEBU 1de5 0xc001358930 gate 1555913888825729600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [cauthdsl] func2 -> DEBU 1de6 0xc001358930 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [cauthdsl] func2 -> DEBU 1de7 0xc001358930 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.825 UTC [cauthdsl] func2 -> DEBU 1de8 0xc001358930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.826 UTC [cauthdsl] func2 -> DEBU 1de9 0xc001358930 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.826 UTC [cauthdsl] func1 -> DEBU 1dea 0xc001358930 gate 1555913888825729600 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.826 UTC [policies] Evaluate -> DEBU 1deb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.826 UTC [policies] Evaluate -> DEBU 1dec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.826 UTC [policies] Evaluate -> DEBU 1ded == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.826 UTC [cauthdsl] func1 -> DEBU 1dee 0xc001359170 gate 1555913888826846200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:08.827 UTC [cauthdsl] func2 -> DEBU 1def 0xc001359170 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.827 UTC [cauthdsl] func2 -> DEBU 1df0 0xc001359170 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df1 0xc001359170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df2 0xc001359170 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df3 0xc001359170 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df4 0xc001359170 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df5 0xc001359170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df6 0xc001359170 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df7 0xc001359170 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df8 0xc001359170 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df9 0xc001359170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1dfa 0xc001359170 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.829 UTC [cauthdsl] func1 -> DEBU 1dfb 0xc001359170 gate 1555913888826846200 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:08.829 UTC [policies] Evaluate -> DEBU 1dfc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.829 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [policies] func1 -> DEBU 1dfe Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1dff Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e01 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e02 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e03 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [cauthdsl] func1 -> DEBU 1e04 0xc00136a560 gate 1555913888830463000 evaluation starts" +peer0.org1.example.com | 00000010 1a 21 7f 2e 86 57 96 c0 73 80 19 3d 4f 01 9f ac |.!...W..s..=O...| +peer0.org1.example.com | 00000020 02 40 0e 2d 02 20 0c 0a a3 dc 20 5d 41 73 23 0c |.@.-. .... ]As#.| +peer0.org1.example.com | 00000030 6a 4f b3 00 27 41 21 da 7e f7 1c cd c0 ca d9 2d |jO..'A!.~......-| +peer0.org1.example.com | 00000040 c8 3d 55 08 7b 14 |.=U.{.|" +peer0.org1.example.com | "2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1658 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.976 UTC [gossip.comm] Send -> DEBU 1659 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5726 bytes, seq: 5}, Envelope: 5756 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:00.976 UTC [msp] DeserializeIdentity -> DEBU 165a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.979 UTC [msp] DeserializeIdentity -> DEBU 165d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:00.977 UTC [protoutils] checkSignatureFromCreator -> DEBU 165b exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:00.979 UTC [protoutils] validateEndorserTransaction -> DEBU 165e validateEndorserTransaction starts for data 0xc003cf5000, header channel_header:"\010\003\032\014\010\332\270\365\345\005\020\254\356\305\242\002\"\017businesschannel*@7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\0307\361D\354S\337KT\2032\335\364\314,\224c\216\362+\t\242\331\335." " +peer0.org1.example.com | "2019-04-22 06:17:00.980 UTC [protoutils] validateEndorserTransaction -> DEBU 165f validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-04-22 06:17:00.980 UTC [protoutils] validateEndorserTransaction -> DEBU 1660 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-04-22 06:17:00.977 UTC [gossip.comm] sendToEndpoint -> DEBU 165c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5726 bytes, seq: 5}, Envelope: 5756 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:00.981 UTC [gossip.comm] sendToEndpoint -> DEBU 1662 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:00.981 UTC [protoutils] ValidateTransaction -> DEBU 1661 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-04-22 06:17:00.982 UTC [committer.txvalidator] validateTx -> DEBU 1663 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:00.982 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1664 retrieveTransactionByID() - txId = [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +peer0.org1.example.com | "2019-04-22 06:17:00.982 UTC [committer.txvalidator] validateTx -> DEBU 1665 Validating transaction with plugins" +peer0.org1.example.com | "2019-04-22 06:17:00.983 UTC [committer.txvalidator] Dispatch -> DEBU 1666 [businesschannel] Dispatch starts for bytes 0xc003d08000" +peer0.org1.example.com | "2019-04-22 06:17:00.983 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1667 constructing new query executor txid = [81942db6-05e2-4ac5-b541-c45461ee60f3]" +peer0.org1.example.com | "2019-04-22 06:17:00.983 UTC [lockbasedtxmgr] Done -> DEBU 1668 Done with transaction simulation / query execution [81942db6-05e2-4ac5-b541-c45461ee60f3]" +peer0.org1.example.com | "2019-04-22 06:17:00.985 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1669 Validating Tx 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-04-22 06:17:00.985 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 166a constructing new query executor txid = [806f47ef-f29f-472a-8fd1-6cc8980f9050]" +peer0.org1.example.com | "2019-04-22 06:17:00.986 UTC [lockbasedtxmgr] Done -> DEBU 166b Done with transaction simulation / query execution [806f47ef-f29f-472a-8fd1-6cc8980f9050]" +peer0.org1.example.com | "2019-04-22 06:17:00.986 UTC [policies] Evaluate -> DEBU 166c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==" +peer0.org1.example.com | "2019-04-22 06:17:00.986 UTC [policies] Evaluate -> DEBU 166d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:00.987 UTC [policies] Evaluate -> DEBU 166e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +peer0.org1.example.com | "2019-04-22 06:17:00.987 UTC [cauthdsl] func1 -> DEBU 166f 0xc003d44d20 gate 1555913820987827500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.988 UTC [cauthdsl] func2 -> DEBU 1670 0xc003d44d20 signed by 0 principal evaluation starts (used [false false])" +peer0.org1.example.com | "2019-04-22 06:17:00.988 UTC [cauthdsl] func2 -> DEBU 1671 0xc003d44d20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.989 UTC [cauthdsl] func2 -> DEBU 1672 0xc003d44d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:00.989 UTC [cauthdsl] func2 -> DEBU 1673 0xc003d44d20 processing identity 1 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.989 UTC [cauthdsl] func2 -> DEBU 1674 0xc003d44d20 principal matched by identity 1" +peer0.org1.example.com | "2019-04-22 06:17:00.990 UTC [msp.identity] Verify -> DEBU 1675 Verify: digest = 00000000 a9 92 0e 52 fc 39 d3 c3 e6 08 63 bf 5f c0 d0 49 |...R.9....c._..I| +peer0.org1.example.com | 00000010 1c 92 69 ed b2 b1 e1 68 2c 7a 49 55 db c8 a7 12 |..i....h,zIU....|" +peer0.org1.example.com | "2019-04-22 06:17:00.990 UTC [msp.identity] Verify -> DEBU 1676 Verify: sig = 00000000 30 45 02 21 00 b4 e9 d1 2e ac 51 5e b0 08 02 4f |0E.!......Q^...O| +peer0.org1.example.com | 00000010 7b 65 17 88 58 6a 27 bf a5 2e 95 22 a5 77 ce 27 |{e..Xj'....".w.'| +peer0.org1.example.com | 00000020 2e 6d e0 df 54 02 20 5d 30 ec ca ab 4d 81 16 42 |.m..T. ]0...M..B| +peer0.org1.example.com | 00000030 dc 9e 5b b7 2f 0c f1 48 a6 ee 6c b0 01 90 49 ce |..[./..H..l...I.| +peer0.org1.example.com | 00000040 9b 0e 61 b0 b7 ff 73 |..a...s|" +peer0.org1.example.com | "2019-04-22 06:17:00.991 UTC [cauthdsl] func2 -> DEBU 1677 0xc003d44d20 principal evaluation succeeds for identity 1" +peer0.org1.example.com | "2019-04-22 06:17:00.991 UTC [cauthdsl] func1 -> DEBU 1678 0xc003d44d20 gate 1555913820987827500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.992 UTC [policies] Evaluate -> DEBU 1679 Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:17:00.992 UTC [policies] Evaluate -> DEBU 167a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:17:00.993 UTC [policies] Evaluate -> DEBU 167b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +peer0.org1.example.com | "2019-04-22 06:17:00.993 UTC [cauthdsl] func1 -> DEBU 167c 0xc003d45b60 gate 1555913820993939300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:00.994 UTC [cauthdsl] func2 -> DEBU 167d 0xc003d45b60 signed by 0 principal evaluation starts (used [false false])" +peer0.org1.example.com | "2019-04-22 06:17:00.995 UTC [cauthdsl] func2 -> DEBU 167e 0xc003d45b60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:00.995 UTC [cauthdsl] func2 -> DEBU 167f 0xc003d45b60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.996 UTC [msp.identity] Verify -> DEBU 1680 Verify: digest = 00000000 76 fc 96 10 25 92 ee d3 00 d1 d3 f1 bd 51 fa eb |v...%........Q..| +peer0.org1.example.com | 00000010 79 8f 7c 68 fb 01 0f 15 a1 12 d6 0c 54 83 2e 50 |y.|h........T..P|" +peer0.org1.example.com | "2019-04-22 06:17:00.996 UTC [msp.identity] Verify -> DEBU 1681 Verify: sig = 00000000 30 45 02 21 00 f9 64 75 7d 8d f7 13 2d f3 a0 cb |0E.!..du}...-...| +peer0.org1.example.com | 00000010 8d a4 eb 73 41 35 3a 75 92 a8 b7 a4 46 51 01 21 |...sA5:u....FQ.!| +peer0.org1.example.com | 00000020 89 2b 35 ca e4 02 20 0e 54 d4 76 00 a1 2f 46 25 |.+5... .T.v../F%| +peer0.org1.example.com | 00000030 90 ff 8c 6a 20 4f 39 c3 05 3c 07 86 2c 92 e3 34 |...j O9..<..,..4| +peer0.org1.example.com | 00000040 c7 7e e4 e2 6e 62 6c |.~..nbl|" +peer0.org1.example.com | "2019-04-22 06:17:00.998 UTC [cauthdsl] func2 -> DEBU 1682 0xc003d45b60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:00.998 UTC [cauthdsl] func1 -> DEBU 1683 0xc003d45b60 gate 1555913820993939300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:00.999 UTC [policies] Evaluate -> DEBU 1684 Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:17:00.999 UTC [policies] Evaluate -> DEBU 1685 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:17:01.000 UTC [policies] Evaluate -> DEBU 1686 Signature set satisfies policy /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:17:01.000 UTC [policies] Evaluate -> DEBU 1687 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:17:01.001 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1688 constructing new query executor txid = [053908d5-2aac-4f89-98b4-7b4c04190724]" +peer0.org1.example.com | "2019-04-22 06:17:01.001 UTC [lockbasedtxmgr] Done -> DEBU 1689 Done with transaction simulation / query execution [053908d5-2aac-4f89-98b4-7b4c04190724]" +peer0.org1.example.com | "2019-04-22 06:17:01.002 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 168a constructing new query executor txid = [ac60990f-933a-4319-9fe6-1731dc837c8e]" +peer0.org1.example.com | "2019-04-22 06:17:01.002 UTC [lockbasedtxmgr] Done -> DEBU 168b Done with transaction simulation / query execution [ac60990f-933a-4319-9fe6-1731dc837c8e]" +peer0.org1.example.com | "2019-04-22 06:17:01.003 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 168c constructing new query executor txid = [fde5c74d-f7a5-4f6d-a1e6-ebd6f50f0c50]" +peer0.org1.example.com | "2019-04-22 06:17:01.003 UTC [lockbasedtxmgr] Done -> DEBU 168d Done with transaction simulation / query execution [fde5c74d-f7a5-4f6d-a1e6-ebd6f50f0c50]" +peer0.org1.example.com | "2019-04-22 06:17:01.004 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 168e constructing new query executor txid = [d2bc4688-286d-4d99-8e89-325c9983e540]" +peer0.org1.example.com | "2019-04-22 06:17:01.004 UTC [lockbasedtxmgr] Done -> DEBU 168f Done with transaction simulation / query execution [d2bc4688-286d-4d99-8e89-325c9983e540]" +peer0.org1.example.com | "2019-04-22 06:17:01.005 UTC [vscc] Validate -> DEBU 1690 block 5, namespace: _lifecycle, tx 0 validation results is: " +peer0.org1.example.com | "2019-04-22 06:17:01.005 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1691 Transaction 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869 appears to be valid" +peer0.org1.example.com | "2019-04-22 06:17:01.005 UTC [committer.txvalidator] Dispatch -> DEBU 1692 [businesschannel] Dispatch completes env bytes 0xc003d08000" +peer0.org1.example.com | "2019-04-22 06:17:01.006 UTC [committer.txvalidator] validateTx -> DEBU 1693 [businesschannel] validateTx completes for block 0xc003b15a00 env 0xc003c27ea0 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:01.006 UTC [committer.txvalidator] Validate -> DEBU 1694 got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:17:01.006 UTC [committer.txvalidator] Validate -> INFO 1695 [businesschannel] Validated block [5] in 46ms" +peer0.org1.example.com | "2019-04-22 06:17:01.007 UTC [gossip.privdata] containsWrites -> DEBU 1696 HashedRWSet of tx 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, namespace _lifecycle, collection _implicit_org_Org1MSP doesn't contain writes" +peer0.org1.example.com | "2019-04-22 06:17:01.007 UTC [gossip.privdata] containsWrites -> DEBU 1697 HashedRWSet of tx 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, namespace _lifecycle, collection _implicit_org_Org2MSP doesn't contain writes" +peer0.org1.example.com | "2019-04-22 06:17:01.007 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1698 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:17:01.008 UTC [gossip.privdata] StoreBlock -> DEBU 1699 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:17:01.008 UTC [kvledger] CommitWithPvtData -> DEBU 169a [businesschannel] Validating state for block [5]" +peer0.org1.example.com | "2019-04-22 06:17:01.008 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 169b Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:17:01.009 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 169c lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:17:01.009 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 169d Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:17:01.009 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 169e ValidateAndPrepareBatch() for block number = [5]" +peer0.org1.example.com | "2019-04-22 06:17:01.009 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 169f preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:01.010 UTC [valimpl] preprocessProtoBlock -> DEBU 16a0 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-04-22 06:17:01.010 UTC [stateleveldb] GetState -> DEBU 16a1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:01.010 UTC [statebasedval] validateKVRead -> DEBU 16a2 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-04-22 06:17:01.010 UTC [stateleveldb] GetState -> DEBU 16a3 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-04-22 06:17:01.011 UTC [statebasedval] validateKVRead -> DEBU 16a4 Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-04-22 06:17:01.011 UTC [stateleveldb] GetState -> DEBU 16a5 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-04-22 06:17:01.011 UTC [stateleveldb] GetState -> DEBU 16a6 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-04-22 06:17:01.011 UTC [stateleveldb] GetState -> DEBU 16a7 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 16a8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:17:01.012 UTC [stateleveldb] GetState -> DEBU 16a9 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-04-22 06:17:01.012 UTC [stateleveldb] GetState -> DEBU 16aa GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-04-22 06:17:01.012 UTC [stateleveldb] GetState -> DEBU 16ab GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 1e05 0xc00136a560 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:08.830 UTC [cauthdsl] func2 -> DEBU 1e06 0xc00136a560 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:08.831 UTC [cauthdsl] func2 -> DEBU 1e07 0xc00136a560 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:08.831 UTC [msp.identity] Verify -> DEBU 1e08 Verify: digest = 00000000 3d 03 75 7d 3b f7 0c f7 ec 04 cf fb 28 b0 88 21 |=.u};.......(..!| +orderer0.example.com | 00000010 5d 56 73 4f d7 6c d6 3f ff 1c e1 de 69 5a fe ad |]VsO.l.?....iZ..|" +orderer0.example.com | "2019-04-22 06:18:08.831 UTC [msp.identity] Verify -> DEBU 1e09 Verify: sig = 00000000 30 44 02 20 47 a9 53 ec ab 01 0c 23 8f 5e c8 54 |0D. G.S....#.^.T| +orderer0.example.com | 00000010 8f 15 f4 82 c6 f6 b3 84 e0 55 27 ec 4c 5e fe ae |.........U'.L^..| +orderer0.example.com | 00000020 e6 00 fd 67 02 20 34 50 b0 41 b3 8c dd 92 ff 8d |...g. 4P.A......| +orderer0.example.com | 00000030 d9 56 27 89 e1 1f 15 61 48 e7 32 e6 46 39 1e e0 |.V'....aH.2.F9..| +orderer0.example.com | 00000040 a5 c0 1e ce cc e5 |......|" +orderer0.example.com | "2019-04-22 06:18:08.831 UTC [cauthdsl] func2 -> DEBU 1e0a 0xc00136a560 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:08.831 UTC [cauthdsl] func1 -> DEBU 1e0b 0xc00136a560 gate 1555913888830463000 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:08.831 UTC [policies] Evaluate -> DEBU 1e0c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e0d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e0e Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e10 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.833 UTC [policies] Evaluate -> DEBU 1e11 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:08.833 UTC [common.deliver] deliverBlocks -> DEBU 1e12 [channel: businesschannel] Received seekInfo (0xc000d12840) start: > stop: > from 192.168.224.9:34788" +orderer0.example.com | "2019-04-22 06:18:08.833 UTC [fsblkstorage] Next -> DEBU 1e13 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:08.834 UTC [fsblkstorage] newBlockfileStream -> DEBU 1e14 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +orderer0.example.com | "2019-04-22 06:18:08.834 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e15 Remaining bytes=[39052], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:08.834 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e16 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +orderer0.example.com | "2019-04-22 06:18:08.834 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e17 blockbytes [4049] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:08.834 UTC [common.deliver] deliverBlocks -> DEBU 1e18 [channel: businesschannel] Delivering block [8] for (0xc000d12840) for 192.168.224.9:34788" +orderer0.example.com | "2019-04-22 06:18:08.838 UTC [common.deliver] deliverBlocks -> DEBU 1e19 [channel: businesschannel] Done delivering to 192.168.224.9:34788 for (0xc000d12840)" +orderer0.example.com | "2019-04-22 06:18:08.838 UTC [fsblkstorage] waitForBlock -> DEBU 1e1a Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.838 UTC [fsblkstorage] waitForBlock -> DEBU 1e1b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.839 UTC [fsblkstorage] waitForBlock -> DEBU 1e1c Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:08.839 UTC [fsblkstorage] waitForBlock -> DEBU 1e1d Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:08.839 UTC [common.deliver] Handle -> DEBU 1e1e Waiting for new SeekInfo from 192.168.224.9:34788" +orderer0.example.com | "2019-04-22 06:18:08.839 UTC [common.deliver] Handle -> DEBU 1e1f Attempting to read seek info message from 192.168.224.9:34788" +orderer0.example.com | "2019-04-22 06:18:08.855 UTC [common.deliver] Handle -> WARN 1e21 Error reading from 192.168.224.9:34788: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:08.855 UTC [orderer.common.server] func1 -> DEBU 1e22 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:08.855 UTC [grpc] infof -> DEBU 1e20 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:08.855 UTC [comm.grpc.server] 1 -> INFO 1e23 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34788 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.8575ms +orderer0.example.com | "2019-04-22 06:18:09.072 UTC [orderer.common.server] Deliver -> DEBU 1e24 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:09.072 UTC [common.deliver] Handle -> DEBU 1e25 Starting new deliver loop for 192.168.224.9:34790" +orderer0.example.com | "2019-04-22 06:18:09.072 UTC [common.deliver] Handle -> DEBU 1e26 Attempting to read seek info message from 192.168.224.9:34790" +orderer0.example.com | "2019-04-22 06:18:09.074 UTC [policies] Evaluate -> DEBU 1e27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.075 UTC [policies] Evaluate -> DEBU 1e28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.076 UTC [policies] Evaluate -> DEBU 1e2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.076 UTC [policies] Evaluate -> DEBU 1e2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.078 UTC [policies] Evaluate -> DEBU 1e2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:09.078 UTC [cauthdsl] func1 -> DEBU 1e2f 0xc0010a2f70 gate 1555913889078574000 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.078 UTC [cauthdsl] func2 -> DEBU 1e30 0xc0010a2f70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e29 Sending msg of 28 bytes to 2 on channel businesschannel took 64.3µs" +orderer0.example.com | "2019-04-22 06:18:09.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.2µs " +orderer0.example.com | "2019-04-22 06:18:09.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e31 Sending msg of 28 bytes to 3 on channel businesschannel took 70.7µs" +orderer0.example.com | "2019-04-22 06:18:09.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.1µs " +orderer0.example.com | "2019-04-22 06:18:09.079 UTC [cauthdsl] func2 -> DEBU 1e32 0xc0010a2f70 processing identity 0 with bytes of ebaeb0" +peer0.org1.example.com | "2019-04-22 06:17:01.013 UTC [stateleveldb] GetState -> DEBU 16ac GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:17:01.013 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 16ad Block [5] Transaction index [0] TxId [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-04-22 06:17:01.014 UTC [valinternal] ApplyWriteSet -> DEBU 16ae txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc003d4d380), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc003d4d3c0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc003d4d400), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc003d4d440), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc003d4d480)}" +peer0.org1.example.com | "2019-04-22 06:17:01.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 16af validating rwset..." +peer0.org1.example.com | "2019-04-22 06:17:01.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 16b0 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:01.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 16b1 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:17:01.015 UTC [lifecycle] update -> INFO 16b2 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:01.015 UTC [stateleveldb] GetState -> DEBU 16b3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +peer0.org1.example.com | "2019-04-22 06:17:01.016 UTC [stateleveldb] GetState -> DEBU 16b4 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +peer0.org1.example.com | "2019-04-22 06:17:01.016 UTC [stateleveldb] GetState -> DEBU 16b5 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 16b6 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +peer0.org1.example.com | "2019-04-22 06:17:01.017 UTC [stateleveldb] GetState -> DEBU 16b7 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +peer0.org1.example.com | "2019-04-22 06:17:01.017 UTC [stateleveldb] GetState -> DEBU 16b8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=� ��=�Y\��}�J=�M#d� ���Ժ�" +peer0.org1.example.com | "2019-04-22 06:17:01.018 UTC [lifecycle] update -> INFO 16b9 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org1.example.com | "2019-04-22 06:17:01.018 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16ba Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[exp02:0xc003d8a600] map[����>{"+���#b� ��T�H��Won�:exp02 ���h�-���i�u�E����^�kꞐ������:exp02 ���R���l� DEBU 16bb Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc003d86780), (*kvrwset.KVWrite)(0xc003d867d0), (*kvrwset.KVWrite)(0xc003d86820), (*kvrwset.KVWrite)(0xc003d86870), (*kvrwset.KVWrite)(0xc003d868c0)}}" +peer0.org1.example.com | "2019-04-22 06:17:01.019 UTC [cceventmgmt] HandleStateUpdates -> INFO 16bc Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-04-22 06:17:01.019 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 16bd Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}]]" +peer0.org1.example.com | "2019-04-22 06:17:01.019 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 16be Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org1.example.com | "2019-04-22 06:17:01.020 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 16bf Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org1.example.com | "2019-04-22 06:17:01.020 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16c0 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440})}" +peer0.org1.example.com | "2019-04-22 06:17:01.020 UTC [stateleveldb] GetState -> DEBU 16c1 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-04-22 06:17:01.020 UTC [stateleveldb] GetState -> DEBU 16c2 GetState(). ns=lscc, key=exp02" +orderer0.example.com | "2019-04-22 06:18:09.081 UTC [cauthdsl] func2 -> DEBU 1e34 0xc0010a2f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:09.081 UTC [cauthdsl] func2 -> DEBU 1e35 0xc0010a2f70 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.081 UTC [cauthdsl] func1 -> DEBU 1e36 0xc0010a2f70 gate 1555913889078574000 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.081 UTC [policies] Evaluate -> DEBU 1e37 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:09.081 UTC [policies] Evaluate -> DEBU 1e38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:09.081 UTC [policies] Evaluate -> DEBU 1e39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.082 UTC [cauthdsl] func1 -> DEBU 1e3a 0xc001084ad0 gate 1555913889082391000 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3b 0xc001084ad0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3c 0xc001084ad0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3d 0xc001084ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3e 0xc001084ad0 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.083 UTC [cauthdsl] func1 -> DEBU 1e3f 0xc001084ad0 gate 1555913889082391000 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.083 UTC [policies] Evaluate -> DEBU 1e40 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:09.084 UTC [policies] Evaluate -> DEBU 1e41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:09.084 UTC [policies] Evaluate -> DEBU 1e42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.084 UTC [cauthdsl] func1 -> DEBU 1e43 0xc001085310 gate 1555913889084723800 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.084 UTC [cauthdsl] func2 -> DEBU 1e44 0xc001085310 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e46 0xc001085310 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e47 0xc001085310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e48 0xc001085310 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e49 0xc001085310 signed by 1 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc001085310 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4b 0xc001085310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4c 0xc001085310 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4d 0xc001085310 signed by 2 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4e 0xc001085310 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.087 UTC [cauthdsl] func2 -> DEBU 1e4f 0xc001085310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-04-22 06:18:09.087 UTC [cauthdsl] func2 -> DEBU 1e50 0xc001085310 principal evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.087 UTC [cauthdsl] func1 -> DEBU 1e51 0xc001085310 gate 1555913889084723800 evaluation fails" +orderer0.example.com | "2019-04-22 06:18:09.087 UTC [policies] Evaluate -> DEBU 1e52 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:09.088 UTC [policies] Evaluate -> DEBU 1e53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-04-22 06:18:09.088 UTC [policies] func1 -> DEBU 1e54 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-04-22 06:18:09.088 UTC [policies] Evaluate -> DEBU 1e55 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e59 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.090 UTC [cauthdsl] func1 -> DEBU 1e5a 0xc00053c700 gate 1555913889090241500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.090 UTC [cauthdsl] func2 -> DEBU 1e5b 0xc00053c700 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.090 UTC [cauthdsl] func2 -> DEBU 1e5c 0xc00053c700 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.091 UTC [cauthdsl] func2 -> DEBU 1e5d 0xc00053c700 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:09.091 UTC [msp.identity] Verify -> DEBU 1e5e Verify: digest = 00000000 48 b8 ed 70 62 58 be ba 1d 31 43 3b 9b e1 eb 91 |H..pbX...1C;....| +orderer0.example.com | 00000010 28 a1 74 b7 a4 c6 20 74 5f 9e e4 00 34 78 53 52 |(.t... t_...4xSR|" +orderer0.example.com | "2019-04-22 06:18:09.092 UTC [msp.identity] Verify -> DEBU 1e5f Verify: sig = 00000000 30 44 02 20 4b ff 1d da 4e 23 15 7a 06 41 98 5a |0D. K...N#.z.A.Z| +orderer0.example.com | 00000010 01 e7 9d 83 3a e5 f9 f0 a0 51 f7 03 69 4d 6e e4 |....:....Q..iMn.| +orderer0.example.com | 00000020 c0 86 73 3e 02 20 28 57 17 0a 0c df d8 a7 91 59 |..s>. (W.......Y| +orderer0.example.com | 00000030 47 b3 76 60 9e 00 f5 28 3f c7 10 cf 0e 4b 4d e7 |G.v`...(?....KM.| +orderer0.example.com | 00000040 88 d9 04 c0 ba e4 |......|" +orderer0.example.com | "2019-04-22 06:18:09.092 UTC [cauthdsl] func2 -> DEBU 1e60 0xc00053c700 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:09.092 UTC [cauthdsl] func1 -> DEBU 1e61 0xc00053c700 gate 1555913889090241500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:09.092 UTC [policies] Evaluate -> DEBU 1e62 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.092 UTC [policies] Evaluate -> DEBU 1e63 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e45 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:09.093 UTC [policies] Evaluate -> DEBU 1e64 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.093 UTC [policies] Evaluate -> DEBU 1e65 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.094 UTC [policies] Evaluate -> DEBU 1e66 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.021 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16c3 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 83 170 140 173 163 251 80 149 96 210 221 94 183 62 19 157 250 115 43 249 173 224 186 3 250 95 126 110 189 166 49 57 2 32 114 246 129 162 164 229 222 122 103 218 14 36 179 42 12 169 194 151 81 96 101 122 194 28 168 50 204 94 230 88 39 177]} 0x14d8920}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00265fa40 0xc002563680 0xc002654dc0})]}" +peer0.org1.example.com | "2019-04-22 06:17:01.021 UTC [confighistory] add -> DEBU 16c4 add() - {lscc, exp02~collection, 5}" +peer0.org1.example.com | "2019-04-22 06:17:01.026 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16c5 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*confighistory.dbProvider=&{0xc00000cb00})}" +peer0.org1.example.com | "2019-04-22 06:17:01.026 UTC [kvledger] CommitWithPvtData -> DEBU 16c6 [businesschannel] Committing block [5] to storage" +peer0.org1.example.com | "2019-04-22 06:17:01.026 UTC [ledgerstorage] CommitWithPvtData -> DEBU 16c7 Writing block [5] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:17:01.029 UTC [pvtdatastorage] Prepare -> DEBU 16c8 Saved 0 private data write sets for block [5]" +peer0.org1.example.com | "2019-04-22 06:17:01.034 UTC [fsblkstorage] indexBlock -> DEBU 16c9 Indexing block [blockNum=5, blockHash=[]byte{0xf, 0x5a, 0xbc, 0x96, 0x5a, 0x90, 0x27, 0x82, 0xd2, 0x66, 0x93, 0xf6, 0xa4, 0x7b, 0xd3, 0x45, 0x68, 0xc2, 0x57, 0xa8, 0xb7, 0xa4, 0x2b, 0xc8, 0x69, 0x86, 0x9a, 0xd3, 0xd0, 0x37, 0x56, 0x39} txOffsets= +peer0.org1.example.com | txId=7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869 locPointer=offset=70, bytesLength=4707 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:17:01.034 UTC [fsblkstorage] indexBlock -> DEBU 16ca Adding txLoc [fileSuffixNum=0, offset=80866, bytesLength=4707] for tx ID: [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869] to txid-index" +peer0.org1.example.com | "2019-04-22 06:17:01.035 UTC [fsblkstorage] indexBlock -> DEBU 16cb Adding txLoc [fileSuffixNum=0, offset=80866, bytesLength=4707] for tx number:[0] ID: [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:17:01.037 UTC [fsblkstorage] updateCheckpoint -> DEBU 16cc Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86511], isChainEmpty=[false], lastBlockNumber=[5]" +peer0.org1.example.com | "2019-04-22 06:17:01.038 UTC [pvtdatastorage] Commit -> DEBU 16cd Committing private data for block [5]" +peer0.org1.example.com | "2019-04-22 06:17:01.041 UTC [fsblkstorage] waitForBlock -> DEBU 16ce Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | "2019-04-22 06:17:01.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cf Remaining bytes=[5715], Going to peek [8] bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.042 UTC [pvtdatastorage] Commit -> DEBU 16d0 Committed private data for block [5]" +peer0.org1.example.com | "2019-04-22 06:17:01.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d1 Returning blockbytes - length=[5713], placementInfo={fileNum=[0], startOffset=[80796], bytesOffset=[80798]}" +peer0.org1.example.com | "2019-04-22 06:17:01.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d2 blockbytes [5713] read from file [0]" +peer0.org1.example.com | "2019-04-22 06:17:01.044 UTC [kvledger] CommitWithPvtData -> DEBU 16d3 [businesschannel] Committing block [5] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:17:01.044 UTC [lockbasedtxmgr] Commit -> DEBU 16d4 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:01.044 UTC [lockbasedtxmgr] Commit -> DEBU 16d5 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:01.045 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 16d6 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:17:01.048 UTC [lockbasedtxmgr] Commit -> DEBU 16d7 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:01.048 UTC [stateleveldb] ApplyUpdates -> DEBU 16d8 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]" +peer0.org1.example.com | "2019-04-22 06:17:01.049 UTC [stateleveldb] ApplyUpdates -> DEBU 16d9 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +peer0.org1.example.com | "2019-04-22 06:17:01.049 UTC [stateleveldb] ApplyUpdates -> DEBU 16da Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]" +peer0.org1.example.com | "2019-04-22 06:17:01.050 UTC [stateleveldb] ApplyUpdates -> DEBU 16db Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +peer0.org1.example.com | "2019-04-22 06:17:01.050 UTC [stateleveldb] ApplyUpdates -> DEBU 16dc Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +peer0.org1.example.com | "2019-04-22 06:17:01.052 UTC [lockbasedtxmgr] Commit -> DEBU 16dd Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:17:01.052 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 16de Preparing potential purge list working-set for expiringAtBlk [6]" +peer0.org1.example.com | "2019-04-22 06:17:01.052 UTC [leveldbhelper] GetIterator -> DEBU 16df Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:17:01.052 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 16e0 No expiry entry found for expiringAtBlk [6]" +orderer0.example.com | "2019-04-22 06:18:09.094 UTC [policies] Evaluate -> DEBU 1e67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.095 UTC [common.deliver] deliverBlocks -> DEBU 1e68 [channel: businesschannel] Received seekInfo (0xc0011d9f40) start: > stop: > from 192.168.224.9:34790" +orderer0.example.com | "2019-04-22 06:18:09.095 UTC [fsblkstorage] Next -> DEBU 1e69 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +orderer0.example.com | "2019-04-22 06:18:09.096 UTC [fsblkstorage] newBlockfileStream -> DEBU 1e6a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +orderer0.example.com | "2019-04-22 06:18:09.096 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e6b Remaining bytes=[35001], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:09.096 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e6c Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +orderer0.example.com | "2019-04-22 06:18:09.097 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e6d blockbytes [34998] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:09.097 UTC [common.deliver] deliverBlocks -> DEBU 1e6e [channel: businesschannel] Delivering block [9] for (0xc0011d9f40) for 192.168.224.9:34790" +orderer0.example.com | "2019-04-22 06:18:09.098 UTC [common.deliver] deliverBlocks -> DEBU 1e6f [channel: businesschannel] Done delivering to 192.168.224.9:34790 for (0xc0011d9f40)" +orderer0.example.com | "2019-04-22 06:18:09.098 UTC [common.deliver] Handle -> DEBU 1e70 Waiting for new SeekInfo from 192.168.224.9:34790" +orderer0.example.com | "2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e71 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e72 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e73 Came out of wait. maxAvailaBlockNumber=[9]" +orderer0.example.com | "2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e74 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +orderer0.example.com | "2019-04-22 06:18:09.099 UTC [common.deliver] Handle -> DEBU 1e75 Attempting to read seek info message from 192.168.224.9:34790" +orderer0.example.com | "2019-04-22 06:18:09.107 UTC [common.deliver] Handle -> WARN 1e76 Error reading from 192.168.224.9:34790: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:09.107 UTC [orderer.common.server] func1 -> DEBU 1e77 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:09.107 UTC [comm.grpc.server] 1 -> INFO 1e78 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34790 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.3352ms +orderer0.example.com | "2019-04-22 06:18:09.107 UTC [grpc] infof -> DEBU 1e79 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:09.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:09.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7b Sending msg of 28 bytes to 3 on channel testchainid took 24.8µs" +orderer0.example.com | "2019-04-22 06:18:09.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +orderer0.example.com | "2019-04-22 06:18:09.284 UTC [orderer.common.server] Deliver -> DEBU 1e7d Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:09.284 UTC [common.deliver] Handle -> DEBU 1e7e Starting new deliver loop for 192.168.224.9:34792" +orderer0.example.com | "2019-04-22 06:18:09.284 UTC [common.deliver] Handle -> DEBU 1e7f Attempting to read seek info message from 192.168.224.9:34792" +orderer0.example.com | "2019-04-22 06:18:09.284 UTC [policies] Evaluate -> DEBU 1e80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e84 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [cauthdsl] func1 -> DEBU 1e85 0xc000557070 gate 1555913889285217600 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e86 0xc000557070 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e87 0xc000557070 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e88 0xc000557070 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [msp.identity] Verify -> DEBU 1e89 Verify: digest = 00000000 51 a9 9f 97 79 10 5b 52 c9 07 9d d4 a3 f6 d0 67 |Q...y.[R.......g| +orderer0.example.com | 00000010 27 2e 94 d3 a8 f5 a5 b9 fe 63 ea 09 29 1f 6c 16 |'........c..).l.|" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [msp.identity] Verify -> DEBU 1e8a Verify: sig = 00000000 30 45 02 21 00 90 79 ae f1 94 6b 17 a2 38 26 c7 |0E.!..y...k..8&.| +orderer0.example.com | 00000010 3e 82 c6 b7 9f df 97 f6 66 31 89 50 1d d3 b9 17 |>.......f1.P....| +orderer0.example.com | 00000020 c8 c3 72 da c4 02 20 1d c0 70 45 01 b1 d6 57 5b |..r... ..pE...W[| +orderer0.example.com | 00000030 b0 a2 1f 89 4b 2f a5 52 eb 0b 74 38 e0 1c c7 1d |....K/.R..t8....| +orderer0.example.com | 00000040 59 a7 a9 cd 8a fc f5 |Y......|" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e8b 0xc000557070 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [cauthdsl] func1 -> DEBU 1e8c 0xc000557070 gate 1555913889285217600 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e8d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e8e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e8f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e91 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [common.deliver] deliverBlocks -> DEBU 1e93 [channel: testchainid] Received seekInfo (0xc000087240) start: > stop: > from 192.168.224.9:34792" +orderer0.example.com | "2019-04-22 06:18:09.285 UTC [fsblkstorage] Next -> DEBU 1e94 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [fsblkstorage] newBlockfileStream -> DEBU 1e95 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +peer0.org1.example.com | "2019-04-22 06:17:01.052 UTC [lockbasedtxmgr] func1 -> DEBU 16e1 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:17:01.053 UTC [kvledger] CommitWithPvtData -> DEBU 16e2 [businesschannel] Committing block [5] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:17:01.053 UTC [historyleveldb] Commit -> DEBU 16e3 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:17:01.056 UTC [historyleveldb] Commit -> DEBU 16e4 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +peer0.org1.example.com | "2019-04-22 06:17:01.057 UTC [kvledger] CommitWithPvtData -> INFO 16e5 [businesschannel] Committed block [5] with 1 transaction(s) in 48ms (state_validation=17ms block_commit=17ms state_commit=9ms)" +peer0.org1.example.com | "2019-04-22 06:17:01.061 UTC [msp.identity] Sign -> DEBU 16e6 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020806 " +peer0.org1.example.com | "2019-04-22 06:17:01.061 UTC [msp.identity] Sign -> DEBU 16e7 Sign: digest: 695F95D761FE184353A81E451CF4724D334DF6EC3F2F5FC11CDF371D79E7ACB1 " +peer0.org1.example.com | "2019-04-22 06:17:01.062 UTC [gossip.state] commitBlock -> DEBU 16e8 [businesschannel] Committed block [5] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:17:01.063 UTC [common.deliver] deliverBlocks -> DEBU 16e9 [channel: businesschannel] Delivering block [5] for (0xc00392bb80) for 192.168.224.9:49272" +peer0.org1.example.com | "2019-04-22 06:17:01.064 UTC [fsblkstorage] waitForBlock -> DEBU 16ea Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer0.org1.example.com | "2019-04-22 06:17:01.077 UTC [grpc] infof -> DEBU 16eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:01.077 UTC [grpc] warningf -> DEBU 16ec transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49272: read: connection reset by peer" +peer0.org1.example.com | "2019-04-22 06:17:01.078 UTC [common.deliver] deliverBlocks -> DEBU 16ed Context canceled, aborting wait for next block" +peer0.org1.example.com | "2019-04-22 06:17:01.078 UTC [common.deliverevents] func1 -> DEBU 16ee Closing Deliver stream" +peer0.org1.example.com | "2019-04-22 06:17:01.078 UTC [comm.grpc.server] 1 -> INFO 16ef streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:17:28.647Z grpc.peer_address=192.168.224.9:49272 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.425635s +peer0.org1.example.com | "2019-04-22 06:17:01.079 UTC [grpc] infof -> DEBU 16f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:01.079 UTC [fsblkstorage] waitForBlock -> DEBU 16f1 Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | "2019-04-22 06:17:01.125 UTC [gossip.comm] func1 -> DEBU 16f2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.125 UTC [gossip.gossip] handleMessage -> DEBU 16f3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.125 UTC [msp] DeserializeIdentity -> DEBU 16f4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.133 UTC [msp] DeserializeIdentity -> DEBU 16f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.133 UTC [msp] DeserializeIdentity -> DEBU 16f6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.133 UTC [gossip.gossip] handleMessage -> DEBU 16f7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.144 UTC [gossip.comm] func1 -> DEBU 16f8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.146 UTC [gossip.gossip] handleMessage -> DEBU 16f9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.147 UTC [msp] DeserializeIdentity -> DEBU 16fa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.152 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:01.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.153 UTC [policies] Evaluate -> DEBU 16fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e96 Remaining bytes=[25828], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e97 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e98 blockbytes [25825] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1e99 [channel: testchainid] Delivering block [1] for (0xc000087240) for 192.168.224.9:34792" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1e9a [channel: testchainid] Done delivering to 192.168.224.9:34792 for (0xc000087240)" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [common.deliver] Handle -> DEBU 1e9b Waiting for new SeekInfo from 192.168.224.9:34792" +orderer0.example.com | "2019-04-22 06:18:09.286 UTC [common.deliver] Handle -> DEBU 1e9c Attempting to read seek info message from 192.168.224.9:34792" +orderer0.example.com | "2019-04-22 06:18:09.292 UTC [common.deliver] Handle -> WARN 1e9d Error reading from 192.168.224.9:34792: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:09.292 UTC [orderer.common.server] func1 -> DEBU 1e9e Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:09.292 UTC [comm.grpc.server] 1 -> INFO 1e9f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34792 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3487ms +orderer0.example.com | "2019-04-22 06:18:09.292 UTC [grpc] infof -> DEBU 1ea0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:09.478 UTC [orderer.common.server] Deliver -> DEBU 1ea1 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:09.478 UTC [common.deliver] Handle -> DEBU 1ea2 Starting new deliver loop for 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.478 UTC [common.deliver] Handle -> DEBU 1ea3 Attempting to read seek info message from 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc00126e700 gate 1555913889479985800 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eaa 0xc00126e700 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eab 0xc00126e700 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eac 0xc00126e700 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [msp.identity] Verify -> DEBU 1ead Verify: digest = 00000000 00 54 37 2f 46 5f bd 11 1e 31 46 cb 90 b2 77 8c |.T7/F_...1F...w.| +orderer0.example.com | 00000010 7c 66 14 8c 9b e3 f3 1e c6 61 8e 3b b2 a9 e0 81 ||f.......a.;....|" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [msp.identity] Verify -> DEBU 1eae Verify: sig = 00000000 30 45 02 21 00 97 5e 94 87 00 8b cc 1b 1e 51 db |0E.!..^.......Q.| +orderer0.example.com | 00000010 da 60 4a 1f 04 7c 70 d2 0f ce bf 23 a4 d6 89 49 |.`J..|p....#...I| +orderer0.example.com | 00000020 c8 29 b4 d9 40 02 20 67 4f b6 9f b9 66 f1 5a b1 |.)..@. gO...f.Z.| +orderer0.example.com | 00000030 85 9d 2d 36 b9 73 1b e2 13 91 1e f0 76 f9 2d 7e |..-6.s......v.-~| +orderer0.example.com | 00000040 7d f6 91 93 04 fa 32 |}.....2|" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eaf 0xc00126e700 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [cauthdsl] func1 -> DEBU 1eb0 0xc00126e700 gate 1555913889479985800 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb3 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb5 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [common.deliver] deliverBlocks -> DEBU 1eb7 [channel: testchainid] Received seekInfo (0xc000d131c0) start: > stop: > from 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [fsblkstorage] Next -> DEBU 1eb8 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [fsblkstorage] newBlockfileStream -> DEBU 1eb9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1eba Remaining bytes=[25828], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:09.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ebb Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-04-22 06:18:09.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ebc blockbytes [25825] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:09.481 UTC [common.deliver] deliverBlocks -> DEBU 1ebd [channel: testchainid] Delivering block [1] for (0xc000d131c0) for 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.481 UTC [common.deliver] deliverBlocks -> DEBU 1ebe [channel: testchainid] Done delivering to 192.168.224.9:34794 for (0xc000d131c0)" +orderer0.example.com | "2019-04-22 06:18:09.481 UTC [common.deliver] Handle -> DEBU 1ebf Waiting for new SeekInfo from 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.481 UTC [common.deliver] Handle -> DEBU 1ec0 Attempting to read seek info message from 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.162 UTC [policies] Evaluate -> DEBU 16ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:01.162 UTC [policies] Evaluate -> DEBU 1700 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.162 UTC [cauthdsl] func1 -> DEBU 1701 0xc003dc7d00 gate 1555913821162758300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:01.162 UTC [cauthdsl] func2 -> DEBU 1702 0xc003dc7d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:01.162 UTC [cauthdsl] func2 -> DEBU 1703 0xc003dc7d00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:01.162 UTC [cauthdsl] func2 -> DEBU 1704 0xc003dc7d00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.162 UTC [msp.identity] Verify -> DEBU 1705 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:01.163 UTC [msp.identity] Verify -> DEBU 1706 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [cauthdsl] func2 -> DEBU 1707 0xc003dc7d00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [cauthdsl] func1 -> DEBU 1708 0xc003dc7d00 gate 1555913821162758300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 1709 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 170a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 170b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 170c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.173 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 170f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1710 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 1711 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 1712 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 1713 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [cauthdsl] func1 -> DEBU 1714 0xc003dd6ee0 gate 1555913821174189900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 1715 0xc003dd6ee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 1716 0xc003dd6ee0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 1717 0xc003dd6ee0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [msp.identity] Verify -> DEBU 1718 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [msp.identity] Verify -> DEBU 1719 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 171a 0xc003dd6ee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [cauthdsl] func1 -> DEBU 171b 0xc003dd6ee0 gate 1555913821174189900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [gossip.gossip] handleMessage -> DEBU 1720 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.174 UTC [gossip.gossip] handleMessage -> DEBU 1721 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [msp] DeserializeIdentity -> DEBU 1722 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1723 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1724 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1725 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1726 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1727 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1728 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [cauthdsl] func1 -> DEBU 1729 0xc003dee800 gate 1555913821175459600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172a 0xc003dee800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172b 0xc003dee800 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172c 0xc003dee800 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [msp.identity] Verify -> DEBU 172d Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [msp.identity] Verify -> DEBU 172e Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172f 0xc003dee800 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [cauthdsl] func1 -> DEBU 1730 0xc003dee800 gate 1555913821175459600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1731 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1732 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.176 UTC [policies] Evaluate -> DEBU 1733 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.176 UTC [policies] Evaluate -> DEBU 1734 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.176 UTC [msp] DeserializeIdentity -> DEBU 1735 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.176 UTC [gossip.gossip] handleMessage -> DEBU 1736 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.176 UTC [gossip.comm] func1 -> DEBU 1737 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.176 UTC [gossip.comm] func1 -> DEBU 1738 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.176 UTC [gossip.gossip] handleMessage -> DEBU 1739 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.177 UTC [msp] DeserializeIdentity -> DEBU 173a Obtaining identity" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [cauthdsl] func1 -> DEBU 1ec6 0xc000e595f0 gate 1555913889484727500 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [cauthdsl] func2 -> DEBU 1ec7 0xc000e595f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [cauthdsl] func2 -> DEBU 1ec8 0xc000e595f0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [cauthdsl] func2 -> DEBU 1ec9 0xc000e595f0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [msp.identity] Verify -> DEBU 1eca Verify: digest = 00000000 fc f0 44 39 54 a9 06 f2 a7 d1 e7 e8 37 0e 41 00 |..D9T.......7.A.| +orderer0.example.com | 00000010 c2 3a 22 1e 95 d5 e6 5b ff f5 0f fb f5 f6 1e 20 |.:"....[....... |" +orderer0.example.com | "2019-04-22 06:18:09.484 UTC [msp.identity] Verify -> DEBU 1ecb Verify: sig = 00000000 30 45 02 21 00 db cb fd 8c 44 ee 76 b0 64 eb a0 |0E.!.....D.v.d..| +orderer0.example.com | 00000010 20 d7 61 c2 5a bc b6 7d 12 48 41 48 e4 ec 27 19 | .a.Z..}.HAH..'.| +orderer0.example.com | 00000020 73 cd 19 c7 a0 02 20 06 90 76 1a 92 04 8a 6d b3 |s..... ..v....m.| +orderer0.example.com | 00000030 f7 4e 88 d1 22 58 0e 68 e4 7c 44 3a bc e2 d3 4c |.N.."X.h.|D:...L| +orderer0.example.com | 00000040 27 d6 4d da 90 27 e4 |'.M..'.|" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [cauthdsl] func2 -> DEBU 1ecc 0xc000e595f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [cauthdsl] func1 -> DEBU 1ecd 0xc000e595f0 gate 1555913889484727500 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ece Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ecf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed0 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed2 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [common.deliver] deliverBlocks -> DEBU 1ed4 [channel: testchainid] Received seekInfo (0xc000087b40) start: > stop: > from 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [fsblkstorage] Next -> DEBU 1ed5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ed6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ed7 Remaining bytes=[44243], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ed8 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ed9 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [common.deliver] deliverBlocks -> DEBU 1eda [channel: testchainid] Delivering block [0] for (0xc000087b40) for 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [common.deliver] deliverBlocks -> DEBU 1edb [channel: testchainid] Done delivering to 192.168.224.9:34794 for (0xc000087b40)" +orderer0.example.com | "2019-04-22 06:18:09.485 UTC [common.deliver] Handle -> DEBU 1edc Waiting for new SeekInfo from 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.486 UTC [common.deliver] Handle -> DEBU 1edd Attempting to read seek info message from 192.168.224.9:34794" +orderer0.example.com | "2019-04-22 06:18:09.494 UTC [common.deliver] Handle -> WARN 1ede Error reading from 192.168.224.9:34794: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:09.494 UTC [orderer.common.server] func1 -> DEBU 1edf Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:09.494 UTC [comm.grpc.server] 1 -> INFO 1ee0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34794 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2383ms +orderer0.example.com | "2019-04-22 06:18:09.494 UTC [grpc] infof -> DEBU 1ee1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:09.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-04-22 06:18:09.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ee3 Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-04-22 06:18:09.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.7µs " +orderer0.example.com | "2019-04-22 06:18:09.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +orderer0.example.com | "2019-04-22 06:18:09.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ee6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:09.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ee7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [orderer.common.server] Deliver -> DEBU 1ee8 Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [common.deliver] Handle -> DEBU 1ee9 Starting new deliver loop for 192.168.224.9:34796" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [common.deliver] Handle -> DEBU 1eea Attempting to read seek info message from 192.168.224.9:34796" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eeb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eef == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [cauthdsl] func1 -> DEBU 1ef0 0xc001399ae0 gate 1555913889650766200 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc001399ae0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [cauthdsl] func2 -> DEBU 1ef2 0xc001399ae0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.650 UTC [cauthdsl] func2 -> DEBU 1ef3 0xc001399ae0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [msp.identity] Verify -> DEBU 1ef4 Verify: digest = 00000000 e7 ec 70 b9 d2 ae c1 3f 25 26 14 28 27 fd db bc |..p....?%&.('...| +orderer0.example.com | 00000010 36 cd 8f 04 94 63 64 52 b2 1e ff 09 dd 6a 29 00 |6....cdR.....j).|" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [msp.identity] Verify -> DEBU 1ef5 Verify: sig = 00000000 30 45 02 21 00 ab 29 2a 27 2a 26 bb e9 74 44 f5 |0E.!..)*'*&..tD.| +orderer0.example.com | 00000010 d9 4b 3f a1 8b bd cb 22 a5 10 18 a5 a2 8a c6 51 |.K?....".......Q| +orderer0.example.com | 00000020 b9 0e fd 65 7b 02 20 6f ef 54 be 1a b6 be 41 34 |...e{. o.T....A4| +orderer0.example.com | 00000030 c3 17 7a 16 d4 75 ca 13 de 48 c6 3b fc 60 20 8d |..z..u...H.;.` .| +orderer0.example.com | 00000040 09 5a 06 a4 b9 62 f6 |.Z...b.|" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc001399ae0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [cauthdsl] func1 -> DEBU 1ef7 0xc001399ae0 gate 1555913889650766200 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1ef8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1ef9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efa Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efc Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [common.deliver] deliverBlocks -> DEBU 1efe [channel: testchainid] Received seekInfo (0xc0004164c0) start: > stop: > from 192.168.224.9:34796" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [fsblkstorage] Next -> DEBU 1eff Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f00 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f01 Remaining bytes=[44243], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f02 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f03 blockbytes [18412] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:09.651 UTC [common.deliver] deliverBlocks -> DEBU 1f04 [channel: testchainid] Delivering block [0] for (0xc0004164c0) for 192.168.224.9:34796" +orderer0.example.com | "2019-04-22 06:18:09.652 UTC [common.deliver] deliverBlocks -> DEBU 1f05 [channel: testchainid] Done delivering to 192.168.224.9:34796 for (0xc0004164c0)" +orderer0.example.com | "2019-04-22 06:18:09.652 UTC [common.deliver] Handle -> DEBU 1f06 Waiting for new SeekInfo from 192.168.224.9:34796" +orderer0.example.com | "2019-04-22 06:18:09.652 UTC [common.deliver] Handle -> DEBU 1f07 Attempting to read seek info message from 192.168.224.9:34796" +orderer0.example.com | "2019-04-22 06:18:09.660 UTC [grpc] infof -> DEBU 1f08 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:09.660 UTC [common.deliver] Handle -> WARN 1f09 Error reading from 192.168.224.9:34796: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:09.660 UTC [orderer.common.server] func1 -> DEBU 1f0a Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:09.660 UTC [comm.grpc.server] 1 -> INFO 1f0b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34796 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0027ms +orderer0.example.com | "2019-04-22 06:18:09.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f0c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:09.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f0d Sending msg of 28 bytes to 3 on channel testchainid took 58µs" +orderer0.example.com | "2019-04-22 06:18:09.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.4µs " +orderer0.example.com | "2019-04-22 06:18:09.844 UTC [orderer.common.server] Deliver -> DEBU 1f0f Starting new Deliver handler" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [common.deliver] Handle -> DEBU 1f10 Starting new deliver loop for 192.168.224.9:34798" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [common.deliver] Handle -> DEBU 1f11 Attempting to read seek info message from 192.168.224.9:34798" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f16 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [cauthdsl] func1 -> DEBU 1f17 0xc0013bcdb0 gate 1555913889845850700 evaluation starts" +orderer0.example.com | "2019-04-22 06:18:09.845 UTC [cauthdsl] func2 -> DEBU 1f18 0xc0013bcdb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [cauthdsl] func2 -> DEBU 1f19 0xc0013bcdb0 processing identity 0 with bytes of ebaeb0" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [cauthdsl] func2 -> DEBU 1f1a 0xc0013bcdb0 principal matched by identity 0" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [msp.identity] Verify -> DEBU 1f1b Verify: digest = 00000000 24 d2 b3 46 68 4c 66 6e f9 ee 13 79 9f f7 eb dc |$..FhLfn...y....| +orderer0.example.com | 00000010 61 2e 11 34 02 08 d6 95 c7 fb 20 06 a4 de 39 ae |a..4...... ...9.|" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [msp.identity] Verify -> DEBU 1f1c Verify: sig = 00000000 30 44 02 20 2d e6 4b 34 a9 d8 c0 54 de 05 4d 63 |0D. -.K4...T..Mc| +orderer0.example.com | 00000010 f7 09 43 42 43 b9 7f dc 63 d8 49 53 d2 72 ec 3a |..CBC...c.IS.r.:| +orderer0.example.com | 00000020 55 4c b9 a2 02 20 48 c6 50 c6 aa c9 b4 d2 64 c1 |UL... H.P.....d.| +orderer0.example.com | 00000030 39 7a 72 c0 b5 fe ab ec 7e 22 3c ac 6b 1c 25 e7 |9zr.....~"<.k.%.| +orderer0.example.com | 00000040 79 8e ab c3 f0 9c |y.....|" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [cauthdsl] func2 -> DEBU 1f1d 0xc0013bcdb0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [cauthdsl] func1 -> DEBU 1f1e 0xc0013bcdb0 gate 1555913889845850700 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [policies] Evaluate -> DEBU 1f1f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [policies] Evaluate -> DEBU 1f20 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-04-22 06:18:09.846 UTC [policies] Evaluate -> DEBU 1f21 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.847 UTC [policies] Evaluate -> DEBU 1f22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-04-22 06:18:09.847 UTC [policies] Evaluate -> DEBU 1f23 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.847 UTC [policies] Evaluate -> DEBU 1f24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-04-22 06:18:09.847 UTC [common.deliver] deliverBlocks -> DEBU 1f25 [channel: testchainid] Received seekInfo (0xc000416540) start: > stop: > from 192.168.224.9:34798" +orderer0.example.com | "2019-04-22 06:18:09.847 UTC [fsblkstorage] Next -> DEBU 1f26 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-04-22 06:18:09.847 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f27 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +orderer0.example.com | "2019-04-22 06:18:09.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f28 Remaining bytes=[25828], Going to peek [8] bytes" +orderer0.example.com | "2019-04-22 06:18:09.848 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f29 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +orderer0.example.com | "2019-04-22 06:18:09.848 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f2a blockbytes [25825] read from file [0]" +orderer0.example.com | "2019-04-22 06:18:09.848 UTC [common.deliver] deliverBlocks -> DEBU 1f2b [channel: testchainid] Delivering block [1] for (0xc000416540) for 192.168.224.9:34798" +orderer0.example.com | "2019-04-22 06:18:09.849 UTC [common.deliver] deliverBlocks -> DEBU 1f2c [channel: testchainid] Done delivering to 192.168.224.9:34798 for (0xc000416540)" +orderer0.example.com | "2019-04-22 06:18:09.849 UTC [common.deliver] Handle -> DEBU 1f2d Waiting for new SeekInfo from 192.168.224.9:34798" +orderer0.example.com | "2019-04-22 06:18:09.849 UTC [common.deliver] Handle -> DEBU 1f2e Attempting to read seek info message from 192.168.224.9:34798" +orderer0.example.com | "2019-04-22 06:18:09.858 UTC [common.deliver] Handle -> WARN 1f2f Error reading from 192.168.224.9:34798: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:18:09.859 UTC [orderer.common.server] func1 -> DEBU 1f30 Closing Deliver stream" +orderer0.example.com | "2019-04-22 06:18:09.859 UTC [comm.grpc.server] 1 -> INFO 1f31 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34798 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.0248ms +orderer0.example.com | "2019-04-22 06:18:09.859 UTC [grpc] infof -> DEBU 1f32 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-04-22 06:18:10.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f33 Sending msg of 28 bytes to 3 on channel businesschannel took 45.2µs" +orderer0.example.com | "2019-04-22 06:18:10.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f34 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +orderer0.example.com | "2019-04-22 06:18:10.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.4µs " +orderer0.example.com | "2019-04-22 06:18:10.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.3µs " +orderer0.example.com | "2019-04-22 06:18:10.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f37 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:10.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f38 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:10.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f39 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:10.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f3a Sending msg of 28 bytes to 3 on channel testchainid took 35.8µs" +orderer0.example.com | "2019-04-22 06:18:10.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.5µs " +orderer0.example.com | "2019-04-22 06:18:10.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f3c Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +orderer0.example.com | "2019-04-22 06:18:10.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f3d Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-04-22 06:18:10.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95µs " +orderer0.example.com | "2019-04-22 06:18:10.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +orderer0.example.com | "2019-04-22 06:18:10.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f40 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:10.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f41 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:10.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f42 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:10.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f43 Sending msg of 28 bytes to 3 on channel testchainid took 34.2µs" +orderer0.example.com | "2019-04-22 06:18:10.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.4µs " +orderer0.example.com | "2019-04-22 06:18:11.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f45 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +orderer0.example.com | "2019-04-22 06:18:11.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f46 Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-04-22 06:18:11.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.1µs " +orderer0.example.com | "2019-04-22 06:18:11.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.4µs " +orderer0.example.com | "2019-04-22 06:18:11.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f49 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:11.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f4a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:11.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f4b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:17:01.184 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 173b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:01.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.184 UTC [policies] Evaluate -> DEBU 173e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.184 UTC [policies] Evaluate -> DEBU 173f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [policies] Evaluate -> DEBU 1740 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [cauthdsl] func1 -> DEBU 1741 0xc003e044f0 gate 1555913821185149700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1742 0xc003e044f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1743 0xc003e044f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1744 0xc003e044f0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [msp.identity] Verify -> DEBU 1745 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [msp.identity] Verify -> DEBU 1746 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1747 0xc003e044f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [cauthdsl] func1 -> DEBU 1748 0xc003e044f0 gate 1555913821185149700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:01.185 UTC [policies] Evaluate -> DEBU 1749 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [policies] Evaluate -> DEBU 174a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [policies] Evaluate -> DEBU 174b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [policies] Evaluate -> DEBU 174c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [gossip.gossip] handleMessage -> DEBU 174d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [gossip.gossip] handleMessage -> DEBU 174e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [gossip.gossip] handleMessage -> DEBU 174f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1750 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.186 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1751 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1752 Verify: digest = 00000000 7f a0 a5 1b 8d fc 96 77 2b 0d f1 60 29 2c 8e dc |.......w+..`),..| +peer0.org1.example.com | 00000010 a3 92 d6 0f 5f 4e cb ee 9c bd f7 03 e3 5e 4c 76 |...._N.......^Lv|" +peer0.org1.example.com | "2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1753 Verify: sig = 00000000 30 44 02 20 7e a2 0a 30 da 12 42 95 92 01 fe ed |0D. ~..0..B.....| +peer0.org1.example.com | 00000010 36 a6 f3 e3 2e f8 8d f5 7e b9 0f db ed c4 78 86 |6.......~.....x.| +peer0.org1.example.com | 00000020 0d 2d 95 c3 02 20 3d 41 1f c1 c3 a3 48 ff 0b de |.-... =A....H...| +peer0.org1.example.com | 00000030 1a ef ae a5 53 ec b5 12 99 62 cc b6 9d 73 15 12 |....S....b...s..| +peer0.org1.example.com | 00000040 c2 52 fc bd 75 cd |.R..u.|" +peer0.org1.example.com | "2019-04-22 06:17:01.187 UTC [msp] DeserializeIdentity -> DEBU 1754 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1755 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1756 Verify: sig = 00000000 30 44 02 20 01 d9 60 8a 36 5a 8b 4d ca 1b ea 5d |0D. ..`.6Z.M...]| +peer0.org1.example.com | 00000010 28 06 16 1b 72 1d 7f 88 c0 16 2e ff ef 3f d4 6f |(...r........?.o| +peer0.org1.example.com | 00000020 92 55 26 26 02 20 6c 5a 5d 75 b0 fc 6e bc e9 fa |.U&&. lZ]u..n...| +peer0.org1.example.com | 00000030 27 22 ab fe 21 0d c0 3e 5a e2 63 4b c1 05 3f 14 |'"..!..>Z.cK..?.| +peer0.org1.example.com | 00000040 89 38 2a 94 9b 65 |.8*..e|" +peer0.org1.example.com | "2019-04-22 06:17:01.188 UTC [msp] DeserializeIdentity -> DEBU 1757 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.190 UTC [gossip.comm] Send -> DEBU 1758 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" +peer0.org1.example.com | "2019-04-22 06:17:01.193 UTC [msp] DeserializeIdentity -> DEBU 1759 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.194 UTC [msp] DeserializeIdentity -> DEBU 175a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.195 UTC [gossip.comm] sendToEndpoint -> DEBU 175b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.195 UTC [gossip.comm] sendToEndpoint -> DEBU 175c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.196 UTC [gossip.comm] sendToEndpoint -> DEBU 175d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.196 UTC [gossip.comm] sendToEndpoint -> DEBU 175e Exiting" +orderer0.example.com | "2019-04-22 06:18:11.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f4c Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +orderer0.example.com | "2019-04-22 06:18:11.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.5µs " +orderer0.example.com | "2019-04-22 06:18:11.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f4e Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-04-22 06:18:11.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f4f Sending msg of 28 bytes to 3 on channel businesschannel took 84.6µs" +orderer0.example.com | "2019-04-22 06:18:11.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.3µs " +orderer0.example.com | "2019-04-22 06:18:11.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f52 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:11.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.5µs " +orderer0.example.com | "2019-04-22 06:18:11.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f53 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f54 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:11.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f55 Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +orderer0.example.com | "2019-04-22 06:18:11.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.6µs " +orderer0.example.com | "2019-04-22 06:18:12.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f57 Sending msg of 28 bytes to 2 on channel businesschannel took 188.2µs" +orderer0.example.com | "2019-04-22 06:18:12.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 197.6µs " +orderer0.example.com | "2019-04-22 06:18:12.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f59 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:12.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f5a Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" +orderer0.example.com | "2019-04-22 06:18:12.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296µs " +orderer0.example.com | "2019-04-22 06:18:12.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f5c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:12.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f5d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:12.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f5e Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +orderer0.example.com | "2019-04-22 06:18:12.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.9µs " +orderer0.example.com | "2019-04-22 06:18:12.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f60 Sending msg of 28 bytes to 2 on channel businesschannel took 45.2µs" +orderer0.example.com | "2019-04-22 06:18:12.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f62 Sending msg of 28 bytes to 3 on channel businesschannel took 43.6µs" +orderer0.example.com | "2019-04-22 06:18:12.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 632.2µs " +orderer0.example.com | "2019-04-22 06:18:12.574 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.4µs " +orderer0.example.com | "2019-04-22 06:18:12.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f64 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:12.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f65 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:12.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f66 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:12.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f67 Sending msg of 28 bytes to 3 on channel testchainid took 44.6µs" +orderer0.example.com | "2019-04-22 06:18:12.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 557µs " +orderer0.example.com | "2019-04-22 06:18:13.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f69 Sending msg of 28 bytes to 2 on channel businesschannel took 32.5µs" +orderer0.example.com | "2019-04-22 06:18:13.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f6a Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2019-04-22 06:18:13.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.1µs " +orderer0.example.com | "2019-04-22 06:18:13.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177µs " +orderer0.example.com | "2019-04-22 06:18:13.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f6d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:13.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f6e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:13.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f6f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:13.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f70 Sending msg of 28 bytes to 3 on channel testchainid took 47.2µs" +peer0.org1.example.com | "2019-04-22 06:17:01.203 UTC [gossip.gossip] handleMessage -> DEBU 175f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1760 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1761 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1762 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 " +peer0.org1.example.com | "2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1763 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 " +peer0.org1.example.com | "2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1764 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1765 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.205 UTC [gossip.discovery] handleAliveMessage -> DEBU 1766 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1767 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1768 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1769 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.206 UTC [gossip.gossip] handleMessage -> DEBU 176a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.207 UTC [msp] DeserializeIdentity -> DEBU 176b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.233 UTC [msp] DeserializeIdentity -> DEBU 176d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.236 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.218 UTC [gossip.comm] func1 -> DEBU 176c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.237 UTC [gossip.gossip] handleMessage -> DEBU 176f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.237 UTC [gossip.gossip] handleMessage -> DEBU 1770 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.237 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1771 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.237 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1772 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.238 UTC [gossip.comm] Send -> DEBU 1773 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:01.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1774 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1775 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.241 UTC [msp] DeserializeIdentity -> DEBU 1776 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.244 UTC [gossip.comm] Send -> DEBU 1777 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:01.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1778 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1779 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.471 UTC [gossip.election] waitForInterrupt -> DEBU 177a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.472 UTC [gossip.election] IsLeader -> DEBU 177b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:01.472 UTC [msp.identity] Sign -> DEBU 177c Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510051801 " +peer0.org1.example.com | "2019-04-22 06:17:01.472 UTC [msp.identity] Sign -> DEBU 177d Sign: digest: 54E7B83CDCCFDAB50094E59165131DF3DCC1CD56B094A17F3BED5A55645F66D6 " +peer0.org1.example.com | "2019-04-22 06:17:01.472 UTC [gossip.election] waitForInterrupt -> DEBU 177e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:01.478 UTC [msp] DeserializeIdentity -> DEBU 177f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.478 UTC [msp] DeserializeIdentity -> DEBU 1780 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.479 UTC [msp] DeserializeIdentity -> DEBU 1781 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.480 UTC [msp] DeserializeIdentity -> DEBU 1782 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.480 UTC [gossip.comm] Send -> DEBU 1783 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:01.480 UTC [msp] DeserializeIdentity -> DEBU 1784 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.481 UTC [msp] DeserializeIdentity -> DEBU 1785 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.481 UTC [gossip.comm] sendToEndpoint -> DEBU 1786 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.481 UTC [gossip.comm] sendToEndpoint -> DEBU 1787 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.600 UTC [endorser] ProcessProposal -> DEBU 1788 Entering: request from 192.168.224.9:49280" +peer0.org1.example.com | "2019-04-22 06:17:01.600 UTC [protoutils] ValidateProposalMessage -> DEBU 1789 ValidateProposalMessage starts for signed proposal 0xc003dad130" +peer0.org1.example.com | "2019-04-22 06:17:01.600 UTC [protoutils] validateChannelHeader -> DEBU 178a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:01.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 178b begin" +peer0.org1.example.com | "2019-04-22 06:17:01.601 UTC [msp] GetManagerForChain -> DEBU 178c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:01.601 UTC [protoutils] checkSignatureFromCreator -> DEBU 178d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:01.601 UTC [protoutils] checkSignatureFromCreator -> DEBU 178e creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:01.601 UTC [msp.identity] Verify -> DEBU 178f Verify: digest = 00000000 d6 57 4e 63 27 ee aa d6 8e 3a 88 0d 03 94 7e f7 |.WNc'....:....~.| +peer0.org1.example.com | 00000010 d8 14 e0 bf 5e ba 3f 56 f3 b2 05 76 23 61 dd c6 |....^.?V...v#a..|" +peer0.org1.example.com | "2019-04-22 06:17:01.602 UTC [msp.identity] Verify -> DEBU 1790 Verify: sig = 00000000 30 45 02 21 00 92 84 2b b3 6c fb 80 17 d1 4b 3d |0E.!...+.l....K=| +peer0.org1.example.com | 00000010 7c 78 4c c1 5a 6b 6b 5d 09 ac c9 e1 52 a7 78 71 ||xL.Zkk]....R.xq| +peer0.org1.example.com | 00000020 bb c2 79 55 22 02 20 19 05 4e 6c 99 00 e2 86 45 |..yU". ..Nl....E| +peer0.org1.example.com | 00000030 59 85 63 cc 9e 35 19 2a cc 6f 14 c1 7d 1a 45 89 |Y.c..5.*.o..}.E.| +peer0.org1.example.com | 00000040 9b bd 0e 8b 5a 28 6f |....Z(o|" +peer0.org1.example.com | "2019-04-22 06:17:01.602 UTC [protoutils] checkSignatureFromCreator -> DEBU 1791 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:01.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1792 validateChaincodeProposalMessage starts for proposal 0xc003c98e70, header 0xc003dad540" +peer0.org1.example.com | "2019-04-22 06:17:01.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1793 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:17:01.603 UTC [endorser] preProcess -> DEBU 1794 [businesschannel][d64f027b] processing txid: d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59" +peer0.org1.example.com | "2019-04-22 06:17:01.603 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1795 retrieveTransactionByID() - txId = [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +peer0.org1.example.com | "2019-04-22 06:17:01.604 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1796 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:01.604 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1797 constructing new tx simulator txid = [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +peer0.org1.example.com | "2019-04-22 06:17:01.604 UTC [endorser] SimulateProposal -> DEBU 1798 [businesschannel][d64f027b] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:17:01.605 UTC [endorser] callChaincode -> INFO 1799 [businesschannel][d64f027b] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:17:01.605 UTC [chaincode] Execute -> DEBU 179a Entry" +peer0.org1.example.com | "2019-04-22 06:17:01.605 UTC [aclmgmt] CheckACL -> DEBU 179b acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition" +peer0.org1.example.com | "2019-04-22 06:17:01.605 UTC [aclmgmt] CheckACL -> DEBU 179c acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:17:01.605 UTC [policies] Evaluate -> DEBU 179d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.606 UTC [policies] Evaluate -> DEBU 179e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:01.606 UTC [policies] Evaluate -> DEBU 179f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.606 UTC [cauthdsl] func1 -> DEBU 17a0 0xc003ea0a40 gate 1555913821606638700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:01.606 UTC [cauthdsl] func2 -> DEBU 17a1 0xc003ea0a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:01.607 UTC [cauthdsl] func2 -> DEBU 17a2 0xc003ea0a40 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:01.607 UTC [cauthdsl] func2 -> DEBU 17a3 0xc003ea0a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:01.607 UTC [cauthdsl] func2 -> DEBU 17a4 0xc003ea0a40 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:01.607 UTC [cauthdsl] func1 -> DEBU 17a5 0xc003ea0a40 gate 1555913821606638700 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:01.608 UTC [policies] Evaluate -> DEBU 17a6 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.608 UTC [policies] Evaluate -> DEBU 17a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.608 UTC [policies] Evaluate -> DEBU 17a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.609 UTC [cauthdsl] func1 -> DEBU 17a9 0xc003ea1280 gate 1555913821609009000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:01.609 UTC [cauthdsl] func2 -> DEBU 17aa 0xc003ea1280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:01.609 UTC [cauthdsl] func2 -> DEBU 17ab 0xc003ea1280 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:01.609 UTC [cauthdsl] func2 -> DEBU 17ac 0xc003ea1280 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.610 UTC [msp.identity] Verify -> DEBU 17ad Verify: digest = 00000000 d6 57 4e 63 27 ee aa d6 8e 3a 88 0d 03 94 7e f7 |.WNc'....:....~.| +peer0.org1.example.com | 00000010 d8 14 e0 bf 5e ba 3f 56 f3 b2 05 76 23 61 dd c6 |....^.?V...v#a..|" +peer0.org1.example.com | "2019-04-22 06:17:01.610 UTC [msp.identity] Verify -> DEBU 17ae Verify: sig = 00000000 30 45 02 21 00 92 84 2b b3 6c fb 80 17 d1 4b 3d |0E.!...+.l....K=| +peer0.org1.example.com | 00000010 7c 78 4c c1 5a 6b 6b 5d 09 ac c9 e1 52 a7 78 71 ||xL.Zkk]....R.xq| +peer0.org1.example.com | 00000020 bb c2 79 55 22 02 20 19 05 4e 6c 99 00 e2 86 45 |..yU". ..Nl....E| +peer0.org1.example.com | 00000030 59 85 63 cc 9e 35 19 2a cc 6f 14 c1 7d 1a 45 89 |Y.c..5.*.o..}.E.| +peer0.org1.example.com | 00000040 9b bd 0e 8b 5a 28 6f |....Z(o|" +peer0.org1.example.com | "2019-04-22 06:17:01.610 UTC [cauthdsl] func2 -> DEBU 17af 0xc003ea1280 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-04-22 06:18:13.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.7µs " +orderer0.example.com | "2019-04-22 06:18:13.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f72 Sending msg of 28 bytes to 3 on channel businesschannel took 28.7µs" +orderer0.example.com | "2019-04-22 06:18:13.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f73 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +orderer0.example.com | "2019-04-22 06:18:13.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.3µs " +orderer0.example.com | "2019-04-22 06:18:13.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.4µs " +orderer0.example.com | "2019-04-22 06:18:13.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f76 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:13.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f77 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:14.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f78 Sending msg of 28 bytes to 2 on channel businesschannel took 43.6µs" +orderer0.example.com | "2019-04-22 06:18:14.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f79 Sending msg of 28 bytes to 3 on channel businesschannel took 32.8µs" +orderer0.example.com | "2019-04-22 06:18:14.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.4µs " +orderer0.example.com | "2019-04-22 06:18:14.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.7µs " +orderer0.example.com | "2019-04-22 06:18:14.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f7c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:14.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f7d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:14.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f7e Sending msg of 28 bytes to 3 on channel testchainid took 33.3µs" +orderer0.example.com | "2019-04-22 06:18:14.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f7f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.8µs " +orderer0.example.com | "2019-04-22 06:18:14.718 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f80 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:14.742 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f81 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:14.742 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f82 Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +orderer0.example.com | "2019-04-22 06:18:14.743 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.7µs " +orderer0.example.com | "2019-04-22 06:18:15.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f84 Sending msg of 28 bytes to 2 on channel businesschannel took 70.4µs" +orderer0.example.com | "2019-04-22 06:18:15.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f85 Sending msg of 28 bytes to 3 on channel businesschannel took 37.9µs" +orderer0.example.com | "2019-04-22 06:18:15.082 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.8µs " +orderer0.example.com | "2019-04-22 06:18:15.082 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " +orderer0.example.com | "2019-04-22 06:18:15.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f88 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:15.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f89 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:15.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f8a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:15.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f8b Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-04-22 06:18:15.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216µs " +orderer0.example.com | "2019-04-22 06:18:15.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f8d Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +orderer0.example.com | "2019-04-22 06:18:15.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f8e Sending msg of 28 bytes to 3 on channel businesschannel took 137.2µs" +orderer0.example.com | "2019-04-22 06:18:15.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.2µs " +orderer0.example.com | "2019-04-22 06:18:15.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.6µs " +orderer0.example.com | "2019-04-22 06:18:15.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f91 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:15.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f92 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:15.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f94 Sending msg of 28 bytes to 3 on channel testchainid took 29.7µs" +orderer0.example.com | "2019-04-22 06:18:15.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +orderer0.example.com | "2019-04-22 06:18:16.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f96 Sending msg of 28 bytes to 2 on channel businesschannel took 63µs" +orderer0.example.com | "2019-04-22 06:18:16.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f97 Sending msg of 28 bytes to 3 on channel businesschannel took 31.1µs" +peer0.org1.example.com | "2019-04-22 06:17:01.610 UTC [cauthdsl] func1 -> DEBU 17b0 0xc003ea1280 gate 1555913821609009000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:01.610 UTC [policies] Evaluate -> DEBU 17b1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.610 UTC [policies] Evaluate -> DEBU 17b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.611 UTC [policies] Evaluate -> DEBU 17b3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.611 UTC [policies] Evaluate -> DEBU 17b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.612 UTC [lifecycle] QueryChaincodeDefinition -> DEBU 17b5 received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'" +peer0.org1.example.com | "2019-04-22 06:17:01.612 UTC [chaincode] handleMessage -> DEBU 17b6 [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:01.613 UTC [chaincode] HandleTransaction -> DEBU 17b7 [d64f027b] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:01.613 UTC [chaincode] HandleGetState -> DEBU 17b8 [d64f027b] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:01.614 UTC [stateleveldb] GetState -> DEBU 17b9 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-04-22 06:17:01.614 UTC [chaincode] HandleTransaction -> DEBU 17ba [d64f027b] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:01.615 UTC [chaincode] handleMessage -> DEBU 17bb [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:01.615 UTC [chaincode] HandleTransaction -> DEBU 17bc [d64f027b] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:01.615 UTC [chaincode] HandleGetState -> DEBU 17bd [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:01.615 UTC [stateleveldb] GetState -> DEBU 17be GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:01.615 UTC [chaincode] HandleTransaction -> DEBU 17bf [d64f027b] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:01.616 UTC [chaincode] handleMessage -> DEBU 17c0 [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:01.616 UTC [chaincode] HandleTransaction -> DEBU 17c1 [d64f027b] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:01.616 UTC [chaincode] HandleGetState -> DEBU 17c2 [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:01.616 UTC [stateleveldb] GetState -> DEBU 17c3 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-04-22 06:17:01.617 UTC [chaincode] HandleTransaction -> DEBU 17c4 [d64f027b] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:01.617 UTC [chaincode] handleMessage -> DEBU 17c5 [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:01.617 UTC [chaincode] HandleTransaction -> DEBU 17c6 [d64f027b] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:01.617 UTC [chaincode] HandleGetState -> DEBU 17c7 [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:01.617 UTC [stateleveldb] GetState -> DEBU 17c8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-04-22 06:17:01.617 UTC [chaincode] HandleTransaction -> DEBU 17c9 [d64f027b] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:01.618 UTC [chaincode] handleMessage -> DEBU 17ca [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:01.618 UTC [chaincode] HandleTransaction -> DEBU 17cb [d64f027b] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:01.618 UTC [chaincode] HandleGetState -> DEBU 17cc [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:01.618 UTC [stateleveldb] GetState -> DEBU 17cd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-04-22 06:17:01.618 UTC [chaincode] HandleTransaction -> DEBU 17ce [d64f027b] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:01.618 UTC [lifecycle] QueryChaincodeDefinition -> INFO 17cf successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org1.example.com | "2019-04-22 06:17:01.619 UTC [chaincode] handleMessage -> DEBU 17d0 [d64f027b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:01.619 UTC [chaincode] Notify -> DEBU 17d1 [d64f027b] notifying Txid:d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:01.619 UTC [chaincode] Execute -> DEBU 17d2 Exit" +peer0.org1.example.com | "2019-04-22 06:17:01.620 UTC [endorser] callChaincode -> INFO 17d3 [businesschannel][d64f027b] Exit chaincode: name:"_lifecycle" (15ms)" +peer0.org1.example.com | "2019-04-22 06:17:01.620 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 17d4 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:01.620 UTC [lockbasedtxmgr] Done -> DEBU 17d5 Done with transaction simulation / query execution [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +peer0.org1.example.com | "2019-04-22 06:17:01.621 UTC [endorser] SimulateProposal -> DEBU 17d6 [businesschannel][d64f027b] Exit" +peer0.org1.example.com | "2019-04-22 06:17:01.621 UTC [endorser] endorseProposal -> DEBU 17d7 [businesschannel][d64f027b] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:17:01.621 UTC [endorser] endorseProposal -> DEBU 17d8 [businesschannel][d64f027b] escc for chaincode name:"_lifecycle" is escc" +peer0.org1.example.com | "2019-04-22 06:17:01.621 UTC [endorser] EndorseWithPlugin -> DEBU 17d9 Entering endorsement for {plugin: escc, channel: businesschannel, tx: d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:17:01.621 UTC [msp.identity] Sign -> DEBU 17da Sign: plaintext: 0A205F50B26EA97BFBBD9F693102A809...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:01.622 UTC [msp.identity] Sign -> DEBU 17db Sign: digest: FC317AC4C3ACD202401BBFB5E624FEF4452E4588543E1D1C5AA8817B7A41DF80 " +peer0.org1.example.com | "2019-04-22 06:17:01.622 UTC [endorser] EndorseWithPlugin -> DEBU 17dc Exiting {plugin: escc, channel: businesschannel, tx: d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59, chaincode: _lifecycle}" +peer0.org1.example.com | "2019-04-22 06:17:01.622 UTC [endorser] endorseProposal -> DEBU 17dd [businesschannel][d64f027b] Exit" +peer0.org1.example.com | "2019-04-22 06:17:01.623 UTC [lockbasedtxmgr] Done -> DEBU 17de Done with transaction simulation / query execution [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +peer0.org1.example.com | "2019-04-22 06:17:01.623 UTC [endorser] func1 -> DEBU 17df Exit: request from 192.168.224.9:49280" +peer0.org1.example.com | "2019-04-22 06:17:01.624 UTC [comm.grpc.server] 1 -> INFO 17e0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49280 grpc.code=OK grpc.call_duration=24.5399ms +peer0.org1.example.com | "2019-04-22 06:17:01.626 UTC [gossip.comm] func1 -> DEBU 17e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.626 UTC [gossip.gossip] handleMessage -> DEBU 17e2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.626 UTC [gossip.gossip] handleMessage -> DEBU 17e3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17e5 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:01.627 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.628 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:01.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17e8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17e9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:01.628 UTC [policies] Evaluate -> DEBU 17ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.629 UTC [policies] Evaluate -> DEBU 17eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:01.629 UTC [policies] Evaluate -> DEBU 17ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:01.630 UTC [cauthdsl] func1 -> DEBU 17ed 0xc003ebba70 gate 1555913821629783000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:01.630 UTC [cauthdsl] func2 -> DEBU 17ee 0xc003ebba70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:01.630 UTC [cauthdsl] func2 -> DEBU 17ef 0xc003ebba70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:01.630 UTC [cauthdsl] func2 -> DEBU 17f0 0xc003ebba70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.631 UTC [msp.identity] Verify -> DEBU 17f1 Verify: digest = 00000000 cd 80 55 f1 85 b9 80 23 0a e5 1f 37 08 f6 8d 4a |..U....#...7...J| +peer0.org1.example.com | 00000010 27 5c 05 60 3d fd 8b b4 48 de bf 45 42 31 2f e6 |'\.`=...H..EB1/.|" +peer0.org1.example.com | "2019-04-22 06:17:01.631 UTC [msp.identity] Verify -> DEBU 17f2 Verify: sig = 00000000 30 45 02 21 00 d1 ae c5 0e a5 04 a0 3a 93 53 74 |0E.!........:.St| +peer0.org1.example.com | 00000010 4b 89 48 35 5d 3b b4 b6 b4 fc a0 87 7f a4 a9 2c |K.H5];.........,| +peer0.org1.example.com | 00000020 b2 0d c5 9a a3 02 20 28 1d 66 fb 7d 01 a7 52 5f |...... (.f.}..R_| +peer0.org1.example.com | 00000030 af f0 13 8c 6c ac ec ce 40 15 87 9f 13 0e 3a ee |....l...@.....:.| +peer0.org1.example.com | 00000040 a9 cf 20 c7 70 84 4c |.. .p.L|" +peer0.org1.example.com | "2019-04-22 06:17:01.636 UTC [cauthdsl] func2 -> DEBU 17f3 0xc003ebba70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:01.637 UTC [cauthdsl] func1 -> DEBU 17f4 0xc003ebba70 gate 1555913821629783000 evaluation succeeds" +orderer0.example.com | "2019-04-22 06:18:16.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.8µs " +orderer0.example.com | "2019-04-22 06:18:16.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4074ms " +orderer0.example.com | "2019-04-22 06:18:16.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f9a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:16.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f9b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:16.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f9c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:16.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f9d Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +orderer0.example.com | "2019-04-22 06:18:16.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.5µs " +orderer0.example.com | "2019-04-22 06:18:16.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fa0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.1µs " +orderer0.example.com | "2019-04-22 06:18:16.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fa1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:16.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f9f Sending msg of 28 bytes to 3 on channel businesschannel took 91.3µs" +orderer0.example.com | "2019-04-22 06:18:16.574 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa2 Sending msg of 28 bytes to 2 on channel businesschannel took 71.3µs" +orderer0.example.com | "2019-04-22 06:18:16.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 300.1µs " +orderer0.example.com | "2019-04-22 06:18:16.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fa4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:16.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fa5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:16.761 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa6 Sending msg of 28 bytes to 3 on channel testchainid took 34.8µs" +orderer0.example.com | "2019-04-22 06:18:16.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.3µs " +orderer0.example.com | "2019-04-22 06:18:17.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa8 Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +orderer0.example.com | "2019-04-22 06:18:17.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" +orderer0.example.com | "2019-04-22 06:18:17.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1faa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " +orderer0.example.com | "2019-04-22 06:18:17.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fab Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:17.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4591ms " +orderer0.example.com | "2019-04-22 06:18:17.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fad Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:17.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fae Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:17.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.5µs " +orderer0.example.com | "2019-04-22 06:18:17.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1faf Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +orderer0.example.com | "2019-04-22 06:18:17.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fb1 Sending msg of 28 bytes to 2 on channel businesschannel took 33.1µs" +orderer0.example.com | "2019-04-22 06:18:17.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fb2 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-04-22 06:18:17.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +orderer0.example.com | "2019-04-22 06:18:17.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120µs " +orderer0.example.com | "2019-04-22 06:18:17.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fb5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:17.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fb6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:17.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fb7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:17.731 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fb8 Sending msg of 28 bytes to 3 on channel testchainid took 35.7µs" +orderer0.example.com | "2019-04-22 06:18:17.733 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.6µs " +orderer0.example.com | "2019-04-22 06:18:18.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fba Sending msg of 28 bytes to 3 on channel businesschannel took 59µs" +orderer0.example.com | "2019-04-22 06:18:18.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fbb Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" +orderer0.example.com | "2019-04-22 06:18:18.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163.4µs " +orderer0.example.com | "2019-04-22 06:18:18.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.2µs " +orderer0.example.com | "2019-04-22 06:18:18.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fbe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:18.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fbf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:18.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:18.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc1 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +orderer0.example.com | "2019-04-22 06:18:18.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.8µs " +orderer0.example.com | "2019-04-22 06:18:18.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc3 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +orderer0.example.com | "2019-04-22 06:18:18.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-04-22 06:18:18.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96µs " +orderer0.example.com | "2019-04-22 06:18:18.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.1µs " +orderer0.example.com | "2019-04-22 06:18:18.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:18.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:18.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:18.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fca Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +orderer0.example.com | "2019-04-22 06:18:18.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +orderer0.example.com | "2019-04-22 06:18:19.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fcc Sending msg of 28 bytes to 2 on channel businesschannel took 40.6µs" +orderer0.example.com | "2019-04-22 06:18:19.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.8µs " +orderer0.example.com | "2019-04-22 06:18:19.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.9µs " +orderer0.example.com | "2019-04-22 06:18:19.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fcf Sending msg of 28 bytes to 3 on channel businesschannel took 2.3235ms" +orderer0.example.com | "2019-04-22 06:18:19.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:19.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:19.231 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:19.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fd3 Sending msg of 28 bytes to 3 on channel testchainid took 31.9µs" +orderer0.example.com | "2019-04-22 06:18:19.232 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fd4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +orderer0.example.com | "2019-04-22 06:18:19.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fd5 Sending msg of 28 bytes to 2 on channel businesschannel took 82.9µs" +orderer0.example.com | "2019-04-22 06:18:19.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fd6 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-04-22 06:18:19.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.8µs " +orderer0.example.com | "2019-04-22 06:18:19.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " +orderer0.example.com | "2019-04-22 06:18:19.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:19.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fda Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:19.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fdb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:19.728 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fdc Sending msg of 28 bytes to 3 on channel testchainid took 34.7µs" +orderer0.example.com | "2019-04-22 06:18:19.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fdd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.2µs " +orderer0.example.com | "2019-04-22 06:18:20.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fde Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-04-22 06:18:20.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fdf Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +orderer0.example.com | "2019-04-22 06:18:20.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.5µs " +orderer0.example.com | "2019-04-22 06:18:20.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.5µs " +orderer0.example.com | "2019-04-22 06:18:20.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fe2 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:17:01.638 UTC [policies] Evaluate -> DEBU 17f5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.639 UTC [policies] Evaluate -> DEBU 17f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.639 UTC [policies] Evaluate -> DEBU 17f7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.639 UTC [policies] Evaluate -> DEBU 17f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:01.647 UTC [grpc] infof -> DEBU 17f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:01.648 UTC [gossip.gossip] handleMessage -> DEBU 17fa Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-04-22 06:18:20.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fe3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:20.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fe4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:20.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fe5 Sending msg of 28 bytes to 3 on channel testchainid took 27.6µs" +orderer0.example.com | "2019-04-22 06:18:20.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +orderer0.example.com | "2019-04-22 06:18:20.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fe7 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +orderer0.example.com | "2019-04-22 06:18:20.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fe8 Sending msg of 28 bytes to 3 on channel businesschannel took 32.3µs" +orderer0.example.com | "2019-04-22 06:18:20.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.4µs " +orderer0.example.com | "2019-04-22 06:18:20.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.4µs " +orderer0.example.com | "2019-04-22 06:18:20.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1feb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:20.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fec Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:20.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fed Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:20.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fee Sending msg of 28 bytes to 3 on channel testchainid took 35.8µs" +orderer0.example.com | "2019-04-22 06:18:20.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.3µs " +orderer0.example.com | "2019-04-22 06:18:21.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff0 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-04-22 06:18:21.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff1 Sending msg of 28 bytes to 3 on channel businesschannel took 125.1µs" +orderer0.example.com | "2019-04-22 06:18:21.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ff2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.2µs " +orderer0.example.com | "2019-04-22 06:18:21.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ff3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:21.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2303ms " +orderer0.example.com | "2019-04-22 06:18:21.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ff5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:21.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ff6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:21.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff7 Sending msg of 28 bytes to 3 on channel testchainid took 27.1µs" +orderer0.example.com | "2019-04-22 06:18:21.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ff8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.8µs " +orderer0.example.com | "2019-04-22 06:18:21.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff9 Sending msg of 28 bytes to 2 on channel businesschannel took 58.1µs" +orderer0.example.com | "2019-04-22 06:18:21.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ffa Sending msg of 28 bytes to 3 on channel businesschannel took 32.5µs" +orderer0.example.com | "2019-04-22 06:18:21.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ffb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.7µs " +orderer0.example.com | "2019-04-22 06:18:21.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ffc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.6µs " +orderer0.example.com | "2019-04-22 06:18:21.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ffd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:21.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ffe Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:21.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fff Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:21.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2000 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.2µs " +orderer0.example.com | "2019-04-22 06:18:21.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2001 Sending msg of 28 bytes to 3 on channel testchainid took 156.5µs" +orderer0.example.com | "2019-04-22 06:18:22.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2002 Sending msg of 28 bytes to 2 on channel businesschannel took 52.1µs" +orderer0.example.com | "2019-04-22 06:18:22.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2003 Sending msg of 28 bytes to 3 on channel businesschannel took 47.5µs" +orderer0.example.com | "2019-04-22 06:18:22.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2004 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.8µs " +orderer0.example.com | "2019-04-22 06:18:22.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.3µs " +orderer0.example.com | "2019-04-22 06:18:22.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2006 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:22.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2007 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-04-22 06:17:01.650 UTC [gossip.comm] func1 -> DEBU 17fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.650 UTC [grpc] infof -> DEBU 17fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 17fd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 17fe Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:01.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 17ff updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 " +peer0.org1.example.com | "2019-04-22 06:17:01.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 1800 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 " +peer0.org1.example.com | "2019-04-22 06:17:01.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 1801 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:01.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 1802 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 1803 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.656 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1804 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.657 UTC [gossip.gossip] handleMessage -> DEBU 1805 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.658 UTC [gossip.gossip] handleMessage -> DEBU 1806 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.660 UTC [msp] DeserializeIdentity -> DEBU 1807 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.661 UTC [msp] DeserializeIdentity -> DEBU 1808 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.661 UTC [msp] DeserializeIdentity -> DEBU 1809 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.663 UTC [msp] DeserializeIdentity -> DEBU 180a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.663 UTC [msp] DeserializeIdentity -> DEBU 180b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.664 UTC [msp] DeserializeIdentity -> DEBU 180c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.666 UTC [msp] DeserializeIdentity -> DEBU 180d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.670 UTC [gossip.comm] Send -> DEBU 180e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:01.671 UTC [msp] DeserializeIdentity -> DEBU 180f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:01.674 UTC [gossip.comm] Send -> DEBU 1810 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:01.674 UTC [gossip.comm] sendToEndpoint -> DEBU 1811 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.674 UTC [gossip.comm] sendToEndpoint -> DEBU 1812 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.675 UTC [gossip.comm] sendToEndpoint -> DEBU 1813 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.675 UTC [gossip.comm] sendToEndpoint -> DEBU 1814 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1815 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1816 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:01.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1817 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:01.678 UTC [gossip.gossip] handleMessage -> DEBU 1818 Exiting" +orderer0.example.com | "2019-04-22 06:18:22.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2008 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:22.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2009 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +orderer0.example.com | "2019-04-22 06:18:22.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 200a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.8µs " +orderer0.example.com | "2019-04-22 06:18:22.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 200b Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" +orderer0.example.com | "2019-04-22 06:18:22.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 200c Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +orderer0.example.com | "2019-04-22 06:18:22.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 200d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.3µs " +orderer0.example.com | "2019-04-22 06:18:22.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 200e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.3µs " +orderer0.example.com | "2019-04-22 06:18:22.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 200f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:22.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2010 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:22.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2011 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:22.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2012 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +orderer0.example.com | "2019-04-22 06:18:22.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2013 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 444.1µs " +orderer0.example.com | "2019-04-22 06:18:23.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2014 Sending msg of 28 bytes to 2 on channel businesschannel took 39.3µs" +orderer0.example.com | "2019-04-22 06:18:23.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2015 Sending msg of 28 bytes to 3 on channel businesschannel took 82.6µs" +orderer0.example.com | "2019-04-22 06:18:23.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2016 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +orderer0.example.com | "2019-04-22 06:18:23.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " +orderer0.example.com | "2019-04-22 06:18:23.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2018 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:23.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2019 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:23.209 UTC [orderer.common.cluster.step] handleMessage -> DEBU 201a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:23.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 201b Sending msg of 28 bytes to 3 on channel testchainid took 32.3µs" +orderer0.example.com | "2019-04-22 06:18:23.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 201c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +orderer0.example.com | "2019-04-22 06:18:23.538 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 201d Sending msg of 28 bytes to 2 on channel businesschannel took 34.7µs" +orderer0.example.com | "2019-04-22 06:18:23.538 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 201e Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-04-22 06:18:23.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 201f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.4µs " +orderer0.example.com | "2019-04-22 06:18:23.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2020 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.8µs " +orderer0.example.com | "2019-04-22 06:18:23.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2021 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:23.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2022 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:23.718 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2023 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:23.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2024 Sending msg of 28 bytes to 3 on channel testchainid took 136.2µs" +orderer0.example.com | "2019-04-22 06:18:23.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2025 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.6µs " +orderer0.example.com | "2019-04-22 06:18:24.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2026 Sending msg of 28 bytes to 2 on channel businesschannel took 43.9µs" +orderer0.example.com | "2019-04-22 06:18:24.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2027 Sending msg of 28 bytes to 3 on channel businesschannel took 33.6µs" +orderer0.example.com | "2019-04-22 06:18:24.040 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2028 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 384.4µs " +orderer0.example.com | "2019-04-22 06:18:24.051 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2029 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:24.052 UTC [orderer.common.cluster.step] handleMessage -> DEBU 202a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:24.052 UTC [orderer.common.cluster.step] sendMessage -> DEBU 202b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 11.3727ms " +orderer0.example.com | "2019-04-22 06:18:24.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 202c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:24.195 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 202d Sending msg of 28 bytes to 3 on channel testchainid took 29µs" +peer0.org1.example.com | "2019-04-22 06:17:01.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1819 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [gossip.gossip] handleMessage -> DEBU 181a Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [gossip.gossip] handleMessage -> DEBU 181b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [gossip.discovery] handleMsgFromComm -> DEBU 181c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 181d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [msp] DeserializeIdentity -> DEBU 181e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 181f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1820 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1821 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [policies] Evaluate -> DEBU 1822 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [policies] Evaluate -> DEBU 1823 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:02.047 UTC [policies] Evaluate -> DEBU 1824 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [cauthdsl] func1 -> DEBU 1825 0xc003ef6410 gate 1555913822048019600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 1826 0xc003ef6410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 1827 0xc003ef6410 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 1828 0xc003ef6410 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [msp.identity] Verify -> DEBU 1829 Verify: digest = 00000000 26 89 6d 55 68 1e 53 f4 30 4d de 0c 97 53 41 ef |&.mUh.S.0M...SA.| +peer0.org1.example.com | 00000010 9c a6 0b 59 27 4d 8c 38 f9 69 5b ea 38 38 7d 4e |...Y'M.8.i[.88}N|" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [msp.identity] Verify -> DEBU 182a Verify: sig = 00000000 30 44 02 20 60 04 89 a8 92 ec d0 c8 79 94 78 a8 |0D. `.......y.x.| +peer0.org1.example.com | 00000010 04 fc 6a 8c 2e a5 2a 0d 33 45 be ad f3 26 da bb |..j...*.3E...&..| +peer0.org1.example.com | 00000020 93 fc f0 72 02 20 55 42 31 a8 3a 5c b6 36 b2 72 |...r. UB1.:\.6.r| +peer0.org1.example.com | 00000030 f8 29 67 b3 f1 07 d0 00 55 ab fd 62 37 13 a2 54 |.)g.....U..b7..T| +peer0.org1.example.com | 00000040 03 aa dd ab c2 62 |.....b|" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 182b 0xc003ef6410 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [cauthdsl] func1 -> DEBU 182c 0xc003ef6410 gate 1555913822048019600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 182d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 182e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 182f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 1830 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [gossip.discovery] handleAliveMessage -> DEBU 1831 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 1832 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:02.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 1833 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 " +peer0.org1.example.com | "2019-04-22 06:17:02.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 1834 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 " +peer0.org1.example.com | "2019-04-22 06:17:02.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 1835 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:02.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 1836 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.049 UTC [gossip.discovery] handleAliveMessage -> DEBU 1837 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.049 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1838 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 1839 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [msp] DeserializeIdentity -> DEBU 183e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [gossip.comm] Send -> DEBU 183f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [msp] DeserializeIdentity -> DEBU 1840 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [msp] DeserializeIdentity -> DEBU 1841 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [gossip.comm] Send -> DEBU 1842 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1843 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1844 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1845 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1846 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.057 UTC [gossip.comm] func1 -> DEBU 1847 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.057 UTC [gossip.gossip] handleMessage -> DEBU 1848 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.057 UTC [gossip.gossip] handleMessage -> DEBU 1849 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.061 UTC [gossip.comm] func1 -> DEBU 184c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.061 UTC [gossip.gossip] handleMessage -> DEBU 184d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.061 UTC [gossip.gossip] handleMessage -> DEBU 184e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.062 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.062 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1850 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.382 UTC [endorser] ProcessProposal -> DEBU 1851 Entering: request from 192.168.224.9:49288" +peer0.org1.example.com | "2019-04-22 06:17:02.382 UTC [protoutils] ValidateProposalMessage -> DEBU 1852 ValidateProposalMessage starts for signed proposal 0xc003ec1b30" +peer0.org1.example.com | "2019-04-22 06:17:02.382 UTC [protoutils] validateChannelHeader -> DEBU 1853 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:02.383 UTC [protoutils] checkSignatureFromCreator -> DEBU 1854 begin" +peer0.org1.example.com | "2019-04-22 06:17:02.383 UTC [msp] GetManagerForChain -> DEBU 1855 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:02.383 UTC [protoutils] checkSignatureFromCreator -> DEBU 1856 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:02.383 UTC [protoutils] checkSignatureFromCreator -> DEBU 1857 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:02.383 UTC [msp.identity] Verify -> DEBU 1858 Verify: digest = 00000000 22 22 7e a4 58 09 95 56 b9 66 ae 98 03 93 a9 7c |""~.X..V.f.....|| +peer0.org1.example.com | 00000010 4f 83 b8 e7 68 7d 79 00 d7 1e 40 40 2a 89 2f 8b |O...h}y...@@*./.|" +peer0.org1.example.com | "2019-04-22 06:17:02.383 UTC [msp.identity] Verify -> DEBU 1859 Verify: sig = 00000000 30 45 02 21 00 8e 68 d6 bb f7 48 67 f0 a2 00 6b |0E.!..h...Hg...k| +peer0.org1.example.com | 00000010 b2 35 cb c2 81 94 c3 ea a1 74 3d 65 9b ca e5 b5 |.5.......t=e....| +peer0.org1.example.com | 00000020 37 6e 32 de 10 02 20 79 f0 a5 e5 89 28 06 af c1 |7n2... y....(...| +orderer0.example.com | "2019-04-22 06:18:24.195 UTC [orderer.common.cluster.step] sendMessage -> DEBU 202e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +orderer0.example.com | "2019-04-22 06:18:24.539 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 202f Sending msg of 28 bytes to 3 on channel businesschannel took 73.5µs" +orderer0.example.com | "2019-04-22 06:18:24.539 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2030 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-04-22 06:18:24.539 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2031 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 335.7µs " +orderer0.example.com | "2019-04-22 06:18:24.540 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2032 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 196.1µs " +orderer0.example.com | "2019-04-22 06:18:24.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2033 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:24.542 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2034 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:24.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2035 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:24.693 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2036 Sending msg of 28 bytes to 3 on channel testchainid took 25.6µs" +orderer0.example.com | "2019-04-22 06:18:24.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2037 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.5µs " +orderer0.example.com | "2019-04-22 06:18:25.039 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2038 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.7µs " +orderer0.example.com | "2019-04-22 06:18:25.038 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2039 Sending msg of 28 bytes to 2 on channel businesschannel took 119.5µs" +orderer0.example.com | "2019-04-22 06:18:25.039 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 203a Sending msg of 28 bytes to 3 on channel businesschannel took 302.7µs" +orderer0.example.com | "2019-04-22 06:18:25.040 UTC [orderer.common.cluster.step] sendMessage -> DEBU 203b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.5µs " +orderer0.example.com | "2019-04-22 06:18:25.041 UTC [orderer.common.cluster.step] handleMessage -> DEBU 203c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:25.042 UTC [orderer.common.cluster.step] handleMessage -> DEBU 203d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:25.195 UTC [orderer.common.cluster.step] handleMessage -> DEBU 203e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-04-22 06:18:25.196 UTC [orderer.common.cluster.step] sendMessage -> DEBU 203f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.9µs " +orderer0.example.com | "2019-04-22 06:18:25.196 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2040 Sending msg of 28 bytes to 3 on channel testchainid took 151.7µs" +peer0.org1.example.com | 00000030 14 78 53 5a ce 31 9f 59 7a de 94 a0 ae 71 75 b3 |.xSZ.1.Yz....qu.| +peer0.org1.example.com | 00000040 ea 41 6f 6b c3 c4 1c |.Aok...|" +peer0.org1.example.com | "2019-04-22 06:17:02.384 UTC [protoutils] checkSignatureFromCreator -> DEBU 185a exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:02.384 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 185b validateChaincodeProposalMessage starts for proposal 0xc003f104d0, header 0xc003ec1f40" +peer0.org1.example.com | "2019-04-22 06:17:02.384 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 185c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:02.384 UTC [endorser] preProcess -> DEBU 185d [businesschannel][b6035b01] processing txid: b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead" +peer0.org1.example.com | "2019-04-22 06:17:02.385 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 185e retrieveTransactionByID() - txId = [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +peer0.org1.example.com | "2019-04-22 06:17:02.385 UTC [aclmgmt] CheckACL -> DEBU 185f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:02.385 UTC [aclmgmt] CheckACL -> DEBU 1860 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:02.385 UTC [policies] Evaluate -> DEBU 1861 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:02.385 UTC [policies] Evaluate -> DEBU 1862 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:02.386 UTC [policies] Evaluate -> DEBU 1863 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:02.386 UTC [cauthdsl] func1 -> DEBU 1864 0xc003f64d70 gate 1555913822386093400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1865 0xc003f64d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1866 0xc003f64d70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1867 0xc003f64d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1868 0xc003f64d70 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:02.387 UTC [cauthdsl] func1 -> DEBU 1869 0xc003f64d70 gate 1555913822386093400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:02.387 UTC [policies] Evaluate -> DEBU 186a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:02.387 UTC [policies] Evaluate -> DEBU 186b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:02.388 UTC [policies] Evaluate -> DEBU 186c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:02.388 UTC [cauthdsl] func1 -> DEBU 186d 0xc003f655b0 gate 1555913822388502600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:02.388 UTC [cauthdsl] func2 -> DEBU 186e 0xc003f655b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:02.388 UTC [cauthdsl] func2 -> DEBU 186f 0xc003f655b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:02.389 UTC [cauthdsl] func2 -> DEBU 1870 0xc003f655b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:02.389 UTC [msp.identity] Verify -> DEBU 1871 Verify: digest = 00000000 22 22 7e a4 58 09 95 56 b9 66 ae 98 03 93 a9 7c |""~.X..V.f.....|| +peer0.org1.example.com | 00000010 4f 83 b8 e7 68 7d 79 00 d7 1e 40 40 2a 89 2f 8b |O...h}y...@@*./.|" +peer0.org1.example.com | "2019-04-22 06:17:02.389 UTC [msp.identity] Verify -> DEBU 1872 Verify: sig = 00000000 30 45 02 21 00 8e 68 d6 bb f7 48 67 f0 a2 00 6b |0E.!..h...Hg...k| +peer0.org1.example.com | 00000010 b2 35 cb c2 81 94 c3 ea a1 74 3d 65 9b ca e5 b5 |.5.......t=e....| +peer0.org1.example.com | 00000020 37 6e 32 de 10 02 20 79 f0 a5 e5 89 28 06 af c1 |7n2... y....(...| +peer0.org1.example.com | 00000030 14 78 53 5a ce 31 9f 59 7a de 94 a0 ae 71 75 b3 |.xSZ.1.Yz....qu.| +peer0.org1.example.com | 00000040 ea 41 6f 6b c3 c4 1c |.Aok...|" +peer0.org1.example.com | "2019-04-22 06:17:02.389 UTC [cauthdsl] func2 -> DEBU 1873 0xc003f655b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:02.390 UTC [cauthdsl] func1 -> DEBU 1874 0xc003f655b0 gate 1555913822388502600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1875 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1876 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1877 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1878 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:02.390 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1879 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:02.391 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 187a constructing new tx simulator txid = [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +peer0.org1.example.com | "2019-04-22 06:17:02.391 UTC [endorser] SimulateProposal -> DEBU 187b [businesschannel][b6035b01] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:02.391 UTC [stateleveldb] GetState -> DEBU 187c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:02.392 UTC [endorser] callChaincode -> INFO 187d [businesschannel][b6035b01] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:02.392 UTC [stateleveldb] GetState -> DEBU 187e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:02.394 UTC [chaincode] LaunchConfig -> DEBU 187f launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-04-22 06:17:02.394 UTC [chaincode] Start -> DEBU 1880 start container: exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-04-22 06:17:02.394 UTC [chaincode] Start -> DEBU 1881 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:17:02.394 UTC [chaincode] Start -> DEBU 1882 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-04-22 06:17:02.394 UTC [container] lockContainer -> DEBU 1883 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-04-22 06:17:02.394 UTC [container] lockContainer -> DEBU 1884 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-04-22 06:17:02.394 UTC [dockercontroller] stopInternal -> DEBU 1885 stopping container" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1886 stop container result" error="No such container: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1887 killing container" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1888 kill container result" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="No such container: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1889 removing container" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-04-22 06:17:02.397 UTC [dockercontroller] stopInternal -> DEBU 188a remove container result" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="No such container: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-04-22 06:17:02.397 UTC [dockercontroller] createContainer -> DEBU 188b create container" imageID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c containerID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-04-22 06:17:02.400 UTC [chaincode.platform] GenerateDockerfile -> DEBU 188c +peer0.org1.example.com | FROM hyperledger/fabric-baseos:2.0.0 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="2.0.0" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=2.0.0" +peer0.org1.example.com | "2019-04-22 06:17:02.403 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 188d building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-04-22 06:17:02.403 UTC [chaincode.platform.util] DockerBuild -> DEBU 188e Attempting build with image hyperledger/fabric-ccenv:2.0.0" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.pull] Hello -> DEBU 188f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] Send -> DEBU 1890 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.pull] Hello -> DEBU 1891 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] Send -> DEBU 1892 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.pull] Hello -> DEBU 1893 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] Send -> DEBU 1894 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1895 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1896 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1897 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1898 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1899 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 189a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.892 UTC [gossip.comm] func1 -> DEBU 189b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13455117212195446162 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 189c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13455117212195446162 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.892 UTC [gossip.pull] HandleMessage -> DEBU 189d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13455117212195446162 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 189e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 189f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7917530305665029805 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.892 UTC [gossip.pull] HandleMessage -> DEBU 18a0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7917530305665029805 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 18a1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.893 UTC [gossip.comm] func1 -> DEBU 18a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13521793691202731586 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.893 UTC [gossip.gossip] handleMessage -> DEBU 18a3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13521793691202731586 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.893 UTC [gossip.pull] HandleMessage -> DEBU 18a4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13521793691202731586 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.893 UTC [gossip.gossip] handleMessage -> DEBU 18a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151018 " +peer0.org1.example.com | "2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a7 Sign: digest: 2FCD1EA2AA999BB9C114E25074F80AE236DC6CD483D8144EAF27BCA9569693E3 " +peer0.org1.example.com | "2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [msp] DeserializeIdentity -> DEBU 18aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [gossip.comm] Send -> DEBU 18ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [gossip.comm] Send -> DEBU 18ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [msp] DeserializeIdentity -> DEBU 18ad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [gossip.comm] Send -> DEBU 18af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18b1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18b2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.923 UTC [gossip.comm] sendToEndpoint -> DEBU 18b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.923 UTC [gossip.comm] sendToEndpoint -> DEBU 18b4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.gossip] handleMessage -> DEBU 18b5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.gossip] handleMessage -> DEBU 18b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.comm] func1 -> DEBU 18b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.gossip] handleMessage -> DEBU 18b9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ba Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [msp.identity] Verify -> DEBU 18bb Verify: digest = 00000000 2f cd 1e a2 aa 99 9b b9 c1 14 e2 50 74 f8 0a e2 |/..........Pt...| +peer0.org1.example.com | 00000010 36 dc 6c d4 83 d8 14 4e af 27 bc a9 56 96 93 e3 |6.l....N.'..V...|" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [msp.identity] Verify -> DEBU 18bc Verify: sig = 00000000 30 44 02 20 03 03 b9 4e da 61 20 26 c8 b7 64 2c |0D. ...N.a &..d,| +peer0.org1.example.com | 00000010 4f 56 80 04 2b e1 ce 52 24 78 59 f9 9c 6e c5 ae |OV..+..R$xY..n..| +peer0.org1.example.com | 00000020 bd af c6 51 02 20 2a e6 f3 d9 66 18 37 27 9e 23 |...Q. *...f.7'.#| +peer0.org1.example.com | 00000030 8c 4d 6d 2f 6d cb c0 77 f5 a7 07 03 67 10 b8 e9 |.Mm/m..w....g...| +peer0.org1.example.com | 00000040 f1 b5 06 cf ab fa |......|" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 18bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.discovery] isSentByMe -> DEBU 18be Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 18bf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [gossip.gossip] handleMessage -> DEBU 18c2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18c3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [msp.identity] Verify -> DEBU 18c4 Verify: digest = 00000000 2f cd 1e a2 aa 99 9b b9 c1 14 e2 50 74 f8 0a e2 |/..........Pt...| +peer0.org1.example.com | 00000010 36 dc 6c d4 83 d8 14 4e af 27 bc a9 56 96 93 e3 |6.l....N.'..V...|" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [msp.identity] Verify -> DEBU 18c5 Verify: sig = 00000000 30 44 02 20 03 03 b9 4e da 61 20 26 c8 b7 64 2c |0D. ...N.a &..d,| +peer0.org1.example.com | 00000010 4f 56 80 04 2b e1 ce 52 24 78 59 f9 9c 6e c5 ae |OV..+..R$xY..n..| +peer0.org1.example.com | 00000020 bd af c6 51 02 20 2a e6 f3 d9 66 18 37 27 9e 23 |...Q. *...f.7'.#| +peer0.org1.example.com | 00000030 8c 4d 6d 2f 6d cb c0 77 f5 a7 07 03 67 10 b8 e9 |.Mm/m..w....g...| +peer0.org1.example.com | 00000040 f1 b5 06 cf ab fa |......|" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 18c6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [gossip.discovery] isSentByMe -> DEBU 18c7 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 18c8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [gossip.comm] func1 -> DEBU 18ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [gossip.gossip] handleMessage -> DEBU 18cb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [gossip.gossip] handleMessage -> DEBU 18cc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ce Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18cf Verify: digest = 00000000 2f cd 1e a2 aa 99 9b b9 c1 14 e2 50 74 f8 0a e2 |/..........Pt...| +peer0.org1.example.com | 00000010 36 dc 6c d4 83 d8 14 4e af 27 bc a9 56 96 93 e3 |6.l....N.'..V...|" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18d0 Verify: sig = 00000000 30 44 02 20 03 03 b9 4e da 61 20 26 c8 b7 64 2c |0D. ...N.a &..d,| +peer0.org1.example.com | 00000010 4f 56 80 04 2b e1 ce 52 24 78 59 f9 9c 6e c5 ae |OV..+..R$xY..n..| +peer0.org1.example.com | 00000020 bd af c6 51 02 20 2a e6 f3 d9 66 18 37 27 9e 23 |...Q. *...f.7'.#| +peer0.org1.example.com | 00000030 8c 4d 6d 2f 6d cb c0 77 f5 a7 07 03 67 10 b8 e9 |.Mm/m..w....g...| +peer0.org1.example.com | 00000040 f1 b5 06 cf ab fa |......|" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18d1 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18d2 Verify: sig = 00000000 30 44 02 20 22 36 36 11 c2 9b 31 90 b4 3f 3f 83 |0D. "66...1..??.| +peer0.org1.example.com | 00000010 2a d6 64 ec d2 b6 57 55 30 dc a0 4b aa 2a 9e ab |*.d...WU0..K.*..| +peer0.org1.example.com | 00000020 3f 2f a8 cf 02 20 65 9f 7d 3b ab 71 f4 74 5c ce |?/... e.};.q.t\.| +peer0.org1.example.com | 00000030 76 75 5c 40 24 82 4d fb 81 87 54 1f 18 bc 7e 79 |vu\@$.M...T...~y| +peer0.org1.example.com | 00000040 57 dd 8a 6c b4 f1 |W..l..|" +peer0.org1.example.com | "2019-04-22 06:17:02.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.928 UTC [gossip.discovery] isSentByMe -> DEBU 18d4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:02.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:02.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18d6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.158 UTC [gossip.comm] func1 -> DEBU 18d7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.158 UTC [gossip.gossip] handleMessage -> DEBU 18d8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.158 UTC [gossip.pull] HandleMessage -> DEBU 18d9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.158 UTC [gossip.pull] SendDigest -> DEBU 18da Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:03.158 UTC [gossip.gossip] handleMessage -> DEBU 18db Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.179 UTC [gossip.comm] func1 -> DEBU 18dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.179 UTC [gossip.gossip] handleMessage -> DEBU 18dd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [gossip.gossip] handleMessage -> DEBU 18de Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e1 Verify: digest = 00000000 c6 81 44 83 3a a5 01 2d b0 8d 91 be e2 74 52 b8 |..D.:..-.....tR.| +peer0.org1.example.com | 00000010 02 08 35 88 e6 df 3b 30 07 6e e0 cb 62 46 9d 14 |..5...;0.n..bF..|" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e2 Verify: sig = 00000000 30 45 02 21 00 c0 6d 99 d7 87 a2 d7 81 a1 1a 40 |0E.!..m........@| +peer0.org1.example.com | 00000010 dd 95 cf 2e 1a 17 2c e0 59 6a ea 03 4e 56 46 89 |......,.Yj..NVF.| +peer0.org1.example.com | 00000020 2d cd fe c1 15 02 20 39 05 e0 4d 79 fa b4 6a 7f |-..... 9..My..j.| +peer0.org1.example.com | 00000030 bf 55 c1 41 6e 5e 1f 5e 43 47 d8 8a 14 90 34 62 |.U.An^.^CG....4b| +peer0.org1.example.com | 00000040 1f bf fb 86 75 83 80 |....u..|" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e4 Verify: sig = 00000000 30 45 02 21 00 8d db 8c 4e 96 22 88 0a 48 b8 41 |0E.!....N."..H.A| +peer0.org1.example.com | 00000010 00 a0 5f e7 ca 8b 7a 8e f4 4a fb 96 e0 ea 51 d0 |.._...z..J....Q.| +peer0.org1.example.com | 00000020 74 01 e3 60 dc 02 20 30 7b d3 37 80 52 d5 d2 26 |t..`.. 0{.7.R..&| +peer0.org1.example.com | 00000030 23 9d 04 fb e6 aa 7c 1b c2 d4 cd 7e c5 56 6a 6c |#.....|....~.Vjl| +peer0.org1.example.com | 00000040 b5 df 89 a8 47 01 08 |....G..|" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 " +peer0.org1.example.com | "2019-04-22 06:17:03.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 " +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 18ea Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 18eb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ec Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.discovery] sendMemResponse -> DEBU 18ed Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [msp] DeserializeIdentity -> DEBU 18ef Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.comm] Send -> DEBU 18f0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.discovery] sendMemResponse -> DEBU 18f1 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.comm] sendToEndpoint -> DEBU 18f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.181 UTC [gossip.comm] sendToEndpoint -> DEBU 18f3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.619 UTC [gossip.comm] func1 -> DEBU 18f4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.620 UTC [gossip.gossip] handleMessage -> DEBU 18f5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.620 UTC [gossip.pull] HandleMessage -> DEBU 18f6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.620 UTC [msp] DeserializeIdentity -> DEBU 18f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.621 UTC [msp] DeserializeIdentity -> DEBU 18f8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.621 UTC [msp] DeserializeIdentity -> DEBU 18f9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.621 UTC [msp] DeserializeIdentity -> DEBU 18fa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.622 UTC [msp] DeserializeIdentity -> DEBU 18fb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.622 UTC [msp] DeserializeIdentity -> DEBU 18fc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.623 UTC [gossip.pull] SendDigest -> DEBU 18fd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:03.623 UTC [gossip.gossip] handleMessage -> DEBU 18fe Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.628 UTC [gossip.comm] func1 -> DEBU 18ff Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.628 UTC [gossip.gossip] handleMessage -> DEBU 1900 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.629 UTC [gossip.gossip] handleMessage -> DEBU 1901 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1902 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1903 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:03.630 UTC [msp] DeserializeIdentity -> DEBU 1904 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.631 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1905 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:03.631 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1906 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:03.632 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1907 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:03.632 UTC [policies] Evaluate -> DEBU 1908 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:03.632 UTC [policies] Evaluate -> DEBU 1909 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:03.633 UTC [policies] Evaluate -> DEBU 190a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:03.633 UTC [cauthdsl] func1 -> DEBU 190b 0xc004188210 gate 1555913823633668800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:03.634 UTC [cauthdsl] func2 -> DEBU 190c 0xc004188210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:03.634 UTC [cauthdsl] func2 -> DEBU 190d 0xc004188210 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:03.634 UTC [cauthdsl] func2 -> DEBU 190e 0xc004188210 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:03.635 UTC [msp.identity] Verify -> DEBU 190f Verify: digest = 00000000 80 8e 0a 8a 80 27 a1 13 dc 59 cb 6a 68 2d ff 0c |.....'...Y.jh-..| +peer0.org1.example.com | 00000010 1a 92 74 d6 c6 fd f7 28 15 95 a1 32 d6 1f a3 f5 |..t....(...2....|" +peer0.org1.example.com | "2019-04-22 06:17:03.635 UTC [msp.identity] Verify -> DEBU 1910 Verify: sig = 00000000 30 44 02 20 7b de 7a f7 26 8a 13 e8 05 a9 aa 6b |0D. {.z.&......k| +peer0.org1.example.com | 00000010 88 18 d0 df ee 34 7d d2 08 53 92 ec c4 80 d3 fc |.....4}..S......| +peer0.org1.example.com | 00000020 be e2 54 01 02 20 5a 3d dc a2 39 1f 18 5b 8e 7a |..T.. Z=..9..[.z| +peer0.org1.example.com | 00000030 34 a7 f9 85 f2 ff f8 6d ce 4f 81 64 9d ee ed 7b |4......m.O.d...{| +peer0.org1.example.com | 00000040 ec 9f e3 ee 3e 91 |....>.|" +peer0.org1.example.com | "2019-04-22 06:17:03.636 UTC [cauthdsl] func2 -> DEBU 1911 0xc004188210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:03.636 UTC [cauthdsl] func1 -> DEBU 1912 0xc004188210 gate 1555913823633668800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:03.636 UTC [policies] Evaluate -> DEBU 1913 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:03.636 UTC [policies] Evaluate -> DEBU 1914 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:03.637 UTC [policies] Evaluate -> DEBU 1915 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:03.637 UTC [policies] Evaluate -> DEBU 1916 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:03.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1917 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1918 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:03.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1919 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 " +peer0.org1.example.com | "2019-04-22 06:17:03.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 191a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 " +peer0.org1.example.com | "2019-04-22 06:17:03.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 191b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:03.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 191c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.640 UTC [gossip.discovery] handleAliveMessage -> DEBU 191d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:03.640 UTC [gossip.discovery] sendMemResponse -> DEBU 191f Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:03.640 UTC [msp] DeserializeIdentity -> DEBU 1920 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.644 UTC [msp] DeserializeIdentity -> DEBU 1921 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.645 UTC [msp] DeserializeIdentity -> DEBU 1922 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:03.646 UTC [gossip.comm] Send -> DEBU 1923 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:03.646 UTC [gossip.discovery] sendMemResponse -> DEBU 1924 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:03.646 UTC [gossip.comm] sendToEndpoint -> DEBU 1925 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:03.647 UTC [gossip.comm] sendToEndpoint -> DEBU 1926 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.035 UTC [gossip.gossip] handleMessage -> DEBU 1927 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.035 UTC [gossip.pull] HandleMessage -> DEBU 1928 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 1929 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 192a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.036 UTC [msp] DeserializeIdentity -> DEBU 192d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.036 UTC [msp] DeserializeIdentity -> DEBU 192e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.036 UTC [gossip.pull] SendDigest -> DEBU 192f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:04.036 UTC [gossip.gossip] handleMessage -> DEBU 1930 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.054 UTC [gossip.gossip] handleMessage -> DEBU 1931 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.054 UTC [gossip.gossip] handleMessage -> DEBU 1932 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1933 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.056 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1934 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:04.056 UTC [msp] DeserializeIdentity -> DEBU 1935 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1936 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1937 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1938 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [policies] Evaluate -> DEBU 1939 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [policies] Evaluate -> DEBU 193a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [policies] Evaluate -> DEBU 193b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [cauthdsl] func1 -> DEBU 193c 0xc0041acda0 gate 1555913824057796500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.057 UTC [cauthdsl] func2 -> DEBU 193d 0xc0041acda0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.058 UTC [cauthdsl] func2 -> DEBU 193e 0xc0041acda0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.058 UTC [cauthdsl] func2 -> DEBU 193f 0xc0041acda0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.058 UTC [msp.identity] Verify -> DEBU 1940 Verify: digest = 00000000 b5 08 b4 8c b9 84 c3 e3 7b d9 2b 4c 13 b8 69 aa |........{.+L..i.| +peer0.org1.example.com | 00000010 7d eb d0 fc 9b 5e ff d2 c9 a5 0c 38 2f 6a 46 30 |}....^.....8/jF0|" +peer0.org1.example.com | "2019-04-22 06:17:04.058 UTC [msp.identity] Verify -> DEBU 1941 Verify: sig = 00000000 30 44 02 20 47 24 0c c2 a9 ae 13 41 52 0c 63 69 |0D. G$.....AR.ci| +peer0.org1.example.com | 00000010 ef 4a 00 d8 07 b5 1f e0 80 05 be 75 fd 6d e5 5d |.J.........u.m.]| +peer0.org1.example.com | 00000020 5b 7d bf 25 02 20 7e c3 70 af 88 62 04 b7 c8 fe |[}.%. ~.p..b....| +peer0.org1.example.com | 00000030 2f e8 ff 3d 33 06 5a 51 58 cd 86 f3 a7 4a 15 8f |/..=3.ZQX....J..| +peer0.org1.example.com | 00000040 75 cd 03 ca 58 6d |u...Xm|" +peer0.org1.example.com | "2019-04-22 06:17:04.058 UTC [cauthdsl] func2 -> DEBU 1942 0xc0041acda0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.060 UTC [cauthdsl] func1 -> DEBU 1943 0xc0041acda0 gate 1555913824057796500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1944 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1946 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.060 UTC [gossip.discovery] handleAliveMessage -> DEBU 1948 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 1949 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 194a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 " +peer0.org1.example.com | "2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 194b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 " +peer0.org1.example.com | "2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 194c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:04.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 194d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 194e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.064 UTC [gossip.discovery] sendMemResponse -> DEBU 194f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:04.064 UTC [msp] DeserializeIdentity -> DEBU 1950 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.064 UTC [msp] DeserializeIdentity -> DEBU 1951 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.064 UTC [msp] DeserializeIdentity -> DEBU 1952 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.064 UTC [gossip.comm] Send -> DEBU 1953 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:04.064 UTC [gossip.discovery] sendMemResponse -> DEBU 1954 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:04.064 UTC [gossip.comm] sendToEndpoint -> DEBU 1955 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.065 UTC [gossip.comm] sendToEndpoint -> DEBU 1956 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.063 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1957 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.423 UTC [msp] DeserializeIdentity -> DEBU 1958 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.424 UTC [msp] DeserializeIdentity -> DEBU 1959 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.424 UTC [gossip.comm] Send -> DEBU 195a Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.426 UTC [gossip.comm] sendToEndpoint -> DEBU 1960 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.427 UTC [gossip.comm] func1 -> DEBU 1961 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.428 UTC [gossip.gossip] handleMessage -> DEBU 1962 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.429 UTC [msp] DeserializeIdentity -> DEBU 1963 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.429 UTC [msp] DeserializeIdentity -> DEBU 1964 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.429 UTC [gossip.comm] Send -> DEBU 1965 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:04.430 UTC [msp] DeserializeIdentity -> DEBU 1966 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.430 UTC [msp] DeserializeIdentity -> DEBU 1967 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 1968 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 1969 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 196a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 196b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.432 UTC [gossip.comm] sendToEndpoint -> DEBU 196c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.432 UTC [gossip.comm] sendToEndpoint -> DEBU 196d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.429 UTC [msp.identity] Verify -> DEBU 196e Verify: digest = 00000000 56 d7 8e 4b e6 1d 85 07 86 41 30 33 05 ed 7a 39 |V..K.....A03..z9| +peer0.org1.example.com | 00000010 e2 2e f4 0e f4 53 ec da 40 8b c6 0d 7c cd 77 33 |.....S..@...|.w3|" +peer0.org1.example.com | "2019-04-22 06:17:04.436 UTC [msp.identity] Verify -> DEBU 1970 Verify: sig = 00000000 30 45 02 21 00 9d ab 13 34 61 cb 42 80 26 cc bf |0E.!....4a.B.&..| +peer0.org1.example.com | 00000010 af 44 b2 af fb e3 80 ba 7e b0 0e dd a6 12 e2 e5 |.D......~.......| +peer0.org1.example.com | 00000020 4d 5e 6c 74 ed 02 20 5a 40 37 e1 a0 70 3c 67 19 |M^lt.. Z@7..p DEBU 196f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.441 UTC [msp] DeserializeIdentity -> DEBU 1971 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.441 UTC [msp] DeserializeIdentity -> DEBU 1972 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1973 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1974 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1975 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.442 UTC [policies] Evaluate -> DEBU 1976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.442 UTC [policies] Evaluate -> DEBU 1977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.443 UTC [policies] Evaluate -> DEBU 1978 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.443 UTC [cauthdsl] func1 -> DEBU 1979 0xc0041d3700 gate 1555913824443363000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.443 UTC [cauthdsl] func2 -> DEBU 197a 0xc0041d3700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.443 UTC [cauthdsl] func2 -> DEBU 197b 0xc0041d3700 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.443 UTC [cauthdsl] func2 -> DEBU 197c 0xc0041d3700 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.444 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +peer0.org1.example.com | 00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +peer0.org1.example.com | "2019-04-22 06:17:04.444 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +peer0.org1.example.com | 00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +peer0.org1.example.com | 00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +peer0.org1.example.com | 00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +peer0.org1.example.com | 00000040 dc 88 1b 8e 89 e0 |......|" +peer0.org1.example.com | "2019-04-22 06:17:04.444 UTC [cauthdsl] func2 -> DEBU 197f 0xc0041d3700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.444 UTC [cauthdsl] func1 -> DEBU 1980 0xc0041d3700 gate 1555913824443363000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.444 UTC [policies] Evaluate -> DEBU 1981 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.445 UTC [policies] Evaluate -> DEBU 1982 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.445 UTC [policies] Evaluate -> DEBU 1983 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.446 UTC [policies] Evaluate -> DEBU 1984 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.447 UTC [msp.identity] Verify -> DEBU 1985 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:04.447 UTC [msp.identity] Verify -> DEBU 1986 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:04.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1987 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1988 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.449 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.450 UTC [policies] Evaluate -> DEBU 198a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.450 UTC [policies] Evaluate -> DEBU 198b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.450 UTC [cauthdsl] func1 -> DEBU 198c 0xc0041f6e00 gate 1555913824450859800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.456 UTC [cauthdsl] func2 -> DEBU 198d 0xc0041f6e00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.456 UTC [cauthdsl] func2 -> DEBU 198e 0xc0041f6e00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.457 UTC [cauthdsl] func2 -> DEBU 198f 0xc0041f6e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:04.457 UTC [cauthdsl] func2 -> DEBU 1990 0xc0041f6e00 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:04.457 UTC [cauthdsl] func1 -> DEBU 1991 0xc0041f6e00 gate 1555913824450859800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:04.458 UTC [policies] Evaluate -> DEBU 1992 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.458 UTC [policies] Evaluate -> DEBU 1993 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.458 UTC [policies] Evaluate -> DEBU 1994 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.458 UTC [cauthdsl] func1 -> DEBU 1995 0xc0041f7640 gate 1555913824458975900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.459 UTC [cauthdsl] func2 -> DEBU 1996 0xc0041f7640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.459 UTC [cauthdsl] func2 -> DEBU 1997 0xc0041f7640 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.459 UTC [cauthdsl] func2 -> DEBU 1998 0xc0041f7640 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.460 UTC [msp.identity] Verify -> DEBU 1999 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:04.460 UTC [msp.identity] Verify -> DEBU 199a Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:04.460 UTC [cauthdsl] func2 -> DEBU 199b 0xc0041f7640 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.460 UTC [cauthdsl] func1 -> DEBU 199c 0xc0041f7640 gate 1555913824458975900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 199d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 199e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 199f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 19a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.462 UTC [msp] DeserializeIdentity -> DEBU 19a1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.462 UTC [msp] DeserializeIdentity -> DEBU 19a2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.463 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.463 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.463 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.464 UTC [policies] Evaluate -> DEBU 19a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.464 UTC [policies] Evaluate -> DEBU 19a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.464 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.465 UTC [cauthdsl] func1 -> DEBU 19a9 0xc00420ae10 gate 1555913824465018000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.465 UTC [cauthdsl] func2 -> DEBU 19aa 0xc00420ae10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.465 UTC [cauthdsl] func2 -> DEBU 19ab 0xc00420ae10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.465 UTC [cauthdsl] func2 -> DEBU 19ac 0xc00420ae10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.466 UTC [msp.identity] Verify -> DEBU 19ad Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:04.466 UTC [msp.identity] Verify -> DEBU 19ae Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:04.467 UTC [cauthdsl] func2 -> DEBU 19af 0xc00420ae10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.467 UTC [cauthdsl] func1 -> DEBU 19b0 0xc00420ae10 gate 1555913824465018000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.469 UTC [gossip.gossip] handleMessage -> DEBU 19b5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.469 UTC [gossip.gossip] handleMessage -> DEBU 19b6 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.469 UTC [msp] DeserializeIdentity -> DEBU 19b7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.470 UTC [msp.identity] Verify -> DEBU 19b8 Verify: digest = 00000000 56 d7 8e 4b e6 1d 85 07 86 41 30 33 05 ed 7a 39 |V..K.....A03..z9| +peer0.org1.example.com | 00000010 e2 2e f4 0e f4 53 ec da 40 8b c6 0d 7c cd 77 33 |.....S..@...|.w3|" +peer0.org1.example.com | "2019-04-22 06:17:04.470 UTC [msp.identity] Verify -> DEBU 19b9 Verify: sig = 00000000 30 45 02 21 00 9d ab 13 34 61 cb 42 80 26 cc bf |0E.!....4a.B.&..| +peer0.org1.example.com | 00000010 af 44 b2 af fb e3 80 ba 7e b0 0e dd a6 12 e2 e5 |.D......~.......| +peer0.org1.example.com | 00000020 4d 5e 6c 74 ed 02 20 5a 40 37 e1 a0 70 3c 67 19 |M^lt.. Z@7..p DEBU 19ba Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +peer0.org1.example.com | 00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +peer0.org1.example.com | "2019-04-22 06:17:04.471 UTC [msp.identity] Verify -> DEBU 19bb Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +peer0.org1.example.com | 00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +peer0.org1.example.com | 00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +peer0.org1.example.com | 00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +peer0.org1.example.com | 00000040 4d 34 56 e4 dd 25 |M4V..%|" +peer0.org1.example.com | "2019-04-22 06:17:04.472 UTC [msp] DeserializeIdentity -> DEBU 19bc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.472 UTC [msp] DeserializeIdentity -> DEBU 19bd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19bf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.473 UTC [policies] Evaluate -> DEBU 19c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.474 UTC [policies] Evaluate -> DEBU 19c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.474 UTC [policies] Evaluate -> DEBU 19c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.474 UTC [cauthdsl] func1 -> DEBU 19c4 0xc004221760 gate 1555913824474523500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.474 UTC [cauthdsl] func2 -> DEBU 19c5 0xc004221760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.475 UTC [cauthdsl] func2 -> DEBU 19c6 0xc004221760 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.475 UTC [cauthdsl] func2 -> DEBU 19c7 0xc004221760 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.475 UTC [msp.identity] Verify -> DEBU 19c8 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:04.475 UTC [msp.identity] Verify -> DEBU 19c9 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:04.476 UTC [cauthdsl] func2 -> DEBU 19ca 0xc004221760 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.476 UTC [cauthdsl] func1 -> DEBU 19cb 0xc004221760 gate 1555913824474523500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.476 UTC [policies] Evaluate -> DEBU 19cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.476 UTC [policies] Evaluate -> DEBU 19cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.477 UTC [policies] Evaluate -> DEBU 19ce Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.477 UTC [policies] Evaluate -> DEBU 19cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.478 UTC [msp] DeserializeIdentity -> DEBU 19d0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19d1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19d2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.479 UTC [policies] Evaluate -> DEBU 19d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.479 UTC [policies] Evaluate -> DEBU 19d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.479 UTC [policies] Evaluate -> DEBU 19d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.479 UTC [cauthdsl] func1 -> DEBU 19d6 0xc004242840 gate 1555913824479581700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.479 UTC [cauthdsl] func2 -> DEBU 19d7 0xc004242840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.480 UTC [cauthdsl] func2 -> DEBU 19d8 0xc004242840 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.480 UTC [cauthdsl] func2 -> DEBU 19d9 0xc004242840 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.480 UTC [msp.identity] Verify -> DEBU 19da Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:04.481 UTC [msp.identity] Verify -> DEBU 19db Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:04.481 UTC [cauthdsl] func2 -> DEBU 19dc 0xc004242840 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.482 UTC [cauthdsl] func1 -> DEBU 19de 0xc004242840 gate 1555913824479581700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.481 UTC [msp] DeserializeIdentity -> DEBU 19dd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.482 UTC [policies] Evaluate -> DEBU 19df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.482 UTC [policies] Evaluate -> DEBU 19e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.483 UTC [policies] Evaluate -> DEBU 19e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.483 UTC [policies] Evaluate -> DEBU 19e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.482 UTC [msp] DeserializeIdentity -> DEBU 19e1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.484 UTC [msp] DeserializeIdentity -> DEBU 19e4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.483 UTC [gossip.pull] Hello -> DEBU 19e5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:04.484 UTC [msp] DeserializeIdentity -> DEBU 19e6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.484 UTC [msp] DeserializeIdentity -> DEBU 19e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.485 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.485 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19ea Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.485 UTC [msp] DeserializeIdentity -> DEBU 19e9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.485 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19eb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.485 UTC [gossip.comm] Send -> DEBU 19ec Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:04.485 UTC [policies] Evaluate -> DEBU 19ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.486 UTC [policies] Evaluate -> DEBU 19ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.486 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.487 UTC [cauthdsl] func1 -> DEBU 19f0 0xc00425e170 gate 1555913824487706400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.487 UTC [cauthdsl] func2 -> DEBU 19f1 0xc00425e170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.488 UTC [cauthdsl] func2 -> DEBU 19f2 0xc00425e170 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.488 UTC [cauthdsl] func2 -> DEBU 19f3 0xc00425e170 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.488 UTC [msp.identity] Verify -> DEBU 19f4 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:04.489 UTC [msp.identity] Verify -> DEBU 19f5 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:04.489 UTC [cauthdsl] func2 -> DEBU 19f6 0xc00425e170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.490 UTC [cauthdsl] func1 -> DEBU 19f7 0xc00425e170 gate 1555913824487706400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.490 UTC [policies] Evaluate -> DEBU 19f8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.491 UTC [policies] Evaluate -> DEBU 19f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.491 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.492 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.492 UTC [gossip.gossip] handleMessage -> DEBU 19fc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.492 UTC [gossip.gossip] handleMessage -> DEBU 19fd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.492 UTC [msp] DeserializeIdentity -> DEBU 19fe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.493 UTC [msp] DeserializeIdentity -> DEBU 19ff Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.493 UTC [msp] DeserializeIdentity -> DEBU 1a00 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.493 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.493 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a02 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.494 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a03 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.494 UTC [policies] Evaluate -> DEBU 1a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.494 UTC [policies] Evaluate -> DEBU 1a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.494 UTC [policies] Evaluate -> DEBU 1a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.494 UTC [cauthdsl] func1 -> DEBU 1a07 0xc00425fc80 gate 1555913824494568900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.494 UTC [cauthdsl] func2 -> DEBU 1a08 0xc00425fc80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.495 UTC [cauthdsl] func2 -> DEBU 1a09 0xc00425fc80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.495 UTC [cauthdsl] func2 -> DEBU 1a0a 0xc00425fc80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.496 UTC [msp.identity] Verify -> DEBU 1a0b Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:04.496 UTC [msp.identity] Verify -> DEBU 1a0c Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:04.497 UTC [cauthdsl] func2 -> DEBU 1a0d 0xc00425fc80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.498 UTC [cauthdsl] func1 -> DEBU 1a0e 0xc00425fc80 gate 1555913824494568900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.498 UTC [policies] Evaluate -> DEBU 1a0f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.498 UTC [policies] Evaluate -> DEBU 1a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.498 UTC [policies] Evaluate -> DEBU 1a11 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.499 UTC [policies] Evaluate -> DEBU 1a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.499 UTC [msp] DeserializeIdentity -> DEBU 1a13 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.499 UTC [msp] DeserializeIdentity -> DEBU 1a14 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.500 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a16 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a17 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.500 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.501 UTC [policies] Evaluate -> DEBU 1a1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.501 UTC [policies] Evaluate -> DEBU 1a1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.501 UTC [cauthdsl] func1 -> DEBU 1a1c 0xc00426d450 gate 1555913824501896900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.502 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc00426d450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.501 UTC [gossip.comm] sendToEndpoint -> DEBU 1a19 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.502 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc00426d450 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.503 UTC [cauthdsl] func2 -> DEBU 1a20 0xc00426d450 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.504 UTC [msp.identity] Verify -> DEBU 1a22 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:04.502 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.504 UTC [gossip.comm] func1 -> DEBU 1a21 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 225577992717231854 , Msg_type: BLOCK_MSG, digests: [5 1 2 3 4], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.504 UTC [msp.identity] Verify -> DEBU 1a23 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:04.505 UTC [cauthdsl] func2 -> DEBU 1a24 0xc00426d450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.506 UTC [cauthdsl] func1 -> DEBU 1a25 0xc00426d450 gate 1555913824501896900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.506 UTC [policies] Evaluate -> DEBU 1a26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.506 UTC [policies] Evaluate -> DEBU 1a27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.506 UTC [policies] Evaluate -> DEBU 1a28 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.507 UTC [policies] Evaluate -> DEBU 1a29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.508 UTC [msp.identity] Verify -> DEBU 1a2a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:04.508 UTC [msp.identity] Verify -> DEBU 1a2b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:04.512 UTC [msp.identity] Verify -> DEBU 1a2c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:04.512 UTC [msp.identity] Verify -> DEBU 1a2d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:04.512 UTC [gossip.gossip] handleMessage -> DEBU 1a2e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.512 UTC [gossip.gossip] handleMessage -> DEBU 1a2f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 225577992717231854 , Msg_type: BLOCK_MSG, digests: [5 1 2 3 4], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.513 UTC [gossip.pull] HandleMessage -> DEBU 1a30 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 225577992717231854 , Msg_type: BLOCK_MSG, digests: [5 1 2 3 4], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.513 UTC [gossip.gossip] handleMessage -> DEBU 1a31 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.681 UTC [gossip.comm] func1 -> DEBU 1a32 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.681 UTC [gossip.gossip] handleMessage -> DEBU 1a33 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.682 UTC [msp] DeserializeIdentity -> DEBU 1a34 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.683 UTC [msp] DeserializeIdentity -> DEBU 1a35 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.684 UTC [gossip.gossip] handleMessage -> DEBU 1a36 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.699 UTC [gossip.comm] func1 -> DEBU 1a37 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913821064386700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.702 UTC [gossip.comm] func1 -> DEBU 1a38 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.704 UTC [gossip.gossip] handleMessage -> DEBU 1a39 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913821064386700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.704 UTC [msp.identity] Verify -> DEBU 1a3a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:04.705 UTC [msp.identity] Verify -> DEBU 1a3b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:04.715 UTC [gossip.gossip] handleMessage -> DEBU 1a3c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.716 UTC [gossip.gossip] handleMessage -> DEBU 1a3d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.717 UTC [gossip.pull] HandleMessage -> DEBU 1a3e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.717 UTC [gossip.pull] SendDigest -> DEBU 1a3f Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:04.717 UTC [gossip.gossip] handleMessage -> DEBU 1a40 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.722 UTC [gossip.gossip] handleMessage -> DEBU 1a41 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913821064386700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.725 UTC [msp.identity] Verify -> DEBU 1a42 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:04.726 UTC [msp.identity] Verify -> DEBU 1a43 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:04.727 UTC [msp] DeserializeIdentity -> DEBU 1a44 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.727 UTC [gossip.gossip] handleMessage -> DEBU 1a45 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.906 UTC [gossip.gossip] handleMessage -> DEBU 1a46 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.906 UTC [msp] DeserializeIdentity -> DEBU 1a47 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.907 UTC [msp] DeserializeIdentity -> DEBU 1a48 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.907 UTC [msp] DeserializeIdentity -> DEBU 1a49 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.907 UTC [gossip.gossip] handleMessage -> DEBU 1a4a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:04.911 UTC [gossip.gossip] handleMessage -> DEBU 1a4b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913821053638500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:04.911 UTC [msp] DeserializeIdentity -> DEBU 1a4c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.912 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:04.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a4e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a4f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:04.912 UTC [policies] Evaluate -> DEBU 1a50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.913 UTC [policies] Evaluate -> DEBU 1a51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:04.913 UTC [policies] Evaluate -> DEBU 1a52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:04.914 UTC [cauthdsl] func1 -> DEBU 1a53 0xc0042b2960 gate 1555913824914090800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:04.914 UTC [cauthdsl] func2 -> DEBU 1a54 0xc0042b2960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:04.914 UTC [cauthdsl] func2 -> DEBU 1a55 0xc0042b2960 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:04.914 UTC [cauthdsl] func2 -> DEBU 1a56 0xc0042b2960 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.914 UTC [msp.identity] Verify -> DEBU 1a57 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:04.915 UTC [msp.identity] Verify -> DEBU 1a58 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:04.915 UTC [cauthdsl] func2 -> DEBU 1a59 0xc0042b2960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:04.915 UTC [cauthdsl] func1 -> DEBU 1a5a 0xc0042b2960 gate 1555913824914090800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:04.915 UTC [policies] Evaluate -> DEBU 1a5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.916 UTC [policies] Evaluate -> DEBU 1a5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.916 UTC [policies] Evaluate -> DEBU 1a5d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.916 UTC [policies] Evaluate -> DEBU 1a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:04.917 UTC [msp] DeserializeIdentity -> DEBU 1a5f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:04.918 UTC [gossip.gossip] handleMessage -> DEBU 1a60 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:05.121 UTC [gossip.comm] func1 -> DEBU 1a61 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:05.121 UTC [gossip.gossip] handleMessage -> DEBU 1a62 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:05.122 UTC [msp] DeserializeIdentity -> DEBU 1a63 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:05.122 UTC [msp] DeserializeIdentity -> DEBU 1a64 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:05.123 UTC [msp] DeserializeIdentity -> DEBU 1a65 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:05.123 UTC [gossip.gossip] handleMessage -> DEBU 1a66 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:05.852 UTC [msp.identity] Sign -> DEBU 1a67 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151019 " +peer0.org1.example.com | "2019-04-22 06:17:05.852 UTC [msp.identity] Sign -> DEBU 1a68 Sign: digest: 36B3A2AFE92775C577A4D5F52AD2E1AE7BAEA0F68266DB57A497ED62732CDDFC " +peer0.org1.example.com | "2019-04-22 06:17:05.852 UTC [msp.identity] Sign -> DEBU 1a69 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:05.853 UTC [msp.identity] Sign -> DEBU 1a6a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:05.853 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1a6b Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:05.861 UTC [msp] DeserializeIdentity -> DEBU 1a6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:05.861 UTC [msp] DeserializeIdentity -> DEBU 1a6d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:05.862 UTC [msp] DeserializeIdentity -> DEBU 1a6e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:05.862 UTC [gossip.comm] Send -> DEBU 1a6f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:05.862 UTC [msp] DeserializeIdentity -> DEBU 1a70 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:05.862 UTC [gossip.comm] Send -> DEBU 1a72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:05.862 UTC [gossip.comm] sendToEndpoint -> DEBU 1a71 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:05.863 UTC [gossip.comm] sendToEndpoint -> DEBU 1a73 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:05.863 UTC [gossip.comm] Send -> DEBU 1a74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:05.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1a75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:05.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1a76 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:05.865 UTC [gossip.comm] sendToEndpoint -> DEBU 1a77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:05.865 UTC [gossip.comm] sendToEndpoint -> DEBU 1a78 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.137 UTC [gossip.comm] func1 -> DEBU 1a79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.139 UTC [gossip.gossip] handleMessage -> DEBU 1a7a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.139 UTC [gossip.comm] func1 -> DEBU 1a7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.139 UTC [gossip.gossip] handleMessage -> DEBU 1a7c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.140 UTC [gossip.gossip] handleMessage -> DEBU 1a7d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.145 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a7f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:06.146 UTC [msp.identity] Verify -> DEBU 1a80 Verify: digest = 00000000 f7 e4 38 73 a1 05 dc 6f 84 11 12 22 ca 77 e0 10 |..8s...o...".w..| +peer0.org1.example.com | 00000010 fe 4b 87 25 8f 09 08 35 57 c1 17 79 6f 30 77 9d |.K.%...5W..yo0w.|" +peer0.org1.example.com | "2019-04-22 06:17:06.147 UTC [msp.identity] Verify -> DEBU 1a81 Verify: sig = 00000000 30 45 02 21 00 93 d0 14 ed 6f 01 68 f7 5f 8c 14 |0E.!.....o.h._..| +peer0.org1.example.com | 00000010 89 cd 5e 3f cf 28 d5 6c 0d a5 7e b0 aa a1 fc 51 |..^?.(.l..~....Q| +peer0.org1.example.com | 00000020 7b dc 1f e7 1d 02 20 2e dd 41 50 91 ae 86 bf 77 |{..... ..AP....w| +peer0.org1.example.com | 00000030 d3 df 02 de 0c 07 dd 96 f9 55 a5 f2 b2 87 c5 39 |.........U.....9| +peer0.org1.example.com | 00000040 06 cc aa 67 d0 ea 48 |...g..H|" +peer0.org1.example.com | "2019-04-22 06:17:06.149 UTC [msp.identity] Verify -> DEBU 1a82 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:06.150 UTC [msp.identity] Verify -> DEBU 1a83 Verify: sig = 00000000 30 45 02 21 00 bf 52 e8 f5 7e 90 5d ac 8e 5b ed |0E.!..R..~.]..[.| +peer0.org1.example.com | 00000010 cd 23 12 be b5 63 3c 62 ab 69 3b c1 7c 55 b1 fa |.#...c DEBU 1a84 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.150 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a85 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:06.151 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a86 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 " +peer0.org1.example.com | "2019-04-22 06:17:06.151 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a87 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 " +peer0.org1.example.com | "2019-04-22 06:17:06.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a88 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:06.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a89 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a8a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.154 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a8b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.154 UTC [gossip.gossip] handleMessage -> DEBU 1a8c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.154 UTC [gossip.gossip] handleMessage -> DEBU 1a8d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a8f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.155 UTC [gossip.gossip] handleMessage -> DEBU 1a90 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a92 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.160 UTC [msp] DeserializeIdentity -> DEBU 1a93 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.160 UTC [msp] DeserializeIdentity -> DEBU 1a94 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.161 UTC [msp] DeserializeIdentity -> DEBU 1a95 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.161 UTC [gossip.comm] Send -> DEBU 1a96 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.161 UTC [msp] DeserializeIdentity -> DEBU 1a97 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.162 UTC [gossip.comm] Send -> DEBU 1a98 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.162 UTC [gossip.comm] sendToEndpoint -> DEBU 1a99 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.162 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.163 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.163 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.473 UTC [gossip.election] waitForInterrupt -> DEBU 1a9d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.473 UTC [gossip.election] IsLeader -> DEBU 1a9e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:06.474 UTC [msp.identity] Sign -> DEBU 1a9f Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510061801 " +peer0.org1.example.com | "2019-04-22 06:17:06.474 UTC [msp.identity] Sign -> DEBU 1aa0 Sign: digest: 9EE17E559BC6BC2E22F4C57D015A5BBA6950C1C2195DFD78B4BBF840C4A335F5 " +peer0.org1.example.com | "2019-04-22 06:17:06.474 UTC [gossip.election] waitForInterrupt -> DEBU 1aa1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:06.480 UTC [msp] DeserializeIdentity -> DEBU 1aa2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.481 UTC [msp] DeserializeIdentity -> DEBU 1aa3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.481 UTC [msp] DeserializeIdentity -> DEBU 1aa4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.482 UTC [msp] DeserializeIdentity -> DEBU 1aa5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.482 UTC [gossip.comm] Send -> DEBU 1aa6 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.483 UTC [gossip.comm] sendToEndpoint -> DEBU 1aa7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.483 UTC [gossip.comm] sendToEndpoint -> DEBU 1aa8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.484 UTC [msp] DeserializeIdentity -> DEBU 1aa9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.484 UTC [msp] DeserializeIdentity -> DEBU 1aaa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.621 UTC [gossip.comm] func1 -> DEBU 1aab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.623 UTC [gossip.gossip] handleMessage -> DEBU 1aac Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.623 UTC [gossip.gossip] handleMessage -> DEBU 1aad Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.623 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1aaf Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:06.624 UTC [msp] DeserializeIdentity -> DEBU 1ab0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.624 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ab1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:06.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ab2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:06.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ab3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:06.625 UTC [policies] Evaluate -> DEBU 1ab4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:06.625 UTC [policies] Evaluate -> DEBU 1ab5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:06.626 UTC [policies] Evaluate -> DEBU 1ab6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:06.626 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc004312470 gate 1555913826626495600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:06.626 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc004312470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:06.626 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc004312470 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:06.626 UTC [cauthdsl] func2 -> DEBU 1aba 0xc004312470 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:06.627 UTC [msp.identity] Verify -> DEBU 1abb Verify: digest = 00000000 6c b0 13 64 3a f8 41 54 1d e7 85 ce ae fb 19 47 |l..d:.AT.......G| +peer0.org1.example.com | 00000010 31 ad 37 c7 bf fb 8d 91 50 96 14 90 fa e8 39 d7 |1.7.....P.....9.|" +peer0.org1.example.com | "2019-04-22 06:17:06.627 UTC [msp.identity] Verify -> DEBU 1abc Verify: sig = 00000000 30 45 02 21 00 be 25 cf 4b 3b f4 0f 96 8f e5 15 |0E.!..%.K;......| +peer0.org1.example.com | 00000010 12 a1 22 d8 aa 26 fa 9c c0 c2 85 e5 39 e9 f2 ea |.."..&......9...| +peer0.org1.example.com | 00000020 22 a3 77 01 12 02 20 52 ac ba 43 77 5e 83 76 43 |".w... R..Cw^.vC| +peer0.org1.example.com | 00000030 48 60 ee d3 db ca 07 b5 c0 b0 2b d4 9b ea 68 d0 |H`........+...h.| +peer0.org1.example.com | 00000040 4f 5d f4 1c fd d0 83 |O].....|" +peer0.org1.example.com | "2019-04-22 06:17:06.627 UTC [cauthdsl] func2 -> DEBU 1abd 0xc004312470 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:06.628 UTC [cauthdsl] func1 -> DEBU 1abe 0xc004312470 gate 1555913826626495600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:06.628 UTC [policies] Evaluate -> DEBU 1abf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.628 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.628 UTC [policies] Evaluate -> DEBU 1ac1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.629 UTC [policies] Evaluate -> DEBU 1ac2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ac3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:06.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac5 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 " +peer0.org1.example.com | "2019-04-22 06:17:06.631 UTC [gossip.comm] func1 -> DEBU 1ac6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.632 UTC [gossip.gossip] handleMessage -> DEBU 1ac7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 " +peer0.org1.example.com | "2019-04-22 06:17:06.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:06.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 1aca Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.634 UTC [gossip.discovery] handleAliveMessage -> DEBU 1acb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.634 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1acc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.634 UTC [gossip.gossip] handleMessage -> DEBU 1acd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.634 UTC [gossip.gossip] handleMessage -> DEBU 1ace Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.635 UTC [msp] DeserializeIdentity -> DEBU 1acf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.635 UTC [msp] DeserializeIdentity -> DEBU 1ad0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.637 UTC [gossip.comm] Send -> DEBU 1ad5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.637 UTC [msp] DeserializeIdentity -> DEBU 1ad6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.637 UTC [msp] DeserializeIdentity -> DEBU 1ad7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.637 UTC [gossip.comm] Send -> DEBU 1ad8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1ad9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1ada Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.639 UTC [gossip.comm] sendToEndpoint -> DEBU 1adb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.639 UTC [gossip.comm] sendToEndpoint -> DEBU 1adc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1add Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ade Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1adf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.647 UTC [gossip.gossip] handleMessage -> DEBU 1ae0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.891 UTC [gossip.pull] Hello -> DEBU 1ae2 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:06.891 UTC [gossip.comm] Send -> DEBU 1ae3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.892 UTC [gossip.pull] Hello -> DEBU 1ae4 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:06.892 UTC [gossip.comm] Send -> DEBU 1ae5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.892 UTC [gossip.pull] Hello -> DEBU 1ae6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:06.893 UTC [gossip.comm] Send -> DEBU 1ae7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.894 UTC [gossip.comm] sendToEndpoint -> DEBU 1aea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.894 UTC [gossip.comm] sendToEndpoint -> DEBU 1aeb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.895 UTC [gossip.comm] sendToEndpoint -> DEBU 1aec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1aed Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.897 UTC [gossip.comm] func1 -> DEBU 1aee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2421829310105822763 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.899 UTC [gossip.comm] func1 -> DEBU 1aef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8388459247206392471 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.899 UTC [gossip.gossip] handleMessage -> DEBU 1af0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10897878003932075742 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.900 UTC [gossip.pull] HandleMessage -> DEBU 1af1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10897878003932075742 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2421829310105822763 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.901 UTC [gossip.pull] HandleMessage -> DEBU 1af4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2421829310105822763 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8388459247206392471 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.902 UTC [gossip.pull] HandleMessage -> DEBU 1af7 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8388459247206392471 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.902 UTC [gossip.gossip] handleMessage -> DEBU 1af8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.923 UTC [msp.identity] Sign -> DEBU 1af9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101A " +peer0.org1.example.com | "2019-04-22 06:17:06.923 UTC [msp.identity] Sign -> DEBU 1afa Sign: digest: E9F65E69CF01B32F87F59651BA1FA3DD552F15C9B735AC0DA7B15EFB2CAD3BA2 " +peer0.org1.example.com | "2019-04-22 06:17:06.923 UTC [msp.identity] Sign -> DEBU 1afb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:06.924 UTC [msp.identity] Sign -> DEBU 1afc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:06.924 UTC [gossip.comm] Send -> DEBU 1afd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.924 UTC [msp] DeserializeIdentity -> DEBU 1afe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.925 UTC [gossip.comm] Send -> DEBU 1aff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.925 UTC [msp] DeserializeIdentity -> DEBU 1b00 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.925 UTC [gossip.comm] Send -> DEBU 1b01 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b05 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.927 UTC [gossip.comm] sendToEndpoint -> DEBU 1b06 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.927 UTC [gossip.comm] sendToEndpoint -> DEBU 1b07 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.930 UTC [gossip.gossip] handleMessage -> DEBU 1b08 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.930 UTC [gossip.gossip] handleMessage -> DEBU 1b09 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b0b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:06.932 UTC [gossip.comm] func1 -> DEBU 1b0c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.932 UTC [msp.identity] Verify -> DEBU 1b0d Verify: digest = 00000000 e9 f6 5e 69 cf 01 b3 2f 87 f5 96 51 ba 1f a3 dd |..^i.../...Q....| +peer0.org1.example.com | 00000010 55 2f 15 c9 b7 35 ac 0d a7 b1 5e fb 2c ad 3b a2 |U/...5....^.,.;.|" +peer0.org1.example.com | "2019-04-22 06:17:06.933 UTC [gossip.gossip] handleMessage -> DEBU 1b0f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.933 UTC [msp.identity] Verify -> DEBU 1b10 Verify: sig = 00000000 30 45 02 21 00 b8 52 e6 6a b6 ed 10 a1 d7 52 e2 |0E.!..R.j.....R.| +peer0.org1.example.com | 00000010 54 22 5f 88 60 77 a3 bb 58 80 dc 86 87 e2 77 24 |T"_.`w..X.....w$| +peer0.org1.example.com | 00000020 83 60 c2 8a e9 02 20 31 8f 42 76 ab ec 6f d9 df |.`.... 1.Bv..o..| +peer0.org1.example.com | 00000030 5a 3e 3b 14 53 d5 bd b6 e5 47 6e ea 55 ac 8f 35 |Z>;.S....Gn.U..5| +peer0.org1.example.com | 00000040 b2 88 e4 80 c1 6a e1 |.....j.|" +peer0.org1.example.com | "2019-04-22 06:17:06.933 UTC [gossip.comm] func1 -> DEBU 1b0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.934 UTC [gossip.discovery] isSentByMe -> DEBU 1b12 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b13 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b14 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b15 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.935 UTC [gossip.gossip] handleMessage -> DEBU 1b16 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b17 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:06.935 UTC [gossip.gossip] handleMessage -> DEBU 1b18 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.936 UTC [msp.identity] Verify -> DEBU 1b19 Verify: digest = 00000000 e9 f6 5e 69 cf 01 b3 2f 87 f5 96 51 ba 1f a3 dd |..^i.../...Q....| +peer0.org1.example.com | 00000010 55 2f 15 c9 b7 35 ac 0d a7 b1 5e fb 2c ad 3b a2 |U/...5....^.,.;.|" +peer0.org1.example.com | "2019-04-22 06:17:06.937 UTC [msp.identity] Verify -> DEBU 1b1a Verify: sig = 00000000 30 45 02 21 00 b8 52 e6 6a b6 ed 10 a1 d7 52 e2 |0E.!..R.j.....R.| +peer0.org1.example.com | 00000010 54 22 5f 88 60 77 a3 bb 58 80 dc 86 87 e2 77 24 |T"_.`w..X.....w$| +peer0.org1.example.com | 00000020 83 60 c2 8a e9 02 20 31 8f 42 76 ab ec 6f d9 df |.`.... 1.Bv..o..| +peer0.org1.example.com | 00000030 5a 3e 3b 14 53 d5 bd b6 e5 47 6e ea 55 ac 8f 35 |Z>;.S....Gn.U..5| +peer0.org1.example.com | 00000040 b2 88 e4 80 c1 6a e1 |.....j.|" +peer0.org1.example.com | "2019-04-22 06:17:06.937 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b1b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.937 UTC [gossip.discovery] isSentByMe -> DEBU 1b1c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b1d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b1e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:06.938 UTC [msp] DeserializeIdentity -> DEBU 1b1f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:06.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:06.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b21 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:06.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b22 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:06.939 UTC [policies] Evaluate -> DEBU 1b23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:06.939 UTC [policies] Evaluate -> DEBU 1b24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:06.939 UTC [policies] Evaluate -> DEBU 1b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:06.940 UTC [cauthdsl] func1 -> DEBU 1b26 0xc00437cc80 gate 1555913826939930200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:06.940 UTC [cauthdsl] func2 -> DEBU 1b27 0xc00437cc80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:06.940 UTC [cauthdsl] func2 -> DEBU 1b28 0xc00437cc80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:06.940 UTC [cauthdsl] func2 -> DEBU 1b29 0xc00437cc80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:06.940 UTC [msp.identity] Verify -> DEBU 1b2a Verify: digest = 00000000 b5 08 b4 8c b9 84 c3 e3 7b d9 2b 4c 13 b8 69 aa |........{.+L..i.| +peer0.org1.example.com | 00000010 7d eb d0 fc 9b 5e ff d2 c9 a5 0c 38 2f 6a 46 30 |}....^.....8/jF0|" +peer0.org1.example.com | "2019-04-22 06:17:06.941 UTC [msp.identity] Verify -> DEBU 1b2b Verify: sig = 00000000 30 44 02 20 47 24 0c c2 a9 ae 13 41 52 0c 63 69 |0D. G$.....AR.ci| +peer0.org1.example.com | 00000010 ef 4a 00 d8 07 b5 1f e0 80 05 be 75 fd 6d e5 5d |.J.........u.m.]| +peer0.org1.example.com | 00000020 5b 7d bf 25 02 20 7e c3 70 af 88 62 04 b7 c8 fe |[}.%. ~.p..b....| +peer0.org1.example.com | 00000030 2f e8 ff 3d 33 06 5a 51 58 cd 86 f3 a7 4a 15 8f |/..=3.ZQX....J..| +peer0.org1.example.com | 00000040 75 cd 03 ca 58 6d |u...Xm|" +peer0.org1.example.com | "2019-04-22 06:17:06.941 UTC [cauthdsl] func2 -> DEBU 1b2c 0xc00437cc80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:06.941 UTC [cauthdsl] func1 -> DEBU 1b2d 0xc00437cc80 gate 1555913826939930200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:06.942 UTC [policies] Evaluate -> DEBU 1b2e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.943 UTC [policies] Evaluate -> DEBU 1b2f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.943 UTC [policies] Evaluate -> DEBU 1b30 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.944 UTC [policies] Evaluate -> DEBU 1b31 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:06.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b33 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b34 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b35 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b37 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:06.945 UTC [gossip.gossip] handleMessage -> DEBU 1b36 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.948 UTC [msp.identity] Verify -> DEBU 1b38 Verify: digest = 00000000 e9 f6 5e 69 cf 01 b3 2f 87 f5 96 51 ba 1f a3 dd |..^i.../...Q....| +peer0.org1.example.com | 00000010 55 2f 15 c9 b7 35 ac 0d a7 b1 5e fb 2c ad 3b a2 |U/...5....^.,.;.|" +peer0.org1.example.com | "2019-04-22 06:17:06.948 UTC [msp.identity] Verify -> DEBU 1b39 Verify: sig = 00000000 30 45 02 21 00 b8 52 e6 6a b6 ed 10 a1 d7 52 e2 |0E.!..R.j.....R.| +peer0.org1.example.com | 00000010 54 22 5f 88 60 77 a3 bb 58 80 dc 86 87 e2 77 24 |T"_.`w..X.....w$| +peer0.org1.example.com | 00000020 83 60 c2 8a e9 02 20 31 8f 42 76 ab ec 6f d9 df |.`.... 1.Bv..o..| +peer0.org1.example.com | 00000030 5a 3e 3b 14 53 d5 bd b6 e5 47 6e ea 55 ac 8f 35 |Z>;.S....Gn.U..5| +peer0.org1.example.com | 00000040 b2 88 e4 80 c1 6a e1 |.....j.|" +peer0.org1.example.com | "2019-04-22 06:17:06.949 UTC [msp.identity] Verify -> DEBU 1b3a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:06.949 UTC [msp.identity] Verify -> DEBU 1b3b Verify: sig = 00000000 30 44 02 20 72 29 94 4d fe 42 45 6e be b9 74 7c |0D. r).M.BEn..t|| +peer0.org1.example.com | 00000010 d1 00 a0 0d 0f a1 e2 96 04 64 84 9a 9f 4e 58 ef |.........d...NX.| +peer0.org1.example.com | 00000020 07 69 a2 e5 02 20 3f b9 c3 c7 f9 dc 55 ad d4 06 |.i... ?.....U...| +peer0.org1.example.com | 00000030 4f a8 5b 90 4b 7b 21 92 b7 be a6 54 2d 20 2e 45 |O.[.K{!....T- .E| +peer0.org1.example.com | 00000040 d0 08 34 d6 87 6d |..4..m|" +peer0.org1.example.com | "2019-04-22 06:17:06.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.954 UTC [gossip.discovery] isSentByMe -> DEBU 1b3d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:06.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:06.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b3f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.051 UTC [gossip.gossip] handleMessage -> DEBU 1b40 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.051 UTC [gossip.gossip] handleMessage -> DEBU 1b41 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b42 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.053 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b43 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:07.054 UTC [msp] DeserializeIdentity -> DEBU 1b44 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.054 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:07.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b46 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:07.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b47 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:07.056 UTC [policies] Evaluate -> DEBU 1b48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:07.056 UTC [policies] Evaluate -> DEBU 1b49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:07.056 UTC [policies] Evaluate -> DEBU 1b4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:07.057 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc004339b60 gate 1555913827057187600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:07.057 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc004339b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:07.057 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc004339b60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:07.057 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc004339b60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:07.057 UTC [msp.identity] Verify -> DEBU 1b4f Verify: digest = 00000000 66 dc 81 ee 7a ff 3c f0 75 94 fa e0 40 61 69 26 |f...z.<.u...@ai&| +peer0.org1.example.com | 00000010 ef b1 fd 02 03 0c e3 6c 57 17 34 30 1f 03 5f 98 |.......lW.40.._.|" +peer0.org1.example.com | "2019-04-22 06:17:07.058 UTC [msp.identity] Verify -> DEBU 1b50 Verify: sig = 00000000 30 45 02 21 00 cc 82 52 ea b6 b4 a2 37 ac cf c6 |0E.!...R....7...| +peer0.org1.example.com | 00000010 80 66 16 5a ab de d3 10 26 8c 4e e9 61 77 3a 1f |.f.Z....&.N.aw:.| +peer0.org1.example.com | 00000020 6d c4 69 9f 47 02 20 7a 77 48 af 5c a2 af 53 50 |m.i.G. zwH.\..SP| +peer0.org1.example.com | 00000030 a8 cd 55 39 bb e6 de 09 42 1f fc be d8 fb a2 aa |..U9....B.......| +peer0.org1.example.com | 00000040 04 5a 95 e8 74 bc 4f |.Z..t.O|" +peer0.org1.example.com | "2019-04-22 06:17:07.059 UTC [cauthdsl] func2 -> DEBU 1b51 0xc004339b60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:07.059 UTC [cauthdsl] func1 -> DEBU 1b52 0xc004339b60 gate 1555913827057187600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b53 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b54 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b55 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.060 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b57 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b58 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:07.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b59 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 " +peer0.org1.example.com | "2019-04-22 06:17:07.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 " +peer0.org1.example.com | "2019-04-22 06:17:07.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:07.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.063 UTC [gossip.comm] func1 -> DEBU 1b5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.063 UTC [gossip.gossip] handleMessage -> DEBU 1b5f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.064 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b60 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.064 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.064 UTC [gossip.gossip] handleMessage -> DEBU 1b62 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b63 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.066 UTC [gossip.comm] func1 -> DEBU 1b64 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.067 UTC [gossip.gossip] handleMessage -> DEBU 1b65 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.067 UTC [gossip.gossip] handleMessage -> DEBU 1b66 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b68 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.071 UTC [msp] DeserializeIdentity -> DEBU 1b69 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.072 UTC [msp] DeserializeIdentity -> DEBU 1b6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.072 UTC [msp] DeserializeIdentity -> DEBU 1b6b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.072 UTC [msp] DeserializeIdentity -> DEBU 1b6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.073 UTC [msp] DeserializeIdentity -> DEBU 1b6d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.073 UTC [msp] DeserializeIdentity -> DEBU 1b6e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.073 UTC [msp] DeserializeIdentity -> DEBU 1b6f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.074 UTC [gossip.comm] Send -> DEBU 1b70 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:07.074 UTC [msp] DeserializeIdentity -> DEBU 1b71 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.074 UTC [gossip.comm] Send -> DEBU 1b73 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:07.074 UTC [gossip.comm] sendToEndpoint -> DEBU 1b72 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.075 UTC [gossip.comm] sendToEndpoint -> DEBU 1b74 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1b75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1b76 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.158 UTC [gossip.comm] func1 -> DEBU 1b77 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.159 UTC [gossip.gossip] handleMessage -> DEBU 1b78 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.159 UTC [gossip.pull] HandleMessage -> DEBU 1b79 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.160 UTC [gossip.pull] SendDigest -> DEBU 1b7a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:07.160 UTC [gossip.gossip] handleMessage -> DEBU 1b7b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.179 UTC [gossip.comm] func1 -> DEBU 1b7c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.180 UTC [gossip.gossip] handleMessage -> DEBU 1b7d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.180 UTC [gossip.gossip] handleMessage -> DEBU 1b7e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.182 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b80 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:07.182 UTC [msp.identity] Verify -> DEBU 1b81 Verify: digest = 00000000 b5 cc bc 52 b3 cb a7 58 b9 59 f5 f4 09 e9 eb 6a |...R...X.Y.....j| +peer0.org1.example.com | 00000010 44 14 d9 35 9d b8 6c 08 64 b1 96 10 78 d0 d4 28 |D..5..l.d...x..(|" +peer0.org1.example.com | "2019-04-22 06:17:07.182 UTC [msp.identity] Verify -> DEBU 1b82 Verify: sig = 00000000 30 44 02 20 1b 28 37 a8 7e 00 24 72 e4 d1 eb bf |0D. .(7.~.$r....| +peer0.org1.example.com | 00000010 0f d7 b1 74 8e 08 ff 23 5d cb aa 7f 0f 29 31 a1 |...t...#]....)1.| +peer0.org1.example.com | 00000020 fa b1 1a a9 02 20 1d e9 8f 0a a5 91 17 80 71 e9 |..... ........q.| +peer0.org1.example.com | 00000030 bf 4a 2b 2b e2 80 79 57 d1 b4 a0 90 58 22 df 06 |.J++..yW....X"..| +peer0.org1.example.com | 00000040 29 b6 17 b6 d9 ba |).....|" +peer0.org1.example.com | "2019-04-22 06:17:07.183 UTC [msp.identity] Verify -> DEBU 1b83 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:07.184 UTC [msp.identity] Verify -> DEBU 1b84 Verify: sig = 00000000 30 45 02 21 00 cf a0 74 81 99 ea 93 28 76 d5 8c |0E.!...t....(v..| +peer0.org1.example.com | 00000010 d2 5f 0b a3 ff 7d fa b2 8e 59 47 af d2 71 4c 54 |._...}...YG..qLT| +peer0.org1.example.com | 00000020 2a 2f 61 41 46 02 20 3a 24 4a 58 f6 f7 f0 f9 a8 |*/aAF. :$JX.....| +peer0.org1.example.com | 00000030 bb f7 61 91 95 2f 9a 62 53 01 33 24 ce 18 25 20 |..a../.bS.3$..% | +peer0.org1.example.com | 00000040 73 db 09 89 c9 8f 4d |s.....M|" +peer0.org1.example.com | "2019-04-22 06:17:07.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b85 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b86 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:07.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b87 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 " +peer0.org1.example.com | "2019-04-22 06:17:07.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b88 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 " +peer0.org1.example.com | "2019-04-22 06:17:07.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b89 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:07.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.188 UTC [gossip.discovery] sendMemResponse -> DEBU 1b8c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:07.189 UTC [msp] DeserializeIdentity -> DEBU 1b8d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.189 UTC [msp] DeserializeIdentity -> DEBU 1b8e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.190 UTC [gossip.comm] Send -> DEBU 1b8f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:07.190 UTC [gossip.discovery] sendMemResponse -> DEBU 1b90 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:07.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1b91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1b92 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b93 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.620 UTC [gossip.comm] func1 -> DEBU 1b94 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.620 UTC [gossip.gossip] handleMessage -> DEBU 1b95 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.621 UTC [gossip.pull] HandleMessage -> DEBU 1b96 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.621 UTC [msp] DeserializeIdentity -> DEBU 1b97 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.621 UTC [msp] DeserializeIdentity -> DEBU 1b98 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.622 UTC [msp] DeserializeIdentity -> DEBU 1b99 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.623 UTC [msp] DeserializeIdentity -> DEBU 1b9a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.623 UTC [msp] DeserializeIdentity -> DEBU 1b9b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.623 UTC [msp] DeserializeIdentity -> DEBU 1b9c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.624 UTC [gossip.pull] SendDigest -> DEBU 1b9d Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:07.624 UTC [gossip.gossip] handleMessage -> DEBU 1b9e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.629 UTC [gossip.comm] func1 -> DEBU 1b9f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.629 UTC [gossip.gossip] handleMessage -> DEBU 1ba0 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.631 UTC [gossip.gossip] handleMessage -> DEBU 1ba1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.632 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.632 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ba3 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:07.632 UTC [msp] DeserializeIdentity -> DEBU 1ba4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.635 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ba5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:07.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:07.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:07.635 UTC [policies] Evaluate -> DEBU 1ba8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:07.636 UTC [policies] Evaluate -> DEBU 1ba9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:07.636 UTC [policies] Evaluate -> DEBU 1baa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:07.636 UTC [cauthdsl] func1 -> DEBU 1bab 0xc0043f3210 gate 1555913827636773200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:07.636 UTC [cauthdsl] func2 -> DEBU 1bac 0xc0043f3210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:07.636 UTC [cauthdsl] func2 -> DEBU 1bad 0xc0043f3210 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:07.636 UTC [cauthdsl] func2 -> DEBU 1bae 0xc0043f3210 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:07.637 UTC [msp.identity] Verify -> DEBU 1baf Verify: digest = 00000000 6a 42 aa 15 8a d8 66 79 94 f2 29 bf 21 02 bb c5 |jB....fy..).!...| +peer0.org1.example.com | 00000010 a8 e7 0a bf 60 4f 56 f9 d7 07 8c 69 b0 be 9c ec |....`OV....i....|" +peer0.org1.example.com | "2019-04-22 06:17:07.637 UTC [msp.identity] Verify -> DEBU 1bb0 Verify: sig = 00000000 30 45 02 21 00 e4 0f 6e 9f 8b d6 92 64 39 17 60 |0E.!...n....d9.`| +peer0.org1.example.com | 00000010 ca ce ac 86 c4 10 40 7a ab a0 e5 a1 7e df 5e 59 |......@z....~.^Y| +peer0.org1.example.com | 00000020 ec cd 31 62 63 02 20 2e 4e bc 2f e2 69 c9 24 bf |..1bc. .N./.i.$.| +peer0.org1.example.com | 00000030 c0 09 a6 b5 dd f3 95 3f 87 02 61 d0 3b 00 2d 04 |.......?..a.;.-.| +peer0.org1.example.com | 00000040 3f d0 61 e8 20 d3 9e |?.a. ..|" +peer0.org1.example.com | "2019-04-22 06:17:07.637 UTC [cauthdsl] func2 -> DEBU 1bb1 0xc0043f3210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:07.637 UTC [cauthdsl] func1 -> DEBU 1bb2 0xc0043f3210 gate 1555913827636773200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:07.637 UTC [policies] Evaluate -> DEBU 1bb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.637 UTC [policies] Evaluate -> DEBU 1bb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.638 UTC [policies] Evaluate -> DEBU 1bb5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.638 UTC [policies] Evaluate -> DEBU 1bb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:07.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bb8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bb9 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 " +peer0.org1.example.com | "2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bba Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 " +peer0.org1.example.com | "2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:07.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bbd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bbe Exiting" +peer0.org1.example.com | "2019-04-22 06:17:07.639 UTC [gossip.discovery] sendMemResponse -> DEBU 1bbf Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:07.640 UTC [msp] DeserializeIdentity -> DEBU 1bc0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.647 UTC [msp] DeserializeIdentity -> DEBU 1bc1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.647 UTC [msp] DeserializeIdentity -> DEBU 1bc2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:07.647 UTC [gossip.comm] Send -> DEBU 1bc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:07.648 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc4 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:07.648 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:07.648 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.033 UTC [gossip.gossip] handleMessage -> DEBU 1bc7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.034 UTC [gossip.pull] HandleMessage -> DEBU 1bc8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.034 UTC [msp] DeserializeIdentity -> DEBU 1bc9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.034 UTC [msp] DeserializeIdentity -> DEBU 1bca Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.035 UTC [msp] DeserializeIdentity -> DEBU 1bcb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.035 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.036 UTC [msp] DeserializeIdentity -> DEBU 1bcd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.036 UTC [msp] DeserializeIdentity -> DEBU 1bce Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.038 UTC [gossip.pull] SendDigest -> DEBU 1bcf Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:08.038 UTC [gossip.gossip] handleMessage -> DEBU 1bd0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.054 UTC [gossip.gossip] handleMessage -> DEBU 1bd1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.055 UTC [gossip.gossip] handleMessage -> DEBU 1bd2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.056 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bd4 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:08.056 UTC [msp] DeserializeIdentity -> DEBU 1bd5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bd6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:08.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.058 UTC [policies] Evaluate -> DEBU 1bd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.058 UTC [policies] Evaluate -> DEBU 1bda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:08.059 UTC [policies] Evaluate -> DEBU 1bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.059 UTC [cauthdsl] func1 -> DEBU 1bdc 0xc0044194a0 gate 1555913828059882900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:08.060 UTC [cauthdsl] func2 -> DEBU 1bdd 0xc0044194a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:08.060 UTC [cauthdsl] func2 -> DEBU 1bde 0xc0044194a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:08.061 UTC [cauthdsl] func2 -> DEBU 1bdf 0xc0044194a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.061 UTC [msp.identity] Verify -> DEBU 1be0 Verify: digest = 00000000 5d 5f 2c e3 0b 9c 94 0b f7 6b 12 20 50 a0 81 41 |]_,......k. P..A| +peer0.org1.example.com | 00000010 93 ef 2c 51 10 1c 57 d8 94 fd 76 f8 09 4c be 41 |..,Q..W...v..L.A|" +peer0.org1.example.com | "2019-04-22 06:17:08.064 UTC [msp.identity] Verify -> DEBU 1be1 Verify: sig = 00000000 30 44 02 20 57 da c6 09 c4 1e 43 e4 a9 68 f7 f8 |0D. W.....C..h..| +peer0.org1.example.com | 00000010 05 2e aa 6a d0 c7 df 44 d8 ed 9f 71 ab 38 bb b8 |...j...D...q.8..| +peer0.org1.example.com | 00000020 6a b8 6d 1f 02 20 47 40 92 a7 27 8a 1a 31 15 4b |j.m.. G@..'..1.K| +peer0.org1.example.com | 00000030 bc 11 52 6d 05 54 50 4c 5a 68 75 c5 5d fe 81 32 |..Rm.TPLZhu.]..2| +peer0.org1.example.com | 00000040 c6 a3 cf 63 2b c7 |...c+.|" +peer0.org1.example.com | "2019-04-22 06:17:08.065 UTC [cauthdsl] func2 -> DEBU 1be2 0xc0044194a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.065 UTC [cauthdsl] func1 -> DEBU 1be3 0xc0044194a0 gate 1555913828059882900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:08.065 UTC [policies] Evaluate -> DEBU 1be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.065 UTC [policies] Evaluate -> DEBU 1be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.066 UTC [policies] Evaluate -> DEBU 1be6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.066 UTC [policies] Evaluate -> DEBU 1be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 1be8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 1be9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bea updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 " +peer0.org1.example.com | "2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1beb Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 " +peer0.org1.example.com | "2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bec Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bed Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.068 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bee Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.068 UTC [gossip.discovery] sendMemResponse -> DEBU 1bf0 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:08.069 UTC [msp] DeserializeIdentity -> DEBU 1bf1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.069 UTC [msp] DeserializeIdentity -> DEBU 1bf2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.069 UTC [msp] DeserializeIdentity -> DEBU 1bf3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.070 UTC [gossip.comm] Send -> DEBU 1bf4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:08.070 UTC [gossip.discovery] sendMemResponse -> DEBU 1bf5 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:08.070 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.070 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.423 UTC [msp] DeserializeIdentity -> DEBU 1bf8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.423 UTC [msp] DeserializeIdentity -> DEBU 1bf9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.423 UTC [gossip.comm] Send -> DEBU 1bfa Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfe Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1bff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1c00 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.426 UTC [gossip.gossip] handleMessage -> DEBU 1c01 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.427 UTC [msp] DeserializeIdentity -> DEBU 1c02 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.427 UTC [msp] DeserializeIdentity -> DEBU 1c03 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.428 UTC [msp] DeserializeIdentity -> DEBU 1c04 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.428 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:08.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c06 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c07 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.429 UTC [policies] Evaluate -> DEBU 1c08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.430 UTC [policies] Evaluate -> DEBU 1c09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:08.430 UTC [policies] Evaluate -> DEBU 1c0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.431 UTC [gossip.comm] func1 -> DEBU 1c0b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.431 UTC [cauthdsl] func1 -> DEBU 1c0c 0xc00442fea0 gate 1555913828431164100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:08.432 UTC [cauthdsl] func2 -> DEBU 1c0d 0xc00442fea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:08.432 UTC [cauthdsl] func2 -> DEBU 1c0e 0xc00442fea0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:08.432 UTC [gossip.comm] func1 -> DEBU 1c0f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.433 UTC [cauthdsl] func2 -> DEBU 1c10 0xc00442fea0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.433 UTC [msp.identity] Verify -> DEBU 1c11 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:08.433 UTC [msp.identity] Verify -> DEBU 1c12 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:08.434 UTC [cauthdsl] func2 -> DEBU 1c13 0xc00442fea0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.434 UTC [cauthdsl] func1 -> DEBU 1c14 0xc00442fea0 gate 1555913828431164100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:08.434 UTC [policies] Evaluate -> DEBU 1c15 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.434 UTC [policies] Evaluate -> DEBU 1c16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.435 UTC [policies] Evaluate -> DEBU 1c17 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.435 UTC [policies] Evaluate -> DEBU 1c18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.435 UTC [msp] DeserializeIdentity -> DEBU 1c19 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.436 UTC [msp] DeserializeIdentity -> DEBU 1c1a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.436 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:08.436 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c1c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c1d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.437 UTC [policies] Evaluate -> DEBU 1c1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.437 UTC [policies] Evaluate -> DEBU 1c1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:08.437 UTC [policies] Evaluate -> DEBU 1c20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.437 UTC [cauthdsl] func1 -> DEBU 1c21 0xc004449670 gate 1555913828437798400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:08.437 UTC [cauthdsl] func2 -> DEBU 1c22 0xc004449670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:08.438 UTC [cauthdsl] func2 -> DEBU 1c23 0xc004449670 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:08.438 UTC [cauthdsl] func2 -> DEBU 1c24 0xc004449670 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.438 UTC [msp.identity] Verify -> DEBU 1c25 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:08.438 UTC [msp.identity] Verify -> DEBU 1c26 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:08.439 UTC [cauthdsl] func2 -> DEBU 1c27 0xc004449670 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.439 UTC [cauthdsl] func1 -> DEBU 1c28 0xc004449670 gate 1555913828437798400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:08.439 UTC [policies] Evaluate -> DEBU 1c29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.439 UTC [policies] Evaluate -> DEBU 1c2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.440 UTC [policies] Evaluate -> DEBU 1c2b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.440 UTC [policies] Evaluate -> DEBU 1c2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.442 UTC [msp.identity] Verify -> DEBU 1c2d Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:08.442 UTC [msp.identity] Verify -> DEBU 1c2e Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:08.443 UTC [msp.identity] Verify -> DEBU 1c2f Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:08.443 UTC [msp.identity] Verify -> DEBU 1c30 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:08.444 UTC [gossip.gossip] handleMessage -> DEBU 1c31 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.444 UTC [gossip.gossip] handleMessage -> DEBU 1c32 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.444 UTC [msp.identity] Verify -> DEBU 1c33 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:08.445 UTC [msp.identity] Verify -> DEBU 1c34 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:08.445 UTC [msp] DeserializeIdentity -> DEBU 1c35 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.445 UTC [msp] DeserializeIdentity -> DEBU 1c36 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.447 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:08.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c38 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c39 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.448 UTC [policies] Evaluate -> DEBU 1c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.448 UTC [policies] Evaluate -> DEBU 1c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:08.448 UTC [policies] Evaluate -> DEBU 1c3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.449 UTC [cauthdsl] func1 -> DEBU 1c3d 0xc0044825e0 gate 1555913828449171900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:08.449 UTC [cauthdsl] func2 -> DEBU 1c3e 0xc0044825e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:08.449 UTC [cauthdsl] func2 -> DEBU 1c3f 0xc0044825e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:08.449 UTC [cauthdsl] func2 -> DEBU 1c40 0xc0044825e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.450 UTC [msp.identity] Verify -> DEBU 1c41 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:08.450 UTC [msp.identity] Verify -> DEBU 1c42 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:08.450 UTC [cauthdsl] func2 -> DEBU 1c43 0xc0044825e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.450 UTC [cauthdsl] func1 -> DEBU 1c44 0xc0044825e0 gate 1555913828449171900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c45 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c47 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.452 UTC [msp.identity] Verify -> DEBU 1c49 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:08.452 UTC [msp.identity] Verify -> DEBU 1c4a Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:08.453 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.453 UTC [msp] DeserializeIdentity -> DEBU 1c4c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.454 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:08.455 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.455 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.455 UTC [policies] Evaluate -> DEBU 1c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.455 UTC [policies] Evaluate -> DEBU 1c51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:08.456 UTC [policies] Evaluate -> DEBU 1c52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.456 UTC [cauthdsl] func1 -> DEBU 1c53 0xc0044964d0 gate 1555913828456398000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:08.456 UTC [cauthdsl] func2 -> DEBU 1c54 0xc0044964d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:08.456 UTC [cauthdsl] func2 -> DEBU 1c55 0xc0044964d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:08.456 UTC [cauthdsl] func2 -> DEBU 1c56 0xc0044964d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.457 UTC [msp.identity] Verify -> DEBU 1c57 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:08.457 UTC [msp.identity] Verify -> DEBU 1c58 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:08.458 UTC [cauthdsl] func2 -> DEBU 1c59 0xc0044964d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.458 UTC [cauthdsl] func1 -> DEBU 1c5a 0xc0044964d0 gate 1555913828456398000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:08.458 UTC [policies] Evaluate -> DEBU 1c5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.458 UTC [policies] Evaluate -> DEBU 1c5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.459 UTC [policies] Evaluate -> DEBU 1c5d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.459 UTC [policies] Evaluate -> DEBU 1c5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.459 UTC [gossip.gossip] handleMessage -> DEBU 1c5f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.459 UTC [gossip.gossip] handleMessage -> DEBU 1c60 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.460 UTC [msp] DeserializeIdentity -> DEBU 1c61 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.460 UTC [msp] DeserializeIdentity -> DEBU 1c62 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.461 UTC [msp] DeserializeIdentity -> DEBU 1c63 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.461 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:08.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c65 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.462 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c66 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.462 UTC [policies] Evaluate -> DEBU 1c67 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.462 UTC [policies] Evaluate -> DEBU 1c68 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:08.463 UTC [policies] Evaluate -> DEBU 1c69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.464 UTC [cauthdsl] func1 -> DEBU 1c6a 0xc004497fe0 gate 1555913828464274400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:08.464 UTC [cauthdsl] func2 -> DEBU 1c6b 0xc004497fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:08.464 UTC [cauthdsl] func2 -> DEBU 1c6c 0xc004497fe0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:08.465 UTC [cauthdsl] func2 -> DEBU 1c6d 0xc004497fe0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.465 UTC [msp.identity] Verify -> DEBU 1c6e Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:08.465 UTC [msp.identity] Verify -> DEBU 1c6f Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:08.466 UTC [cauthdsl] func2 -> DEBU 1c70 0xc004497fe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.466 UTC [cauthdsl] func1 -> DEBU 1c71 0xc004497fe0 gate 1555913828464274400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:08.466 UTC [policies] Evaluate -> DEBU 1c72 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.466 UTC [policies] Evaluate -> DEBU 1c73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.467 UTC [policies] Evaluate -> DEBU 1c74 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.467 UTC [policies] Evaluate -> DEBU 1c75 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.467 UTC [msp] DeserializeIdentity -> DEBU 1c76 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.467 UTC [msp] DeserializeIdentity -> DEBU 1c77 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.468 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:08.468 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c79 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.469 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:08.469 UTC [policies] Evaluate -> DEBU 1c7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.470 UTC [policies] Evaluate -> DEBU 1c7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:08.470 UTC [policies] Evaluate -> DEBU 1c7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:08.470 UTC [cauthdsl] func1 -> DEBU 1c7e 0xc0044a97b0 gate 1555913828470662900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:08.470 UTC [cauthdsl] func2 -> DEBU 1c7f 0xc0044a97b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:08.471 UTC [cauthdsl] func2 -> DEBU 1c80 0xc0044a97b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:08.471 UTC [cauthdsl] func2 -> DEBU 1c81 0xc0044a97b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.471 UTC [msp.identity] Verify -> DEBU 1c82 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:08.471 UTC [msp.identity] Verify -> DEBU 1c83 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:08.472 UTC [cauthdsl] func2 -> DEBU 1c84 0xc0044a97b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:08.472 UTC [cauthdsl] func1 -> DEBU 1c85 0xc0044a97b0 gate 1555913828470662900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:08.473 UTC [policies] Evaluate -> DEBU 1c86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.473 UTC [policies] Evaluate -> DEBU 1c87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.473 UTC [policies] Evaluate -> DEBU 1c88 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.474 UTC [policies] Evaluate -> DEBU 1c89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:08.475 UTC [msp.identity] Verify -> DEBU 1c8a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:08.475 UTC [msp.identity] Verify -> DEBU 1c8b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:08.476 UTC [msp.identity] Verify -> DEBU 1c8c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:08.476 UTC [msp.identity] Verify -> DEBU 1c8d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:08.477 UTC [gossip.gossip] handleMessage -> DEBU 1c8e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.486 UTC [msp] DeserializeIdentity -> DEBU 1c8f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.487 UTC [msp] DeserializeIdentity -> DEBU 1c90 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.487 UTC [gossip.pull] Hello -> DEBU 1c91 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:08.488 UTC [msp] DeserializeIdentity -> DEBU 1c92 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.488 UTC [msp] DeserializeIdentity -> DEBU 1c93 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.488 UTC [gossip.comm] Send -> DEBU 1c94 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:08.489 UTC [gossip.comm] sendToEndpoint -> DEBU 1c95 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.489 UTC [gossip.comm] sendToEndpoint -> DEBU 1c96 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.491 UTC [gossip.comm] func1 -> DEBU 1c97 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15614556382781871061 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.491 UTC [gossip.gossip] handleMessage -> DEBU 1c98 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15614556382781871061 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.491 UTC [gossip.pull] HandleMessage -> DEBU 1c99 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15614556382781871061 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.491 UTC [gossip.gossip] handleMessage -> DEBU 1c9a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.681 UTC [gossip.comm] func1 -> DEBU 1c9b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.682 UTC [gossip.gossip] handleMessage -> DEBU 1c9c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.683 UTC [msp] DeserializeIdentity -> DEBU 1c9d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.683 UTC [msp] DeserializeIdentity -> DEBU 1c9e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.684 UTC [gossip.gossip] handleMessage -> DEBU 1c9f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.701 UTC [gossip.comm] func1 -> DEBU 1ca0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.701 UTC [gossip.gossip] handleMessage -> DEBU 1ca1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.702 UTC [gossip.pull] HandleMessage -> DEBU 1ca2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.702 UTC [gossip.pull] SendDigest -> DEBU 1ca3 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:08.702 UTC [gossip.gossip] handleMessage -> DEBU 1ca4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:08.905 UTC [gossip.gossip] handleMessage -> DEBU 1ca5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:08.906 UTC [msp] DeserializeIdentity -> DEBU 1ca6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.906 UTC [msp] DeserializeIdentity -> DEBU 1ca7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.907 UTC [msp] DeserializeIdentity -> DEBU 1ca8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:08.912 UTC [gossip.gossip] handleMessage -> DEBU 1ca9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:09.120 UTC [gossip.comm] func1 -> DEBU 1caa Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cab Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:09.121 UTC [msp] DeserializeIdentity -> DEBU 1cac Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:09.122 UTC [msp] DeserializeIdentity -> DEBU 1cad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:09.122 UTC [msp] DeserializeIdentity -> DEBU 1cae Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:09.123 UTC [gossip.gossip] handleMessage -> DEBU 1caf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101B " +peer0.org1.example.com | "2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb1 Sign: digest: 6D947C259A0952B16882FDB91C0D78F4C15CC9505934D42FF5E684EF53C73466 " +peer0.org1.example.com | "2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:10.855 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1cb4 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:10.860 UTC [msp] DeserializeIdentity -> DEBU 1cb5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.861 UTC [msp] DeserializeIdentity -> DEBU 1cb6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.862 UTC [msp] DeserializeIdentity -> DEBU 1cb7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.862 UTC [gossip.comm] Send -> DEBU 1cb8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.862 UTC [msp] DeserializeIdentity -> DEBU 1cb9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.862 UTC [gossip.comm] Send -> DEBU 1cba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.863 UTC [gossip.comm] Send -> DEBU 1cbb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.863 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.863 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbe Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.876 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.878 UTC [gossip.comm] func1 -> DEBU 1cc2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.879 UTC [gossip.gossip] handleMessage -> DEBU 1cc3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.879 UTC [gossip.gossip] handleMessage -> DEBU 1cc4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cc5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cc6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.881 UTC [msp.identity] Verify -> DEBU 1cc7 Verify: digest = 00000000 6d 94 7c 25 9a 09 52 b1 68 82 fd b9 1c 0d 78 f4 |m.|%..R.h.....x.| +peer0.org1.example.com | 00000010 c1 5c c9 50 59 34 d4 2f f5 e6 84 ef 53 c7 34 66 |.\.PY4./....S.4f|" +peer0.org1.example.com | "2019-04-22 06:17:10.881 UTC [msp.identity] Verify -> DEBU 1cc8 Verify: sig = 00000000 30 44 02 20 22 be c8 f8 84 06 3c ab 3a db b5 4f |0D. ".....<.:..O| +peer0.org1.example.com | 00000010 af 7d ee d8 bf 56 bf 1e 0f 14 4a 4d 2c a0 b2 04 |.}...V....JM,...| +peer0.org1.example.com | 00000020 d6 c1 48 62 02 20 73 76 64 4c 48 b7 6d 9e 8a 83 |..Hb. svdLH.m...| +peer0.org1.example.com | 00000030 f8 d1 ff 15 08 3b 03 3b 03 4b 74 b4 a5 b8 b5 8c |.....;.;.Kt.....| +peer0.org1.example.com | 00000040 2b 87 58 f9 f4 b2 |+.X...|" +peer0.org1.example.com | "2019-04-22 06:17:10.882 UTC [gossip.discovery] isSentByMe -> DEBU 1cc9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cca Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.896 UTC [gossip.pull] Hello -> DEBU 1ccb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:10.896 UTC [gossip.comm] Send -> DEBU 1ccc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.896 UTC [gossip.pull] Hello -> DEBU 1ccd Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:10.896 UTC [gossip.comm] Send -> DEBU 1cce Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.896 UTC [gossip.pull] Hello -> DEBU 1ccf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:10.896 UTC [gossip.comm] Send -> DEBU 1cd0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.897 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.897 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.898 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.898 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.901 UTC [gossip.comm] func1 -> DEBU 1cd7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 668469623925424906 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.903 UTC [gossip.comm] func1 -> DEBU 1cd9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2461737636992223306 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.901 UTC [gossip.gossip] handleMessage -> DEBU 1cd8 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7323212113891659779 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.903 UTC [gossip.pull] HandleMessage -> DEBU 1cda GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7323212113891659779 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.903 UTC [gossip.gossip] handleMessage -> DEBU 1cdb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.903 UTC [gossip.gossip] handleMessage -> DEBU 1cdc Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 668469623925424906 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.904 UTC [gossip.pull] HandleMessage -> DEBU 1cdd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 668469623925424906 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.904 UTC [gossip.gossip] handleMessage -> DEBU 1cde Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.905 UTC [gossip.gossip] handleMessage -> DEBU 1cdf Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2461737636992223306 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.905 UTC [gossip.pull] HandleMessage -> DEBU 1ce0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2461737636992223306 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.905 UTC [gossip.gossip] handleMessage -> DEBU 1ce1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101C " +peer0.org1.example.com | "2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce3 Sign: digest: A5A28F48B9FB823ABC83F689CFD16DF44963722DB97C19AC20C61A1D96AFFFCC " +peer0.org1.example.com | "2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:10.928 UTC [msp] DeserializeIdentity -> DEBU 1ce6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.928 UTC [gossip.comm] Send -> DEBU 1ce7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.928 UTC [msp] DeserializeIdentity -> DEBU 1ce8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.932 UTC [gossip.comm] Send -> DEBU 1ce9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.932 UTC [gossip.comm] Send -> DEBU 1cea Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:10.933 UTC [gossip.comm] sendToEndpoint -> DEBU 1ceb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.933 UTC [gossip.comm] sendToEndpoint -> DEBU 1cec Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1ced Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1cee Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1cef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1cf0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.943 UTC [gossip.gossip] handleMessage -> DEBU 1cf1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.944 UTC [gossip.gossip] handleMessage -> DEBU 1cf2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cf4 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.945 UTC [msp.identity] Verify -> DEBU 1cf5 Verify: digest = 00000000 a5 a2 8f 48 b9 fb 82 3a bc 83 f6 89 cf d1 6d f4 |...H...:......m.| +peer0.org1.example.com | 00000010 49 63 72 2d b9 7c 19 ac 20 c6 1a 1d 96 af ff cc |Icr-.|.. .......|" +peer0.org1.example.com | "2019-04-22 06:17:10.945 UTC [msp.identity] Verify -> DEBU 1cf6 Verify: sig = 00000000 30 44 02 20 07 f5 dc 50 8f c5 28 57 db c0 9c f9 |0D. ...P..(W....| +peer0.org1.example.com | 00000010 6c 78 3c e5 dd 0b f2 c0 a9 31 1f 6a 11 42 66 f0 |lx<......1.j.Bf.| +peer0.org1.example.com | 00000020 37 a6 93 d5 02 20 48 da 3c 52 59 75 a9 59 6d 99 |7.... H. DEBU 1cf7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.946 UTC [gossip.discovery] isSentByMe -> DEBU 1cf8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.946 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cfa Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.947 UTC [msp] DeserializeIdentity -> DEBU 1cfb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.947 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cfc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:10.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cfd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:10.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cfe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:10.948 UTC [policies] Evaluate -> DEBU 1cff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:10.948 UTC [policies] Evaluate -> DEBU 1d00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:10.948 UTC [policies] Evaluate -> DEBU 1d01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:10.949 UTC [cauthdsl] func1 -> DEBU 1d02 0xc003658040 gate 1555913830948972800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:10.949 UTC [cauthdsl] func2 -> DEBU 1d03 0xc003658040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:10.949 UTC [cauthdsl] func2 -> DEBU 1d04 0xc003658040 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:10.951 UTC [cauthdsl] func2 -> DEBU 1d05 0xc003658040 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:10.951 UTC [msp.identity] Verify -> DEBU 1d06 Verify: digest = 00000000 6a 42 aa 15 8a d8 66 79 94 f2 29 bf 21 02 bb c5 |jB....fy..).!...| +peer0.org1.example.com | 00000010 a8 e7 0a bf 60 4f 56 f9 d7 07 8c 69 b0 be 9c ec |....`OV....i....|" +peer0.org1.example.com | "2019-04-22 06:17:10.951 UTC [msp.identity] Verify -> DEBU 1d07 Verify: sig = 00000000 30 45 02 21 00 e4 0f 6e 9f 8b d6 92 64 39 17 60 |0E.!...n....d9.`| +peer0.org1.example.com | 00000010 ca ce ac 86 c4 10 40 7a ab a0 e5 a1 7e df 5e 59 |......@z....~.^Y| +peer0.org1.example.com | 00000020 ec cd 31 62 63 02 20 2e 4e bc 2f e2 69 c9 24 bf |..1bc. .N./.i.$.| +peer0.org1.example.com | 00000030 c0 09 a6 b5 dd f3 95 3f 87 02 61 d0 3b 00 2d 04 |.......?..a.;.-.| +peer0.org1.example.com | 00000040 3f d0 61 e8 20 d3 9e |?.a. ..|" +peer0.org1.example.com | "2019-04-22 06:17:10.951 UTC [cauthdsl] func2 -> DEBU 1d08 0xc003658040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:10.951 UTC [cauthdsl] func1 -> DEBU 1d09 0xc003658040 gate 1555913830948972800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:10.951 UTC [policies] Evaluate -> DEBU 1d0a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.952 UTC [policies] Evaluate -> DEBU 1d0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.952 UTC [policies] Evaluate -> DEBU 1d0c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.952 UTC [policies] Evaluate -> DEBU 1d0d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d0e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d0f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d10 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.953 UTC [msp.identity] Verify -> DEBU 1d11 Verify: digest = 00000000 b5 cc bc 52 b3 cb a7 58 b9 59 f5 f4 09 e9 eb 6a |...R...X.Y.....j| +peer0.org1.example.com | 00000010 44 14 d9 35 9d b8 6c 08 64 b1 96 10 78 d0 d4 28 |D..5..l.d...x..(|" +peer0.org1.example.com | "2019-04-22 06:17:10.953 UTC [msp.identity] Verify -> DEBU 1d12 Verify: sig = 00000000 30 44 02 20 1b 28 37 a8 7e 00 24 72 e4 d1 eb bf |0D. .(7.~.$r....| +peer0.org1.example.com | 00000010 0f d7 b1 74 8e 08 ff 23 5d cb aa 7f 0f 29 31 a1 |...t...#]....)1.| +peer0.org1.example.com | 00000020 fa b1 1a a9 02 20 1d e9 8f 0a a5 91 17 80 71 e9 |..... ........q.| +peer0.org1.example.com | 00000030 bf 4a 2b 2b e2 80 79 57 d1 b4 a0 90 58 22 df 06 |.J++..yW....X"..| +peer0.org1.example.com | 00000040 29 b6 17 b6 d9 ba |).....|" +peer0.org1.example.com | "2019-04-22 06:17:10.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d13 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d14 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d15 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.954 UTC [gossip.comm] func1 -> DEBU 1d16 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.955 UTC [gossip.comm] func1 -> DEBU 1d17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.955 UTC [gossip.gossip] handleMessage -> DEBU 1d18 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.956 UTC [gossip.gossip] handleMessage -> DEBU 1d19 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.959 UTC [gossip.gossip] handleMessage -> DEBU 1d1a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d1b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.959 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d1c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.960 UTC [msp.identity] Verify -> DEBU 1d1d Verify: digest = 00000000 a5 a2 8f 48 b9 fb 82 3a bc 83 f6 89 cf d1 6d f4 |...H...:......m.| +peer0.org1.example.com | 00000010 49 63 72 2d b9 7c 19 ac 20 c6 1a 1d 96 af ff cc |Icr-.|.. .......|" +peer0.org1.example.com | "2019-04-22 06:17:10.960 UTC [msp.identity] Verify -> DEBU 1d1e Verify: sig = 00000000 30 44 02 20 07 f5 dc 50 8f c5 28 57 db c0 9c f9 |0D. ...P..(W....| +peer0.org1.example.com | 00000010 6c 78 3c e5 dd 0b f2 c0 a9 31 1f 6a 11 42 66 f0 |lx<......1.j.Bf.| +peer0.org1.example.com | 00000020 37 a6 93 d5 02 20 48 da 3c 52 59 75 a9 59 6d 99 |7.... H. DEBU 1d1f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:10.961 UTC [msp.identity] Verify -> DEBU 1d20 Verify: sig = 00000000 30 45 02 21 00 c6 09 79 f0 c6 f8 c7 f8 99 2a d5 |0E.!...y......*.| +peer0.org1.example.com | 00000010 a8 5a 04 7f 71 47 48 a7 83 29 d8 73 3c 4d d9 c4 |.Z..qGH..).s..GyJoz)%..g..N| +peer0.org1.example.com | 00000040 2f c4 f5 fa d0 fb 8b |/......|" +peer0.org1.example.com | "2019-04-22 06:17:10.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d21 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.961 UTC [gossip.discovery] isSentByMe -> DEBU 1d22 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d23 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d24 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d26 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.962 UTC [msp.identity] Verify -> DEBU 1d27 Verify: digest = 00000000 a5 a2 8f 48 b9 fb 82 3a bc 83 f6 89 cf d1 6d f4 |...H...:......m.| +peer0.org1.example.com | 00000010 49 63 72 2d b9 7c 19 ac 20 c6 1a 1d 96 af ff cc |Icr-.|.. .......|" +peer0.org1.example.com | "2019-04-22 06:17:10.963 UTC [msp.identity] Verify -> DEBU 1d28 Verify: sig = 00000000 30 44 02 20 07 f5 dc 50 8f c5 28 57 db c0 9c f9 |0D. ...P..(W....| +peer0.org1.example.com | 00000010 6c 78 3c e5 dd 0b f2 c0 a9 31 1f 6a 11 42 66 f0 |lx<......1.j.Bf.| +peer0.org1.example.com | 00000020 37 a6 93 d5 02 20 48 da 3c 52 59 75 a9 59 6d 99 |7.... H. DEBU 1d29 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.963 UTC [gossip.discovery] isSentByMe -> DEBU 1d2a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.963 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d2b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.964 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d2c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.964 UTC [msp] DeserializeIdentity -> DEBU 1d2d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:10.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d2f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d30 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:10.966 UTC [policies] Evaluate -> DEBU 1d31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:10.966 UTC [policies] Evaluate -> DEBU 1d32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:10.966 UTC [policies] Evaluate -> DEBU 1d33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:10.966 UTC [cauthdsl] func1 -> DEBU 1d34 0xc0035aa250 gate 1555913830966664800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:10.966 UTC [cauthdsl] func2 -> DEBU 1d35 0xc0035aa250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:10.967 UTC [cauthdsl] func2 -> DEBU 1d36 0xc0035aa250 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:10.967 UTC [cauthdsl] func2 -> DEBU 1d37 0xc0035aa250 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:10.967 UTC [msp.identity] Verify -> DEBU 1d38 Verify: digest = 00000000 5d 5f 2c e3 0b 9c 94 0b f7 6b 12 20 50 a0 81 41 |]_,......k. P..A| +peer0.org1.example.com | 00000010 93 ef 2c 51 10 1c 57 d8 94 fd 76 f8 09 4c be 41 |..,Q..W...v..L.A|" +peer0.org1.example.com | "2019-04-22 06:17:10.967 UTC [msp.identity] Verify -> DEBU 1d39 Verify: sig = 00000000 30 44 02 20 57 da c6 09 c4 1e 43 e4 a9 68 f7 f8 |0D. W.....C..h..| +peer0.org1.example.com | 00000010 05 2e aa 6a d0 c7 df 44 d8 ed 9f 71 ab 38 bb b8 |...j...D...q.8..| +peer0.org1.example.com | 00000020 6a b8 6d 1f 02 20 47 40 92 a7 27 8a 1a 31 15 4b |j.m.. G@..'..1.K| +peer0.org1.example.com | 00000030 bc 11 52 6d 05 54 50 4c 5a 68 75 c5 5d fe 81 32 |..Rm.TPLZhu.]..2| +peer0.org1.example.com | 00000040 c6 a3 cf 63 2b c7 |...c+.|" +peer0.org1.example.com | "2019-04-22 06:17:10.969 UTC [cauthdsl] func2 -> DEBU 1d3a 0xc0035aa250 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:10.969 UTC [cauthdsl] func1 -> DEBU 1d3b 0xc0035aa250 gate 1555913830966664800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:10.970 UTC [policies] Evaluate -> DEBU 1d3c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.970 UTC [policies] Evaluate -> DEBU 1d3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.971 UTC [policies] Evaluate -> DEBU 1d3e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.971 UTC [policies] Evaluate -> DEBU 1d3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:10.971 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d41 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d42 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:10.972 UTC [msp.identity] Verify -> DEBU 1d43 Verify: digest = 00000000 b5 cc bc 52 b3 cb a7 58 b9 59 f5 f4 09 e9 eb 6a |...R...X.Y.....j| +peer0.org1.example.com | 00000010 44 14 d9 35 9d b8 6c 08 64 b1 96 10 78 d0 d4 28 |D..5..l.d...x..(|" +peer0.org1.example.com | "2019-04-22 06:17:10.972 UTC [msp.identity] Verify -> DEBU 1d44 Verify: sig = 00000000 30 44 02 20 1b 28 37 a8 7e 00 24 72 e4 d1 eb bf |0D. .(7.~.$r....| +peer0.org1.example.com | 00000010 0f d7 b1 74 8e 08 ff 23 5d cb aa 7f 0f 29 31 a1 |...t...#]....)1.| +peer0.org1.example.com | 00000020 fa b1 1a a9 02 20 1d e9 8f 0a a5 91 17 80 71 e9 |..... ........q.| +peer0.org1.example.com | 00000030 bf 4a 2b 2b e2 80 79 57 d1 b4 a0 90 58 22 df 06 |.J++..yW....X"..| +peer0.org1.example.com | 00000040 29 b6 17 b6 d9 ba |).....|" +peer0.org1.example.com | "2019-04-22 06:17:10.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:10.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d47 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d48 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:10.973 UTC [gossip.gossip] handleMessage -> DEBU 1d46 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.140 UTC [gossip.comm] func1 -> DEBU 1d49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.146 UTC [gossip.gossip] handleMessage -> DEBU 1d4a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.150 UTC [gossip.gossip] handleMessage -> DEBU 1d4b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d4d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:11.151 UTC [msp.identity] Verify -> DEBU 1d4e Verify: digest = 00000000 71 39 b9 61 92 0c fa 19 3f 2f 89 94 48 e9 2b 37 |q9.a....?/..H.+7| +peer0.org1.example.com | 00000010 f1 0d 41 79 3c 06 1e f8 d4 43 af 2c 88 a4 1a f7 |..Ay<....C.,....|" +peer0.org1.example.com | "2019-04-22 06:17:11.151 UTC [msp.identity] Verify -> DEBU 1d4f Verify: sig = 00000000 30 44 02 20 21 a0 d4 b9 80 bf e5 94 7d 24 43 30 |0D. !.......}$C0| +peer0.org1.example.com | 00000010 17 c3 e3 0a 46 5e 17 10 47 38 7e 41 02 4b ca e5 |....F^..G8~A.K..| +peer0.org1.example.com | 00000020 8f fd 29 8e 02 20 3d 62 51 e6 e5 9c b5 06 23 33 |..).. =bQ.....#3| +peer0.org1.example.com | 00000030 dd ed ec 9a 9d 4c a8 2a 6c 86 df cd f6 de 34 bb |.....L.*l.....4.| +peer0.org1.example.com | 00000040 97 57 aa 98 52 42 |.W..RB|" +peer0.org1.example.com | "2019-04-22 06:17:11.152 UTC [msp.identity] Verify -> DEBU 1d50 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:11.152 UTC [msp.identity] Verify -> DEBU 1d51 Verify: sig = 00000000 30 44 02 20 64 e3 2b ac 0d 13 f5 2a 30 1e fc 06 |0D. d.+....*0...| +peer0.org1.example.com | 00000010 3d 7f 98 43 eb 5d 55 34 b7 e5 30 37 c5 8f 99 73 |=..C.]U4..07...s| +peer0.org1.example.com | 00000020 1a 5b 9c eb 02 20 47 4f d9 19 69 ad fa 37 3d b3 |.[... GO..i..7=.| +peer0.org1.example.com | 00000030 89 9b 61 5d 56 83 fb 0c 98 ee 00 c0 3d 91 8b 2a |..a]V.......=..*| +peer0.org1.example.com | 00000040 7f 0b 5b a1 3c 45 |..[. DEBU 1d52 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.153 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d53 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:11.155 UTC [gossip.comm] func1 -> DEBU 1d54 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.156 UTC [gossip.gossip] handleMessage -> DEBU 1d55 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.157 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d56 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 " +peer0.org1.example.com | "2019-04-22 06:17:11.157 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d57 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 " +peer0.org1.example.com | "2019-04-22 06:17:11.158 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d58 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:11.162 UTC [gossip.comm] func1 -> DEBU 1d59 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.158 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d5b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d5c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.166 UTC [gossip.gossip] handleMessage -> DEBU 1d5d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.166 UTC [gossip.gossip] handleMessage -> DEBU 1d5e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d60 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d62 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.167 UTC [gossip.gossip] handleMessage -> DEBU 1d63 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.167 UTC [gossip.gossip] handleMessage -> DEBU 1d64 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.167 UTC [gossip.pull] HandleMessage -> DEBU 1d65 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.168 UTC [gossip.pull] SendDigest -> DEBU 1d66 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:11.168 UTC [gossip.gossip] handleMessage -> DEBU 1d67 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.166 UTC [msp] DeserializeIdentity -> DEBU 1d68 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.169 UTC [msp] DeserializeIdentity -> DEBU 1d69 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.170 UTC [msp] DeserializeIdentity -> DEBU 1d6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.171 UTC [gossip.comm] Send -> DEBU 1d6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:11.172 UTC [msp] DeserializeIdentity -> DEBU 1d6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.172 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.172 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.172 UTC [gossip.comm] Send -> DEBU 1d6e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:11.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d70 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d71 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.182 UTC [gossip.comm] func1 -> DEBU 1d72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.182 UTC [gossip.gossip] handleMessage -> DEBU 1d73 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.182 UTC [gossip.gossip] handleMessage -> DEBU 1d74 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:11.185 UTC [msp.identity] Verify -> DEBU 1d77 Verify: digest = 00000000 b7 5c cb 09 77 38 39 ad ee a0 c0 be 82 79 3b 4c |.\..w89......y;L| +peer0.org1.example.com | 00000010 87 e4 35 f4 10 96 e1 ea e8 72 f1 e1 4b 4d 78 02 |..5......r..KMx.|" +peer0.org1.example.com | "2019-04-22 06:17:11.185 UTC [msp.identity] Verify -> DEBU 1d78 Verify: sig = 00000000 30 44 02 20 4a 77 fc 66 61 29 14 48 cd 91 68 f5 |0D. Jw.fa).H..h.| +peer0.org1.example.com | 00000010 da 2d b8 22 13 85 db c4 42 20 c9 28 14 40 a1 6a |.-."....B .(.@.j| +peer0.org1.example.com | 00000020 be e0 af 8b 02 20 53 2c 13 84 59 dc 54 d9 97 c6 |..... S,..Y.T...| +peer0.org1.example.com | 00000030 e5 9f 3f 19 6d 26 98 a6 bd fd 91 bd 35 6a 6e 3b |..?.m&......5jn;| +peer0.org1.example.com | 00000040 92 95 49 d6 d7 88 |..I...|" +peer0.org1.example.com | "2019-04-22 06:17:11.187 UTC [msp.identity] Verify -> DEBU 1d79 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:11.187 UTC [msp.identity] Verify -> DEBU 1d7a Verify: sig = 00000000 30 44 02 20 21 a7 87 a6 32 c0 6b 74 76 02 38 69 |0D. !...2.ktv.8i| +peer0.org1.example.com | 00000010 2f a4 41 67 5b 4b 8d b9 3d 93 22 9d 60 66 e1 38 |/.Ag[K..=.".`f.8| +peer0.org1.example.com | 00000020 8e fd 82 aa 02 20 79 f6 b9 03 6b 7d d9 b9 ca f3 |..... y...k}....| +peer0.org1.example.com | 00000030 fa a4 54 c0 eb 93 21 22 99 19 0c 1f b2 95 bf 61 |..T...!".......a| +peer0.org1.example.com | 00000040 59 10 5f c3 41 a6 |Y._.A.|" +peer0.org1.example.com | "2019-04-22 06:17:11.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7d updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 " +peer0.org1.example.com | "2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 " +peer0.org1.example.com | "2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d80 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d81 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.190 UTC [gossip.discovery] sendMemResponse -> DEBU 1d82 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:11.191 UTC [msp] DeserializeIdentity -> DEBU 1d83 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.191 UTC [msp] DeserializeIdentity -> DEBU 1d84 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.192 UTC [gossip.comm] Send -> DEBU 1d85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:11.192 UTC [gossip.discovery] sendMemResponse -> DEBU 1d86 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:11.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1d87 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1d88 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d89 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.475 UTC [gossip.election] waitForInterrupt -> DEBU 1d8a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.475 UTC [gossip.election] IsLeader -> DEBU 1d8b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:11.475 UTC [msp.identity] Sign -> DEBU 1d8c Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510071801 " +peer0.org1.example.com | "2019-04-22 06:17:11.475 UTC [msp.identity] Sign -> DEBU 1d8d Sign: digest: AB0A42BDCE3145EC8CD85F33F9E58504B4FAD529192EF0B1BB6EC12645FE7AA9 " +peer0.org1.example.com | "2019-04-22 06:17:11.476 UTC [gossip.election] waitForInterrupt -> DEBU 1d8e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:11.484 UTC [msp] DeserializeIdentity -> DEBU 1d8f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.484 UTC [msp] DeserializeIdentity -> DEBU 1d90 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.484 UTC [msp] DeserializeIdentity -> DEBU 1d91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.485 UTC [msp] DeserializeIdentity -> DEBU 1d92 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.485 UTC [gossip.comm] Send -> DEBU 1d93 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:11.485 UTC [msp] DeserializeIdentity -> DEBU 1d94 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.486 UTC [msp] DeserializeIdentity -> DEBU 1d95 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.486 UTC [gossip.comm] sendToEndpoint -> DEBU 1d96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.486 UTC [gossip.comm] sendToEndpoint -> DEBU 1d97 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.619 UTC [gossip.comm] func1 -> DEBU 1d98 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.620 UTC [gossip.gossip] handleMessage -> DEBU 1d99 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.620 UTC [gossip.pull] HandleMessage -> DEBU 1d9a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.621 UTC [msp] DeserializeIdentity -> DEBU 1d9b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.621 UTC [msp] DeserializeIdentity -> DEBU 1d9c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.622 UTC [msp] DeserializeIdentity -> DEBU 1d9d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.622 UTC [msp] DeserializeIdentity -> DEBU 1d9e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.622 UTC [msp] DeserializeIdentity -> DEBU 1d9f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.623 UTC [msp] DeserializeIdentity -> DEBU 1da0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.623 UTC [gossip.pull] SendDigest -> DEBU 1da1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:11.624 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.626 UTC [gossip.comm] func1 -> DEBU 1da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.626 UTC [gossip.gossip] handleMessage -> DEBU 1da4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.626 UTC [gossip.gossip] handleMessage -> DEBU 1da5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da7 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:11.627 UTC [msp] DeserializeIdentity -> DEBU 1da8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.628 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1da9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:11.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1daa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:11.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:11.629 UTC [policies] Evaluate -> DEBU 1dac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:11.629 UTC [policies] Evaluate -> DEBU 1dad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:11.631 UTC [policies] Evaluate -> DEBU 1dae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:11.631 UTC [cauthdsl] func1 -> DEBU 1daf 0xc00311c960 gate 1555913831631446100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:11.631 UTC [cauthdsl] func2 -> DEBU 1db0 0xc00311c960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:11.632 UTC [cauthdsl] func2 -> DEBU 1db1 0xc00311c960 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:11.632 UTC [cauthdsl] func2 -> DEBU 1db2 0xc00311c960 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:11.632 UTC [msp.identity] Verify -> DEBU 1db3 Verify: digest = 00000000 fc 50 91 4b 1e 0c e0 b3 08 c6 a8 15 e1 68 e2 6d |.P.K.........h.m| +peer0.org1.example.com | 00000010 fc 6d f9 43 0c e2 33 07 a9 6d 69 4c 7e 3b 32 7a |.m.C..3..miL~;2z|" +peer0.org1.example.com | "2019-04-22 06:17:11.633 UTC [msp.identity] Verify -> DEBU 1db4 Verify: sig = 00000000 30 45 02 21 00 e9 3a a4 b6 86 f4 6b 45 9e 1c 66 |0E.!..:....kE..f| +peer0.org1.example.com | 00000010 92 d1 7a cf 3a d2 27 82 3b 34 7a 3d 8e f3 04 68 |..z.:.'.;4z=...h| +peer0.org1.example.com | 00000020 6b ad cd 0b d2 02 20 2a 87 39 d2 12 b0 e3 b6 23 |k..... *.9.....#| +peer0.org1.example.com | 00000030 7f 31 01 44 6b 13 e0 06 d2 cb 01 41 97 8b e6 11 |.1.Dk......A....| +peer0.org1.example.com | 00000040 9e ea 72 8d 8a ec 4f |..r...O|" +peer0.org1.example.com | "2019-04-22 06:17:11.633 UTC [cauthdsl] func2 -> DEBU 1db5 0xc00311c960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:11.633 UTC [cauthdsl] func1 -> DEBU 1db6 0xc00311c960 gate 1555913831631446100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:11.633 UTC [policies] Evaluate -> DEBU 1db7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.634 UTC [policies] Evaluate -> DEBU 1db8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.636 UTC [gossip.comm] func1 -> DEBU 1db9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.645 UTC [gossip.comm] func1 -> DEBU 1dbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.634 UTC [policies] Evaluate -> DEBU 1dbc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.645 UTC [policies] Evaluate -> DEBU 1dbd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.636 UTC [gossip.gossip] handleMessage -> DEBU 1dba Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dbe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dbf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:11.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 " +peer0.org1.example.com | "2019-04-22 06:17:11.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 " +peer0.org1.example.com | "2019-04-22 06:17:11.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:11.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dc5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.648 UTC [gossip.gossip] handleMessage -> DEBU 1dc6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.648 UTC [gossip.gossip] handleMessage -> DEBU 1dc7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dc9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dcc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.651 UTC [gossip.gossip] handleMessage -> DEBU 1dcb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.651 UTC [gossip.gossip] handleMessage -> DEBU 1dcd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.652 UTC [gossip.gossip] handleMessage -> DEBU 1dce Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.652 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:11.652 UTC [msp] DeserializeIdentity -> DEBU 1dd1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dd2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dd3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dd4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:11.653 UTC [msp] DeserializeIdentity -> DEBU 1dd5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.653 UTC [msp] DeserializeIdentity -> DEBU 1dd6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dd7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dd8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dd9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dda Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.655 UTC [msp] DeserializeIdentity -> DEBU 1ddb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.655 UTC [gossip.comm] Send -> DEBU 1ddc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:11.655 UTC [msp] DeserializeIdentity -> DEBU 1ddd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.655 UTC [gossip.comm] Send -> DEBU 1dde Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:11.656 UTC [gossip.comm] sendToEndpoint -> DEBU 1ddf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.656 UTC [gossip.comm] sendToEndpoint -> DEBU 1de0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.657 UTC [gossip.comm] sendToEndpoint -> DEBU 1de1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.657 UTC [gossip.comm] sendToEndpoint -> DEBU 1de2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.653 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:11.659 UTC [policies] Evaluate -> DEBU 1de4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:11.659 UTC [policies] Evaluate -> DEBU 1de5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:11.666 UTC [cauthdsl] func1 -> DEBU 1de6 0xc0030b56b0 gate 1555913831659222800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:11.666 UTC [cauthdsl] func2 -> DEBU 1de7 0xc0030b56b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:11.667 UTC [cauthdsl] func2 -> DEBU 1de8 0xc0030b56b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:11.667 UTC [cauthdsl] func2 -> DEBU 1de9 0xc0030b56b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:11.667 UTC [msp.identity] Verify -> DEBU 1dea Verify: digest = 00000000 9e d2 cf 72 97 3e 9a 23 5d 65 3e 01 3d be e7 8e |...r.>.#]e>.=...| +peer0.org1.example.com | 00000010 c1 f1 e9 e5 32 1d ac 39 ab ed af 94 1a 25 27 70 |....2..9.....%'p|" +peer0.org1.example.com | "2019-04-22 06:17:11.667 UTC [msp.identity] Verify -> DEBU 1deb Verify: sig = 00000000 30 45 02 21 00 de f5 53 d9 f1 35 19 12 14 57 83 |0E.!...S..5...W.| +peer0.org1.example.com | 00000010 db 2d 6b ac b7 ff 27 6d 08 10 03 8b f7 28 b6 aa |.-k...'m.....(..| +peer0.org1.example.com | 00000020 89 1c 93 53 dc 02 20 64 fd d4 52 03 1b cc 1d a1 |...S.. d..R.....| +peer0.org1.example.com | 00000030 b8 bf a7 1c ec a4 6c b8 9a a7 5f c5 2a 9a 51 15 |......l..._.*.Q.| +peer0.org1.example.com | 00000040 ea 18 94 5c d8 fa 72 |...\..r|" +peer0.org1.example.com | "2019-04-22 06:17:11.668 UTC [cauthdsl] func2 -> DEBU 1dec 0xc0030b56b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:11.668 UTC [cauthdsl] func1 -> DEBU 1ded 0xc0030b56b0 gate 1555913831659222800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:11.668 UTC [policies] Evaluate -> DEBU 1dee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.668 UTC [policies] Evaluate -> DEBU 1def == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.669 UTC [policies] Evaluate -> DEBU 1df0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.669 UTC [policies] Evaluate -> DEBU 1df1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:11.669 UTC [gossip.discovery] handleAliveMessage -> DEBU 1df2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.669 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df4 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 " +peer0.org1.example.com | "2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 " +peer0.org1.example.com | "2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 1df8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.670 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1df9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:11.671 UTC [gossip.discovery] sendMemResponse -> DEBU 1dfa Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:11.671 UTC [msp] DeserializeIdentity -> DEBU 1dfb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.671 UTC [msp] DeserializeIdentity -> DEBU 1dfc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.672 UTC [msp] DeserializeIdentity -> DEBU 1dfd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:11.672 UTC [gossip.comm] Send -> DEBU 1dfe Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:11.672 UTC [gossip.discovery] sendMemResponse -> DEBU 1dff Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:11.673 UTC [gossip.comm] sendToEndpoint -> DEBU 1e00 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:11.673 UTC [gossip.comm] sendToEndpoint -> DEBU 1e01 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.036 UTC [gossip.gossip] handleMessage -> DEBU 1e02 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.036 UTC [gossip.pull] HandleMessage -> DEBU 1e03 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.036 UTC [msp] DeserializeIdentity -> DEBU 1e04 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.037 UTC [msp] DeserializeIdentity -> DEBU 1e05 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.037 UTC [msp] DeserializeIdentity -> DEBU 1e06 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.038 UTC [msp] DeserializeIdentity -> DEBU 1e07 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.038 UTC [msp] DeserializeIdentity -> DEBU 1e08 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.039 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.039 UTC [gossip.pull] SendDigest -> DEBU 1e0a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:12.040 UTC [gossip.gossip] handleMessage -> DEBU 1e0b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.052 UTC [gossip.gossip] handleMessage -> DEBU 1e0c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.052 UTC [gossip.gossip] handleMessage -> DEBU 1e0d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.053 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e0f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:12.053 UTC [msp] DeserializeIdentity -> DEBU 1e10 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.054 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e12 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e13 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.055 UTC [policies] Evaluate -> DEBU 1e14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.055 UTC [policies] Evaluate -> DEBU 1e15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.057 UTC [policies] Evaluate -> DEBU 1e16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.057 UTC [cauthdsl] func1 -> DEBU 1e17 0xc00305eb00 gate 1555913832057428100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.058 UTC [gossip.gossip] handleMessage -> DEBU 1e18 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.058 UTC [cauthdsl] func2 -> DEBU 1e19 0xc00305eb00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.061 UTC [cauthdsl] func2 -> DEBU 1e1a 0xc00305eb00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.061 UTC [cauthdsl] func2 -> DEBU 1e1b 0xc00305eb00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.062 UTC [msp.identity] Verify -> DEBU 1e1c Verify: digest = 00000000 c7 a6 32 91 cd 83 d1 e7 e4 be f6 2b 0c 9d 01 e5 |..2........+....| +peer0.org1.example.com | 00000010 85 c0 29 7e 5e 36 3f bb 0b e5 d2 9b 15 ad 86 93 |..)~^6?.........|" +peer0.org1.example.com | "2019-04-22 06:17:12.062 UTC [msp.identity] Verify -> DEBU 1e1d Verify: sig = 00000000 30 44 02 20 5b 6d 09 7a 79 b1 91 32 32 a2 b1 46 |0D. [m.zy..22..F| +peer0.org1.example.com | 00000010 50 dd 70 0b 3a 57 dd 00 47 bb 5a 2a 6d e8 b4 9d |P.p.:W..G.Z*m...| +peer0.org1.example.com | 00000020 54 9a bf 04 02 20 0f 20 b3 a0 47 21 d6 fe 3a 29 |T.... . ..G!..:)| +peer0.org1.example.com | 00000030 d9 e8 38 e9 59 bd e2 f6 73 47 52 19 ea aa ec ef |..8.Y...sGR.....| +peer0.org1.example.com | 00000040 d3 64 49 ea 49 59 |.dI.IY|" +peer0.org1.example.com | "2019-04-22 06:17:12.062 UTC [cauthdsl] func2 -> DEBU 1e1e 0xc00305eb00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.062 UTC [cauthdsl] func1 -> DEBU 1e1f 0xc00305eb00 gate 1555913832057428100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.062 UTC [policies] Evaluate -> DEBU 1e20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.063 UTC [policies] Evaluate -> DEBU 1e21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.063 UTC [policies] Evaluate -> DEBU 1e22 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.062 UTC [gossip.comm] func1 -> DEBU 1e23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.063 UTC [policies] Evaluate -> DEBU 1e24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e25 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e26 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:12.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e27 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 " +peer0.org1.example.com | "2019-04-22 06:17:12.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e28 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 " +peer0.org1.example.com | "2019-04-22 06:17:12.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e29 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:12.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e2a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.066 UTC [gossip.comm] func1 -> DEBU 1e2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e2c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.067 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e30 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:12.067 UTC [msp] DeserializeIdentity -> DEBU 1e31 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.068 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e32 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e33 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.067 UTC [gossip.gossip] handleMessage -> DEBU 1e2f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.069 UTC [msp] DeserializeIdentity -> DEBU 1e34 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.071 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e35 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.071 UTC [gossip.gossip] handleMessage -> DEBU 1e36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.071 UTC [msp] DeserializeIdentity -> DEBU 1e37 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.072 UTC [policies] Evaluate -> DEBU 1e38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.072 UTC [msp] DeserializeIdentity -> DEBU 1e39 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.072 UTC [policies] Evaluate -> DEBU 1e3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.073 UTC [policies] Evaluate -> DEBU 1e3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.073 UTC [cauthdsl] func1 -> DEBU 1e3d 0xc003069aa0 gate 1555913832073748800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.074 UTC [cauthdsl] func2 -> DEBU 1e3e 0xc003069aa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.074 UTC [cauthdsl] func2 -> DEBU 1e3f 0xc003069aa0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.075 UTC [cauthdsl] func2 -> DEBU 1e40 0xc003069aa0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.073 UTC [msp] DeserializeIdentity -> DEBU 1e3b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.075 UTC [msp.identity] Verify -> DEBU 1e41 Verify: digest = 00000000 fd c6 6c 46 f1 20 41 b3 c2 ce 87 ea 57 8c a6 d2 |..lF. A.....W...| +peer0.org1.example.com | 00000010 01 56 02 57 5e 02 b4 73 b9 96 ec 84 b0 b3 8c 63 |.V.W^..s.......c|" +peer0.org1.example.com | "2019-04-22 06:17:12.076 UTC [msp.identity] Verify -> DEBU 1e42 Verify: sig = 00000000 30 44 02 20 68 c1 08 0a be 5e 38 c3 cf 94 74 3e |0D. h....^8...t>| +peer0.org1.example.com | 00000010 08 6f 25 86 bd 1c 07 2d 14 58 e2 0b 67 85 d9 ba |.o%....-.X..g...| +peer0.org1.example.com | 00000020 94 a9 16 1d 02 20 3f d1 65 0c 01 69 14 32 f2 0b |..... ?.e..i.2..| +peer0.org1.example.com | 00000030 09 15 f1 ed 2c 3b 97 71 00 ef d1 92 f3 bf 1e a9 |....,;.q........| +peer0.org1.example.com | 00000040 d1 1d 75 2a 6b 25 |..u*k%|" +peer0.org1.example.com | "2019-04-22 06:17:12.076 UTC [msp] DeserializeIdentity -> DEBU 1e43 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.077 UTC [msp] DeserializeIdentity -> DEBU 1e44 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.077 UTC [msp] DeserializeIdentity -> DEBU 1e45 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.078 UTC [gossip.comm] Send -> DEBU 1e46 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:12.078 UTC [msp] DeserializeIdentity -> DEBU 1e47 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.078 UTC [gossip.comm] Send -> DEBU 1e48 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:12.079 UTC [gossip.comm] sendToEndpoint -> DEBU 1e49 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.079 UTC [gossip.comm] sendToEndpoint -> DEBU 1e4a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.079 UTC [gossip.comm] sendToEndpoint -> DEBU 1e4b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.080 UTC [gossip.comm] sendToEndpoint -> DEBU 1e4c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.081 UTC [cauthdsl] func2 -> DEBU 1e4d 0xc003069aa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.082 UTC [cauthdsl] func1 -> DEBU 1e4e 0xc003069aa0 gate 1555913832073748800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.082 UTC [policies] Evaluate -> DEBU 1e4f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.082 UTC [policies] Evaluate -> DEBU 1e50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.083 UTC [policies] Evaluate -> DEBU 1e51 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.083 UTC [policies] Evaluate -> DEBU 1e52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e53 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.084 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e54 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:12.084 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e55 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 " +peer0.org1.example.com | "2019-04-22 06:17:12.085 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e56 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 " +peer0.org1.example.com | "2019-04-22 06:17:12.086 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e57 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:12.086 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e58 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.086 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e59 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.087 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.087 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.087 UTC [gossip.gossip] handleMessage -> DEBU 1e5d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.087 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.087 UTC [gossip.gossip] handleMessage -> DEBU 1e5f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.088 UTC [gossip.gossip] handleMessage -> DEBU 1e60 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.088 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.088 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e62 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.087 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:12.089 UTC [msp] DeserializeIdentity -> DEBU 1e63 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.090 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.090 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.092 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:12.093 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.093 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.093 UTC [gossip.discovery] sendMemResponse -> DEBU 1e68 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:12.423 UTC [msp] DeserializeIdentity -> DEBU 1e6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.423 UTC [msp] DeserializeIdentity -> DEBU 1e6b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.424 UTC [gossip.comm] Send -> DEBU 1e6c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e70 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1e71 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1e72 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.426 UTC [gossip.comm] func1 -> DEBU 1e73 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.426 UTC [gossip.gossip] handleMessage -> DEBU 1e74 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.427 UTC [msp.identity] Verify -> DEBU 1e75 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:12.427 UTC [msp.identity] Verify -> DEBU 1e76 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:12.428 UTC [gossip.comm] func1 -> DEBU 1e78 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.428 UTC [msp] DeserializeIdentity -> DEBU 1e77 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.429 UTC [msp] DeserializeIdentity -> DEBU 1e79 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e7b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e7c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.430 UTC [policies] Evaluate -> DEBU 1e7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.430 UTC [policies] Evaluate -> DEBU 1e7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.430 UTC [policies] Evaluate -> DEBU 1e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.430 UTC [cauthdsl] func1 -> DEBU 1e80 0xc002fb08e0 gate 1555913832430874400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.431 UTC [cauthdsl] func2 -> DEBU 1e81 0xc002fb08e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.431 UTC [cauthdsl] func2 -> DEBU 1e82 0xc002fb08e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.431 UTC [cauthdsl] func2 -> DEBU 1e83 0xc002fb08e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.432 UTC [msp.identity] Verify -> DEBU 1e84 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:12.432 UTC [msp.identity] Verify -> DEBU 1e85 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:12.432 UTC [cauthdsl] func2 -> DEBU 1e86 0xc002fb08e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.432 UTC [cauthdsl] func1 -> DEBU 1e87 0xc002fb08e0 gate 1555913832430874400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e8a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.434 UTC [msp.identity] Verify -> DEBU 1e8c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:12.434 UTC [msp.identity] Verify -> DEBU 1e8d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:12.435 UTC [msp] DeserializeIdentity -> DEBU 1e8e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.435 UTC [msp] DeserializeIdentity -> DEBU 1e8f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.435 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e90 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e91 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.436 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e92 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.436 UTC [policies] Evaluate -> DEBU 1e93 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.436 UTC [policies] Evaluate -> DEBU 1e94 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.436 UTC [policies] Evaluate -> DEBU 1e95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.436 UTC [cauthdsl] func1 -> DEBU 1e96 0xc002f44870 gate 1555913832436809600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.437 UTC [cauthdsl] func2 -> DEBU 1e97 0xc002f44870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.437 UTC [cauthdsl] func2 -> DEBU 1e98 0xc002f44870 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.437 UTC [cauthdsl] func2 -> DEBU 1e99 0xc002f44870 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.437 UTC [msp.identity] Verify -> DEBU 1e9a Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:12.437 UTC [msp.identity] Verify -> DEBU 1e9b Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:12.438 UTC [cauthdsl] func2 -> DEBU 1e9c 0xc002f44870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.438 UTC [cauthdsl] func1 -> DEBU 1e9d 0xc002f44870 gate 1555913832436809600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.438 UTC [policies] Evaluate -> DEBU 1e9e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.438 UTC [policies] Evaluate -> DEBU 1e9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.438 UTC [policies] Evaluate -> DEBU 1ea0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.439 UTC [policies] Evaluate -> DEBU 1ea1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.439 UTC [gossip.gossip] handleMessage -> DEBU 1ea2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.439 UTC [gossip.gossip] handleMessage -> DEBU 1ea3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.440 UTC [msp] DeserializeIdentity -> DEBU 1ea4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.440 UTC [msp] DeserializeIdentity -> DEBU 1ea5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.440 UTC [msp] DeserializeIdentity -> DEBU 1ea6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.440 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ea7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ea8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ea9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.441 UTC [policies] Evaluate -> DEBU 1eaa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.441 UTC [policies] Evaluate -> DEBU 1eab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.442 UTC [policies] Evaluate -> DEBU 1eac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.443 UTC [cauthdsl] func1 -> DEBU 1ead 0xc002f003a0 gate 1555913832443250700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.443 UTC [cauthdsl] func2 -> DEBU 1eae 0xc002f003a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.443 UTC [cauthdsl] func2 -> DEBU 1eaf 0xc002f003a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.444 UTC [cauthdsl] func2 -> DEBU 1eb0 0xc002f003a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.444 UTC [msp.identity] Verify -> DEBU 1eb1 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:12.445 UTC [msp.identity] Verify -> DEBU 1eb2 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:12.445 UTC [cauthdsl] func2 -> DEBU 1eb3 0xc002f003a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.445 UTC [cauthdsl] func1 -> DEBU 1eb4 0xc002f003a0 gate 1555913832443250700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.446 UTC [policies] Evaluate -> DEBU 1eb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.449 UTC [policies] Evaluate -> DEBU 1eb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.449 UTC [policies] Evaluate -> DEBU 1eb7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.450 UTC [policies] Evaluate -> DEBU 1eb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.450 UTC [msp] DeserializeIdentity -> DEBU 1eb9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.450 UTC [msp] DeserializeIdentity -> DEBU 1eba Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.451 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ebb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.451 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ebc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ebd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.452 UTC [policies] Evaluate -> DEBU 1ebe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.453 UTC [policies] Evaluate -> DEBU 1ebf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.453 UTC [policies] Evaluate -> DEBU 1ec0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.453 UTC [cauthdsl] func1 -> DEBU 1ec1 0xc002f01d00 gate 1555913832453795600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.454 UTC [cauthdsl] func2 -> DEBU 1ec2 0xc002f01d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.455 UTC [cauthdsl] func2 -> DEBU 1ec3 0xc002f01d00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.455 UTC [cauthdsl] func2 -> DEBU 1ec4 0xc002f01d00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.455 UTC [msp.identity] Verify -> DEBU 1ec5 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:12.456 UTC [msp.identity] Verify -> DEBU 1ec6 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:12.456 UTC [cauthdsl] func2 -> DEBU 1ec7 0xc002f01d00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.456 UTC [cauthdsl] func1 -> DEBU 1ec8 0xc002f01d00 gate 1555913832453795600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1ec9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1eca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1ecb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1ecc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.458 UTC [msp.identity] Verify -> DEBU 1ecd Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:12.458 UTC [msp.identity] Verify -> DEBU 1ece Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:12.459 UTC [msp.identity] Verify -> DEBU 1ecf Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:12.459 UTC [msp.identity] Verify -> DEBU 1ed0 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:12.460 UTC [gossip.gossip] handleMessage -> DEBU 1ed1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.460 UTC [gossip.gossip] handleMessage -> DEBU 1ed2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.460 UTC [msp] DeserializeIdentity -> DEBU 1ed3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.463 UTC [msp] DeserializeIdentity -> DEBU 1ed4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.463 UTC [msp] DeserializeIdentity -> DEBU 1ed5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.463 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.463 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.464 UTC [policies] Evaluate -> DEBU 1ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.464 UTC [policies] Evaluate -> DEBU 1eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.464 UTC [policies] Evaluate -> DEBU 1edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.465 UTC [cauthdsl] func1 -> DEBU 1edc 0xc002ee46e0 gate 1555913832465074000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.465 UTC [cauthdsl] func2 -> DEBU 1edd 0xc002ee46e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.465 UTC [cauthdsl] func2 -> DEBU 1ede 0xc002ee46e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.465 UTC [cauthdsl] func2 -> DEBU 1edf 0xc002ee46e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.466 UTC [msp.identity] Verify -> DEBU 1ee0 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:12.466 UTC [msp.identity] Verify -> DEBU 1ee1 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:12.466 UTC [cauthdsl] func2 -> DEBU 1ee2 0xc002ee46e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.467 UTC [cauthdsl] func1 -> DEBU 1ee3 0xc002ee46e0 gate 1555913832465074000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.468 UTC [msp] DeserializeIdentity -> DEBU 1ee8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.468 UTC [msp] DeserializeIdentity -> DEBU 1ee9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.469 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1eea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:12.469 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eeb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.469 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eec Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:12.469 UTC [policies] Evaluate -> DEBU 1eed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.469 UTC [policies] Evaluate -> DEBU 1eee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:12.469 UTC [policies] Evaluate -> DEBU 1eef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:12.470 UTC [cauthdsl] func1 -> DEBU 1ef0 0xc002ee5eb0 gate 1555913832470496800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:12.470 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc002ee5eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:12.471 UTC [cauthdsl] func2 -> DEBU 1ef2 0xc002ee5eb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:12.471 UTC [cauthdsl] func2 -> DEBU 1ef3 0xc002ee5eb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.471 UTC [msp.identity] Verify -> DEBU 1ef4 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:12.473 UTC [msp.identity] Verify -> DEBU 1ef5 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:12.474 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc002ee5eb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:12.474 UTC [cauthdsl] func1 -> DEBU 1ef7 0xc002ee5eb0 gate 1555913832470496800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:12.474 UTC [policies] Evaluate -> DEBU 1ef8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.474 UTC [policies] Evaluate -> DEBU 1ef9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.475 UTC [policies] Evaluate -> DEBU 1efa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.475 UTC [policies] Evaluate -> DEBU 1efb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:12.475 UTC [msp.identity] Verify -> DEBU 1efc Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:12.476 UTC [msp.identity] Verify -> DEBU 1efd Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:12.476 UTC [msp.identity] Verify -> DEBU 1efe Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:12.477 UTC [msp.identity] Verify -> DEBU 1eff Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:12.477 UTC [gossip.gossip] handleMessage -> DEBU 1f00 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.490 UTC [msp] DeserializeIdentity -> DEBU 1f01 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.490 UTC [msp] DeserializeIdentity -> DEBU 1f02 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.491 UTC [gossip.pull] Hello -> DEBU 1f03 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:12.491 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.491 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.492 UTC [gossip.comm] Send -> DEBU 1f06 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:12.492 UTC [gossip.comm] sendToEndpoint -> DEBU 1f07 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.493 UTC [gossip.comm] sendToEndpoint -> DEBU 1f08 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.494 UTC [gossip.comm] func1 -> DEBU 1f09 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16043837562002828108 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 1], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.494 UTC [gossip.gossip] handleMessage -> DEBU 1f0a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16043837562002828108 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 1], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.495 UTC [gossip.pull] HandleMessage -> DEBU 1f0b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16043837562002828108 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 1], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.495 UTC [gossip.gossip] handleMessage -> DEBU 1f0c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.681 UTC [gossip.comm] func1 -> DEBU 1f0d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.683 UTC [gossip.gossip] handleMessage -> DEBU 1f0e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.683 UTC [msp] DeserializeIdentity -> DEBU 1f0f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.683 UTC [msp] DeserializeIdentity -> DEBU 1f10 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.684 UTC [gossip.gossip] handleMessage -> DEBU 1f11 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.701 UTC [gossip.comm] func1 -> DEBU 1f12 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.701 UTC [gossip.gossip] handleMessage -> DEBU 1f13 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.702 UTC [gossip.pull] HandleMessage -> DEBU 1f14 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.702 UTC [gossip.pull] SendDigest -> DEBU 1f15 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:12.702 UTC [gossip.gossip] handleMessage -> DEBU 1f16 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:12.906 UTC [gossip.gossip] handleMessage -> DEBU 1f17 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:12.906 UTC [msp] DeserializeIdentity -> DEBU 1f18 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.906 UTC [msp] DeserializeIdentity -> DEBU 1f19 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.907 UTC [msp] DeserializeIdentity -> DEBU 1f1a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:12.907 UTC [gossip.gossip] handleMessage -> DEBU 1f1b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:13.120 UTC [gossip.comm] func1 -> DEBU 1f1c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:13.121 UTC [gossip.gossip] handleMessage -> DEBU 1f1d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:13.121 UTC [msp] DeserializeIdentity -> DEBU 1f1e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:13.121 UTC [msp] DeserializeIdentity -> DEBU 1f1f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:13.122 UTC [msp] DeserializeIdentity -> DEBU 1f20 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:13.122 UTC [gossip.gossip] handleMessage -> DEBU 1f21 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.898 UTC [gossip.pull] Hello -> DEBU 1f22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:14.899 UTC [gossip.comm] Send -> DEBU 1f23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:14.899 UTC [gossip.pull] Hello -> DEBU 1f24 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:14.899 UTC [gossip.comm] Send -> DEBU 1f25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:14.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1f26 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.900 UTC [gossip.pull] Hello -> DEBU 1f27 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:14.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1f28 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.900 UTC [gossip.comm] Send -> DEBU 1f29 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:14.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.901 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.903 UTC [gossip.comm] func1 -> DEBU 1f2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8035115496546039748 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.903 UTC [gossip.gossip] handleMessage -> DEBU 1f2e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8035115496546039748 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.904 UTC [gossip.pull] HandleMessage -> DEBU 1f2f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8035115496546039748 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.904 UTC [gossip.gossip] handleMessage -> DEBU 1f30 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.904 UTC [gossip.gossip] handleMessage -> DEBU 1f31 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9806469447705849204 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.905 UTC [gossip.pull] HandleMessage -> DEBU 1f32 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9806469447705849204 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.905 UTC [gossip.gossip] handleMessage -> DEBU 1f33 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.905 UTC [gossip.comm] sendToEndpoint -> DEBU 1f34 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.906 UTC [gossip.comm] func1 -> DEBU 1f35 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7432820561090957802 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.907 UTC [gossip.gossip] handleMessage -> DEBU 1f36 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7432820561090957802 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.907 UTC [gossip.pull] HandleMessage -> DEBU 1f37 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7432820561090957802 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.907 UTC [gossip.gossip] handleMessage -> DEBU 1f38 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.934 UTC [msp.identity] Sign -> DEBU 1f39 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101D " +peer0.org1.example.com | "2019-04-22 06:17:14.934 UTC [msp.identity] Sign -> DEBU 1f3a Sign: digest: 47BE2088D39197400D87A68B040D208892EE69ADE311531646B13B5BA950258A " +peer0.org1.example.com | "2019-04-22 06:17:14.935 UTC [msp.identity] Sign -> DEBU 1f3b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:14.935 UTC [msp.identity] Sign -> DEBU 1f3c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:14.935 UTC [msp] DeserializeIdentity -> DEBU 1f3d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:14.935 UTC [gossip.comm] Send -> DEBU 1f3e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:14.936 UTC [msp] DeserializeIdentity -> DEBU 1f3f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:14.936 UTC [gossip.comm] Send -> DEBU 1f40 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:14.936 UTC [gossip.comm] Send -> DEBU 1f41 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:14.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1f42 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.937 UTC [gossip.comm] sendToEndpoint -> DEBU 1f43 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.937 UTC [gossip.comm] sendToEndpoint -> DEBU 1f45 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.937 UTC [gossip.comm] sendToEndpoint -> DEBU 1f44 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.938 UTC [gossip.comm] sendToEndpoint -> DEBU 1f46 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.938 UTC [gossip.comm] sendToEndpoint -> DEBU 1f47 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.941 UTC [gossip.comm] func1 -> DEBU 1f48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.941 UTC [gossip.gossip] handleMessage -> DEBU 1f49 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.941 UTC [gossip.gossip] handleMessage -> DEBU 1f4a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f4c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:14.943 UTC [msp.identity] Verify -> DEBU 1f4d Verify: digest = 00000000 47 be 20 88 d3 91 97 40 0d 87 a6 8b 04 0d 20 88 |G. ....@...... .| +peer0.org1.example.com | 00000010 92 ee 69 ad e3 11 53 16 46 b1 3b 5b a9 50 25 8a |..i...S.F.;[.P%.|" +peer0.org1.example.com | "2019-04-22 06:17:14.943 UTC [msp.identity] Verify -> DEBU 1f4e Verify: sig = 00000000 30 44 02 20 51 07 5a ea 5b 41 b8 bd f9 17 80 d7 |0D. Q.Z.[A......| +peer0.org1.example.com | 00000010 1f 42 f7 30 67 8c de f6 80 a3 5d 03 6a 14 2b b8 |.B.0g.....].j.+.| +peer0.org1.example.com | 00000020 47 96 2f 55 02 20 0a a5 62 97 ed 4d 7a 59 ae 40 |G./U. ..b..MzY.@| +peer0.org1.example.com | 00000030 a0 83 db 10 a8 00 0b 6d 93 91 7b 5e 8b 24 19 f4 |.......m..{^.$..| +peer0.org1.example.com | 00000040 c5 46 f9 08 1a a7 |.F....|" +peer0.org1.example.com | "2019-04-22 06:17:14.944 UTC [gossip.gossip] handleMessage -> DEBU 1f50 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f51 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.944 UTC [gossip.discovery] isSentByMe -> DEBU 1f52 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f53 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.943 UTC [gossip.comm] func1 -> DEBU 1f4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f54 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:14.946 UTC [msp] DeserializeIdentity -> DEBU 1f55 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:14.946 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:14.946 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f57 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:14.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f58 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:14.947 UTC [policies] Evaluate -> DEBU 1f59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:14.947 UTC [policies] Evaluate -> DEBU 1f5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:14.947 UTC [policies] Evaluate -> DEBU 1f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:14.948 UTC [cauthdsl] func1 -> DEBU 1f5c 0xc0029d9930 gate 1555913834948051400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:14.948 UTC [cauthdsl] func2 -> DEBU 1f5d 0xc0029d9930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:14.948 UTC [cauthdsl] func2 -> DEBU 1f5e 0xc0029d9930 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:14.948 UTC [cauthdsl] func2 -> DEBU 1f5f 0xc0029d9930 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:14.949 UTC [msp.identity] Verify -> DEBU 1f60 Verify: digest = 00000000 fd c6 6c 46 f1 20 41 b3 c2 ce 87 ea 57 8c a6 d2 |..lF. A.....W...| +peer0.org1.example.com | 00000010 01 56 02 57 5e 02 b4 73 b9 96 ec 84 b0 b3 8c 63 |.V.W^..s.......c|" +peer0.org1.example.com | "2019-04-22 06:17:14.949 UTC [msp.identity] Verify -> DEBU 1f61 Verify: sig = 00000000 30 44 02 20 68 c1 08 0a be 5e 38 c3 cf 94 74 3e |0D. h....^8...t>| +peer0.org1.example.com | 00000010 08 6f 25 86 bd 1c 07 2d 14 58 e2 0b 67 85 d9 ba |.o%....-.X..g...| +peer0.org1.example.com | 00000020 94 a9 16 1d 02 20 3f d1 65 0c 01 69 14 32 f2 0b |..... ?.e..i.2..| +peer0.org1.example.com | 00000030 09 15 f1 ed 2c 3b 97 71 00 ef d1 92 f3 bf 1e a9 |....,;.q........| +peer0.org1.example.com | 00000040 d1 1d 75 2a 6b 25 |..u*k%|" +peer0.org1.example.com | "2019-04-22 06:17:14.949 UTC [cauthdsl] func2 -> DEBU 1f62 0xc0029d9930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:14.949 UTC [cauthdsl] func1 -> DEBU 1f63 0xc0029d9930 gate 1555913834948051400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f66 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f68 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f69 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:14.951 UTC [msp.identity] Verify -> DEBU 1f6b Verify: digest = 00000000 b7 5c cb 09 77 38 39 ad ee a0 c0 be 82 79 3b 4c |.\..w89......y;L| +peer0.org1.example.com | 00000010 87 e4 35 f4 10 96 e1 ea e8 72 f1 e1 4b 4d 78 02 |..5......r..KMx.|" +peer0.org1.example.com | "2019-04-22 06:17:14.951 UTC [msp.identity] Verify -> DEBU 1f6c Verify: sig = 00000000 30 44 02 20 4a 77 fc 66 61 29 14 48 cd 91 68 f5 |0D. Jw.fa).H..h.| +peer0.org1.example.com | 00000010 da 2d b8 22 13 85 db c4 42 20 c9 28 14 40 a1 6a |.-."....B .(.@.j| +peer0.org1.example.com | 00000020 be e0 af 8b 02 20 53 2c 13 84 59 dc 54 d9 97 c6 |..... S,..Y.T...| +peer0.org1.example.com | 00000030 e5 9f 3f 19 6d 26 98 a6 bd fd 91 bd 35 6a 6e 3b |..?.m&......5jn;| +peer0.org1.example.com | 00000040 92 95 49 d6 d7 88 |..I...|" +peer0.org1.example.com | "2019-04-22 06:17:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f6d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f6e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.953 UTC [gossip.gossip] handleMessage -> DEBU 1f71 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.954 UTC [gossip.gossip] handleMessage -> DEBU 1f72 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.955 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f73 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:14.956 UTC [msp] DeserializeIdentity -> DEBU 1f74 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:14.957 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:14.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f76 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:14.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f77 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:14.965 UTC [policies] Evaluate -> DEBU 1f78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:14.965 UTC [policies] Evaluate -> DEBU 1f79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:14.965 UTC [policies] Evaluate -> DEBU 1f7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:14.966 UTC [cauthdsl] func1 -> DEBU 1f7b 0xc0026dc190 gate 1555913834966288300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:14.966 UTC [cauthdsl] func2 -> DEBU 1f7c 0xc0026dc190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:14.967 UTC [cauthdsl] func2 -> DEBU 1f7d 0xc0026dc190 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:14.967 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0026dc190 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:14.967 UTC [msp.identity] Verify -> DEBU 1f7f Verify: digest = 00000000 9e d2 cf 72 97 3e 9a 23 5d 65 3e 01 3d be e7 8e |...r.>.#]e>.=...| +peer0.org1.example.com | 00000010 c1 f1 e9 e5 32 1d ac 39 ab ed af 94 1a 25 27 70 |....2..9.....%'p|" +peer0.org1.example.com | "2019-04-22 06:17:14.968 UTC [msp.identity] Verify -> DEBU 1f80 Verify: sig = 00000000 30 45 02 21 00 de f5 53 d9 f1 35 19 12 14 57 83 |0E.!...S..5...W.| +peer0.org1.example.com | 00000010 db 2d 6b ac b7 ff 27 6d 08 10 03 8b f7 28 b6 aa |.-k...'m.....(..| +peer0.org1.example.com | 00000020 89 1c 93 53 dc 02 20 64 fd d4 52 03 1b cc 1d a1 |...S.. d..R.....| +peer0.org1.example.com | 00000030 b8 bf a7 1c ec a4 6c b8 9a a7 5f c5 2a 9a 51 15 |......l..._.*.Q.| +peer0.org1.example.com | 00000040 ea 18 94 5c d8 fa 72 |...\..r|" +peer0.org1.example.com | "2019-04-22 06:17:14.969 UTC [cauthdsl] func2 -> DEBU 1f81 0xc0026dc190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:14.969 UTC [cauthdsl] func1 -> DEBU 1f82 0xc0026dc190 gate 1555913834966288300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:14.969 UTC [policies] Evaluate -> DEBU 1f83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.970 UTC [policies] Evaluate -> DEBU 1f84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.970 UTC [policies] Evaluate -> DEBU 1f85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.970 UTC [policies] Evaluate -> DEBU 1f86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:14.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f88 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f89 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:14.971 UTC [msp.identity] Verify -> DEBU 1f8a Verify: digest = 00000000 b7 5c cb 09 77 38 39 ad ee a0 c0 be 82 79 3b 4c |.\..w89......y;L| +peer0.org1.example.com | 00000010 87 e4 35 f4 10 96 e1 ea e8 72 f1 e1 4b 4d 78 02 |..5......r..KMx.|" +peer0.org1.example.com | "2019-04-22 06:17:14.971 UTC [msp.identity] Verify -> DEBU 1f8b Verify: sig = 00000000 30 44 02 20 4a 77 fc 66 61 29 14 48 cd 91 68 f5 |0D. Jw.fa).H..h.| +peer0.org1.example.com | 00000010 da 2d b8 22 13 85 db c4 42 20 c9 28 14 40 a1 6a |.-."....B .(.@.j| +peer0.org1.example.com | 00000020 be e0 af 8b 02 20 53 2c 13 84 59 dc 54 d9 97 c6 |..... S,..Y.T...| +peer0.org1.example.com | 00000030 e5 9f 3f 19 6d 26 98 a6 bd fd 91 bd 35 6a 6e 3b |..?.m&......5jn;| +peer0.org1.example.com | 00000040 92 95 49 d6 d7 88 |..I...|" +peer0.org1.example.com | "2019-04-22 06:17:14.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.973 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f8e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:14.973 UTC [msp.identity] Verify -> DEBU 1f8f Verify: digest = 00000000 47 be 20 88 d3 91 97 40 0d 87 a6 8b 04 0d 20 88 |G. ....@...... .| +peer0.org1.example.com | 00000010 92 ee 69 ad e3 11 53 16 46 b1 3b 5b a9 50 25 8a |..i...S.F.;[.P%.|" +peer0.org1.example.com | "2019-04-22 06:17:14.973 UTC [msp.identity] Verify -> DEBU 1f90 Verify: sig = 00000000 30 44 02 20 51 07 5a ea 5b 41 b8 bd f9 17 80 d7 |0D. Q.Z.[A......| +peer0.org1.example.com | 00000010 1f 42 f7 30 67 8c de f6 80 a3 5d 03 6a 14 2b b8 |.B.0g.....].j.+.| +peer0.org1.example.com | 00000020 47 96 2f 55 02 20 0a a5 62 97 ed 4d 7a 59 ae 40 |G./U. ..b..MzY.@| +peer0.org1.example.com | 00000030 a0 83 db 10 a8 00 0b 6d 93 91 7b 5e 8b 24 19 f4 |.......m..{^.$..| +peer0.org1.example.com | 00000040 c5 46 f9 08 1a a7 |.F....|" +peer0.org1.example.com | "2019-04-22 06:17:14.974 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f91 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.974 UTC [gossip.discovery] isSentByMe -> DEBU 1f92 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.974 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f93 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f94 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.975 UTC [gossip.gossip] handleMessage -> DEBU 1f95 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f97 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:14.975 UTC [msp.identity] Verify -> DEBU 1f98 Verify: digest = 00000000 47 be 20 88 d3 91 97 40 0d 87 a6 8b 04 0d 20 88 |G. ....@...... .| +peer0.org1.example.com | 00000010 92 ee 69 ad e3 11 53 16 46 b1 3b 5b a9 50 25 8a |..i...S.F.;[.P%.|" +peer0.org1.example.com | "2019-04-22 06:17:14.976 UTC [msp.identity] Verify -> DEBU 1f99 Verify: sig = 00000000 30 44 02 20 51 07 5a ea 5b 41 b8 bd f9 17 80 d7 |0D. Q.Z.[A......| +peer0.org1.example.com | 00000010 1f 42 f7 30 67 8c de f6 80 a3 5d 03 6a 14 2b b8 |.B.0g.....].j.+.| +peer0.org1.example.com | 00000020 47 96 2f 55 02 20 0a a5 62 97 ed 4d 7a 59 ae 40 |G./U. ..b..MzY.@| +peer0.org1.example.com | 00000030 a0 83 db 10 a8 00 0b 6d 93 91 7b 5e 8b 24 19 f4 |.......m..{^.$..| +peer0.org1.example.com | 00000040 c5 46 f9 08 1a a7 |.F....|" +peer0.org1.example.com | "2019-04-22 06:17:14.976 UTC [msp.identity] Verify -> DEBU 1f9a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:14.976 UTC [msp.identity] Verify -> DEBU 1f9b Verify: sig = 00000000 30 44 02 20 58 ac 77 4e e2 3e e3 0a 4b 08 21 3b |0D. X.wN.>..K.!;| +peer0.org1.example.com | 00000010 7e c9 ce 58 53 f5 fa 46 a7 3e fa ab ff 4d ed c3 |~..XS..F.>...M..| +peer0.org1.example.com | 00000020 d6 c0 c6 f0 02 20 04 41 bf 84 9d 3b f6 e9 4a 62 |..... .A...;..Jb| +peer0.org1.example.com | 00000030 3f 78 2e a5 28 9d 51 ba 8b b3 3b d7 88 e7 2b 37 |?x..(.Q...;...+7| +peer0.org1.example.com | 00000040 01 08 15 b1 0f 1d |......|" +peer0.org1.example.com | "2019-04-22 06:17:14.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f9c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.977 UTC [gossip.discovery] isSentByMe -> DEBU 1f9d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:14.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f9e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:14.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.161 UTC [gossip.comm] func1 -> DEBU 1fa0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.161 UTC [gossip.gossip] handleMessage -> DEBU 1fa1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.162 UTC [gossip.pull] HandleMessage -> DEBU 1fa2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.162 UTC [gossip.pull] SendDigest -> DEBU 1fa3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:15.162 UTC [gossip.gossip] handleMessage -> DEBU 1fa4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.182 UTC [gossip.comm] func1 -> DEBU 1fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.182 UTC [gossip.gossip] handleMessage -> DEBU 1fa6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.183 UTC [gossip.gossip] handleMessage -> DEBU 1fa7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fa9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:15.184 UTC [msp.identity] Verify -> DEBU 1faa Verify: digest = 00000000 42 11 9d 68 7f c6 7e 82 86 b8 d4 b9 83 71 52 98 |B..h..~......qR.| +peer0.org1.example.com | 00000010 ca a7 57 95 e7 0d fd ee a9 14 6a 4e a2 73 20 ca |..W.......jN.s .|" +peer0.org1.example.com | "2019-04-22 06:17:15.186 UTC [msp.identity] Verify -> DEBU 1fab Verify: sig = 00000000 30 44 02 20 7a 88 9b e8 c9 76 51 29 e4 93 7d 2b |0D. z....vQ)..}+| +peer0.org1.example.com | 00000010 9b e8 eb 96 e8 68 58 fb 3d ec e3 4e 78 94 13 ae |.....hX.=..Nx...| +peer0.org1.example.com | 00000020 c9 b4 bb e5 02 20 3b 59 ec e8 4a 60 be c1 f2 2c |..... ;Y..J`...,| +peer0.org1.example.com | 00000030 52 32 53 f3 c9 fd f4 f1 51 ec 93 6f fd 1e 5b cb |R2S.....Q..o..[.| +peer0.org1.example.com | 00000040 cf 37 40 2d 4a 28 |.7@-J(|" +peer0.org1.example.com | "2019-04-22 06:17:15.187 UTC [msp.identity] Verify -> DEBU 1fac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:15.187 UTC [msp.identity] Verify -> DEBU 1fad Verify: sig = 00000000 30 45 02 21 00 9d 44 b0 10 65 63 92 9b 8b 41 21 |0E.!..D..ec...A!| +peer0.org1.example.com | 00000010 07 98 1d 28 38 38 0b 88 7e 10 24 2a 79 5c a0 a1 |...(88..~.$*y\..| +peer0.org1.example.com | 00000020 31 58 0d ab eb 02 20 76 6f 85 26 f7 1a 6f ae 39 |1X.... vo.&..o.9| +peer0.org1.example.com | 00000030 db 22 4b 21 18 1e 08 65 fc 36 50 7d b0 95 1e 38 |."K!...e.6P}...8| +peer0.org1.example.com | 00000040 9c 9f 10 17 62 bc 41 |....b.A|" +peer0.org1.example.com | "2019-04-22 06:17:15.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1faf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:15.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb0 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 " +peer0.org1.example.com | "2019-04-22 06:17:15.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 " +peer0.org1.example.com | "2019-04-22 06:17:15.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:15.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fb4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.190 UTC [gossip.discovery] sendMemResponse -> DEBU 1fb6 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:15.191 UTC [msp] DeserializeIdentity -> DEBU 1fb7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.191 UTC [msp] DeserializeIdentity -> DEBU 1fb8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.192 UTC [gossip.comm] Send -> DEBU 1fb9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:15.193 UTC [gossip.discovery] sendMemResponse -> DEBU 1fba Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:15.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.620 UTC [gossip.comm] func1 -> DEBU 1fbd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.621 UTC [gossip.gossip] handleMessage -> DEBU 1fbe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.621 UTC [gossip.pull] HandleMessage -> DEBU 1fbf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.622 UTC [msp] DeserializeIdentity -> DEBU 1fc0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.622 UTC [msp] DeserializeIdentity -> DEBU 1fc1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.622 UTC [msp] DeserializeIdentity -> DEBU 1fc2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.623 UTC [msp] DeserializeIdentity -> DEBU 1fc3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.623 UTC [msp] DeserializeIdentity -> DEBU 1fc4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.623 UTC [msp] DeserializeIdentity -> DEBU 1fc5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.624 UTC [gossip.pull] SendDigest -> DEBU 1fc6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:15.624 UTC [gossip.gossip] handleMessage -> DEBU 1fc7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.631 UTC [gossip.comm] func1 -> DEBU 1fc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.631 UTC [gossip.gossip] handleMessage -> DEBU 1fc9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.633 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.633 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fcb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:15.634 UTC [msp] DeserializeIdentity -> DEBU 1fcc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.634 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fcd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:15.634 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fce Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:15.634 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:15.635 UTC [policies] Evaluate -> DEBU 1fd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:15.635 UTC [policies] Evaluate -> DEBU 1fd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:15.636 UTC [policies] Evaluate -> DEBU 1fd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:15.636 UTC [cauthdsl] func1 -> DEBU 1fd3 0xc0025e3cf0 gate 1555913835636802800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:15.637 UTC [cauthdsl] func2 -> DEBU 1fd4 0xc0025e3cf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:15.637 UTC [cauthdsl] func2 -> DEBU 1fd5 0xc0025e3cf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:15.637 UTC [cauthdsl] func2 -> DEBU 1fd6 0xc0025e3cf0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:15.645 UTC [gossip.gossip] handleMessage -> DEBU 1fd7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.646 UTC [msp.identity] Verify -> DEBU 1fd8 Verify: digest = 00000000 f6 1e 27 df ae 4a b5 51 4a e2 30 c7 a1 51 59 2b |..'..J.QJ.0..QY+| +peer0.org1.example.com | 00000010 96 47 bf ba 4a 64 2c e5 41 d8 00 7d 04 c1 f9 af |.G..Jd,.A..}....|" +peer0.org1.example.com | "2019-04-22 06:17:15.647 UTC [msp.identity] Verify -> DEBU 1fd9 Verify: sig = 00000000 30 45 02 21 00 e9 a5 e1 29 e5 2b 13 60 67 92 25 |0E.!....).+.`g.%| +peer0.org1.example.com | 00000010 e1 93 a5 d0 05 e2 3b a2 d2 3c 41 d4 59 6b db e3 |......;.. DEBU 1fda 0xc0025e3cf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:15.647 UTC [cauthdsl] func1 -> DEBU 1fdb 0xc0025e3cf0 gate 1555913835636802800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:15.647 UTC [policies] Evaluate -> DEBU 1fdc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:15.648 UTC [policies] Evaluate -> DEBU 1fdd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:15.648 UTC [policies] Evaluate -> DEBU 1fde Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:15.648 UTC [policies] Evaluate -> DEBU 1fdf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:15.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fe0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 " +peer0.org1.example.com | "2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 " +peer0.org1.example.com | "2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fe6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fe7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.650 UTC [gossip.discovery] sendMemResponse -> DEBU 1fe8 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:15.650 UTC [msp] DeserializeIdentity -> DEBU 1fe9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.651 UTC [msp] DeserializeIdentity -> DEBU 1fea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.651 UTC [msp] DeserializeIdentity -> DEBU 1feb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.651 UTC [gossip.comm] Send -> DEBU 1fec Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:15.652 UTC [gossip.discovery] sendMemResponse -> DEBU 1fed Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:15.652 UTC [gossip.comm] sendToEndpoint -> DEBU 1fee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.652 UTC [gossip.comm] sendToEndpoint -> DEBU 1fef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.856 UTC [msp.identity] Sign -> DEBU 1ff0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101E " +peer0.org1.example.com | "2019-04-22 06:17:15.856 UTC [msp.identity] Sign -> DEBU 1ff1 Sign: digest: 56975123F69AC92C774DD958CC11C1CBBFAF4DD7F0EAD9379E8A640F04E90790 " +peer0.org1.example.com | "2019-04-22 06:17:15.857 UTC [msp.identity] Sign -> DEBU 1ff2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:15.857 UTC [msp.identity] Sign -> DEBU 1ff3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:15.857 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1ff4 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:15.863 UTC [msp] DeserializeIdentity -> DEBU 1ff5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.863 UTC [msp] DeserializeIdentity -> DEBU 1ff6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.863 UTC [gossip.comm] Send -> DEBU 1ff7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:15.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.865 UTC [msp] DeserializeIdentity -> DEBU 1ffa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.865 UTC [gossip.comm] Send -> DEBU 1ffb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:15.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1ffc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1ffd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:15.867 UTC [msp] DeserializeIdentity -> DEBU 1ffe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:15.868 UTC [gossip.comm] Send -> DEBU 1fff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:15.869 UTC [gossip.comm] sendToEndpoint -> DEBU 2000 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:15.869 UTC [gossip.comm] sendToEndpoint -> DEBU 2001 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.038 UTC [gossip.gossip] handleMessage -> DEBU 2002 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.038 UTC [gossip.pull] HandleMessage -> DEBU 2003 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2004 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2005 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2006 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2007 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2008 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2009 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [gossip.pull] SendDigest -> DEBU 200a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:16.041 UTC [gossip.gossip] handleMessage -> DEBU 200b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.057 UTC [gossip.gossip] handleMessage -> DEBU 200c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.057 UTC [gossip.gossip] handleMessage -> DEBU 200d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.058 UTC [gossip.discovery] handleMsgFromComm -> DEBU 200e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.058 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 200f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:16.058 UTC [msp] DeserializeIdentity -> DEBU 2010 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2011 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2012 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2013 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.060 UTC [policies] Evaluate -> DEBU 2014 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.060 UTC [policies] Evaluate -> DEBU 2015 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.060 UTC [policies] Evaluate -> DEBU 2016 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.061 UTC [cauthdsl] func1 -> DEBU 2017 0xc0024d3b60 gate 1555913836061011300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.061 UTC [cauthdsl] func2 -> DEBU 2018 0xc0024d3b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.061 UTC [cauthdsl] func2 -> DEBU 2019 0xc0024d3b60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.061 UTC [cauthdsl] func2 -> DEBU 201a 0xc0024d3b60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.061 UTC [msp.identity] Verify -> DEBU 201b Verify: digest = 00000000 24 91 ac e3 96 9d f9 82 32 b5 04 94 d8 9f 61 f1 |$.......2.....a.| +peer0.org1.example.com | 00000010 1d 94 0e 3e 00 62 25 38 fd 12 de a6 a0 c5 d9 f8 |...>.b%8........|" +peer0.org1.example.com | "2019-04-22 06:17:16.062 UTC [msp.identity] Verify -> DEBU 201c Verify: sig = 00000000 30 44 02 20 5f 3b 1c fa fb 88 50 97 05 f6 f3 70 |0D. _;....P....p| +peer0.org1.example.com | 00000010 ec e2 9a e5 0c a5 e8 03 d3 4e 13 df cd 24 76 c5 |.........N...$v.| +peer0.org1.example.com | 00000020 41 a9 26 6a 02 20 48 f0 8b dc 71 44 d7 19 75 56 |A.&j. H...qD..uV| +peer0.org1.example.com | 00000030 e6 90 a4 40 83 87 73 de 6b d8 02 ef ff 4d 94 dc |...@..s.k....M..| +peer0.org1.example.com | 00000040 1e a9 f7 6a 2d 80 |...j-.|" +peer0.org1.example.com | "2019-04-22 06:17:16.062 UTC [cauthdsl] func2 -> DEBU 201d 0xc0024d3b60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.062 UTC [cauthdsl] func1 -> DEBU 201e 0xc0024d3b60 gate 1555913836061011300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 201f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 2020 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 2021 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 2022 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 2023 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2024 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:16.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2025 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 " +peer0.org1.example.com | "2019-04-22 06:17:16.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2026 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 " +peer0.org1.example.com | "2019-04-22 06:17:16.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2027 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:16.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2028 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.065 UTC [gossip.discovery] handleAliveMessage -> DEBU 2029 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 202a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.065 UTC [gossip.discovery] sendMemResponse -> DEBU 202b Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:16.066 UTC [msp] DeserializeIdentity -> DEBU 202c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.066 UTC [msp] DeserializeIdentity -> DEBU 202d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.066 UTC [msp] DeserializeIdentity -> DEBU 202e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.067 UTC [gossip.comm] Send -> DEBU 202f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.067 UTC [gossip.discovery] sendMemResponse -> DEBU 2030 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:16.067 UTC [gossip.comm] sendToEndpoint -> DEBU 2031 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.070 UTC [gossip.comm] sendToEndpoint -> DEBU 2032 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.144 UTC [gossip.comm] func1 -> DEBU 2033 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.144 UTC [gossip.gossip] handleMessage -> DEBU 2034 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.147 UTC [gossip.gossip] handleMessage -> DEBU 2035 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.148 UTC [gossip.gossip] handleMessage -> DEBU 2036 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2037 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.149 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2038 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:16.150 UTC [msp.identity] Verify -> DEBU 2039 Verify: digest = 00000000 c8 02 3d 18 65 f4 62 e4 d5 45 fd 11 77 15 b4 10 |..=.e.b..E..w...| +peer0.org1.example.com | 00000010 82 9d ee 79 2b 1d ad 8c 0b 72 ff 6e 33 35 8a 1b |...y+....r.n35..|" +peer0.org1.example.com | "2019-04-22 06:17:16.150 UTC [msp.identity] Verify -> DEBU 203a Verify: sig = 00000000 30 43 02 1f 59 6f c3 25 44 b7 1f 63 8e 6a 08 60 |0C..Yo.%D..c.j.`| +peer0.org1.example.com | 00000010 e5 e3 a1 2e 78 0d a9 e6 41 f2 4c e3 e0 d9 03 6a |....x...A.L....j| +peer0.org1.example.com | 00000020 86 b3 c9 02 20 36 53 d4 50 b8 f5 c7 23 fc f4 94 |.... 6S.P...#...| +peer0.org1.example.com | 00000030 35 b0 06 78 71 a0 f5 d5 35 4e 72 f6 fb 23 ab 87 |5..xq...5Nr..#..| +peer0.org1.example.com | 00000040 31 9e 3a b0 ac |1.:..|" +peer0.org1.example.com | "2019-04-22 06:17:16.151 UTC [msp.identity] Verify -> DEBU 203b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:16.151 UTC [msp.identity] Verify -> DEBU 203c Verify: sig = 00000000 30 45 02 21 00 9d 62 ff 75 e5 ef 29 da 72 f4 d3 |0E.!..b.u..).r..| +peer0.org1.example.com | 00000010 cb 4b 89 bf 20 09 ab 71 06 c8 00 02 ae 8f fb e5 |.K.. ..q........| +peer0.org1.example.com | 00000020 39 3f 39 13 44 02 20 44 f1 5b ba 67 50 af 6b 9d |9?9.D. D.[.gP.k.| +peer0.org1.example.com | 00000030 8d e5 cb 2c 1c 84 24 e1 a2 7a 1d 4c ca e0 b8 29 |...,..$..z.L...)| +peer0.org1.example.com | 00000040 be 2f a0 7c 0e 35 a0 |./.|.5.|" +peer0.org1.example.com | "2019-04-22 06:17:16.152 UTC [gossip.discovery] handleAliveMessage -> DEBU 203d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 203e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 203f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 " +peer0.org1.example.com | "2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 2040 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 " +peer0.org1.example.com | "2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 2041 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:16.154 UTC [gossip.discovery] learnExistingMembers -> DEBU 2042 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.154 UTC [gossip.discovery] handleAliveMessage -> DEBU 2043 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.154 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2044 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.155 UTC [msp] DeserializeIdentity -> DEBU 2045 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.156 UTC [msp] DeserializeIdentity -> DEBU 2046 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.156 UTC [msp] DeserializeIdentity -> DEBU 2047 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.156 UTC [gossip.comm] Send -> DEBU 2048 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.158 UTC [msp] DeserializeIdentity -> DEBU 2049 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.158 UTC [gossip.comm] Send -> DEBU 204a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.162 UTC [gossip.comm] func1 -> DEBU 204f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.162 UTC [gossip.gossip] handleMessage -> DEBU 2050 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.162 UTC [gossip.gossip] handleMessage -> DEBU 2051 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2052 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2053 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.163 UTC [gossip.gossip] handleMessage -> DEBU 2054 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2055 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2056 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.423 UTC [msp] DeserializeIdentity -> DEBU 2057 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.423 UTC [msp] DeserializeIdentity -> DEBU 2058 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.424 UTC [gossip.comm] Send -> DEBU 2059 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.424 UTC [gossip.comm] sendToEndpoint -> DEBU 205a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.424 UTC [gossip.comm] sendToEndpoint -> DEBU 205b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.425 UTC [gossip.comm] sendToEndpoint -> DEBU 205c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.427 UTC [gossip.comm] sendToEndpoint -> DEBU 205d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.427 UTC [gossip.comm] sendToEndpoint -> DEBU 205e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.428 UTC [gossip.gossip] handleMessage -> DEBU 205f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.428 UTC [msp] DeserializeIdentity -> DEBU 2060 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.428 UTC [msp] DeserializeIdentity -> DEBU 2061 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.429 UTC [msp] DeserializeIdentity -> DEBU 2062 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2063 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2064 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2065 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.433 UTC [policies] Evaluate -> DEBU 2067 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.433 UTC [policies] Evaluate -> DEBU 2068 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.433 UTC [policies] Evaluate -> DEBU 2069 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.434 UTC [cauthdsl] func1 -> DEBU 206a 0xc00236eb30 gate 1555913836434154800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.434 UTC [cauthdsl] func2 -> DEBU 206b 0xc00236eb30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.432 UTC [gossip.comm] func1 -> DEBU 2066 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.435 UTC [cauthdsl] func2 -> DEBU 206c 0xc00236eb30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.435 UTC [cauthdsl] func2 -> DEBU 206d 0xc00236eb30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.436 UTC [msp.identity] Verify -> DEBU 206e Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:16.436 UTC [msp.identity] Verify -> DEBU 206f Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:16.437 UTC [cauthdsl] func2 -> DEBU 2070 0xc00236eb30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.437 UTC [cauthdsl] func1 -> DEBU 2071 0xc00236eb30 gate 1555913836434154800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.437 UTC [policies] Evaluate -> DEBU 2072 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.438 UTC [policies] Evaluate -> DEBU 2073 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.438 UTC [policies] Evaluate -> DEBU 2074 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.445 UTC [policies] Evaluate -> DEBU 2075 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.446 UTC [msp] DeserializeIdentity -> DEBU 2076 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.447 UTC [msp] DeserializeIdentity -> DEBU 2077 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.448 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2078 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2079 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 207a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.449 UTC [policies] Evaluate -> DEBU 207b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.449 UTC [policies] Evaluate -> DEBU 207c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.449 UTC [policies] Evaluate -> DEBU 207d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.450 UTC [cauthdsl] func1 -> DEBU 207e 0xc00230c360 gate 1555913836450397000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.450 UTC [cauthdsl] func2 -> DEBU 207f 0xc00230c360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.450 UTC [cauthdsl] func2 -> DEBU 2080 0xc00230c360 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.451 UTC [cauthdsl] func2 -> DEBU 2081 0xc00230c360 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.452 UTC [msp.identity] Verify -> DEBU 2082 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:16.452 UTC [msp.identity] Verify -> DEBU 2083 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:16.453 UTC [cauthdsl] func2 -> DEBU 2084 0xc00230c360 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.453 UTC [cauthdsl] func1 -> DEBU 2085 0xc00230c360 gate 1555913836450397000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.454 UTC [policies] Evaluate -> DEBU 2086 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.454 UTC [policies] Evaluate -> DEBU 2087 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.454 UTC [policies] Evaluate -> DEBU 2088 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.455 UTC [policies] Evaluate -> DEBU 2089 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.454 UTC [gossip.comm] sendToEndpoint -> DEBU 208a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.458 UTC [gossip.comm] func1 -> DEBU 208b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.459 UTC [msp.identity] Verify -> DEBU 208c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:16.459 UTC [msp.identity] Verify -> DEBU 208d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:16.460 UTC [msp.identity] Verify -> DEBU 208e Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:16.460 UTC [msp.identity] Verify -> DEBU 208f Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:16.460 UTC [gossip.gossip] handleMessage -> DEBU 2090 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.460 UTC [gossip.gossip] handleMessage -> DEBU 2091 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.461 UTC [msp] DeserializeIdentity -> DEBU 2092 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.461 UTC [msp] DeserializeIdentity -> DEBU 2093 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.462 UTC [msp] DeserializeIdentity -> DEBU 2094 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.462 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2095 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.462 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2096 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.462 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2097 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.463 UTC [policies] Evaluate -> DEBU 2098 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.463 UTC [policies] Evaluate -> DEBU 2099 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.463 UTC [policies] Evaluate -> DEBU 209a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.463 UTC [cauthdsl] func1 -> DEBU 209b 0xc0022d9150 gate 1555913836463270500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.463 UTC [cauthdsl] func2 -> DEBU 209c 0xc0022d9150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.463 UTC [cauthdsl] func2 -> DEBU 209d 0xc0022d9150 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.464 UTC [cauthdsl] func2 -> DEBU 209e 0xc0022d9150 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.464 UTC [msp.identity] Verify -> DEBU 209f Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:16.464 UTC [msp.identity] Verify -> DEBU 20a0 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:16.465 UTC [cauthdsl] func2 -> DEBU 20a1 0xc0022d9150 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.465 UTC [cauthdsl] func1 -> DEBU 20a2 0xc0022d9150 gate 1555913836463270500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.466 UTC [msp] DeserializeIdentity -> DEBU 20a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.466 UTC [msp] DeserializeIdentity -> DEBU 20a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.467 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20aa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20ab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.467 UTC [policies] Evaluate -> DEBU 20ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.467 UTC [policies] Evaluate -> DEBU 20ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.467 UTC [policies] Evaluate -> DEBU 20ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.469 UTC [cauthdsl] func1 -> DEBU 20af 0xc00229c700 gate 1555913836469075000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.469 UTC [cauthdsl] func2 -> DEBU 20b0 0xc00229c700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.469 UTC [cauthdsl] func2 -> DEBU 20b1 0xc00229c700 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.469 UTC [cauthdsl] func2 -> DEBU 20b2 0xc00229c700 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.470 UTC [msp.identity] Verify -> DEBU 20b3 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:16.470 UTC [msp.identity] Verify -> DEBU 20b4 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:16.471 UTC [cauthdsl] func2 -> DEBU 20b5 0xc00229c700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.471 UTC [cauthdsl] func1 -> DEBU 20b6 0xc00229c700 gate 1555913836469075000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.471 UTC [policies] Evaluate -> DEBU 20b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.471 UTC [policies] Evaluate -> DEBU 20b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.472 UTC [policies] Evaluate -> DEBU 20b9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.472 UTC [policies] Evaluate -> DEBU 20ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.472 UTC [msp.identity] Verify -> DEBU 20bb Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:16.473 UTC [msp.identity] Verify -> DEBU 20bc Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:16.473 UTC [msp.identity] Verify -> DEBU 20bd Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:16.473 UTC [msp.identity] Verify -> DEBU 20be Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:16.474 UTC [gossip.gossip] handleMessage -> DEBU 20bf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.474 UTC [gossip.gossip] handleMessage -> DEBU 20c0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.475 UTC [msp.identity] Verify -> DEBU 20c1 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:16.475 UTC [msp.identity] Verify -> DEBU 20c2 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:16.476 UTC [msp] DeserializeIdentity -> DEBU 20c3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.476 UTC [msp] DeserializeIdentity -> DEBU 20c4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.477 UTC [gossip.election] waitForInterrupt -> DEBU 20c5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.477 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.478 UTC [policies] Evaluate -> DEBU 20c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.477 UTC [gossip.election] IsLeader -> DEBU 20ca c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:16.479 UTC [msp.identity] Sign -> DEBU 20cb Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510081801 " +peer0.org1.example.com | "2019-04-22 06:17:16.479 UTC [msp.identity] Sign -> DEBU 20cd Sign: digest: 7F56D2C9B13FE31A48A43DC7F90E65EAB727E65113A1E41C2947968E9C461E07 " +peer0.org1.example.com | "2019-04-22 06:17:16.478 UTC [policies] Evaluate -> DEBU 20cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.479 UTC [gossip.election] waitForInterrupt -> DEBU 20ce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:16.479 UTC [policies] Evaluate -> DEBU 20cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.481 UTC [cauthdsl] func1 -> DEBU 20d0 0xc002258a60 gate 1555913836481130800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.481 UTC [cauthdsl] func2 -> DEBU 20d2 0xc002258a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.481 UTC [msp] DeserializeIdentity -> DEBU 20d1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.481 UTC [cauthdsl] func2 -> DEBU 20d3 0xc002258a60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.482 UTC [msp] DeserializeIdentity -> DEBU 20d5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.482 UTC [cauthdsl] func2 -> DEBU 20d4 0xc002258a60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.483 UTC [msp.identity] Verify -> DEBU 20d6 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:16.484 UTC [msp.identity] Verify -> DEBU 20d8 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:16.483 UTC [msp] DeserializeIdentity -> DEBU 20d7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.485 UTC [msp] DeserializeIdentity -> DEBU 20d9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.485 UTC [cauthdsl] func2 -> DEBU 20da 0xc002258a60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.485 UTC [cauthdsl] func1 -> DEBU 20db 0xc002258a60 gate 1555913836481130800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.486 UTC [gossip.comm] Send -> DEBU 20dc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.486 UTC [policies] Evaluate -> DEBU 20dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.487 UTC [msp] DeserializeIdentity -> DEBU 20de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.487 UTC [policies] Evaluate -> DEBU 20df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.488 UTC [policies] Evaluate -> DEBU 20e1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.488 UTC [policies] Evaluate -> DEBU 20e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.490 UTC [msp.identity] Verify -> DEBU 20e3 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:16.490 UTC [msp.identity] Verify -> DEBU 20e4 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:16.489 UTC [gossip.comm] sendToEndpoint -> DEBU 20e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.490 UTC [gossip.comm] sendToEndpoint -> DEBU 20e6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.492 UTC [msp] DeserializeIdentity -> DEBU 20e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.493 UTC [msp] DeserializeIdentity -> DEBU 20e8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.494 UTC [msp] DeserializeIdentity -> DEBU 20e9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.495 UTC [gossip.pull] Hello -> DEBU 20ea Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:16.499 UTC [msp] DeserializeIdentity -> DEBU 20eb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.500 UTC [msp] DeserializeIdentity -> DEBU 20ec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.501 UTC [gossip.comm] Send -> DEBU 20ed Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.501 UTC [gossip.comm] sendToEndpoint -> DEBU 20ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.501 UTC [gossip.comm] sendToEndpoint -> DEBU 20ef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.502 UTC [msp] DeserializeIdentity -> DEBU 20f0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.488 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.504 UTC [gossip.comm] func1 -> DEBU 20f1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4728153794874347372 , Msg_type: BLOCK_MSG, digests: [4 5 1 2 3], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.505 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.505 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20f3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.506 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20f4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.506 UTC [policies] Evaluate -> DEBU 20f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.507 UTC [policies] Evaluate -> DEBU 20f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.507 UTC [policies] Evaluate -> DEBU 20f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.508 UTC [cauthdsl] func1 -> DEBU 20f8 0xc00221c950 gate 1555913836508079100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.508 UTC [cauthdsl] func2 -> DEBU 20f9 0xc00221c950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.508 UTC [cauthdsl] func2 -> DEBU 20fa 0xc00221c950 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.509 UTC [cauthdsl] func2 -> DEBU 20fb 0xc00221c950 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.509 UTC [msp.identity] Verify -> DEBU 20fc Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:16.510 UTC [msp.identity] Verify -> DEBU 20fd Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:16.510 UTC [cauthdsl] func2 -> DEBU 20fe 0xc00221c950 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.510 UTC [cauthdsl] func1 -> DEBU 20ff 0xc00221c950 gate 1555913836508079100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.510 UTC [policies] Evaluate -> DEBU 2100 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.511 UTC [policies] Evaluate -> DEBU 2101 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.511 UTC [policies] Evaluate -> DEBU 2102 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.511 UTC [policies] Evaluate -> DEBU 2103 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.512 UTC [gossip.gossip] handleMessage -> DEBU 2104 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.512 UTC [gossip.gossip] handleMessage -> DEBU 2105 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4728153794874347372 , Msg_type: BLOCK_MSG, digests: [4 5 1 2 3], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.512 UTC [gossip.pull] HandleMessage -> DEBU 2106 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4728153794874347372 , Msg_type: BLOCK_MSG, digests: [4 5 1 2 3], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.512 UTC [gossip.gossip] handleMessage -> DEBU 2107 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.573 UTC [gossip.comm] func1 -> DEBU 2108 Got message: GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.574 UTC [gossip.gossip] handleMessage -> DEBU 2109 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.574 UTC [gossip.gossip] handleMessage -> DEBU 210a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.574 UTC [gossip.discovery] handleMsgFromComm -> DEBU 210b Got message: GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.575 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 210c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:16.576 UTC [msp.identity] Verify -> DEBU 210d Verify: digest = 00000000 21 63 17 8e aa 54 4c ff 33 43 17 99 fa 72 05 7c |!c...TL.3C...r.|| +peer0.org1.example.com | 00000010 72 25 64 d7 0e 13 63 63 0a e3 3e 9c bd 1f e9 bb |r%d...cc..>.....|" +peer0.org1.example.com | "2019-04-22 06:17:16.576 UTC [msp.identity] Verify -> DEBU 210e Verify: sig = 00000000 30 44 02 20 0e cc 91 64 c8 03 21 28 7b 2b 41 eb |0D. ...d..!({+A.| +peer0.org1.example.com | 00000010 50 8d 69 6e c8 8c 0f e9 bf d0 c3 c7 36 2a ff cb |P.in........6*..| +peer0.org1.example.com | 00000020 d7 98 33 d1 02 20 3d e4 0d cf b7 ea 42 14 01 3c |..3.. =.....B..<| +peer0.org1.example.com | 00000030 0e ac 5d f5 76 a0 13 9f 8a 16 8a 4a 38 3c 1f fd |..].v......J8<..| +peer0.org1.example.com | 00000040 37 55 84 c5 4e 5c |7U..N\|" +peer0.org1.example.com | "2019-04-22 06:17:16.577 UTC [msp.identity] Verify -> DEBU 210f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:16.577 UTC [msp.identity] Verify -> DEBU 2110 Verify: sig = 00000000 30 44 02 20 53 2f 01 41 7a 00 fa 5e 7a aa 15 1f |0D. S/.Az..^z...| +peer0.org1.example.com | 00000010 8f c0 c3 93 24 e9 9a 98 2c 7d 06 08 f8 6e 2c 84 |....$...,}...n,.| +peer0.org1.example.com | 00000020 52 2f 3d d5 02 20 1b 4c f8 a3 f5 da 21 16 67 3e |R/=.. .L....!.g>| +peer0.org1.example.com | 00000030 0b af 2f 27 ce c1 6f 68 d2 37 b8 ec 2f a3 0d f1 |../'..oh.7../...| +peer0.org1.example.com | 00000040 70 ad 49 1e b8 94 |p.I...|" +peer0.org1.example.com | "2019-04-22 06:17:16.578 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2111 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.579 UTC [gossip.discovery] sendMemResponse -> DEBU 2112 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:16.579 UTC [msp] DeserializeIdentity -> DEBU 2113 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.579 UTC [msp] DeserializeIdentity -> DEBU 2114 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.580 UTC [gossip.comm] Send -> DEBU 2115 Entering, sending GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.580 UTC [gossip.discovery] sendMemResponse -> DEBU 2116 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:16.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2117 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2118 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.625 UTC [gossip.comm] func1 -> DEBU 2119 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.625 UTC [gossip.gossip] handleMessage -> DEBU 211a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.627 UTC [gossip.gossip] handleMessage -> DEBU 211b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 211c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.628 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 211d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:16.629 UTC [msp] DeserializeIdentity -> DEBU 211e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.630 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 211f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:16.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2120 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2121 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:16.630 UTC [policies] Evaluate -> DEBU 2122 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.630 UTC [policies] Evaluate -> DEBU 2123 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:16.631 UTC [policies] Evaluate -> DEBU 2124 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:16.631 UTC [cauthdsl] func1 -> DEBU 2125 0xc0005d7820 gate 1555913836631289300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:16.631 UTC [cauthdsl] func2 -> DEBU 2126 0xc0005d7820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:16.631 UTC [cauthdsl] func2 -> DEBU 2127 0xc0005d7820 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:16.632 UTC [cauthdsl] func2 -> DEBU 2128 0xc0005d7820 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.632 UTC [msp.identity] Verify -> DEBU 2129 Verify: digest = 00000000 db a1 42 aa 13 95 05 a8 42 72 ca 71 bd 30 99 f6 |..B.....Br.q.0..| +peer0.org1.example.com | 00000010 26 52 57 a0 e9 fe 1f 02 d3 c0 ce 69 62 68 75 34 |&RW........ibhu4|" +peer0.org1.example.com | "2019-04-22 06:17:16.632 UTC [msp.identity] Verify -> DEBU 212a Verify: sig = 00000000 30 45 02 21 00 a7 29 45 fd 72 91 b8 b0 93 66 c6 |0E.!..)E.r....f.| +peer0.org1.example.com | 00000010 54 ab 5a aa 31 4d 00 5e 77 ec e8 6b 79 e3 9a 51 |T.Z.1M.^w..ky..Q| +peer0.org1.example.com | 00000020 03 fa b6 54 4e 02 20 73 33 3b d6 b5 7f 8f 3c b3 |...TN. s3;....<.| +peer0.org1.example.com | 00000030 7e 4b f2 df 88 25 a0 51 9b 4a c4 26 80 f8 d3 24 |~K...%.Q.J.&...$| +peer0.org1.example.com | 00000040 d9 18 6a 5b f1 06 20 |..j[.. |" +peer0.org1.example.com | "2019-04-22 06:17:16.632 UTC [cauthdsl] func2 -> DEBU 212b 0xc0005d7820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:16.633 UTC [cauthdsl] func1 -> DEBU 212c 0xc0005d7820 gate 1555913836631289300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 212d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 212e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 212f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 2130 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:16.635 UTC [gossip.comm] func1 -> DEBU 2131 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.635 UTC [gossip.gossip] handleMessage -> DEBU 2132 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 2133 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 2134 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:16.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 2135 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 " +peer0.org1.example.com | "2019-04-22 06:17:16.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 2136 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 " +peer0.org1.example.com | "2019-04-22 06:17:16.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 2137 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:16.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 2138 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.640 UTC [gossip.discovery] handleAliveMessage -> DEBU 2139 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.647 UTC [gossip.gossip] handleMessage -> DEBU 213b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.647 UTC [gossip.gossip] handleMessage -> DEBU 213c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.648 UTC [gossip.gossip] handleMessage -> DEBU 213f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2140 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2141 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.650 UTC [msp] DeserializeIdentity -> DEBU 2142 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.650 UTC [msp] DeserializeIdentity -> DEBU 2143 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.651 UTC [msp] DeserializeIdentity -> DEBU 2144 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.651 UTC [msp] DeserializeIdentity -> DEBU 2145 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.651 UTC [msp] DeserializeIdentity -> DEBU 2146 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.652 UTC [msp] DeserializeIdentity -> DEBU 2147 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.652 UTC [msp] DeserializeIdentity -> DEBU 2148 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.653 UTC [gossip.comm] Send -> DEBU 2149 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.653 UTC [msp] DeserializeIdentity -> DEBU 214a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.653 UTC [gossip.comm] Send -> DEBU 214b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.691 UTC [gossip.comm] func1 -> DEBU 2150 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.691 UTC [gossip.comm] func1 -> DEBU 2151 Got message: GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.692 UTC [gossip.gossip] handleMessage -> DEBU 2152 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.692 UTC [msp] DeserializeIdentity -> DEBU 2153 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.692 UTC [msp] DeserializeIdentity -> DEBU 2154 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.693 UTC [gossip.gossip] handleMessage -> DEBU 2155 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.693 UTC [gossip.gossip] handleMessage -> DEBU 2156 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.693 UTC [gossip.gossip] handleMessage -> DEBU 2157 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2158 Got message: GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2159 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:16.694 UTC [msp.identity] Verify -> DEBU 215a Verify: digest = 00000000 42 80 37 bf 1f bd 8a be 11 9b 0a 86 16 65 55 eb |B.7..........eU.| +peer0.org1.example.com | 00000010 1a bf 2d 58 36 7e 0b 12 fb d0 8e f4 32 f7 e9 68 |..-X6~......2..h|" +peer0.org1.example.com | "2019-04-22 06:17:16.694 UTC [msp.identity] Verify -> DEBU 215b Verify: sig = 00000000 30 45 02 21 00 f9 78 a9 dc 72 62 70 ec e8 9a 49 |0E.!..x..rbp...I| +peer0.org1.example.com | 00000010 b2 17 9c 71 00 52 63 f6 fc 56 15 40 c4 f2 f0 25 |...q.Rc..V.@...%| +peer0.org1.example.com | 00000020 8a c6 76 c2 0f 02 20 1a f7 a0 20 c7 5a c4 a7 f5 |..v... ... .Z...| +peer0.org1.example.com | 00000030 a4 fd f9 05 2d 11 6c 37 05 91 fa 25 bb e0 6b 53 |....-.l7...%..kS| +peer0.org1.example.com | 00000040 b5 09 00 da a2 38 73 |.....8s|" +peer0.org1.example.com | "2019-04-22 06:17:16.695 UTC [msp.identity] Verify -> DEBU 215c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:16.695 UTC [msp.identity] Verify -> DEBU 215d Verify: sig = 00000000 30 44 02 20 62 ff 38 d3 48 e4 89 8a b7 87 fb ea |0D. b.8.H.......| +peer0.org1.example.com | 00000010 f0 43 86 ef 06 02 99 32 32 89 19 91 93 d8 bc 6f |.C.....22......o| +peer0.org1.example.com | 00000020 ec 6c 84 70 02 20 75 2f 0e 47 41 af 8a 3e be d0 |.l.p. u/.GA..>..| +peer0.org1.example.com | 00000030 b5 3b c2 06 eb 08 bf 37 73 73 23 c8 27 46 32 5b |.;.....7ss#.'F2[| +peer0.org1.example.com | 00000040 ca 40 c2 51 2c 6e |.@.Q,n|" +peer0.org1.example.com | "2019-04-22 06:17:16.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 215e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.696 UTC [gossip.discovery] sendMemResponse -> DEBU 215f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:16.696 UTC [msp] DeserializeIdentity -> DEBU 2160 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.696 UTC [msp] DeserializeIdentity -> DEBU 2161 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.697 UTC [gossip.comm] Send -> DEBU 2162 Entering, sending GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:16.697 UTC [gossip.discovery] sendMemResponse -> DEBU 2163 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:16.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2164 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2165 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.704 UTC [gossip.comm] func1 -> DEBU 2166 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.704 UTC [gossip.gossip] handleMessage -> DEBU 2167 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.705 UTC [gossip.pull] HandleMessage -> DEBU 2168 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.705 UTC [gossip.pull] SendDigest -> DEBU 2169 Sending BLOCK_MSG digest: [3 4 5 1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:16.706 UTC [gossip.gossip] handleMessage -> DEBU 216a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:16.906 UTC [gossip.gossip] handleMessage -> DEBU 216b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:16.908 UTC [msp] DeserializeIdentity -> DEBU 216c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.909 UTC [msp] DeserializeIdentity -> DEBU 216d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.910 UTC [msp] DeserializeIdentity -> DEBU 216e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:16.910 UTC [gossip.gossip] handleMessage -> DEBU 216f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.035 UTC [gossip.gossip] handleMessage -> DEBU 2170 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.035 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2171 Got message: GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.036 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2172 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:17.037 UTC [msp] DeserializeIdentity -> DEBU 2173 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.037 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2174 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:17.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2175 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:17.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2176 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:17.038 UTC [policies] Evaluate -> DEBU 2177 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:17.039 UTC [policies] Evaluate -> DEBU 2178 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:17.039 UTC [policies] Evaluate -> DEBU 2179 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:17.039 UTC [cauthdsl] func1 -> DEBU 217a 0xc00055f790 gate 1555913837039782300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:17.040 UTC [cauthdsl] func2 -> DEBU 217b 0xc00055f790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:17.040 UTC [cauthdsl] func2 -> DEBU 217c 0xc00055f790 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:17.040 UTC [cauthdsl] func2 -> DEBU 217d 0xc00055f790 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:17.041 UTC [msp.identity] Verify -> DEBU 217f Verify: digest = 00000000 94 bf 18 7b 77 13 62 84 35 98 43 55 bc 07 3f b7 |...{w.b.5.CU..?.| +peer0.org1.example.com | 00000010 01 86 1b 8b 87 5b 72 87 3c b2 ba b7 ff 08 03 13 |.....[r.<.......|" +peer0.org1.example.com | "2019-04-22 06:17:17.035 UTC [gossip.gossip] handleMessage -> DEBU 217e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.042 UTC [msp.identity] Verify -> DEBU 2180 Verify: sig = 00000000 30 44 02 20 3e 7d 2f 4e 11 e4 a7 f4 4c 50 ef 84 |0D. >}/N....LP..| +peer0.org1.example.com | 00000010 33 1d 79 1f f7 9a d2 33 f1 9a a8 9b c4 d3 09 90 |3.y....3........| +peer0.org1.example.com | 00000020 4a 5c 3d 82 02 20 51 fe aa 35 e0 a3 84 66 e2 bd |J\=.. Q..5...f..| +peer0.org1.example.com | 00000030 03 5b d5 c8 fc a2 c3 bb 47 fc 15 36 6c 08 57 a8 |.[......G..6l.W.| +peer0.org1.example.com | 00000040 36 89 4a fb de ef |6.J...|" +peer0.org1.example.com | "2019-04-22 06:17:17.043 UTC [cauthdsl] func2 -> DEBU 2181 0xc00055f790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:17.043 UTC [cauthdsl] func1 -> DEBU 2182 0xc00055f790 gate 1555913837039782300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2183 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2184 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2185 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2186 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.044 UTC [gossip.discovery] sendMemResponse -> DEBU 2187 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:17.044 UTC [msp] DeserializeIdentity -> DEBU 2188 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.045 UTC [msp] DeserializeIdentity -> DEBU 2189 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.045 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.046 UTC [gossip.comm] Send -> DEBU 218b Entering, sending GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:17.046 UTC [gossip.discovery] sendMemResponse -> DEBU 218c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:17.047 UTC [gossip.comm] sendToEndpoint -> DEBU 218d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.047 UTC [gossip.comm] sendToEndpoint -> DEBU 218e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.055 UTC [gossip.gossip] handleMessage -> DEBU 218f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2190 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2191 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.055 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2192 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:17.056 UTC [msp] DeserializeIdentity -> DEBU 2193 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.057 UTC [gossip.gossip] handleMessage -> DEBU 2194 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.060 UTC [gossip.comm] func1 -> DEBU 2195 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.060 UTC [gossip.gossip] handleMessage -> DEBU 2196 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.065 UTC [gossip.comm] func1 -> DEBU 2197 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2198 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:17.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2199 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:17.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:17.066 UTC [policies] Evaluate -> DEBU 219b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:17.067 UTC [policies] Evaluate -> DEBU 219c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:17.067 UTC [policies] Evaluate -> DEBU 219d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:17.067 UTC [cauthdsl] func1 -> DEBU 219e 0xc000328d70 gate 1555913837067477900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:17.067 UTC [cauthdsl] func2 -> DEBU 219f 0xc000328d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:17.067 UTC [cauthdsl] func2 -> DEBU 21a0 0xc000328d70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:17.067 UTC [cauthdsl] func2 -> DEBU 21a1 0xc000328d70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:17.067 UTC [msp.identity] Verify -> DEBU 21a2 Verify: digest = 00000000 19 16 f4 d8 df 53 38 28 02 1d fe f4 e9 fc 2b 36 |.....S8(......+6| +peer0.org1.example.com | 00000010 28 40 8a 22 d9 c9 cf 65 39 6a ba 36 fe b8 f4 79 |(@."...e9j.6...y|" +peer0.org1.example.com | "2019-04-22 06:17:17.068 UTC [msp.identity] Verify -> DEBU 21a3 Verify: sig = 00000000 30 44 02 20 52 80 b7 7f 5a 26 bd 2c 12 df 32 f6 |0D. R...Z&.,..2.| +peer0.org1.example.com | 00000010 89 06 23 f1 9a 25 57 96 6b 33 6b 9a f4 f0 1d 22 |..#..%W.k3k...."| +peer0.org1.example.com | 00000020 c1 72 f3 66 02 20 39 94 8f bd 85 17 05 e4 38 a9 |.r.f. 9.......8.| +peer0.org1.example.com | 00000030 7c 8e f9 10 19 97 a3 a1 7e c2 50 4d a8 7f 24 14 ||.......~.PM..$.| +peer0.org1.example.com | 00000040 0e 86 8c a7 06 d1 |......|" +peer0.org1.example.com | "2019-04-22 06:17:17.068 UTC [cauthdsl] func2 -> DEBU 21a4 0xc000328d70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:17.068 UTC [cauthdsl] func1 -> DEBU 21a5 0xc000328d70 gate 1555913837067477900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:17.068 UTC [policies] Evaluate -> DEBU 21a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.068 UTC [policies] Evaluate -> DEBU 21a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.069 UTC [policies] Evaluate -> DEBU 21a8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.069 UTC [policies] Evaluate -> DEBU 21a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.073 UTC [gossip.discovery] handleAliveMessage -> DEBU 21aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ac updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 " +peer0.org1.example.com | "2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ad Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 " +peer0.org1.example.com | "2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21af Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.074 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.075 UTC [gossip.gossip] handleMessage -> DEBU 21b2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.075 UTC [gossip.gossip] handleMessage -> DEBU 21b3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.076 UTC [gossip.gossip] handleMessage -> DEBU 21b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.076 UTC [msp] DeserializeIdentity -> DEBU 21b9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.076 UTC [msp] DeserializeIdentity -> DEBU 21ba Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21be Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.078 UTC [gossip.comm] Send -> DEBU 21c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.078 UTC [msp] DeserializeIdentity -> DEBU 21c1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.078 UTC [gossip.comm] Send -> DEBU 21c4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.120 UTC [gossip.comm] func1 -> DEBU 21c7 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.120 UTC [gossip.gossip] handleMessage -> DEBU 21c8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.122 UTC [msp] DeserializeIdentity -> DEBU 21c9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.122 UTC [msp] DeserializeIdentity -> DEBU 21ca Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.123 UTC [msp] DeserializeIdentity -> DEBU 21cb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.123 UTC [gossip.gossip] handleMessage -> DEBU 21cc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.380 UTC [gossip.comm] func1 -> DEBU 21cd Got message: GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.381 UTC [gossip.gossip] handleMessage -> DEBU 21ce Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.381 UTC [gossip.gossip] handleMessage -> DEBU 21cf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.381 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21d0 Got message: GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.381 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21d1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:17.382 UTC [msp] DeserializeIdentity -> DEBU 21d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:17.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:17.383 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:17.383 UTC [policies] Evaluate -> DEBU 21d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:17.383 UTC [policies] Evaluate -> DEBU 21d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:17.383 UTC [policies] Evaluate -> DEBU 21d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:17.384 UTC [cauthdsl] func1 -> DEBU 21d9 0xc0003167c0 gate 1555913837384104500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:17.384 UTC [cauthdsl] func2 -> DEBU 21da 0xc0003167c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:17.384 UTC [cauthdsl] func2 -> DEBU 21db 0xc0003167c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:17.384 UTC [cauthdsl] func2 -> DEBU 21dc 0xc0003167c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:17.384 UTC [msp.identity] Verify -> DEBU 21dd Verify: digest = 00000000 78 6d 64 75 17 3f 16 01 e5 74 7f d6 60 e5 61 f7 |xmdu.?...t..`.a.| +peer0.org1.example.com | 00000010 c0 2a 89 d9 4f 5e 8a 6c be fe 76 76 3d c8 59 6a |.*..O^.l..vv=.Yj|" +peer0.org1.example.com | "2019-04-22 06:17:17.385 UTC [msp.identity] Verify -> DEBU 21de Verify: sig = 00000000 30 44 02 20 37 b4 9f bd 73 e3 bb 7a e8 5d 0a 11 |0D. 7...s..z.]..| +peer0.org1.example.com | 00000010 df 75 2d cb 3d 71 ea ee 56 45 12 98 ce af 6c 4d |.u-.=q..VE....lM| +peer0.org1.example.com | 00000020 a5 4d 84 68 02 20 0c 2a 3d ef 7b be 16 b6 46 fa |.M.h. .*=.{...F.| +peer0.org1.example.com | 00000030 c9 c0 d4 44 69 ef 19 b9 39 23 6a 95 b5 1e 30 6b |...Di...9#j...0k| +peer0.org1.example.com | 00000040 09 62 12 6f 6e 15 |.b.on.|" +peer0.org1.example.com | "2019-04-22 06:17:17.385 UTC [cauthdsl] func2 -> DEBU 21df 0xc0003167c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:17.385 UTC [cauthdsl] func1 -> DEBU 21e0 0xc0003167c0 gate 1555913837384104500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:17.387 UTC [gossip.discovery] sendMemResponse -> DEBU 21e5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:17.387 UTC [msp] DeserializeIdentity -> DEBU 21e6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.387 UTC [msp] DeserializeIdentity -> DEBU 21e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.388 UTC [msp] DeserializeIdentity -> DEBU 21e8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:17.388 UTC [gossip.comm] Send -> DEBU 21e9 Entering, sending GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:17.388 UTC [gossip.discovery] sendMemResponse -> DEBU 21ea Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:17.388 UTC [gossip.comm] sendToEndpoint -> DEBU 21eb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:17.389 UTC [gossip.comm] sendToEndpoint -> DEBU 21ec Exiting" +peer0.org1.example.com | "2019-04-22 06:17:17.387 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ed Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.901 UTC [gossip.pull] Hello -> DEBU 21ee Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:18.901 UTC [gossip.comm] Send -> DEBU 21ef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:18.901 UTC [gossip.pull] Hello -> DEBU 21f0 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:18.902 UTC [gossip.comm] Send -> DEBU 21f1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:18.902 UTC [gossip.pull] Hello -> DEBU 21f2 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:18.902 UTC [gossip.comm] Send -> DEBU 21f3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:18.902 UTC [gossip.comm] sendToEndpoint -> DEBU 21f4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.902 UTC [gossip.comm] sendToEndpoint -> DEBU 21f5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.902 UTC [gossip.comm] sendToEndpoint -> DEBU 21f6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.903 UTC [gossip.comm] sendToEndpoint -> DEBU 21f7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.903 UTC [gossip.comm] sendToEndpoint -> DEBU 21f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.903 UTC [gossip.comm] sendToEndpoint -> DEBU 21f9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.904 UTC [gossip.comm] func1 -> DEBU 21fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2263129698614670238 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.905 UTC [gossip.gossip] handleMessage -> DEBU 21fb Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2263129698614670238 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.905 UTC [gossip.pull] HandleMessage -> DEBU 21fc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2263129698614670238 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.906 UTC [gossip.gossip] handleMessage -> DEBU 21fd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.906 UTC [gossip.comm] func1 -> DEBU 21fe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17161054818514722358 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.906 UTC [gossip.gossip] handleMessage -> DEBU 21ff Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17161054818514722358 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.906 UTC [gossip.pull] HandleMessage -> DEBU 2200 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17161054818514722358 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.906 UTC [gossip.gossip] handleMessage -> DEBU 2201 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.907 UTC [gossip.gossip] handleMessage -> DEBU 2202 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4227670384076092799 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.907 UTC [gossip.pull] HandleMessage -> DEBU 2203 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4227670384076092799 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.907 UTC [gossip.gossip] handleMessage -> DEBU 2204 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.937 UTC [msp.identity] Sign -> DEBU 2205 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101F " +peer0.org1.example.com | "2019-04-22 06:17:18.937 UTC [msp.identity] Sign -> DEBU 2206 Sign: digest: F6F22D75C521E239563CFFB096BDA966BF3F94F5C12B4B535AEDD506CAA51686 " +peer0.org1.example.com | "2019-04-22 06:17:18.938 UTC [msp.identity] Sign -> DEBU 2207 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:18.938 UTC [msp.identity] Sign -> DEBU 2208 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:18.938 UTC [msp] DeserializeIdentity -> DEBU 2209 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:18.938 UTC [gossip.comm] Send -> DEBU 220a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:18.938 UTC [msp] DeserializeIdentity -> DEBU 220b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:18.939 UTC [gossip.comm] Send -> DEBU 220c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:18.939 UTC [gossip.comm] Send -> DEBU 220d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:18.939 UTC [gossip.comm] sendToEndpoint -> DEBU 220e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.939 UTC [gossip.comm] sendToEndpoint -> DEBU 220f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.939 UTC [gossip.comm] sendToEndpoint -> DEBU 2210 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.940 UTC [gossip.comm] sendToEndpoint -> DEBU 2211 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.940 UTC [gossip.comm] sendToEndpoint -> DEBU 2212 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.940 UTC [gossip.comm] sendToEndpoint -> DEBU 2213 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.943 UTC [gossip.comm] func1 -> DEBU 2214 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.944 UTC [gossip.gossip] handleMessage -> DEBU 2215 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.944 UTC [gossip.gossip] handleMessage -> DEBU 2216 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2217 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.944 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2218 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:18.945 UTC [gossip.gossip] handleMessage -> DEBU 2219 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.945 UTC [msp.identity] Verify -> DEBU 221a Verify: digest = 00000000 f6 f2 2d 75 c5 21 e2 39 56 3c ff b0 96 bd a9 66 |..-u.!.9V<.....f| +peer0.org1.example.com | 00000010 bf 3f 94 f5 c1 2b 4b 53 5a ed d5 06 ca a5 16 86 |.?...+KSZ.......|" +peer0.org1.example.com | "2019-04-22 06:17:18.945 UTC [msp.identity] Verify -> DEBU 221b Verify: sig = 00000000 30 44 02 20 58 de de 65 e8 ce 87 83 6c 4b e5 07 |0D. X..e....lK..| +peer0.org1.example.com | 00000010 e3 56 fe 23 b0 fb 15 f8 4e 3f e3 8e 2a 5f e8 03 |.V.#....N?..*_..| +peer0.org1.example.com | 00000020 4f f1 b0 a1 02 20 10 52 70 81 51 70 81 2d e3 5f |O.... .Rp.Qp.-._| +peer0.org1.example.com | 00000030 52 2e 1a 5f a4 4e f2 0f d9 4b 88 86 29 2d ff cd |R.._.N...K..)-..| +peer0.org1.example.com | 00000040 59 75 30 1b 95 1e |Yu0...|" +peer0.org1.example.com | "2019-04-22 06:17:18.946 UTC [gossip.comm] func1 -> DEBU 221c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 221d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.946 UTC [gossip.discovery] isSentByMe -> DEBU 221e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 221f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2220 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2221 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2223 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:18.948 UTC [msp.identity] Verify -> DEBU 2224 Verify: digest = 00000000 f6 f2 2d 75 c5 21 e2 39 56 3c ff b0 96 bd a9 66 |..-u.!.9V<.....f| +peer0.org1.example.com | 00000010 bf 3f 94 f5 c1 2b 4b 53 5a ed d5 06 ca a5 16 86 |.?...+KSZ.......|" +peer0.org1.example.com | "2019-04-22 06:17:18.947 UTC [gossip.gossip] handleMessage -> DEBU 2222 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.949 UTC [msp.identity] Verify -> DEBU 2225 Verify: sig = 00000000 30 44 02 20 58 de de 65 e8 ce 87 83 6c 4b e5 07 |0D. X..e....lK..| +peer0.org1.example.com | 00000010 e3 56 fe 23 b0 fb 15 f8 4e 3f e3 8e 2a 5f e8 03 |.V.#....N?..*_..| +peer0.org1.example.com | 00000020 4f f1 b0 a1 02 20 10 52 70 81 51 70 81 2d e3 5f |O.... .Rp.Qp.-._| +peer0.org1.example.com | 00000030 52 2e 1a 5f a4 4e f2 0f d9 4b 88 86 29 2d ff cd |R.._.N...K..)-..| +peer0.org1.example.com | 00000040 59 75 30 1b 95 1e |Yu0...|" +peer0.org1.example.com | "2019-04-22 06:17:18.949 UTC [gossip.gossip] handleMessage -> DEBU 2226 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 2227 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.950 UTC [gossip.discovery] isSentByMe -> DEBU 2228 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 2229 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 222a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 222b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.951 UTC [gossip.gossip] handleMessage -> DEBU 222c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 222d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 222e Verify: digest = 00000000 f6 f2 2d 75 c5 21 e2 39 56 3c ff b0 96 bd a9 66 |..-u.!.9V<.....f| +peer0.org1.example.com | 00000010 bf 3f 94 f5 c1 2b 4b 53 5a ed d5 06 ca a5 16 86 |.?...+KSZ.......|" +peer0.org1.example.com | "2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 222f Verify: sig = 00000000 30 44 02 20 58 de de 65 e8 ce 87 83 6c 4b e5 07 |0D. X..e....lK..| +peer0.org1.example.com | 00000010 e3 56 fe 23 b0 fb 15 f8 4e 3f e3 8e 2a 5f e8 03 |.V.#....N?..*_..| +peer0.org1.example.com | 00000020 4f f1 b0 a1 02 20 10 52 70 81 51 70 81 2d e3 5f |O.... .Rp.Qp.-._| +peer0.org1.example.com | 00000030 52 2e 1a 5f a4 4e f2 0f d9 4b 88 86 29 2d ff cd |R.._.N...K..)-..| +peer0.org1.example.com | 00000040 59 75 30 1b 95 1e |Yu0...|" +peer0.org1.example.com | "2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 2230 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 2231 Verify: sig = 00000000 30 45 02 21 00 a4 ca b6 72 7a 12 e0 64 ae 83 43 |0E.!....rz..d..C| +peer0.org1.example.com | 00000010 1b 7e f7 c4 2a e9 50 3e ce 0d ca de 84 ad 28 73 |.~..*.P>......(s| +peer0.org1.example.com | 00000020 34 1d 8c 90 29 02 20 36 93 bb 9d 16 33 e9 a4 49 |4...). 6....3..I| +peer0.org1.example.com | 00000030 af b8 2f d0 47 8a 01 ca 44 e0 e0 14 f7 de a7 29 |../.G...D......)| +peer0.org1.example.com | 00000040 bc bb c0 8f 1e 1b ae |.......|" +peer0.org1.example.com | "2019-04-22 06:17:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2232 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.953 UTC [gossip.discovery] isSentByMe -> DEBU 2233 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2234 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:18.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2235 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.162 UTC [gossip.comm] func1 -> DEBU 2236 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.163 UTC [gossip.gossip] handleMessage -> DEBU 2237 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.164 UTC [gossip.pull] HandleMessage -> DEBU 2238 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.164 UTC [gossip.pull] SendDigest -> DEBU 2239 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:19.165 UTC [gossip.gossip] handleMessage -> DEBU 223a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.189 UTC [gossip.comm] func1 -> DEBU 223b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.189 UTC [gossip.gossip] handleMessage -> DEBU 223c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.190 UTC [gossip.gossip] handleMessage -> DEBU 223d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 223e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.191 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 223f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:19.192 UTC [msp.identity] Verify -> DEBU 2240 Verify: digest = 00000000 d4 05 37 cf fe cf 27 88 34 f8 ab 08 66 d5 df b8 |..7...'.4...f...| +peer0.org1.example.com | 00000010 68 01 af d4 c1 b4 2f 89 9a df 0d 91 99 02 ea ff |h...../.........|" +peer0.org1.example.com | "2019-04-22 06:17:19.192 UTC [msp.identity] Verify -> DEBU 2241 Verify: sig = 00000000 30 44 02 20 26 f0 30 7a a6 ef c2 bf 57 4d a0 59 |0D. &.0z....WM.Y| +peer0.org1.example.com | 00000010 16 ef 9e d8 85 e4 d5 93 4d 39 6b ac f0 f0 f9 6b |........M9k....k| +peer0.org1.example.com | 00000020 cf db 81 f9 02 20 7a de 24 6d 11 2d 16 ce 0b ac |..... z.$m.-....| +peer0.org1.example.com | 00000030 39 59 e4 db a2 1c 41 86 1e d0 17 33 94 a8 3e cf |9Y....A....3..>.| +peer0.org1.example.com | 00000040 9c 80 87 55 c8 91 |...U..|" +peer0.org1.example.com | "2019-04-22 06:17:19.193 UTC [msp.identity] Verify -> DEBU 2242 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:19.194 UTC [msp.identity] Verify -> DEBU 2243 Verify: sig = 00000000 30 44 02 20 1c e2 e1 e6 4a db f9 ac 70 32 59 c2 |0D. ....J...p2Y.| +peer0.org1.example.com | 00000010 49 64 57 f0 d5 04 3c 91 01 84 bb c5 a0 aa 7f 2d |IdW...<........-| +peer0.org1.example.com | 00000020 63 ca 5a a0 02 20 6e 34 16 a7 b5 df 8e 36 e6 9c |c.Z.. n4.....6..| +peer0.org1.example.com | 00000030 6f b4 6e 56 c4 fb 35 f8 0a de 0b c0 dd 9b 29 1f |o.nV..5.......).| +peer0.org1.example.com | 00000040 79 e4 52 81 17 19 |y.R...|" +peer0.org1.example.com | "2019-04-22 06:17:19.195 UTC [gossip.discovery] handleAliveMessage -> DEBU 2244 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2245 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:19.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2246 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 " +peer0.org1.example.com | "2019-04-22 06:17:19.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 2247 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 " +peer0.org1.example.com | "2019-04-22 06:17:19.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 2248 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:19.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 2249 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 224a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 224b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.198 UTC [gossip.discovery] sendMemResponse -> DEBU 224c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:19.199 UTC [msp] DeserializeIdentity -> DEBU 224d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.199 UTC [msp] DeserializeIdentity -> DEBU 224e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.199 UTC [gossip.comm] Send -> DEBU 224f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:19.199 UTC [gossip.discovery] sendMemResponse -> DEBU 2250 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:19.199 UTC [gossip.comm] sendToEndpoint -> DEBU 2251 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2252 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.621 UTC [gossip.comm] func1 -> DEBU 2253 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.622 UTC [gossip.gossip] handleMessage -> DEBU 2254 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.623 UTC [gossip.pull] HandleMessage -> DEBU 2255 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.624 UTC [msp] DeserializeIdentity -> DEBU 2256 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.625 UTC [msp] DeserializeIdentity -> DEBU 2257 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.625 UTC [msp] DeserializeIdentity -> DEBU 2258 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.625 UTC [msp] DeserializeIdentity -> DEBU 2259 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.626 UTC [msp] DeserializeIdentity -> DEBU 225a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.626 UTC [msp] DeserializeIdentity -> DEBU 225b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.626 UTC [gossip.pull] SendDigest -> DEBU 225c Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:19.627 UTC [gossip.gossip] handleMessage -> DEBU 225d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.633 UTC [gossip.comm] func1 -> DEBU 225e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.633 UTC [gossip.gossip] handleMessage -> DEBU 225f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.635 UTC [gossip.gossip] handleMessage -> DEBU 2260 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2261 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.636 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2262 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:19.636 UTC [msp] DeserializeIdentity -> DEBU 2263 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2264 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:19.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2265 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:19.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:19.637 UTC [policies] Evaluate -> DEBU 2267 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:19.637 UTC [policies] Evaluate -> DEBU 2268 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:19.638 UTC [policies] Evaluate -> DEBU 2269 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:19.638 UTC [cauthdsl] func1 -> DEBU 226a 0xc000358bd0 gate 1555913839638342200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:19.638 UTC [cauthdsl] func2 -> DEBU 226b 0xc000358bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:19.638 UTC [cauthdsl] func2 -> DEBU 226c 0xc000358bd0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:19.638 UTC [cauthdsl] func2 -> DEBU 226d 0xc000358bd0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:19.641 UTC [msp.identity] Verify -> DEBU 226e Verify: digest = 00000000 21 00 e3 f9 6e 48 25 d2 af ed 3b 20 38 b5 d2 2e |!...nH%...; 8...| +peer0.org1.example.com | 00000010 04 92 3f 7c aa b1 3a f2 71 24 d5 63 b7 71 37 e0 |..?|..:.q$.c.q7.|" +peer0.org1.example.com | "2019-04-22 06:17:19.644 UTC [msp.identity] Verify -> DEBU 226f Verify: sig = 00000000 30 45 02 21 00 9e fc 5b 5b 1f 8f d3 09 41 e8 33 |0E.!...[[....A.3| +peer0.org1.example.com | 00000010 44 e8 be 19 7c be 3a 3c ac 4c d2 e0 0b 2f 5d 4b |D...|.:<.L.../]K| +peer0.org1.example.com | 00000020 46 6b 97 71 6b 02 20 58 51 37 ca 42 14 66 eb 86 |Fk.qk. XQ7.B.f..| +peer0.org1.example.com | 00000030 4e 2e 32 ac dc 52 dd f1 1b 9d 33 13 e7 50 a5 a6 |N.2..R....3..P..| +peer0.org1.example.com | 00000040 f7 31 58 d8 c6 a9 c6 |.1X....|" +peer0.org1.example.com | "2019-04-22 06:17:19.645 UTC [cauthdsl] func2 -> DEBU 2270 0xc000358bd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:19.645 UTC [cauthdsl] func1 -> DEBU 2271 0xc000358bd0 gate 1555913839638342200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:19.645 UTC [policies] Evaluate -> DEBU 2272 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:19.646 UTC [policies] Evaluate -> DEBU 2273 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:19.646 UTC [policies] Evaluate -> DEBU 2274 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:19.647 UTC [policies] Evaluate -> DEBU 2275 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:19.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 2276 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 2277 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:19.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 2278 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 " +peer0.org1.example.com | "2019-04-22 06:17:19.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 2279 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 " +peer0.org1.example.com | "2019-04-22 06:17:19.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 227a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:19.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 227b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 227c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:19.650 UTC [gossip.discovery] sendMemResponse -> DEBU 227e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:19.650 UTC [msp] DeserializeIdentity -> DEBU 227f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.651 UTC [msp] DeserializeIdentity -> DEBU 2280 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.651 UTC [msp] DeserializeIdentity -> DEBU 2281 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:19.651 UTC [gossip.comm] Send -> DEBU 2282 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:19.651 UTC [gossip.discovery] sendMemResponse -> DEBU 2283 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:19.652 UTC [gossip.comm] sendToEndpoint -> DEBU 2284 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:19.652 UTC [gossip.comm] sendToEndpoint -> DEBU 2285 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.040 UTC [gossip.gossip] handleMessage -> DEBU 2286 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.040 UTC [gossip.pull] HandleMessage -> DEBU 2287 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.042 UTC [msp] DeserializeIdentity -> DEBU 2288 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.042 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.043 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.043 UTC [msp] DeserializeIdentity -> DEBU 228b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.043 UTC [msp] DeserializeIdentity -> DEBU 228c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.044 UTC [msp] DeserializeIdentity -> DEBU 228d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.044 UTC [gossip.pull] SendDigest -> DEBU 228e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:20.044 UTC [gossip.gossip] handleMessage -> DEBU 228f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.059 UTC [gossip.gossip] handleMessage -> DEBU 2290 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.060 UTC [gossip.gossip] handleMessage -> DEBU 2291 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.060 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2292 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.060 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2293 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:20.061 UTC [msp] DeserializeIdentity -> DEBU 2294 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2295 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:20.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2296 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2297 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.066 UTC [policies] Evaluate -> DEBU 2298 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.066 UTC [policies] Evaluate -> DEBU 2299 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:20.066 UTC [policies] Evaluate -> DEBU 229a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.066 UTC [cauthdsl] func1 -> DEBU 229b 0xc000442ba0 gate 1555913840066882700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:20.066 UTC [cauthdsl] func2 -> DEBU 229c 0xc000442ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:20.067 UTC [cauthdsl] func2 -> DEBU 229d 0xc000442ba0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:20.067 UTC [cauthdsl] func2 -> DEBU 229e 0xc000442ba0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.067 UTC [msp.identity] Verify -> DEBU 229f Verify: digest = 00000000 eb 5b 13 63 30 24 3e f1 c9 fa cf eb 65 6c be a7 |.[.c0$>.....el..| +peer0.org1.example.com | 00000010 03 4b 78 58 4d 7b e6 4f da b3 5d 8d 33 6d 8e 76 |.KxXM{.O..].3m.v|" +peer0.org1.example.com | "2019-04-22 06:17:20.068 UTC [msp.identity] Verify -> DEBU 22a0 Verify: sig = 00000000 30 43 02 1f 37 a8 d5 b6 e0 1b 79 84 38 73 94 fb |0C..7.....y.8s..| +peer0.org1.example.com | 00000010 12 3b d6 30 41 05 5d e6 af d9 a3 49 22 96 c3 41 |.;.0A.]....I"..A| +peer0.org1.example.com | 00000020 17 09 48 02 20 44 d4 a0 e9 5b 75 51 31 0c b9 b9 |..H. D...[uQ1...| +peer0.org1.example.com | 00000030 27 54 79 b7 fb f6 bf 81 1e 93 3c 35 9c 21 d0 90 |'Ty.......<5.!..| +peer0.org1.example.com | 00000040 c4 4e ea 07 b3 |.N...|" +peer0.org1.example.com | "2019-04-22 06:17:20.069 UTC [cauthdsl] func2 -> DEBU 22a1 0xc000442ba0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.069 UTC [cauthdsl] func1 -> DEBU 22a2 0xc000442ba0 gate 1555913840066882700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:20.070 UTC [policies] Evaluate -> DEBU 22a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.071 UTC [policies] Evaluate -> DEBU 22a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.071 UTC [policies] Evaluate -> DEBU 22a5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.071 UTC [policies] Evaluate -> DEBU 22a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 22a7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.071 UTC [gossip.discovery] learnExistingMembers -> DEBU 22a8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:20.071 UTC [gossip.discovery] learnExistingMembers -> DEBU 22a9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 " +peer0.org1.example.com | "2019-04-22 06:17:20.072 UTC [gossip.discovery] learnExistingMembers -> DEBU 22aa Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 " +peer0.org1.example.com | "2019-04-22 06:17:20.072 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ab Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:20.072 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ac Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 22ad Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.072 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22ae Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.072 UTC [gossip.discovery] sendMemResponse -> DEBU 22af Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:20.073 UTC [msp] DeserializeIdentity -> DEBU 22b0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.074 UTC [msp] DeserializeIdentity -> DEBU 22b1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.074 UTC [msp] DeserializeIdentity -> DEBU 22b2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.074 UTC [gossip.comm] Send -> DEBU 22b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:20.075 UTC [gossip.discovery] sendMemResponse -> DEBU 22b4 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:20.075 UTC [gossip.comm] sendToEndpoint -> DEBU 22b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.075 UTC [gossip.comm] sendToEndpoint -> DEBU 22b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.423 UTC [msp] DeserializeIdentity -> DEBU 22b7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.423 UTC [msp] DeserializeIdentity -> DEBU 22b8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.424 UTC [gossip.comm] Send -> DEBU 22b9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22ba Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22bb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22bc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.425 UTC [gossip.comm] sendToEndpoint -> DEBU 22bd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22be Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.425 UTC [gossip.comm] sendToEndpoint -> DEBU 22bf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.426 UTC [gossip.comm] func1 -> DEBU 22c0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.427 UTC [gossip.gossip] handleMessage -> DEBU 22c1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.427 UTC [gossip.comm] func1 -> DEBU 22c2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.428 UTC [msp.identity] Verify -> DEBU 22c3 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:20.428 UTC [msp.identity] Verify -> DEBU 22c4 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:20.428 UTC [msp] DeserializeIdentity -> DEBU 22c5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.429 UTC [msp] DeserializeIdentity -> DEBU 22c6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:20.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.430 UTC [policies] Evaluate -> DEBU 22ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.430 UTC [policies] Evaluate -> DEBU 22cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:20.430 UTC [policies] Evaluate -> DEBU 22cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.430 UTC [cauthdsl] func1 -> DEBU 22cd 0xc0003da080 gate 1555913840430725600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:20.430 UTC [cauthdsl] func2 -> DEBU 22ce 0xc0003da080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:20.431 UTC [cauthdsl] func2 -> DEBU 22cf 0xc0003da080 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:20.431 UTC [cauthdsl] func2 -> DEBU 22d0 0xc0003da080 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.431 UTC [msp.identity] Verify -> DEBU 22d1 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:20.431 UTC [msp.identity] Verify -> DEBU 22d2 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:20.432 UTC [cauthdsl] func2 -> DEBU 22d3 0xc0003da080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.432 UTC [cauthdsl] func1 -> DEBU 22d4 0xc0003da080 gate 1555913840430725600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:20.432 UTC [policies] Evaluate -> DEBU 22d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.432 UTC [policies] Evaluate -> DEBU 22d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.433 UTC [policies] Evaluate -> DEBU 22d7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.433 UTC [policies] Evaluate -> DEBU 22d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.433 UTC [msp.identity] Verify -> DEBU 22d9 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:20.433 UTC [msp.identity] Verify -> DEBU 22da Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:20.434 UTC [msp] DeserializeIdentity -> DEBU 22db Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.434 UTC [msp] DeserializeIdentity -> DEBU 22dc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.435 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:20.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22de Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.435 UTC [policies] Evaluate -> DEBU 22e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.435 UTC [policies] Evaluate -> DEBU 22e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:20.435 UTC [policies] Evaluate -> DEBU 22e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.435 UTC [cauthdsl] func1 -> DEBU 22e3 0xc0003f2400 gate 1555913840435805200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:20.436 UTC [cauthdsl] func2 -> DEBU 22e4 0xc0003f2400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:20.436 UTC [cauthdsl] func2 -> DEBU 22e5 0xc0003f2400 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:20.436 UTC [cauthdsl] func2 -> DEBU 22e6 0xc0003f2400 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.436 UTC [msp.identity] Verify -> DEBU 22e7 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:20.436 UTC [msp.identity] Verify -> DEBU 22e8 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:20.437 UTC [cauthdsl] func2 -> DEBU 22e9 0xc0003f2400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.437 UTC [cauthdsl] func1 -> DEBU 22ea 0xc0003f2400 gate 1555913840435805200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22ed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.437 UTC [gossip.gossip] handleMessage -> DEBU 22ef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.438 UTC [gossip.gossip] handleMessage -> DEBU 22f0 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.438 UTC [msp] DeserializeIdentity -> DEBU 22f1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.438 UTC [msp] DeserializeIdentity -> DEBU 22f2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.439 UTC [msp] DeserializeIdentity -> DEBU 22f3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.440 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:20.440 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.440 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.440 UTC [policies] Evaluate -> DEBU 22f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.440 UTC [policies] Evaluate -> DEBU 22f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:20.441 UTC [policies] Evaluate -> DEBU 22f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.441 UTC [cauthdsl] func1 -> DEBU 22fa 0xc0002201c0 gate 1555913840441141400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:20.441 UTC [cauthdsl] func2 -> DEBU 22fb 0xc0002201c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:20.441 UTC [cauthdsl] func2 -> DEBU 22fc 0xc0002201c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:20.442 UTC [cauthdsl] func2 -> DEBU 22fd 0xc0002201c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.442 UTC [msp.identity] Verify -> DEBU 22fe Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:20.443 UTC [msp.identity] Verify -> DEBU 22ff Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:20.444 UTC [cauthdsl] func2 -> DEBU 2300 0xc0002201c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.444 UTC [cauthdsl] func1 -> DEBU 2301 0xc0002201c0 gate 1555913840441141400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2302 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2303 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2304 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2305 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.445 UTC [msp] DeserializeIdentity -> DEBU 2306 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.445 UTC [msp] DeserializeIdentity -> DEBU 2307 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2308 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:20.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2309 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 230a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.446 UTC [policies] Evaluate -> DEBU 230b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.446 UTC [policies] Evaluate -> DEBU 230c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:20.447 UTC [policies] Evaluate -> DEBU 230d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.447 UTC [cauthdsl] func1 -> DEBU 230e 0xc000221d90 gate 1555913840447298800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:20.447 UTC [cauthdsl] func2 -> DEBU 230f 0xc000221d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:20.447 UTC [cauthdsl] func2 -> DEBU 2310 0xc000221d90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:20.448 UTC [cauthdsl] func2 -> DEBU 2311 0xc000221d90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.448 UTC [msp.identity] Verify -> DEBU 2312 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:20.448 UTC [msp.identity] Verify -> DEBU 2313 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:20.449 UTC [cauthdsl] func2 -> DEBU 2314 0xc000221d90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.450 UTC [cauthdsl] func1 -> DEBU 2315 0xc000221d90 gate 1555913840447298800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2316 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2317 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2318 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2319 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.451 UTC [msp.identity] Verify -> DEBU 231a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:20.451 UTC [msp.identity] Verify -> DEBU 231b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:20.452 UTC [msp.identity] Verify -> DEBU 231c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:20.455 UTC [msp.identity] Verify -> DEBU 231d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:20.456 UTC [gossip.gossip] handleMessage -> DEBU 231e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.456 UTC [gossip.gossip] handleMessage -> DEBU 231f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.456 UTC [msp] DeserializeIdentity -> DEBU 2320 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.456 UTC [msp] DeserializeIdentity -> DEBU 2321 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.456 UTC [msp] DeserializeIdentity -> DEBU 2322 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2323 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2324 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2325 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [policies] Evaluate -> DEBU 2326 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [policies] Evaluate -> DEBU 2327 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [policies] Evaluate -> DEBU 2328 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [cauthdsl] func1 -> DEBU 2329 0xc0034528f0 gate 1555913840457682600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [cauthdsl] func2 -> DEBU 232a 0xc0034528f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:20.457 UTC [cauthdsl] func2 -> DEBU 232b 0xc0034528f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [cauthdsl] func2 -> DEBU 232c 0xc0034528f0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [msp.identity] Verify -> DEBU 232d Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [msp.identity] Verify -> DEBU 232e Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [cauthdsl] func2 -> DEBU 232f 0xc0034528f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [cauthdsl] func1 -> DEBU 2330 0xc0034528f0 gate 1555913840457682600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2331 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2332 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2333 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2334 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [msp] DeserializeIdentity -> DEBU 2335 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [msp] DeserializeIdentity -> DEBU 2336 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2337 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2338 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2339 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [policies] Evaluate -> DEBU 233a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [policies] Evaluate -> DEBU 233b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:20.459 UTC [policies] Evaluate -> DEBU 233c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [cauthdsl] func1 -> DEBU 233d 0xc0034600d0 gate 1555913840459893100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 233e 0xc0034600d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 233f 0xc0034600d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 2340 0xc0034600d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [msp.identity] Verify -> DEBU 2341 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [msp.identity] Verify -> DEBU 2342 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 2343 0xc0034600d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [cauthdsl] func1 -> DEBU 2344 0xc0034600d0 gate 1555913840459893100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [policies] Evaluate -> DEBU 2345 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [policies] Evaluate -> DEBU 2346 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.460 UTC [policies] Evaluate -> DEBU 2347 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.461 UTC [policies] Evaluate -> DEBU 2348 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:20.461 UTC [msp.identity] Verify -> DEBU 2349 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:20.461 UTC [msp.identity] Verify -> DEBU 234a Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:20.462 UTC [msp.identity] Verify -> DEBU 234b Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:20.462 UTC [msp.identity] Verify -> DEBU 234c Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:20.462 UTC [gossip.gossip] handleMessage -> DEBU 234d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 234e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 234f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.502 UTC [gossip.pull] Hello -> DEBU 2350 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 2351 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 2352 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.503 UTC [gossip.comm] Send -> DEBU 2353 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:20.503 UTC [gossip.comm] sendToEndpoint -> DEBU 2354 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.503 UTC [gossip.comm] sendToEndpoint -> DEBU 2355 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.504 UTC [gossip.comm] func1 -> DEBU 2356 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7343894145420002700 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.505 UTC [gossip.gossip] handleMessage -> DEBU 2357 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7343894145420002700 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.505 UTC [gossip.pull] HandleMessage -> DEBU 2358 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7343894145420002700 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.505 UTC [gossip.gossip] handleMessage -> DEBU 2359 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.683 UTC [gossip.comm] func1 -> DEBU 235a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.683 UTC [gossip.gossip] handleMessage -> DEBU 235b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.684 UTC [msp] DeserializeIdentity -> DEBU 235c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.684 UTC [msp] DeserializeIdentity -> DEBU 235d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.685 UTC [gossip.gossip] handleMessage -> DEBU 235e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.705 UTC [gossip.comm] func1 -> DEBU 235f Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.706 UTC [gossip.gossip] handleMessage -> DEBU 2360 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.706 UTC [gossip.pull] HandleMessage -> DEBU 2361 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.707 UTC [gossip.pull] SendDigest -> DEBU 2362 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:20.707 UTC [gossip.gossip] handleMessage -> DEBU 2363 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.841 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2364 Sleeping 25s" +peer0.org1.example.com | "2019-04-22 06:17:20.858 UTC [msp.identity] Sign -> DEBU 2365 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151020 " +peer0.org1.example.com | "2019-04-22 06:17:20.858 UTC [msp.identity] Sign -> DEBU 2366 Sign: digest: 1DC3375D0B1854B36B3805CCA7E917664713B1F79485189A655CF36447317606 " +peer0.org1.example.com | "2019-04-22 06:17:20.859 UTC [msp.identity] Sign -> DEBU 2367 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:20.859 UTC [msp.identity] Sign -> DEBU 2368 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:20.859 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2369 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:20.860 UTC [msp] DeserializeIdentity -> DEBU 236a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.861 UTC [msp] DeserializeIdentity -> DEBU 236b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.861 UTC [msp] DeserializeIdentity -> DEBU 236c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.862 UTC [gossip.comm] Send -> DEBU 236d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:20.862 UTC [msp] DeserializeIdentity -> DEBU 236e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.862 UTC [gossip.comm] sendToEndpoint -> DEBU 236f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2370 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.863 UTC [gossip.comm] Send -> DEBU 2371 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:20.865 UTC [gossip.comm] Send -> DEBU 2372 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:20.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2373 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2374 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2375 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.867 UTC [gossip.comm] sendToEndpoint -> DEBU 2376 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:20.905 UTC [gossip.gossip] handleMessage -> DEBU 2377 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:20.906 UTC [msp] DeserializeIdentity -> DEBU 2378 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.906 UTC [msp] DeserializeIdentity -> DEBU 2379 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.907 UTC [msp] DeserializeIdentity -> DEBU 237a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:20.908 UTC [gossip.gossip] handleMessage -> DEBU 237b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.120 UTC [gossip.comm] func1 -> DEBU 237c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.121 UTC [gossip.gossip] handleMessage -> DEBU 237d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.121 UTC [msp] DeserializeIdentity -> DEBU 237e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.122 UTC [msp] DeserializeIdentity -> DEBU 237f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.122 UTC [msp] DeserializeIdentity -> DEBU 2380 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.123 UTC [gossip.gossip] handleMessage -> DEBU 2381 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.147 UTC [gossip.comm] func1 -> DEBU 2382 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.149 UTC [gossip.gossip] handleMessage -> DEBU 2383 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.149 UTC [gossip.gossip] handleMessage -> DEBU 2384 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2385 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2386 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:21.151 UTC [gossip.comm] func1 -> DEBU 2387 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.152 UTC [gossip.gossip] handleMessage -> DEBU 2388 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.152 UTC [msp.identity] Verify -> DEBU 2389 Verify: digest = 00000000 b4 9b ef 32 18 d9 e7 c0 74 ba 82 55 0f 3c 10 8a |...2....t..U.<..| +peer0.org1.example.com | 00000010 02 cc b1 25 a9 9b 8b 23 db d0 89 62 43 43 81 70 |...%...#...bCC.p|" +peer0.org1.example.com | "2019-04-22 06:17:21.153 UTC [msp.identity] Verify -> DEBU 238a Verify: sig = 00000000 30 44 02 20 58 9d 3a 2e 17 5e b5 57 3b 95 ab b3 |0D. X.:..^.W;...| +peer0.org1.example.com | 00000010 64 f2 8d fa b2 14 e9 07 80 68 99 6f cc 58 a0 a3 |d........h.o.X..| +peer0.org1.example.com | 00000020 7f 48 f5 b6 02 20 69 58 5a ae 4d 54 34 62 27 e2 |.H... iXZ.MT4b'.| +peer0.org1.example.com | 00000030 bd c6 64 6d 9c ea 4a af cd 5f 5d de c5 03 58 0d |..dm..J.._]...X.| +peer0.org1.example.com | 00000040 b8 cb 52 b0 75 45 |..R.uE|" +peer0.org1.example.com | "2019-04-22 06:17:21.153 UTC [msp.identity] Verify -> DEBU 238b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:21.154 UTC [msp.identity] Verify -> DEBU 238c Verify: sig = 00000000 30 44 02 20 73 53 f4 0c 58 47 c5 6b b3 e6 e9 ef |0D. sS..XG.k....| +peer0.org1.example.com | 00000010 a9 a7 9d 9c 8e 41 e1 bf 77 43 7c d0 b1 63 de 9c |.....A..wC|..c..| +peer0.org1.example.com | 00000020 39 28 52 42 02 20 70 22 f1 d2 b5 27 c2 27 44 cc |9(RB. p"...'.'D.| +peer0.org1.example.com | 00000030 88 48 f6 3a 50 2d 44 40 7f 8c df 0f 21 1a ee c1 |.H.:P-D@....!...| +peer0.org1.example.com | 00000040 1f ea af db ee fa |......|" +peer0.org1.example.com | "2019-04-22 06:17:21.154 UTC [gossip.discovery] handleAliveMessage -> DEBU 238d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.154 UTC [gossip.discovery] learnExistingMembers -> DEBU 238e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:21.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 238f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 " +peer0.org1.example.com | "2019-04-22 06:17:21.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2390 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 " +peer0.org1.example.com | "2019-04-22 06:17:21.156 UTC [gossip.discovery] learnExistingMembers -> DEBU 2391 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:21.156 UTC [gossip.discovery] learnExistingMembers -> DEBU 2392 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.156 UTC [gossip.discovery] handleAliveMessage -> DEBU 2393 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2394 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2396 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.158 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2398 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.157 UTC [msp] DeserializeIdentity -> DEBU 2395 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.157 UTC [gossip.gossip] handleMessage -> DEBU 2397 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.159 UTC [msp] DeserializeIdentity -> DEBU 2399 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.160 UTC [msp] DeserializeIdentity -> DEBU 239a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.160 UTC [gossip.comm] Send -> DEBU 239b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:21.161 UTC [msp] DeserializeIdentity -> DEBU 239c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.161 UTC [gossip.comm] Send -> DEBU 239d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:21.162 UTC [gossip.comm] sendToEndpoint -> DEBU 239e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.162 UTC [gossip.comm] sendToEndpoint -> DEBU 239f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.162 UTC [gossip.comm] sendToEndpoint -> DEBU 23a0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.163 UTC [gossip.comm] sendToEndpoint -> DEBU 23a1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.164 UTC [gossip.gossip] handleMessage -> DEBU 23a2 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.164 UTC [gossip.gossip] handleMessage -> DEBU 23a3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.480 UTC [gossip.election] waitForInterrupt -> DEBU 23a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.480 UTC [gossip.election] IsLeader -> DEBU 23a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:21.481 UTC [msp.identity] Sign -> DEBU 23a8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510091801 " +peer0.org1.example.com | "2019-04-22 06:17:21.481 UTC [msp.identity] Sign -> DEBU 23a9 Sign: digest: 915532C4154797F60B0B457FCDA82E89C9DAE566AD4D3C719933BFB52A397281 " +peer0.org1.example.com | "2019-04-22 06:17:21.482 UTC [gossip.election] waitForInterrupt -> DEBU 23aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:21.486 UTC [msp] DeserializeIdentity -> DEBU 23ab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.487 UTC [msp] DeserializeIdentity -> DEBU 23ac Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.488 UTC [msp] DeserializeIdentity -> DEBU 23ad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.489 UTC [msp] DeserializeIdentity -> DEBU 23ae Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.489 UTC [gossip.comm] Send -> DEBU 23af Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:21.490 UTC [msp] DeserializeIdentity -> DEBU 23b0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.491 UTC [gossip.comm] sendToEndpoint -> DEBU 23b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.492 UTC [gossip.comm] sendToEndpoint -> DEBU 23b2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.491 UTC [msp] DeserializeIdentity -> DEBU 23b3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.624 UTC [gossip.comm] func1 -> DEBU 23b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.626 UTC [gossip.gossip] handleMessage -> DEBU 23b5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.627 UTC [gossip.gossip] handleMessage -> DEBU 23b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23b8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:21.628 UTC [msp] DeserializeIdentity -> DEBU 23b9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.628 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:21.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23bb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:21.629 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23bc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:21.629 UTC [policies] Evaluate -> DEBU 23bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:21.631 UTC [policies] Evaluate -> DEBU 23bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:21.632 UTC [policies] Evaluate -> DEBU 23c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:21.631 UTC [gossip.gossip] handleMessage -> DEBU 23be Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.632 UTC [cauthdsl] func1 -> DEBU 23c1 0xc0033c8520 gate 1555913841632510300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:21.632 UTC [cauthdsl] func2 -> DEBU 23c2 0xc0033c8520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:21.633 UTC [cauthdsl] func2 -> DEBU 23c3 0xc0033c8520 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:21.633 UTC [cauthdsl] func2 -> DEBU 23c4 0xc0033c8520 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:21.633 UTC [msp.identity] Verify -> DEBU 23c5 Verify: digest = 00000000 51 88 1b c5 c8 36 d5 d0 de 6d df 6c 80 ab 50 db |Q....6...m.l..P.| +peer0.org1.example.com | 00000010 0a 3c e7 c4 a0 1e a7 e0 52 e8 f0 5d 65 4f 3c 46 |.<......R..]eO DEBU 23c6 Verify: sig = 00000000 30 45 02 21 00 de 44 5a c5 92 8f 3c da 12 2d 5e |0E.!..DZ...<..-^| +peer0.org1.example.com | 00000010 32 9a 50 e6 85 7f 0e cf 1c 65 b8 92 3b 4b b3 e7 |2.P......e..;K..| +peer0.org1.example.com | 00000020 bf a2 5a c5 c1 02 20 18 3b 04 0e c3 2b ea 94 12 |..Z... .;...+...| +peer0.org1.example.com | 00000030 c1 74 96 87 8c 76 ed 62 74 89 79 b2 be fa ad a0 |.t...v.bt.y.....| +peer0.org1.example.com | 00000040 b9 e8 12 2e f9 49 37 |.....I7|" +peer0.org1.example.com | "2019-04-22 06:17:21.635 UTC [gossip.comm] func1 -> DEBU 23c7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.635 UTC [cauthdsl] func2 -> DEBU 23c8 0xc0033c8520 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:21.636 UTC [cauthdsl] func1 -> DEBU 23c9 0xc0033c8520 gate 1555913841632510300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:21.636 UTC [policies] Evaluate -> DEBU 23ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:21.636 UTC [policies] Evaluate -> DEBU 23cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:21.636 UTC [policies] Evaluate -> DEBU 23cc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:21.637 UTC [policies] Evaluate -> DEBU 23cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:21.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 23ce Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 23cf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 " +peer0.org1.example.com | "2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 " +peer0.org1.example.com | "2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 23d4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.639 UTC [gossip.gossip] handleMessage -> DEBU 23d7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.640 UTC [gossip.gossip] handleMessage -> DEBU 23d9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23db Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.641 UTC [gossip.gossip] handleMessage -> DEBU 23dc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.646 UTC [msp] DeserializeIdentity -> DEBU 23dd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.647 UTC [msp] DeserializeIdentity -> DEBU 23de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.648 UTC [msp] DeserializeIdentity -> DEBU 23df Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.648 UTC [msp] DeserializeIdentity -> DEBU 23e0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.648 UTC [msp] DeserializeIdentity -> DEBU 23e1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.649 UTC [msp] DeserializeIdentity -> DEBU 23e2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.649 UTC [msp] DeserializeIdentity -> DEBU 23e3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.650 UTC [gossip.comm] Send -> DEBU 23e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:21.650 UTC [msp] DeserializeIdentity -> DEBU 23e5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:21.650 UTC [gossip.comm] sendToEndpoint -> DEBU 23e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.650 UTC [gossip.comm] sendToEndpoint -> DEBU 23e7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:21.651 UTC [gossip.comm] Send -> DEBU 23e8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:21.652 UTC [gossip.comm] sendToEndpoint -> DEBU 23e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:21.654 UTC [gossip.comm] sendToEndpoint -> DEBU 23ea Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.051 UTC [gossip.gossip] handleMessage -> DEBU 23eb Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.053 UTC [gossip.gossip] handleMessage -> DEBU 23ec Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.054 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23ee Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:22.054 UTC [msp] DeserializeIdentity -> DEBU 23ef Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.055 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:22.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23f1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:22.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23f2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:22.057 UTC [policies] Evaluate -> DEBU 23f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:22.058 UTC [policies] Evaluate -> DEBU 23f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:22.058 UTC [policies] Evaluate -> DEBU 23f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:22.059 UTC [cauthdsl] func1 -> DEBU 23f6 0xc0033ddef0 gate 1555913842059218600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:22.059 UTC [gossip.comm] func1 -> DEBU 23f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.060 UTC [gossip.comm] func1 -> DEBU 23f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.059 UTC [cauthdsl] func2 -> DEBU 23f7 0xc0033ddef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:22.060 UTC [cauthdsl] func2 -> DEBU 23fa 0xc0033ddef0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:22.060 UTC [cauthdsl] func2 -> DEBU 23fb 0xc0033ddef0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:22.060 UTC [msp.identity] Verify -> DEBU 23fc Verify: digest = 00000000 e2 32 d7 6a d3 50 5a fe de f3 e1 d0 e2 27 e5 09 |.2.j.PZ......'..| +peer0.org1.example.com | 00000010 7c db 57 ff 00 37 69 9b 14 c7 4f 24 cf ae 63 1d ||.W..7i...O$..c.|" +peer0.org1.example.com | "2019-04-22 06:17:22.060 UTC [msp.identity] Verify -> DEBU 23fd Verify: sig = 00000000 30 45 02 21 00 8e 23 7f a4 cb fe a7 d8 df 67 6b |0E.!..#.......gk| +peer0.org1.example.com | 00000010 af ac 13 9c 4d 37 c5 62 71 61 0f 4a ba de d8 5f |....M7.bqa.J..._| +peer0.org1.example.com | 00000020 1a 2e a7 25 84 02 20 15 fa 12 79 4a 1c 52 5d c5 |...%.. ...yJ.R].| +peer0.org1.example.com | 00000030 22 26 10 0b 4a ce 16 b1 ae 0b fd 44 4b 88 33 5d |"&..J......DK.3]| +peer0.org1.example.com | 00000040 77 4b d3 f5 99 b6 03 |wK.....|" +peer0.org1.example.com | "2019-04-22 06:17:22.060 UTC [gossip.gossip] handleMessage -> DEBU 23fe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.061 UTC [cauthdsl] func2 -> DEBU 23ff 0xc0033ddef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:22.062 UTC [cauthdsl] func1 -> DEBU 2400 0xc0033ddef0 gate 1555913842059218600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:22.062 UTC [policies] Evaluate -> DEBU 2401 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:22.062 UTC [policies] Evaluate -> DEBU 2402 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:22.063 UTC [policies] Evaluate -> DEBU 2403 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:22.063 UTC [policies] Evaluate -> DEBU 2404 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:22.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 2405 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2406 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:22.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2407 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 " +peer0.org1.example.com | "2019-04-22 06:17:22.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2408 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 " +peer0.org1.example.com | "2019-04-22 06:17:22.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2409 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:22.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 240a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 240b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.066 UTC [gossip.discovery] handleMsgFromComm -> DEBU 240c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.067 UTC [gossip.gossip] handleMessage -> DEBU 240d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.067 UTC [gossip.gossip] handleMessage -> DEBU 240e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 240f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2410 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2411 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2413 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.068 UTC [gossip.gossip] handleMessage -> DEBU 2412 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.069 UTC [msp] DeserializeIdentity -> DEBU 2414 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.069 UTC [msp] DeserializeIdentity -> DEBU 2415 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.070 UTC [msp] DeserializeIdentity -> DEBU 2416 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.070 UTC [msp] DeserializeIdentity -> DEBU 2417 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.071 UTC [msp] DeserializeIdentity -> DEBU 2418 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.071 UTC [msp] DeserializeIdentity -> DEBU 2419 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.072 UTC [msp] DeserializeIdentity -> DEBU 241a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.072 UTC [gossip.comm] Send -> DEBU 241b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.072 UTC [msp] DeserializeIdentity -> DEBU 241c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.075 UTC [gossip.comm] Send -> DEBU 241d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.075 UTC [gossip.comm] sendToEndpoint -> DEBU 241e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.075 UTC [gossip.comm] sendToEndpoint -> DEBU 241f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.076 UTC [gossip.comm] sendToEndpoint -> DEBU 2420 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.077 UTC [gossip.comm] sendToEndpoint -> DEBU 2421 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.903 UTC [gossip.pull] Hello -> DEBU 2422 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:22.903 UTC [gossip.comm] Send -> DEBU 2423 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.904 UTC [gossip.pull] Hello -> DEBU 2424 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:22.905 UTC [gossip.comm] Send -> DEBU 2426 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.904 UTC [gossip.comm] sendToEndpoint -> DEBU 2425 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.905 UTC [gossip.comm] sendToEndpoint -> DEBU 2427 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.905 UTC [gossip.pull] Hello -> DEBU 2428 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:22.906 UTC [gossip.comm] Send -> DEBU 2429 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.906 UTC [gossip.comm] sendToEndpoint -> DEBU 242c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.907 UTC [gossip.comm] sendToEndpoint -> DEBU 242d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.905 UTC [gossip.comm] sendToEndpoint -> DEBU 242a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.906 UTC [gossip.comm] func1 -> DEBU 242b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13009051010668466515 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.908 UTC [gossip.gossip] handleMessage -> DEBU 242e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13009051010668466515 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.909 UTC [gossip.pull] HandleMessage -> DEBU 242f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13009051010668466515 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.909 UTC [gossip.gossip] handleMessage -> DEBU 2430 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.910 UTC [gossip.comm] func1 -> DEBU 2431 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16749726424293271070 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.908 UTC [gossip.comm] sendToEndpoint -> DEBU 2432 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.911 UTC [gossip.gossip] handleMessage -> DEBU 2433 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16749726424293271070 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.914 UTC [gossip.pull] HandleMessage -> DEBU 2434 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16749726424293271070 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.915 UTC [gossip.gossip] handleMessage -> DEBU 2435 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.915 UTC [gossip.gossip] handleMessage -> DEBU 2436 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12583559006767350319 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.916 UTC [gossip.pull] HandleMessage -> DEBU 2437 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12583559006767350319 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.916 UTC [gossip.gossip] handleMessage -> DEBU 2438 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.940 UTC [msp.identity] Sign -> DEBU 2439 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151021 " +peer0.org1.example.com | "2019-04-22 06:17:22.940 UTC [msp.identity] Sign -> DEBU 243a Sign: digest: A73E8A6CF4D07234645E7573FA21808821032DC038A538FD4AF47FD636C4BD1F " +peer0.org1.example.com | "2019-04-22 06:17:22.941 UTC [msp.identity] Sign -> DEBU 243b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:22.941 UTC [msp.identity] Sign -> DEBU 243c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:22.942 UTC [gossip.comm] Send -> DEBU 243d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.943 UTC [msp] DeserializeIdentity -> DEBU 243e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.943 UTC [gossip.comm] sendToEndpoint -> DEBU 243f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.943 UTC [gossip.comm] sendToEndpoint -> DEBU 2440 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.943 UTC [gossip.comm] Send -> DEBU 2441 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.945 UTC [msp] DeserializeIdentity -> DEBU 2442 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:22.946 UTC [gossip.comm] Send -> DEBU 2444 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:22.945 UTC [gossip.comm] sendToEndpoint -> DEBU 2443 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.947 UTC [gossip.comm] sendToEndpoint -> DEBU 2446 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.947 UTC [gossip.comm] sendToEndpoint -> DEBU 2445 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.949 UTC [gossip.comm] sendToEndpoint -> DEBU 2447 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.954 UTC [gossip.comm] func1 -> DEBU 2448 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.954 UTC [gossip.gossip] handleMessage -> DEBU 2449 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.956 UTC [gossip.comm] func1 -> DEBU 244a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.954 UTC [gossip.gossip] handleMessage -> DEBU 244b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.956 UTC [gossip.gossip] handleMessage -> DEBU 244c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 244d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.957 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 244e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:22.957 UTC [msp.identity] Verify -> DEBU 244f Verify: digest = 00000000 a7 3e 8a 6c f4 d0 72 34 64 5e 75 73 fa 21 80 88 |.>.l..r4d^us.!..| +peer0.org1.example.com | 00000010 21 03 2d c0 38 a5 38 fd 4a f4 7f d6 36 c4 bd 1f |!.-.8.8.J...6...|" +peer0.org1.example.com | "2019-04-22 06:17:22.957 UTC [msp.identity] Verify -> DEBU 2450 Verify: sig = 00000000 30 44 02 20 5c d8 db fa 2b e0 b6 46 b5 53 b0 21 |0D. \...+..F.S.!| +peer0.org1.example.com | 00000010 de 27 30 b1 b8 62 16 a6 86 ef 5b 41 13 2b 23 66 |.'0..b....[A.+#f| +peer0.org1.example.com | 00000020 7d 70 b7 a0 02 20 0e 5f cc b5 70 f8 7a 47 35 5a |}p... ._..p.zG5Z| +peer0.org1.example.com | 00000030 c4 7e a0 cb 43 2f fc 79 79 bf 88 ce 27 25 83 b6 |.~..C/.yy...'%..| +peer0.org1.example.com | 00000040 74 32 c9 c8 3e 63 |t2..>c|" +peer0.org1.example.com | "2019-04-22 06:17:22.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 2451 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.958 UTC [gossip.discovery] isSentByMe -> DEBU 2452 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 2453 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2454 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2455 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.959 UTC [gossip.gossip] handleMessage -> DEBU 2456 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.959 UTC [gossip.gossip] handleMessage -> DEBU 2458 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.959 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2457 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:22.960 UTC [msp.identity] Verify -> DEBU 2459 Verify: digest = 00000000 a7 3e 8a 6c f4 d0 72 34 64 5e 75 73 fa 21 80 88 |.>.l..r4d^us.!..| +peer0.org1.example.com | 00000010 21 03 2d c0 38 a5 38 fd 4a f4 7f d6 36 c4 bd 1f |!.-.8.8.J...6...|" +peer0.org1.example.com | "2019-04-22 06:17:22.961 UTC [msp.identity] Verify -> DEBU 245a Verify: sig = 00000000 30 44 02 20 5c d8 db fa 2b e0 b6 46 b5 53 b0 21 |0D. \...+..F.S.!| +peer0.org1.example.com | 00000010 de 27 30 b1 b8 62 16 a6 86 ef 5b 41 13 2b 23 66 |.'0..b....[A.+#f| +peer0.org1.example.com | 00000020 7d 70 b7 a0 02 20 0e 5f cc b5 70 f8 7a 47 35 5a |}p... ._..p.zG5Z| +peer0.org1.example.com | 00000030 c4 7e a0 cb 43 2f fc 79 79 bf 88 ce 27 25 83 b6 |.~..C/.yy...'%..| +peer0.org1.example.com | 00000040 74 32 c9 c8 3e 63 |t2..>c|" +peer0.org1.example.com | "2019-04-22 06:17:22.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 245b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.962 UTC [gossip.discovery] isSentByMe -> DEBU 245c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 245d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 245e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.963 UTC [gossip.discovery] handleMsgFromComm -> DEBU 245f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.963 UTC [gossip.gossip] handleMessage -> DEBU 2460 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.963 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2461 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:22.964 UTC [msp.identity] Verify -> DEBU 2462 Verify: digest = 00000000 a7 3e 8a 6c f4 d0 72 34 64 5e 75 73 fa 21 80 88 |.>.l..r4d^us.!..| +peer0.org1.example.com | 00000010 21 03 2d c0 38 a5 38 fd 4a f4 7f d6 36 c4 bd 1f |!.-.8.8.J...6...|" +peer0.org1.example.com | "2019-04-22 06:17:22.964 UTC [msp.identity] Verify -> DEBU 2463 Verify: sig = 00000000 30 44 02 20 5c d8 db fa 2b e0 b6 46 b5 53 b0 21 |0D. \...+..F.S.!| +peer0.org1.example.com | 00000010 de 27 30 b1 b8 62 16 a6 86 ef 5b 41 13 2b 23 66 |.'0..b....[A.+#f| +peer0.org1.example.com | 00000020 7d 70 b7 a0 02 20 0e 5f cc b5 70 f8 7a 47 35 5a |}p... ._..p.zG5Z| +peer0.org1.example.com | 00000030 c4 7e a0 cb 43 2f fc 79 79 bf 88 ce 27 25 83 b6 |.~..C/.yy...'%..| +peer0.org1.example.com | 00000040 74 32 c9 c8 3e 63 |t2..>c|" +peer0.org1.example.com | "2019-04-22 06:17:22.965 UTC [msp.identity] Verify -> DEBU 2464 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:22.966 UTC [msp.identity] Verify -> DEBU 2465 Verify: sig = 00000000 30 44 02 20 7a c3 35 0b 15 31 70 9e 22 2a 01 32 |0D. z.5..1p."*.2| +peer0.org1.example.com | 00000010 88 50 cd 1a 2a b4 da 66 fc 9a c2 0e 6d fb fb b3 |.P..*..f....m...| +peer0.org1.example.com | 00000020 16 df 83 b0 02 20 1d b7 61 11 cd cd 05 1e d4 57 |..... ..a......W| +peer0.org1.example.com | 00000030 4b 2d b6 a1 bc e8 fd 52 d8 b3 cd ce c6 5e 1f 76 |K-.....R.....^.v| +peer0.org1.example.com | 00000040 0e dc 7d 48 ca eb |..}H..|" +peer0.org1.example.com | "2019-04-22 06:17:22.967 UTC [gossip.discovery] handleAliveMessage -> DEBU 2466 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.967 UTC [gossip.discovery] isSentByMe -> DEBU 2467 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:22.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 2468 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:22.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2469 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.164 UTC [gossip.comm] func1 -> DEBU 246a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.164 UTC [gossip.gossip] handleMessage -> DEBU 246b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.166 UTC [gossip.pull] HandleMessage -> DEBU 246c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.166 UTC [gossip.pull] SendDigest -> DEBU 246d Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:23.166 UTC [gossip.gossip] handleMessage -> DEBU 246e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.185 UTC [gossip.comm] func1 -> DEBU 246f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.185 UTC [gossip.gossip] handleMessage -> DEBU 2470 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.188 UTC [gossip.gossip] handleMessage -> DEBU 2471 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2472 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2473 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:23.189 UTC [msp.identity] Verify -> DEBU 2474 Verify: digest = 00000000 76 7f 08 83 ed c7 63 d8 3a 7d ee 73 a9 1c 01 ff |v.....c.:}.s....| +peer0.org1.example.com | 00000010 8e d7 b2 bf 78 06 81 69 22 fc 6b 5e 6d 96 77 25 |....x..i".k^m.w%|" +peer0.org1.example.com | "2019-04-22 06:17:23.189 UTC [msp.identity] Verify -> DEBU 2475 Verify: sig = 00000000 30 45 02 21 00 a8 f8 fd 2f c1 5c a0 16 b3 9b 6b |0E.!..../.\....k| +peer0.org1.example.com | 00000010 54 dd ab 1e 75 6f 1e 90 98 b6 6d cd 26 9e ce 16 |T...uo....m.&...| +peer0.org1.example.com | 00000020 e1 d6 44 08 fe 02 20 38 c3 c0 d7 09 97 51 ef 0d |..D... 8.....Q..| +peer0.org1.example.com | 00000030 7c b1 a4 08 f4 27 f4 0f 0c 9f 7a fd 43 a4 3e f3 ||....'....z.C.>.| +peer0.org1.example.com | 00000040 51 93 66 64 db 2e ad |Q.fd...|" +peer0.org1.example.com | "2019-04-22 06:17:23.190 UTC [msp.identity] Verify -> DEBU 2476 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:23.190 UTC [msp.identity] Verify -> DEBU 2477 Verify: sig = 00000000 30 45 02 21 00 a5 6b f3 99 58 de c3 54 3d 7f 3e |0E.!..k..X..T=.>| +peer0.org1.example.com | 00000010 ac d9 25 1f 21 e6 18 33 97 fe 72 c8 b1 76 31 d7 |..%.!..3..r..v1.| +peer0.org1.example.com | 00000020 58 6a 25 92 98 02 20 11 3f 8a 5f 6b 81 66 99 0a |Xj%... .?._k.f..| +peer0.org1.example.com | 00000030 26 4b 52 eb 51 0d 49 3e fb 3f 0d 97 83 7a d7 cc |&KR.Q.I>.?...z..| +peer0.org1.example.com | 00000040 d4 1b 0d 5e 30 e9 b2 |...^0..|" +peer0.org1.example.com | "2019-04-22 06:17:23.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 2478 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 2479 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:23.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 247a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 " +peer0.org1.example.com | "2019-04-22 06:17:23.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 247b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 " +peer0.org1.example.com | "2019-04-22 06:17:23.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 247c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:23.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 247d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 247e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 247f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.194 UTC [gossip.discovery] sendMemResponse -> DEBU 2480 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:23.194 UTC [msp] DeserializeIdentity -> DEBU 2481 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.194 UTC [msp] DeserializeIdentity -> DEBU 2482 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.194 UTC [gossip.comm] Send -> DEBU 2483 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:23.195 UTC [gossip.discovery] sendMemResponse -> DEBU 2484 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:23.195 UTC [gossip.comm] sendToEndpoint -> DEBU 2485 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.195 UTC [gossip.comm] sendToEndpoint -> DEBU 2486 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.588 UTC [gossip.comm] func1 -> DEBU 2487 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.588 UTC [gossip.gossip] handleMessage -> DEBU 2488 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.589 UTC [gossip.pull] HandleMessage -> DEBU 2489 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.589 UTC [msp] DeserializeIdentity -> DEBU 248a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.589 UTC [msp] DeserializeIdentity -> DEBU 248b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.590 UTC [gossip.pull] SendDigest -> DEBU 2490 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:23.590 UTC [gossip.gossip] handleMessage -> DEBU 2491 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.602 UTC [gossip.comm] func1 -> DEBU 2492 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.602 UTC [gossip.gossip] handleMessage -> DEBU 2493 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [gossip.gossip] handleMessage -> DEBU 2494 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2495 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2496 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [msp] DeserializeIdentity -> DEBU 2497 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2498 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2499 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:23.603 UTC [policies] Evaluate -> DEBU 249b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [policies] Evaluate -> DEBU 249c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [policies] Evaluate -> DEBU 249d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [cauthdsl] func1 -> DEBU 249e 0xc00340b490 gate 1555913843604294800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [cauthdsl] func2 -> DEBU 249f 0xc00340b490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [cauthdsl] func2 -> DEBU 24a0 0xc00340b490 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [cauthdsl] func2 -> DEBU 24a1 0xc00340b490 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [msp.identity] Verify -> DEBU 24a2 Verify: digest = 00000000 89 13 a0 78 81 4e b5 fa d1 0c 14 ff 24 4c f8 81 |...x.N......$L..| +peer0.org1.example.com | 00000010 01 d7 10 33 3a 98 eb 10 8c 54 92 eb 2d f6 a7 bf |...3:....T..-...|" +peer0.org1.example.com | "2019-04-22 06:17:23.604 UTC [msp.identity] Verify -> DEBU 24a3 Verify: sig = 00000000 30 45 02 21 00 8c be 6b ba a9 0a fe fb 4f c1 ab |0E.!...k.....O..| +peer0.org1.example.com | 00000010 e8 0f 37 c6 50 f6 47 93 f0 03 23 9f 33 d9 a5 e8 |..7.P.G...#.3...| +peer0.org1.example.com | 00000020 a5 ab 6f 37 64 02 20 6e 7c 23 1b 41 19 01 09 80 |..o7d. n|#.A....| +peer0.org1.example.com | 00000030 e6 36 14 6d 99 88 30 10 30 2b 8d ff 54 ff 9f c4 |.6.m..0.0+..T...| +peer0.org1.example.com | 00000040 cd 31 d9 91 10 b9 40 |.1....@|" +peer0.org1.example.com | "2019-04-22 06:17:23.605 UTC [cauthdsl] func2 -> DEBU 24a4 0xc00340b490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:23.605 UTC [cauthdsl] func1 -> DEBU 24a5 0xc00340b490 gate 1555913843604294800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:23.606 UTC [gossip.discovery] handleAliveMessage -> DEBU 24aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:23.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ac updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 " +peer0.org1.example.com | "2019-04-22 06:17:23.607 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ad Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 " +peer0.org1.example.com | "2019-04-22 06:17:23.607 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:23.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 24af Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.611 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.611 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:23.611 UTC [gossip.discovery] sendMemResponse -> DEBU 24b2 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:23.612 UTC [msp] DeserializeIdentity -> DEBU 24b3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.612 UTC [msp] DeserializeIdentity -> DEBU 24b4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.613 UTC [msp] DeserializeIdentity -> DEBU 24b5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:23.613 UTC [gossip.comm] Send -> DEBU 24b6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:23.614 UTC [gossip.discovery] sendMemResponse -> DEBU 24b7 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:23.614 UTC [gossip.comm] sendToEndpoint -> DEBU 24b8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:23.614 UTC [gossip.comm] sendToEndpoint -> DEBU 24b9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.007 UTC [gossip.gossip] handleMessage -> DEBU 24ba Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.007 UTC [gossip.pull] HandleMessage -> DEBU 24bb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.007 UTC [msp] DeserializeIdentity -> DEBU 24bc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.007 UTC [msp] DeserializeIdentity -> DEBU 24bd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24be Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24bf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24c0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24c1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.008 UTC [gossip.pull] SendDigest -> DEBU 24c2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:24.008 UTC [gossip.gossip] handleMessage -> DEBU 24c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.025 UTC [gossip.gossip] handleMessage -> DEBU 24c4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.026 UTC [gossip.gossip] handleMessage -> DEBU 24c5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.026 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.027 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24c7 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:24.027 UTC [msp] DeserializeIdentity -> DEBU 24c8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.028 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:24.032 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24ca Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.032 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.033 UTC [policies] Evaluate -> DEBU 24cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.033 UTC [policies] Evaluate -> DEBU 24cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:24.033 UTC [policies] Evaluate -> DEBU 24ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.034 UTC [cauthdsl] func1 -> DEBU 24cf 0xc0039a2700 gate 1555913844034262400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:24.034 UTC [cauthdsl] func2 -> DEBU 24d0 0xc0039a2700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:24.034 UTC [cauthdsl] func2 -> DEBU 24d1 0xc0039a2700 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:24.035 UTC [cauthdsl] func2 -> DEBU 24d2 0xc0039a2700 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.035 UTC [msp.identity] Verify -> DEBU 24d3 Verify: digest = 00000000 f1 e5 67 88 67 58 e4 ac 85 06 2f 5d 05 05 a7 05 |..g.gX..../]....| +peer0.org1.example.com | 00000010 e6 4f 2c 34 18 e8 e8 86 06 5e f2 28 c6 2a c2 57 |.O,4.....^.(.*.W|" +peer0.org1.example.com | "2019-04-22 06:17:24.035 UTC [msp.identity] Verify -> DEBU 24d4 Verify: sig = 00000000 30 45 02 21 00 a0 7f 3c 19 0e 93 82 ad 9b b0 88 |0E.!...<........| +peer0.org1.example.com | 00000010 06 e4 d3 d7 12 03 29 bd 48 10 b8 ed 4c 91 d8 e2 |......).H...L...| +peer0.org1.example.com | 00000020 c9 c9 01 b5 f0 02 20 69 3b ac 89 d1 e6 5a 4e 1f |...... i;....ZN.| +peer0.org1.example.com | 00000030 33 07 39 0d 58 04 a6 4a bc 5b 9d f3 2a 1e 4c 4c |3.9.X..J.[..*.LL| +peer0.org1.example.com | 00000040 61 1a f1 7e f8 cb a0 |a..~...|" +peer0.org1.example.com | "2019-04-22 06:17:24.036 UTC [cauthdsl] func2 -> DEBU 24d5 0xc0039a2700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.036 UTC [cauthdsl] func1 -> DEBU 24d6 0xc0039a2700 gate 1555913844034262400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 24db Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 24dc Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:24.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 24dd updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 " +peer0.org1.example.com | "2019-04-22 06:17:24.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 24de Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 " +peer0.org1.example.com | "2019-04-22 06:17:24.039 UTC [gossip.discovery] learnExistingMembers -> DEBU 24df Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:24.039 UTC [gossip.discovery] learnExistingMembers -> DEBU 24e0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.040 UTC [gossip.discovery] sendMemResponse -> DEBU 24e3 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:24.041 UTC [msp] DeserializeIdentity -> DEBU 24e4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.041 UTC [msp] DeserializeIdentity -> DEBU 24e5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.042 UTC [msp] DeserializeIdentity -> DEBU 24e6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.042 UTC [gossip.comm] Send -> DEBU 24e7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:24.043 UTC [gossip.discovery] sendMemResponse -> DEBU 24e8 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:24.043 UTC [gossip.comm] sendToEndpoint -> DEBU 24e9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.043 UTC [gossip.comm] sendToEndpoint -> DEBU 24ea Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.388 UTC [msp] DeserializeIdentity -> DEBU 24eb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.388 UTC [msp] DeserializeIdentity -> DEBU 24ec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.389 UTC [gossip.comm] Send -> DEBU 24ed Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24ee Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24ef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24f0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24f1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.390 UTC [gossip.comm] sendToEndpoint -> DEBU 24f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.390 UTC [gossip.comm] sendToEndpoint -> DEBU 24f3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.391 UTC [gossip.gossip] handleMessage -> DEBU 24f4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.392 UTC [msp] DeserializeIdentity -> DEBU 24f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.392 UTC [msp] DeserializeIdentity -> DEBU 24f8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.392 UTC [gossip.comm] func1 -> DEBU 24f5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.392 UTC [gossip.comm] func1 -> DEBU 24f6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.393 UTC [msp] DeserializeIdentity -> DEBU 24f9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:24.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24fb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24fc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.395 UTC [policies] Evaluate -> DEBU 24fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.395 UTC [policies] Evaluate -> DEBU 24fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:24.395 UTC [policies] Evaluate -> DEBU 24ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.396 UTC [cauthdsl] func1 -> DEBU 2500 0xc0039ad0a0 gate 1555913844396031300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:24.396 UTC [cauthdsl] func2 -> DEBU 2501 0xc0039ad0a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:24.396 UTC [cauthdsl] func2 -> DEBU 2502 0xc0039ad0a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:24.397 UTC [cauthdsl] func2 -> DEBU 2503 0xc0039ad0a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.397 UTC [msp.identity] Verify -> DEBU 2504 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:24.397 UTC [msp.identity] Verify -> DEBU 2505 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:24.398 UTC [cauthdsl] func2 -> DEBU 2506 0xc0039ad0a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.398 UTC [cauthdsl] func1 -> DEBU 2507 0xc0039ad0a0 gate 1555913844396031300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:24.398 UTC [policies] Evaluate -> DEBU 2508 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.399 UTC [policies] Evaluate -> DEBU 2509 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.399 UTC [policies] Evaluate -> DEBU 250a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.400 UTC [policies] Evaluate -> DEBU 250b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.400 UTC [msp] DeserializeIdentity -> DEBU 250c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.401 UTC [msp] DeserializeIdentity -> DEBU 250d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.401 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 250e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:24.402 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 250f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.402 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2510 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.402 UTC [policies] Evaluate -> DEBU 2511 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.403 UTC [policies] Evaluate -> DEBU 2512 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:24.403 UTC [policies] Evaluate -> DEBU 2513 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.404 UTC [cauthdsl] func1 -> DEBU 2514 0xc003da0870 gate 1555913844404018000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:24.404 UTC [cauthdsl] func2 -> DEBU 2515 0xc003da0870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:24.404 UTC [cauthdsl] func2 -> DEBU 2516 0xc003da0870 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:24.404 UTC [cauthdsl] func2 -> DEBU 2517 0xc003da0870 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.405 UTC [msp.identity] Verify -> DEBU 2518 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:24.405 UTC [msp.identity] Verify -> DEBU 2519 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:24.406 UTC [cauthdsl] func2 -> DEBU 251a 0xc003da0870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.406 UTC [cauthdsl] func1 -> DEBU 251b 0xc003da0870 gate 1555913844404018000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:24.406 UTC [policies] Evaluate -> DEBU 251c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.406 UTC [policies] Evaluate -> DEBU 251d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.407 UTC [policies] Evaluate -> DEBU 251e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.409 UTC [policies] Evaluate -> DEBU 251f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.410 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:24.411 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:24.411 UTC [msp.identity] Verify -> DEBU 2522 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:24.411 UTC [msp.identity] Verify -> DEBU 2523 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:24.412 UTC [gossip.gossip] handleMessage -> DEBU 2524 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.412 UTC [gossip.gossip] handleMessage -> DEBU 2525 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.413 UTC [msp.identity] Verify -> DEBU 2526 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:24.414 UTC [msp.identity] Verify -> DEBU 2527 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:24.414 UTC [msp] DeserializeIdentity -> DEBU 2528 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.414 UTC [msp] DeserializeIdentity -> DEBU 2529 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.415 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 252a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:24.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 252b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 252c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.416 UTC [policies] Evaluate -> DEBU 252d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.416 UTC [policies] Evaluate -> DEBU 252e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:24.416 UTC [policies] Evaluate -> DEBU 252f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.417 UTC [cauthdsl] func1 -> DEBU 2530 0xc003dc7820 gate 1555913844417106300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:24.417 UTC [cauthdsl] func2 -> DEBU 2531 0xc003dc7820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:24.417 UTC [cauthdsl] func2 -> DEBU 2532 0xc003dc7820 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:24.417 UTC [cauthdsl] func2 -> DEBU 2533 0xc003dc7820 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.418 UTC [msp.identity] Verify -> DEBU 2534 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:24.418 UTC [msp.identity] Verify -> DEBU 2535 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:24.419 UTC [cauthdsl] func2 -> DEBU 2536 0xc003dc7820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.420 UTC [cauthdsl] func1 -> DEBU 2537 0xc003dc7820 gate 1555913844417106300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:24.420 UTC [policies] Evaluate -> DEBU 2538 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.420 UTC [policies] Evaluate -> DEBU 2539 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.421 UTC [policies] Evaluate -> DEBU 253a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.421 UTC [policies] Evaluate -> DEBU 253b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.421 UTC [msp.identity] Verify -> DEBU 253c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:24.422 UTC [msp.identity] Verify -> DEBU 253d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:24.422 UTC [msp] DeserializeIdentity -> DEBU 253e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.423 UTC [msp] DeserializeIdentity -> DEBU 253f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.423 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2540 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:24.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2541 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2542 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.427 UTC [policies] Evaluate -> DEBU 2543 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.428 UTC [policies] Evaluate -> DEBU 2544 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:24.428 UTC [policies] Evaluate -> DEBU 2545 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.428 UTC [cauthdsl] func1 -> DEBU 2546 0xc003ea1710 gate 1555913844428767300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:24.429 UTC [cauthdsl] func2 -> DEBU 2547 0xc003ea1710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:24.429 UTC [cauthdsl] func2 -> DEBU 2548 0xc003ea1710 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:24.429 UTC [cauthdsl] func2 -> DEBU 2549 0xc003ea1710 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.430 UTC [msp.identity] Verify -> DEBU 254a Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:24.430 UTC [msp.identity] Verify -> DEBU 254b Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:24.431 UTC [cauthdsl] func2 -> DEBU 254c 0xc003ea1710 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.431 UTC [cauthdsl] func1 -> DEBU 254d 0xc003ea1710 gate 1555913844428767300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:24.431 UTC [policies] Evaluate -> DEBU 254e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.431 UTC [policies] Evaluate -> DEBU 254f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.432 UTC [policies] Evaluate -> DEBU 2550 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.432 UTC [policies] Evaluate -> DEBU 2551 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.432 UTC [gossip.gossip] handleMessage -> DEBU 2552 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.433 UTC [gossip.gossip] handleMessage -> DEBU 2553 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.433 UTC [msp] DeserializeIdentity -> DEBU 2554 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.434 UTC [msp] DeserializeIdentity -> DEBU 2555 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.434 UTC [msp] DeserializeIdentity -> DEBU 2556 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.435 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2557 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:24.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2558 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2559 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.435 UTC [policies] Evaluate -> DEBU 255a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.436 UTC [policies] Evaluate -> DEBU 255b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:24.436 UTC [policies] Evaluate -> DEBU 255c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.436 UTC [cauthdsl] func1 -> DEBU 255d 0xc003ead260 gate 1555913844436763400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:24.437 UTC [cauthdsl] func2 -> DEBU 255e 0xc003ead260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:24.437 UTC [cauthdsl] func2 -> DEBU 255f 0xc003ead260 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:24.437 UTC [cauthdsl] func2 -> DEBU 2560 0xc003ead260 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.438 UTC [msp.identity] Verify -> DEBU 2561 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:24.438 UTC [msp.identity] Verify -> DEBU 2562 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:24.439 UTC [cauthdsl] func2 -> DEBU 2563 0xc003ead260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.439 UTC [cauthdsl] func1 -> DEBU 2564 0xc003ead260 gate 1555913844436763400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:24.439 UTC [policies] Evaluate -> DEBU 2565 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.439 UTC [policies] Evaluate -> DEBU 2566 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.440 UTC [policies] Evaluate -> DEBU 2567 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.440 UTC [policies] Evaluate -> DEBU 2568 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.440 UTC [msp] DeserializeIdentity -> DEBU 2569 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.441 UTC [msp] DeserializeIdentity -> DEBU 256a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.441 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 256b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:24.443 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.443 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:24.444 UTC [policies] Evaluate -> DEBU 256e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.444 UTC [policies] Evaluate -> DEBU 256f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:24.444 UTC [policies] Evaluate -> DEBU 2570 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:24.444 UTC [cauthdsl] func1 -> DEBU 2571 0xc003ef6a50 gate 1555913844444857400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:24.445 UTC [cauthdsl] func2 -> DEBU 2572 0xc003ef6a50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:24.445 UTC [cauthdsl] func2 -> DEBU 2573 0xc003ef6a50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:24.445 UTC [cauthdsl] func2 -> DEBU 2574 0xc003ef6a50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.445 UTC [msp.identity] Verify -> DEBU 2575 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:24.446 UTC [msp.identity] Verify -> DEBU 2576 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:24.446 UTC [cauthdsl] func2 -> DEBU 2577 0xc003ef6a50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:24.447 UTC [cauthdsl] func1 -> DEBU 2578 0xc003ef6a50 gate 1555913844444857400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:24.447 UTC [policies] Evaluate -> DEBU 2579 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.447 UTC [policies] Evaluate -> DEBU 257a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.447 UTC [policies] Evaluate -> DEBU 257b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.448 UTC [policies] Evaluate -> DEBU 257c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:24.448 UTC [msp.identity] Verify -> DEBU 257d Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:24.449 UTC [msp.identity] Verify -> DEBU 257e Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:24.449 UTC [msp.identity] Verify -> DEBU 257f Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:24.451 UTC [msp.identity] Verify -> DEBU 2580 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:24.452 UTC [gossip.gossip] handleMessage -> DEBU 2581 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.469 UTC [msp] DeserializeIdentity -> DEBU 2582 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.469 UTC [msp] DeserializeIdentity -> DEBU 2583 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.470 UTC [gossip.pull] Hello -> DEBU 2584 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:24.470 UTC [msp] DeserializeIdentity -> DEBU 2585 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.471 UTC [msp] DeserializeIdentity -> DEBU 2586 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.471 UTC [gossip.comm] Send -> DEBU 2587 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:24.471 UTC [gossip.comm] sendToEndpoint -> DEBU 2588 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.472 UTC [gossip.comm] sendToEndpoint -> DEBU 2589 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.474 UTC [gossip.comm] func1 -> DEBU 258a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8705486053438910658 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.474 UTC [gossip.gossip] handleMessage -> DEBU 258b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8705486053438910658 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.475 UTC [gossip.pull] HandleMessage -> DEBU 258c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8705486053438910658 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.475 UTC [gossip.gossip] handleMessage -> DEBU 258d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.647 UTC [gossip.comm] func1 -> DEBU 258e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.647 UTC [gossip.gossip] handleMessage -> DEBU 258f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.648 UTC [msp] DeserializeIdentity -> DEBU 2590 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.648 UTC [msp] DeserializeIdentity -> DEBU 2591 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.648 UTC [gossip.gossip] handleMessage -> DEBU 2592 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.671 UTC [gossip.comm] func1 -> DEBU 2593 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.672 UTC [gossip.gossip] handleMessage -> DEBU 2594 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.672 UTC [gossip.pull] HandleMessage -> DEBU 2595 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.672 UTC [gossip.pull] SendDigest -> DEBU 2596 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:24.672 UTC [gossip.gossip] handleMessage -> DEBU 2597 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:24.871 UTC [gossip.gossip] handleMessage -> DEBU 2598 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:24.871 UTC [msp] DeserializeIdentity -> DEBU 2599 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.871 UTC [msp] DeserializeIdentity -> DEBU 259a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.872 UTC [msp] DeserializeIdentity -> DEBU 259b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:24.872 UTC [gossip.gossip] handleMessage -> DEBU 259c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:25.085 UTC [gossip.comm] func1 -> DEBU 259d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:25.085 UTC [gossip.gossip] handleMessage -> DEBU 259e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:25.086 UTC [msp] DeserializeIdentity -> DEBU 259f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:25.093 UTC [msp] DeserializeIdentity -> DEBU 25a0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:25.093 UTC [msp] DeserializeIdentity -> DEBU 25a1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:25.094 UTC [gossip.gossip] handleMessage -> DEBU 25a2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:25.825 UTC [msp.identity] Sign -> DEBU 25a3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151022 " +peer0.org1.example.com | "2019-04-22 06:17:25.825 UTC [msp.identity] Sign -> DEBU 25a4 Sign: digest: 3C1438FA8929F488534466D9A00E87AC383895C1C2310656C8FC953CFDB2540D " +peer0.org1.example.com | "2019-04-22 06:17:25.826 UTC [msp.identity] Sign -> DEBU 25a5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:25.826 UTC [msp.identity] Sign -> DEBU 25a6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:25.827 UTC [gossip.discovery] periodicalSendAlive -> DEBU 25a7 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:25.831 UTC [msp] DeserializeIdentity -> DEBU 25a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:25.832 UTC [msp] DeserializeIdentity -> DEBU 25a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:25.832 UTC [msp] DeserializeIdentity -> DEBU 25aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:25.833 UTC [gossip.comm] Send -> DEBU 25ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:25.833 UTC [gossip.comm] Send -> DEBU 25ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:25.834 UTC [msp] DeserializeIdentity -> DEBU 25ae Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:25.834 UTC [gossip.comm] Send -> DEBU 25b0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:25.834 UTC [gossip.comm] sendToEndpoint -> DEBU 25ad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:25.835 UTC [gossip.comm] sendToEndpoint -> DEBU 25b1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:25.834 UTC [gossip.comm] sendToEndpoint -> DEBU 25af Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:25.835 UTC [gossip.comm] sendToEndpoint -> DEBU 25b2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:25.836 UTC [gossip.comm] sendToEndpoint -> DEBU 25b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:25.836 UTC [gossip.comm] sendToEndpoint -> DEBU 25b4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.104 UTC [gossip.comm] func1 -> DEBU 25b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.105 UTC [gossip.gossip] handleMessage -> DEBU 25b6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.105 UTC [gossip.gossip] handleMessage -> DEBU 25b7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.106 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25b9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:26.108 UTC [msp.identity] Verify -> DEBU 25ba Verify: digest = 00000000 5b 1d ec 22 e0 14 8f 9d e7 d0 a7 47 8d fa 23 5f |[..".......G..#_| +peer0.org1.example.com | 00000010 0e 9e b9 b2 49 11 9d 6a 33 26 81 67 25 a9 03 d5 |....I..j3&.g%...|" +peer0.org1.example.com | "2019-04-22 06:17:26.109 UTC [msp.identity] Verify -> DEBU 25bb Verify: sig = 00000000 30 45 02 21 00 95 72 b7 d1 a9 d4 ae 5b f9 f6 1f |0E.!..r.....[...| +peer0.org1.example.com | 00000010 46 8a f8 2c cc 57 a1 b6 ca 8a 9c 52 7b 71 65 06 |F..,.W.....R{qe.| +peer0.org1.example.com | 00000020 6d 3b 0a 1f ab 02 20 19 08 24 27 bc f4 02 66 4c |m;.... ..$'...fL| +peer0.org1.example.com | 00000030 90 29 a9 9c a8 3f bb 51 c0 d0 7c ad 34 c3 5f 94 |.)...?.Q..|.4._.| +peer0.org1.example.com | 00000040 42 3c c4 74 22 6f 97 |B<.t"o.|" +peer0.org1.example.com | "2019-04-22 06:17:26.110 UTC [msp.identity] Verify -> DEBU 25bc Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:26.111 UTC [msp.identity] Verify -> DEBU 25bd Verify: sig = 00000000 30 44 02 20 38 81 c5 50 70 c5 43 c9 aa 8b e4 6a |0D. 8..Pp.C....j| +peer0.org1.example.com | 00000010 86 5b 8f 0b 1f 97 0b b1 03 cc 82 f4 9c 8a 50 f5 |.[............P.| +peer0.org1.example.com | 00000020 66 56 f2 28 02 20 2f 30 67 b9 ee 7d be 3a db b6 |fV.(. /0g..}.:..| +peer0.org1.example.com | 00000030 2b 48 bb 59 47 2a 9a ba b6 6a b7 0b 8b 05 5e 1b |+H.YG*...j....^.| +peer0.org1.example.com | 00000040 e4 a3 89 a8 02 94 |......|" +peer0.org1.example.com | "2019-04-22 06:17:26.112 UTC [gossip.discovery] handleAliveMessage -> DEBU 25be Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.115 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:26.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c2 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 " +peer0.org1.example.com | "2019-04-22 06:17:26.115 UTC [gossip.gossip] handleMessage -> DEBU 25bf Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.118 UTC [gossip.comm] func1 -> DEBU 25c1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.119 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 " +peer0.org1.example.com | "2019-04-22 06:17:26.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:26.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.121 UTC [gossip.discovery] handleAliveMessage -> DEBU 25c6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25c7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ca Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.122 UTC [gossip.gossip] handleMessage -> DEBU 25c9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.123 UTC [gossip.gossip] handleMessage -> DEBU 25cb Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.124 UTC [gossip.gossip] handleMessage -> DEBU 25cc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.124 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.124 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ce Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.125 UTC [msp] DeserializeIdentity -> DEBU 25cf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.125 UTC [msp] DeserializeIdentity -> DEBU 25d0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.126 UTC [msp] DeserializeIdentity -> DEBU 25d1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.126 UTC [gossip.comm] Send -> DEBU 25d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.127 UTC [msp] DeserializeIdentity -> DEBU 25d3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.127 UTC [gossip.comm] sendToEndpoint -> DEBU 25d4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.127 UTC [gossip.comm] sendToEndpoint -> DEBU 25d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.128 UTC [gossip.comm] Send -> DEBU 25d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.129 UTC [gossip.comm] sendToEndpoint -> DEBU 25d7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.129 UTC [gossip.comm] sendToEndpoint -> DEBU 25d8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.448 UTC [gossip.election] waitForInterrupt -> DEBU 25d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.449 UTC [gossip.election] IsLeader -> DEBU 25da c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:26.449 UTC [msp.identity] Sign -> DEBU 25db Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100A1801 " +peer0.org1.example.com | "2019-04-22 06:17:26.449 UTC [msp.identity] Sign -> DEBU 25dc Sign: digest: F05C56F2FC83D4004CC2DE475F5D8D6B46DD641419502C6833847C9B6F0FEBAD " +peer0.org1.example.com | "2019-04-22 06:17:26.450 UTC [gossip.election] waitForInterrupt -> DEBU 25dd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:26.454 UTC [msp] DeserializeIdentity -> DEBU 25de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.454 UTC [msp] DeserializeIdentity -> DEBU 25df Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.455 UTC [gossip.comm] Send -> DEBU 25e2 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.456 UTC [gossip.comm] sendToEndpoint -> DEBU 25e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.456 UTC [gossip.comm] sendToEndpoint -> DEBU 25e6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.593 UTC [gossip.comm] func1 -> DEBU 25e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.593 UTC [gossip.gossip] handleMessage -> DEBU 25e8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.593 UTC [gossip.gossip] handleMessage -> DEBU 25e9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.595 UTC [gossip.comm] func1 -> DEBU 25eb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.595 UTC [gossip.gossip] handleMessage -> DEBU 25ec Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.595 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25ed Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:26.595 UTC [msp] DeserializeIdentity -> DEBU 25ee Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [policies] Evaluate -> DEBU 25f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [policies] Evaluate -> DEBU 25f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [policies] Evaluate -> DEBU 25f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [cauthdsl] func1 -> DEBU 25f5 0xc003fe9ff0 gate 1555913846596879200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:26.596 UTC [cauthdsl] func2 -> DEBU 25f6 0xc003fe9ff0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [cauthdsl] func2 -> DEBU 25f7 0xc003fe9ff0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [cauthdsl] func2 -> DEBU 25f8 0xc003fe9ff0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [msp.identity] Verify -> DEBU 25f9 Verify: digest = 00000000 20 6b 52 a4 8a 4f e0 5c 25 8a 94 45 2d 61 48 8e | kR..O.\%..E-aH.| +peer0.org1.example.com | 00000010 20 73 80 01 42 2c 16 d2 43 40 80 30 dd 2a a8 b0 | s..B,..C@.0.*..|" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [msp.identity] Verify -> DEBU 25fa Verify: sig = 00000000 30 44 02 20 20 53 3d 69 ea aa 58 85 8b 18 95 d5 |0D. S=i..X.....| +peer0.org1.example.com | 00000010 1a f7 cc d6 24 77 20 1e f9 12 ba 7f 1f f1 99 93 |....$w .........| +peer0.org1.example.com | 00000020 e6 1f 4b 88 02 20 75 81 08 2e 77 a2 3a f0 74 f8 |..K.. u...w.:.t.| +peer0.org1.example.com | 00000030 3a 6e 08 93 c0 95 db d8 e7 81 a8 33 5a 0e 31 54 |:n.........3Z.1T| +peer0.org1.example.com | 00000040 e8 d7 06 c9 58 2a |....X*|" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [cauthdsl] func2 -> DEBU 25fb 0xc003fe9ff0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [cauthdsl] func1 -> DEBU 25fc 0xc003fe9ff0 gate 1555913846596879200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [policies] Evaluate -> DEBU 25fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.597 UTC [policies] Evaluate -> DEBU 25fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.598 UTC [policies] Evaluate -> DEBU 25ff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.598 UTC [policies] Evaluate -> DEBU 2600 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.598 UTC [gossip.discovery] handleAliveMessage -> DEBU 2601 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.598 UTC [gossip.discovery] learnExistingMembers -> DEBU 2602 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:26.598 UTC [gossip.discovery] learnExistingMembers -> DEBU 2603 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 " +peer0.org1.example.com | "2019-04-22 06:17:26.598 UTC [gossip.discovery] learnExistingMembers -> DEBU 2604 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 " +peer0.org1.example.com | "2019-04-22 06:17:26.599 UTC [gossip.discovery] learnExistingMembers -> DEBU 2605 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:26.599 UTC [gossip.discovery] learnExistingMembers -> DEBU 2606 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.599 UTC [gossip.discovery] handleAliveMessage -> DEBU 2607 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2608 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2609 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 260a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.599 UTC [gossip.gossip] handleMessage -> DEBU 260b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.603 UTC [msp] DeserializeIdentity -> DEBU 260c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.603 UTC [msp] DeserializeIdentity -> DEBU 260d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.603 UTC [msp] DeserializeIdentity -> DEBU 260e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 260f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2610 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2611 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2612 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.604 UTC [gossip.comm] Send -> DEBU 2613 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2614 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2615 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.605 UTC [gossip.comm] Send -> DEBU 2616 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 2617 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 2618 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 2619 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 261a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.605 UTC [gossip.gossip] handleMessage -> DEBU 261b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.605 UTC [gossip.gossip] handleMessage -> DEBU 261c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 261d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 261e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.872 UTC [gossip.pull] Hello -> DEBU 261f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:26.873 UTC [gossip.comm] Send -> DEBU 2620 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.873 UTC [gossip.pull] Hello -> DEBU 2621 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:26.873 UTC [gossip.comm] sendToEndpoint -> DEBU 2622 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.874 UTC [gossip.comm] sendToEndpoint -> DEBU 2624 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.874 UTC [gossip.comm] Send -> DEBU 2623 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.874 UTC [gossip.pull] Hello -> DEBU 2625 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:26.875 UTC [gossip.comm] Send -> DEBU 2626 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2628 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2629 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.875 UTC [gossip.comm] func1 -> DEBU 2627 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4603628502522413175 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.876 UTC [gossip.gossip] handleMessage -> DEBU 262a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4603628502522413175 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.875 UTC [gossip.comm] sendToEndpoint -> DEBU 262b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.876 UTC [gossip.comm] sendToEndpoint -> DEBU 262c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.877 UTC [gossip.pull] HandleMessage -> DEBU 262d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4603628502522413175 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.879 UTC [gossip.gossip] handleMessage -> DEBU 262f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.879 UTC [gossip.gossip] handleMessage -> DEBU 2630 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14899484622785461077 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.880 UTC [gossip.pull] HandleMessage -> DEBU 2631 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14899484622785461077 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.879 UTC [gossip.comm] func1 -> DEBU 262e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3038898488532442087 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.880 UTC [gossip.gossip] handleMessage -> DEBU 2632 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.881 UTC [gossip.gossip] handleMessage -> DEBU 2633 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3038898488532442087 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.881 UTC [gossip.pull] HandleMessage -> DEBU 2634 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3038898488532442087 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.881 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.913 UTC [msp.identity] Sign -> DEBU 2636 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151023 " +peer0.org1.example.com | "2019-04-22 06:17:26.913 UTC [msp.identity] Sign -> DEBU 2637 Sign: digest: 0056B1D0BBA245F810D6B893FC19ADD881FAE1309FF9497780C5A044DBB6CC38 " +peer0.org1.example.com | "2019-04-22 06:17:26.913 UTC [msp.identity] Sign -> DEBU 2638 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:26.914 UTC [msp.identity] Sign -> DEBU 2639 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:26.915 UTC [gossip.comm] Send -> DEBU 263a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.915 UTC [msp] DeserializeIdentity -> DEBU 263b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.915 UTC [gossip.comm] Send -> DEBU 263c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.916 UTC [msp] DeserializeIdentity -> DEBU 263d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.916 UTC [gossip.comm] Send -> DEBU 263e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:26.916 UTC [gossip.comm] sendToEndpoint -> DEBU 263f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.917 UTC [gossip.comm] sendToEndpoint -> DEBU 2640 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.917 UTC [gossip.comm] sendToEndpoint -> DEBU 2641 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.917 UTC [gossip.comm] sendToEndpoint -> DEBU 2642 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.918 UTC [gossip.comm] sendToEndpoint -> DEBU 2643 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.918 UTC [gossip.comm] sendToEndpoint -> DEBU 2644 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.923 UTC [gossip.comm] func1 -> DEBU 2645 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.924 UTC [gossip.gossip] handleMessage -> DEBU 2647 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.924 UTC [gossip.gossip] handleMessage -> DEBU 2648 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2649 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.923 UTC [gossip.comm] func1 -> DEBU 2646 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 264a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:26.927 UTC [msp.identity] Verify -> DEBU 264c Verify: digest = 00000000 00 56 b1 d0 bb a2 45 f8 10 d6 b8 93 fc 19 ad d8 |.V....E.........| +peer0.org1.example.com | 00000010 81 fa e1 30 9f f9 49 77 80 c5 a0 44 db b6 cc 38 |...0..Iw...D...8|" +peer0.org1.example.com | "2019-04-22 06:17:26.927 UTC [msp.identity] Verify -> DEBU 264d Verify: sig = 00000000 30 44 02 20 5f aa 8a 64 a4 23 ea c6 3f 46 27 d3 |0D. _..d.#..?F'.| +peer0.org1.example.com | 00000010 4f 07 b5 75 e1 28 89 95 83 b2 e9 b5 13 c4 75 30 |O..u.(........u0| +peer0.org1.example.com | 00000020 3e ea 58 19 02 20 56 23 14 1f 9a 04 a7 dc a9 ca |>.X.. V#........| +peer0.org1.example.com | 00000030 d5 79 af 47 54 f0 f0 2e d5 22 32 82 a9 c4 d0 be |.y.GT...."2.....| +peer0.org1.example.com | 00000040 8d 91 a5 79 3a 78 |...y:x|" +peer0.org1.example.com | "2019-04-22 06:17:26.927 UTC [gossip.gossip] handleMessage -> DEBU 264b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.928 UTC [msp.identity] Verify -> DEBU 264e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:26.930 UTC [msp.identity] Verify -> DEBU 264f Verify: sig = 00000000 30 45 02 21 00 a7 64 41 01 a8 57 f3 75 a0 73 0a |0E.!..dA..W.u.s.| +peer0.org1.example.com | 00000010 d1 02 08 e8 a5 21 2f 62 d7 30 af 1a 5d 3d e2 69 |.....!/b.0..]=.i| +peer0.org1.example.com | 00000020 b9 5f 9d e5 00 02 20 48 1e a0 cd f5 1f d1 97 69 |._.... H.......i| +peer0.org1.example.com | 00000030 ca 36 00 79 f2 09 5d 55 7f ef 1e 41 57 76 72 20 |.6.y..]U...AWvr | +peer0.org1.example.com | 00000040 8c 74 9a 0f 29 27 4c |.t..)'L|" +peer0.org1.example.com | "2019-04-22 06:17:26.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 2650 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.930 UTC [gossip.discovery] isSentByMe -> DEBU 2651 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 2652 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2653 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2654 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2655 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:26.933 UTC [msp.identity] Verify -> DEBU 2656 Verify: digest = 00000000 00 56 b1 d0 bb a2 45 f8 10 d6 b8 93 fc 19 ad d8 |.V....E.........| +peer0.org1.example.com | 00000010 81 fa e1 30 9f f9 49 77 80 c5 a0 44 db b6 cc 38 |...0..Iw...D...8|" +peer0.org1.example.com | "2019-04-22 06:17:26.933 UTC [msp.identity] Verify -> DEBU 2657 Verify: sig = 00000000 30 44 02 20 5f aa 8a 64 a4 23 ea c6 3f 46 27 d3 |0D. _..d.#..?F'.| +peer0.org1.example.com | 00000010 4f 07 b5 75 e1 28 89 95 83 b2 e9 b5 13 c4 75 30 |O..u.(........u0| +peer0.org1.example.com | 00000020 3e ea 58 19 02 20 56 23 14 1f 9a 04 a7 dc a9 ca |>.X.. V#........| +peer0.org1.example.com | 00000030 d5 79 af 47 54 f0 f0 2e d5 22 32 82 a9 c4 d0 be |.y.GT...."2.....| +peer0.org1.example.com | 00000040 8d 91 a5 79 3a 78 |...y:x|" +peer0.org1.example.com | "2019-04-22 06:17:26.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 2659 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.935 UTC [gossip.discovery] isSentByMe -> DEBU 265a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.933 UTC [gossip.gossip] handleMessage -> DEBU 2658 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.936 UTC [gossip.gossip] handleMessage -> DEBU 265c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 265b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 265d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:26.936 UTC [msp] DeserializeIdentity -> DEBU 265e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 265f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2660 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2661 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [policies] Evaluate -> DEBU 2662 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [policies] Evaluate -> DEBU 2663 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [policies] Evaluate -> DEBU 2664 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [cauthdsl] func1 -> DEBU 2665 0xc0042dfeb0 gate 1555913846937697600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [cauthdsl] func2 -> DEBU 2666 0xc0042dfeb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:26.937 UTC [cauthdsl] func2 -> DEBU 2667 0xc0042dfeb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [cauthdsl] func2 -> DEBU 2668 0xc0042dfeb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [msp.identity] Verify -> DEBU 2669 Verify: digest = 00000000 f1 e5 67 88 67 58 e4 ac 85 06 2f 5d 05 05 a7 05 |..g.gX..../]....| +peer0.org1.example.com | 00000010 e6 4f 2c 34 18 e8 e8 86 06 5e f2 28 c6 2a c2 57 |.O,4.....^.(.*.W|" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [msp.identity] Verify -> DEBU 266a Verify: sig = 00000000 30 45 02 21 00 a0 7f 3c 19 0e 93 82 ad 9b b0 88 |0E.!...<........| +peer0.org1.example.com | 00000010 06 e4 d3 d7 12 03 29 bd 48 10 b8 ed 4c 91 d8 e2 |......).H...L...| +peer0.org1.example.com | 00000020 c9 c9 01 b5 f0 02 20 69 3b ac 89 d1 e6 5a 4e 1f |...... i;....ZN.| +peer0.org1.example.com | 00000030 33 07 39 0d 58 04 a6 4a bc 5b 9d f3 2a 1e 4c 4c |3.9.X..J.[..*.LL| +peer0.org1.example.com | 00000040 61 1a f1 7e f8 cb a0 |a..~...|" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [cauthdsl] func2 -> DEBU 266b 0xc0042dfeb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [cauthdsl] func1 -> DEBU 266c 0xc0042dfeb0 gate 1555913846937697600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [policies] Evaluate -> DEBU 266d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [policies] Evaluate -> DEBU 266e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.938 UTC [policies] Evaluate -> DEBU 266f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.939 UTC [policies] Evaluate -> DEBU 2670 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:26.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 2671 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 2672 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2673 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2674 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.939 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2675 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:26.940 UTC [msp.identity] Verify -> DEBU 2676 Verify: digest = 00000000 00 56 b1 d0 bb a2 45 f8 10 d6 b8 93 fc 19 ad d8 |.V....E.........| +peer0.org1.example.com | 00000010 81 fa e1 30 9f f9 49 77 80 c5 a0 44 db b6 cc 38 |...0..Iw...D...8|" +peer0.org1.example.com | "2019-04-22 06:17:26.940 UTC [msp.identity] Verify -> DEBU 2677 Verify: sig = 00000000 30 44 02 20 5f aa 8a 64 a4 23 ea c6 3f 46 27 d3 |0D. _..d.#..?F'.| +peer0.org1.example.com | 00000010 4f 07 b5 75 e1 28 89 95 83 b2 e9 b5 13 c4 75 30 |O..u.(........u0| +peer0.org1.example.com | 00000020 3e ea 58 19 02 20 56 23 14 1f 9a 04 a7 dc a9 ca |>.X.. V#........| +peer0.org1.example.com | 00000030 d5 79 af 47 54 f0 f0 2e d5 22 32 82 a9 c4 d0 be |.y.GT...."2.....| +peer0.org1.example.com | 00000040 8d 91 a5 79 3a 78 |...y:x|" +peer0.org1.example.com | "2019-04-22 06:17:26.940 UTC [gossip.gossip] handleMessage -> DEBU 2678 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 2679 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.941 UTC [gossip.discovery] isSentByMe -> DEBU 267a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:26.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 267b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:26.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 267c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.017 UTC [gossip.gossip] handleMessage -> DEBU 267d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.019 UTC [gossip.gossip] handleMessage -> DEBU 267e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 267f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.020 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2680 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:27.020 UTC [msp] DeserializeIdentity -> DEBU 2681 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2682 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:27.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2683 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:27.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2684 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:27.022 UTC [policies] Evaluate -> DEBU 2685 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:27.022 UTC [policies] Evaluate -> DEBU 2686 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:27.023 UTC [policies] Evaluate -> DEBU 2687 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:27.023 UTC [cauthdsl] func1 -> DEBU 2688 0xc0044d28a0 gate 1555913847023962000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:27.024 UTC [cauthdsl] func2 -> DEBU 2689 0xc0044d28a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:27.024 UTC [cauthdsl] func2 -> DEBU 268a 0xc0044d28a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:27.024 UTC [cauthdsl] func2 -> DEBU 268b 0xc0044d28a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:27.025 UTC [msp.identity] Verify -> DEBU 268c Verify: digest = 00000000 92 75 1a 7a 21 f8 5e e3 1e 02 01 18 33 b4 a8 99 |.u.z!.^.....3...| +peer0.org1.example.com | 00000010 95 7b ff de 05 a6 2f be cd 7d a7 d1 b9 a6 4b cc |.{..../..}....K.|" +peer0.org1.example.com | "2019-04-22 06:17:27.025 UTC [msp.identity] Verify -> DEBU 268d Verify: sig = 00000000 30 45 02 21 00 ec ad 15 7d 3e 88 e5 79 0e 22 c2 |0E.!....}>..y.".| +peer0.org1.example.com | 00000010 3e eb c7 4a 16 0f 3d 5c da 55 57 76 20 17 0e 9c |>..J..=\.UWv ...| +peer0.org1.example.com | 00000020 92 f3 49 5a 98 02 20 47 af f6 ad 32 9b 4f 02 bc |..IZ.. G...2.O..| +peer0.org1.example.com | 00000030 9a 3f f6 7c a5 d2 15 98 21 4f 0b fe 5b c0 5a f4 |.?.|....!O..[.Z.| +peer0.org1.example.com | 00000040 7b 53 64 06 de c6 d2 |{Sd....|" +peer0.org1.example.com | "2019-04-22 06:17:27.028 UTC [cauthdsl] func2 -> DEBU 268e 0xc0044d28a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:27.028 UTC [cauthdsl] func1 -> DEBU 268f 0xc0044d28a0 gate 1555913847023962000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:27.029 UTC [policies] Evaluate -> DEBU 2690 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.029 UTC [policies] Evaluate -> DEBU 2691 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.029 UTC [policies] Evaluate -> DEBU 2692 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.030 UTC [policies] Evaluate -> DEBU 2693 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.030 UTC [gossip.comm] func1 -> DEBU 2694 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.031 UTC [gossip.gossip] handleMessage -> DEBU 2695 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.031 UTC [gossip.comm] func1 -> DEBU 2696 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.031 UTC [gossip.discovery] handleAliveMessage -> DEBU 2697 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 2698 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:27.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 2699 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 " +peer0.org1.example.com | "2019-04-22 06:17:27.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 269a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 " +peer0.org1.example.com | "2019-04-22 06:17:27.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 269b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:27.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 269c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.033 UTC [gossip.discovery] handleAliveMessage -> DEBU 269d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 269e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 269f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.034 UTC [gossip.gossip] handleMessage -> DEBU 26a1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.035 UTC [gossip.gossip] handleMessage -> DEBU 26a2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.035 UTC [gossip.gossip] handleMessage -> DEBU 26a3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.035 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.037 UTC [msp] DeserializeIdentity -> DEBU 26a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.037 UTC [msp] DeserializeIdentity -> DEBU 26a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.038 UTC [msp] DeserializeIdentity -> DEBU 26a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.039 UTC [msp] DeserializeIdentity -> DEBU 26a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.039 UTC [msp] DeserializeIdentity -> DEBU 26aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.039 UTC [msp] DeserializeIdentity -> DEBU 26ab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.040 UTC [gossip.comm] Send -> DEBU 26ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:27.040 UTC [msp] DeserializeIdentity -> DEBU 26ad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.041 UTC [msp] DeserializeIdentity -> DEBU 26ae Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.041 UTC [gossip.comm] Send -> DEBU 26af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:27.041 UTC [gossip.comm] sendToEndpoint -> DEBU 26b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.042 UTC [gossip.comm] sendToEndpoint -> DEBU 26b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.042 UTC [gossip.comm] sendToEndpoint -> DEBU 26b3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.042 UTC [gossip.comm] sendToEndpoint -> DEBU 26b2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.130 UTC [gossip.comm] func1 -> DEBU 26b4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.131 UTC [gossip.gossip] handleMessage -> DEBU 26b5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.131 UTC [gossip.pull] HandleMessage -> DEBU 26b6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.132 UTC [gossip.pull] SendDigest -> DEBU 26b7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:27.132 UTC [gossip.gossip] handleMessage -> DEBU 26b8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.155 UTC [gossip.comm] func1 -> DEBU 26b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.155 UTC [gossip.gossip] handleMessage -> DEBU 26ba Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.155 UTC [gossip.gossip] handleMessage -> DEBU 26bb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26bd Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:27.156 UTC [msp.identity] Verify -> DEBU 26be Verify: digest = 00000000 3c 03 93 f5 2b b3 53 36 f4 13 b2 6b c4 6f 17 3a |<...+.S6...k.o.:| +peer0.org1.example.com | 00000010 39 da 5a d7 1b db 27 5f 40 85 55 ab e2 0e ad e9 |9.Z...'_@.U.....|" +peer0.org1.example.com | "2019-04-22 06:17:27.156 UTC [msp.identity] Verify -> DEBU 26bf Verify: sig = 00000000 30 45 02 21 00 f9 0b 19 8c 2d cb 9c 7e f2 13 0d |0E.!.....-..~...| +peer0.org1.example.com | 00000010 db 8a 6c 46 88 ed fd 93 1b 75 4a 3c 65 6e e3 36 |..lF.....uJ.i.!c| +peer0.org1.example.com | 00000030 24 20 96 b1 7d d7 4a 71 34 50 eb d7 0d 8f b6 e0 |$ ..}.Jq4P......| +peer0.org1.example.com | 00000040 b6 d4 e9 c3 33 fb 84 |....3..|" +peer0.org1.example.com | "2019-04-22 06:17:27.157 UTC [msp.identity] Verify -> DEBU 26c0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:27.157 UTC [msp.identity] Verify -> DEBU 26c1 Verify: sig = 00000000 30 45 02 21 00 da fd 0d 9f 7b 5c 12 0f 6c d9 c0 |0E.!.....{\..l..| +peer0.org1.example.com | 00000010 2e f3 97 1d 9f eb aa 3c 35 48 5b 49 a5 fe 94 05 |.......<5H[I....| +peer0.org1.example.com | 00000020 64 08 6c f2 2f 02 20 61 16 a0 ae 0d f1 a2 26 10 |d.l./. a......&.| +peer0.org1.example.com | 00000030 3d 7a 81 2a 35 a0 5f 32 53 ca e4 c0 fc 4e 30 3d |=z.*5._2S....N0=| +peer0.org1.example.com | 00000040 47 40 08 e1 f9 d2 22 |G@...."|" +peer0.org1.example.com | "2019-04-22 06:17:27.159 UTC [gossip.discovery] handleAliveMessage -> DEBU 26c2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 " +peer0.org1.example.com | "2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 " +peer0.org1.example.com | "2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 26c8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26c9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.163 UTC [gossip.discovery] sendMemResponse -> DEBU 26ca Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:27.164 UTC [msp] DeserializeIdentity -> DEBU 26cb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.165 UTC [msp] DeserializeIdentity -> DEBU 26cc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.165 UTC [gossip.comm] Send -> DEBU 26cd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:27.165 UTC [gossip.discovery] sendMemResponse -> DEBU 26ce Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:27.165 UTC [gossip.comm] sendToEndpoint -> DEBU 26cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.165 UTC [gossip.comm] sendToEndpoint -> DEBU 26d0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.589 UTC [gossip.comm] func1 -> DEBU 26d1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.590 UTC [gossip.gossip] handleMessage -> DEBU 26d2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.590 UTC [gossip.pull] HandleMessage -> DEBU 26d3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.591 UTC [msp] DeserializeIdentity -> DEBU 26d4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.591 UTC [msp] DeserializeIdentity -> DEBU 26d5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.591 UTC [msp] DeserializeIdentity -> DEBU 26d6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.592 UTC [msp] DeserializeIdentity -> DEBU 26d7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.592 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.593 UTC [msp] DeserializeIdentity -> DEBU 26d9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.593 UTC [gossip.pull] SendDigest -> DEBU 26da Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:27.594 UTC [gossip.gossip] handleMessage -> DEBU 26db Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.601 UTC [gossip.comm] func1 -> DEBU 26dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.602 UTC [gossip.gossip] handleMessage -> DEBU 26dd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.603 UTC [gossip.gossip] handleMessage -> DEBU 26de Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.604 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26e0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:27.604 UTC [msp] DeserializeIdentity -> DEBU 26e1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.605 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26e2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:27.605 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:27.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:27.613 UTC [policies] Evaluate -> DEBU 26e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:27.613 UTC [policies] Evaluate -> DEBU 26e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:27.614 UTC [policies] Evaluate -> DEBU 26e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:27.614 UTC [cauthdsl] func1 -> DEBU 26e8 0xc003930430 gate 1555913847614565200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:27.614 UTC [cauthdsl] func2 -> DEBU 26e9 0xc003930430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:27.615 UTC [cauthdsl] func2 -> DEBU 26ea 0xc003930430 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:27.615 UTC [cauthdsl] func2 -> DEBU 26eb 0xc003930430 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:27.616 UTC [msp.identity] Verify -> DEBU 26ec Verify: digest = 00000000 44 b2 06 e3 dd 55 de 0a 7d 7d e5 3d 63 d1 9c 5c |D....U..}}.=c..\| +peer0.org1.example.com | 00000010 f1 14 f9 7e dd 4f 9d 85 8c 8a 0b 46 c7 95 f0 b5 |...~.O.....F....|" +peer0.org1.example.com | "2019-04-22 06:17:27.616 UTC [msp.identity] Verify -> DEBU 26ed Verify: sig = 00000000 30 44 02 20 5d 3f 46 a9 ee b0 a9 d3 5c 6c 6a eb |0D. ]?F.....\lj.| +peer0.org1.example.com | 00000010 07 3c bb 75 41 61 15 d7 07 d4 53 0d 0b 8f b1 7c |.<.uAa....S....|| +peer0.org1.example.com | 00000020 f0 7b bd 8d 02 20 52 4e 09 32 a7 d7 36 f9 a4 51 |.{... RN.2..6..Q| +peer0.org1.example.com | 00000030 8c 73 4f 7b cf 85 58 fd 9c c8 c9 82 fe 2e ec 06 |.sO{..X.........| +peer0.org1.example.com | 00000040 f3 4b ef 4f 01 c2 |.K.O..|" +peer0.org1.example.com | "2019-04-22 06:17:27.617 UTC [cauthdsl] func2 -> DEBU 26ee 0xc003930430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:27.617 UTC [cauthdsl] func1 -> DEBU 26ef 0xc003930430 gate 1555913847614565200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:27.617 UTC [policies] Evaluate -> DEBU 26f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.618 UTC [policies] Evaluate -> DEBU 26f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.618 UTC [policies] Evaluate -> DEBU 26f2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.620 UTC [policies] Evaluate -> DEBU 26f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:27.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 26f4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:27.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f6 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 " +peer0.org1.example.com | "2019-04-22 06:17:27.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 " +peer0.org1.example.com | "2019-04-22 06:17:27.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:27.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.623 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fa Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26fb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:27.623 UTC [gossip.discovery] sendMemResponse -> DEBU 26fc Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:27.624 UTC [msp] DeserializeIdentity -> DEBU 26fd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.624 UTC [msp] DeserializeIdentity -> DEBU 26fe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.625 UTC [msp] DeserializeIdentity -> DEBU 26ff Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:27.625 UTC [gossip.comm] Send -> DEBU 2700 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:27.625 UTC [gossip.discovery] sendMemResponse -> DEBU 2701 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:27.626 UTC [gossip.comm] sendToEndpoint -> DEBU 2702 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:27.626 UTC [gossip.comm] sendToEndpoint -> DEBU 2703 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.007 UTC [gossip.gossip] handleMessage -> DEBU 2704 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.007 UTC [gossip.pull] HandleMessage -> DEBU 2705 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.007 UTC [msp] DeserializeIdentity -> DEBU 2706 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.008 UTC [msp] DeserializeIdentity -> DEBU 2707 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.008 UTC [msp] DeserializeIdentity -> DEBU 2708 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.009 UTC [msp] DeserializeIdentity -> DEBU 2709 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.009 UTC [msp] DeserializeIdentity -> DEBU 270a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.009 UTC [msp] DeserializeIdentity -> DEBU 270b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.009 UTC [gossip.pull] SendDigest -> DEBU 270c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:28.010 UTC [gossip.gossip] handleMessage -> DEBU 270d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.028 UTC [gossip.gossip] handleMessage -> DEBU 270e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.029 UTC [gossip.gossip] handleMessage -> DEBU 270f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2710 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.030 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2711 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:28.030 UTC [msp] DeserializeIdentity -> DEBU 2712 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.031 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2713 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:28.031 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2714 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.033 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2715 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.033 UTC [policies] Evaluate -> DEBU 2716 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.033 UTC [policies] Evaluate -> DEBU 2717 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:28.034 UTC [policies] Evaluate -> DEBU 2718 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.034 UTC [cauthdsl] func1 -> DEBU 2719 0xc0039a71c0 gate 1555913848034397800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:28.034 UTC [cauthdsl] func2 -> DEBU 271a 0xc0039a71c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:28.035 UTC [cauthdsl] func2 -> DEBU 271b 0xc0039a71c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:28.035 UTC [cauthdsl] func2 -> DEBU 271c 0xc0039a71c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.036 UTC [msp.identity] Verify -> DEBU 271d Verify: digest = 00000000 1c a2 82 41 69 17 74 79 86 65 84 a5 16 d7 a0 0e |...Ai.ty.e......| +peer0.org1.example.com | 00000010 ee b9 9c 52 84 20 0a 3d 93 7b f6 d7 99 65 33 76 |...R. .=.{...e3v|" +peer0.org1.example.com | "2019-04-22 06:17:28.036 UTC [msp.identity] Verify -> DEBU 271e Verify: sig = 00000000 30 45 02 21 00 ac e9 5b 5f ab 92 f3 ca 29 4b 2b |0E.!...[_....)K+| +peer0.org1.example.com | 00000010 17 83 13 6c 96 a0 d8 57 31 10 16 de bf e8 4d 27 |...l...W1.....M'| +peer0.org1.example.com | 00000020 95 fd 76 46 55 02 20 06 0f 78 4e b1 18 b0 32 d8 |..vFU. ..xN...2.| +peer0.org1.example.com | 00000030 e8 9b 65 c5 e7 a2 3a 71 02 83 f4 ad 86 c2 20 99 |..e...:q...... .| +peer0.org1.example.com | 00000040 50 1c b8 ec 05 92 de |P......|" +peer0.org1.example.com | "2019-04-22 06:17:28.038 UTC [cauthdsl] func2 -> DEBU 271f 0xc0039a71c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.039 UTC [cauthdsl] func1 -> DEBU 2720 0xc0039a71c0 gate 1555913848034397800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:28.039 UTC [policies] Evaluate -> DEBU 2721 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.039 UTC [policies] Evaluate -> DEBU 2722 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.040 UTC [policies] Evaluate -> DEBU 2723 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.040 UTC [policies] Evaluate -> DEBU 2724 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.041 UTC [gossip.discovery] handleAliveMessage -> DEBU 2725 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.041 UTC [gossip.discovery] learnExistingMembers -> DEBU 2726 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:28.041 UTC [gossip.discovery] learnExistingMembers -> DEBU 2727 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 " +peer0.org1.example.com | "2019-04-22 06:17:28.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 2728 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 " +peer0.org1.example.com | "2019-04-22 06:17:28.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 2729 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:28.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 272a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.043 UTC [gossip.discovery] handleAliveMessage -> DEBU 272b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 272c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.043 UTC [gossip.discovery] sendMemResponse -> DEBU 272d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:28.044 UTC [msp] DeserializeIdentity -> DEBU 272e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.044 UTC [msp] DeserializeIdentity -> DEBU 272f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.045 UTC [msp] DeserializeIdentity -> DEBU 2730 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.045 UTC [gossip.comm] Send -> DEBU 2731 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:28.045 UTC [gossip.discovery] sendMemResponse -> DEBU 2732 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 2733 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 2734 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.388 UTC [msp] DeserializeIdentity -> DEBU 2735 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.389 UTC [msp] DeserializeIdentity -> DEBU 2736 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.389 UTC [gossip.comm] Send -> DEBU 2737 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:28.389 UTC [gossip.comm] sendToEndpoint -> DEBU 2738 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.390 UTC [gossip.comm] sendToEndpoint -> DEBU 2739 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.390 UTC [gossip.comm] sendToEndpoint -> DEBU 273a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.391 UTC [gossip.comm] sendToEndpoint -> DEBU 273b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.391 UTC [gossip.comm] func1 -> DEBU 273c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.392 UTC [gossip.gossip] handleMessage -> DEBU 273d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.392 UTC [msp.identity] Verify -> DEBU 273e Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:28.392 UTC [msp.identity] Verify -> DEBU 273f Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [msp] DeserializeIdentity -> DEBU 2740 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [msp] DeserializeIdentity -> DEBU 2741 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2742 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2743 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2744 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [policies] Evaluate -> DEBU 2745 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [policies] Evaluate -> DEBU 2746 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [policies] Evaluate -> DEBU 2747 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [cauthdsl] func1 -> DEBU 2748 0xc003d4ae00 gate 1555913848393510600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 2749 0xc003d4ae00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 274a 0xc003d4ae00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 274b 0xc003d4ae00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [msp.identity] Verify -> DEBU 274c Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [msp.identity] Verify -> DEBU 274d Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 274e 0xc003d4ae00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [cauthdsl] func1 -> DEBU 274f 0xc003d4ae00 gate 1555913848393510600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2750 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2751 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2752 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2753 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [msp.identity] Verify -> DEBU 2754 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [msp.identity] Verify -> DEBU 2755 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [msp] DeserializeIdentity -> DEBU 2756 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [msp] DeserializeIdentity -> DEBU 2757 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2758 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2759 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 275a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 275b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 275c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 275d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.394 UTC [cauthdsl] func1 -> DEBU 275e 0xc003d92cf0 gate 1555913848394960500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 275f 0xc003d92cf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 2760 0xc003d92cf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 2761 0xc003d92cf0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [msp.identity] Verify -> DEBU 2762 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [msp.identity] Verify -> DEBU 2763 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 2764 0xc003d92cf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [cauthdsl] func1 -> DEBU 2765 0xc003d92cf0 gate 1555913848394960500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2766 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2768 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2769 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.395 UTC [gossip.gossip] handleMessage -> DEBU 276a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.396 UTC [gossip.comm] func1 -> DEBU 276b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.396 UTC [gossip.gossip] handleMessage -> DEBU 276c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.396 UTC [msp] DeserializeIdentity -> DEBU 276d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.396 UTC [msp] DeserializeIdentity -> DEBU 276e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.397 UTC [msp] DeserializeIdentity -> DEBU 276f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2770 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:28.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2771 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2772 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.397 UTC [policies] Evaluate -> DEBU 2773 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.397 UTC [policies] Evaluate -> DEBU 2774 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:28.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2775 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.398 UTC [policies] Evaluate -> DEBU 2776 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.398 UTC [cauthdsl] func1 -> DEBU 2777 0xc003eb2960 gate 1555913848398895800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:28.399 UTC [cauthdsl] func2 -> DEBU 2778 0xc003eb2960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:28.399 UTC [cauthdsl] func2 -> DEBU 2779 0xc003eb2960 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:28.399 UTC [cauthdsl] func2 -> DEBU 277a 0xc003eb2960 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.398 UTC [gossip.comm] sendToEndpoint -> DEBU 277b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.400 UTC [msp.identity] Verify -> DEBU 277c Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:28.400 UTC [msp.identity] Verify -> DEBU 277d Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:28.400 UTC [cauthdsl] func2 -> DEBU 277e 0xc003eb2960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.400 UTC [cauthdsl] func1 -> DEBU 277f 0xc003eb2960 gate 1555913848398895800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:28.400 UTC [policies] Evaluate -> DEBU 2780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.400 UTC [policies] Evaluate -> DEBU 2781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.400 UTC [policies] Evaluate -> DEBU 2782 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 2783 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [msp] DeserializeIdentity -> DEBU 2784 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [msp] DeserializeIdentity -> DEBU 2785 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2786 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2787 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2788 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 2789 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 278a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 278b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [cauthdsl] func1 -> DEBU 278c 0xc003f5c590 gate 1555913848401756300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [cauthdsl] func2 -> DEBU 278d 0xc003f5c590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [cauthdsl] func2 -> DEBU 278e 0xc003f5c590 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:28.401 UTC [cauthdsl] func2 -> DEBU 278f 0xc003f5c590 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2790 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2791 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [cauthdsl] func2 -> DEBU 2792 0xc003f5c590 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [cauthdsl] func1 -> DEBU 2793 0xc003f5c590 gate 1555913848401756300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2794 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2795 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2796 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2797 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2798 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2799 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:28.403 UTC [msp.identity] Verify -> DEBU 279a Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:28.403 UTC [msp.identity] Verify -> DEBU 279b Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:28.403 UTC [gossip.gossip] handleMessage -> DEBU 279c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.403 UTC [gossip.gossip] handleMessage -> DEBU 279d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.403 UTC [msp] DeserializeIdentity -> DEBU 279e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.403 UTC [msp] DeserializeIdentity -> DEBU 279f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.403 UTC [msp] DeserializeIdentity -> DEBU 27a0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.406 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27a1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:28.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.406 UTC [policies] Evaluate -> DEBU 27a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.406 UTC [policies] Evaluate -> DEBU 27a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:28.406 UTC [policies] Evaluate -> DEBU 27a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.406 UTC [cauthdsl] func1 -> DEBU 27a7 0xc0041fcee0 gate 1555913848406971300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27a8 0xc0041fcee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27a9 0xc0041fcee0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27aa 0xc0041fcee0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [msp.identity] Verify -> DEBU 27ab Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [msp.identity] Verify -> DEBU 27ac Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27ad 0xc0041fcee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [cauthdsl] func1 -> DEBU 27ae 0xc0041fcee0 gate 1555913848406971300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27b1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [msp] DeserializeIdentity -> DEBU 27b3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [msp] DeserializeIdentity -> DEBU 27b4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [policies] Evaluate -> DEBU 27b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [policies] Evaluate -> DEBU 27b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [policies] Evaluate -> DEBU 27ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [cauthdsl] func1 -> DEBU 27bb 0xc00435a6b0 gate 1555913848408582500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [cauthdsl] func2 -> DEBU 27bc 0xc00435a6b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [cauthdsl] func2 -> DEBU 27bd 0xc00435a6b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [cauthdsl] func2 -> DEBU 27be 0xc00435a6b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [msp.identity] Verify -> DEBU 27bf Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:28.408 UTC [msp.identity] Verify -> DEBU 27c0 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [cauthdsl] func2 -> DEBU 27c1 0xc00435a6b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [cauthdsl] func1 -> DEBU 27c2 0xc00435a6b0 gate 1555913848408582500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27c7 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27c8 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27c9 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27ca Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:28.410 UTC [gossip.gossip] handleMessage -> DEBU 27cb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.472 UTC [msp] DeserializeIdentity -> DEBU 27cc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.472 UTC [msp] DeserializeIdentity -> DEBU 27cd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.472 UTC [gossip.pull] Hello -> DEBU 27ce Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:28.473 UTC [msp] DeserializeIdentity -> DEBU 27cf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.473 UTC [msp] DeserializeIdentity -> DEBU 27d0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.474 UTC [gossip.comm] Send -> DEBU 27d1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:28.474 UTC [gossip.comm] sendToEndpoint -> DEBU 27d2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.474 UTC [gossip.comm] sendToEndpoint -> DEBU 27d3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.476 UTC [gossip.comm] func1 -> DEBU 27d4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16601679828563786798 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.476 UTC [gossip.gossip] handleMessage -> DEBU 27d5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16601679828563786798 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.476 UTC [gossip.pull] HandleMessage -> DEBU 27d6 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16601679828563786798 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.476 UTC [gossip.gossip] handleMessage -> DEBU 27d7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.646 UTC [gossip.comm] func1 -> DEBU 27d8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.646 UTC [gossip.gossip] handleMessage -> DEBU 27d9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.647 UTC [msp] DeserializeIdentity -> DEBU 27da Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.648 UTC [msp] DeserializeIdentity -> DEBU 27db Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.648 UTC [gossip.gossip] handleMessage -> DEBU 27dc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.672 UTC [gossip.comm] func1 -> DEBU 27dd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.673 UTC [gossip.gossip] handleMessage -> DEBU 27de Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.673 UTC [gossip.pull] HandleMessage -> DEBU 27df GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.673 UTC [gossip.pull] SendDigest -> DEBU 27e0 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:28.673 UTC [gossip.gossip] handleMessage -> DEBU 27e1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:28.870 UTC [gossip.gossip] handleMessage -> DEBU 27e2 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:28.871 UTC [msp] DeserializeIdentity -> DEBU 27e3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.871 UTC [msp] DeserializeIdentity -> DEBU 27e4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.872 UTC [msp] DeserializeIdentity -> DEBU 27e5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:28.872 UTC [gossip.gossip] handleMessage -> DEBU 27e6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:29.086 UTC [gossip.comm] func1 -> DEBU 27e7 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:29.086 UTC [gossip.gossip] handleMessage -> DEBU 27e8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:29.086 UTC [msp] DeserializeIdentity -> DEBU 27e9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:29.086 UTC [msp] DeserializeIdentity -> DEBU 27ea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:29.086 UTC [msp] DeserializeIdentity -> DEBU 27eb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:29.087 UTC [gossip.gossip] handleMessage -> DEBU 27ec Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.827 UTC [msp.identity] Sign -> DEBU 27ed Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151024 " +peer0.org1.example.com | "2019-04-22 06:17:30.828 UTC [msp.identity] Sign -> DEBU 27ee Sign: digest: B240AE3821E145D38E71F6020C3D992B89DCBF6E53B0CC7F2A7708F2E21521ED " +peer0.org1.example.com | "2019-04-22 06:17:30.828 UTC [msp.identity] Sign -> DEBU 27ef Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:30.828 UTC [msp.identity] Sign -> DEBU 27f0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:30.828 UTC [gossip.discovery] periodicalSendAlive -> DEBU 27f1 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:30.834 UTC [msp] DeserializeIdentity -> DEBU 27f2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.834 UTC [msp] DeserializeIdentity -> DEBU 27f3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.835 UTC [gossip.comm] Send -> DEBU 27f4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.835 UTC [msp] DeserializeIdentity -> DEBU 27f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.835 UTC [gossip.comm] Send -> DEBU 27f6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.835 UTC [msp] DeserializeIdentity -> DEBU 27f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.836 UTC [gossip.comm] Send -> DEBU 27f8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27f9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fa Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.837 UTC [gossip.comm] sendToEndpoint -> DEBU 27fe Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.875 UTC [gossip.pull] Hello -> DEBU 27ff Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:30.875 UTC [gossip.comm] Send -> DEBU 2800 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.875 UTC [gossip.pull] Hello -> DEBU 2801 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:30.876 UTC [gossip.comm] Send -> DEBU 2802 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.876 UTC [gossip.pull] Hello -> DEBU 2803 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:30.876 UTC [gossip.comm] Send -> DEBU 2804 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2805 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2806 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2807 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2808 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.878 UTC [gossip.comm] sendToEndpoint -> DEBU 2809 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.878 UTC [gossip.comm] sendToEndpoint -> DEBU 280a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.880 UTC [gossip.comm] func1 -> DEBU 280b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225548540752222031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.880 UTC [gossip.gossip] handleMessage -> DEBU 280c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225548540752222031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.880 UTC [gossip.pull] HandleMessage -> DEBU 280d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225548540752222031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.880 UTC [gossip.gossip] handleMessage -> DEBU 280e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.881 UTC [gossip.comm] func1 -> DEBU 280f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11107884482448524324 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.881 UTC [gossip.gossip] handleMessage -> DEBU 2810 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11107884482448524324 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.881 UTC [gossip.pull] HandleMessage -> DEBU 2811 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11107884482448524324 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.882 UTC [gossip.gossip] handleMessage -> DEBU 2812 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.882 UTC [gossip.gossip] handleMessage -> DEBU 2813 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11404403117458605259 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.882 UTC [gossip.pull] HandleMessage -> DEBU 2814 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11404403117458605259 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.882 UTC [gossip.gossip] handleMessage -> DEBU 2815 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2816 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151025 " +peer0.org1.example.com | "2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2817 Sign: digest: 304E60A458AE1E8B6D75992CA738AF5794051C98CCBF3A83C35A24BC91217C11 " +peer0.org1.example.com | "2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2818 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2819 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:30.918 UTC [msp] DeserializeIdentity -> DEBU 281a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.918 UTC [gossip.comm] Send -> DEBU 281b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.919 UTC [gossip.comm] Send -> DEBU 281c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.919 UTC [msp] DeserializeIdentity -> DEBU 281d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.919 UTC [gossip.comm] sendToEndpoint -> DEBU 281e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.919 UTC [gossip.comm] sendToEndpoint -> DEBU 281f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.920 UTC [gossip.comm] sendToEndpoint -> DEBU 2820 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.920 UTC [gossip.comm] sendToEndpoint -> DEBU 2821 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.919 UTC [gossip.comm] Send -> DEBU 2822 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:30.923 UTC [gossip.comm] sendToEndpoint -> DEBU 2823 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.923 UTC [gossip.comm] sendToEndpoint -> DEBU 2824 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.924 UTC [gossip.comm] func1 -> DEBU 2825 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.924 UTC [gossip.gossip] handleMessage -> DEBU 2826 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.924 UTC [gossip.gossip] handleMessage -> DEBU 2827 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.924 UTC [gossip.comm] func1 -> DEBU 2828 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.924 UTC [gossip.gossip] handleMessage -> DEBU 2829 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 282a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.925 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 282b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:30.925 UTC [msp] DeserializeIdentity -> DEBU 282c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 282d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:30.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 282e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:30.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 282f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:30.926 UTC [policies] Evaluate -> DEBU 2830 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:30.926 UTC [policies] Evaluate -> DEBU 2831 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:30.926 UTC [policies] Evaluate -> DEBU 2832 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:30.926 UTC [cauthdsl] func1 -> DEBU 2833 0xc002ed2f30 gate 1555913850926791200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:30.927 UTC [cauthdsl] func2 -> DEBU 2834 0xc002ed2f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:30.927 UTC [cauthdsl] func2 -> DEBU 2835 0xc002ed2f30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:30.927 UTC [cauthdsl] func2 -> DEBU 2836 0xc002ed2f30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:30.927 UTC [msp.identity] Verify -> DEBU 2837 Verify: digest = 00000000 1c a2 82 41 69 17 74 79 86 65 84 a5 16 d7 a0 0e |...Ai.ty.e......| +peer0.org1.example.com | 00000010 ee b9 9c 52 84 20 0a 3d 93 7b f6 d7 99 65 33 76 |...R. .=.{...e3v|" +peer0.org1.example.com | "2019-04-22 06:17:30.928 UTC [msp.identity] Verify -> DEBU 2838 Verify: sig = 00000000 30 45 02 21 00 ac e9 5b 5f ab 92 f3 ca 29 4b 2b |0E.!...[_....)K+| +peer0.org1.example.com | 00000010 17 83 13 6c 96 a0 d8 57 31 10 16 de bf e8 4d 27 |...l...W1.....M'| +peer0.org1.example.com | 00000020 95 fd 76 46 55 02 20 06 0f 78 4e b1 18 b0 32 d8 |..vFU. ..xN...2.| +peer0.org1.example.com | 00000030 e8 9b 65 c5 e7 a2 3a 71 02 83 f4 ad 86 c2 20 99 |..e...:q...... .| +peer0.org1.example.com | 00000040 50 1c b8 ec 05 92 de |P......|" +peer0.org1.example.com | "2019-04-22 06:17:30.929 UTC [cauthdsl] func2 -> DEBU 2839 0xc002ed2f30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:30.930 UTC [cauthdsl] func1 -> DEBU 283a 0xc002ed2f30 gate 1555913850926791200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:30.930 UTC [policies] Evaluate -> DEBU 283b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.931 UTC [policies] Evaluate -> DEBU 283c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.931 UTC [policies] Evaluate -> DEBU 283d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.931 UTC [policies] Evaluate -> DEBU 283e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 283f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 2840 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2841 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:30.934 UTC [msp.identity] Verify -> DEBU 2842 Verify: digest = 00000000 3c 03 93 f5 2b b3 53 36 f4 13 b2 6b c4 6f 17 3a |<...+.S6...k.o.:| +peer0.org1.example.com | 00000010 39 da 5a d7 1b db 27 5f 40 85 55 ab e2 0e ad e9 |9.Z...'_@.U.....|" +peer0.org1.example.com | "2019-04-22 06:17:30.934 UTC [msp.identity] Verify -> DEBU 2843 Verify: sig = 00000000 30 45 02 21 00 f9 0b 19 8c 2d cb 9c 7e f2 13 0d |0E.!.....-..~...| +peer0.org1.example.com | 00000010 db 8a 6c 46 88 ed fd 93 1b 75 4a 3c 65 6e e3 36 |..lF.....uJ.i.!c| +peer0.org1.example.com | 00000030 24 20 96 b1 7d d7 4a 71 34 50 eb d7 0d 8f b6 e0 |$ ..}.Jq4P......| +peer0.org1.example.com | 00000040 b6 d4 e9 c3 33 fb 84 |....3..|" +peer0.org1.example.com | "2019-04-22 06:17:30.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 2844 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 2845 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2846 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:30.935 UTC [msp.identity] Verify -> DEBU 2847 Verify: digest = 00000000 30 4e 60 a4 58 ae 1e 8b 6d 75 99 2c a7 38 af 57 |0N`.X...mu.,.8.W| +peer0.org1.example.com | 00000010 94 05 1c 98 cc bf 3a 83 c3 5a 24 bc 91 21 7c 11 |......:..Z$..!|.|" +peer0.org1.example.com | "2019-04-22 06:17:30.935 UTC [msp.identity] Verify -> DEBU 2848 Verify: sig = 00000000 30 45 02 21 00 f4 51 c8 37 c7 af 33 fc 9e d0 90 |0E.!..Q.7..3....| +peer0.org1.example.com | 00000010 7d 91 3e 14 7d f1 a2 ee 32 e5 7e 7a e8 51 a0 05 |}.>.}...2.~z.Q..| +peer0.org1.example.com | 00000020 22 0b f6 7e 3f 02 20 0f 3c 62 4f 02 fe 1b 61 db |"..~?. . DEBU 2849 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.936 UTC [gossip.discovery] isSentByMe -> DEBU 284a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 284b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 284c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 284d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.937 UTC [gossip.gossip] handleMessage -> DEBU 284e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.937 UTC [gossip.gossip] handleMessage -> DEBU 284f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2850 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:30.939 UTC [msp.identity] Verify -> DEBU 2851 Verify: digest = 00000000 30 4e 60 a4 58 ae 1e 8b 6d 75 99 2c a7 38 af 57 |0N`.X...mu.,.8.W| +peer0.org1.example.com | 00000010 94 05 1c 98 cc bf 3a 83 c3 5a 24 bc 91 21 7c 11 |......:..Z$..!|.|" +peer0.org1.example.com | "2019-04-22 06:17:30.939 UTC [msp.identity] Verify -> DEBU 2852 Verify: sig = 00000000 30 45 02 21 00 f4 51 c8 37 c7 af 33 fc 9e d0 90 |0E.!..Q.7..3....| +peer0.org1.example.com | 00000010 7d 91 3e 14 7d f1 a2 ee 32 e5 7e 7a e8 51 a0 05 |}.>.}...2.~z.Q..| +peer0.org1.example.com | 00000020 22 0b f6 7e 3f 02 20 0f 3c 62 4f 02 fe 1b 61 db |"..~?. . DEBU 2853 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:30.940 UTC [msp.identity] Verify -> DEBU 2854 Verify: sig = 00000000 30 44 02 20 1c 76 36 b6 db 8e 16 f2 76 6c 81 92 |0D. .v6.....vl..| +peer0.org1.example.com | 00000010 fd 83 ca cb c6 7f 8a dd a6 ff 73 ab 92 e4 f2 b9 |..........s.....| +peer0.org1.example.com | 00000020 72 52 db 1f 02 20 10 72 f1 be 20 8a a7 42 fc bd |rR... .r.. ..B..| +peer0.org1.example.com | 00000030 0a 66 ec c3 4a 3b f6 cc 07 4a 3a 63 73 4c 20 64 |.f..J;...J:csL d| +peer0.org1.example.com | 00000040 75 75 62 5d 09 b9 |uub]..|" +peer0.org1.example.com | "2019-04-22 06:17:30.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 2855 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.942 UTC [gossip.discovery] isSentByMe -> DEBU 2856 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 2857 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2858 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.942 UTC [gossip.gossip] handleMessage -> DEBU 2859 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 285a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.943 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 285b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:30.943 UTC [msp.identity] Verify -> DEBU 285c Verify: digest = 00000000 3c 03 93 f5 2b b3 53 36 f4 13 b2 6b c4 6f 17 3a |<...+.S6...k.o.:| +peer0.org1.example.com | 00000010 39 da 5a d7 1b db 27 5f 40 85 55 ab e2 0e ad e9 |9.Z...'_@.U.....|" +peer0.org1.example.com | "2019-04-22 06:17:30.943 UTC [msp.identity] Verify -> DEBU 285d Verify: sig = 00000000 30 45 02 21 00 f9 0b 19 8c 2d cb 9c 7e f2 13 0d |0E.!.....-..~...| +peer0.org1.example.com | 00000010 db 8a 6c 46 88 ed fd 93 1b 75 4a 3c 65 6e e3 36 |..lF.....uJ.i.!c| +peer0.org1.example.com | 00000030 24 20 96 b1 7d d7 4a 71 34 50 eb d7 0d 8f b6 e0 |$ ..}.Jq4P......| +peer0.org1.example.com | 00000040 b6 d4 e9 c3 33 fb 84 |....3..|" +peer0.org1.example.com | "2019-04-22 06:17:30.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 285e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 285f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.946 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2860 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:30.947 UTC [msp.identity] Verify -> DEBU 2861 Verify: digest = 00000000 30 4e 60 a4 58 ae 1e 8b 6d 75 99 2c a7 38 af 57 |0N`.X...mu.,.8.W| +peer0.org1.example.com | 00000010 94 05 1c 98 cc bf 3a 83 c3 5a 24 bc 91 21 7c 11 |......:..Z$..!|.|" +peer0.org1.example.com | "2019-04-22 06:17:30.947 UTC [msp.identity] Verify -> DEBU 2862 Verify: sig = 00000000 30 45 02 21 00 f4 51 c8 37 c7 af 33 fc 9e d0 90 |0E.!..Q.7..3....| +peer0.org1.example.com | 00000010 7d 91 3e 14 7d f1 a2 ee 32 e5 7e 7a e8 51 a0 05 |}.>.}...2.~z.Q..| +peer0.org1.example.com | 00000020 22 0b f6 7e 3f 02 20 0f 3c 62 4f 02 fe 1b 61 db |"..~?. . DEBU 2863 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.948 UTC [gossip.discovery] isSentByMe -> DEBU 2864 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 2865 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2866 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:30.948 UTC [msp] DeserializeIdentity -> DEBU 2867 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:30.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2868 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:30.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2869 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:30.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 286a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:30.949 UTC [policies] Evaluate -> DEBU 286b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:30.950 UTC [policies] Evaluate -> DEBU 286c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:30.950 UTC [policies] Evaluate -> DEBU 286d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:30.950 UTC [cauthdsl] func1 -> DEBU 286e 0xc002772d90 gate 1555913850950243200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:30.950 UTC [cauthdsl] func2 -> DEBU 286f 0xc002772d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:30.950 UTC [cauthdsl] func2 -> DEBU 2870 0xc002772d90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:30.950 UTC [cauthdsl] func2 -> DEBU 2871 0xc002772d90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:30.951 UTC [msp.identity] Verify -> DEBU 2872 Verify: digest = 00000000 44 b2 06 e3 dd 55 de 0a 7d 7d e5 3d 63 d1 9c 5c |D....U..}}.=c..\| +peer0.org1.example.com | 00000010 f1 14 f9 7e dd 4f 9d 85 8c 8a 0b 46 c7 95 f0 b5 |...~.O.....F....|" +peer0.org1.example.com | "2019-04-22 06:17:30.951 UTC [msp.identity] Verify -> DEBU 2873 Verify: sig = 00000000 30 44 02 20 5d 3f 46 a9 ee b0 a9 d3 5c 6c 6a eb |0D. ]?F.....\lj.| +peer0.org1.example.com | 00000010 07 3c bb 75 41 61 15 d7 07 d4 53 0d 0b 8f b1 7c |.<.uAa....S....|| +peer0.org1.example.com | 00000020 f0 7b bd 8d 02 20 52 4e 09 32 a7 d7 36 f9 a4 51 |.{... RN.2..6..Q| +peer0.org1.example.com | 00000030 8c 73 4f 7b cf 85 58 fd 9c c8 c9 82 fe 2e ec 06 |.sO{..X.........| +peer0.org1.example.com | 00000040 f3 4b ef 4f 01 c2 |.K.O..|" +peer0.org1.example.com | "2019-04-22 06:17:30.951 UTC [cauthdsl] func2 -> DEBU 2874 0xc002772d90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:30.952 UTC [cauthdsl] func1 -> DEBU 2875 0xc002772d90 gate 1555913850950243200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2876 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2877 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2878 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2879 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:30.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 287a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:30.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 287b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:30.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 287c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.112 UTC [gossip.comm] func1 -> DEBU 287d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.112 UTC [gossip.gossip] handleMessage -> DEBU 287e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.112 UTC [gossip.gossip] handleMessage -> DEBU 287f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2880 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.113 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2881 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:31.114 UTC [msp.identity] Verify -> DEBU 2882 Verify: digest = 00000000 1e a3 f0 36 8d 5d 92 e0 bd 2c db 64 12 06 f3 fa |...6.]...,.d....| +peer0.org1.example.com | 00000010 79 4c 1f 91 8f 2f 99 54 7d 8c bc 38 6d 38 64 d3 |yL.../.T}..8m8d.|" +peer0.org1.example.com | "2019-04-22 06:17:31.115 UTC [msp.identity] Verify -> DEBU 2883 Verify: sig = 00000000 30 45 02 21 00 c3 d1 94 7a 2a fb e4 97 25 7e 28 |0E.!....z*...%~(| +peer0.org1.example.com | 00000010 c6 83 24 b5 85 eb 3f 17 0e c2 46 87 a1 0e 8c 66 |..$...?...F....f| +peer0.org1.example.com | 00000020 81 1e 68 86 73 02 20 6c f2 f2 20 6a c7 c6 a7 a2 |..h.s. l.. j....| +peer0.org1.example.com | 00000030 b6 11 4c e1 10 bf 7d d5 57 89 a2 93 bb 9a b7 38 |..L...}.W......8| +peer0.org1.example.com | 00000040 c1 5e 75 31 65 86 f2 |.^u1e..|" +peer0.org1.example.com | "2019-04-22 06:17:31.116 UTC [msp.identity] Verify -> DEBU 2884 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:31.116 UTC [msp.identity] Verify -> DEBU 2885 Verify: sig = 00000000 30 45 02 21 00 a5 7b 39 ff 8b 3a 96 a7 a9 e9 69 |0E.!..{9..:....i| +peer0.org1.example.com | 00000010 77 f9 8a 29 de e0 6a 08 69 b9 63 45 ac 71 29 1f |w..)..j.i.cE.q).| +peer0.org1.example.com | 00000020 a9 a0 fa 1f 5e 02 20 57 a4 17 09 7d a2 74 46 55 |....^. W...}.tFU| +peer0.org1.example.com | 00000030 4b 20 db db 53 76 53 fc 96 06 6d 52 47 2e 8a e9 |K ..SvS...mRG...| +peer0.org1.example.com | 00000040 19 60 9b c5 7e c1 12 |.`..~..|" +peer0.org1.example.com | "2019-04-22 06:17:31.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 2886 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2887 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2888 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 " +peer0.org1.example.com | "2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2889 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 " +peer0.org1.example.com | "2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 288a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 288b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 288c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 288d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.120 UTC [msp] DeserializeIdentity -> DEBU 288e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.120 UTC [msp] DeserializeIdentity -> DEBU 288f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.121 UTC [msp] DeserializeIdentity -> DEBU 2890 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.121 UTC [gossip.comm] Send -> DEBU 2891 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:31.122 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.122 UTC [gossip.comm] Send -> DEBU 2893 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:31.122 UTC [gossip.comm] sendToEndpoint -> DEBU 2894 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.122 UTC [gossip.comm] sendToEndpoint -> DEBU 2895 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.123 UTC [gossip.comm] sendToEndpoint -> DEBU 2896 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.123 UTC [gossip.comm] sendToEndpoint -> DEBU 2897 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.125 UTC [gossip.comm] func1 -> DEBU 2898 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.125 UTC [gossip.gossip] handleMessage -> DEBU 2899 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.125 UTC [gossip.gossip] handleMessage -> DEBU 289a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.126 UTC [gossip.gossip] handleMessage -> DEBU 289d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.127 UTC [gossip.gossip] handleMessage -> DEBU 289e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.134 UTC [gossip.comm] func1 -> DEBU 28a1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.134 UTC [gossip.gossip] handleMessage -> DEBU 28a2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.134 UTC [gossip.pull] HandleMessage -> DEBU 28a3 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.134 UTC [gossip.pull] SendDigest -> DEBU 28a4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:31.135 UTC [gossip.gossip] handleMessage -> DEBU 28a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.156 UTC [gossip.comm] func1 -> DEBU 28a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.156 UTC [gossip.gossip] handleMessage -> DEBU 28a7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.156 UTC [gossip.gossip] handleMessage -> DEBU 28a8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.157 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28aa Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:31.158 UTC [msp.identity] Verify -> DEBU 28ab Verify: digest = 00000000 a1 33 1b aa 18 67 dd bf e0 df 37 e0 b1 4b 77 3d |.3...g....7..Kw=| +peer0.org1.example.com | 00000010 4d d0 73 69 32 ca 6c 52 a3 83 5d aa 32 5a 6c 25 |M.si2.lR..].2Zl%|" +peer0.org1.example.com | "2019-04-22 06:17:31.158 UTC [msp.identity] Verify -> DEBU 28ac Verify: sig = 00000000 30 44 02 20 41 9d 1b c0 07 e8 cc 5a 28 d6 cb 03 |0D. A......Z(...| +peer0.org1.example.com | 00000010 85 34 65 85 7a 8b e1 47 79 b3 31 11 ba 86 99 96 |.4e.z..Gy.1.....| +peer0.org1.example.com | 00000020 02 d0 4a fe 02 20 22 ee 04 ea d0 54 eb 4e 94 18 |..J.. "....T.N..| +peer0.org1.example.com | 00000030 dd 41 76 96 ca c1 0d 66 41 35 7f 0b f5 c8 dc bf |.Av....fA5......| +peer0.org1.example.com | 00000040 50 49 a2 15 8c 90 |PI....|" +peer0.org1.example.com | "2019-04-22 06:17:31.159 UTC [msp.identity] Verify -> DEBU 28ad Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:31.159 UTC [msp.identity] Verify -> DEBU 28ae Verify: sig = 00000000 30 44 02 20 55 86 5d 3c d9 3c 5a d8 10 6c 81 3b |0D. U.]<. DEBU 28af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:31.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b1 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 " +peer0.org1.example.com | "2019-04-22 06:17:31.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 " +peer0.org1.example.com | "2019-04-22 06:17:31.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:31.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.161 UTC [gossip.discovery] handleAliveMessage -> DEBU 28b5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.162 UTC [gossip.discovery] sendMemResponse -> DEBU 28b7 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:31.163 UTC [msp] DeserializeIdentity -> DEBU 28b8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.163 UTC [msp] DeserializeIdentity -> DEBU 28b9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.163 UTC [gossip.comm] Send -> DEBU 28ba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:31.164 UTC [gossip.discovery] sendMemResponse -> DEBU 28bb Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:31.164 UTC [gossip.comm] sendToEndpoint -> DEBU 28bc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.164 UTC [gossip.comm] sendToEndpoint -> DEBU 28bd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.451 UTC [gossip.election] waitForInterrupt -> DEBU 28be c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.451 UTC [gossip.election] IsLeader -> DEBU 28bf c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:31.451 UTC [msp.identity] Sign -> DEBU 28c0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100B1801 " +peer0.org1.example.com | "2019-04-22 06:17:31.451 UTC [msp.identity] Sign -> DEBU 28c1 Sign: digest: 842B870A65C0700A716F2C3AD81C8A2FB2BD772F44676F31ED3923249EB83823 " +peer0.org1.example.com | "2019-04-22 06:17:31.452 UTC [gossip.election] waitForInterrupt -> DEBU 28c2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:31.454 UTC [msp] DeserializeIdentity -> DEBU 28c3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.455 UTC [msp] DeserializeIdentity -> DEBU 28c4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.455 UTC [msp] DeserializeIdentity -> DEBU 28c5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.455 UTC [msp] DeserializeIdentity -> DEBU 28c6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.456 UTC [gossip.comm] Send -> DEBU 28c7 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:31.456 UTC [msp] DeserializeIdentity -> DEBU 28c8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.456 UTC [msp] DeserializeIdentity -> DEBU 28c9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.457 UTC [gossip.comm] sendToEndpoint -> DEBU 28ca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.457 UTC [gossip.comm] sendToEndpoint -> DEBU 28cb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.590 UTC [gossip.comm] func1 -> DEBU 28cc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.590 UTC [gossip.gossip] handleMessage -> DEBU 28cd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.591 UTC [gossip.pull] HandleMessage -> DEBU 28ce GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.591 UTC [msp] DeserializeIdentity -> DEBU 28cf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.593 UTC [msp] DeserializeIdentity -> DEBU 28d4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.593 UTC [gossip.pull] SendDigest -> DEBU 28d5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:31.593 UTC [gossip.gossip] handleMessage -> DEBU 28d6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.597 UTC [gossip.comm] func1 -> DEBU 28d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.597 UTC [gossip.gossip] handleMessage -> DEBU 28d8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.598 UTC [gossip.gossip] handleMessage -> DEBU 28d9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.598 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28db Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:31.598 UTC [msp] DeserializeIdentity -> DEBU 28dc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28de Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [policies] Evaluate -> DEBU 28e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [policies] Evaluate -> DEBU 28e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [policies] Evaluate -> DEBU 28e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [cauthdsl] func1 -> DEBU 28e3 0xc003214770 gate 1555913851599723700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:31.599 UTC [cauthdsl] func2 -> DEBU 28e4 0xc003214770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:31.600 UTC [cauthdsl] func2 -> DEBU 28e5 0xc003214770 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:31.600 UTC [cauthdsl] func2 -> DEBU 28e6 0xc003214770 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:31.600 UTC [msp.identity] Verify -> DEBU 28e7 Verify: digest = 00000000 e8 c2 8e 49 b5 20 70 13 ba 55 79 ce fa 96 9e 65 |...I. p..Uy....e| +peer0.org1.example.com | 00000010 a0 14 c2 99 f7 00 67 22 8d f1 99 4f fa e6 fe 70 |......g"...O...p|" +peer0.org1.example.com | "2019-04-22 06:17:31.600 UTC [msp.identity] Verify -> DEBU 28e8 Verify: sig = 00000000 30 44 02 20 3f e7 dc 55 3c 70 cb 9d d9 97 3f 1c |0D. ?..U.7.| +peer0.org1.example.com | 00000020 fd 4a 62 d6 02 20 26 bf 5c a4 72 f9 c9 62 2c ef |.Jb.. &.\.r..b,.| +peer0.org1.example.com | 00000030 78 a8 b8 9e 69 b4 ad 6f e0 fc 91 3c 42 5a 49 5b |x...i..o... DEBU 28e9 0xc003214770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:31.601 UTC [cauthdsl] func1 -> DEBU 28ea 0xc003214770 gate 1555913851599723700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:31.601 UTC [policies] Evaluate -> DEBU 28eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.601 UTC [policies] Evaluate -> DEBU 28ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.603 UTC [policies] Evaluate -> DEBU 28ed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.603 UTC [policies] Evaluate -> DEBU 28ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.604 UTC [gossip.discovery] handleAliveMessage -> DEBU 28ef Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:31.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 " +peer0.org1.example.com | "2019-04-22 06:17:31.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 " +peer0.org1.example.com | "2019-04-22 06:17:31.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:31.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.606 UTC [gossip.discovery] handleAliveMessage -> DEBU 28f5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28f6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.608 UTC [gossip.gossip] handleMessage -> DEBU 28f7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.608 UTC [gossip.gossip] handleMessage -> DEBU 28f8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.608 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.608 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28fa Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.611 UTC [msp] DeserializeIdentity -> DEBU 28fc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.612 UTC [msp] DeserializeIdentity -> DEBU 28fd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.612 UTC [msp] DeserializeIdentity -> DEBU 28fe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.611 UTC [gossip.comm] func1 -> DEBU 28fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.613 UTC [msp] DeserializeIdentity -> DEBU 28ff Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.614 UTC [msp] DeserializeIdentity -> DEBU 2901 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.614 UTC [msp] DeserializeIdentity -> DEBU 2902 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.615 UTC [gossip.comm] Send -> DEBU 2903 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:31.613 UTC [gossip.gossip] handleMessage -> DEBU 2900 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.615 UTC [gossip.gossip] handleMessage -> DEBU 2905 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2906 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2907 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.615 UTC [msp] DeserializeIdentity -> DEBU 2904 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.616 UTC [msp] DeserializeIdentity -> DEBU 2908 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.616 UTC [gossip.comm] Send -> DEBU 2909 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:31.616 UTC [gossip.comm] sendToEndpoint -> DEBU 290a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.616 UTC [gossip.comm] sendToEndpoint -> DEBU 290b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.616 UTC [gossip.comm] sendToEndpoint -> DEBU 290c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.617 UTC [gossip.comm] sendToEndpoint -> DEBU 290d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.624 UTC [gossip.comm] func1 -> DEBU 290e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.625 UTC [gossip.gossip] handleMessage -> DEBU 290f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.625 UTC [gossip.gossip] handleMessage -> DEBU 2910 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2911 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.626 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2912 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:31.627 UTC [msp] DeserializeIdentity -> DEBU 2913 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2914 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:31.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2915 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:31.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2916 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:31.628 UTC [policies] Evaluate -> DEBU 2917 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:31.628 UTC [policies] Evaluate -> DEBU 2918 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:31.629 UTC [policies] Evaluate -> DEBU 2919 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:31.629 UTC [cauthdsl] func1 -> DEBU 291a 0xc0039cc660 gate 1555913851629338400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:31.629 UTC [cauthdsl] func2 -> DEBU 291b 0xc0039cc660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:31.630 UTC [cauthdsl] func2 -> DEBU 291c 0xc0039cc660 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:31.630 UTC [cauthdsl] func2 -> DEBU 291d 0xc0039cc660 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:31.630 UTC [msp.identity] Verify -> DEBU 291e Verify: digest = 00000000 58 9f d3 12 8f d6 80 98 97 a7 e0 54 3f 7f 3a 40 |X..........T?.:@| +peer0.org1.example.com | 00000010 d3 46 38 b2 cb 60 e4 72 b1 44 c8 0b 42 ec c5 c3 |.F8..`.r.D..B...|" +peer0.org1.example.com | "2019-04-22 06:17:31.631 UTC [msp.identity] Verify -> DEBU 291f Verify: sig = 00000000 30 44 02 20 14 c2 07 88 8a ef 91 83 82 1e c6 ad |0D. ............| +peer0.org1.example.com | 00000010 c3 f8 66 7f f8 f1 e8 b1 9b fe 5e a8 01 2b c6 6a |..f.......^..+.j| +peer0.org1.example.com | 00000020 d4 0b 93 7c 02 20 29 10 85 e0 01 b4 b5 ec e9 f0 |...|. ).........| +peer0.org1.example.com | 00000030 60 08 f7 be dd f3 05 d2 3d cf 43 d8 f3 55 3e b3 |`.......=.C..U>.| +peer0.org1.example.com | 00000040 31 73 d3 2d a3 24 |1s.-.$|" +peer0.org1.example.com | "2019-04-22 06:17:31.631 UTC [cauthdsl] func2 -> DEBU 2920 0xc0039cc660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:31.633 UTC [cauthdsl] func1 -> DEBU 2921 0xc0039cc660 gate 1555913851629338400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:31.634 UTC [policies] Evaluate -> DEBU 2922 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.634 UTC [policies] Evaluate -> DEBU 2923 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.635 UTC [policies] Evaluate -> DEBU 2924 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.636 UTC [policies] Evaluate -> DEBU 2925 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:31.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 2926 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 2927 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:31.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 2928 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 " +peer0.org1.example.com | "2019-04-22 06:17:31.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 2929 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 " +peer0.org1.example.com | "2019-04-22 06:17:31.641 UTC [gossip.discovery] learnExistingMembers -> DEBU 292a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:31.641 UTC [gossip.discovery] learnExistingMembers -> DEBU 292b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.642 UTC [gossip.discovery] handleAliveMessage -> DEBU 292c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 292d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:31.642 UTC [gossip.discovery] sendMemResponse -> DEBU 292e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:31.643 UTC [msp] DeserializeIdentity -> DEBU 292f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.643 UTC [msp] DeserializeIdentity -> DEBU 2930 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.644 UTC [msp] DeserializeIdentity -> DEBU 2931 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:31.644 UTC [gossip.comm] Send -> DEBU 2932 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:31.645 UTC [gossip.discovery] sendMemResponse -> DEBU 2933 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:31.645 UTC [gossip.comm] sendToEndpoint -> DEBU 2934 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:31.645 UTC [gossip.comm] sendToEndpoint -> DEBU 2935 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.009 UTC [gossip.gossip] handleMessage -> DEBU 2936 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.009 UTC [gossip.pull] HandleMessage -> DEBU 2937 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.009 UTC [msp] DeserializeIdentity -> DEBU 2938 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.009 UTC [msp] DeserializeIdentity -> DEBU 2939 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.009 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.010 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.010 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.010 UTC [msp] DeserializeIdentity -> DEBU 293d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.010 UTC [gossip.pull] SendDigest -> DEBU 293e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:32.010 UTC [gossip.gossip] handleMessage -> DEBU 293f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.021 UTC [gossip.gossip] handleMessage -> DEBU 2940 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.021 UTC [gossip.gossip] handleMessage -> DEBU 2941 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2942 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2943 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:32.021 UTC [msp] DeserializeIdentity -> DEBU 2944 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2945 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2946 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2947 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.022 UTC [policies] Evaluate -> DEBU 2948 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.022 UTC [policies] Evaluate -> DEBU 2949 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.022 UTC [policies] Evaluate -> DEBU 294a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.022 UTC [cauthdsl] func1 -> DEBU 294b 0xc0039dd1c0 gate 1555913852022971200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.023 UTC [cauthdsl] func2 -> DEBU 294c 0xc0039dd1c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.023 UTC [cauthdsl] func2 -> DEBU 294d 0xc0039dd1c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.023 UTC [cauthdsl] func2 -> DEBU 294e 0xc0039dd1c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.023 UTC [msp.identity] Verify -> DEBU 294f Verify: digest = 00000000 29 60 e6 2c 81 35 71 32 8a db f5 f6 12 02 6a 30 |)`.,.5q2......j0| +peer0.org1.example.com | 00000010 9f 5c be 15 f8 39 dc 31 45 15 b9 7c 03 73 14 31 |.\...9.1E..|.s.1|" +peer0.org1.example.com | "2019-04-22 06:17:32.023 UTC [msp.identity] Verify -> DEBU 2950 Verify: sig = 00000000 30 45 02 21 00 99 e3 86 3d e9 bc 92 fc 5c 07 68 |0E.!....=....\.h| +peer0.org1.example.com | 00000010 3c 3e 88 87 4c 0e 89 91 c6 69 67 00 a8 7f c8 52 |<>..L....ig....R| +peer0.org1.example.com | 00000020 be b1 82 29 3d 02 20 59 ac e3 f8 d7 51 f2 ff 6e |...)=. Y....Q..n| +peer0.org1.example.com | 00000030 99 58 c2 46 59 1f f0 0b 39 0f 68 5c b5 78 70 08 |.X.FY...9.h\.xp.| +peer0.org1.example.com | 00000040 91 6c e9 4a 5f 5d 5c |.l.J_]\|" +peer0.org1.example.com | "2019-04-22 06:17:32.024 UTC [cauthdsl] func2 -> DEBU 2951 0xc0039dd1c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.024 UTC [cauthdsl] func1 -> DEBU 2952 0xc0039dd1c0 gate 1555913852022971200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.024 UTC [policies] Evaluate -> DEBU 2953 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.024 UTC [policies] Evaluate -> DEBU 2954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.025 UTC [policies] Evaluate -> DEBU 2955 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.025 UTC [policies] Evaluate -> DEBU 2956 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.025 UTC [gossip.discovery] handleAliveMessage -> DEBU 2957 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.025 UTC [gossip.discovery] learnExistingMembers -> DEBU 2958 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 2959 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 " +peer0.org1.example.com | "2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 295a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 " +peer0.org1.example.com | "2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 295b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 295c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.026 UTC [gossip.discovery] handleAliveMessage -> DEBU 295d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.026 UTC [gossip.discovery] handleMsgFromComm -> DEBU 295e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.030 UTC [gossip.comm] func1 -> DEBU 295f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.030 UTC [gossip.gossip] handleMessage -> DEBU 2960 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.030 UTC [gossip.gossip] handleMessage -> DEBU 2961 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2962 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2963 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.034 UTC [gossip.gossip] handleMessage -> DEBU 2964 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.034 UTC [gossip.gossip] handleMessage -> DEBU 2965 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2966 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.034 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2967 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:32.035 UTC [msp] DeserializeIdentity -> DEBU 2968 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.035 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2969 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [policies] Evaluate -> DEBU 296c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [policies] Evaluate -> DEBU 296d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [policies] Evaluate -> DEBU 296e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [cauthdsl] func1 -> DEBU 296f 0xc00411aad0 gate 1555913852036740200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [cauthdsl] func2 -> DEBU 2970 0xc00411aad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.036 UTC [cauthdsl] func2 -> DEBU 2971 0xc00411aad0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.037 UTC [cauthdsl] func2 -> DEBU 2972 0xc00411aad0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.037 UTC [msp.identity] Verify -> DEBU 2973 Verify: digest = 00000000 08 61 eb 57 a9 a5 4a 30 1a 93 ef ff cc df 45 4e |.a.W..J0......EN| +peer0.org1.example.com | 00000010 ff b7 ab 2f 63 74 01 0f c3 23 90 04 e7 e9 3a 5d |.../ct...#....:]|" +peer0.org1.example.com | "2019-04-22 06:17:32.037 UTC [msp.identity] Verify -> DEBU 2974 Verify: sig = 00000000 30 45 02 21 00 98 96 4c 5e b4 66 4f f7 44 9c 88 |0E.!...L^.fO.D..| +peer0.org1.example.com | 00000010 83 5b 7e b7 11 15 44 46 97 f3 35 cb c7 d4 09 75 |.[~...DF..5....u| +peer0.org1.example.com | 00000020 2e 15 68 6c 2d 02 20 06 58 d8 a0 02 07 96 34 9c |..hl-. .X.....4.| +peer0.org1.example.com | 00000030 9f d6 eb aa 7c d1 39 4a 92 97 09 cc 09 91 19 a2 |....|.9J........| +peer0.org1.example.com | 00000040 62 12 1a ee f9 29 89 |b....).|" +peer0.org1.example.com | "2019-04-22 06:17:32.037 UTC [cauthdsl] func2 -> DEBU 2975 0xc00411aad0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.037 UTC [cauthdsl] func1 -> DEBU 2976 0xc00411aad0 gate 1555913852036740200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.038 UTC [msp] DeserializeIdentity -> DEBU 2977 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.038 UTC [msp] DeserializeIdentity -> DEBU 2978 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.038 UTC [msp] DeserializeIdentity -> DEBU 2979 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.039 UTC [msp] DeserializeIdentity -> DEBU 297a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.039 UTC [msp] DeserializeIdentity -> DEBU 297b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.039 UTC [msp] DeserializeIdentity -> DEBU 297c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.040 UTC [gossip.comm] Send -> DEBU 297d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:32.040 UTC [msp] DeserializeIdentity -> DEBU 297e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.041 UTC [policies] Evaluate -> DEBU 297f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.041 UTC [policies] Evaluate -> DEBU 2980 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.041 UTC [policies] Evaluate -> DEBU 2981 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.042 UTC [policies] Evaluate -> DEBU 2984 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.042 UTC [msp] DeserializeIdentity -> DEBU 2982 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.043 UTC [gossip.comm] Send -> DEBU 2985 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:32.043 UTC [gossip.comm] sendToEndpoint -> DEBU 2986 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.044 UTC [gossip.comm] sendToEndpoint -> DEBU 2987 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.042 UTC [gossip.comm] sendToEndpoint -> DEBU 2983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.044 UTC [gossip.comm] sendToEndpoint -> DEBU 2988 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.045 UTC [gossip.discovery] handleAliveMessage -> DEBU 2989 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 298a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:32.046 UTC [gossip.comm] func1 -> DEBU 298b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.048 UTC [gossip.gossip] handleMessage -> DEBU 298c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 298d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 " +peer0.org1.example.com | "2019-04-22 06:17:32.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 298e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 " +peer0.org1.example.com | "2019-04-22 06:17:32.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 298f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:32.050 UTC [gossip.discovery] learnExistingMembers -> DEBU 2990 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.050 UTC [gossip.discovery] handleAliveMessage -> DEBU 2991 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.050 UTC [gossip.discovery] sendMemResponse -> DEBU 2992 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:32.051 UTC [msp] DeserializeIdentity -> DEBU 2993 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.051 UTC [msp] DeserializeIdentity -> DEBU 2994 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.051 UTC [msp] DeserializeIdentity -> DEBU 2995 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.052 UTC [gossip.comm] Send -> DEBU 2996 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:32.053 UTC [gossip.discovery] sendMemResponse -> DEBU 2997 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2998 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.056 UTC [gossip.comm] sendToEndpoint -> DEBU 2999 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.050 UTC [gossip.discovery] handleMsgFromComm -> DEBU 299a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.058 UTC [gossip.gossip] handleMessage -> DEBU 299b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.058 UTC [gossip.discovery] handleMsgFromComm -> DEBU 299c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.059 UTC [gossip.discovery] handleMsgFromComm -> DEBU 299d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.393 UTC [msp] DeserializeIdentity -> DEBU 299e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.394 UTC [msp] DeserializeIdentity -> DEBU 299f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.394 UTC [gossip.comm] Send -> DEBU 29a0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:32.394 UTC [gossip.comm] sendToEndpoint -> DEBU 29a1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.394 UTC [gossip.comm] sendToEndpoint -> DEBU 29a2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.397 UTC [gossip.comm] func1 -> DEBU 29a7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.398 UTC [gossip.comm] func1 -> DEBU 29a8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.398 UTC [gossip.gossip] handleMessage -> DEBU 29a9 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.400 UTC [msp] DeserializeIdentity -> DEBU 29aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.400 UTC [msp] DeserializeIdentity -> DEBU 29ab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.400 UTC [msp] DeserializeIdentity -> DEBU 29ac Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.401 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29ae Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29af Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.401 UTC [policies] Evaluate -> DEBU 29b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.402 UTC [policies] Evaluate -> DEBU 29b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.402 UTC [policies] Evaluate -> DEBU 29b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.402 UTC [cauthdsl] func1 -> DEBU 29b3 0xc0042d1b40 gate 1555913852402746500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.402 UTC [cauthdsl] func2 -> DEBU 29b4 0xc0042d1b40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.402 UTC [cauthdsl] func2 -> DEBU 29b5 0xc0042d1b40 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.402 UTC [cauthdsl] func2 -> DEBU 29b6 0xc0042d1b40 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.403 UTC [msp.identity] Verify -> DEBU 29b7 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:32.404 UTC [msp.identity] Verify -> DEBU 29b8 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:32.404 UTC [cauthdsl] func2 -> DEBU 29b9 0xc0042d1b40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.405 UTC [cauthdsl] func1 -> DEBU 29ba 0xc0042d1b40 gate 1555913852402746500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.405 UTC [policies] Evaluate -> DEBU 29bb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.408 UTC [policies] Evaluate -> DEBU 29bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.408 UTC [policies] Evaluate -> DEBU 29bd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.408 UTC [policies] Evaluate -> DEBU 29be == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.409 UTC [msp] DeserializeIdentity -> DEBU 29bf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.409 UTC [msp] DeserializeIdentity -> DEBU 29c0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.410 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.410 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.410 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.410 UTC [policies] Evaluate -> DEBU 29c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.411 UTC [policies] Evaluate -> DEBU 29c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.411 UTC [policies] Evaluate -> DEBU 29c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.411 UTC [cauthdsl] func1 -> DEBU 29c7 0xc004499310 gate 1555913852411739500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.412 UTC [cauthdsl] func2 -> DEBU 29c8 0xc004499310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.412 UTC [cauthdsl] func2 -> DEBU 29c9 0xc004499310 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.412 UTC [cauthdsl] func2 -> DEBU 29ca 0xc004499310 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.414 UTC [msp.identity] Verify -> DEBU 29cb Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:32.414 UTC [msp.identity] Verify -> DEBU 29cc Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:32.415 UTC [cauthdsl] func2 -> DEBU 29cd 0xc004499310 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.415 UTC [cauthdsl] func1 -> DEBU 29ce 0xc004499310 gate 1555913852411739500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.419 UTC [policies] Evaluate -> DEBU 29cf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.419 UTC [policies] Evaluate -> DEBU 29d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.420 UTC [policies] Evaluate -> DEBU 29d1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.420 UTC [policies] Evaluate -> DEBU 29d2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.421 UTC [msp.identity] Verify -> DEBU 29d3 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:32.421 UTC [msp.identity] Verify -> DEBU 29d4 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:32.423 UTC [msp.identity] Verify -> DEBU 29d5 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:32.423 UTC [msp.identity] Verify -> DEBU 29d6 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:32.423 UTC [gossip.gossip] handleMessage -> DEBU 29d7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.423 UTC [gossip.gossip] handleMessage -> DEBU 29d8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.424 UTC [msp.identity] Verify -> DEBU 29d9 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:32.424 UTC [msp.identity] Verify -> DEBU 29da Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:32.429 UTC [msp] DeserializeIdentity -> DEBU 29db Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.429 UTC [msp] DeserializeIdentity -> DEBU 29dc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29de Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [cauthdsl] func1 -> DEBU 29e3 0xc003694280 gate 1555913852430501000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e4 0xc003694280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e5 0xc003694280 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e6 0xc003694280 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [msp.identity] Verify -> DEBU 29e7 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [msp.identity] Verify -> DEBU 29e8 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e9 0xc003694280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [cauthdsl] func1 -> DEBU 29ea 0xc003694280 gate 1555913852430501000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29ed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [msp.identity] Verify -> DEBU 29ef Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [msp.identity] Verify -> DEBU 29f0 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [msp] DeserializeIdentity -> DEBU 29f1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [msp] DeserializeIdentity -> DEBU 29f2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29f4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29f5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [cauthdsl] func1 -> DEBU 29f9 0xc00377c170 gate 1555913852431894600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [cauthdsl] func2 -> DEBU 29fa 0xc00377c170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.431 UTC [cauthdsl] func2 -> DEBU 29fb 0xc00377c170 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [cauthdsl] func2 -> DEBU 29fc 0xc00377c170 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [msp.identity] Verify -> DEBU 29fd Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [msp.identity] Verify -> DEBU 29fe Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [cauthdsl] func2 -> DEBU 29ff 0xc00377c170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [cauthdsl] func1 -> DEBU 2a00 0xc00377c170 gate 1555913852431894600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a01 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a03 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [gossip.gossip] handleMessage -> DEBU 2a05 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [gossip.gossip] handleMessage -> DEBU 2a06 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [msp] DeserializeIdentity -> DEBU 2a07 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [msp] DeserializeIdentity -> DEBU 2a08 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [msp] DeserializeIdentity -> DEBU 2a09 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a0b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a0c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [cauthdsl] func1 -> DEBU 2a10 0xc00377dc80 gate 1555913852433143200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a11 0xc00377dc80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a12 0xc00377dc80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a13 0xc00377dc80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [msp.identity] Verify -> DEBU 2a14 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [msp.identity] Verify -> DEBU 2a15 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a16 0xc00377dc80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [cauthdsl] func1 -> DEBU 2a17 0xc00377dc80 gate 1555913852433143200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a1a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [msp] DeserializeIdentity -> DEBU 2a1c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [msp] DeserializeIdentity -> DEBU 2a1d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:32.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a20 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [policies] Evaluate -> DEBU 2a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [policies] Evaluate -> DEBU 2a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [policies] Evaluate -> DEBU 2a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [cauthdsl] func1 -> DEBU 2a24 0xc0032bb450 gate 1555913852434205600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [cauthdsl] func2 -> DEBU 2a25 0xc0032bb450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [cauthdsl] func2 -> DEBU 2a26 0xc0032bb450 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [cauthdsl] func2 -> DEBU 2a27 0xc0032bb450 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [msp.identity] Verify -> DEBU 2a28 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:32.434 UTC [msp.identity] Verify -> DEBU 2a29 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:32.435 UTC [cauthdsl] func2 -> DEBU 2a2a 0xc0032bb450 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:32.435 UTC [cauthdsl] func1 -> DEBU 2a2b 0xc0032bb450 gate 1555913852434205600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:32.438 UTC [msp.identity] Verify -> DEBU 2a30 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:32.438 UTC [msp.identity] Verify -> DEBU 2a31 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:32.439 UTC [msp.identity] Verify -> DEBU 2a32 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:32.439 UTC [msp.identity] Verify -> DEBU 2a33 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:32.440 UTC [gossip.gossip] handleMessage -> DEBU 2a34 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.475 UTC [msp] DeserializeIdentity -> DEBU 2a35 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.475 UTC [msp] DeserializeIdentity -> DEBU 2a36 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.475 UTC [gossip.pull] Hello -> DEBU 2a37 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:32.476 UTC [msp] DeserializeIdentity -> DEBU 2a38 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.477 UTC [msp] DeserializeIdentity -> DEBU 2a39 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.477 UTC [gossip.comm] Send -> DEBU 2a3a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:32.477 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.477 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.478 UTC [gossip.comm] func1 -> DEBU 2a3d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 501491995307507059 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.479 UTC [gossip.gossip] handleMessage -> DEBU 2a3e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 501491995307507059 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.479 UTC [gossip.pull] HandleMessage -> DEBU 2a3f GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 501491995307507059 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.479 UTC [gossip.gossip] handleMessage -> DEBU 2a40 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.647 UTC [gossip.comm] func1 -> DEBU 2a41 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.647 UTC [gossip.gossip] handleMessage -> DEBU 2a42 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.648 UTC [msp] DeserializeIdentity -> DEBU 2a43 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.648 UTC [msp] DeserializeIdentity -> DEBU 2a44 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.648 UTC [gossip.gossip] handleMessage -> DEBU 2a45 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.679 UTC [gossip.comm] func1 -> DEBU 2a46 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.679 UTC [gossip.gossip] handleMessage -> DEBU 2a47 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.679 UTC [gossip.pull] HandleMessage -> DEBU 2a48 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.679 UTC [gossip.pull] SendDigest -> DEBU 2a49 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:32.679 UTC [gossip.gossip] handleMessage -> DEBU 2a4a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:32.872 UTC [gossip.gossip] handleMessage -> DEBU 2a4b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:32.873 UTC [msp] DeserializeIdentity -> DEBU 2a4c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.873 UTC [msp] DeserializeIdentity -> DEBU 2a4d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.874 UTC [msp] DeserializeIdentity -> DEBU 2a4e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:32.874 UTC [gossip.gossip] handleMessage -> DEBU 2a4f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:33.025 UTC [chaincode.platform.util] DockerBuild -> DEBU 2a50 Build output is # examples/chaincode/go/chaincode_example02 +peer0.org1.example.com | /tmp/go-link-079629731/000001.o: In function `pluginOpen': +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-079629731/000021.o: In function `mygetgrouplist': +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-079629731/000020.o: In function `mygetgrgid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-079629731/000020.o: In function `mygetgrnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-079629731/000020.o: In function `mygetpwnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-079629731/000020.o: In function `mygetpwuid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-079629731/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +peer0.org1.example.com | "2019-04-22 06:17:33.086 UTC [gossip.comm] func1 -> DEBU 2a51 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:33.087 UTC [gossip.gossip] handleMessage -> DEBU 2a52 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:33.088 UTC [msp] DeserializeIdentity -> DEBU 2a53 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:33.089 UTC [msp] DeserializeIdentity -> DEBU 2a54 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:33.089 UTC [msp] DeserializeIdentity -> DEBU 2a55 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:33.089 UTC [gossip.gossip] handleMessage -> DEBU 2a56 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.877 UTC [gossip.pull] Hello -> DEBU 2a57 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:34.878 UTC [gossip.comm] Send -> DEBU 2a58 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:34.878 UTC [gossip.pull] Hello -> DEBU 2a59 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:34.878 UTC [gossip.comm] Send -> DEBU 2a5a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:34.878 UTC [gossip.pull] Hello -> DEBU 2a5b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:34.879 UTC [gossip.comm] Send -> DEBU 2a5c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:34.880 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.880 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.880 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2a60 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2a61 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2a62 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.884 UTC [gossip.comm] func1 -> DEBU 2a63 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795309603885020109 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.885 UTC [gossip.gossip] handleMessage -> DEBU 2a64 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795309603885020109 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.886 UTC [gossip.pull] HandleMessage -> DEBU 2a65 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795309603885020109 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.887 UTC [gossip.gossip] handleMessage -> DEBU 2a66 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.888 UTC [gossip.gossip] handleMessage -> DEBU 2a67 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2047457086371567968 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.888 UTC [gossip.pull] HandleMessage -> DEBU 2a68 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2047457086371567968 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.888 UTC [gossip.gossip] handleMessage -> DEBU 2a69 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.888 UTC [gossip.comm] func1 -> DEBU 2a6a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15924882921435455467 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.888 UTC [gossip.gossip] handleMessage -> DEBU 2a6b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15924882921435455467 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.889 UTC [gossip.pull] HandleMessage -> DEBU 2a6c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15924882921435455467 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.889 UTC [gossip.gossip] handleMessage -> DEBU 2a6d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a6e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151026 " +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a6f Sign: digest: 9A365C6143083AF782BB34863DD6396F644594D9AB71024728DF7C467FBF14E5 " +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a70 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a71 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [gossip.comm] Send -> DEBU 2a72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [msp] DeserializeIdentity -> DEBU 2a73 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [gossip.comm] Send -> DEBU 2a74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:34.927 UTC [msp] DeserializeIdentity -> DEBU 2a75 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:34.928 UTC [gossip.comm] Send -> DEBU 2a76 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a77 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a78 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a79 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.932 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.932 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.935 UTC [gossip.comm] func1 -> DEBU 2a7d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.935 UTC [gossip.gossip] handleMessage -> DEBU 2a7e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.936 UTC [gossip.gossip] handleMessage -> DEBU 2a7f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a81 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:34.937 UTC [msp.identity] Verify -> DEBU 2a82 Verify: digest = 00000000 9a 36 5c 61 43 08 3a f7 82 bb 34 86 3d d6 39 6f |.6\aC.:...4.=.9o| +peer0.org1.example.com | 00000010 64 45 94 d9 ab 71 02 47 28 df 7c 46 7f bf 14 e5 |dE...q.G(.|F....|" +peer0.org1.example.com | "2019-04-22 06:17:34.937 UTC [msp.identity] Verify -> DEBU 2a83 Verify: sig = 00000000 30 44 02 20 12 38 3a 96 ec ae 15 3f 38 c1 a7 e3 |0D. .8:....?8...| +peer0.org1.example.com | 00000010 c2 c8 c8 76 88 e0 c6 ef 76 ba 4a fa b5 60 ab f7 |...v....v.J..`..| +peer0.org1.example.com | 00000020 be 0b 38 06 02 20 6d 3f 2f dc 98 b6 c0 6f 61 47 |..8.. m?/....oaG| +peer0.org1.example.com | 00000030 8a c9 6d 00 ba c6 d6 76 22 7f d1 b6 5b d8 7f b0 |..m....v"...[...| +peer0.org1.example.com | 00000040 d0 c5 c4 04 c2 85 |......|" +peer0.org1.example.com | "2019-04-22 06:17:34.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a84 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.938 UTC [gossip.discovery] isSentByMe -> DEBU 2a85 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a86 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a87 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:34.939 UTC [msp] DeserializeIdentity -> DEBU 2a88 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:34.939 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a89 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:34.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a8a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:34.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a8b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:34.940 UTC [policies] Evaluate -> DEBU 2a8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:34.940 UTC [policies] Evaluate -> DEBU 2a8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:34.940 UTC [policies] Evaluate -> DEBU 2a8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:34.941 UTC [cauthdsl] func1 -> DEBU 2a8f 0xc0040cb6d0 gate 1555913854941101300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:34.941 UTC [cauthdsl] func2 -> DEBU 2a90 0xc0040cb6d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:34.941 UTC [cauthdsl] func2 -> DEBU 2a91 0xc0040cb6d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:34.941 UTC [cauthdsl] func2 -> DEBU 2a92 0xc0040cb6d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:34.941 UTC [msp.identity] Verify -> DEBU 2a93 Verify: digest = 00000000 08 61 eb 57 a9 a5 4a 30 1a 93 ef ff cc df 45 4e |.a.W..J0......EN| +peer0.org1.example.com | 00000010 ff b7 ab 2f 63 74 01 0f c3 23 90 04 e7 e9 3a 5d |.../ct...#....:]|" +peer0.org1.example.com | "2019-04-22 06:17:34.941 UTC [msp.identity] Verify -> DEBU 2a94 Verify: sig = 00000000 30 45 02 21 00 98 96 4c 5e b4 66 4f f7 44 9c 88 |0E.!...L^.fO.D..| +peer0.org1.example.com | 00000010 83 5b 7e b7 11 15 44 46 97 f3 35 cb c7 d4 09 75 |.[~...DF..5....u| +peer0.org1.example.com | 00000020 2e 15 68 6c 2d 02 20 06 58 d8 a0 02 07 96 34 9c |..hl-. .X.....4.| +peer0.org1.example.com | 00000030 9f d6 eb aa 7c d1 39 4a 92 97 09 cc 09 91 19 a2 |....|.9J........| +peer0.org1.example.com | 00000040 62 12 1a ee f9 29 89 |b....).|" +peer0.org1.example.com | "2019-04-22 06:17:34.942 UTC [cauthdsl] func2 -> DEBU 2a95 0xc0040cb6d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:34.942 UTC [cauthdsl] func1 -> DEBU 2a96 0xc0040cb6d0 gate 1555913854941101300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:34.942 UTC [policies] Evaluate -> DEBU 2a97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.943 UTC [policies] Evaluate -> DEBU 2a98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.943 UTC [policies] Evaluate -> DEBU 2a99 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.943 UTC [policies] Evaluate -> DEBU 2a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.944 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a9d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:34.944 UTC [msp.identity] Verify -> DEBU 2a9e Verify: digest = 00000000 a1 33 1b aa 18 67 dd bf e0 df 37 e0 b1 4b 77 3d |.3...g....7..Kw=| +peer0.org1.example.com | 00000010 4d d0 73 69 32 ca 6c 52 a3 83 5d aa 32 5a 6c 25 |M.si2.lR..].2Zl%|" +peer0.org1.example.com | "2019-04-22 06:17:34.944 UTC [msp.identity] Verify -> DEBU 2a9f Verify: sig = 00000000 30 44 02 20 41 9d 1b c0 07 e8 cc 5a 28 d6 cb 03 |0D. A......Z(...| +peer0.org1.example.com | 00000010 85 34 65 85 7a 8b e1 47 79 b3 31 11 ba 86 99 96 |.4e.z..Gy.1.....| +peer0.org1.example.com | 00000020 02 d0 4a fe 02 20 22 ee 04 ea d0 54 eb 4e 94 18 |..J.. "....T.N..| +peer0.org1.example.com | 00000030 dd 41 76 96 ca c1 0d 66 41 35 7f 0b f5 c8 dc bf |.Av....fA5......| +peer0.org1.example.com | 00000040 50 49 a2 15 8c 90 |PI....|" +peer0.org1.example.com | "2019-04-22 06:17:34.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aa0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aa1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.946 UTC [gossip.gossip] handleMessage -> DEBU 2aa3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.946 UTC [gossip.gossip] handleMessage -> DEBU 2aa4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aa6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:34.947 UTC [msp.identity] Verify -> DEBU 2aa7 Verify: digest = 00000000 a1 33 1b aa 18 67 dd bf e0 df 37 e0 b1 4b 77 3d |.3...g....7..Kw=| +peer0.org1.example.com | 00000010 4d d0 73 69 32 ca 6c 52 a3 83 5d aa 32 5a 6c 25 |M.si2.lR..].2Zl%|" +peer0.org1.example.com | "2019-04-22 06:17:34.947 UTC [msp.identity] Verify -> DEBU 2aa8 Verify: sig = 00000000 30 44 02 20 41 9d 1b c0 07 e8 cc 5a 28 d6 cb 03 |0D. A......Z(...| +peer0.org1.example.com | 00000010 85 34 65 85 7a 8b e1 47 79 b3 31 11 ba 86 99 96 |.4e.z..Gy.1.....| +peer0.org1.example.com | 00000020 02 d0 4a fe 02 20 22 ee 04 ea d0 54 eb 4e 94 18 |..J.. "....T.N..| +peer0.org1.example.com | 00000030 dd 41 76 96 ca c1 0d 66 41 35 7f 0b f5 c8 dc bf |.Av....fA5......| +peer0.org1.example.com | 00000040 50 49 a2 15 8c 90 |PI....|" +peer0.org1.example.com | "2019-04-22 06:17:34.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aa9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aaa Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aab Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:34.949 UTC [msp.identity] Verify -> DEBU 2aac Verify: digest = 00000000 9a 36 5c 61 43 08 3a f7 82 bb 34 86 3d d6 39 6f |.6\aC.:...4.=.9o| +peer0.org1.example.com | 00000010 64 45 94 d9 ab 71 02 47 28 df 7c 46 7f bf 14 e5 |dE...q.G(.|F....|" +peer0.org1.example.com | "2019-04-22 06:17:34.949 UTC [msp.identity] Verify -> DEBU 2aad Verify: sig = 00000000 30 44 02 20 12 38 3a 96 ec ae 15 3f 38 c1 a7 e3 |0D. .8:....?8...| +peer0.org1.example.com | 00000010 c2 c8 c8 76 88 e0 c6 ef 76 ba 4a fa b5 60 ab f7 |...v....v.J..`..| +peer0.org1.example.com | 00000020 be 0b 38 06 02 20 6d 3f 2f dc 98 b6 c0 6f 61 47 |..8.. m?/....oaG| +peer0.org1.example.com | 00000030 8a c9 6d 00 ba c6 d6 76 22 7f d1 b6 5b d8 7f b0 |..m....v"...[...| +peer0.org1.example.com | 00000040 d0 c5 c4 04 c2 85 |......|" +peer0.org1.example.com | "2019-04-22 06:17:34.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.950 UTC [gossip.discovery] isSentByMe -> DEBU 2aaf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ab0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ab1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:34.950 UTC [msp] DeserializeIdentity -> DEBU 2ab2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:34.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ab3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:34.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ab4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:34.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ab5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:34.952 UTC [policies] Evaluate -> DEBU 2ab6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:34.952 UTC [policies] Evaluate -> DEBU 2ab7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:34.952 UTC [policies] Evaluate -> DEBU 2ab8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:34.952 UTC [cauthdsl] func1 -> DEBU 2ab9 0xc003f76090 gate 1555913854952540000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:34.952 UTC [cauthdsl] func2 -> DEBU 2aba 0xc003f76090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:34.952 UTC [cauthdsl] func2 -> DEBU 2abb 0xc003f76090 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:34.953 UTC [cauthdsl] func2 -> DEBU 2abc 0xc003f76090 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:34.953 UTC [msp.identity] Verify -> DEBU 2abd Verify: digest = 00000000 58 9f d3 12 8f d6 80 98 97 a7 e0 54 3f 7f 3a 40 |X..........T?.:@| +peer0.org1.example.com | 00000010 d3 46 38 b2 cb 60 e4 72 b1 44 c8 0b 42 ec c5 c3 |.F8..`.r.D..B...|" +peer0.org1.example.com | "2019-04-22 06:17:34.953 UTC [msp.identity] Verify -> DEBU 2abe Verify: sig = 00000000 30 44 02 20 14 c2 07 88 8a ef 91 83 82 1e c6 ad |0D. ............| +peer0.org1.example.com | 00000010 c3 f8 66 7f f8 f1 e8 b1 9b fe 5e a8 01 2b c6 6a |..f.......^..+.j| +peer0.org1.example.com | 00000020 d4 0b 93 7c 02 20 29 10 85 e0 01 b4 b5 ec e9 f0 |...|. ).........| +peer0.org1.example.com | 00000030 60 08 f7 be dd f3 05 d2 3d cf 43 d8 f3 55 3e b3 |`.......=.C..U>.| +peer0.org1.example.com | 00000040 31 73 d3 2d a3 24 |1s.-.$|" +peer0.org1.example.com | "2019-04-22 06:17:34.953 UTC [cauthdsl] func2 -> DEBU 2abf 0xc003f76090 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:34.953 UTC [cauthdsl] func1 -> DEBU 2ac0 0xc003f76090 gate 1555913854952540000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:34.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.957 UTC [gossip.comm] func1 -> DEBU 2ac8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.957 UTC [gossip.gossip] handleMessage -> DEBU 2ac9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.958 UTC [gossip.gossip] handleMessage -> DEBU 2aca Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2acb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2acc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:34.959 UTC [msp.identity] Verify -> DEBU 2acd Verify: digest = 00000000 9a 36 5c 61 43 08 3a f7 82 bb 34 86 3d d6 39 6f |.6\aC.:...4.=.9o| +peer0.org1.example.com | 00000010 64 45 94 d9 ab 71 02 47 28 df 7c 46 7f bf 14 e5 |dE...q.G(.|F....|" +peer0.org1.example.com | "2019-04-22 06:17:34.959 UTC [msp.identity] Verify -> DEBU 2ace Verify: sig = 00000000 30 44 02 20 12 38 3a 96 ec ae 15 3f 38 c1 a7 e3 |0D. .8:....?8...| +peer0.org1.example.com | 00000010 c2 c8 c8 76 88 e0 c6 ef 76 ba 4a fa b5 60 ab f7 |...v....v.J..`..| +peer0.org1.example.com | 00000020 be 0b 38 06 02 20 6d 3f 2f dc 98 b6 c0 6f 61 47 |..8.. m?/....oaG| +peer0.org1.example.com | 00000030 8a c9 6d 00 ba c6 d6 76 22 7f d1 b6 5b d8 7f b0 |..m....v"...[...| +peer0.org1.example.com | 00000040 d0 c5 c4 04 c2 85 |......|" +peer0.org1.example.com | "2019-04-22 06:17:34.960 UTC [msp.identity] Verify -> DEBU 2acf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:34.960 UTC [msp.identity] Verify -> DEBU 2ad0 Verify: sig = 00000000 30 45 02 21 00 9f d6 b7 d4 56 8d 11 a2 c8 0e ed |0E.!.....V......| +peer0.org1.example.com | 00000010 56 56 8c 5d f3 4d 53 0a 2b fc 22 08 f4 a0 cb 17 |VV.].MS.+.".....| +peer0.org1.example.com | 00000020 12 98 eb dd 38 02 20 6f 38 b3 d2 5e f7 44 ca 72 |....8. o8..^.D.r| +peer0.org1.example.com | 00000030 55 b2 51 60 ac 2f af a0 2c da 57 a3 67 cc 07 d6 |U.Q`./..,.W.g...| +peer0.org1.example.com | 00000040 29 cd 72 d5 51 f0 de |).r.Q..|" +peer0.org1.example.com | "2019-04-22 06:17:34.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ad1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.962 UTC [gossip.discovery] isSentByMe -> DEBU 2ad2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:34.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ad3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:34.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ad4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.136 UTC [gossip.comm] func1 -> DEBU 2ad5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.136 UTC [gossip.gossip] handleMessage -> DEBU 2ad6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.137 UTC [gossip.pull] HandleMessage -> DEBU 2ad7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.137 UTC [gossip.pull] SendDigest -> DEBU 2ad8 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:35.138 UTC [gossip.gossip] handleMessage -> DEBU 2ad9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.157 UTC [gossip.comm] func1 -> DEBU 2ada Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.158 UTC [gossip.gossip] handleMessage -> DEBU 2adb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.159 UTC [gossip.gossip] handleMessage -> DEBU 2adc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2add Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.161 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ade Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:35.161 UTC [msp.identity] Verify -> DEBU 2adf Verify: digest = 00000000 9b 92 e0 70 43 63 f0 31 92 a8 62 6a a1 d9 5c e4 |...pCc.1..bj..\.| +peer0.org1.example.com | 00000010 fd 57 6c 00 c8 0c 1d c3 88 ee aa 94 71 51 fd 93 |.Wl.........qQ..|" +peer0.org1.example.com | "2019-04-22 06:17:35.161 UTC [msp.identity] Verify -> DEBU 2ae0 Verify: sig = 00000000 30 44 02 20 4e 06 99 1e 70 e0 88 3a 16 49 ba 66 |0D. N...p..:.I.f| +peer0.org1.example.com | 00000010 6f c2 b9 af bf e8 71 e5 15 cf 0b 0d 75 9b cf 23 |o.....q.....u..#| +peer0.org1.example.com | 00000020 e0 4a 4d f3 02 20 2a 11 0c e5 3e 98 4f 60 5c c0 |.JM.. *...>.O`\.| +peer0.org1.example.com | 00000030 f6 32 10 8a 4a f2 60 55 ea f4 ff d3 32 7e cd 09 |.2..J.`U....2~..| +peer0.org1.example.com | 00000040 85 c2 18 8e e9 02 |......|" +peer0.org1.example.com | "2019-04-22 06:17:35.162 UTC [msp.identity] Verify -> DEBU 2ae1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:35.162 UTC [msp.identity] Verify -> DEBU 2ae2 Verify: sig = 00000000 30 45 02 21 00 d0 a2 79 9a 61 4b aa a3 0a 44 e6 |0E.!...y.aK...D.| +peer0.org1.example.com | 00000010 70 69 7b 08 db 84 39 27 09 46 78 9d ea 18 63 33 |pi{...9'.Fx...c3| +peer0.org1.example.com | 00000020 07 64 54 c4 d6 02 20 1a e8 f5 4c c4 66 fa f3 8d |.dT... ...L.f...| +peer0.org1.example.com | 00000030 fb d9 18 c1 cb 44 fa fc b8 cc 87 03 1d d0 ec 13 |.....D..........| +peer0.org1.example.com | 00000040 7f 07 8e b0 eb 12 87 |.......|" +peer0.org1.example.com | "2019-04-22 06:17:35.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:35.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae5 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 " +peer0.org1.example.com | "2019-04-22 06:17:35.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 " +peer0.org1.example.com | "2019-04-22 06:17:35.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:35.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aea Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.172 UTC [gossip.discovery] sendMemResponse -> DEBU 2aeb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:35.173 UTC [msp] DeserializeIdentity -> DEBU 2aec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.174 UTC [msp] DeserializeIdentity -> DEBU 2aed Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.174 UTC [gossip.comm] Send -> DEBU 2aee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:35.175 UTC [gossip.discovery] sendMemResponse -> DEBU 2aef Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:35.175 UTC [gossip.comm] sendToEndpoint -> DEBU 2af0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.176 UTC [gossip.comm] sendToEndpoint -> DEBU 2af1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [gossip.comm] func1 -> DEBU 2af2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [gossip.gossip] handleMessage -> DEBU 2af3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [gossip.pull] HandleMessage -> DEBU 2af4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2afa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.593 UTC [gossip.pull] SendDigest -> DEBU 2afb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:35.593 UTC [gossip.gossip] handleMessage -> DEBU 2afc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.635 UTC [gossip.comm] func1 -> DEBU 2afd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.635 UTC [gossip.gossip] handleMessage -> DEBU 2afe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.635 UTC [gossip.gossip] handleMessage -> DEBU 2aff Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b00 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b01 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [msp] DeserializeIdentity -> DEBU 2b02 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b03 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b04 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b05 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [cauthdsl] func1 -> DEBU 2b09 0xc003eaccf0 gate 1555913855636458300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0a 0xc003eaccf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0b 0xc003eaccf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0c 0xc003eaccf0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [msp.identity] Verify -> DEBU 2b0d Verify: digest = 00000000 20 aa d3 12 18 9f 09 77 84 fa dd f8 63 9d 39 e4 | ......w....c.9.| +peer0.org1.example.com | 00000010 26 95 b6 10 4f af 08 2a 00 c5 87 39 c1 41 b2 4c |&...O..*...9.A.L|" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [msp.identity] Verify -> DEBU 2b0e Verify: sig = 00000000 30 44 02 20 58 92 5c a6 d4 e3 d2 0c f0 e2 6b d6 |0D. X.\.......k.| +peer0.org1.example.com | 00000010 57 65 ce cc 9e b3 1b e2 7f e2 ea 67 76 24 52 b7 |We.........gv$R.| +peer0.org1.example.com | 00000020 fc 88 16 fa 02 20 24 3d 21 bd 92 9c 2e 21 08 8c |..... $=!....!..| +peer0.org1.example.com | 00000030 23 c4 0f a2 9c f2 ec 5c 25 68 fa 8d 9d 27 38 a3 |#......\%h...'8.| +peer0.org1.example.com | 00000040 38 33 85 87 f4 08 |83....|" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0f 0xc003eaccf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [cauthdsl] func1 -> DEBU 2b10 0xc003eaccf0 gate 1555913855636458300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b11 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b13 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b15 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b16 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b17 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 " +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b18 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 " +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b19 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b1a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b1b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b1c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] sendMemResponse -> DEBU 2b1d Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [msp] DeserializeIdentity -> DEBU 2b1e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [msp] DeserializeIdentity -> DEBU 2b1f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [msp] DeserializeIdentity -> DEBU 2b20 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.comm] Send -> DEBU 2b21 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.discovery] sendMemResponse -> DEBU 2b22 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b23 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b24 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.829 UTC [msp.identity] Sign -> DEBU 2b25 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151027 " +peer0.org1.example.com | "2019-04-22 06:17:35.830 UTC [msp.identity] Sign -> DEBU 2b26 Sign: digest: 97908C94109087893440528F651AD8E7946E98FBAB99CD36D07C9E7AAFF3559B " +peer0.org1.example.com | "2019-04-22 06:17:35.830 UTC [msp.identity] Sign -> DEBU 2b27 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:35.830 UTC [msp.identity] Sign -> DEBU 2b28 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:35.830 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2b29 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:35.830 UTC [msp] DeserializeIdentity -> DEBU 2b2a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.830 UTC [msp] DeserializeIdentity -> DEBU 2b2b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.831 UTC [msp] DeserializeIdentity -> DEBU 2b2c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.831 UTC [gossip.comm] Send -> DEBU 2b2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:35.831 UTC [msp] DeserializeIdentity -> DEBU 2b2e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:35.831 UTC [gossip.comm] Send -> DEBU 2b2f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:35.831 UTC [gossip.comm] Send -> DEBU 2b30 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:35.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2b31 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b32 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b34 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b35 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b36 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.020 UTC [gossip.gossip] handleMessage -> DEBU 2b37 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.020 UTC [gossip.pull] HandleMessage -> DEBU 2b38 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.020 UTC [msp] DeserializeIdentity -> DEBU 2b39 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.020 UTC [msp] DeserializeIdentity -> DEBU 2b3a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.021 UTC [msp] DeserializeIdentity -> DEBU 2b3b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.021 UTC [msp] DeserializeIdentity -> DEBU 2b3c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.021 UTC [msp] DeserializeIdentity -> DEBU 2b3d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.022 UTC [msp] DeserializeIdentity -> DEBU 2b3e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.022 UTC [gossip.pull] SendDigest -> DEBU 2b3f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:36.022 UTC [gossip.gossip] handleMessage -> DEBU 2b40 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.036 UTC [gossip.gossip] handleMessage -> DEBU 2b41 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.036 UTC [gossip.gossip] handleMessage -> DEBU 2b42 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.036 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b44 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:36.036 UTC [msp] DeserializeIdentity -> DEBU 2b45 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.036 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.036 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b47 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.037 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b48 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.037 UTC [policies] Evaluate -> DEBU 2b49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [cauthdsl] func1 -> DEBU 2b4c 0xc003dc6590 gate 1555913856038079800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b4d 0xc003dc6590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b4e 0xc003dc6590 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b4f 0xc003dc6590 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [msp.identity] Verify -> DEBU 2b50 Verify: digest = 00000000 c3 82 87 01 8c 79 b2 60 53 1a b0 2d f3 93 b6 f6 |.....y.`S..-....| +peer0.org1.example.com | 00000010 9a be 22 7e 27 fe eb 9e 50 70 08 f5 43 fb fd da |.."~'...Pp..C...|" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [msp.identity] Verify -> DEBU 2b51 Verify: sig = 00000000 30 44 02 20 7f 62 cc 43 da aa 81 e4 60 ae 5c 82 |0D. .b.C....`.\.| +peer0.org1.example.com | 00000010 73 83 89 2d 71 de 63 07 86 73 27 7d 8b cf 21 22 |s..-q.c..s'}..!"| +peer0.org1.example.com | 00000020 8b 60 de d5 02 20 34 5b 02 f5 bd 3b 0e 70 3f 97 |.`... 4[...;.p?.| +peer0.org1.example.com | 00000030 d2 1c 2c 4d 94 e4 25 a4 08 ea 0a 8a 78 61 c4 f1 |..,M..%.....xa..| +peer0.org1.example.com | 00000040 4e 37 b5 e3 cb 46 |N7...F|" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b52 0xc003dc6590 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [cauthdsl] func1 -> DEBU 2b53 0xc003dc6590 gate 1555913856038079800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b54 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b55 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b56 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b58 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b59 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 " +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 " +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b5e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b5f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.038 UTC [gossip.discovery] sendMemResponse -> DEBU 2b60 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:36.039 UTC [msp] DeserializeIdentity -> DEBU 2b61 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.039 UTC [msp] DeserializeIdentity -> DEBU 2b62 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.039 UTC [msp] DeserializeIdentity -> DEBU 2b63 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.039 UTC [gossip.comm] Send -> DEBU 2b64 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.039 UTC [gossip.discovery] sendMemResponse -> DEBU 2b65 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:36.039 UTC [gossip.comm] sendToEndpoint -> DEBU 2b66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.039 UTC [gossip.comm] sendToEndpoint -> DEBU 2b67 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.118 UTC [gossip.comm] func1 -> DEBU 2b68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.118 UTC [gossip.gossip] handleMessage -> DEBU 2b69 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.119 UTC [gossip.gossip] handleMessage -> DEBU 2b6a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b6b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b6c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:36.120 UTC [msp.identity] Verify -> DEBU 2b6d Verify: digest = 00000000 76 d6 de 99 b0 55 0a dc 72 57 9d df da fc 79 3e |v....U..rW....y>| +peer0.org1.example.com | 00000010 bf ba 96 b1 bb 2b 03 e2 bd f2 2f 82 69 3e 2b b6 |.....+..../.i>+.|" +peer0.org1.example.com | "2019-04-22 06:17:36.120 UTC [msp.identity] Verify -> DEBU 2b6e Verify: sig = 00000000 30 44 02 20 1a d5 b6 08 88 2a d5 66 dc 38 54 79 |0D. .....*.f.8Ty| +peer0.org1.example.com | 00000010 7a 27 b2 7c 7d 69 ec c7 6c f1 ca 9e d3 24 0e 1b |z'.|}i..l....$..| +peer0.org1.example.com | 00000020 88 ba da f6 02 20 2c 62 2d ba 26 91 2b 22 bf 7f |..... ,b-.&.+"..| +peer0.org1.example.com | 00000030 d8 ea d8 10 27 73 d0 90 65 35 6b ee 5b 02 d3 5d |....'s..e5k.[..]| +peer0.org1.example.com | 00000040 9c 0b 44 15 33 38 |..D.38|" +peer0.org1.example.com | "2019-04-22 06:17:36.121 UTC [msp.identity] Verify -> DEBU 2b6f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:36.121 UTC [msp.identity] Verify -> DEBU 2b70 Verify: sig = 00000000 30 45 02 21 00 85 3b 41 99 f4 b1 f0 db 1f b1 a5 |0E.!..;A........| +peer0.org1.example.com | 00000010 9a 32 33 36 d2 52 ee 5b aa 4c 3a d4 c2 36 42 00 |.236.R.[.L:..6B.| +peer0.org1.example.com | 00000020 bf 92 df 7f 0b 02 20 0c 1f 0e 1f d2 d0 25 de 9f |...... ......%..| +peer0.org1.example.com | 00000030 a3 22 fb 56 f2 5f 9c 45 f9 14 77 e7 b7 91 68 8d |.".V._.E..w...h.| +peer0.org1.example.com | 00000040 6e a4 f4 60 4c d2 98 |n..`L..|" +peer0.org1.example.com | "2019-04-22 06:17:36.124 UTC [gossip.comm] func1 -> DEBU 2b71 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.124 UTC [gossip.gossip] handleMessage -> DEBU 2b72 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b73 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.125 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b74 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:36.126 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b75 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 " +peer0.org1.example.com | "2019-04-22 06:17:36.126 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b76 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 " +peer0.org1.example.com | "2019-04-22 06:17:36.126 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b77 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:36.127 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b78 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.127 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b79 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.128 UTC [gossip.gossip] handleMessage -> DEBU 2b7c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.130 UTC [gossip.gossip] handleMessage -> DEBU 2b7e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.131 UTC [gossip.gossip] handleMessage -> DEBU 2b7f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.131 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.131 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b81 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.132 UTC [msp] DeserializeIdentity -> DEBU 2b82 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.132 UTC [msp] DeserializeIdentity -> DEBU 2b83 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.132 UTC [msp] DeserializeIdentity -> DEBU 2b84 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.132 UTC [gossip.comm] Send -> DEBU 2b85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.133 UTC [msp] DeserializeIdentity -> DEBU 2b86 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.133 UTC [gossip.comm] Send -> DEBU 2b87 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b88 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b89 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.390 UTC [msp] DeserializeIdentity -> DEBU 2b8c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.390 UTC [msp] DeserializeIdentity -> DEBU 2b8d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.390 UTC [gossip.comm] Send -> DEBU 2b8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2b90 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b91 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b92 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b93 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b94 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [gossip.gossip] handleMessage -> DEBU 2b95 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [msp] DeserializeIdentity -> DEBU 2b96 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [msp] DeserializeIdentity -> DEBU 2b97 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [msp] DeserializeIdentity -> DEBU 2b98 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b99 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [policies] Evaluate -> DEBU 2b9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.394 UTC [policies] Evaluate -> DEBU 2b9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2b9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [cauthdsl] func1 -> DEBU 2b9f 0xc003d15470 gate 1555913856395109600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba0 0xc003d15470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba1 0xc003d15470 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba2 0xc003d15470 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [msp.identity] Verify -> DEBU 2ba3 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [msp.identity] Verify -> DEBU 2ba4 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba5 0xc003d15470 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [cauthdsl] func1 -> DEBU 2ba6 0xc003d15470 gate 1555913856395109600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2ba7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2ba8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2ba9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2baa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [msp] DeserializeIdentity -> DEBU 2bab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [msp] DeserializeIdentity -> DEBU 2bac Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bae Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2baf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [policies] Evaluate -> DEBU 2bb0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [policies] Evaluate -> DEBU 2bb1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [policies] Evaluate -> DEBU 2bb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [cauthdsl] func1 -> DEBU 2bb3 0xc003a9cc90 gate 1555913856396666400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [cauthdsl] func2 -> DEBU 2bb4 0xc003a9cc90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [cauthdsl] func2 -> DEBU 2bb5 0xc003a9cc90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [cauthdsl] func2 -> DEBU 2bb6 0xc003a9cc90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [msp.identity] Verify -> DEBU 2bb7 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:36.396 UTC [msp.identity] Verify -> DEBU 2bb8 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [cauthdsl] func2 -> DEBU 2bb9 0xc003a9cc90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [cauthdsl] func1 -> DEBU 2bba 0xc003a9cc90 gate 1555913856396666400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [msp.identity] Verify -> DEBU 2bbf Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:36.397 UTC [msp.identity] Verify -> DEBU 2bc0 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc1 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc2 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [gossip.gossip] handleMessage -> DEBU 2bc3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [gossip.comm] func1 -> DEBU 2bc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [gossip.gossip] handleMessage -> DEBU 2bc5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc6 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [msp] DeserializeIdentity -> DEBU 2bca Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [policies] Evaluate -> DEBU 2bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [policies] Evaluate -> DEBU 2bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [policies] Evaluate -> DEBU 2bd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [cauthdsl] func1 -> DEBU 2bd1 0xc0039adec0 gate 1555913856399781500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc0039adec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.399 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc0039adec0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.398 UTC [gossip.comm] func1 -> DEBU 2bc7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.402 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc0039adec0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.403 UTC [msp.identity] Verify -> DEBU 2bd5 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:36.403 UTC [msp.identity] Verify -> DEBU 2bd6 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:36.404 UTC [cauthdsl] func2 -> DEBU 2bd7 0xc0039adec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.404 UTC [cauthdsl] func1 -> DEBU 2bd8 0xc0039adec0 gate 1555913856399781500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.404 UTC [policies] Evaluate -> DEBU 2bd9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.405 UTC [policies] Evaluate -> DEBU 2bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.405 UTC [policies] Evaluate -> DEBU 2bdb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.406 UTC [policies] Evaluate -> DEBU 2bdc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.406 UTC [msp.identity] Verify -> DEBU 2bdd Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:36.407 UTC [msp.identity] Verify -> DEBU 2bde Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:36.407 UTC [msp] DeserializeIdentity -> DEBU 2bdf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.408 UTC [msp] DeserializeIdentity -> DEBU 2be0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.410 UTC [policies] Evaluate -> DEBU 2be4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.410 UTC [policies] Evaluate -> DEBU 2be5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.410 UTC [policies] Evaluate -> DEBU 2be6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.411 UTC [cauthdsl] func1 -> DEBU 2be7 0xc0039a3e00 gate 1555913856411121600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.411 UTC [cauthdsl] func2 -> DEBU 2be8 0xc0039a3e00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.412 UTC [cauthdsl] func2 -> DEBU 2be9 0xc0039a3e00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.412 UTC [cauthdsl] func2 -> DEBU 2bea 0xc0039a3e00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.412 UTC [msp.identity] Verify -> DEBU 2beb Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:36.413 UTC [msp.identity] Verify -> DEBU 2bec Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:36.413 UTC [cauthdsl] func2 -> DEBU 2bed 0xc0039a3e00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.417 UTC [cauthdsl] func1 -> DEBU 2bee 0xc0039a3e00 gate 1555913856411121600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.419 UTC [policies] Evaluate -> DEBU 2bef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.420 UTC [policies] Evaluate -> DEBU 2bf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.420 UTC [policies] Evaluate -> DEBU 2bf1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.423 UTC [policies] Evaluate -> DEBU 2bf2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.424 UTC [gossip.gossip] handleMessage -> DEBU 2bf3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.428 UTC [gossip.gossip] handleMessage -> DEBU 2bf4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.429 UTC [msp] DeserializeIdentity -> DEBU 2bf5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.431 UTC [msp] DeserializeIdentity -> DEBU 2bf6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.432 UTC [msp] DeserializeIdentity -> DEBU 2bf7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bf8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bf9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bfa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.433 UTC [policies] Evaluate -> DEBU 2bfb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.433 UTC [policies] Evaluate -> DEBU 2bfc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.433 UTC [policies] Evaluate -> DEBU 2bfd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.433 UTC [cauthdsl] func1 -> DEBU 2bfe 0xc003899a50 gate 1555913856433188500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.435 UTC [cauthdsl] func2 -> DEBU 2bff 0xc003899a50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.438 UTC [cauthdsl] func2 -> DEBU 2c00 0xc003899a50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.438 UTC [cauthdsl] func2 -> DEBU 2c01 0xc003899a50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.438 UTC [msp.identity] Verify -> DEBU 2c02 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:36.438 UTC [msp.identity] Verify -> DEBU 2c03 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:36.438 UTC [cauthdsl] func2 -> DEBU 2c04 0xc003899a50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.438 UTC [cauthdsl] func1 -> DEBU 2c05 0xc003899a50 gate 1555913856433188500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.438 UTC [policies] Evaluate -> DEBU 2c06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.440 UTC [policies] Evaluate -> DEBU 2c07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.440 UTC [policies] Evaluate -> DEBU 2c08 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.440 UTC [policies] Evaluate -> DEBU 2c09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.440 UTC [msp] DeserializeIdentity -> DEBU 2c0a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.440 UTC [msp] DeserializeIdentity -> DEBU 2c0b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.440 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.440 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [cauthdsl] func1 -> DEBU 2c12 0xc00340b2a0 gate 1555913856441166900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c13 0xc00340b2a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c14 0xc00340b2a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c15 0xc00340b2a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [msp.identity] Verify -> DEBU 2c16 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [msp.identity] Verify -> DEBU 2c17 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c18 0xc00340b2a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [cauthdsl] func1 -> DEBU 2c19 0xc00340b2a0 gate 1555913856441166900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.441 UTC [msp.identity] Verify -> DEBU 2c1e Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:36.442 UTC [msp.identity] Verify -> DEBU 2c1f Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:36.442 UTC [msp.identity] Verify -> DEBU 2c20 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:36.442 UTC [msp.identity] Verify -> DEBU 2c21 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:36.442 UTC [gossip.gossip] handleMessage -> DEBU 2c22 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.454 UTC [gossip.election] waitForInterrupt -> DEBU 2c23 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.454 UTC [gossip.election] IsLeader -> DEBU 2c24 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:36.454 UTC [msp.identity] Sign -> DEBU 2c25 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100C1801 " +peer0.org1.example.com | "2019-04-22 06:17:36.454 UTC [msp.identity] Sign -> DEBU 2c26 Sign: digest: 3D281FFF2AB53FBFA1CC5CBC611709229B5EC6811E5489B278685443B3F6CC78 " +peer0.org1.example.com | "2019-04-22 06:17:36.455 UTC [gossip.election] waitForInterrupt -> DEBU 2c27 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:36.456 UTC [msp] DeserializeIdentity -> DEBU 2c28 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.456 UTC [msp] DeserializeIdentity -> DEBU 2c29 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.457 UTC [msp] DeserializeIdentity -> DEBU 2c2a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.457 UTC [msp] DeserializeIdentity -> DEBU 2c2b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.458 UTC [gossip.comm] Send -> DEBU 2c2c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.459 UTC [msp] DeserializeIdentity -> DEBU 2c2d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.459 UTC [msp] DeserializeIdentity -> DEBU 2c2e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2c30 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.479 UTC [msp] DeserializeIdentity -> DEBU 2c31 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.487 UTC [msp] DeserializeIdentity -> DEBU 2c32 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.488 UTC [gossip.pull] Hello -> DEBU 2c33 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:36.488 UTC [msp] DeserializeIdentity -> DEBU 2c34 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.488 UTC [msp] DeserializeIdentity -> DEBU 2c35 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.488 UTC [gossip.comm] Send -> DEBU 2c36 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.488 UTC [gossip.comm] sendToEndpoint -> DEBU 2c37 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.488 UTC [gossip.comm] sendToEndpoint -> DEBU 2c38 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.489 UTC [gossip.comm] func1 -> DEBU 2c39 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4236186856040757481 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.489 UTC [gossip.gossip] handleMessage -> DEBU 2c3a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4236186856040757481 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.490 UTC [gossip.pull] HandleMessage -> DEBU 2c3b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4236186856040757481 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.490 UTC [gossip.gossip] handleMessage -> DEBU 2c3c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.501 UTC [dockercontroller] deployImage -> DEBU 2c3d Created image: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c" +peer0.org1.example.com | "2019-04-22 06:17:36.501 UTC [dockercontroller] createContainer -> DEBU 2c3e create container" imageID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c containerID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-04-22 06:17:36.592 UTC [dockercontroller] createContainer -> DEBU 2c3f created container" imageID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c containerID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +peer0.org1.example.com | "2019-04-22 06:17:36.603 UTC [gossip.comm] func1 -> DEBU 2c40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.603 UTC [gossip.gossip] handleMessage -> DEBU 2c41 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.603 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.604 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c44 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:36.604 UTC [msp] DeserializeIdentity -> DEBU 2c45 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.605 UTC [gossip.comm] func1 -> DEBU 2c46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.604 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:36.605 UTC [gossip.gossip] handleMessage -> DEBU 2c48 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c49 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c4a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:36.606 UTC [policies] Evaluate -> DEBU 2c4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.606 UTC [policies] Evaluate -> DEBU 2c4c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:36.606 UTC [policies] Evaluate -> DEBU 2c4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:36.608 UTC [cauthdsl] func1 -> DEBU 2c4e 0xc003218d80 gate 1555913856608054800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:36.608 UTC [cauthdsl] func2 -> DEBU 2c4f 0xc003218d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:36.608 UTC [cauthdsl] func2 -> DEBU 2c50 0xc003218d80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:36.609 UTC [cauthdsl] func2 -> DEBU 2c51 0xc003218d80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.609 UTC [msp.identity] Verify -> DEBU 2c52 Verify: digest = 00000000 bb c0 6b ca 5d ef 2a 45 07 a4 02 45 8f 86 e1 b2 |..k.].*E...E....| +peer0.org1.example.com | 00000010 4f c8 66 69 e3 8a ef ef 71 a7 a4 0f 6f 7a e1 f1 |O.fi....q...oz..|" +peer0.org1.example.com | "2019-04-22 06:17:36.610 UTC [msp.identity] Verify -> DEBU 2c53 Verify: sig = 00000000 30 44 02 20 1c 24 93 61 45 4b cf c0 16 0b 71 73 |0D. .$.aEK....qs| +peer0.org1.example.com | 00000010 14 44 bc 29 99 a8 68 5d 39 5d 30 bb b5 ed 8e a8 |.D.)..h]9]0.....| +peer0.org1.example.com | 00000020 c4 ad 3e 72 02 20 79 50 cc 85 6b 97 ae d5 fa 08 |..>r. yP..k.....| +peer0.org1.example.com | 00000030 8c 99 23 c5 d5 2f de 5d 14 de de 19 6e 85 c5 a0 |..#../.]....n...| +peer0.org1.example.com | 00000040 1a c9 e7 a5 97 4c |.....L|" +peer0.org1.example.com | "2019-04-22 06:17:36.615 UTC [cauthdsl] func2 -> DEBU 2c54 0xc003218d80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:36.616 UTC [cauthdsl] func1 -> DEBU 2c55 0xc003218d80 gate 1555913856608054800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c56 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c58 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c59 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:36.617 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c5a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 " +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 " +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c60 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c61 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c63 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.gossip] handleMessage -> DEBU 2c64 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.622 UTC [gossip.gossip] handleMessage -> DEBU 2c65 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.623 UTC [gossip.gossip] handleMessage -> DEBU 2c66 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c68 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.630 UTC [msp] DeserializeIdentity -> DEBU 2c69 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [gossip.comm] Send -> DEBU 2c6f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c70 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c71 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [gossip.comm] Send -> DEBU 2c72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c73 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c74 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c75 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c76 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.652 UTC [gossip.comm] func1 -> DEBU 2c77 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.652 UTC [gossip.gossip] handleMessage -> DEBU 2c78 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.652 UTC [msp] DeserializeIdentity -> DEBU 2c79 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.653 UTC [msp] DeserializeIdentity -> DEBU 2c7a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.654 UTC [gossip.gossip] handleMessage -> DEBU 2c7b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.682 UTC [gossip.comm] func1 -> DEBU 2c7c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.682 UTC [gossip.gossip] handleMessage -> DEBU 2c7d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.683 UTC [gossip.pull] HandleMessage -> DEBU 2c7e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.683 UTC [gossip.pull] SendDigest -> DEBU 2c7f Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:36.683 UTC [gossip.gossip] handleMessage -> DEBU 2c80 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:36.871 UTC [gossip.gossip] handleMessage -> DEBU 2c81 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:36.871 UTC [msp] DeserializeIdentity -> DEBU 2c82 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.871 UTC [msp] DeserializeIdentity -> DEBU 2c83 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.871 UTC [msp] DeserializeIdentity -> DEBU 2c84 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:36.871 UTC [gossip.gossip] handleMessage -> DEBU 2c85 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [gossip.gossip] handleMessage -> DEBU 2c86 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [gossip.gossip] handleMessage -> DEBU 2c87 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c88 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c89 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [msp] DeserializeIdentity -> DEBU 2c8a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [policies] Evaluate -> DEBU 2c8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [policies] Evaluate -> DEBU 2c8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [policies] Evaluate -> DEBU 2c90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [cauthdsl] func1 -> DEBU 2c91 0xc003209ea0 gate 1555913857019917300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:37.019 UTC [cauthdsl] func2 -> DEBU 2c92 0xc003209ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [cauthdsl] func2 -> DEBU 2c93 0xc003209ea0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [cauthdsl] func2 -> DEBU 2c94 0xc003209ea0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [msp.identity] Verify -> DEBU 2c95 Verify: digest = 00000000 a4 e7 78 57 d2 50 2b 77 28 10 30 c4 ba 5e 84 e7 |..xW.P+w(.0..^..| +peer0.org1.example.com | 00000010 56 5d 09 8a bd e5 e3 fa 7d 6c 05 7d d4 c3 e7 e8 |V]......}l.}....|" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [msp.identity] Verify -> DEBU 2c96 Verify: sig = 00000000 30 44 02 20 33 c7 8f e7 2d bb 59 68 c3 a2 b4 d8 |0D. 3...-.Yh....| +peer0.org1.example.com | 00000010 7a 3c 90 8f 94 d5 c3 7b 66 5c cd 98 3a 3f 52 fe |z<.....{f\..:?R.| +peer0.org1.example.com | 00000020 71 d4 32 af 02 20 2c 9a 2c 2f a3 8a dd e8 6d ad |q.2.. ,.,/....m.| +peer0.org1.example.com | 00000030 29 47 9b 58 08 d0 81 5b 00 61 04 ab 1b ea 06 1b |)G.X...[.a......| +peer0.org1.example.com | 00000040 4d a8 c3 b6 79 51 |M...yQ|" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [cauthdsl] func2 -> DEBU 2c97 0xc003209ea0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [cauthdsl] func1 -> DEBU 2c98 0xc003209ea0 gate 1555913857019917300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c99 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c9b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c9d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9f updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 " +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ca0 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 " +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ca1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ca2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ca3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ca4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.027 UTC [msp] DeserializeIdentity -> DEBU 2ca5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2caa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [gossip.comm] Send -> DEBU 2cab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2cac Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2cad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [gossip.comm] Send -> DEBU 2cae Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2caf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.032 UTC [gossip.comm] func1 -> DEBU 2cb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.032 UTC [gossip.gossip] handleMessage -> DEBU 2cb4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.032 UTC [gossip.gossip] handleMessage -> DEBU 2cb5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cb6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.033 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cb7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.034 UTC [gossip.comm] func1 -> DEBU 2cb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.034 UTC [gossip.gossip] handleMessage -> DEBU 2cb9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.034 UTC [gossip.gossip] handleMessage -> DEBU 2cba Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.085 UTC [gossip.comm] func1 -> DEBU 2cbd Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.085 UTC [gossip.gossip] handleMessage -> DEBU 2cbe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:37.085 UTC [msp] DeserializeIdentity -> DEBU 2cbf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.085 UTC [msp] DeserializeIdentity -> DEBU 2cc0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.085 UTC [msp] DeserializeIdentity -> DEBU 2cc1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:37.085 UTC [gossip.gossip] handleMessage -> DEBU 2cc2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:37.492 UTC [dockercontroller] Start -> DEBU 2cc3 Started container dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-04-22 06:17:37.492 UTC [container] unlockContainer -> DEBU 2cc4 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +peer0.org1.example.com | "2019-04-22 06:17:37.492 UTC [container] lockContainer -> DEBU 2cc5 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-04-22 06:17:37.492 UTC [container] lockContainer -> DEBU 2cc6 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +peer0.org1.example.com | "2019-04-22 06:17:37.492 UTC [container] unlockContainer -> DEBU 2cc7 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +peer0.org1.example.com | "2019-04-22 06:17:37.547 UTC [chaincode.accesscontrol] authenticate -> DEBU 2cc8 Chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b 's authentication is authorized" +peer0.org1.example.com | "2019-04-22 06:17:37.547 UTC [chaincode] handleMessage -> DEBU 2cc9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:17:37.548 UTC [chaincode] HandleRegister -> DEBU 2cca Received REGISTER in state created" +peer0.org1.example.com | "2019-04-22 06:17:37.548 UTC [chaincode] Register -> DEBU 2ccb registered handler complete for chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +peer0.org1.example.com | "2019-04-22 06:17:37.549 UTC [chaincode] HandleRegister -> DEBU 2ccc Got REGISTER for chaincodeID = name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" , sending back REGISTERED" +peer0.org1.example.com | "2019-04-22 06:17:37.550 UTC [chaincode] HandleRegister -> DEBU 2ccd Changed state to established for name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +peer0.org1.example.com | "2019-04-22 06:17:37.551 UTC [chaincode] sendReady -> DEBU 2cce sending READY for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +peer0.org1.example.com | "2019-04-22 06:17:37.551 UTC [chaincode] sendReady -> DEBU 2ccf Changed to state ready for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +peer0.org1.example.com | "2019-04-22 06:17:37.552 UTC [chaincode] Launch -> DEBU 2cd0 launch complete" +peer0.org1.example.com | "2019-04-22 06:17:37.552 UTC [stateleveldb] GetState -> DEBU 2cd1 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:37.552 UTC [chaincode] Execute -> DEBU 2cd2 Entry" +peer0.org1.example.com | "2019-04-22 06:17:37.554 UTC [chaincode] handleMessage -> DEBU 2cd3 [b6035b01] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:37.555 UTC [chaincode] HandleTransaction -> DEBU 2cd4 [b6035b01] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:37.555 UTC [chaincode] HandleTransaction -> DEBU 2cd5 [b6035b01] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:37.556 UTC [chaincode] handleMessage -> DEBU 2cd6 [b6035b01] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:37.556 UTC [chaincode] HandleTransaction -> DEBU 2cd7 [b6035b01] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:37.557 UTC [chaincode] HandleTransaction -> DEBU 2cd8 [b6035b01] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:37.558 UTC [chaincode] handleMessage -> DEBU 2cd9 [b6035b01] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:37.558 UTC [chaincode] Notify -> DEBU 2cda [b6035b01] notifying Txid:b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:37.559 UTC [chaincode] Execute -> DEBU 2cdb Exit" +peer0.org1.example.com | "2019-04-22 06:17:37.559 UTC [endorser] callChaincode -> INFO 2cdc [businesschannel][b6035b01] Exit chaincode: name:"exp02" (35201ms)" +peer0.org1.example.com | "2019-04-22 06:17:37.559 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2cdd Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:37.560 UTC [lockbasedtxmgr] Done -> DEBU 2cde Done with transaction simulation / query execution [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +peer0.org1.example.com | "2019-04-22 06:17:37.560 UTC [endorser] SimulateProposal -> DEBU 2cdf [businesschannel][b6035b01] Exit" +peer0.org1.example.com | "2019-04-22 06:17:37.561 UTC [endorser] endorseProposal -> DEBU 2ce0 [businesschannel][b6035b01] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:37.561 UTC [endorser] endorseProposal -> DEBU 2ce1 [businesschannel][b6035b01] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:37.562 UTC [endorser] EndorseWithPlugin -> DEBU 2ce2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:37.562 UTC [msp.identity] Sign -> DEBU 2ce3 Sign: plaintext: 0A205E62A0FB99A6AA398DACDA12BED5...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:37.562 UTC [msp.identity] Sign -> DEBU 2ce4 Sign: digest: BBF6BDA18E30A74FFD497A3AD2FE2E5BD2D360FCA88D569361E164C546735233 " +peer0.org1.example.com | "2019-04-22 06:17:37.563 UTC [endorser] EndorseWithPlugin -> DEBU 2ce5 Exiting {plugin: escc, channel: businesschannel, tx: b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:37.563 UTC [endorser] endorseProposal -> DEBU 2ce6 [businesschannel][b6035b01] Exit" +peer0.org1.example.com | "2019-04-22 06:17:37.564 UTC [lockbasedtxmgr] Done -> DEBU 2ce7 Done with transaction simulation / query execution [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +peer0.org1.example.com | "2019-04-22 06:17:37.564 UTC [endorser] func1 -> DEBU 2ce8 Exit: request from 192.168.224.9:49288" +peer0.org1.example.com | "2019-04-22 06:17:37.564 UTC [comm.grpc.server] 1 -> INFO 2ce9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49288 grpc.code=OK grpc.call_duration=35.2168799s +peer0.org1.example.com | "2019-04-22 06:17:37.585 UTC [grpc] infof -> DEBU 2cea transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:37.585 UTC [grpc] infof -> DEBU 2ceb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:38.881 UTC [gossip.pull] Hello -> DEBU 2cec Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:38.881 UTC [gossip.comm] Send -> DEBU 2ced Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:38.881 UTC [gossip.pull] Hello -> DEBU 2cee Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:38.881 UTC [gossip.comm] Send -> DEBU 2cef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:38.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.881 UTC [gossip.pull] Hello -> DEBU 2cf1 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:38.883 UTC [gossip.comm] Send -> DEBU 2cf5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.883 UTC [gossip.comm] func1 -> DEBU 2cf4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2440110826972685579 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.884 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.885 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.885 UTC [gossip.gossip] handleMessage -> DEBU 2cf8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2440110826972685579 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.886 UTC [gossip.pull] HandleMessage -> DEBU 2cfa GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2440110826972685579 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.886 UTC [gossip.gossip] handleMessage -> DEBU 2cfb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.886 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.889 UTC [gossip.comm] func1 -> DEBU 2cfc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3481237813848302782 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.889 UTC [gossip.gossip] handleMessage -> DEBU 2cfd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3481237813848302782 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.889 UTC [gossip.pull] HandleMessage -> DEBU 2cfe GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3481237813848302782 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.890 UTC [gossip.gossip] handleMessage -> DEBU 2cff Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.891 UTC [gossip.gossip] handleMessage -> DEBU 2d00 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225688882446821864 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.891 UTC [gossip.pull] HandleMessage -> DEBU 2d01 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225688882446821864 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.892 UTC [gossip.gossip] handleMessage -> DEBU 2d02 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.928 UTC [msp.identity] Sign -> DEBU 2d03 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151028 " +peer0.org1.example.com | "2019-04-22 06:17:38.929 UTC [msp.identity] Sign -> DEBU 2d04 Sign: digest: D6BB3AEB77FBF5B91FB725DD15C5ACA1DAD253A5058AE1A4F6C8F5DAA82552DC " +peer0.org1.example.com | "2019-04-22 06:17:38.929 UTC [msp.identity] Sign -> DEBU 2d05 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:38.929 UTC [msp.identity] Sign -> DEBU 2d06 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:38.930 UTC [gossip.comm] Send -> DEBU 2d07 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:38.930 UTC [msp] DeserializeIdentity -> DEBU 2d08 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:38.931 UTC [gossip.comm] sendToEndpoint -> DEBU 2d09 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.931 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.931 UTC [gossip.comm] Send -> DEBU 2d0a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:38.932 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:38.934 UTC [gossip.comm] Send -> DEBU 2d0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:38.933 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.935 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.935 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.936 UTC [gossip.comm] func1 -> DEBU 2d11 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.936 UTC [gossip.gossip] handleMessage -> DEBU 2d13 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.939 UTC [gossip.gossip] handleMessage -> DEBU 2d14 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.940 UTC [gossip.gossip] handleMessage -> DEBU 2d15 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.940 UTC [gossip.comm] func1 -> DEBU 2d16 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.936 UTC [gossip.comm] sendToEndpoint -> DEBU 2d12 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.941 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d18 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:38.942 UTC [msp.identity] Verify -> DEBU 2d19 Verify: digest = 00000000 d6 bb 3a eb 77 fb f5 b9 1f b7 25 dd 15 c5 ac a1 |..:.w.....%.....| +peer0.org1.example.com | 00000010 da d2 53 a5 05 8a e1 a4 f6 c8 f5 da a8 25 52 dc |..S..........%R.|" +peer0.org1.example.com | "2019-04-22 06:17:38.942 UTC [msp.identity] Verify -> DEBU 2d1a Verify: sig = 00000000 30 45 02 21 00 db 45 56 a5 13 cd 78 48 53 38 63 |0E.!..EV...xHS8c| +peer0.org1.example.com | 00000010 8d 7e cf f1 2e 3c ec 73 3a 1d b3 cb 6d b4 5e 05 |.~...<.s:...m.^.| +peer0.org1.example.com | 00000020 80 1f 37 0b c6 02 20 47 bc 1f 5e 51 1e 9b 3a fe |..7... G..^Q..:.| +peer0.org1.example.com | 00000030 d9 ea 75 7b ec fa f3 28 88 0f 8b 09 b1 3b e1 7e |..u{...(.....;.~| +peer0.org1.example.com | 00000040 74 dc ae c0 93 ab c2 |t......|" +peer0.org1.example.com | "2019-04-22 06:17:38.943 UTC [msp.identity] Verify -> DEBU 2d1b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:38.943 UTC [msp.identity] Verify -> DEBU 2d1c Verify: sig = 00000000 30 45 02 21 00 80 39 49 ee 43 e1 40 81 c0 05 c8 |0E.!..9I.C.@....| +peer0.org1.example.com | 00000010 8c c6 79 ae 8c 2e 8d 06 8c 62 dc 45 00 ae ea ad |..y......b.E....| +peer0.org1.example.com | 00000020 04 1a 18 bb f3 02 20 09 2c d5 37 f1 61 5d 2f 8f |...... .,.7.a]/.| +peer0.org1.example.com | 00000030 15 2c 55 10 91 8f fe 4b 3b d8 4a b9 ff 02 08 7b |.,U....K;.J....{| +peer0.org1.example.com | 00000040 c7 ec f3 df 6f b6 c0 |....o..|" +peer0.org1.example.com | "2019-04-22 06:17:38.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d1d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.945 UTC [gossip.discovery] isSentByMe -> DEBU 2d1e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d1f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d20 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.946 UTC [gossip.gossip] handleMessage -> DEBU 2d21 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.947 UTC [gossip.gossip] handleMessage -> DEBU 2d22 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d24 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:38.948 UTC [msp.identity] Verify -> DEBU 2d25 Verify: digest = 00000000 d6 bb 3a eb 77 fb f5 b9 1f b7 25 dd 15 c5 ac a1 |..:.w.....%.....| +peer0.org1.example.com | 00000010 da d2 53 a5 05 8a e1 a4 f6 c8 f5 da a8 25 52 dc |..S..........%R.|" +peer0.org1.example.com | "2019-04-22 06:17:38.948 UTC [msp.identity] Verify -> DEBU 2d26 Verify: sig = 00000000 30 45 02 21 00 db 45 56 a5 13 cd 78 48 53 38 63 |0E.!..EV...xHS8c| +peer0.org1.example.com | 00000010 8d 7e cf f1 2e 3c ec 73 3a 1d b3 cb 6d b4 5e 05 |.~...<.s:...m.^.| +peer0.org1.example.com | 00000020 80 1f 37 0b c6 02 20 47 bc 1f 5e 51 1e 9b 3a fe |..7... G..^Q..:.| +peer0.org1.example.com | 00000030 d9 ea 75 7b ec fa f3 28 88 0f 8b 09 b1 3b e1 7e |..u{...(.....;.~| +peer0.org1.example.com | 00000040 74 dc ae c0 93 ab c2 |t......|" +peer0.org1.example.com | "2019-04-22 06:17:38.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d27 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.949 UTC [gossip.discovery] isSentByMe -> DEBU 2d28 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d29 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d2a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.950 UTC [gossip.gossip] handleMessage -> DEBU 2d2b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d2c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d2d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:38.952 UTC [msp.identity] Verify -> DEBU 2d2e Verify: digest = 00000000 d6 bb 3a eb 77 fb f5 b9 1f b7 25 dd 15 c5 ac a1 |..:.w.....%.....| +peer0.org1.example.com | 00000010 da d2 53 a5 05 8a e1 a4 f6 c8 f5 da a8 25 52 dc |..S..........%R.|" +peer0.org1.example.com | "2019-04-22 06:17:38.952 UTC [msp.identity] Verify -> DEBU 2d2f Verify: sig = 00000000 30 45 02 21 00 db 45 56 a5 13 cd 78 48 53 38 63 |0E.!..EV...xHS8c| +peer0.org1.example.com | 00000010 8d 7e cf f1 2e 3c ec 73 3a 1d b3 cb 6d b4 5e 05 |.~...<.s:...m.^.| +peer0.org1.example.com | 00000020 80 1f 37 0b c6 02 20 47 bc 1f 5e 51 1e 9b 3a fe |..7... G..^Q..:.| +peer0.org1.example.com | 00000030 d9 ea 75 7b ec fa f3 28 88 0f 8b 09 b1 3b e1 7e |..u{...(.....;.~| +peer0.org1.example.com | 00000040 74 dc ae c0 93 ab c2 |t......|" +peer0.org1.example.com | "2019-04-22 06:17:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d30 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.953 UTC [gossip.discovery] isSentByMe -> DEBU 2d31 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d32 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:38.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d33 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.137 UTC [gossip.comm] func1 -> DEBU 2d34 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.139 UTC [gossip.gossip] handleMessage -> DEBU 2d35 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.139 UTC [gossip.pull] HandleMessage -> DEBU 2d36 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.140 UTC [gossip.pull] SendDigest -> DEBU 2d37 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:39.142 UTC [gossip.gossip] handleMessage -> DEBU 2d38 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.162 UTC [gossip.comm] func1 -> DEBU 2d39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.163 UTC [gossip.gossip] handleMessage -> DEBU 2d3a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.164 UTC [gossip.gossip] handleMessage -> DEBU 2d3b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d3c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d3d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:39.165 UTC [msp.identity] Verify -> DEBU 2d3e Verify: digest = 00000000 41 c0 e8 14 95 7a 3a ef f0 a5 8b 2b d1 f6 7c cb |A....z:....+..|.| +peer0.org1.example.com | 00000010 dd 50 77 6c 0e dd 8e 9d a4 58 53 34 dd ab de af |.Pwl.....XS4....|" +peer0.org1.example.com | "2019-04-22 06:17:39.165 UTC [msp.identity] Verify -> DEBU 2d3f Verify: sig = 00000000 30 45 02 21 00 b3 77 5f 66 f4 38 99 05 83 b3 ad |0E.!..w_f.8.....| +peer0.org1.example.com | 00000010 da 46 f2 e2 98 46 cb 56 b4 00 52 7e 78 46 97 11 |.F...F.V..R~xF..| +peer0.org1.example.com | 00000020 5b a2 3f 9b 83 02 20 33 2b 0b 7e aa fd 9c 0a ed |[.?... 3+.~.....| +peer0.org1.example.com | 00000030 27 3c df 10 e1 af db 88 5f 92 6a 29 e3 fb 94 32 |'<......_.j)...2| +peer0.org1.example.com | 00000040 b4 fa 0d 00 15 bf 23 |......#|" +peer0.org1.example.com | "2019-04-22 06:17:39.166 UTC [msp.identity] Verify -> DEBU 2d40 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:39.167 UTC [msp.identity] Verify -> DEBU 2d41 Verify: sig = 00000000 30 45 02 21 00 c9 c4 02 cf 20 1d 8d 88 1e de 49 |0E.!..... .....I| +peer0.org1.example.com | 00000010 4c ed 30 62 d6 3f 10 ec 26 45 46 a1 87 c1 96 51 |L.0b.?..&EF....Q| +peer0.org1.example.com | 00000020 07 83 0a 07 95 02 20 2a 61 2b 55 02 6e 88 92 1f |...... *a+U.n...| +peer0.org1.example.com | 00000030 7f 45 d9 ba 56 5e a6 01 d8 5a fd 0c 1f b6 3b de |.E..V^...Z....;.| +peer0.org1.example.com | 00000040 d3 25 9a 8f d7 0d 53 |.%....S|" +peer0.org1.example.com | "2019-04-22 06:17:39.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d42 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d43 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d44 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 " +peer0.org1.example.com | "2019-04-22 06:17:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d45 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 " +peer0.org1.example.com | "2019-04-22 06:17:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d46 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d47 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d48 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d49 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.169 UTC [gossip.discovery] sendMemResponse -> DEBU 2d4a Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:39.170 UTC [msp] DeserializeIdentity -> DEBU 2d4b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.170 UTC [msp] DeserializeIdentity -> DEBU 2d4c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.171 UTC [gossip.comm] Send -> DEBU 2d4d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:39.171 UTC [gossip.discovery] sendMemResponse -> DEBU 2d4e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 2d4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.172 UTC [gossip.comm] sendToEndpoint -> DEBU 2d50 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.600 UTC [gossip.comm] func1 -> DEBU 2d51 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.602 UTC [gossip.gossip] handleMessage -> DEBU 2d52 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.602 UTC [gossip.pull] HandleMessage -> DEBU 2d53 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.602 UTC [msp] DeserializeIdentity -> DEBU 2d54 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.603 UTC [msp] DeserializeIdentity -> DEBU 2d55 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.603 UTC [msp] DeserializeIdentity -> DEBU 2d56 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.603 UTC [msp] DeserializeIdentity -> DEBU 2d57 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.604 UTC [msp] DeserializeIdentity -> DEBU 2d58 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.604 UTC [msp] DeserializeIdentity -> DEBU 2d59 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.604 UTC [gossip.pull] SendDigest -> DEBU 2d5a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:39.604 UTC [gossip.gossip] handleMessage -> DEBU 2d5b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.619 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2d5c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:39.619 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2d5d Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:39.619 UTC [policies] Evaluate -> DEBU 2d5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:17:39.619 UTC [policies] Evaluate -> DEBU 2d5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:39.619 UTC [policies] Evaluate -> DEBU 2d60 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:39.619 UTC [cauthdsl] func1 -> DEBU 2d61 0xc00299d680 gate 1555913859619817500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:39.620 UTC [cauthdsl] func2 -> DEBU 2d62 0xc00299d680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:39.620 UTC [cauthdsl] func2 -> DEBU 2d63 0xc00299d680 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:39.620 UTC [cauthdsl] func2 -> DEBU 2d64 0xc00299d680 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:39.620 UTC [msp.identity] Verify -> DEBU 2d65 Verify: digest = 00000000 5a ce 71 ed e5 f5 d2 64 27 80 f3 fa fc 9c 00 90 |Z.q....d'.......| +peer0.org1.example.com | 00000010 18 fa bf 7d 5d 6b 04 d4 88 2e 59 e6 b6 f2 24 70 |...}]k....Y...$p|" +peer0.org1.example.com | "2019-04-22 06:17:39.621 UTC [msp.identity] Verify -> DEBU 2d66 Verify: sig = 00000000 30 45 02 21 00 ed 0c bd 64 dd 7c d2 2f 0c 88 9c |0E.!....d.|./...| +peer0.org1.example.com | 00000010 52 31 3b be bb 08 33 cb 43 47 56 96 15 c2 6c 94 |R1;...3.CGV...l.| +peer0.org1.example.com | 00000020 da 19 0e a2 f9 02 20 7a b5 3b b0 f4 59 2c dc 4b |...... z.;..Y,.K| +peer0.org1.example.com | 00000030 bf 51 5f fc f7 39 c1 52 c2 38 ac c8 e2 42 69 d3 |.Q_..9.R.8...Bi.| +peer0.org1.example.com | 00000040 6e 75 49 5a 22 f0 b6 |nuIZ"..|" +peer0.org1.example.com | "2019-04-22 06:17:39.621 UTC [cauthdsl] func2 -> DEBU 2d67 0xc00299d680 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:39.621 UTC [cauthdsl] func1 -> DEBU 2d68 0xc00299d680 gate 1555913859619817500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:39.621 UTC [policies] Evaluate -> DEBU 2d69 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:39.621 UTC [policies] Evaluate -> DEBU 2d6a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:39.622 UTC [policies] Evaluate -> DEBU 2d6b Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:39.622 UTC [policies] Evaluate -> DEBU 2d6c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:39.622 UTC [blocksProvider] DeliverBlocks -> DEBU 2d6d [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.623 UTC [gossip.state] addPayload -> DEBU 2d6e [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.623 UTC [gossip.state] addPayload -> DEBU 2d6f Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:17:39.623 UTC [blocksProvider] DeliverBlocks -> DEBU 2d70 [businesschannel] Gossiping block [6], peers number [3]" +peer0.org1.example.com | "2019-04-22 06:17:39.623 UTC [gossip.state] deliverPayloads -> DEBU 2d71 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.623 UTC [gossip.state] deliverPayloads -> DEBU 2d72 [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:17:39.623 UTC [gossip.privdata] StoreBlock -> INFO 2d73 [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-04-22 06:17:39.624 UTC [gossip.privdata] StoreBlock -> DEBU 2d74 [businesschannel] Validating block [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.624 UTC [committer.txvalidator] Validate -> DEBU 2d75 [businesschannel] START Block Validation for block [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.624 UTC [committer.txvalidator] Validate -> DEBU 2d76 expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:17:39.625 UTC [committer.txvalidator] validateTx -> DEBU 2d77 [businesschannel] validateTx starts for block 0xc003b14980 env 0xc0024f1cc0 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:39.625 UTC [protoutils] ValidateTransaction -> DEBU 2d78 ValidateTransactionEnvelope starts for envelope 0xc0024f1cc0" +peer0.org1.example.com | "2019-04-22 06:17:39.625 UTC [protoutils] ValidateTransaction -> DEBU 2d79 Header is channel_header:"\010\003\032\014\010\336\270\365\345\005\020\370\334\361\265\001\"\017businesschannel*@b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\235\205p\301SU!7v%\365u9\370\177\005\26724\017\017HR:" " +peer0.org1.example.com | "2019-04-22 06:17:39.625 UTC [protoutils] validateChannelHeader -> DEBU 2d7a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:39.625 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d7b begin" +peer0.org1.example.com | "2019-04-22 06:17:39.626 UTC [msp] GetManagerForChain -> DEBU 2d7c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:39.626 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d7d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:39.626 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d7e creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:39.626 UTC [msp.identity] Verify -> DEBU 2d7f Verify: digest = 00000000 85 7c a1 d9 67 9c de 88 5d fb 97 8c eb 4a 43 fa |.|..g...]....JC.| +peer0.org1.example.com | 00000010 75 1a d2 7a 6c 28 ae 49 bd f7 17 83 f5 67 5f 12 |u..zl(.I.....g_.|" +peer0.org1.example.com | "2019-04-22 06:17:39.627 UTC [msp.identity] Verify -> DEBU 2d80 Verify: sig = 00000000 30 44 02 20 79 64 5c 7c 1e dc 81 c1 b7 3b 78 d7 |0D. yd\|.....;x.| +peer0.org1.example.com | 00000010 64 4c e9 28 a7 bc f9 86 92 37 84 cf 1a 4f 83 25 |dL.(.....7...O.%| +peer0.org1.example.com | 00000020 64 3c 6d 63 02 20 39 67 37 2b 83 57 e7 ca 9b ca |d DEBU 2d81 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:39.627 UTC [protoutils] validateEndorserTransaction -> DEBU 2d82 validateEndorserTransaction starts for data 0xc002267000, header channel_header:"\010\003\032\014\010\336\270\365\345\005\020\370\334\361\265\001\"\017businesschannel*@b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\235\205p\301SU!7v%\365u9\370\177\005\26724\017\017HR:" " +peer0.org1.example.com | "2019-04-22 06:17:39.627 UTC [protoutils] validateEndorserTransaction -> DEBU 2d83 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-04-22 06:17:39.628 UTC [protoutils] validateEndorserTransaction -> DEBU 2d84 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-04-22 06:17:39.628 UTC [protoutils] ValidateTransaction -> DEBU 2d85 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-04-22 06:17:39.628 UTC [gossip.channel] AddToMsgStore -> DEBU 2d87 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4072 bytes, seq: 6}, Envelope: 4102 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:17:39.629 UTC [gossip.pull] Add -> DEBU 2d88 Added 6, total items: 6" +peer0.org1.example.com | "2019-04-22 06:17:39.629 UTC [msp] DeserializeIdentity -> DEBU 2d89 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.629 UTC [msp] DeserializeIdentity -> DEBU 2d8a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.629 UTC [msp] DeserializeIdentity -> DEBU 2d8b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.630 UTC [msp] DeserializeIdentity -> DEBU 2d8c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.631 UTC [gossip.comm] Send -> DEBU 2d8d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4072 bytes, seq: 6}, Envelope: 4102 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:39.631 UTC [msp] DeserializeIdentity -> DEBU 2d8e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.628 UTC [committer.txvalidator] validateTx -> DEBU 2d86 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:39.632 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d8f retrieveTransactionByID() - txId = [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +peer0.org1.example.com | "2019-04-22 06:17:39.631 UTC [msp] DeserializeIdentity -> DEBU 2d91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.632 UTC [committer.txvalidator] validateTx -> DEBU 2d90 Validating transaction with plugins" +peer0.org1.example.com | "2019-04-22 06:17:39.632 UTC [gossip.comm] sendToEndpoint -> DEBU 2d92 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4072 bytes, seq: 6}, Envelope: 4102 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.633 UTC [gossip.comm] sendToEndpoint -> DEBU 2d93 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.646 UTC [committer.txvalidator] Dispatch -> DEBU 2d94 [businesschannel] Dispatch starts for bytes 0xc002f88400" +peer0.org1.example.com | "2019-04-22 06:17:39.646 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2d95 constructing new query executor txid = [7d2b0d80-a13c-47fd-9fe8-50ba530b8662]" +peer0.org1.example.com | "2019-04-22 06:17:39.650 UTC [stateleveldb] GetState -> DEBU 2d96 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-04-22 06:17:39.651 UTC [gossip.comm] func1 -> DEBU 2d97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.651 UTC [gossip.gossip] handleMessage -> DEBU 2d98 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.651 UTC [gossip.gossip] handleMessage -> DEBU 2d99 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d9a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.652 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d9b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:39.652 UTC [msp] DeserializeIdentity -> DEBU 2d9c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.652 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:39.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:39.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:39.652 UTC [policies] Evaluate -> DEBU 2da0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:39.652 UTC [policies] Evaluate -> DEBU 2da1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:39.653 UTC [policies] Evaluate -> DEBU 2da2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:39.653 UTC [cauthdsl] func1 -> DEBU 2da3 0xc0026c6640 gate 1555913859653248600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:39.653 UTC [cauthdsl] func2 -> DEBU 2da4 0xc0026c6640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:39.653 UTC [cauthdsl] func2 -> DEBU 2da5 0xc0026c6640 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:39.654 UTC [cauthdsl] func2 -> DEBU 2da6 0xc0026c6640 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:39.654 UTC [msp.identity] Verify -> DEBU 2da7 Verify: digest = 00000000 b8 6d ea 1e 98 11 99 4a c5 a7 34 ac 2a fd b8 4e |.m.....J..4.*..N| +peer0.org1.example.com | 00000010 b2 51 32 ba 34 3e 5d 20 25 1c 5e 72 3c 97 4e 17 |.Q2.4>] %.^r<.N.|" +peer0.org1.example.com | "2019-04-22 06:17:39.654 UTC [msp.identity] Verify -> DEBU 2da8 Verify: sig = 00000000 30 45 02 21 00 9e 31 53 1a 32 1e 43 14 cf 58 4f |0E.!..1S.2.C..XO| +peer0.org1.example.com | 00000010 03 65 b1 0a ea 67 30 47 a2 d0 97 f9 67 e8 31 b3 |.e...g0G....g.1.| +peer0.org1.example.com | 00000020 04 88 a9 a3 9b 02 20 2c ec d8 51 db 2f 9d 96 44 |...... ,..Q./..D| +peer0.org1.example.com | 00000030 a0 13 9a 75 bd c4 3e a3 6b 60 65 78 d5 c6 c3 8d |...u..>.k`ex....| +peer0.org1.example.com | 00000040 98 f5 8e 48 41 68 b2 |...HAh.|" +peer0.org1.example.com | "2019-04-22 06:17:39.655 UTC [cauthdsl] func2 -> DEBU 2da9 0xc0026c6640 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:39.655 UTC [cauthdsl] func1 -> DEBU 2daa 0xc0026c6640 gate 1555913859653248600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:39.655 UTC [policies] Evaluate -> DEBU 2dab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:39.655 UTC [policies] Evaluate -> DEBU 2dac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:39.656 UTC [policies] Evaluate -> DEBU 2dad Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:39.656 UTC [policies] Evaluate -> DEBU 2dae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:39.656 UTC [gossip.discovery] handleAliveMessage -> DEBU 2daf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:39.657 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 " +peer0.org1.example.com | "2019-04-22 06:17:39.657 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 " +peer0.org1.example.com | "2019-04-22 06:17:39.657 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:39.658 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.650 UTC [stateleveldb] GetState -> DEBU 2db0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:39.659 UTC [stateleveldb] GetState -> DEBU 2db6 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-04-22 06:17:39.659 UTC [stateleveldb] GetState -> DEBU 2db7 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-04-22 06:17:39.660 UTC [stateleveldb] GetState -> DEBU 2db8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-04-22 06:17:39.660 UTC [lockbasedtxmgr] Done -> DEBU 2db9 Done with transaction simulation / query execution [7d2b0d80-a13c-47fd-9fe8-50ba530b8662]" +peer0.org1.example.com | "2019-04-22 06:17:39.660 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 2dba Validating Tx b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-04-22 06:17:39.661 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2dbb constructing new query executor txid = [4da783fe-5419-4ac8-adca-949188b93c00]" +peer0.org1.example.com | "2019-04-22 06:17:39.661 UTC [lockbasedtxmgr] Done -> DEBU 2dbc Done with transaction simulation / query execution [4da783fe-5419-4ac8-adca-949188b93c00]" +peer0.org1.example.com | "2019-04-22 06:17:39.661 UTC [cauthdsl] func1 -> DEBU 2dbd 0xc000236500 gate 1555913859661779300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:39.662 UTC [cauthdsl] func2 -> DEBU 2dbe 0xc000236500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:39.662 UTC [cauthdsl] func2 -> DEBU 2dbf 0xc000236500 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:39.662 UTC [cauthdsl] func2 -> DEBU 2dc0 0xc000236500 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:39.662 UTC [msp.identity] Verify -> DEBU 2dc1 Verify: digest = 00000000 bb f6 bd a1 8e 30 a7 4f fd 49 7a 3a d2 fe 2e 5b |.....0.O.Iz:...[| +peer0.org1.example.com | 00000010 d2 d3 60 fc a8 8d 56 93 61 e1 64 c5 46 73 52 33 |..`...V.a.d.FsR3|" +peer0.org1.example.com | "2019-04-22 06:17:39.662 UTC [msp.identity] Verify -> DEBU 2dc2 Verify: sig = 00000000 30 44 02 20 5b 4e a1 c7 92 57 11 e8 5d 98 45 3e |0D. [N...W..].E>| +peer0.org1.example.com | 00000010 6e f2 5e ee 4a 61 8e 41 7e fc 86 d6 8b af 4f 0a |n.^.Ja.A~.....O.| +peer0.org1.example.com | 00000020 c9 25 08 d7 02 20 59 82 69 c9 6a c3 70 47 5c c7 |.%... Y.i.j.pG\.| +peer0.org1.example.com | 00000030 9a 73 29 7d 1a 9f f9 f9 5a 84 8e 61 8e 5f 60 20 |.s)}....Z..a._` | +peer0.org1.example.com | 00000040 35 ac 80 88 4d bb |5...M.|" +peer0.org1.example.com | "2019-04-22 06:17:39.663 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc000236500 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:39.663 UTC [cauthdsl] func2 -> DEBU 2dc4 0xc000236500 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-04-22 06:17:39.663 UTC [cauthdsl] func2 -> DEBU 2dc5 0xc000236500 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-04-22 06:17:39.664 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc000236500 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:39.664 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc000236500 gate 1555913859661779300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:39.664 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2dc8 constructing new query executor txid = [a79871b4-6217-4820-aefd-e8fe8b6258c4]" +peer0.org1.example.com | "2019-04-22 06:17:39.664 UTC [lockbasedtxmgr] Done -> DEBU 2dc9 Done with transaction simulation / query execution [a79871b4-6217-4820-aefd-e8fe8b6258c4]" +peer0.org1.example.com | "2019-04-22 06:17:39.665 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2dca constructing new query executor txid = [9b99bdf2-bacd-422d-8072-866f53ec829f]" +peer0.org1.example.com | "2019-04-22 06:17:39.665 UTC [lockbasedtxmgr] Done -> DEBU 2dcb Done with transaction simulation / query execution [9b99bdf2-bacd-422d-8072-866f53ec829f]" +peer0.org1.example.com | "2019-04-22 06:17:39.665 UTC [vscc] Validate -> DEBU 2dcc block 6, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-04-22 06:17:39.665 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2dcd Transaction b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead appears to be valid" +peer0.org1.example.com | "2019-04-22 06:17:39.666 UTC [committer.txvalidator] Dispatch -> DEBU 2dce [businesschannel] Dispatch completes env bytes 0xc002f88400" +peer0.org1.example.com | "2019-04-22 06:17:39.666 UTC [committer.txvalidator] validateTx -> DEBU 2dcf [businesschannel] validateTx completes for block 0xc003b14980 env 0xc0024f1cc0 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:39.666 UTC [committer.txvalidator] Validate -> DEBU 2dd0 got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:17:39.667 UTC [committer.txvalidator] Validate -> INFO 2dd1 [businesschannel] Validated block [6] in 42ms" +peer0.org1.example.com | "2019-04-22 06:17:39.667 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2dd2 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:17:39.667 UTC [gossip.privdata] StoreBlock -> DEBU 2dd3 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:17:39.668 UTC [kvledger] CommitWithPvtData -> DEBU 2dd4 [businesschannel] Validating state for block [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.668 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2dd5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:17:39.668 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2dd6 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:17:39.669 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2dd7 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:17:39.669 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2dd8 ValidateAndPrepareBatch() for block number = [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.669 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2dd9 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:39.669 UTC [valimpl] preprocessProtoBlock -> DEBU 2dda txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-04-22 06:17:39.670 UTC [stateleveldb] GetState -> DEBU 2ddb GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:39.670 UTC [statebasedval] validateKVRead -> DEBU 2ddc Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:39.671 UTC [stateleveldb] GetState -> DEBU 2ddd GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:39.671 UTC [statebasedval] validateKVRead -> DEBU 2dde Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-04-22 06:17:39.672 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2ddf Block [6] Transaction index [0] TxId [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-04-22 06:17:39.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 2de0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.675 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2de1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.676 UTC [gossip.discovery] sendMemResponse -> DEBU 2de2 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:39.676 UTC [msp] DeserializeIdentity -> DEBU 2de3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.677 UTC [msp] DeserializeIdentity -> DEBU 2de4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.679 UTC [msp] DeserializeIdentity -> DEBU 2de5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:39.679 UTC [gossip.comm] Send -> DEBU 2de6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:39.679 UTC [gossip.discovery] sendMemResponse -> DEBU 2de7 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:39.680 UTC [gossip.comm] sendToEndpoint -> DEBU 2de8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:39.680 UTC [gossip.comm] sendToEndpoint -> DEBU 2de9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:39.673 UTC [valinternal] ApplyWriteSet -> DEBU 2dea txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc002957b80), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002957bc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002957c00)}" +peer0.org1.example.com | "2019-04-22 06:17:39.681 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2deb validating rwset..." +peer0.org1.example.com | "2019-04-22 06:17:39.682 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2dec postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:39.682 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2ded ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:17:39.683 UTC [kvledger] CommitWithPvtData -> DEBU 2dee [businesschannel] Committing block [6] to storage" +peer0.org1.example.com | "2019-04-22 06:17:39.684 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2def Writing block [6] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:17:39.688 UTC [pvtdatastorage] Prepare -> DEBU 2df0 Saved 0 private data write sets for block [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.692 UTC [fsblkstorage] indexBlock -> DEBU 2df1 Indexing block [blockNum=6, blockHash=[]byte{0x89, 0x22, 0x9f, 0x2d, 0xa7, 0x77, 0x8a, 0xc2, 0xd3, 0xc7, 0xbe, 0x3a, 0x97, 0x4d, 0xd2, 0xe2, 0xa9, 0xcf, 0xa6, 0xc0, 0x51, 0xd, 0x23, 0x40, 0x9d, 0x6b, 0xd2, 0xb5, 0x3f, 0x68, 0x94, 0xfe} txOffsets= +peer0.org1.example.com | txId=b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead locPointer=offset=70, bytesLength=3053 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:17:39.692 UTC [fsblkstorage] indexBlock -> DEBU 2df2 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx ID: [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead] to txid-index" +peer0.org1.example.com | "2019-04-22 06:17:39.692 UTC [fsblkstorage] indexBlock -> DEBU 2df3 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx number:[0] ID: [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:17:39.696 UTC [fsblkstorage] updateCheckpoint -> DEBU 2df4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90572], isChainEmpty=[false], lastBlockNumber=[6]" +peer0.org1.example.com | "2019-04-22 06:17:39.696 UTC [pvtdatastorage] Commit -> DEBU 2df5 Committing private data for block [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.700 UTC [pvtdatastorage] Commit -> DEBU 2df6 Committed private data for block [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.701 UTC [kvledger] CommitWithPvtData -> DEBU 2df7 [businesschannel] Committing block [6] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:17:39.701 UTC [lockbasedtxmgr] Commit -> DEBU 2df8 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:39.701 UTC [lockbasedtxmgr] Commit -> DEBU 2df9 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:39.702 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2dfa Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:17:39.703 UTC [lockbasedtxmgr] Commit -> DEBU 2dfb Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:39.703 UTC [stateleveldb] ApplyUpdates -> DEBU 2dfc Channel [businesschannel]: Applying key(string)=[exp02􏿿initialized] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]" +peer0.org1.example.com | "2019-04-22 06:17:39.703 UTC [stateleveldb] ApplyUpdates -> DEBU 2dfd Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-04-22 06:17:39.703 UTC [stateleveldb] ApplyUpdates -> DEBU 2dfe Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-04-22 06:17:39.708 UTC [lockbasedtxmgr] Commit -> DEBU 2dff Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:17:39.709 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2e00 Preparing potential purge list working-set for expiringAtBlk [7]" +peer0.org1.example.com | "2019-04-22 06:17:39.710 UTC [leveldbhelper] GetIterator -> DEBU 2e01 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:17:39.710 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2e02 No expiry entry found for expiringAtBlk [7]" +peer0.org1.example.com | "2019-04-22 06:17:39.710 UTC [lockbasedtxmgr] func1 -> DEBU 2e03 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:17:39.710 UTC [kvledger] CommitWithPvtData -> DEBU 2e04 [businesschannel] Committing block [6] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:17:39.710 UTC [historyleveldb] Commit -> DEBU 2e05 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:17:39.713 UTC [historyleveldb] Commit -> DEBU 2e06 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +peer0.org1.example.com | "2019-04-22 06:17:39.713 UTC [kvledger] CommitWithPvtData -> INFO 2e07 [businesschannel] Committed block [6] with 1 transaction(s) in 45ms (state_validation=15ms block_commit=17ms state_commit=9ms)" +peer0.org1.example.com | "2019-04-22 06:17:39.714 UTC [msp.identity] Sign -> DEBU 2e08 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020807 " +peer0.org1.example.com | "2019-04-22 06:17:39.714 UTC [msp.identity] Sign -> DEBU 2e09 Sign: digest: D77CB62BABDCB6272C86E99C782E9568767263152B3B60BA689C41A804DD718B " +peer0.org1.example.com | "2019-04-22 06:17:39.714 UTC [gossip.state] commitBlock -> DEBU 2e0a [businesschannel] Committed block [6] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:17:40.019 UTC [gossip.gossip] handleMessage -> DEBU 2e0b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.019 UTC [gossip.pull] HandleMessage -> DEBU 2e0c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.019 UTC [msp] DeserializeIdentity -> DEBU 2e0d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.020 UTC [msp] DeserializeIdentity -> DEBU 2e0e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.020 UTC [msp] DeserializeIdentity -> DEBU 2e0f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.021 UTC [msp] DeserializeIdentity -> DEBU 2e10 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.021 UTC [msp] DeserializeIdentity -> DEBU 2e11 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.021 UTC [msp] DeserializeIdentity -> DEBU 2e12 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.022 UTC [gossip.pull] SendDigest -> DEBU 2e13 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:40.022 UTC [gossip.gossip] handleMessage -> DEBU 2e14 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.038 UTC [gossip.gossip] handleMessage -> DEBU 2e15 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.038 UTC [gossip.gossip] handleMessage -> DEBU 2e16 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.039 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.039 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e18 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:40.039 UTC [msp] DeserializeIdentity -> DEBU 2e19 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.040 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e1b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e1c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.040 UTC [policies] Evaluate -> DEBU 2e1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.041 UTC [policies] Evaluate -> DEBU 2e1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.041 UTC [policies] Evaluate -> DEBU 2e1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.041 UTC [cauthdsl] func1 -> DEBU 2e20 0xc0005e5ae0 gate 1555913860041645800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.042 UTC [cauthdsl] func2 -> DEBU 2e21 0xc0005e5ae0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.042 UTC [cauthdsl] func2 -> DEBU 2e22 0xc0005e5ae0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.043 UTC [cauthdsl] func2 -> DEBU 2e23 0xc0005e5ae0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.043 UTC [msp.identity] Verify -> DEBU 2e24 Verify: digest = 00000000 3b 7d 93 03 12 08 77 57 ce 6d d2 75 3e 53 73 a0 |;}....wW.m.u>Ss.| +peer0.org1.example.com | 00000010 03 ce 7c 01 91 e7 1f c7 f3 c1 7f 23 81 de 6b 7b |..|........#..k{|" +peer0.org1.example.com | "2019-04-22 06:17:40.043 UTC [msp.identity] Verify -> DEBU 2e25 Verify: sig = 00000000 30 44 02 20 71 8c 36 26 b5 7a 16 e1 ef 88 63 77 |0D. q.6&.z....cw| +peer0.org1.example.com | 00000010 77 26 50 a0 02 5a 6f 0f 2a 96 53 3b 02 f9 99 4e |w&P..Zo.*.S;...N| +peer0.org1.example.com | 00000020 82 2a 56 8d 02 20 0a 01 40 df d7 5b 05 11 a4 88 |.*V.. ..@..[....| +peer0.org1.example.com | 00000030 1c 1e c5 bc d8 a1 a6 04 52 87 aa 86 50 50 d7 2c |........R...PP.,| +peer0.org1.example.com | 00000040 88 be d5 da 55 65 |....Ue|" +peer0.org1.example.com | "2019-04-22 06:17:40.044 UTC [cauthdsl] func2 -> DEBU 2e26 0xc0005e5ae0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.044 UTC [cauthdsl] func1 -> DEBU 2e27 0xc0005e5ae0 gate 1555913860041645800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.044 UTC [policies] Evaluate -> DEBU 2e28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.045 UTC [policies] Evaluate -> DEBU 2e29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.045 UTC [policies] Evaluate -> DEBU 2e2a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.045 UTC [policies] Evaluate -> DEBU 2e2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.046 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e2c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2e updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 " +peer0.org1.example.com | "2019-04-22 06:17:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2f Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 " +peer0.org1.example.com | "2019-04-22 06:17:40.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e30 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:40.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e31 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e32 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.048 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e33 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.048 UTC [gossip.discovery] sendMemResponse -> DEBU 2e34 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:40.048 UTC [msp] DeserializeIdentity -> DEBU 2e35 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.049 UTC [msp] DeserializeIdentity -> DEBU 2e36 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.049 UTC [msp] DeserializeIdentity -> DEBU 2e37 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.049 UTC [gossip.comm] Send -> DEBU 2e38 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:40.049 UTC [gossip.discovery] sendMemResponse -> DEBU 2e39 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:40.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.389 UTC [msp] DeserializeIdentity -> DEBU 2e3c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.390 UTC [msp] DeserializeIdentity -> DEBU 2e3d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.391 UTC [gossip.comm] Send -> DEBU 2e3e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e40 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e41 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e42 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2e43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2e44 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.392 UTC [msp] DeserializeIdentity -> DEBU 2e45 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.392 UTC [msp] DeserializeIdentity -> DEBU 2e46 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.392 UTC [gossip.comm] Send -> DEBU 2e47 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:40.392 UTC [msp] DeserializeIdentity -> DEBU 2e48 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.393 UTC [msp] DeserializeIdentity -> DEBU 2e49 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.393 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.393 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.395 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.396 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.396 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.396 UTC [gossip.gossip] handleMessage -> DEBU 2e50 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [msp] DeserializeIdentity -> DEBU 2e51 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [msp] DeserializeIdentity -> DEBU 2e52 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [msp] DeserializeIdentity -> DEBU 2e53 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e55 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e56 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [policies] Evaluate -> DEBU 2e57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.397 UTC [policies] Evaluate -> DEBU 2e58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.398 UTC [policies] Evaluate -> DEBU 2e59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.398 UTC [cauthdsl] func1 -> DEBU 2e5a 0xc000408470 gate 1555913860398361300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.398 UTC [cauthdsl] func2 -> DEBU 2e5b 0xc000408470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.398 UTC [cauthdsl] func2 -> DEBU 2e5c 0xc000408470 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.399 UTC [cauthdsl] func2 -> DEBU 2e5d 0xc000408470 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.399 UTC [msp.identity] Verify -> DEBU 2e5e Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:40.399 UTC [msp.identity] Verify -> DEBU 2e5f Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:40.400 UTC [cauthdsl] func2 -> DEBU 2e60 0xc000408470 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.400 UTC [gossip.comm] func1 -> DEBU 2e61 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.401 UTC [cauthdsl] func1 -> DEBU 2e62 0xc000408470 gate 1555913860398361300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e63 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e65 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.403 UTC [msp.identity] Verify -> DEBU 2e67 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:40.403 UTC [msp.identity] Verify -> DEBU 2e68 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:40.407 UTC [gossip.comm] func1 -> DEBU 2e69 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.407 UTC [msp.identity] Verify -> DEBU 2e6a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:40.407 UTC [msp.identity] Verify -> DEBU 2e6b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:40.407 UTC [msp] DeserializeIdentity -> DEBU 2e6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [msp] DeserializeIdentity -> DEBU 2e6d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e6f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e70 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [policies] Evaluate -> DEBU 2e71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [policies] Evaluate -> DEBU 2e72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [policies] Evaluate -> DEBU 2e73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [cauthdsl] func1 -> DEBU 2e74 0xc0003596e0 gate 1555913860408542000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [cauthdsl] func2 -> DEBU 2e75 0xc0003596e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [cauthdsl] func2 -> DEBU 2e76 0xc0003596e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [cauthdsl] func2 -> DEBU 2e77 0xc0003596e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [msp.identity] Verify -> DEBU 2e78 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:40.408 UTC [msp.identity] Verify -> DEBU 2e79 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [cauthdsl] func2 -> DEBU 2e7a 0xc0003596e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [cauthdsl] func1 -> DEBU 2e7b 0xc0003596e0 gate 1555913860408542000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [msp] DeserializeIdentity -> DEBU 2e80 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e81 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e82 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [cauthdsl] func1 -> DEBU 2e86 0xc00049e960 gate 1555913860409829000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [cauthdsl] func2 -> DEBU 2e87 0xc00049e960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.409 UTC [cauthdsl] func2 -> DEBU 2e88 0xc00049e960 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [cauthdsl] func2 -> DEBU 2e89 0xc00049e960 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [msp.identity] Verify -> DEBU 2e8a Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [msp.identity] Verify -> DEBU 2e8b Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [cauthdsl] func2 -> DEBU 2e8c 0xc00049e960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [cauthdsl] func1 -> DEBU 2e8d 0xc00049e960 gate 1555913860409829000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e8e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e8f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e90 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e91 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [gossip.gossip] handleMessage -> DEBU 2e92 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [gossip.gossip] handleMessage -> DEBU 2e93 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.410 UTC [msp] DeserializeIdentity -> DEBU 2e94 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [msp] DeserializeIdentity -> DEBU 2e95 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e97 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e98 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [policies] Evaluate -> DEBU 2e99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [policies] Evaluate -> DEBU 2e9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [policies] Evaluate -> DEBU 2e9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [cauthdsl] func1 -> DEBU 2e9c 0xc00021e400 gate 1555913860411519200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [cauthdsl] func2 -> DEBU 2e9d 0xc00021e400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [cauthdsl] func2 -> DEBU 2e9e 0xc00021e400 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.411 UTC [cauthdsl] func2 -> DEBU 2e9f 0xc00021e400 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.417 UTC [msp.identity] Verify -> DEBU 2ea0 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +peer0.org1.example.com | 00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +peer0.org1.example.com | "2019-04-22 06:17:40.417 UTC [msp.identity] Verify -> DEBU 2ea1 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +peer0.org1.example.com | 00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +peer0.org1.example.com | 00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +peer0.org1.example.com | 00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +peer0.org1.example.com | 00000040 eb 92 f1 12 06 e3 25 |......%|" +peer0.org1.example.com | "2019-04-22 06:17:40.418 UTC [cauthdsl] func2 -> DEBU 2ea2 0xc00021e400 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.418 UTC [cauthdsl] func1 -> DEBU 2ea3 0xc00021e400 gate 1555913860411519200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.419 UTC [msp.identity] Verify -> DEBU 2ea8 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:40.419 UTC [msp.identity] Verify -> DEBU 2ea9 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:40.428 UTC [gossip.privdata] run -> DEBU 2eaa Start reconcile missing private info" +peer0.org1.example.com | "2019-04-22 06:17:40.429 UTC [leveldbhelper] GetIterator -> DEBU 2eab Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf9}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +peer0.org1.example.com | "2019-04-22 06:17:40.429 UTC [gossip.privdata] reconcile -> DEBU 2eac Reconciliation cycle finished successfully. no items to reconcile" +peer0.org1.example.com | "2019-04-22 06:17:40.430 UTC [msp] DeserializeIdentity -> DEBU 2ead Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.430 UTC [msp] DeserializeIdentity -> DEBU 2eae Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.431 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2eaf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.432 UTC [policies] Evaluate -> DEBU 2eb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.432 UTC [policies] Evaluate -> DEBU 2eb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.433 UTC [policies] Evaluate -> DEBU 2eb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.433 UTC [cauthdsl] func1 -> DEBU 2eb5 0xc0003e4310 gate 1555913860433676100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.433 UTC [cauthdsl] func2 -> DEBU 2eb6 0xc0003e4310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.434 UTC [cauthdsl] func2 -> DEBU 2eb7 0xc0003e4310 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.434 UTC [cauthdsl] func2 -> DEBU 2eb8 0xc0003e4310 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.435 UTC [msp.identity] Verify -> DEBU 2eb9 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:40.435 UTC [msp.identity] Verify -> DEBU 2eba Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:40.436 UTC [cauthdsl] func2 -> DEBU 2ebb 0xc0003e4310 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.436 UTC [cauthdsl] func1 -> DEBU 2ebc 0xc0003e4310 gate 1555913860433676100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.436 UTC [policies] Evaluate -> DEBU 2ebd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.436 UTC [policies] Evaluate -> DEBU 2ebe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.437 UTC [policies] Evaluate -> DEBU 2ebf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.437 UTC [policies] Evaluate -> DEBU 2ec0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.438 UTC [msp.identity] Verify -> DEBU 2ec1 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:40.438 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:40.439 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ec3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.439 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ec4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.439 UTC [policies] Evaluate -> DEBU 2ec5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.439 UTC [policies] Evaluate -> DEBU 2ec6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.440 UTC [policies] Evaluate -> DEBU 2ec7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.440 UTC [cauthdsl] func1 -> DEBU 2ec8 0xc0003e5a20 gate 1555913860440572000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2ec9 0xc0003e5a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2eca 0xc0003e5a20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2ecb 0xc0003e5a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2ecc 0xc0003e5a20 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:40.441 UTC [cauthdsl] func1 -> DEBU 2ecd 0xc0003e5a20 gate 1555913860440572000 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:40.441 UTC [policies] Evaluate -> DEBU 2ece Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.442 UTC [policies] Evaluate -> DEBU 2ecf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.442 UTC [policies] Evaluate -> DEBU 2ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.442 UTC [cauthdsl] func1 -> DEBU 2ed1 0xc0003f4260 gate 1555913860442479800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.442 UTC [cauthdsl] func2 -> DEBU 2ed2 0xc0003f4260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.443 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc0003f4260 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.443 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc0003f4260 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.444 UTC [msp.identity] Verify -> DEBU 2ed5 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:40.444 UTC [msp.identity] Verify -> DEBU 2ed6 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:40.444 UTC [cauthdsl] func2 -> DEBU 2ed7 0xc0003f4260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.445 UTC [cauthdsl] func1 -> DEBU 2ed8 0xc0003f4260 gate 1555913860442479800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2ed9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2eda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2edb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2edc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.446 UTC [gossip.gossip] handleMessage -> DEBU 2edd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.446 UTC [gossip.gossip] handleMessage -> DEBU 2ede Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.446 UTC [msp] DeserializeIdentity -> DEBU 2edf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.447 UTC [msp] DeserializeIdentity -> DEBU 2ee0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.448 UTC [msp] DeserializeIdentity -> DEBU 2ee1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.448 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ee2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ee3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ee4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.449 UTC [policies] Evaluate -> DEBU 2ee5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.449 UTC [policies] Evaluate -> DEBU 2ee6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.450 UTC [policies] Evaluate -> DEBU 2ee7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.450 UTC [cauthdsl] func1 -> DEBU 2ee8 0xc0003f5e50 gate 1555913860450066400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.450 UTC [cauthdsl] func2 -> DEBU 2ee9 0xc0003f5e50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.450 UTC [cauthdsl] func2 -> DEBU 2eea 0xc0003f5e50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.450 UTC [cauthdsl] func2 -> DEBU 2eeb 0xc0003f5e50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.451 UTC [msp.identity] Verify -> DEBU 2eec Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +peer0.org1.example.com | 00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +peer0.org1.example.com | "2019-04-22 06:17:40.451 UTC [msp.identity] Verify -> DEBU 2eed Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +peer0.org1.example.com | 00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +peer0.org1.example.com | 00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +peer0.org1.example.com | 00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +peer0.org1.example.com | 00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +peer0.org1.example.com | "2019-04-22 06:17:40.452 UTC [cauthdsl] func2 -> DEBU 2eee 0xc0003f5e50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.452 UTC [cauthdsl] func1 -> DEBU 2eef 0xc0003f5e50 gate 1555913860450066400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.452 UTC [policies] Evaluate -> DEBU 2ef0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.452 UTC [policies] Evaluate -> DEBU 2ef1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.452 UTC [policies] Evaluate -> DEBU 2ef2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.453 UTC [policies] Evaluate -> DEBU 2ef3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.454 UTC [msp.identity] Verify -> DEBU 2ef4 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +peer0.org1.example.com | 00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +peer0.org1.example.com | "2019-04-22 06:17:40.454 UTC [msp.identity] Verify -> DEBU 2ef5 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +peer0.org1.example.com | 00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +peer0.org1.example.com | 00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +peer0.org1.example.com | 00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +peer0.org1.example.com | 00000040 15 d5 a2 f1 49 ef |....I.|" +peer0.org1.example.com | "2019-04-22 06:17:40.454 UTC [msp.identity] Verify -> DEBU 2ef6 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +peer0.org1.example.com | 00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +peer0.org1.example.com | "2019-04-22 06:17:40.455 UTC [msp.identity] Verify -> DEBU 2ef7 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +peer0.org1.example.com | 00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +peer0.org1.example.com | 00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +peer0.org1.example.com | 00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +peer0.org1.example.com | 00000040 09 04 73 b6 16 85 3c |..s...<|" +peer0.org1.example.com | "2019-04-22 06:17:40.455 UTC [msp] DeserializeIdentity -> DEBU 2ef8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.455 UTC [msp] DeserializeIdentity -> DEBU 2ef9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.456 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2efa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.456 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.456 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.456 UTC [policies] Evaluate -> DEBU 2efd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.457 UTC [policies] Evaluate -> DEBU 2efe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.457 UTC [policies] Evaluate -> DEBU 2eff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.457 UTC [cauthdsl] func1 -> DEBU 2f00 0xc0003164d0 gate 1555913860457409500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.457 UTC [cauthdsl] func2 -> DEBU 2f01 0xc0003164d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.457 UTC [cauthdsl] func2 -> DEBU 2f02 0xc0003164d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.458 UTC [cauthdsl] func2 -> DEBU 2f03 0xc0003164d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.458 UTC [msp.identity] Verify -> DEBU 2f04 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:40.459 UTC [msp.identity] Verify -> DEBU 2f05 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 2f06 0xc0003164d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.460 UTC [cauthdsl] func1 -> DEBU 2f07 0xc0003164d0 gate 1555913860457409500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f0a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f0b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.461 UTC [msp] DeserializeIdentity -> DEBU 2f0c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.462 UTC [policies] Evaluate -> DEBU 2f0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.462 UTC [policies] Evaluate -> DEBU 2f10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.462 UTC [policies] Evaluate -> DEBU 2f11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.462 UTC [cauthdsl] func1 -> DEBU 2f12 0xc000317820 gate 1555913860462584700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.462 UTC [cauthdsl] func2 -> DEBU 2f13 0xc000317820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.463 UTC [cauthdsl] func2 -> DEBU 2f14 0xc000317820 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.463 UTC [cauthdsl] func2 -> DEBU 2f15 0xc000317820 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.464 UTC [msp.identity] Verify -> DEBU 2f16 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:40.464 UTC [msp.identity] Verify -> DEBU 2f17 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 2f18 0xc000317820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.464 UTC [cauthdsl] func1 -> DEBU 2f19 0xc000317820 gate 1555913860462584700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.464 UTC [policies] Evaluate -> DEBU 2f1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.465 UTC [policies] Evaluate -> DEBU 2f1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.465 UTC [policies] Evaluate -> DEBU 2f1c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.465 UTC [policies] Evaluate -> DEBU 2f1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.466 UTC [gossip.gossip] handleMessage -> DEBU 2f1e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.489 UTC [msp] DeserializeIdentity -> DEBU 2f1f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.491 UTC [msp] DeserializeIdentity -> DEBU 2f20 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.492 UTC [gossip.pull] Hello -> DEBU 2f21 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:40.493 UTC [msp] DeserializeIdentity -> DEBU 2f22 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.493 UTC [msp] DeserializeIdentity -> DEBU 2f23 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.495 UTC [gossip.comm] Send -> DEBU 2f24 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:40.496 UTC [gossip.comm] sendToEndpoint -> DEBU 2f25 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.496 UTC [gossip.comm] sendToEndpoint -> DEBU 2f26 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.498 UTC [gossip.comm] func1 -> DEBU 2f27 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15444262703659977216 , Msg_type: BLOCK_MSG, digests: [5 6 1 2 3 4], Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.498 UTC [gossip.gossip] handleMessage -> DEBU 2f28 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15444262703659977216 , Msg_type: BLOCK_MSG, digests: [5 6 1 2 3 4], Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.499 UTC [gossip.pull] HandleMessage -> DEBU 2f29 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15444262703659977216 , Msg_type: BLOCK_MSG, digests: [5 6 1 2 3 4], Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.499 UTC [gossip.gossip] handleMessage -> DEBU 2f2a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.648 UTC [gossip.comm] func1 -> DEBU 2f2b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.648 UTC [gossip.gossip] handleMessage -> DEBU 2f2c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.648 UTC [msp] DeserializeIdentity -> DEBU 2f2d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.649 UTC [msp] DeserializeIdentity -> DEBU 2f2e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.649 UTC [gossip.gossip] handleMessage -> DEBU 2f2f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.656 UTC [gossip.comm] func1 -> DEBU 2f30 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.657 UTC [gossip.gossip] handleMessage -> DEBU 2f31 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.657 UTC [msp.identity] Verify -> DEBU 2f32 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:40.657 UTC [msp.identity] Verify -> DEBU 2f33 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:40.658 UTC [gossip.gossip] handleMessage -> DEBU 2f34 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.661 UTC [gossip.comm] func1 -> DEBU 2f35 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.661 UTC [gossip.gossip] handleMessage -> DEBU 2f36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.662 UTC [msp.identity] Verify -> DEBU 2f37 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:40.662 UTC [msp.identity] Verify -> DEBU 2f38 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:40.662 UTC [msp] DeserializeIdentity -> DEBU 2f39 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.662 UTC [gossip.gossip] handleMessage -> DEBU 2f3a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.665 UTC [gossip.gossip] handleMessage -> DEBU 2f3b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.666 UTC [msp.identity] Verify -> DEBU 2f3c Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:40.666 UTC [msp.identity] Verify -> DEBU 2f3d Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:40.666 UTC [msp] DeserializeIdentity -> DEBU 2f3e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.667 UTC [gossip.gossip] handleMessage -> DEBU 2f3f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.684 UTC [gossip.comm] func1 -> DEBU 2f40 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.685 UTC [gossip.gossip] handleMessage -> DEBU 2f41 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.685 UTC [gossip.pull] HandleMessage -> DEBU 2f42 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.685 UTC [gossip.pull] SendDigest -> DEBU 2f43 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:40.685 UTC [gossip.gossip] handleMessage -> DEBU 2f44 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.832 UTC [msp.identity] Sign -> DEBU 2f45 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151029 " +peer0.org1.example.com | "2019-04-22 06:17:40.832 UTC [msp.identity] Sign -> DEBU 2f46 Sign: digest: C7DB4CB6ACA35AD2049E83322D90DEEDFEDE15952AF89422F26BEB8989219041 " +peer0.org1.example.com | "2019-04-22 06:17:40.833 UTC [msp.identity] Sign -> DEBU 2f47 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:40.835 UTC [msp.identity] Sign -> DEBU 2f48 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:40.835 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2f49 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:40.848 UTC [msp] DeserializeIdentity -> DEBU 2f4a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.848 UTC [msp] DeserializeIdentity -> DEBU 2f4b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.849 UTC [gossip.comm] Send -> DEBU 2f4c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:40.850 UTC [msp] DeserializeIdentity -> DEBU 2f4d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.850 UTC [gossip.comm] sendToEndpoint -> DEBU 2f4e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.850 UTC [gossip.comm] sendToEndpoint -> DEBU 2f4f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.850 UTC [gossip.comm] Send -> DEBU 2f50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:40.851 UTC [gossip.comm] sendToEndpoint -> DEBU 2f51 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.851 UTC [gossip.comm] sendToEndpoint -> DEBU 2f52 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.853 UTC [msp] DeserializeIdentity -> DEBU 2f53 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.853 UTC [gossip.comm] Send -> DEBU 2f54 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:40.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2f55 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2f56 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.872 UTC [gossip.gossip] handleMessage -> DEBU 2f57 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.872 UTC [msp] DeserializeIdentity -> DEBU 2f58 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.872 UTC [msp] DeserializeIdentity -> DEBU 2f59 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.872 UTC [msp] DeserializeIdentity -> DEBU 2f5a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.872 UTC [gossip.gossip] handleMessage -> DEBU 2f5b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.877 UTC [gossip.gossip] handleMessage -> DEBU 2f5c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913859717789100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.877 UTC [msp] DeserializeIdentity -> DEBU 2f5d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.878 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f5e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f5f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f60 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.878 UTC [policies] Evaluate -> DEBU 2f61 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.879 UTC [policies] Evaluate -> DEBU 2f62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.879 UTC [policies] Evaluate -> DEBU 2f63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.879 UTC [cauthdsl] func1 -> DEBU 2f64 0xc000337480 gate 1555913860879615600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.879 UTC [cauthdsl] func2 -> DEBU 2f65 0xc000337480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.879 UTC [cauthdsl] func2 -> DEBU 2f66 0xc000337480 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.882 UTC [cauthdsl] func2 -> DEBU 2f67 0xc000337480 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.882 UTC [msp.identity] Verify -> DEBU 2f68 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:40.883 UTC [msp.identity] Verify -> DEBU 2f69 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:40.883 UTC [gossip.comm] func1 -> DEBU 2f6a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913859717789100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.884 UTC [cauthdsl] func2 -> DEBU 2f6b 0xc000337480 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.884 UTC [cauthdsl] func1 -> DEBU 2f6c 0xc000337480 gate 1555913860879615600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.884 UTC [policies] Evaluate -> DEBU 2f6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.884 UTC [policies] Evaluate -> DEBU 2f6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.885 UTC [policies] Evaluate -> DEBU 2f6f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.885 UTC [policies] Evaluate -> DEBU 2f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.885 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.886 UTC [gossip.gossip] handleMessage -> DEBU 2f72 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:40.886 UTC [gossip.gossip] handleMessage -> DEBU 2f73 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913859717789100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:40.886 UTC [msp] DeserializeIdentity -> DEBU 2f74 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:40.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f76 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f77 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:40.890 UTC [policies] Evaluate -> DEBU 2f78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.891 UTC [policies] Evaluate -> DEBU 2f79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:40.891 UTC [policies] Evaluate -> DEBU 2f7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:40.891 UTC [cauthdsl] func1 -> DEBU 2f7b 0xc000544f30 gate 1555913860891962200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:40.892 UTC [cauthdsl] func2 -> DEBU 2f7c 0xc000544f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:40.892 UTC [cauthdsl] func2 -> DEBU 2f7d 0xc000544f30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:40.892 UTC [cauthdsl] func2 -> DEBU 2f7e 0xc000544f30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.892 UTC [msp.identity] Verify -> DEBU 2f7f Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:40.893 UTC [msp.identity] Verify -> DEBU 2f80 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:40.893 UTC [cauthdsl] func2 -> DEBU 2f81 0xc000544f30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:40.893 UTC [cauthdsl] func1 -> DEBU 2f82 0xc000544f30 gate 1555913860891962200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:40.893 UTC [policies] Evaluate -> DEBU 2f83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.893 UTC [policies] Evaluate -> DEBU 2f84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.895 UTC [policies] Evaluate -> DEBU 2f85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.898 UTC [policies] Evaluate -> DEBU 2f86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:40.898 UTC [msp] DeserializeIdentity -> DEBU 2f87 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:40.898 UTC [gossip.gossip] handleMessage -> DEBU 2f88 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.089 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.090 UTC [gossip.gossip] handleMessage -> DEBU 2f8a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.090 UTC [msp] DeserializeIdentity -> DEBU 2f8b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.090 UTC [msp] DeserializeIdentity -> DEBU 2f8c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.091 UTC [msp] DeserializeIdentity -> DEBU 2f8d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.091 UTC [gossip.gossip] handleMessage -> DEBU 2f8e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.098 UTC [gossip.comm] func1 -> DEBU 2f8f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913859709294700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.100 UTC [gossip.gossip] handleMessage -> DEBU 2f90 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913859709294700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.100 UTC [msp] DeserializeIdentity -> DEBU 2f91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f92 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:41.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f93 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:41.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f94 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:41.101 UTC [policies] Evaluate -> DEBU 2f95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:41.102 UTC [policies] Evaluate -> DEBU 2f96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:41.102 UTC [policies] Evaluate -> DEBU 2f97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:41.103 UTC [cauthdsl] func1 -> DEBU 2f98 0xc00055f4a0 gate 1555913861103452600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:41.103 UTC [cauthdsl] func2 -> DEBU 2f99 0xc00055f4a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:41.104 UTC [cauthdsl] func2 -> DEBU 2f9a 0xc00055f4a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:41.105 UTC [cauthdsl] func2 -> DEBU 2f9b 0xc00055f4a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:41.105 UTC [msp.identity] Verify -> DEBU 2f9c Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:41.105 UTC [msp.identity] Verify -> DEBU 2f9d Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 2f9e 0xc00055f4a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:41.106 UTC [cauthdsl] func1 -> DEBU 2f9f 0xc00055f4a0 gate 1555913861103452600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:41.106 UTC [policies] Evaluate -> DEBU 2fa0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.106 UTC [policies] Evaluate -> DEBU 2fa1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.107 UTC [policies] Evaluate -> DEBU 2fa2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.107 UTC [policies] Evaluate -> DEBU 2fa3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.107 UTC [msp] DeserializeIdentity -> DEBU 2fa4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.107 UTC [gossip.gossip] handleMessage -> DEBU 2fa5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.111 UTC [gossip.comm] func1 -> DEBU 2fa6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.111 UTC [gossip.gossip] handleMessage -> DEBU 2fa7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.111 UTC [gossip.gossip] handleMessage -> DEBU 2fa8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.112 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.112 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2faa Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:41.113 UTC [msp.identity] Verify -> DEBU 2fab Verify: digest = 00000000 07 1e 8e 77 50 78 1e ef f2 31 56 0d 7d 56 5b d3 |...wPx...1V.}V[.| +peer0.org1.example.com | 00000010 d7 83 78 16 a1 f2 8d 6f 61 57 f8 19 76 5f 29 f2 |..x....oaW..v_).|" +peer0.org1.example.com | "2019-04-22 06:17:41.114 UTC [msp.identity] Verify -> DEBU 2fac Verify: sig = 00000000 30 44 02 20 13 4b 2a 2f f0 af 34 20 6b 96 cb ff |0D. .K*/..4 k...| +peer0.org1.example.com | 00000010 0f 5e 3b 22 af bf ee 0b c4 05 af 6c d1 37 e3 b8 |.^;".......l.7..| +peer0.org1.example.com | 00000020 48 71 0a 96 02 20 03 c2 f3 a7 41 e0 4e 1e 5a e0 |Hq... ....A.N.Z.| +peer0.org1.example.com | 00000030 91 e0 78 2d 91 df 9d 7f 38 5c 44 df ed 83 d4 30 |..x-....8\D....0| +peer0.org1.example.com | 00000040 8c 66 a9 a3 67 c6 |.f..g.|" +peer0.org1.example.com | "2019-04-22 06:17:41.114 UTC [msp.identity] Verify -> DEBU 2fad Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:41.114 UTC [msp.identity] Verify -> DEBU 2fae Verify: sig = 00000000 30 44 02 20 30 ce 2c 7c 0a 37 f0 db c9 22 fd ff |0D. 0.,|.7..."..| +peer0.org1.example.com | 00000010 ea 56 d6 2c 68 f9 1f 63 fd 04 b8 33 34 85 fd d2 |.V.,h..c...34...| +peer0.org1.example.com | 00000020 30 0e c4 52 02 20 78 1c f4 8a 1d f9 52 2c 17 4c |0..R. x.....R,.L| +peer0.org1.example.com | 00000030 3d 63 54 67 28 09 7e f0 11 a9 5e ee 24 b6 67 44 |=cTg(.~...^.$.gD| +peer0.org1.example.com | 00000040 eb 89 fc 4f 81 e7 |...O..|" +peer0.org1.example.com | "2019-04-22 06:17:41.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 2faf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.115 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:41.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb1 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 " +peer0.org1.example.com | "2019-04-22 06:17:41.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 " +peer0.org1.example.com | "2019-04-22 06:17:41.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:41.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.122 UTC [gossip.comm] func1 -> DEBU 2fb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.122 UTC [gossip.gossip] handleMessage -> DEBU 2fb8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.123 UTC [gossip.gossip] handleMessage -> DEBU 2fb9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fbb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.124 UTC [msp] DeserializeIdentity -> DEBU 2fbc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.125 UTC [msp] DeserializeIdentity -> DEBU 2fbd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.125 UTC [msp] DeserializeIdentity -> DEBU 2fbe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.125 UTC [gossip.comm] Send -> DEBU 2fbf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:41.126 UTC [msp] DeserializeIdentity -> DEBU 2fc0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.126 UTC [gossip.comm] Send -> DEBU 2fc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.127 UTC [gossip.gossip] handleMessage -> DEBU 2fc4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.127 UTC [gossip.gossip] handleMessage -> DEBU 2fc5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fc9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.459 UTC [gossip.election] waitForInterrupt -> DEBU 2fca c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.459 UTC [gossip.election] IsLeader -> DEBU 2fcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:41.459 UTC [msp.identity] Sign -> DEBU 2fcc Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100D1801 " +peer0.org1.example.com | "2019-04-22 06:17:41.459 UTC [msp.identity] Sign -> DEBU 2fcd Sign: digest: 11E5496DAF4521386CA7A00C5C3C907CC1561880B32E7807199FB6E141AE2779 " +peer0.org1.example.com | "2019-04-22 06:17:41.459 UTC [gossip.election] waitForInterrupt -> DEBU 2fce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:41.471 UTC [msp] DeserializeIdentity -> DEBU 2fcf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.471 UTC [msp] DeserializeIdentity -> DEBU 2fd0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.473 UTC [msp] DeserializeIdentity -> DEBU 2fd1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.473 UTC [msp] DeserializeIdentity -> DEBU 2fd2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.474 UTC [gossip.comm] Send -> DEBU 2fd3 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:41.474 UTC [msp] DeserializeIdentity -> DEBU 2fd4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.474 UTC [msp] DeserializeIdentity -> DEBU 2fd5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.475 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.475 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.598 UTC [gossip.comm] func1 -> DEBU 2fd8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.598 UTC [gossip.gossip] handleMessage -> DEBU 2fd9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.599 UTC [gossip.gossip] handleMessage -> DEBU 2fda Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fdb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.600 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fdc Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:41.600 UTC [msp] DeserializeIdentity -> DEBU 2fdd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.601 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fde Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:41.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fdf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:41.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:41.602 UTC [policies] Evaluate -> DEBU 2fe1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:41.602 UTC [policies] Evaluate -> DEBU 2fe2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:41.603 UTC [policies] Evaluate -> DEBU 2fe3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:41.603 UTC [cauthdsl] func1 -> DEBU 2fe4 0xc00221c9c0 gate 1555913861603848800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:41.604 UTC [cauthdsl] func2 -> DEBU 2fe5 0xc00221c9c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:41.604 UTC [cauthdsl] func2 -> DEBU 2fe6 0xc00221c9c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:41.605 UTC [cauthdsl] func2 -> DEBU 2fe7 0xc00221c9c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:41.605 UTC [msp.identity] Verify -> DEBU 2fe8 Verify: digest = 00000000 62 61 8d 57 5b b1 0d 39 15 b7 f1 bd 81 a5 1c 4f |ba.W[..9.......O| +peer0.org1.example.com | 00000010 7c a6 e2 89 92 f6 5a 1a f1 1b 2c 5f ee 97 16 58 ||.....Z...,_...X|" +peer0.org1.example.com | "2019-04-22 06:17:41.606 UTC [msp.identity] Verify -> DEBU 2fe9 Verify: sig = 00000000 30 45 02 21 00 e7 e8 6c 73 8e fa 1c f3 8b cc 9a |0E.!...ls.......| +peer0.org1.example.com | 00000010 78 56 7c 87 73 d4 05 3e db 06 fd b1 fa ae ae 97 |xV|.s..>........| +peer0.org1.example.com | 00000020 48 98 0b aa bc 02 20 45 4f 1e 18 b4 31 ba 40 67 |H..... EO...1.@g| +peer0.org1.example.com | 00000030 9b 2a 2d 55 33 db c0 69 7a f5 b3 fa 96 8f 06 68 |.*-U3..iz......h| +peer0.org1.example.com | 00000040 df 78 0d 90 6e d3 0f |.x..n..|" +peer0.org1.example.com | "2019-04-22 06:17:41.607 UTC [cauthdsl] func2 -> DEBU 2fea 0xc00221c9c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:41.607 UTC [cauthdsl] func1 -> DEBU 2feb 0xc00221c9c0 gate 1555913861603848800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:41.609 UTC [policies] Evaluate -> DEBU 2fec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.610 UTC [policies] Evaluate -> DEBU 2fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.610 UTC [policies] Evaluate -> DEBU 2fee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.610 UTC [policies] Evaluate -> DEBU 2fef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:41.611 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ff0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.613 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:41.613 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 " +peer0.org1.example.com | "2019-04-22 06:17:41.614 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 " +peer0.org1.example.com | "2019-04-22 06:17:41.614 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:41.614 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.614 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ff6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ff7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.615 UTC [msp] DeserializeIdentity -> DEBU 2ff8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.615 UTC [msp] DeserializeIdentity -> DEBU 2ff9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.616 UTC [msp] DeserializeIdentity -> DEBU 2ffa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.616 UTC [msp] DeserializeIdentity -> DEBU 2ffb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.617 UTC [msp] DeserializeIdentity -> DEBU 2ffc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.617 UTC [msp] DeserializeIdentity -> DEBU 2ffd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.617 UTC [gossip.comm] func1 -> DEBU 2ffe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.617 UTC [gossip.gossip] handleMessage -> DEBU 3000 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.617 UTC [gossip.gossip] handleMessage -> DEBU 3001 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3002 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3003 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.617 UTC [gossip.comm] Send -> DEBU 2fff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:41.618 UTC [msp] DeserializeIdentity -> DEBU 3004 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.618 UTC [gossip.comm] sendToEndpoint -> DEBU 3005 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.619 UTC [gossip.comm] sendToEndpoint -> DEBU 3006 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:41.619 UTC [msp] DeserializeIdentity -> DEBU 3007 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:41.619 UTC [gossip.comm] Send -> DEBU 3008 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 3009 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 300a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.024 UTC [gossip.gossip] handleMessage -> DEBU 300b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.025 UTC [gossip.gossip] handleMessage -> DEBU 300c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.025 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 300e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:42.026 UTC [msp] DeserializeIdentity -> DEBU 300f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.026 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3010 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:42.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3011 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:42.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3012 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:42.026 UTC [policies] Evaluate -> DEBU 3013 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:42.026 UTC [policies] Evaluate -> DEBU 3014 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:42.027 UTC [policies] Evaluate -> DEBU 3015 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:42.027 UTC [cauthdsl] func1 -> DEBU 3016 0xc002258f80 gate 1555913862027280500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:42.027 UTC [cauthdsl] func2 -> DEBU 3017 0xc002258f80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:42.027 UTC [cauthdsl] func2 -> DEBU 3018 0xc002258f80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:42.027 UTC [cauthdsl] func2 -> DEBU 3019 0xc002258f80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:42.027 UTC [msp.identity] Verify -> DEBU 301a Verify: digest = 00000000 12 e4 ee 31 4d d2 2c c9 af f6 7a 18 19 7a 11 0d |...1M.,...z..z..| +peer0.org1.example.com | 00000010 30 bd c8 4a 7e 53 13 0f bc cb e4 7f 98 78 6a a5 |0..J~S.......xj.|" +peer0.org1.example.com | "2019-04-22 06:17:42.028 UTC [msp.identity] Verify -> DEBU 301b Verify: sig = 00000000 30 45 02 21 00 a9 8d 7f f6 bd 56 94 36 ca 69 f7 |0E.!......V.6.i.| +peer0.org1.example.com | 00000010 9d b8 74 29 ab 2f 43 f4 85 8e 23 4d b7 57 32 74 |..t)./C...#M.W2t| +peer0.org1.example.com | 00000020 9b ea 59 f8 41 02 20 38 7b 85 fe fa 44 a7 df 57 |..Y.A. 8{...D..W| +peer0.org1.example.com | 00000030 06 6a dc cf 8e a0 e3 8d f0 9c 13 14 e5 76 15 ce |.j...........v..| +peer0.org1.example.com | 00000040 a8 fb b8 a3 40 8f f1 |....@..|" +peer0.org1.example.com | "2019-04-22 06:17:42.028 UTC [cauthdsl] func2 -> DEBU 301c 0xc002258f80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:42.028 UTC [cauthdsl] func1 -> DEBU 301d 0xc002258f80 gate 1555913862027280500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:42.028 UTC [policies] Evaluate -> DEBU 301e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [policies] Evaluate -> DEBU 301f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [policies] Evaluate -> DEBU 3020 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [policies] Evaluate -> DEBU 3021 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [gossip.discovery] handleAliveMessage -> DEBU 3022 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3023 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3024 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 " +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3025 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 " +peer0.org1.example.com | "2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3026 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:42.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 3027 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.030 UTC [gossip.discovery] handleAliveMessage -> DEBU 3028 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3029 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.032 UTC [gossip.comm] func1 -> DEBU 302a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.033 UTC [gossip.gossip] handleMessage -> DEBU 302b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.033 UTC [gossip.gossip] handleMessage -> DEBU 302c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.033 UTC [msp] DeserializeIdentity -> DEBU 302d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 302e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 302f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 3030 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 3031 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.035 UTC [msp] DeserializeIdentity -> DEBU 3032 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.035 UTC [gossip.comm] Send -> DEBU 3033 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.035 UTC [msp] DeserializeIdentity -> DEBU 3034 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.036 UTC [msp] DeserializeIdentity -> DEBU 3035 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.036 UTC [gossip.comm] Send -> DEBU 3036 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 3037 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 3038 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 3039 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 303a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.040 UTC [gossip.comm] func1 -> DEBU 303d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.040 UTC [gossip.gossip] handleMessage -> DEBU 303e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.040 UTC [gossip.gossip] handleMessage -> DEBU 303f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3040 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3041 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.806 UTC [endorser] ProcessProposal -> DEBU 3042 Entering: request from 192.168.224.9:49296" +peer0.org1.example.com | "2019-04-22 06:17:42.806 UTC [protoutils] ValidateProposalMessage -> DEBU 3043 ValidateProposalMessage starts for signed proposal 0xc00054b4f0" +peer0.org1.example.com | "2019-04-22 06:17:42.807 UTC [protoutils] validateChannelHeader -> DEBU 3044 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:42.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 3045 begin" +peer0.org1.example.com | "2019-04-22 06:17:42.807 UTC [msp] GetManagerForChain -> DEBU 3046 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:42.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 3047 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:42.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 3048 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:42.808 UTC [msp.identity] Verify -> DEBU 3049 Verify: digest = 00000000 cb a4 84 16 ac b2 06 02 61 08 12 d9 c0 41 65 12 |........a....Ae.| +peer0.org1.example.com | 00000010 35 3e 09 cf 8f 8d 7e be a9 85 4e 2d e2 9c 37 c9 |5>....~...N-..7.|" +peer0.org1.example.com | "2019-04-22 06:17:42.808 UTC [msp.identity] Verify -> DEBU 304a Verify: sig = 00000000 30 45 02 21 00 c5 32 7e 8d 92 bd 28 35 d0 65 95 |0E.!..2~...(5.e.| +peer0.org1.example.com | 00000010 a7 a5 f3 2b f9 f8 1d a3 fa fe 9b 06 71 28 8c f7 |...+........q(..| +peer0.org1.example.com | 00000020 7d 97 8e 9c be 02 20 24 83 61 0b 9e 7c 95 1e 0f |}..... $.a..|...| +peer0.org1.example.com | 00000030 38 8c 2f 21 53 1f a2 f7 94 a4 f8 2e 34 4b 91 dc |8./!S.......4K..| +peer0.org1.example.com | 00000040 0e 70 4a a0 0f ab 8a |.pJ....|" +peer0.org1.example.com | "2019-04-22 06:17:42.808 UTC [protoutils] checkSignatureFromCreator -> DEBU 304b exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:42.808 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304c validateChaincodeProposalMessage starts for proposal 0xc002485f10, header 0xc00054b9f0" +peer0.org1.example.com | "2019-04-22 06:17:42.808 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:42.809 UTC [endorser] preProcess -> DEBU 304e [businesschannel][328ba5a2] processing txid: 328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f" +peer0.org1.example.com | "2019-04-22 06:17:42.809 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 304f retrieveTransactionByID() - txId = [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +peer0.org1.example.com | "2019-04-22 06:17:42.809 UTC [aclmgmt] CheckACL -> DEBU 3050 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:42.809 UTC [aclmgmt] CheckACL -> DEBU 3051 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:42.810 UTC [policies] Evaluate -> DEBU 3052 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:42.810 UTC [policies] Evaluate -> DEBU 3053 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:42.810 UTC [policies] Evaluate -> DEBU 3054 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:42.811 UTC [cauthdsl] func1 -> DEBU 3055 0xc0022cbe20 gate 1555913862810939000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3056 0xc0022cbe20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3057 0xc0022cbe20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3058 0xc0022cbe20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3059 0xc0022cbe20 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:42.812 UTC [cauthdsl] func1 -> DEBU 305a 0xc0022cbe20 gate 1555913862810939000 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:42.812 UTC [policies] Evaluate -> DEBU 305b Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:42.812 UTC [policies] Evaluate -> DEBU 305c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:42.812 UTC [policies] Evaluate -> DEBU 305d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:42.812 UTC [cauthdsl] func1 -> DEBU 305e 0xc0022d8850 gate 1555913862812880000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:42.813 UTC [cauthdsl] func2 -> DEBU 305f 0xc0022d8850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:42.813 UTC [cauthdsl] func2 -> DEBU 3060 0xc0022d8850 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:42.813 UTC [cauthdsl] func2 -> DEBU 3061 0xc0022d8850 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:42.813 UTC [msp.identity] Verify -> DEBU 3062 Verify: digest = 00000000 cb a4 84 16 ac b2 06 02 61 08 12 d9 c0 41 65 12 |........a....Ae.| +peer0.org1.example.com | 00000010 35 3e 09 cf 8f 8d 7e be a9 85 4e 2d e2 9c 37 c9 |5>....~...N-..7.|" +peer0.org1.example.com | "2019-04-22 06:17:42.813 UTC [msp.identity] Verify -> DEBU 3063 Verify: sig = 00000000 30 45 02 21 00 c5 32 7e 8d 92 bd 28 35 d0 65 95 |0E.!..2~...(5.e.| +peer0.org1.example.com | 00000010 a7 a5 f3 2b f9 f8 1d a3 fa fe 9b 06 71 28 8c f7 |...+........q(..| +peer0.org1.example.com | 00000020 7d 97 8e 9c be 02 20 24 83 61 0b 9e 7c 95 1e 0f |}..... $.a..|...| +peer0.org1.example.com | 00000030 38 8c 2f 21 53 1f a2 f7 94 a4 f8 2e 34 4b 91 dc |8./!S.......4K..| +peer0.org1.example.com | 00000040 0e 70 4a a0 0f ab 8a |.pJ....|" +peer0.org1.example.com | "2019-04-22 06:17:42.814 UTC [cauthdsl] func2 -> DEBU 3064 0xc0022d8850 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:42.814 UTC [cauthdsl] func1 -> DEBU 3065 0xc0022d8850 gate 1555913862812880000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:42.814 UTC [policies] Evaluate -> DEBU 3066 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:42.814 UTC [policies] Evaluate -> DEBU 3067 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:42.814 UTC [policies] Evaluate -> DEBU 3068 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:42.815 UTC [policies] Evaluate -> DEBU 3069 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:42.815 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 306a constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:42.815 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 306b constructing new tx simulator txid = [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +peer0.org1.example.com | "2019-04-22 06:17:42.815 UTC [endorser] SimulateProposal -> DEBU 306c [businesschannel][328ba5a2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:42.816 UTC [stateleveldb] GetState -> DEBU 306d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:42.816 UTC [endorser] callChaincode -> INFO 306e [businesschannel][328ba5a2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:42.817 UTC [stateleveldb] GetState -> DEBU 306f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:42.817 UTC [stateleveldb] GetState -> DEBU 3070 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:42.817 UTC [chaincode] Execute -> DEBU 3071 Entry" +peer0.org1.example.com | "2019-04-22 06:17:42.819 UTC [chaincode] handleMessage -> DEBU 3072 [328ba5a2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:42.819 UTC [chaincode] HandleTransaction -> DEBU 3073 [328ba5a2] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:42.819 UTC [chaincode] HandleGetState -> DEBU 3074 [328ba5a2] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:42.820 UTC [stateleveldb] GetState -> DEBU 3075 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:42.823 UTC [chaincode] HandleTransaction -> DEBU 3076 [328ba5a2] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:42.825 UTC [chaincode] handleMessage -> DEBU 3077 [328ba5a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:42.825 UTC [chaincode] Notify -> DEBU 3078 [328ba5a2] notifying Txid:328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:42.825 UTC [chaincode] Execute -> DEBU 3079 Exit" +peer0.org1.example.com | "2019-04-22 06:17:42.826 UTC [endorser] callChaincode -> INFO 307a [businesschannel][328ba5a2] Exit chaincode: name:"exp02" (9ms)" +peer0.org1.example.com | "2019-04-22 06:17:42.826 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 307b Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:42.826 UTC [lockbasedtxmgr] Done -> DEBU 307c Done with transaction simulation / query execution [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +peer0.org1.example.com | "2019-04-22 06:17:42.826 UTC [endorser] SimulateProposal -> DEBU 307d [businesschannel][328ba5a2] Exit" +peer0.org1.example.com | "2019-04-22 06:17:42.827 UTC [endorser] endorseProposal -> DEBU 307e [businesschannel][328ba5a2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:42.827 UTC [endorser] endorseProposal -> DEBU 307f [businesschannel][328ba5a2] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:42.827 UTC [endorser] EndorseWithPlugin -> DEBU 3080 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:42.828 UTC [msp.identity] Sign -> DEBU 3081 Sign: plaintext: 0A2043E6CACF6D471D4F801876FF6BC3...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:42.828 UTC [msp.identity] Sign -> DEBU 3082 Sign: digest: 35A1F66AE23CC468CD1BA5C50979E72D7E5F39495AEEB368D6F32B8DE0CD6D91 " +peer0.org1.example.com | "2019-04-22 06:17:42.829 UTC [endorser] EndorseWithPlugin -> DEBU 3083 Exiting {plugin: escc, channel: businesschannel, tx: 328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:42.830 UTC [endorser] endorseProposal -> DEBU 3084 [businesschannel][328ba5a2] Exit" +peer0.org1.example.com | "2019-04-22 06:17:42.831 UTC [lockbasedtxmgr] Done -> DEBU 3085 Done with transaction simulation / query execution [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +peer0.org1.example.com | "2019-04-22 06:17:42.832 UTC [endorser] func1 -> DEBU 3086 Exit: request from 192.168.224.9:49296" +peer0.org1.example.com | "2019-04-22 06:17:42.833 UTC [comm.grpc.server] 1 -> INFO 3087 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49296 grpc.code=OK grpc.call_duration=27.2093ms +peer0.org1.example.com | "2019-04-22 06:17:42.838 UTC [grpc] infof -> DEBU 3088 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:42.839 UTC [grpc] infof -> DEBU 3089 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:42.886 UTC [gossip.pull] Hello -> DEBU 308a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:42.886 UTC [gossip.comm] Send -> DEBU 308b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.887 UTC [gossip.pull] Hello -> DEBU 308c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:42.887 UTC [gossip.comm] Send -> DEBU 308d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.887 UTC [gossip.pull] Hello -> DEBU 308e Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:42.888 UTC [gossip.comm] Send -> DEBU 308f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.888 UTC [gossip.comm] sendToEndpoint -> DEBU 3090 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.888 UTC [gossip.comm] sendToEndpoint -> DEBU 3091 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3092 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3093 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3094 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3095 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.891 UTC [gossip.gossip] handleMessage -> DEBU 3096 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4371859400708063927 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.891 UTC [gossip.pull] HandleMessage -> DEBU 3097 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4371859400708063927 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.892 UTC [gossip.gossip] handleMessage -> DEBU 3098 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.892 UTC [gossip.comm] func1 -> DEBU 3099 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18131995637447144871 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.893 UTC [gossip.gossip] handleMessage -> DEBU 309a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18131995637447144871 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.893 UTC [gossip.pull] HandleMessage -> DEBU 309b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18131995637447144871 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.894 UTC [gossip.gossip] handleMessage -> DEBU 309c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.895 UTC [gossip.comm] func1 -> DEBU 309d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15790122713230754728 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.895 UTC [gossip.gossip] handleMessage -> DEBU 309e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15790122713230754728 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.896 UTC [gossip.pull] HandleMessage -> DEBU 309f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15790122713230754728 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.896 UTC [gossip.gossip] handleMessage -> DEBU 30a0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.935 UTC [msp.identity] Sign -> DEBU 30a1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102A " +peer0.org1.example.com | "2019-04-22 06:17:42.935 UTC [msp.identity] Sign -> DEBU 30a2 Sign: digest: 0B9F05E3DA7A10F568CD173DCCCF7C04719B624A3A6351E2A764221D7A0D5AB3 " +peer0.org1.example.com | "2019-04-22 06:17:42.936 UTC [msp.identity] Sign -> DEBU 30a3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:42.936 UTC [msp.identity] Sign -> DEBU 30a4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:42.937 UTC [gossip.comm] Send -> DEBU 30a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.937 UTC [msp] DeserializeIdentity -> DEBU 30a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.937 UTC [gossip.comm] sendToEndpoint -> DEBU 30a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.937 UTC [gossip.comm] Send -> DEBU 30a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.938 UTC [gossip.comm] sendToEndpoint -> DEBU 30a9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.938 UTC [msp] DeserializeIdentity -> DEBU 30aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:42.939 UTC [gossip.comm] Send -> DEBU 30ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 30ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 30ae Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.940 UTC [gossip.comm] sendToEndpoint -> DEBU 30af Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.944 UTC [gossip.gossip] handleMessage -> DEBU 30b0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.944 UTC [gossip.gossip] handleMessage -> DEBU 30b1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.944 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30b3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:42.945 UTC [gossip.comm] func1 -> DEBU 30b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.945 UTC [gossip.gossip] handleMessage -> DEBU 30b6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.945 UTC [msp.identity] Verify -> DEBU 30b5 Verify: digest = 00000000 0b 9f 05 e3 da 7a 10 f5 68 cd 17 3d cc cf 7c 04 |.....z..h..=..|.| +peer0.org1.example.com | 00000010 71 9b 62 4a 3a 63 51 e2 a7 64 22 1d 7a 0d 5a b3 |q.bJ:cQ..d".z.Z.|" +peer0.org1.example.com | "2019-04-22 06:17:42.946 UTC [msp.identity] Verify -> DEBU 30b7 Verify: sig = 00000000 30 45 02 21 00 a9 49 8c 99 9a c1 40 cb d8 ae 1f |0E.!..I....@....| +peer0.org1.example.com | 00000010 80 61 2c 36 65 18 f0 68 2a cb 6b 35 ae 3b bd 98 |.a,6e..h*.k5.;..| +peer0.org1.example.com | 00000020 96 53 e1 4f 3d 02 20 35 0b 6c 39 6a d5 17 e0 b1 |.S.O=. 5.l9j....| +peer0.org1.example.com | 00000030 bb 67 38 1e 25 09 58 11 2c 39 03 c1 66 1e 36 30 |.g8.%.X.,9..f.60| +peer0.org1.example.com | 00000040 66 fd 01 d7 24 a8 1a |f...$..|" +peer0.org1.example.com | "2019-04-22 06:17:42.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.946 UTC [gossip.discovery] isSentByMe -> DEBU 30b9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ba Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.947 UTC [gossip.comm] func1 -> DEBU 30bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 30ad Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.948 UTC [gossip.gossip] handleMessage -> DEBU 30be Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.949 UTC [gossip.gossip] handleMessage -> DEBU 30c0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30bf Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:42.949 UTC [msp.identity] Verify -> DEBU 30c1 Verify: digest = 00000000 0b 9f 05 e3 da 7a 10 f5 68 cd 17 3d cc cf 7c 04 |.....z..h..=..|.| +peer0.org1.example.com | 00000010 71 9b 62 4a 3a 63 51 e2 a7 64 22 1d 7a 0d 5a b3 |q.bJ:cQ..d".z.Z.|" +peer0.org1.example.com | "2019-04-22 06:17:42.950 UTC [msp.identity] Verify -> DEBU 30c2 Verify: sig = 00000000 30 45 02 21 00 a9 49 8c 99 9a c1 40 cb d8 ae 1f |0E.!..I....@....| +peer0.org1.example.com | 00000010 80 61 2c 36 65 18 f0 68 2a cb 6b 35 ae 3b bd 98 |.a,6e..h*.k5.;..| +peer0.org1.example.com | 00000020 96 53 e1 4f 3d 02 20 35 0b 6c 39 6a d5 17 e0 b1 |.S.O=. 5.l9j....| +peer0.org1.example.com | 00000030 bb 67 38 1e 25 09 58 11 2c 39 03 c1 66 1e 36 30 |.g8.%.X.,9..f.60| +peer0.org1.example.com | 00000040 66 fd 01 d7 24 a8 1a |f...$..|" +peer0.org1.example.com | "2019-04-22 06:17:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.951 UTC [gossip.discovery] isSentByMe -> DEBU 30c4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30c6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.952 UTC [gossip.gossip] handleMessage -> DEBU 30c7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30c9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:42.955 UTC [msp.identity] Verify -> DEBU 30ca Verify: digest = 00000000 0b 9f 05 e3 da 7a 10 f5 68 cd 17 3d cc cf 7c 04 |.....z..h..=..|.| +peer0.org1.example.com | 00000010 71 9b 62 4a 3a 63 51 e2 a7 64 22 1d 7a 0d 5a b3 |q.bJ:cQ..d".z.Z.|" +peer0.org1.example.com | "2019-04-22 06:17:42.955 UTC [msp.identity] Verify -> DEBU 30cb Verify: sig = 00000000 30 45 02 21 00 a9 49 8c 99 9a c1 40 cb d8 ae 1f |0E.!..I....@....| +peer0.org1.example.com | 00000010 80 61 2c 36 65 18 f0 68 2a cb 6b 35 ae 3b bd 98 |.a,6e..h*.k5.;..| +peer0.org1.example.com | 00000020 96 53 e1 4f 3d 02 20 35 0b 6c 39 6a d5 17 e0 b1 |.S.O=. 5.l9j....| +peer0.org1.example.com | 00000030 bb 67 38 1e 25 09 58 11 2c 39 03 c1 66 1e 36 30 |.g8.%.X.,9..f.60| +peer0.org1.example.com | 00000040 66 fd 01 d7 24 a8 1a |f...$..|" +peer0.org1.example.com | "2019-04-22 06:17:42.956 UTC [msp.identity] Verify -> DEBU 30cc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:42.957 UTC [msp.identity] Verify -> DEBU 30cd Verify: sig = 00000000 30 45 02 21 00 89 f6 ae 63 da 90 d2 73 62 6e f0 |0E.!....c...sbn.| +peer0.org1.example.com | 00000010 b2 59 0d 4f 59 43 7b f7 c9 a9 f3 48 49 b1 e5 69 |.Y.OYC{....HI..i| +peer0.org1.example.com | 00000020 fb e3 b3 74 ed 02 20 02 d1 5a 79 21 9d 4a cc c4 |...t.. ..Zy!.J..| +peer0.org1.example.com | 00000030 98 60 0a 40 a7 5c 1d 1b 19 4e c1 8b 5f f0 14 a8 |.`.@.\...N.._...| +peer0.org1.example.com | 00000040 9a 17 a2 6e 33 78 1e |...n3x.|" +peer0.org1.example.com | "2019-04-22 06:17:42.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ce Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.958 UTC [gossip.discovery] isSentByMe -> DEBU 30cf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:42.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 30d0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:42.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30d1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.045 UTC [endorser] ProcessProposal -> DEBU 30d2 Entering: request from 192.168.224.9:49300" +peer0.org1.example.com | "2019-04-22 06:17:43.046 UTC [protoutils] ValidateProposalMessage -> DEBU 30d3 ValidateProposalMessage starts for signed proposal 0xc00224cff0" +peer0.org1.example.com | "2019-04-22 06:17:43.046 UTC [protoutils] validateChannelHeader -> DEBU 30d4 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:43.046 UTC [protoutils] checkSignatureFromCreator -> DEBU 30d5 begin" +peer0.org1.example.com | "2019-04-22 06:17:43.046 UTC [msp] GetManagerForChain -> DEBU 30d6 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:43.046 UTC [protoutils] checkSignatureFromCreator -> DEBU 30d7 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:43.046 UTC [protoutils] checkSignatureFromCreator -> DEBU 30d8 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:43.047 UTC [msp.identity] Verify -> DEBU 30d9 Verify: digest = 00000000 d6 14 76 92 e9 44 ac c4 80 39 71 2a 56 e6 fe 2c |..v..D...9q*V..,| +peer0.org1.example.com | 00000010 00 30 76 e1 0b 18 aa b6 96 f4 53 6c 47 36 0e 00 |.0v.......SlG6..|" +peer0.org1.example.com | "2019-04-22 06:17:43.047 UTC [msp.identity] Verify -> DEBU 30da Verify: sig = 00000000 30 45 02 21 00 cf b7 96 e1 df 6f 4a 86 71 2f a1 |0E.!......oJ.q/.| +peer0.org1.example.com | 00000010 f3 06 13 d3 21 a7 9a 02 e8 c7 9e 4d 17 89 0f a1 |....!......M....| +peer0.org1.example.com | 00000020 03 49 ad 37 7a 02 20 32 e5 90 73 fc 80 fc 6a 22 |.I.7z. 2..s...j"| +peer0.org1.example.com | 00000030 89 85 6c 61 ec be 64 ed 80 3b 0a 80 75 fd 86 db |..la..d..;..u...| +peer0.org1.example.com | 00000040 f8 de 9f ba 2c fa 4f |....,.O|" +peer0.org1.example.com | "2019-04-22 06:17:43.047 UTC [protoutils] checkSignatureFromCreator -> DEBU 30db exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30dc validateChaincodeProposalMessage starts for proposal 0xc002609260, header 0xc00224d450" +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30dd validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [endorser] preProcess -> DEBU 30de [businesschannel][1b5e9432] processing txid: 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a" +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 30df retrieveTransactionByID() - txId = [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [aclmgmt] CheckACL -> DEBU 30e0 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [aclmgmt] CheckACL -> DEBU 30e1 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [policies] Evaluate -> DEBU 30e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:43.048 UTC [policies] Evaluate -> DEBU 30e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:43.049 UTC [policies] Evaluate -> DEBU 30e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:43.049 UTC [cauthdsl] func1 -> DEBU 30e5 0xc0024d3630 gate 1555913863049435200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e6 0xc0024d3630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e7 0xc0024d3630 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e8 0xc0024d3630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e9 0xc0024d3630 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:43.050 UTC [cauthdsl] func1 -> DEBU 30ea 0xc0024d3630 gate 1555913863049435200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:43.050 UTC [policies] Evaluate -> DEBU 30eb Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.050 UTC [policies] Evaluate -> DEBU 30ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.050 UTC [policies] Evaluate -> DEBU 30ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:43.051 UTC [cauthdsl] func1 -> DEBU 30ee 0xc0024d3e70 gate 1555913863051004600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:43.051 UTC [cauthdsl] func2 -> DEBU 30ef 0xc0024d3e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:43.051 UTC [cauthdsl] func2 -> DEBU 30f0 0xc0024d3e70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:43.051 UTC [cauthdsl] func2 -> DEBU 30f1 0xc0024d3e70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:43.051 UTC [msp.identity] Verify -> DEBU 30f2 Verify: digest = 00000000 d6 14 76 92 e9 44 ac c4 80 39 71 2a 56 e6 fe 2c |..v..D...9q*V..,| +peer0.org1.example.com | 00000010 00 30 76 e1 0b 18 aa b6 96 f4 53 6c 47 36 0e 00 |.0v.......SlG6..|" +peer0.org1.example.com | "2019-04-22 06:17:43.052 UTC [msp.identity] Verify -> DEBU 30f3 Verify: sig = 00000000 30 45 02 21 00 cf b7 96 e1 df 6f 4a 86 71 2f a1 |0E.!......oJ.q/.| +peer0.org1.example.com | 00000010 f3 06 13 d3 21 a7 9a 02 e8 c7 9e 4d 17 89 0f a1 |....!......M....| +peer0.org1.example.com | 00000020 03 49 ad 37 7a 02 20 32 e5 90 73 fc 80 fc 6a 22 |.I.7z. 2..s...j"| +peer0.org1.example.com | 00000030 89 85 6c 61 ec be 64 ed 80 3b 0a 80 75 fd 86 db |..la..d..;..u...| +peer0.org1.example.com | 00000040 f8 de 9f ba 2c fa 4f |....,.O|" +peer0.org1.example.com | "2019-04-22 06:17:43.052 UTC [cauthdsl] func2 -> DEBU 30f4 0xc0024d3e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:43.052 UTC [cauthdsl] func1 -> DEBU 30f5 0xc0024d3e70 gate 1555913863051004600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:43.052 UTC [policies] Evaluate -> DEBU 30f6 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.052 UTC [policies] Evaluate -> DEBU 30f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.053 UTC [policies] Evaluate -> DEBU 30f8 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.053 UTC [policies] Evaluate -> DEBU 30f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.053 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 30fa constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:43.053 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 30fb constructing new tx simulator txid = [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +peer0.org1.example.com | "2019-04-22 06:17:43.053 UTC [endorser] SimulateProposal -> DEBU 30fc [businesschannel][1b5e9432] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.053 UTC [stateleveldb] GetState -> DEBU 30fd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:43.054 UTC [endorser] callChaincode -> INFO 30fe [businesschannel][1b5e9432] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.054 UTC [stateleveldb] GetState -> DEBU 30ff GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:43.055 UTC [stateleveldb] GetState -> DEBU 3100 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:43.055 UTC [chaincode] Execute -> DEBU 3101 Entry" +peer0.org1.example.com | "2019-04-22 06:17:43.056 UTC [chaincode] handleMessage -> DEBU 3102 [1b5e9432] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:43.056 UTC [chaincode] HandleTransaction -> DEBU 3103 [1b5e9432] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:43.057 UTC [chaincode] HandleGetState -> DEBU 3104 [1b5e9432] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:43.057 UTC [stateleveldb] GetState -> DEBU 3105 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:43.057 UTC [chaincode] HandleTransaction -> DEBU 3106 [1b5e9432] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:43.058 UTC [chaincode] handleMessage -> DEBU 3107 [1b5e9432] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:43.058 UTC [chaincode] HandleTransaction -> DEBU 3108 [1b5e9432] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:43.059 UTC [chaincode] HandleGetState -> DEBU 3109 [1b5e9432] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:43.059 UTC [stateleveldb] GetState -> DEBU 310a GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-04-22 06:17:43.059 UTC [chaincode] HandleTransaction -> DEBU 310b [1b5e9432] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:43.060 UTC [chaincode] handleMessage -> DEBU 310c [1b5e9432] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:43.060 UTC [chaincode] HandleTransaction -> DEBU 310d [1b5e9432] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:43.061 UTC [chaincode] HandleTransaction -> DEBU 310e [1b5e9432] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:43.062 UTC [chaincode] handleMessage -> DEBU 310f [1b5e9432] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:43.062 UTC [chaincode] HandleTransaction -> DEBU 3110 [1b5e9432] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:43.062 UTC [chaincode] HandleTransaction -> DEBU 3111 [1b5e9432] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:43.064 UTC [chaincode] handleMessage -> DEBU 3112 [1b5e9432] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:43.064 UTC [chaincode] Notify -> DEBU 3113 [1b5e9432] notifying Txid:1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:43.064 UTC [chaincode] Execute -> DEBU 3114 Exit" +peer0.org1.example.com | "2019-04-22 06:17:43.064 UTC [endorser] callChaincode -> INFO 3115 [businesschannel][1b5e9432] Exit chaincode: name:"exp02" (10ms)" +peer0.org1.example.com | "2019-04-22 06:17:43.064 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3116 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:43.065 UTC [lockbasedtxmgr] Done -> DEBU 3117 Done with transaction simulation / query execution [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +peer0.org1.example.com | "2019-04-22 06:17:43.065 UTC [endorser] SimulateProposal -> DEBU 3118 [businesschannel][1b5e9432] Exit" +peer0.org1.example.com | "2019-04-22 06:17:43.066 UTC [endorser] endorseProposal -> DEBU 3119 [businesschannel][1b5e9432] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.066 UTC [endorser] endorseProposal -> DEBU 311a [businesschannel][1b5e9432] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:43.066 UTC [endorser] EndorseWithPlugin -> DEBU 311b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:43.066 UTC [msp.identity] Sign -> DEBU 311c Sign: plaintext: 0A20209914F07F86B5B5D8DEE92C4C99...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:43.066 UTC [msp.identity] Sign -> DEBU 311d Sign: digest: BAABF0CCC09984755C158322502DF7C5BCC3BD0F116F0600A17215225553BB78 " +peer0.org1.example.com | "2019-04-22 06:17:43.067 UTC [endorser] EndorseWithPlugin -> DEBU 311e Exiting {plugin: escc, channel: businesschannel, tx: 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:43.067 UTC [endorser] endorseProposal -> DEBU 311f [businesschannel][1b5e9432] Exit" +peer0.org1.example.com | "2019-04-22 06:17:43.067 UTC [lockbasedtxmgr] Done -> DEBU 3120 Done with transaction simulation / query execution [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +peer0.org1.example.com | "2019-04-22 06:17:43.067 UTC [endorser] func1 -> DEBU 3121 Exit: request from 192.168.224.9:49300" +peer0.org1.example.com | "2019-04-22 06:17:43.067 UTC [comm.grpc.server] 1 -> INFO 3122 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49300 grpc.code=OK grpc.call_duration=22.2728ms +peer0.org1.example.com | "2019-04-22 06:17:43.082 UTC [grpc] infof -> DEBU 3123 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:43.083 UTC [grpc] infof -> DEBU 3124 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:43.138 UTC [gossip.comm] func1 -> DEBU 3125 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.139 UTC [gossip.gossip] handleMessage -> DEBU 3126 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.139 UTC [gossip.pull] HandleMessage -> DEBU 3127 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.140 UTC [gossip.pull] SendDigest -> DEBU 3128 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:43.140 UTC [gossip.gossip] handleMessage -> DEBU 3129 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.159 UTC [gossip.comm] func1 -> DEBU 312a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.159 UTC [gossip.gossip] handleMessage -> DEBU 312b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.159 UTC [gossip.gossip] handleMessage -> DEBU 312c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.159 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.160 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 312e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:43.160 UTC [msp.identity] Verify -> DEBU 312f Verify: digest = 00000000 c4 8d 78 67 33 2d 7a 2f f6 52 42 7d e9 34 c5 02 |..xg3-z/.RB}.4..| +peer0.org1.example.com | 00000010 ab 84 d6 5c 89 03 84 c2 bd fe 2e 4d 67 6c 98 2d |...\.......Mgl.-|" +peer0.org1.example.com | "2019-04-22 06:17:43.161 UTC [msp.identity] Verify -> DEBU 3130 Verify: sig = 00000000 30 45 02 21 00 e6 dc 8b 25 41 3d 30 b8 2d 1b 05 |0E.!....%A=0.-..| +peer0.org1.example.com | 00000010 76 24 b3 0b 81 f0 ea 11 e4 2d 49 d4 8e 57 b4 c1 |v$.......-I..W..| +peer0.org1.example.com | 00000020 41 74 54 b6 8b 02 20 76 bb 4f 93 ea a9 ee ca 0d |AtT... v.O......| +peer0.org1.example.com | 00000030 de de 58 00 2c 0c c3 f1 05 58 01 4e f4 eb c8 4d |..X.,....X.N...M| +peer0.org1.example.com | 00000040 6e 79 84 12 e3 b6 90 |ny.....|" +peer0.org1.example.com | "2019-04-22 06:17:43.162 UTC [msp.identity] Verify -> DEBU 3131 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:43.162 UTC [msp.identity] Verify -> DEBU 3132 Verify: sig = 00000000 30 44 02 20 11 ae 6d e8 a7 84 22 83 ad fe 9b c4 |0D. ..m...".....| +peer0.org1.example.com | 00000010 ad 01 5a 0d d6 6e de 4b e0 94 86 83 ca e1 37 6d |..Z..n.K......7m| +peer0.org1.example.com | 00000020 ea 8a 57 00 02 20 58 73 1a f7 d9 46 cf 49 9b a8 |..W.. Xs...F.I..| +peer0.org1.example.com | 00000030 3c dd 04 c4 c6 4d ad 45 b3 58 a9 ff 3a 37 c7 5e |<....M.E.X..:7.^| +peer0.org1.example.com | 00000040 2a e7 9e fc b8 3c |*....<|" +peer0.org1.example.com | "2019-04-22 06:17:43.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3133 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3134 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:43.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3135 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 " +peer0.org1.example.com | "2019-04-22 06:17:43.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 3136 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 " +peer0.org1.example.com | "2019-04-22 06:17:43.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 3137 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:43.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 3138 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3139 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 313a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.165 UTC [gossip.discovery] sendMemResponse -> DEBU 313b Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:43.165 UTC [msp] DeserializeIdentity -> DEBU 313c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.165 UTC [msp] DeserializeIdentity -> DEBU 313d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.166 UTC [gossip.comm] Send -> DEBU 313e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:43.166 UTC [gossip.discovery] sendMemResponse -> DEBU 313f Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:43.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3140 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3141 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.295 UTC [endorser] ProcessProposal -> DEBU 3142 Entering: request from 192.168.224.9:49306" +peer0.org1.example.com | "2019-04-22 06:17:43.295 UTC [protoutils] ValidateProposalMessage -> DEBU 3143 ValidateProposalMessage starts for signed proposal 0xc0023022d0" +peer0.org1.example.com | "2019-04-22 06:17:43.295 UTC [protoutils] validateChannelHeader -> DEBU 3144 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:43.295 UTC [protoutils] checkSignatureFromCreator -> DEBU 3145 begin" +peer0.org1.example.com | "2019-04-22 06:17:43.295 UTC [msp] GetManagerForChain -> DEBU 3146 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:43.296 UTC [protoutils] checkSignatureFromCreator -> DEBU 3147 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-04-22 06:17:43.296 UTC [protoutils] checkSignatureFromCreator -> DEBU 3148 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:43.296 UTC [msp.identity] Verify -> DEBU 3149 Verify: digest = 00000000 03 65 4e dd 86 2f c9 b3 c2 49 1a cf ca 09 97 97 |.eN../...I......| +peer0.org1.example.com | 00000010 85 ac 79 5e 00 ea 77 b4 fc 3b 35 00 6a d8 26 68 |..y^..w..;5.j.&h|" +peer0.org1.example.com | "2019-04-22 06:17:43.297 UTC [msp.identity] Verify -> DEBU 314a Verify: sig = 00000000 30 44 02 20 29 9a 0a 99 dc a4 38 61 ed 1c 56 21 |0D. ).....8a..V!| +peer0.org1.example.com | 00000010 fa f2 8d 8c 0a 34 30 c1 36 43 00 f8 85 6c 4e 57 |.....40.6C...lNW| +peer0.org1.example.com | 00000020 75 8b 50 5e 02 20 46 ca 67 f6 1e 52 00 a9 f5 fc |u.P^. F.g..R....| +peer0.org1.example.com | 00000030 aa ba 46 e7 a3 d1 6e b5 62 4f 45 3b b1 d3 e5 fc |..F...n.bOE;....| +peer0.org1.example.com | 00000040 44 b3 6b 32 86 cf |D.k2..|" +peer0.org1.example.com | "2019-04-22 06:17:43.297 UTC [protoutils] checkSignatureFromCreator -> DEBU 314b exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:43.297 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 314c validateChaincodeProposalMessage starts for proposal 0xc002609ab0, header 0xc0023026e0" +peer0.org1.example.com | "2019-04-22 06:17:43.298 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 314d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.298 UTC [endorser] preProcess -> DEBU 314e [businesschannel][482c2518] processing txid: 482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b" +peer0.org1.example.com | "2019-04-22 06:17:43.298 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 314f retrieveTransactionByID() - txId = [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +peer0.org1.example.com | "2019-04-22 06:17:43.298 UTC [aclmgmt] CheckACL -> DEBU 3150 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:43.298 UTC [aclmgmt] CheckACL -> DEBU 3151 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:43.299 UTC [policies] Evaluate -> DEBU 3152 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:43.299 UTC [policies] Evaluate -> DEBU 3153 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:43.299 UTC [policies] Evaluate -> DEBU 3154 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:43.299 UTC [cauthdsl] func1 -> DEBU 3155 0xc0026657e0 gate 1555913863299601200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:43.299 UTC [cauthdsl] func2 -> DEBU 3156 0xc0026657e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:43.300 UTC [cauthdsl] func2 -> DEBU 3157 0xc0026657e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:43.300 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3158 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:17:43.300 UTC [msp] Validate -> DEBU 3159 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:17:43.300 UTC [msp] getCertificationChain -> DEBU 315a MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:17:43.301 UTC [cauthdsl] func2 -> DEBU 315b 0xc0026657e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:43.301 UTC [msp.identity] Verify -> DEBU 315c Verify: digest = 00000000 03 65 4e dd 86 2f c9 b3 c2 49 1a cf ca 09 97 97 |.eN../...I......| +peer0.org1.example.com | 00000010 85 ac 79 5e 00 ea 77 b4 fc 3b 35 00 6a d8 26 68 |..y^..w..;5.j.&h|" +peer0.org1.example.com | "2019-04-22 06:17:43.301 UTC [msp.identity] Verify -> DEBU 315d Verify: sig = 00000000 30 44 02 20 29 9a 0a 99 dc a4 38 61 ed 1c 56 21 |0D. ).....8a..V!| +peer0.org1.example.com | 00000010 fa f2 8d 8c 0a 34 30 c1 36 43 00 f8 85 6c 4e 57 |.....40.6C...lNW| +peer0.org1.example.com | 00000020 75 8b 50 5e 02 20 46 ca 67 f6 1e 52 00 a9 f5 fc |u.P^. F.g..R....| +peer0.org1.example.com | 00000030 aa ba 46 e7 a3 d1 6e b5 62 4f 45 3b b1 d3 e5 fc |..F...n.bOE;....| +peer0.org1.example.com | 00000040 44 b3 6b 32 86 cf |D.k2..|" +peer0.org1.example.com | "2019-04-22 06:17:43.302 UTC [cauthdsl] func2 -> DEBU 315e 0xc0026657e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:43.302 UTC [cauthdsl] func1 -> DEBU 315f 0xc0026657e0 gate 1555913863299601200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3160 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3161 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3162 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3163 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:43.303 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3164 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:43.303 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3165 constructing new tx simulator txid = [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +peer0.org1.example.com | "2019-04-22 06:17:43.303 UTC [endorser] SimulateProposal -> DEBU 3166 [businesschannel][482c2518] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.303 UTC [stateleveldb] GetState -> DEBU 3167 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:43.304 UTC [endorser] callChaincode -> INFO 3168 [businesschannel][482c2518] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.304 UTC [stateleveldb] GetState -> DEBU 3169 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:43.304 UTC [stateleveldb] GetState -> DEBU 316a GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:43.305 UTC [chaincode] Execute -> DEBU 316b Entry" +peer0.org1.example.com | "2019-04-22 06:17:43.306 UTC [chaincode] handleMessage -> DEBU 316c [482c2518] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:43.306 UTC [chaincode] HandleTransaction -> DEBU 316d [482c2518] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:43.307 UTC [chaincode] HandleGetState -> DEBU 316e [482c2518] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:43.307 UTC [stateleveldb] GetState -> DEBU 316f GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:43.307 UTC [chaincode] HandleTransaction -> DEBU 3170 [482c2518] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:43.308 UTC [chaincode] handleMessage -> DEBU 3171 [482c2518] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:43.308 UTC [chaincode] Notify -> DEBU 3172 [482c2518] notifying Txid:482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:43.309 UTC [chaincode] Execute -> DEBU 3173 Exit" +peer0.org1.example.com | "2019-04-22 06:17:43.309 UTC [endorser] callChaincode -> INFO 3174 [businesschannel][482c2518] Exit chaincode: name:"exp02" (5ms)" +peer0.org1.example.com | "2019-04-22 06:17:43.309 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3175 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:43.310 UTC [lockbasedtxmgr] Done -> DEBU 3176 Done with transaction simulation / query execution [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +peer0.org1.example.com | "2019-04-22 06:17:43.310 UTC [endorser] SimulateProposal -> DEBU 3177 [businesschannel][482c2518] Exit" +peer0.org1.example.com | "2019-04-22 06:17:43.310 UTC [endorser] endorseProposal -> DEBU 3178 [businesschannel][482c2518] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:43.310 UTC [endorser] endorseProposal -> DEBU 3179 [businesschannel][482c2518] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:43.310 UTC [endorser] EndorseWithPlugin -> DEBU 317a Entering endorsement for {plugin: escc, channel: businesschannel, tx: 482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:43.310 UTC [msp.identity] Sign -> DEBU 317b Sign: plaintext: 0A201D2092FBC4647FC53411571FD381...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:43.311 UTC [msp.identity] Sign -> DEBU 317c Sign: digest: D7E7D9E5AAF8784BA38B3D625301A724F15968F9CA95B74C3051EB113D921975 " +peer0.org1.example.com | "2019-04-22 06:17:43.311 UTC [endorser] EndorseWithPlugin -> DEBU 317d Exiting {plugin: escc, channel: businesschannel, tx: 482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:43.311 UTC [endorser] endorseProposal -> DEBU 317e [businesschannel][482c2518] Exit" +peer0.org1.example.com | "2019-04-22 06:17:43.311 UTC [lockbasedtxmgr] Done -> DEBU 317f Done with transaction simulation / query execution [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +peer0.org1.example.com | "2019-04-22 06:17:43.312 UTC [endorser] func1 -> DEBU 3180 Exit: request from 192.168.224.9:49306" +peer0.org1.example.com | "2019-04-22 06:17:43.312 UTC [comm.grpc.server] 1 -> INFO 3181 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49306 grpc.code=OK grpc.call_duration=17.7781ms +peer0.org1.example.com | "2019-04-22 06:17:43.316 UTC [grpc] warningf -> DEBU 3182 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49306: read: connection reset by peer" +peer0.org1.example.com | "2019-04-22 06:17:43.316 UTC [grpc] infof -> DEBU 3183 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:43.317 UTC [grpc] infof -> DEBU 3184 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:43.604 UTC [gossip.comm] func1 -> DEBU 3185 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.605 UTC [gossip.gossip] handleMessage -> DEBU 3186 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.606 UTC [gossip.pull] HandleMessage -> DEBU 3187 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.606 UTC [msp] DeserializeIdentity -> DEBU 3188 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.606 UTC [msp] DeserializeIdentity -> DEBU 3189 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.606 UTC [msp] DeserializeIdentity -> DEBU 318a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.607 UTC [msp] DeserializeIdentity -> DEBU 318b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.607 UTC [msp] DeserializeIdentity -> DEBU 318c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.608 UTC [msp] DeserializeIdentity -> DEBU 318d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.608 UTC [gossip.pull] SendDigest -> DEBU 318e Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:43.610 UTC [gossip.gossip] handleMessage -> DEBU 318f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.638 UTC [gossip.comm] func1 -> DEBU 3190 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.639 UTC [gossip.gossip] handleMessage -> DEBU 3191 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.639 UTC [gossip.gossip] handleMessage -> DEBU 3192 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3193 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.640 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3194 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:43.640 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3196 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:43.642 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3197 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:43.642 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3198 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:43.642 UTC [policies] Evaluate -> DEBU 3199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:43.643 UTC [policies] Evaluate -> DEBU 319a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:43.643 UTC [policies] Evaluate -> DEBU 319b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:43.644 UTC [cauthdsl] func1 -> DEBU 319c 0xc0026dd530 gate 1555913863644144900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:43.644 UTC [cauthdsl] func2 -> DEBU 319d 0xc0026dd530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:43.644 UTC [cauthdsl] func2 -> DEBU 319e 0xc0026dd530 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:43.645 UTC [cauthdsl] func2 -> DEBU 319f 0xc0026dd530 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:43.645 UTC [msp.identity] Verify -> DEBU 31a0 Verify: digest = 00000000 44 2d 06 d8 5f d4 3e fa e6 5e be 2d 46 62 ee 0d |D-.._.>..^.-Fb..| +peer0.org1.example.com | 00000010 a8 85 b4 7e e0 a2 c9 bd 04 8b 1b 83 16 8d 7a 81 |...~..........z.|" +peer0.org1.example.com | "2019-04-22 06:17:43.646 UTC [msp.identity] Verify -> DEBU 31a1 Verify: sig = 00000000 30 44 02 20 32 b8 82 5c 2a bf 80 30 06 17 39 d5 |0D. 2..\*..0..9.| +peer0.org1.example.com | 00000010 2b 43 fa 48 4a dc 41 ef 21 c6 9b ce 38 d0 b8 b6 |+C.HJ.A.!...8...| +peer0.org1.example.com | 00000020 21 df ed 12 02 20 2b b0 3a 78 a6 a0 67 9f 28 25 |!.... +.:x..g.(%| +peer0.org1.example.com | 00000030 9f 67 00 32 dc d8 92 be 77 47 40 f5 fe 32 21 72 |.g.2....wG@..2!r| +peer0.org1.example.com | 00000040 32 d1 d9 ba 5c 6c |2...\l|" +peer0.org1.example.com | "2019-04-22 06:17:43.647 UTC [cauthdsl] func2 -> DEBU 31a2 0xc0026dd530 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:43.647 UTC [cauthdsl] func1 -> DEBU 31a3 0xc0026dd530 gate 1555913863644144900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:43.647 UTC [policies] Evaluate -> DEBU 31a4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:43.648 UTC [policies] Evaluate -> DEBU 31a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:43.648 UTC [policies] Evaluate -> DEBU 31a6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:43.649 UTC [policies] Evaluate -> DEBU 31a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:43.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 31a8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 31a9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:43.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 31aa updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 " +peer0.org1.example.com | "2019-04-22 06:17:43.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ab Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 " +peer0.org1.example.com | "2019-04-22 06:17:43.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ac Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:43.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ad Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 31ae Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.652 UTC [gossip.discovery] sendMemResponse -> DEBU 31af Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:43.652 UTC [msp] DeserializeIdentity -> DEBU 31b0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.652 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.653 UTC [msp] DeserializeIdentity -> DEBU 31b2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:43.653 UTC [gossip.comm] Send -> DEBU 31b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:43.654 UTC [gossip.discovery] sendMemResponse -> DEBU 31b4 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:43.654 UTC [gossip.comm] sendToEndpoint -> DEBU 31b5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:43.654 UTC [gossip.comm] sendToEndpoint -> DEBU 31b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:43.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31b7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.020 UTC [gossip.gossip] handleMessage -> DEBU 31b8 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.020 UTC [gossip.pull] HandleMessage -> DEBU 31b9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.020 UTC [msp] DeserializeIdentity -> DEBU 31ba Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.021 UTC [msp] DeserializeIdentity -> DEBU 31bb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.022 UTC [msp] DeserializeIdentity -> DEBU 31bc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.023 UTC [msp] DeserializeIdentity -> DEBU 31bd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.023 UTC [msp] DeserializeIdentity -> DEBU 31be Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.024 UTC [msp] DeserializeIdentity -> DEBU 31bf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.024 UTC [gossip.pull] SendDigest -> DEBU 31c0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:44.024 UTC [gossip.gossip] handleMessage -> DEBU 31c1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.039 UTC [gossip.gossip] handleMessage -> DEBU 31c2 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.040 UTC [gossip.gossip] handleMessage -> DEBU 31c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.040 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 31c5 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:44.041 UTC [msp] DeserializeIdentity -> DEBU 31c6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.041 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:44.041 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31c8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.042 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31c9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.042 UTC [policies] Evaluate -> DEBU 31ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.042 UTC [policies] Evaluate -> DEBU 31cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:44.042 UTC [policies] Evaluate -> DEBU 31cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.043 UTC [cauthdsl] func1 -> DEBU 31cd 0xc002769c30 gate 1555913864042998900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:44.043 UTC [cauthdsl] func2 -> DEBU 31ce 0xc002769c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:44.043 UTC [cauthdsl] func2 -> DEBU 31cf 0xc002769c30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:44.043 UTC [cauthdsl] func2 -> DEBU 31d0 0xc002769c30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.044 UTC [msp.identity] Verify -> DEBU 31d1 Verify: digest = 00000000 c5 03 28 5b b1 c4 79 e0 6e 5b 64 2a a2 b1 91 97 |..([..y.n[d*....| +peer0.org1.example.com | 00000010 04 89 f4 9a b4 7a 81 d9 37 d4 a3 5e a7 ac e7 a2 |.....z..7..^....|" +peer0.org1.example.com | "2019-04-22 06:17:44.044 UTC [msp.identity] Verify -> DEBU 31d2 Verify: sig = 00000000 30 45 02 21 00 81 4b 28 ef fa d2 54 5f 3d 89 29 |0E.!..K(...T_=.)| +peer0.org1.example.com | 00000010 ba c9 ac 9e bc 84 0c 75 02 79 e5 96 bd c4 d0 50 |.......u.y.....P| +peer0.org1.example.com | 00000020 2b 4d b8 41 18 02 20 78 47 10 cb 00 bd 99 f8 c4 |+M.A.. xG.......| +peer0.org1.example.com | 00000030 44 89 b4 01 43 75 f1 d3 93 8d b6 71 e6 f8 72 d3 |D...Cu.....q..r.| +peer0.org1.example.com | 00000040 6c 26 a0 92 57 dd 70 |l&..W.p|" +peer0.org1.example.com | "2019-04-22 06:17:44.045 UTC [cauthdsl] func2 -> DEBU 31d3 0xc002769c30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.045 UTC [cauthdsl] func1 -> DEBU 31d4 0xc002769c30 gate 1555913864042998900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:44.045 UTC [policies] Evaluate -> DEBU 31d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.045 UTC [policies] Evaluate -> DEBU 31d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.046 UTC [policies] Evaluate -> DEBU 31d7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.046 UTC [policies] Evaluate -> DEBU 31d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 31d9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 31da Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:44.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 31db updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 " +peer0.org1.example.com | "2019-04-22 06:17:44.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 31dc Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 " +peer0.org1.example.com | "2019-04-22 06:17:44.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 31dd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:44.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 31de Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.049 UTC [gossip.discovery] handleAliveMessage -> DEBU 31df Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.050 UTC [gossip.discovery] sendMemResponse -> DEBU 31e0 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:44.050 UTC [msp] DeserializeIdentity -> DEBU 31e1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.051 UTC [msp] DeserializeIdentity -> DEBU 31e2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.051 UTC [msp] DeserializeIdentity -> DEBU 31e3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.052 UTC [gossip.comm] Send -> DEBU 31e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:44.052 UTC [gossip.discovery] sendMemResponse -> DEBU 31e5 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:44.053 UTC [gossip.comm] sendToEndpoint -> DEBU 31e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.053 UTC [gossip.comm] sendToEndpoint -> DEBU 31e7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.049 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31e8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.389 UTC [msp] DeserializeIdentity -> DEBU 31e9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.389 UTC [msp] DeserializeIdentity -> DEBU 31ea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.389 UTC [gossip.comm] Send -> DEBU 31eb Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31f0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ed Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.391 UTC [gossip.comm] sendToEndpoint -> DEBU 31f1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.393 UTC [gossip.comm] func1 -> DEBU 31f2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.394 UTC [gossip.gossip] handleMessage -> DEBU 31f3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.394 UTC [msp.identity] Verify -> DEBU 31f4 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:44.394 UTC [msp.identity] Verify -> DEBU 31f5 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:44.395 UTC [msp.identity] Verify -> DEBU 31f6 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +peer0.org1.example.com | 00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +peer0.org1.example.com | "2019-04-22 06:17:44.395 UTC [msp.identity] Verify -> DEBU 31f7 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +peer0.org1.example.com | 00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +peer0.org1.example.com | 00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +peer0.org1.example.com | 00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +peer0.org1.example.com | 00000040 8d f6 86 08 00 13 |......|" +peer0.org1.example.com | "2019-04-22 06:17:44.396 UTC [msp] DeserializeIdentity -> DEBU 31f8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.396 UTC [msp] DeserializeIdentity -> DEBU 31f9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:44.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31fb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31fc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.397 UTC [policies] Evaluate -> DEBU 31fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.397 UTC [policies] Evaluate -> DEBU 31fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:44.397 UTC [policies] Evaluate -> DEBU 31ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.400 UTC [cauthdsl] func1 -> DEBU 3200 0xc002e79380 gate 1555913864400169200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:44.400 UTC [cauthdsl] func2 -> DEBU 3201 0xc002e79380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:44.400 UTC [cauthdsl] func2 -> DEBU 3202 0xc002e79380 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:44.401 UTC [cauthdsl] func2 -> DEBU 3203 0xc002e79380 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.401 UTC [msp.identity] Verify -> DEBU 3204 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:44.403 UTC [msp.identity] Verify -> DEBU 3205 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:44.403 UTC [cauthdsl] func2 -> DEBU 3206 0xc002e79380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.403 UTC [cauthdsl] func1 -> DEBU 3207 0xc002e79380 gate 1555913864400169200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 3208 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 3209 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 320a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 320b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.406 UTC [gossip.comm] func1 -> DEBU 320c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.404 UTC [msp] DeserializeIdentity -> DEBU 320d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.407 UTC [msp] DeserializeIdentity -> DEBU 320e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 320f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3210 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3211 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [policies] Evaluate -> DEBU 3212 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [policies] Evaluate -> DEBU 3213 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [policies] Evaluate -> DEBU 3214 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [cauthdsl] func1 -> DEBU 3215 0xc002ec0b70 gate 1555913864408895400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:44.408 UTC [cauthdsl] func2 -> DEBU 3216 0xc002ec0b70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:44.409 UTC [cauthdsl] func2 -> DEBU 3217 0xc002ec0b70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:44.409 UTC [cauthdsl] func2 -> DEBU 3218 0xc002ec0b70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.409 UTC [msp.identity] Verify -> DEBU 3219 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:44.410 UTC [msp.identity] Verify -> DEBU 321a Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 321b 0xc002ec0b70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.411 UTC [cauthdsl] func1 -> DEBU 321c 0xc002ec0b70 gate 1555913864408895400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:44.411 UTC [policies] Evaluate -> DEBU 321d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.411 UTC [policies] Evaluate -> DEBU 321e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.412 UTC [policies] Evaluate -> DEBU 321f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.412 UTC [policies] Evaluate -> DEBU 3220 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.412 UTC [gossip.gossip] handleMessage -> DEBU 3221 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.412 UTC [gossip.gossip] handleMessage -> DEBU 3222 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.413 UTC [msp] DeserializeIdentity -> DEBU 3223 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.413 UTC [msp] DeserializeIdentity -> DEBU 3224 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.414 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3226 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:44.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3227 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3228 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.415 UTC [policies] Evaluate -> DEBU 3229 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.416 UTC [policies] Evaluate -> DEBU 322a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:44.416 UTC [policies] Evaluate -> DEBU 322b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.417 UTC [cauthdsl] func1 -> DEBU 322c 0xc002ee4750 gate 1555913864417037000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:44.417 UTC [cauthdsl] func2 -> DEBU 322d 0xc002ee4750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:44.417 UTC [cauthdsl] func2 -> DEBU 322e 0xc002ee4750 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:44.417 UTC [cauthdsl] func2 -> DEBU 322f 0xc002ee4750 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.417 UTC [msp.identity] Verify -> DEBU 3230 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:44.418 UTC [msp.identity] Verify -> DEBU 3231 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:44.418 UTC [cauthdsl] func2 -> DEBU 3232 0xc002ee4750 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.418 UTC [cauthdsl] func1 -> DEBU 3233 0xc002ee4750 gate 1555913864417037000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:44.418 UTC [policies] Evaluate -> DEBU 3234 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.418 UTC [policies] Evaluate -> DEBU 3235 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.419 UTC [policies] Evaluate -> DEBU 3236 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.419 UTC [policies] Evaluate -> DEBU 3237 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.420 UTC [msp.identity] Verify -> DEBU 3238 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +peer0.org1.example.com | 00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +peer0.org1.example.com | "2019-04-22 06:17:44.420 UTC [msp.identity] Verify -> DEBU 3239 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +peer0.org1.example.com | 00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +peer0.org1.example.com | 00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +peer0.org1.example.com | 00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +peer0.org1.example.com | 00000040 8d f6 86 08 00 13 |......|" +peer0.org1.example.com | "2019-04-22 06:17:44.421 UTC [msp.identity] Verify -> DEBU 323a Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:44.421 UTC [msp.identity] Verify -> DEBU 323b Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:44.422 UTC [msp] DeserializeIdentity -> DEBU 323c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.422 UTC [msp] DeserializeIdentity -> DEBU 323d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.422 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 323e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:44.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 323f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3240 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.422 UTC [policies] Evaluate -> DEBU 3241 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.423 UTC [policies] Evaluate -> DEBU 3242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:44.423 UTC [policies] Evaluate -> DEBU 3243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.423 UTC [cauthdsl] func1 -> DEBU 3244 0xc002efad60 gate 1555913864423594500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:44.424 UTC [cauthdsl] func2 -> DEBU 3245 0xc002efad60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:44.424 UTC [cauthdsl] func2 -> DEBU 3246 0xc002efad60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:44.424 UTC [cauthdsl] func2 -> DEBU 3247 0xc002efad60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.424 UTC [msp.identity] Verify -> DEBU 3248 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:44.424 UTC [msp.identity] Verify -> DEBU 3249 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 324a 0xc002efad60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [cauthdsl] func1 -> DEBU 324b 0xc002efad60 gate 1555913864423594500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [gossip.gossip] handleMessage -> DEBU 3250 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [gossip.gossip] handleMessage -> DEBU 3251 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.425 UTC [msp] DeserializeIdentity -> DEBU 3252 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.426 UTC [msp] DeserializeIdentity -> DEBU 3253 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.427 UTC [msp] DeserializeIdentity -> DEBU 3254 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3255 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:44.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3256 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3257 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.427 UTC [policies] Evaluate -> DEBU 3258 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.428 UTC [policies] Evaluate -> DEBU 3259 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:44.428 UTC [policies] Evaluate -> DEBU 325a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.428 UTC [cauthdsl] func1 -> DEBU 325b 0xc002f008a0 gate 1555913864428301200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:44.428 UTC [cauthdsl] func2 -> DEBU 325c 0xc002f008a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:44.428 UTC [cauthdsl] func2 -> DEBU 325d 0xc002f008a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:44.428 UTC [cauthdsl] func2 -> DEBU 325e 0xc002f008a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.428 UTC [msp.identity] Verify -> DEBU 325f Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:44.429 UTC [msp.identity] Verify -> DEBU 3260 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 3261 0xc002f008a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.429 UTC [cauthdsl] func1 -> DEBU 3262 0xc002f008a0 gate 1555913864428301200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:44.429 UTC [policies] Evaluate -> DEBU 3263 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.429 UTC [policies] Evaluate -> DEBU 3264 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.429 UTC [policies] Evaluate -> DEBU 3265 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.430 UTC [policies] Evaluate -> DEBU 3266 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 3267 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +peer0.org1.example.com | 00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +peer0.org1.example.com | "2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 3268 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +peer0.org1.example.com | 00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +peer0.org1.example.com | 00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +peer0.org1.example.com | 00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +peer0.org1.example.com | 00000040 8d f6 86 08 00 13 |......|" +peer0.org1.example.com | "2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 3269 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 326a Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:44.432 UTC [msp] DeserializeIdentity -> DEBU 326b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.432 UTC [msp] DeserializeIdentity -> DEBU 326c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 326d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:44.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:44.432 UTC [policies] Evaluate -> DEBU 3270 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.432 UTC [policies] Evaluate -> DEBU 3271 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:44.433 UTC [policies] Evaluate -> DEBU 3272 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:44.433 UTC [cauthdsl] func1 -> DEBU 3273 0xc002f45050 gate 1555913864433551200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:44.433 UTC [cauthdsl] func2 -> DEBU 3274 0xc002f45050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:44.433 UTC [cauthdsl] func2 -> DEBU 3275 0xc002f45050 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:44.433 UTC [cauthdsl] func2 -> DEBU 3276 0xc002f45050 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.433 UTC [msp.identity] Verify -> DEBU 3277 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:44.434 UTC [msp.identity] Verify -> DEBU 3278 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:44.434 UTC [cauthdsl] func2 -> DEBU 3279 0xc002f45050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:44.434 UTC [cauthdsl] func1 -> DEBU 327a 0xc002f45050 gate 1555913864433551200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:44.434 UTC [policies] Evaluate -> DEBU 327b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.434 UTC [policies] Evaluate -> DEBU 327c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.435 UTC [policies] Evaluate -> DEBU 327d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.435 UTC [policies] Evaluate -> DEBU 327e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:44.435 UTC [gossip.gossip] handleMessage -> DEBU 327f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.496 UTC [msp] DeserializeIdentity -> DEBU 3280 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.496 UTC [msp] DeserializeIdentity -> DEBU 3281 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.497 UTC [gossip.pull] Hello -> DEBU 3282 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:44.498 UTC [msp] DeserializeIdentity -> DEBU 3283 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.499 UTC [msp] DeserializeIdentity -> DEBU 3284 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.499 UTC [gossip.comm] Send -> DEBU 3285 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:44.500 UTC [gossip.comm] sendToEndpoint -> DEBU 3286 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.500 UTC [gossip.comm] sendToEndpoint -> DEBU 3287 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.501 UTC [gossip.comm] func1 -> DEBU 3288 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1512285266503218228 , Msg_type: BLOCK_MSG, digests: [6 1 2 3 4 5], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.501 UTC [gossip.gossip] handleMessage -> DEBU 3289 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1512285266503218228 , Msg_type: BLOCK_MSG, digests: [6 1 2 3 4 5], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.502 UTC [gossip.pull] HandleMessage -> DEBU 328a GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1512285266503218228 , Msg_type: BLOCK_MSG, digests: [6 1 2 3 4 5], Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.502 UTC [gossip.gossip] handleMessage -> DEBU 328b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.649 UTC [gossip.comm] func1 -> DEBU 328c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.649 UTC [gossip.gossip] handleMessage -> DEBU 328d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.650 UTC [msp] DeserializeIdentity -> DEBU 328e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.650 UTC [msp] DeserializeIdentity -> DEBU 328f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.650 UTC [gossip.gossip] handleMessage -> DEBU 3290 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.686 UTC [gossip.comm] func1 -> DEBU 3291 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.686 UTC [gossip.gossip] handleMessage -> DEBU 3292 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.686 UTC [gossip.pull] HandleMessage -> DEBU 3293 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.686 UTC [gossip.pull] SendDigest -> DEBU 3294 Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:44.687 UTC [gossip.gossip] handleMessage -> DEBU 3295 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:44.872 UTC [gossip.gossip] handleMessage -> DEBU 3296 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:44.872 UTC [msp] DeserializeIdentity -> DEBU 3297 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.872 UTC [msp] DeserializeIdentity -> DEBU 3298 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.873 UTC [msp] DeserializeIdentity -> DEBU 3299 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:44.873 UTC [gossip.gossip] handleMessage -> DEBU 329a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:45.090 UTC [gossip.comm] func1 -> DEBU 329b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:45.091 UTC [gossip.gossip] handleMessage -> DEBU 329c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:45.092 UTC [msp] DeserializeIdentity -> DEBU 329d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.097 UTC [msp] DeserializeIdentity -> DEBU 329e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.098 UTC [msp] DeserializeIdentity -> DEBU 329f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.100 UTC [gossip.gossip] handleMessage -> DEBU 32a0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:45.114 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 32a1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:45.114 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 32a2 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:45.114 UTC [policies] Evaluate -> DEBU 32a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:17:45.115 UTC [policies] Evaluate -> DEBU 32a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:45.115 UTC [policies] Evaluate -> DEBU 32a5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.115 UTC [cauthdsl] func1 -> DEBU 32a6 0xc00301e530 gate 1555913865115929800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:45.116 UTC [cauthdsl] func2 -> DEBU 32a7 0xc00301e530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:45.116 UTC [cauthdsl] func2 -> DEBU 32a8 0xc00301e530 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:45.117 UTC [cauthdsl] func2 -> DEBU 32a9 0xc00301e530 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.117 UTC [msp.identity] Verify -> DEBU 32aa Verify: digest = 00000000 34 87 83 a2 de 32 ba e9 35 7c d2 c0 56 09 e6 4c |4....2..5|..V..L| +peer0.org1.example.com | 00000010 96 22 13 19 d5 bb 3f 96 3f 14 fe 13 16 b3 74 46 |."....?.?.....tF|" +peer0.org1.example.com | "2019-04-22 06:17:45.117 UTC [msp.identity] Verify -> DEBU 32ab Verify: sig = 00000000 30 44 02 20 25 c6 04 68 71 e3 9e da 48 01 a5 17 |0D. %..hq...H...| +peer0.org1.example.com | 00000010 bf ac 7d f0 e5 97 2e b9 dc 93 34 0e d9 4e 42 6c |..}.......4..NBl| +peer0.org1.example.com | 00000020 49 3c 5d 3b 02 20 09 78 22 b8 e2 99 83 8e 9d a9 |I<];. .x".......| +peer0.org1.example.com | 00000030 85 05 76 87 6f fb 64 f5 a6 2a a3 37 b5 0b 64 32 |..v.o.d..*.7..d2| +peer0.org1.example.com | 00000040 01 0f 28 58 fe 22 |..(X."|" +peer0.org1.example.com | "2019-04-22 06:17:45.118 UTC [cauthdsl] func2 -> DEBU 32ac 0xc00301e530 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.118 UTC [cauthdsl] func1 -> DEBU 32ad 0xc00301e530 gate 1555913865115929800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:45.119 UTC [policies] Evaluate -> DEBU 32ae Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.119 UTC [policies] Evaluate -> DEBU 32af == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.120 UTC [policies] Evaluate -> DEBU 32b0 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:45.121 UTC [policies] Evaluate -> DEBU 32b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:45.122 UTC [blocksProvider] DeliverBlocks -> DEBU 32b2 [businesschannel] Adding payload to local buffer, blockNum = [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.123 UTC [gossip.state] addPayload -> DEBU 32b3 [businesschannel] Adding payload to local buffer, blockNum = [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.124 UTC [gossip.state] addPayload -> DEBU 32b4 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:17:45.124 UTC [blocksProvider] DeliverBlocks -> DEBU 32b6 [businesschannel] Gossiping block [7], peers number [3]" +peer0.org1.example.com | "2019-04-22 06:17:45.125 UTC [gossip.channel] AddToMsgStore -> DEBU 32b7 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:17:45.125 UTC [gossip.pull] Add -> DEBU 32b8 Added 7, total items: 7" +peer0.org1.example.com | "2019-04-22 06:17:45.124 UTC [gossip.state] deliverPayloads -> DEBU 32b5 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.126 UTC [gossip.state] deliverPayloads -> DEBU 32b9 [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:17:45.127 UTC [gossip.privdata] StoreBlock -> INFO 32ba [businesschannel] Received block [7] from buffer" +peer0.org1.example.com | "2019-04-22 06:17:45.127 UTC [gossip.privdata] StoreBlock -> DEBU 32bb [businesschannel] Validating block [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.127 UTC [committer.txvalidator] Validate -> DEBU 32bc [businesschannel] START Block Validation for block [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.128 UTC [committer.txvalidator] Validate -> DEBU 32bd expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:17:45.128 UTC [committer.txvalidator] validateTx -> DEBU 32be [businesschannel] validateTx starts for block 0xc00335e600 env 0xc002490320 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:45.129 UTC [protoutils] ValidateTransaction -> DEBU 32bf ValidateTransactionEnvelope starts for envelope 0xc002490320" +peer0.org1.example.com | "2019-04-22 06:17:45.130 UTC [protoutils] ValidateTransaction -> DEBU 32c0 Header is channel_header:"\010\003\032\013\010\207\271\365\345\005\020\264\332\266\025\"\017businesschannel*@1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\327\302!\223;\212\321\332\244L&\305h\270\003\001c\204\360g\031\347\326\254" " +peer0.org1.example.com | "2019-04-22 06:17:45.131 UTC [protoutils] validateChannelHeader -> DEBU 32c1 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:45.131 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c2 begin" +peer0.org1.example.com | "2019-04-22 06:17:45.131 UTC [msp] GetManagerForChain -> DEBU 32c3 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:45.132 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c4 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:45.132 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c5 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:45.132 UTC [msp.identity] Verify -> DEBU 32c6 Verify: digest = 00000000 48 8d bd 48 0c 7c ca e2 08 87 5c 32 af 4e e3 c5 |H..H.|....\2.N..| +peer0.org1.example.com | 00000010 bb b1 a5 1f 70 06 8e 72 99 02 e4 10 7c 98 c6 2e |....p..r....|...|" +peer0.org1.example.com | "2019-04-22 06:17:45.133 UTC [msp.identity] Verify -> DEBU 32c7 Verify: sig = 00000000 30 45 02 21 00 90 08 0c 73 59 fc ff da 6e 8f f2 |0E.!....sY...n..| +peer0.org1.example.com | 00000010 40 56 fe 2e 8d 7e 9f 7a ee 87 d3 6c 8e 9d a1 c3 |@V...~.z...l....| +peer0.org1.example.com | 00000020 ca 6c 03 e5 fa 02 20 00 c6 c0 c6 15 55 e1 47 3e |.l.... .....U.G>| +peer0.org1.example.com | 00000030 a7 41 71 4f ae bf 1a cd 91 6d d6 c4 f4 65 06 4f |.AqO.....m...e.O| +peer0.org1.example.com | 00000040 87 e3 04 18 9f 65 ab |.....e.|" +peer0.org1.example.com | "2019-04-22 06:17:45.134 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c8 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:45.134 UTC [protoutils] validateEndorserTransaction -> DEBU 32c9 validateEndorserTransaction starts for data 0xc002579000, header channel_header:"\010\003\032\013\010\207\271\365\345\005\020\264\332\266\025\"\017businesschannel*@1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\327\302!\223;\212\321\332\244L&\305h\270\003\001c\204\360g\031\347\326\254" " +peer0.org1.example.com | "2019-04-22 06:17:45.135 UTC [protoutils] validateEndorserTransaction -> DEBU 32ca validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-04-22 06:17:45.136 UTC [protoutils] validateEndorserTransaction -> DEBU 32cc validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-04-22 06:17:45.135 UTC [msp] DeserializeIdentity -> DEBU 32cb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.137 UTC [msp] DeserializeIdentity -> DEBU 32cd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.138 UTC [msp] DeserializeIdentity -> DEBU 32ce Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.139 UTC [msp] DeserializeIdentity -> DEBU 32cf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.140 UTC [gossip.comm] Send -> DEBU 32d0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:45.140 UTC [msp] DeserializeIdentity -> DEBU 32d1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.141 UTC [msp] DeserializeIdentity -> DEBU 32d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.141 UTC [gossip.comm] sendToEndpoint -> DEBU 32d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:45.141 UTC [gossip.comm] sendToEndpoint -> DEBU 32d4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:45.136 UTC [protoutils] ValidateTransaction -> DEBU 32d5 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-04-22 06:17:45.143 UTC [committer.txvalidator] validateTx -> DEBU 32d6 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.144 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 32d7 retrieveTransactionByID() - txId = [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +peer0.org1.example.com | "2019-04-22 06:17:45.144 UTC [committer.txvalidator] validateTx -> DEBU 32d8 Validating transaction with plugins" +peer0.org1.example.com | "2019-04-22 06:17:45.145 UTC [committer.txvalidator] Dispatch -> DEBU 32d9 [businesschannel] Dispatch starts for bytes 0xc0002f4c00" +peer0.org1.example.com | "2019-04-22 06:17:45.146 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 32da constructing new query executor txid = [33c74b9d-ce34-44a8-9f39-9e166e187c5c]" +peer0.org1.example.com | "2019-04-22 06:17:45.146 UTC [stateleveldb] GetState -> DEBU 32db GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-04-22 06:17:45.147 UTC [stateleveldb] GetState -> DEBU 32dc GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.148 UTC [stateleveldb] GetState -> DEBU 32dd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-04-22 06:17:45.149 UTC [stateleveldb] GetState -> DEBU 32de GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-04-22 06:17:45.149 UTC [stateleveldb] GetState -> DEBU 32df GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-04-22 06:17:45.150 UTC [lockbasedtxmgr] Done -> DEBU 32e0 Done with transaction simulation / query execution [33c74b9d-ce34-44a8-9f39-9e166e187c5c]" +peer0.org1.example.com | "2019-04-22 06:17:45.151 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 32e1 Validating Tx 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-04-22 06:17:45.151 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 32e2 constructing new query executor txid = [e3d4b353-13a3-4ccd-86ee-6f9036430864]" +peer0.org1.example.com | "2019-04-22 06:17:45.152 UTC [lockbasedtxmgr] Done -> DEBU 32e3 Done with transaction simulation / query execution [e3d4b353-13a3-4ccd-86ee-6f9036430864]" +peer0.org1.example.com | "2019-04-22 06:17:45.152 UTC [cauthdsl] func1 -> DEBU 32e4 0xc003052790 gate 1555913865152586900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:45.152 UTC [cauthdsl] func2 -> DEBU 32e5 0xc003052790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:45.153 UTC [cauthdsl] func2 -> DEBU 32e6 0xc003052790 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:45.153 UTC [cauthdsl] func2 -> DEBU 32e7 0xc003052790 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.154 UTC [msp.identity] Verify -> DEBU 32e8 Verify: digest = 00000000 ba ab f0 cc c0 99 84 75 5c 15 83 22 50 2d f7 c5 |.......u\.."P-..| +peer0.org1.example.com | 00000010 bc c3 bd 0f 11 6f 06 00 a1 72 15 22 55 53 bb 78 |.....o...r."US.x|" +peer0.org1.example.com | "2019-04-22 06:17:45.154 UTC [msp.identity] Verify -> DEBU 32e9 Verify: sig = 00000000 30 45 02 21 00 e7 f4 08 1f 14 0f af 93 a5 f7 5d |0E.!...........]| +peer0.org1.example.com | 00000010 42 72 63 5e 32 ab 98 99 c0 e3 d1 17 04 2c c3 9b |Brc^2........,..| +peer0.org1.example.com | 00000020 d4 5e 39 a2 a8 02 20 70 b5 af 86 df bc 3d 27 2a |.^9... p.....='*| +peer0.org1.example.com | 00000030 e9 78 5d 94 b4 ae 88 62 de 6e de cf 0b 42 f5 9d |.x]....b.n...B..| +peer0.org1.example.com | 00000040 96 43 e6 c2 e0 04 ed |.C.....|" +peer0.org1.example.com | "2019-04-22 06:17:45.155 UTC [cauthdsl] func2 -> DEBU 32ea 0xc003052790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.155 UTC [cauthdsl] func2 -> DEBU 32eb 0xc003052790 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-04-22 06:17:45.155 UTC [cauthdsl] func2 -> DEBU 32ec 0xc003052790 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-04-22 06:17:45.156 UTC [cauthdsl] func2 -> DEBU 32ed 0xc003052790 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:45.156 UTC [cauthdsl] func1 -> DEBU 32ee 0xc003052790 gate 1555913865152586900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:45.157 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 32ef constructing new query executor txid = [10b45eeb-3cb4-4bcd-85cb-5f10fd22e108]" +peer0.org1.example.com | "2019-04-22 06:17:45.158 UTC [lockbasedtxmgr] Done -> DEBU 32f0 Done with transaction simulation / query execution [10b45eeb-3cb4-4bcd-85cb-5f10fd22e108]" +peer0.org1.example.com | "2019-04-22 06:17:45.159 UTC [vscc] Validate -> DEBU 32f1 block 7, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-04-22 06:17:45.159 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 32f2 Transaction 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a appears to be valid" +peer0.org1.example.com | "2019-04-22 06:17:45.159 UTC [committer.txvalidator] Dispatch -> DEBU 32f3 [businesschannel] Dispatch completes env bytes 0xc0002f4c00" +peer0.org1.example.com | "2019-04-22 06:17:45.160 UTC [committer.txvalidator] validateTx -> DEBU 32f4 [businesschannel] validateTx completes for block 0xc00335e600 env 0xc002490320 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:45.160 UTC [committer.txvalidator] Validate -> DEBU 32f5 got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:17:45.161 UTC [committer.txvalidator] Validate -> INFO 32f6 [businesschannel] Validated block [7] in 33ms" +peer0.org1.example.com | "2019-04-22 06:17:45.162 UTC [gossip.privdata] listMissingPrivateData -> DEBU 32f7 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:17:45.162 UTC [gossip.privdata] StoreBlock -> DEBU 32f8 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:17:45.163 UTC [kvledger] CommitWithPvtData -> DEBU 32f9 [businesschannel] Validating state for block [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.163 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 32fa Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:17:45.164 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 32fb lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:17:45.164 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 32fc Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:17:45.165 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 32fd ValidateAndPrepareBatch() for block number = [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.165 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 32fe preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:45.166 UTC [valimpl] preprocessProtoBlock -> DEBU 32ff txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-04-22 06:17:45.166 UTC [stateleveldb] GetState -> DEBU 3300 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.167 UTC [statebasedval] validateKVRead -> DEBU 3301 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:45.167 UTC [stateleveldb] GetState -> DEBU 3302 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:45.168 UTC [statebasedval] validateKVRead -> DEBU 3303 Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:45.168 UTC [stateleveldb] GetState -> DEBU 3304 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:45.169 UTC [statebasedval] validateKVRead -> DEBU 3305 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:45.169 UTC [stateleveldb] GetState -> DEBU 3306 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-04-22 06:17:45.170 UTC [statebasedval] validateKVRead -> DEBU 3307 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:45.171 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3308 Block [7] Transaction index [0] TxId [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-04-22 06:17:45.171 UTC [valinternal] ApplyWriteSet -> DEBU 3309 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0033e6380), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0033e63c0)}" +peer0.org1.example.com | "2019-04-22 06:17:45.172 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 330a validating rwset..." +peer0.org1.example.com | "2019-04-22 06:17:45.172 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 330b postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:45.172 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 330c ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:17:45.173 UTC [kvledger] CommitWithPvtData -> DEBU 330d [businesschannel] Committing block [7] to storage" +peer0.org1.example.com | "2019-04-22 06:17:45.174 UTC [ledgerstorage] CommitWithPvtData -> DEBU 330e Writing block [7] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:17:45.177 UTC [pvtdatastorage] Prepare -> DEBU 330f Saved 0 private data write sets for block [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.181 UTC [fsblkstorage] indexBlock -> DEBU 3310 Indexing block [blockNum=7, blockHash=[]byte{0xd7, 0x34, 0x1e, 0x62, 0x39, 0xbe, 0xee, 0x16, 0x6f, 0xda, 0xea, 0x22, 0xab, 0x75, 0xfa, 0xd, 0x35, 0x82, 0x21, 0x40, 0xe, 0x98, 0xb1, 0x94, 0xf5, 0x18, 0xa4, 0x3, 0xb3, 0x41, 0xea, 0x27} txOffsets= +peer0.org1.example.com | txId=1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a locPointer=offset=70, bytesLength=3044 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:17:45.181 UTC [fsblkstorage] indexBlock -> DEBU 3311 Adding txLoc [fileSuffixNum=0, offset=90642, bytesLength=3044] for tx ID: [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a] to txid-index" +peer0.org1.example.com | "2019-04-22 06:17:45.181 UTC [fsblkstorage] indexBlock -> DEBU 3312 Adding txLoc [fileSuffixNum=0, offset=90642, bytesLength=3044] for tx number:[0] ID: [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:17:45.184 UTC [fsblkstorage] updateCheckpoint -> DEBU 3313 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94623], isChainEmpty=[false], lastBlockNumber=[7]" +peer0.org1.example.com | "2019-04-22 06:17:45.184 UTC [pvtdatastorage] Commit -> DEBU 3314 Committing private data for block [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.187 UTC [pvtdatastorage] Commit -> DEBU 3315 Committed private data for block [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.188 UTC [kvledger] CommitWithPvtData -> DEBU 3316 [businesschannel] Committing block [7] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:17:45.188 UTC [lockbasedtxmgr] Commit -> DEBU 3317 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:45.189 UTC [lockbasedtxmgr] Commit -> DEBU 3318 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:45.190 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3319 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:17:45.190 UTC [lockbasedtxmgr] Commit -> DEBU 331a Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:45.191 UTC [stateleveldb] ApplyUpdates -> DEBU 331b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-04-22 06:17:45.191 UTC [stateleveldb] ApplyUpdates -> DEBU 331c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-04-22 06:17:45.193 UTC [lockbasedtxmgr] Commit -> DEBU 331d Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:17:45.194 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 331e Preparing potential purge list working-set for expiringAtBlk [8]" +peer0.org1.example.com | "2019-04-22 06:17:45.195 UTC [leveldbhelper] GetIterator -> DEBU 3320 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:17:45.194 UTC [lockbasedtxmgr] func1 -> DEBU 331f launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:17:45.196 UTC [kvledger] CommitWithPvtData -> DEBU 3321 [businesschannel] Committing block [7] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:17:45.196 UTC [historyleveldb] Commit -> DEBU 3322 Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:17:45.195 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3323 No expiry entry found for expiringAtBlk [8]" +peer0.org1.example.com | "2019-04-22 06:17:45.201 UTC [historyleveldb] Commit -> DEBU 3324 Channel [businesschannel]: Updates committed to history database for blockNo [7]" +peer0.org1.example.com | "2019-04-22 06:17:45.201 UTC [kvledger] CommitWithPvtData -> INFO 3325 [businesschannel] Committed block [7] with 1 transaction(s) in 38ms (state_validation=9ms block_commit=14ms state_commit=7ms)" +peer0.org1.example.com | "2019-04-22 06:17:45.203 UTC [msp.identity] Sign -> DEBU 3326 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020808 " +peer0.org1.example.com | "2019-04-22 06:17:45.203 UTC [msp.identity] Sign -> DEBU 3327 Sign: digest: 185FBEDF2C9CB0967553BB6D6B9BE4BB7F0BBCEA20A00FB90F6D5E49418CC391 " +peer0.org1.example.com | "2019-04-22 06:17:45.204 UTC [gossip.state] commitBlock -> DEBU 3328 [businesschannel] Committed block [7] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:17:45.531 UTC [endorser] ProcessProposal -> DEBU 3329 Entering: request from 192.168.224.9:49310" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [protoutils] ValidateProposalMessage -> DEBU 332a ValidateProposalMessage starts for signed proposal 0xc0024ca5a0" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [protoutils] validateChannelHeader -> DEBU 332b validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [protoutils] checkSignatureFromCreator -> DEBU 332c begin" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [msp] GetManagerForChain -> DEBU 332d Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [protoutils] checkSignatureFromCreator -> DEBU 332e creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [protoutils] checkSignatureFromCreator -> DEBU 332f creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [msp.identity] Verify -> DEBU 3330 Verify: digest = 00000000 e9 d0 2d a9 64 8d 19 ab 19 79 e8 d8 b2 e2 33 64 |..-.d....y....3d| +peer0.org1.example.com | 00000010 1b 8b b1 ed a3 f7 91 63 6b 65 f3 73 4d 35 ba fc |.......cke.sM5..|" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [msp.identity] Verify -> DEBU 3331 Verify: sig = 00000000 30 44 02 20 6a 3e ed a1 f4 c2 76 49 1e d1 b7 33 |0D. j>....vI...3| +peer0.org1.example.com | 00000010 db f9 b4 86 85 9d 1b b0 ea 34 b3 8d 34 0b c9 38 |.........4..4..8| +peer0.org1.example.com | 00000020 93 3c 49 41 02 20 02 c5 e4 c6 52 da 35 31 9c 4d |. DEBU 3332 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3333 validateChaincodeProposalMessage starts for proposal 0xc002f4a540, header 0xc0024ca9b0" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3334 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [endorser] preProcess -> DEBU 3335 [businesschannel][0c0932d9] processing txid: 0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3336 retrieveTransactionByID() - txId = [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [aclmgmt] CheckACL -> DEBU 3337 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [aclmgmt] CheckACL -> DEBU 3338 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:45.532 UTC [policies] Evaluate -> DEBU 3339 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 333a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 333b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [cauthdsl] func1 -> DEBU 333c 0xc003069ea0 gate 1555913865533115100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [cauthdsl] func2 -> DEBU 333d 0xc003069ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [cauthdsl] func2 -> DEBU 333e 0xc003069ea0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [cauthdsl] func2 -> DEBU 333f 0xc003069ea0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [msp.identity] Verify -> DEBU 3340 Verify: digest = 00000000 e9 d0 2d a9 64 8d 19 ab 19 79 e8 d8 b2 e2 33 64 |..-.d....y....3d| +peer0.org1.example.com | 00000010 1b 8b b1 ed a3 f7 91 63 6b 65 f3 73 4d 35 ba fc |.......cke.sM5..|" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [msp.identity] Verify -> DEBU 3341 Verify: sig = 00000000 30 44 02 20 6a 3e ed a1 f4 c2 76 49 1e d1 b7 33 |0D. j>....vI...3| +peer0.org1.example.com | 00000010 db f9 b4 86 85 9d 1b b0 ea 34 b3 8d 34 0b c9 38 |.........4..4..8| +peer0.org1.example.com | 00000020 93 3c 49 41 02 20 02 c5 e4 c6 52 da 35 31 9c 4d |. DEBU 3342 0xc003069ea0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [cauthdsl] func1 -> DEBU 3343 0xc003069ea0 gate 1555913865533115100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3344 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3345 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3346 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3347 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3348 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:45.533 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3349 constructing new tx simulator txid = [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +peer0.org1.example.com | "2019-04-22 06:17:45.534 UTC [endorser] SimulateProposal -> DEBU 334a [businesschannel][0c0932d9] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.534 UTC [stateleveldb] GetState -> DEBU 334b GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.534 UTC [endorser] callChaincode -> INFO 334c [businesschannel][0c0932d9] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.534 UTC [stateleveldb] GetState -> DEBU 334d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.534 UTC [stateleveldb] GetState -> DEBU 334e GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:45.534 UTC [chaincode] Execute -> DEBU 334f Entry" +peer0.org1.example.com | "2019-04-22 06:17:45.538 UTC [chaincode] handleMessage -> DEBU 3350 [0c0932d9] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.538 UTC [chaincode] HandleTransaction -> DEBU 3351 [0c0932d9] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:45.538 UTC [chaincode] HandleGetState -> DEBU 3352 [0c0932d9] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.538 UTC [stateleveldb] GetState -> DEBU 3353 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:45.538 UTC [chaincode] HandleTransaction -> DEBU 3354 [0c0932d9] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:45.540 UTC [chaincode] handleMessage -> DEBU 3355 [0c0932d9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.540 UTC [chaincode] Notify -> DEBU 3356 [0c0932d9] notifying Txid:0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.540 UTC [chaincode] Execute -> DEBU 3357 Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.540 UTC [endorser] callChaincode -> INFO 3358 [businesschannel][0c0932d9] Exit chaincode: name:"exp02" (6ms)" +peer0.org1.example.com | "2019-04-22 06:17:45.540 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3359 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:45.540 UTC [lockbasedtxmgr] Done -> DEBU 335a Done with transaction simulation / query execution [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +peer0.org1.example.com | "2019-04-22 06:17:45.540 UTC [endorser] SimulateProposal -> DEBU 335b [businesschannel][0c0932d9] Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [endorser] endorseProposal -> DEBU 335c [businesschannel][0c0932d9] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [endorser] endorseProposal -> DEBU 335d [businesschannel][0c0932d9] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [endorser] EndorseWithPlugin -> DEBU 335e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [msp.identity] Sign -> DEBU 335f Sign: plaintext: 0A2039BE34286EA67528832DC6CFEEE8...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [msp.identity] Sign -> DEBU 3360 Sign: digest: 4A21B99832B2AE5FBF7841741A20DDDB7548358CD960EE16CB0F3B7AEBCD9472 " +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [endorser] EndorseWithPlugin -> DEBU 3361 Exiting {plugin: escc, channel: businesschannel, tx: 0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [endorser] endorseProposal -> DEBU 3362 [businesschannel][0c0932d9] Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [lockbasedtxmgr] Done -> DEBU 3363 Done with transaction simulation / query execution [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [endorser] func1 -> DEBU 3364 Exit: request from 192.168.224.9:49310" +peer0.org1.example.com | "2019-04-22 06:17:45.541 UTC [comm.grpc.server] 1 -> INFO 3365 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49310 grpc.code=OK grpc.call_duration=10.26ms +peer0.org1.example.com | "2019-04-22 06:17:45.545 UTC [grpc] infof -> DEBU 3366 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:45.545 UTC [grpc] infof -> DEBU 3367 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:45.732 UTC [endorser] ProcessProposal -> DEBU 3368 Entering: request from 192.168.224.9:49314" +peer0.org1.example.com | "2019-04-22 06:17:45.732 UTC [protoutils] ValidateProposalMessage -> DEBU 3369 ValidateProposalMessage starts for signed proposal 0xc0024cb630" +peer0.org1.example.com | "2019-04-22 06:17:45.732 UTC [protoutils] validateChannelHeader -> DEBU 336a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:45.733 UTC [protoutils] checkSignatureFromCreator -> DEBU 336b begin" +peer0.org1.example.com | "2019-04-22 06:17:45.733 UTC [msp] GetManagerForChain -> DEBU 336c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:45.734 UTC [protoutils] checkSignatureFromCreator -> DEBU 336d creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-04-22 06:17:45.734 UTC [protoutils] checkSignatureFromCreator -> DEBU 336e creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:45.734 UTC [msp.identity] Verify -> DEBU 336f Verify: digest = 00000000 11 4f eb 7d 45 0d 83 ba 52 c4 ee 39 4d e7 9e cc |.O.}E...R..9M...| +peer0.org1.example.com | 00000010 d7 99 3b 71 57 5f ec db eb 73 4a 4e 6b bd f8 2f |..;qW_...sJNk../|" +peer0.org1.example.com | "2019-04-22 06:17:45.735 UTC [msp.identity] Verify -> DEBU 3370 Verify: sig = 00000000 30 45 02 21 00 a4 7c 30 ef 94 45 de ba c2 94 1d |0E.!..|0..E.....| +peer0.org1.example.com | 00000010 d9 9f 6a 16 10 fe 16 ab ca b9 e4 88 af f9 32 28 |..j...........2(| +peer0.org1.example.com | 00000020 ea 90 9c db bb 02 20 09 ac 89 a6 1b b3 f1 aa 6e |...... ........n| +peer0.org1.example.com | 00000030 19 7e 3b 46 70 99 a6 62 3a 1d fa c9 a4 41 b5 16 |.~;Fp..b:....A..| +peer0.org1.example.com | 00000040 f3 41 6b 2b 92 31 82 |.Ak+.1.|" +peer0.org1.example.com | "2019-04-22 06:17:45.735 UTC [protoutils] checkSignatureFromCreator -> DEBU 3371 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:45.736 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3372 validateChaincodeProposalMessage starts for proposal 0xc002f4af50, header 0xc0024cbae0" +peer0.org1.example.com | "2019-04-22 06:17:45.736 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3373 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.737 UTC [endorser] preProcess -> DEBU 3374 [businesschannel][8d9f968d] processing txid: 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff" +peer0.org1.example.com | "2019-04-22 06:17:45.737 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3375 retrieveTransactionByID() - txId = [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +peer0.org1.example.com | "2019-04-22 06:17:45.738 UTC [aclmgmt] CheckACL -> DEBU 3376 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:45.738 UTC [aclmgmt] CheckACL -> DEBU 3377 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:45.740 UTC [policies] Evaluate -> DEBU 3378 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.740 UTC [policies] Evaluate -> DEBU 3379 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:45.741 UTC [policies] Evaluate -> DEBU 337a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.741 UTC [cauthdsl] func1 -> DEBU 337b 0xc00311d690 gate 1555913865741407200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 337c 0xc00311d690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 337d 0xc00311d690 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 337e 0xc00311d690 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [msp.identity] Verify -> DEBU 337f Verify: digest = 00000000 11 4f eb 7d 45 0d 83 ba 52 c4 ee 39 4d e7 9e cc |.O.}E...R..9M...| +peer0.org1.example.com | 00000010 d7 99 3b 71 57 5f ec db eb 73 4a 4e 6b bd f8 2f |..;qW_...sJNk../|" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [msp.identity] Verify -> DEBU 3380 Verify: sig = 00000000 30 45 02 21 00 a4 7c 30 ef 94 45 de ba c2 94 1d |0E.!..|0..E.....| +peer0.org1.example.com | 00000010 d9 9f 6a 16 10 fe 16 ab ca b9 e4 88 af f9 32 28 |..j...........2(| +peer0.org1.example.com | 00000020 ea 90 9c db bb 02 20 09 ac 89 a6 1b b3 f1 aa 6e |...... ........n| +peer0.org1.example.com | 00000030 19 7e 3b 46 70 99 a6 62 3a 1d fa c9 a4 41 b5 16 |.~;Fp..b:....A..| +peer0.org1.example.com | 00000040 f3 41 6b 2b 92 31 82 |.Ak+.1.|" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 3381 0xc00311d690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [cauthdsl] func1 -> DEBU 3382 0xc00311d690 gate 1555913865741407200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [policies] Evaluate -> DEBU 3383 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.742 UTC [policies] Evaluate -> DEBU 3384 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [policies] Evaluate -> DEBU 3385 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [policies] Evaluate -> DEBU 3386 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3387 constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3388 constructing new tx simulator txid = [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [endorser] SimulateProposal -> DEBU 3389 [businesschannel][8d9f968d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [stateleveldb] GetState -> DEBU 338a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [endorser] callChaincode -> INFO 338b [businesschannel][8d9f968d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [stateleveldb] GetState -> DEBU 338c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [stateleveldb] GetState -> DEBU 338d GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:45.743 UTC [chaincode] Execute -> DEBU 338e Entry" +peer0.org1.example.com | "2019-04-22 06:17:45.744 UTC [chaincode] handleMessage -> DEBU 338f [8d9f968d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.744 UTC [chaincode] HandleTransaction -> DEBU 3390 [8d9f968d] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:45.744 UTC [chaincode] HandleGetState -> DEBU 3391 [8d9f968d] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.744 UTC [stateleveldb] GetState -> DEBU 3392 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:45.744 UTC [chaincode] HandleTransaction -> DEBU 3393 [8d9f968d] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:45.745 UTC [chaincode] handleMessage -> DEBU 3394 [8d9f968d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.745 UTC [chaincode] HandleTransaction -> DEBU 3395 [8d9f968d] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:45.745 UTC [chaincode] HandleGetState -> DEBU 3396 [8d9f968d] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.745 UTC [stateleveldb] GetState -> DEBU 3397 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-04-22 06:17:45.746 UTC [chaincode] HandleTransaction -> DEBU 3398 [8d9f968d] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:45.746 UTC [chaincode] handleMessage -> DEBU 3399 [8d9f968d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.747 UTC [chaincode] HandleTransaction -> DEBU 339a [8d9f968d] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:45.748 UTC [chaincode] HandleTransaction -> DEBU 339b [8d9f968d] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:45.749 UTC [chaincode] handleMessage -> DEBU 339c [8d9f968d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.749 UTC [chaincode] HandleTransaction -> DEBU 339d [8d9f968d] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:45.750 UTC [chaincode] HandleTransaction -> DEBU 339e [8d9f968d] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:45.750 UTC [chaincode] handleMessage -> DEBU 339f [8d9f968d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.750 UTC [chaincode] Notify -> DEBU 33a0 [8d9f968d] notifying Txid:8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.750 UTC [chaincode] Execute -> DEBU 33a1 Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.750 UTC [endorser] callChaincode -> INFO 33a2 [businesschannel][8d9f968d] Exit chaincode: name:"exp02" (7ms)" +peer0.org1.example.com | "2019-04-22 06:17:45.750 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 33a3 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:45.750 UTC [lockbasedtxmgr] Done -> DEBU 33a4 Done with transaction simulation / query execution [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [endorser] SimulateProposal -> DEBU 33a5 [businesschannel][8d9f968d] Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [endorser] endorseProposal -> DEBU 33a6 [businesschannel][8d9f968d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [endorser] endorseProposal -> DEBU 33a7 [businesschannel][8d9f968d] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [endorser] EndorseWithPlugin -> DEBU 33a8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [msp.identity] Sign -> DEBU 33a9 Sign: plaintext: 0A20A03153EAD516AABDE9D71F0BFE42...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [msp.identity] Sign -> DEBU 33aa Sign: digest: F10D3F5688393771B821297F88C7FAB3D5AF400E4D667BCF8C177F74E2145803 " +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [endorser] EndorseWithPlugin -> DEBU 33ab Exiting {plugin: escc, channel: businesschannel, tx: 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [endorser] endorseProposal -> DEBU 33ac [businesschannel][8d9f968d] Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [lockbasedtxmgr] Done -> DEBU 33ad Done with transaction simulation / query execution [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [endorser] func1 -> DEBU 33ae Exit: request from 192.168.224.9:49314" +peer0.org1.example.com | "2019-04-22 06:17:45.751 UTC [comm.grpc.server] 1 -> INFO 33af unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49314 grpc.code=OK grpc.call_duration=19.7693ms +peer0.org1.example.com | "2019-04-22 06:17:45.768 UTC [grpc] warningf -> DEBU 33b0 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49314: read: connection reset by peer" +peer0.org1.example.com | "2019-04-22 06:17:45.768 UTC [grpc] infof -> DEBU 33b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:45.768 UTC [grpc] infof -> DEBU 33b2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:45.806 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 33b3 Sleeping 25s" +peer0.org1.example.com | "2019-04-22 06:17:45.836 UTC [msp.identity] Sign -> DEBU 33b4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102B " +peer0.org1.example.com | "2019-04-22 06:17:45.837 UTC [msp.identity] Sign -> DEBU 33b5 Sign: digest: BC6BAF102A835524E730545EA07764ED5AE5673EF8D95E5D3069464F2F015B30 " +peer0.org1.example.com | "2019-04-22 06:17:45.838 UTC [msp.identity] Sign -> DEBU 33b6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:45.838 UTC [msp.identity] Sign -> DEBU 33b7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:45.838 UTC [gossip.discovery] periodicalSendAlive -> DEBU 33b8 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:45.843 UTC [msp] DeserializeIdentity -> DEBU 33b9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.844 UTC [msp] DeserializeIdentity -> DEBU 33ba Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.844 UTC [msp] DeserializeIdentity -> DEBU 33bb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.844 UTC [gossip.comm] Send -> DEBU 33bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:45.845 UTC [gossip.comm] sendToEndpoint -> DEBU 33bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:45.845 UTC [gossip.comm] sendToEndpoint -> DEBU 33be Exiting" +peer0.org1.example.com | "2019-04-22 06:17:45.846 UTC [gossip.comm] Send -> DEBU 33bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:45.847 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:45.847 UTC [gossip.comm] Send -> DEBU 33c2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:45.848 UTC [gossip.comm] sendToEndpoint -> DEBU 33c3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:45.848 UTC [gossip.comm] sendToEndpoint -> DEBU 33c4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:45.847 UTC [gossip.comm] sendToEndpoint -> DEBU 33c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:45.849 UTC [gossip.comm] sendToEndpoint -> DEBU 33c5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:45.952 UTC [endorser] ProcessProposal -> DEBU 33c6 Entering: request from 192.168.224.9:49320" +peer0.org1.example.com | "2019-04-22 06:17:45.953 UTC [protoutils] ValidateProposalMessage -> DEBU 33c7 ValidateProposalMessage starts for signed proposal 0xc0025ba5a0" +peer0.org1.example.com | "2019-04-22 06:17:45.953 UTC [protoutils] validateChannelHeader -> DEBU 33c8 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:45.954 UTC [protoutils] checkSignatureFromCreator -> DEBU 33c9 begin" +peer0.org1.example.com | "2019-04-22 06:17:45.954 UTC [msp] GetManagerForChain -> DEBU 33ca Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:45.955 UTC [protoutils] checkSignatureFromCreator -> DEBU 33cb creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:45.955 UTC [protoutils] checkSignatureFromCreator -> DEBU 33cc creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:45.955 UTC [msp.identity] Verify -> DEBU 33cd Verify: digest = 00000000 42 42 78 03 07 fc 59 4d d4 4e 27 d4 95 0a 6e b6 |BBx...YM.N'...n.| +peer0.org1.example.com | 00000010 90 71 93 50 b1 f5 2f 19 65 a8 12 0e 71 5a ad 17 |.q.P../.e...qZ..|" +peer0.org1.example.com | "2019-04-22 06:17:45.956 UTC [msp.identity] Verify -> DEBU 33ce Verify: sig = 00000000 30 44 02 20 33 32 f8 90 d0 85 d4 4a f4 4e a9 6a |0D. 32.....J.N.j| +peer0.org1.example.com | 00000010 d5 b7 c1 32 bb 0a 9a b2 5b 17 24 fe a5 b4 6e 13 |...2....[.$...n.| +peer0.org1.example.com | 00000020 d6 be c6 91 02 20 71 ca 9b 81 ca 39 73 d6 fb 43 |..... q....9s..C| +peer0.org1.example.com | 00000030 09 1b 49 79 ce 5a c8 eb 25 d9 07 5f 41 19 57 52 |..Iy.Z..%.._A.WR| +peer0.org1.example.com | 00000040 ac 8d 0f 4b 0e 51 |...K.Q|" +peer0.org1.example.com | "2019-04-22 06:17:45.956 UTC [protoutils] checkSignatureFromCreator -> DEBU 33cf exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:45.957 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33d0 validateChaincodeProposalMessage starts for proposal 0xc00277ba40, header 0xc0025baaa0" +peer0.org1.example.com | "2019-04-22 06:17:45.957 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33d1 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.958 UTC [endorser] preProcess -> DEBU 33d2 [businesschannel][712f3a97] processing txid: 712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064" +peer0.org1.example.com | "2019-04-22 06:17:45.958 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 33d3 retrieveTransactionByID() - txId = [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +peer0.org1.example.com | "2019-04-22 06:17:45.958 UTC [aclmgmt] CheckACL -> DEBU 33d4 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:45.959 UTC [aclmgmt] CheckACL -> DEBU 33d5 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:45.959 UTC [policies] Evaluate -> DEBU 33d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.960 UTC [policies] Evaluate -> DEBU 33d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:45.960 UTC [policies] Evaluate -> DEBU 33d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.960 UTC [cauthdsl] func1 -> DEBU 33d9 0xc0033b0120 gate 1555913865960587800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:45.960 UTC [cauthdsl] func2 -> DEBU 33da 0xc0033b0120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:45.961 UTC [cauthdsl] func2 -> DEBU 33db 0xc0033b0120 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:45.961 UTC [cauthdsl] func2 -> DEBU 33dc 0xc0033b0120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:45.961 UTC [cauthdsl] func2 -> DEBU 33dd 0xc0033b0120 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:45.962 UTC [cauthdsl] func1 -> DEBU 33de 0xc0033b0120 gate 1555913865960587800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:45.962 UTC [policies] Evaluate -> DEBU 33df Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.962 UTC [policies] Evaluate -> DEBU 33e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.963 UTC [policies] Evaluate -> DEBU 33e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:45.963 UTC [cauthdsl] func1 -> DEBU 33e2 0xc0033b09a0 gate 1555913865963453200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:45.963 UTC [cauthdsl] func2 -> DEBU 33e3 0xc0033b09a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:45.964 UTC [cauthdsl] func2 -> DEBU 33e4 0xc0033b09a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:45.964 UTC [cauthdsl] func2 -> DEBU 33e5 0xc0033b09a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.964 UTC [msp.identity] Verify -> DEBU 33e6 Verify: digest = 00000000 42 42 78 03 07 fc 59 4d d4 4e 27 d4 95 0a 6e b6 |BBx...YM.N'...n.| +peer0.org1.example.com | 00000010 90 71 93 50 b1 f5 2f 19 65 a8 12 0e 71 5a ad 17 |.q.P../.e...qZ..|" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [msp.identity] Verify -> DEBU 33e7 Verify: sig = 00000000 30 44 02 20 33 32 f8 90 d0 85 d4 4a f4 4e a9 6a |0D. 32.....J.N.j| +peer0.org1.example.com | 00000010 d5 b7 c1 32 bb 0a 9a b2 5b 17 24 fe a5 b4 6e 13 |...2....[.$...n.| +peer0.org1.example.com | 00000020 d6 be c6 91 02 20 71 ca 9b 81 ca 39 73 d6 fb 43 |..... q....9s..C| +peer0.org1.example.com | 00000030 09 1b 49 79 ce 5a c8 eb 25 d9 07 5f 41 19 57 52 |..Iy.Z..%.._A.WR| +peer0.org1.example.com | 00000040 ac 8d 0f 4b 0e 51 |...K.Q|" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [cauthdsl] func2 -> DEBU 33e8 0xc0033b09a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [cauthdsl] func1 -> DEBU 33e9 0xc0033b09a0 gate 1555913865963453200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33ea Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33ec Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 33ee constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 33ef constructing new tx simulator txid = [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [endorser] SimulateProposal -> DEBU 33f0 [businesschannel][712f3a97] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [stateleveldb] GetState -> DEBU 33f1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [endorser] callChaincode -> INFO 33f2 [businesschannel][712f3a97] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [stateleveldb] GetState -> DEBU 33f3 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [stateleveldb] GetState -> DEBU 33f4 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:45.965 UTC [chaincode] Execute -> DEBU 33f5 Entry" +peer0.org1.example.com | "2019-04-22 06:17:45.967 UTC [chaincode] handleMessage -> DEBU 33f6 [712f3a97] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.968 UTC [chaincode] HandleTransaction -> DEBU 33f7 [712f3a97] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:45.968 UTC [chaincode] HandleGetState -> DEBU 33f8 [712f3a97] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.969 UTC [stateleveldb] GetState -> DEBU 33f9 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:45.969 UTC [chaincode] HandleTransaction -> DEBU 33fa [712f3a97] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:45.971 UTC [chaincode] handleMessage -> DEBU 33fb [712f3a97] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:45.971 UTC [chaincode] Notify -> DEBU 33fc [712f3a97] notifying Txid:712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:45.971 UTC [chaincode] Execute -> DEBU 33fd Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.971 UTC [endorser] callChaincode -> INFO 33fe [businesschannel][712f3a97] Exit chaincode: name:"exp02" (6ms)" +peer0.org1.example.com | "2019-04-22 06:17:45.972 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 33ff Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:45.972 UTC [lockbasedtxmgr] Done -> DEBU 3400 Done with transaction simulation / query execution [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +peer0.org1.example.com | "2019-04-22 06:17:45.972 UTC [endorser] SimulateProposal -> DEBU 3401 [businesschannel][712f3a97] Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.973 UTC [endorser] endorseProposal -> DEBU 3402 [businesschannel][712f3a97] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:45.973 UTC [endorser] endorseProposal -> DEBU 3403 [businesschannel][712f3a97] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:45.973 UTC [endorser] EndorseWithPlugin -> DEBU 3404 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:45.973 UTC [msp.identity] Sign -> DEBU 3405 Sign: plaintext: 0A20CAAE120FBB15FA307BBA3E6F11AC...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:45.973 UTC [msp.identity] Sign -> DEBU 3406 Sign: digest: B35022629B1913E61011FA4DFF6C94D3781B2EDC504A32BF9364B92CCC3CD1FC " +peer0.org1.example.com | "2019-04-22 06:17:45.974 UTC [endorser] EndorseWithPlugin -> DEBU 3407 Exiting {plugin: escc, channel: businesschannel, tx: 712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:45.974 UTC [endorser] endorseProposal -> DEBU 3408 [businesschannel][712f3a97] Exit" +peer0.org1.example.com | "2019-04-22 06:17:45.974 UTC [lockbasedtxmgr] Done -> DEBU 3409 Done with transaction simulation / query execution [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +peer0.org1.example.com | "2019-04-22 06:17:45.974 UTC [endorser] func1 -> DEBU 340a Exit: request from 192.168.224.9:49320" +peer0.org1.example.com | "2019-04-22 06:17:45.974 UTC [comm.grpc.server] 1 -> INFO 340b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49320 grpc.code=OK grpc.call_duration=21.6968ms +peer0.org1.example.com | "2019-04-22 06:17:45.979 UTC [grpc] infof -> DEBU 340c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:45.980 UTC [grpc] infof -> DEBU 340d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:46.116 UTC [gossip.comm] func1 -> DEBU 340e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.116 UTC [gossip.gossip] handleMessage -> DEBU 340f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.116 UTC [gossip.gossip] handleMessage -> DEBU 3410 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3411 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.116 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3412 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3413 Verify: digest = 00000000 05 c3 c7 b9 f0 f8 3c d5 39 65 1a b1 ed 64 b5 19 |......<.9e...d..| +peer0.org1.example.com | 00000010 43 d2 0a dd 0a bb 4a a9 24 86 ac 12 31 da 50 a7 |C.....J.$...1.P.|" +peer0.org1.example.com | "2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3414 Verify: sig = 00000000 30 44 02 20 4b c7 64 3d c4 62 c2 38 2a cc 6e 2f |0D. K.d=.b.8*.n/| +peer0.org1.example.com | 00000010 6b 42 a9 16 f8 10 28 92 2c 5a ee 78 65 3b 66 b7 |kB....(.,Z.xe;f.| +peer0.org1.example.com | 00000020 1f 6e c1 5d 02 20 10 7b 6a 49 58 a9 b1 c7 0e db |.n.]. .{jIX.....| +peer0.org1.example.com | 00000030 7d b5 0e 23 fb 7c ca 9f a9 47 7e 89 e0 a8 a0 77 |}..#.|...G~....w| +peer0.org1.example.com | 00000040 25 09 e4 5e 59 9d |%..^Y.|" +peer0.org1.example.com | "2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3415 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3416 Verify: sig = 00000000 30 45 02 21 00 85 d9 8b cb 67 35 71 fd 0d 28 d3 |0E.!.....g5q..(.| +peer0.org1.example.com | 00000010 5b 5c 45 74 70 6e 11 2f 6a 7d 4f 23 f4 5c 44 1f |[\Etpn./j}O#.\D.| +peer0.org1.example.com | 00000020 7b be 65 0e b7 02 20 3d 27 3a bd 86 cd 6b e5 b4 |{.e... =':...k..| +peer0.org1.example.com | 00000030 be 47 96 f3 62 39 57 b8 13 b2 32 6d 9c 96 28 11 |.G..b9W...2m..(.| +peer0.org1.example.com | 00000040 34 1c a8 8c e3 bb f8 |4......|" +peer0.org1.example.com | "2019-04-22 06:17:46.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3417 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3418 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3419 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 " +peer0.org1.example.com | "2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 341a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 " +peer0.org1.example.com | "2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 341b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 341c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.119 UTC [gossip.discovery] handleAliveMessage -> DEBU 341d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 341e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.125 UTC [msp] DeserializeIdentity -> DEBU 341f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.127 UTC [msp] DeserializeIdentity -> DEBU 3420 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.128 UTC [msp] DeserializeIdentity -> DEBU 3421 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.128 UTC [gossip.comm] Send -> DEBU 3422 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.129 UTC [msp] DeserializeIdentity -> DEBU 3423 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.129 UTC [gossip.comm] Send -> DEBU 3424 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3425 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3426 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3427 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3428 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.132 UTC [gossip.gossip] handleMessage -> DEBU 3429 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.132 UTC [gossip.gossip] handleMessage -> DEBU 342a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 342b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 342c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.133 UTC [gossip.comm] func1 -> DEBU 342d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.133 UTC [gossip.gossip] handleMessage -> DEBU 342e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.133 UTC [gossip.gossip] handleMessage -> DEBU 342f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3430 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3431 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.462 UTC [gossip.election] waitForInterrupt -> DEBU 3432 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.462 UTC [gossip.election] IsLeader -> DEBU 3433 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:46.463 UTC [msp.identity] Sign -> DEBU 3434 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100E1801 " +peer0.org1.example.com | "2019-04-22 06:17:46.463 UTC [msp.identity] Sign -> DEBU 3435 Sign: digest: FB461425A732562E10E66A946BC4934FDD4418C08235B9225556954F31EA9994 " +peer0.org1.example.com | "2019-04-22 06:17:46.464 UTC [gossip.election] waitForInterrupt -> DEBU 3436 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:46.466 UTC [msp] DeserializeIdentity -> DEBU 3437 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.466 UTC [msp] DeserializeIdentity -> DEBU 3438 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.467 UTC [msp] DeserializeIdentity -> DEBU 3439 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.467 UTC [msp] DeserializeIdentity -> DEBU 343a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.467 UTC [gossip.comm] Send -> DEBU 343b Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.468 UTC [msp] DeserializeIdentity -> DEBU 343c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.468 UTC [gossip.comm] sendToEndpoint -> DEBU 343d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.468 UTC [gossip.comm] sendToEndpoint -> DEBU 343e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.468 UTC [msp] DeserializeIdentity -> DEBU 343f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.611 UTC [gossip.comm] func1 -> DEBU 3440 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.611 UTC [gossip.gossip] handleMessage -> DEBU 3441 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.611 UTC [gossip.gossip] handleMessage -> DEBU 3442 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.612 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3443 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.612 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3444 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:46.612 UTC [msp] DeserializeIdentity -> DEBU 3445 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.612 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3446 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:46.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3447 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:46.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3448 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:46.613 UTC [policies] Evaluate -> DEBU 3449 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:46.613 UTC [policies] Evaluate -> DEBU 344a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:46.613 UTC [policies] Evaluate -> DEBU 344b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:46.613 UTC [cauthdsl] func1 -> DEBU 344c 0xc003641760 gate 1555913866613754300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:46.614 UTC [cauthdsl] func2 -> DEBU 344d 0xc003641760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:46.614 UTC [cauthdsl] func2 -> DEBU 344e 0xc003641760 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:46.614 UTC [cauthdsl] func2 -> DEBU 344f 0xc003641760 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:46.614 UTC [msp.identity] Verify -> DEBU 3450 Verify: digest = 00000000 1f 29 8b c3 95 7c cf df a5 50 4b dd 2c 8a 66 8e |.)...|...PK.,.f.| +peer0.org1.example.com | 00000010 f3 9f ee 64 a1 4f cc dd 13 ba bc 48 7d e4 1a 70 |...d.O.....H}..p|" +peer0.org1.example.com | "2019-04-22 06:17:46.614 UTC [msp.identity] Verify -> DEBU 3451 Verify: sig = 00000000 30 45 02 21 00 c6 e4 36 05 5c f1 c3 91 88 65 73 |0E.!...6.\....es| +peer0.org1.example.com | 00000010 06 29 42 f8 a2 54 32 9f 0c a3 30 0e c8 85 76 c5 |.)B..T2...0...v.| +peer0.org1.example.com | 00000020 0c 2a b6 b8 7b 02 20 07 5b 4e b0 84 25 50 7a 8a |.*..{. .[N..%Pz.| +peer0.org1.example.com | 00000030 40 05 bd 03 7f 96 2f b0 0e 47 fb 82 8d 5a 83 6b |@...../..G...Z.k| +peer0.org1.example.com | 00000040 46 37 43 33 6b e9 a7 |F7C3k..|" +peer0.org1.example.com | "2019-04-22 06:17:46.615 UTC [cauthdsl] func2 -> DEBU 3452 0xc003641760 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:46.615 UTC [cauthdsl] func1 -> DEBU 3453 0xc003641760 gate 1555913866613754300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3454 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3455 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3456 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3457 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.616 UTC [gossip.discovery] handleAliveMessage -> DEBU 3458 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 3459 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 345a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 " +peer0.org1.example.com | "2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 345b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 " +peer0.org1.example.com | "2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 345c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:46.617 UTC [gossip.discovery] learnExistingMembers -> DEBU 345d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.617 UTC [gossip.discovery] handleAliveMessage -> DEBU 345e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.617 UTC [gossip.discovery] handleMsgFromComm -> DEBU 345f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3460 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3461 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3462 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3463 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.621 UTC [msp] DeserializeIdentity -> DEBU 3464 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.621 UTC [msp] DeserializeIdentity -> DEBU 3465 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.621 UTC [msp] DeserializeIdentity -> DEBU 3466 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.621 UTC [gossip.comm] Send -> DEBU 3467 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.622 UTC [msp] DeserializeIdentity -> DEBU 3468 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.622 UTC [gossip.comm] Send -> DEBU 3469 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.622 UTC [gossip.comm] sendToEndpoint -> DEBU 346a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.623 UTC [gossip.comm] sendToEndpoint -> DEBU 346b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.623 UTC [gossip.comm] sendToEndpoint -> DEBU 346c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.623 UTC [gossip.comm] sendToEndpoint -> DEBU 346d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.626 UTC [gossip.comm] func1 -> DEBU 346e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.627 UTC [gossip.gossip] handleMessage -> DEBU 346f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.627 UTC [gossip.gossip] handleMessage -> DEBU 3470 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.627 UTC [gossip.gossip] handleMessage -> DEBU 3471 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3472 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3473 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3474 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3476 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.628 UTC [gossip.gossip] handleMessage -> DEBU 3475 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.889 UTC [gossip.pull] Hello -> DEBU 3477 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:46.889 UTC [gossip.comm] Send -> DEBU 3478 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.890 UTC [gossip.pull] Hello -> DEBU 3479 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:46.890 UTC [gossip.comm] Send -> DEBU 347a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.891 UTC [gossip.pull] Hello -> DEBU 347b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:46.891 UTC [gossip.comm] Send -> DEBU 347c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.891 UTC [gossip.comm] sendToEndpoint -> DEBU 347d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 347f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 3480 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 3481 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.891 UTC [gossip.comm] sendToEndpoint -> DEBU 347e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 3482 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.894 UTC [gossip.gossip] handleMessage -> DEBU 3483 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 930328961521754731 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.895 UTC [gossip.pull] HandleMessage -> DEBU 3484 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 930328961521754731 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.895 UTC [gossip.gossip] handleMessage -> DEBU 3485 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.895 UTC [gossip.comm] func1 -> DEBU 3486 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11920708010404410007 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.896 UTC [gossip.gossip] handleMessage -> DEBU 3487 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11920708010404410007 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.896 UTC [gossip.pull] HandleMessage -> DEBU 3488 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11920708010404410007 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.896 UTC [gossip.gossip] handleMessage -> DEBU 348a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.895 UTC [gossip.comm] func1 -> DEBU 3489 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11284758355672084754 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.896 UTC [gossip.gossip] handleMessage -> DEBU 348b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11284758355672084754 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.897 UTC [gossip.pull] HandleMessage -> DEBU 348c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11284758355672084754 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.897 UTC [gossip.gossip] handleMessage -> DEBU 348d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.940 UTC [msp.identity] Sign -> DEBU 348e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102C " +peer0.org1.example.com | "2019-04-22 06:17:46.940 UTC [msp.identity] Sign -> DEBU 348f Sign: digest: 3C12306F00110699A9FF86FF0777B77A3EB9CDC6E16C8B510661D8062E29B38F " +peer0.org1.example.com | "2019-04-22 06:17:46.940 UTC [msp.identity] Sign -> DEBU 3490 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:46.941 UTC [msp.identity] Sign -> DEBU 3491 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:46.941 UTC [msp] DeserializeIdentity -> DEBU 3492 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.941 UTC [gossip.comm] Send -> DEBU 3493 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.942 UTC [gossip.comm] Send -> DEBU 3494 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.942 UTC [msp] DeserializeIdentity -> DEBU 3495 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.943 UTC [gossip.comm] Send -> DEBU 3496 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:46.943 UTC [gossip.comm] sendToEndpoint -> DEBU 3497 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.944 UTC [gossip.comm] sendToEndpoint -> DEBU 3499 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.943 UTC [gossip.comm] sendToEndpoint -> DEBU 349a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.944 UTC [gossip.comm] sendToEndpoint -> DEBU 349b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.943 UTC [gossip.comm] sendToEndpoint -> DEBU 3498 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.945 UTC [gossip.comm] sendToEndpoint -> DEBU 349c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.950 UTC [gossip.gossip] handleMessage -> DEBU 349d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.951 UTC [gossip.gossip] handleMessage -> DEBU 349e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 349f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34a0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:46.951 UTC [msp.identity] Verify -> DEBU 34a1 Verify: digest = 00000000 3c 12 30 6f 00 11 06 99 a9 ff 86 ff 07 77 b7 7a |<.0o.........w.z| +peer0.org1.example.com | 00000010 3e b9 cd c6 e1 6c 8b 51 06 61 d8 06 2e 29 b3 8f |>....l.Q.a...)..|" +peer0.org1.example.com | "2019-04-22 06:17:46.951 UTC [msp.identity] Verify -> DEBU 34a2 Verify: sig = 00000000 30 45 02 21 00 93 70 8d a2 3e 0b 03 e0 09 6b 60 |0E.!..p..>....k`| +peer0.org1.example.com | 00000010 c0 2a a0 b5 0b 13 5f 2f d2 5b b3 cd 31 64 20 26 |.*...._/.[..1d &| +peer0.org1.example.com | 00000020 c0 2d 4d 65 e4 02 20 03 10 19 17 e9 0e 74 81 11 |.-Me.. ......t..| +peer0.org1.example.com | 00000030 27 33 1d 03 30 66 a4 4b 46 38 b8 45 8c 47 39 0c |'3..0f.KF8.E.G9.| +peer0.org1.example.com | 00000040 02 1b 93 76 5e ab af |...v^..|" +peer0.org1.example.com | "2019-04-22 06:17:46.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.952 UTC [gossip.discovery] isSentByMe -> DEBU 34a4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.953 UTC [gossip.comm] func1 -> DEBU 34a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.953 UTC [gossip.gossip] handleMessage -> DEBU 34a8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.953 UTC [gossip.gossip] handleMessage -> DEBU 34a9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34ab Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:46.954 UTC [msp.identity] Verify -> DEBU 34ac Verify: digest = 00000000 3c 12 30 6f 00 11 06 99 a9 ff 86 ff 07 77 b7 7a |<.0o.........w.z| +peer0.org1.example.com | 00000010 3e b9 cd c6 e1 6c 8b 51 06 61 d8 06 2e 29 b3 8f |>....l.Q.a...)..|" +peer0.org1.example.com | "2019-04-22 06:17:46.954 UTC [msp.identity] Verify -> DEBU 34ad Verify: sig = 00000000 30 45 02 21 00 93 70 8d a2 3e 0b 03 e0 09 6b 60 |0E.!..p..>....k`| +peer0.org1.example.com | 00000010 c0 2a a0 b5 0b 13 5f 2f d2 5b b3 cd 31 64 20 26 |.*...._/.[..1d &| +peer0.org1.example.com | 00000020 c0 2d 4d 65 e4 02 20 03 10 19 17 e9 0e 74 81 11 |.-Me.. ......t..| +peer0.org1.example.com | 00000030 27 33 1d 03 30 66 a4 4b 46 38 b8 45 8c 47 39 0c |'3..0f.KF8.E.G9.| +peer0.org1.example.com | 00000040 02 1b 93 76 5e ab af |...v^..|" +peer0.org1.example.com | "2019-04-22 06:17:46.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.958 UTC [gossip.discovery] isSentByMe -> DEBU 34af Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 34b0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.958 UTC [gossip.comm] func1 -> DEBU 34b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.958 UTC [gossip.gossip] handleMessage -> DEBU 34b2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34b3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:46.959 UTC [msp] DeserializeIdentity -> DEBU 34b4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:46.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:46.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:46.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:46.960 UTC [policies] Evaluate -> DEBU 34b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:46.960 UTC [policies] Evaluate -> DEBU 34b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:46.961 UTC [policies] Evaluate -> DEBU 34ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:46.961 UTC [cauthdsl] func1 -> DEBU 34bb 0xc0024c21c0 gate 1555913866961490200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:46.961 UTC [cauthdsl] func2 -> DEBU 34bc 0xc0024c21c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:46.962 UTC [cauthdsl] func2 -> DEBU 34bd 0xc0024c21c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:46.962 UTC [cauthdsl] func2 -> DEBU 34be 0xc0024c21c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:46.963 UTC [msp.identity] Verify -> DEBU 34bf Verify: digest = 00000000 c5 03 28 5b b1 c4 79 e0 6e 5b 64 2a a2 b1 91 97 |..([..y.n[d*....| +peer0.org1.example.com | 00000010 04 89 f4 9a b4 7a 81 d9 37 d4 a3 5e a7 ac e7 a2 |.....z..7..^....|" +peer0.org1.example.com | "2019-04-22 06:17:46.963 UTC [msp.identity] Verify -> DEBU 34c0 Verify: sig = 00000000 30 45 02 21 00 81 4b 28 ef fa d2 54 5f 3d 89 29 |0E.!..K(...T_=.)| +peer0.org1.example.com | 00000010 ba c9 ac 9e bc 84 0c 75 02 79 e5 96 bd c4 d0 50 |.......u.y.....P| +peer0.org1.example.com | 00000020 2b 4d b8 41 18 02 20 78 47 10 cb 00 bd 99 f8 c4 |+M.A.. xG.......| +peer0.org1.example.com | 00000030 44 89 b4 01 43 75 f1 d3 93 8d b6 71 e6 f8 72 d3 |D...Cu.....q..r.| +peer0.org1.example.com | 00000040 6c 26 a0 92 57 dd 70 |l&..W.p|" +peer0.org1.example.com | "2019-04-22 06:17:46.964 UTC [cauthdsl] func2 -> DEBU 34c1 0xc0024c21c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:46.964 UTC [cauthdsl] func1 -> DEBU 34c2 0xc0024c21c0 gate 1555913866961490200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:46.964 UTC [policies] Evaluate -> DEBU 34c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.965 UTC [policies] Evaluate -> DEBU 34c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.965 UTC [policies] Evaluate -> DEBU 34c5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.965 UTC [policies] Evaluate -> DEBU 34c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:46.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 34c7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 34c8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34c9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.966 UTC [gossip.gossip] handleMessage -> DEBU 34ca Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34cb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.966 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34cc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:46.967 UTC [msp.identity] Verify -> DEBU 34cd Verify: digest = 00000000 3c 12 30 6f 00 11 06 99 a9 ff 86 ff 07 77 b7 7a |<.0o.........w.z| +peer0.org1.example.com | 00000010 3e b9 cd c6 e1 6c 8b 51 06 61 d8 06 2e 29 b3 8f |>....l.Q.a...)..|" +peer0.org1.example.com | "2019-04-22 06:17:46.967 UTC [msp.identity] Verify -> DEBU 34ce Verify: sig = 00000000 30 45 02 21 00 93 70 8d a2 3e 0b 03 e0 09 6b 60 |0E.!..p..>....k`| +peer0.org1.example.com | 00000010 c0 2a a0 b5 0b 13 5f 2f d2 5b b3 cd 31 64 20 26 |.*...._/.[..1d &| +peer0.org1.example.com | 00000020 c0 2d 4d 65 e4 02 20 03 10 19 17 e9 0e 74 81 11 |.-Me.. ......t..| +peer0.org1.example.com | 00000030 27 33 1d 03 30 66 a4 4b 46 38 b8 45 8c 47 39 0c |'3..0f.KF8.E.G9.| +peer0.org1.example.com | 00000040 02 1b 93 76 5e ab af |...v^..|" +peer0.org1.example.com | "2019-04-22 06:17:46.968 UTC [msp.identity] Verify -> DEBU 34cf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:46.969 UTC [msp.identity] Verify -> DEBU 34d0 Verify: sig = 00000000 30 44 02 20 7c cc 7a 74 3f 79 8e 87 c9 d7 4d 94 |0D. |.zt?y....M.| +peer0.org1.example.com | 00000010 d2 d2 37 58 bf a4 2c 5a ac 71 96 01 55 51 82 b0 |..7X..,Z.q..UQ..| +peer0.org1.example.com | 00000020 68 52 4e c4 02 20 4e ec 90 ad 28 e7 88 b1 1b e5 |hRN.. N...(.....| +peer0.org1.example.com | 00000030 18 7a da 3e e1 26 54 a8 11 91 78 19 7d ee d5 c4 |.z.>.&T...x.}...| +peer0.org1.example.com | 00000040 79 99 ae 7c d9 8e |y..|..|" +peer0.org1.example.com | "2019-04-22 06:17:46.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 34d1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.970 UTC [gossip.discovery] isSentByMe -> DEBU 34d2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:46.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 34d3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:46.970 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.029 UTC [gossip.gossip] handleMessage -> DEBU 34d5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.029 UTC [gossip.gossip] handleMessage -> DEBU 34d6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.030 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34d8 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:47.030 UTC [msp] DeserializeIdentity -> DEBU 34d9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.031 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34da Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:47.031 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34db Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:47.031 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34dc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:47.031 UTC [policies] Evaluate -> DEBU 34dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:47.031 UTC [policies] Evaluate -> DEBU 34de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:47.032 UTC [policies] Evaluate -> DEBU 34df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:47.032 UTC [cauthdsl] func1 -> DEBU 34e0 0xc0039dde60 gate 1555913867032369400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:47.032 UTC [cauthdsl] func2 -> DEBU 34e1 0xc0039dde60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:47.032 UTC [cauthdsl] func2 -> DEBU 34e2 0xc0039dde60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:47.032 UTC [cauthdsl] func2 -> DEBU 34e3 0xc0039dde60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.032 UTC [msp.identity] Verify -> DEBU 34e4 Verify: digest = 00000000 db f3 cc 6a 4c 39 95 76 79 c4 8b 23 59 11 57 d2 |...jL9.vy..#Y.W.| +peer0.org1.example.com | 00000010 e5 77 79 fb 45 47 74 b4 ed ef ed 6d 94 19 40 ee |.wy.EGt....m..@.|" +peer0.org1.example.com | "2019-04-22 06:17:47.033 UTC [msp.identity] Verify -> DEBU 34e5 Verify: sig = 00000000 30 44 02 20 21 f5 5f d7 cc 6c a3 35 d0 26 cb 80 |0D. !._..l.5.&..| +peer0.org1.example.com | 00000010 7f c0 e8 ab fc c7 da 7a 7d 9f 45 5c d8 85 1e 6e |.......z}.E\...n| +peer0.org1.example.com | 00000020 82 77 b7 19 02 20 1b d3 0d fb ea be d6 f3 be 14 |.w... ..........| +peer0.org1.example.com | 00000030 07 b0 46 4f 09 d3 65 1d ef 27 0f 81 b4 6b 0a b9 |..FO..e..'...k..| +peer0.org1.example.com | 00000040 c8 05 c7 78 94 f9 |...x..|" +peer0.org1.example.com | "2019-04-22 06:17:47.033 UTC [cauthdsl] func2 -> DEBU 34e6 0xc0039dde60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.033 UTC [cauthdsl] func1 -> DEBU 34e7 0xc0039dde60 gate 1555913867032369400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:47.033 UTC [policies] Evaluate -> DEBU 34e8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.034 UTC [policies] Evaluate -> DEBU 34e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.034 UTC [policies] Evaluate -> DEBU 34ea Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.034 UTC [policies] Evaluate -> DEBU 34eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.035 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ec Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 34ed Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:47.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 34ee updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 " +peer0.org1.example.com | "2019-04-22 06:17:47.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 34ef Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 " +peer0.org1.example.com | "2019-04-22 06:17:47.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 34f0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:47.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 34f1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 34f2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34f3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.038 UTC [msp] DeserializeIdentity -> DEBU 34f4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.040 UTC [msp] DeserializeIdentity -> DEBU 34f9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.040 UTC [msp] DeserializeIdentity -> DEBU 34fa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.040 UTC [gossip.comm] Send -> DEBU 34fb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:47.040 UTC [msp] DeserializeIdentity -> DEBU 34fc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.040 UTC [gossip.comm] Send -> DEBU 34fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 34fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 34ff Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3500 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3501 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.042 UTC [gossip.comm] func1 -> DEBU 3502 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.042 UTC [gossip.gossip] handleMessage -> DEBU 3503 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.042 UTC [gossip.gossip] handleMessage -> DEBU 3504 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.042 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3505 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3506 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.043 UTC [gossip.comm] func1 -> DEBU 3507 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.043 UTC [gossip.gossip] handleMessage -> DEBU 3508 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.044 UTC [gossip.gossip] handleMessage -> DEBU 3509 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 350a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 350b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.141 UTC [gossip.comm] func1 -> DEBU 350c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.141 UTC [gossip.gossip] handleMessage -> DEBU 350d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.141 UTC [gossip.pull] HandleMessage -> DEBU 350e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.142 UTC [gossip.pull] SendDigest -> DEBU 350f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:47.142 UTC [gossip.gossip] handleMessage -> DEBU 3510 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.165 UTC [gossip.comm] func1 -> DEBU 3511 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.165 UTC [gossip.gossip] handleMessage -> DEBU 3512 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3513 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3514 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:47.165 UTC [gossip.gossip] handleMessage -> DEBU 3515 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.167 UTC [msp.identity] Verify -> DEBU 3516 Verify: digest = 00000000 2b b1 63 6e 73 d8 c5 ee aa d2 82 9b 6f 99 a7 4d |+.cns.......o..M| +peer0.org1.example.com | 00000010 fe c9 bf 86 c9 7f 47 8e fd 35 38 7b 19 26 e6 1d |......G..58{.&..|" +peer0.org1.example.com | "2019-04-22 06:17:47.167 UTC [msp.identity] Verify -> DEBU 3517 Verify: sig = 00000000 30 45 02 21 00 a5 fe 1f aa f0 5b cc 3f 73 c1 05 |0E.!......[.?s..| +peer0.org1.example.com | 00000010 a2 f6 40 94 7e b5 35 00 ce de 68 f8 b2 df 3c 77 |..@.~.5...h... DEBU 3518 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:47.168 UTC [msp.identity] Verify -> DEBU 3519 Verify: sig = 00000000 30 44 02 20 2c 03 2f 05 26 2f 6c f3 a9 05 e5 fb |0D. ,./.&/l.....| +peer0.org1.example.com | 00000010 97 d8 19 2e 3a d9 9d e4 31 5f d0 b5 10 6b 66 20 |....:...1_...kf | +peer0.org1.example.com | 00000020 41 29 87 56 02 20 34 0d f1 ed bd 19 90 57 1e 4f |A).V. 4......W.O| +peer0.org1.example.com | 00000030 c5 80 f3 2e f7 58 94 b9 df c7 ce e5 89 0f 4e d8 |.....X........N.| +peer0.org1.example.com | 00000040 4e 0c 00 c6 1e 1f |N.....|" +peer0.org1.example.com | "2019-04-22 06:17:47.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 351a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 351b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:47.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 351c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 " +peer0.org1.example.com | "2019-04-22 06:17:47.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 351d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 " +peer0.org1.example.com | "2019-04-22 06:17:47.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 351e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:47.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 351f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3520 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.172 UTC [gossip.discovery] sendMemResponse -> DEBU 3521 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:47.172 UTC [msp] DeserializeIdentity -> DEBU 3522 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.172 UTC [msp] DeserializeIdentity -> DEBU 3523 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.173 UTC [gossip.comm] Send -> DEBU 3524 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:47.173 UTC [gossip.discovery] sendMemResponse -> DEBU 3525 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:47.173 UTC [gossip.comm] sendToEndpoint -> DEBU 3526 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.174 UTC [gossip.comm] sendToEndpoint -> DEBU 3527 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3528 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.606 UTC [gossip.comm] func1 -> DEBU 3529 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.606 UTC [gossip.gossip] handleMessage -> DEBU 352a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.608 UTC [gossip.pull] HandleMessage -> DEBU 352b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.609 UTC [msp] DeserializeIdentity -> DEBU 352c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 352d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 352e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 352f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.611 UTC [msp] DeserializeIdentity -> DEBU 3531 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.611 UTC [gossip.pull] SendDigest -> DEBU 3532 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:47.611 UTC [gossip.gossip] handleMessage -> DEBU 3533 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.642 UTC [gossip.comm] func1 -> DEBU 3534 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.642 UTC [gossip.gossip] handleMessage -> DEBU 3535 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.642 UTC [gossip.gossip] handleMessage -> DEBU 3536 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3537 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.643 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3538 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:47.643 UTC [msp] DeserializeIdentity -> DEBU 3539 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.644 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 353a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:47.644 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 353b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:47.644 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 353c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:47.644 UTC [policies] Evaluate -> DEBU 353d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:47.644 UTC [policies] Evaluate -> DEBU 353e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:47.645 UTC [policies] Evaluate -> DEBU 353f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:47.645 UTC [cauthdsl] func1 -> DEBU 3540 0xc003205a70 gate 1555913867645307900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:47.645 UTC [cauthdsl] func2 -> DEBU 3541 0xc003205a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:47.645 UTC [cauthdsl] func2 -> DEBU 3542 0xc003205a70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:47.646 UTC [cauthdsl] func2 -> DEBU 3543 0xc003205a70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.646 UTC [msp.identity] Verify -> DEBU 3544 Verify: digest = 00000000 ae a5 a9 8f ea 8d 5d d3 33 2a de 80 86 54 36 87 |......].3*...T6.| +peer0.org1.example.com | 00000010 1b 36 4c 92 a6 76 93 49 0d c4 77 47 28 3c 3b e5 |.6L..v.I..wG(<;.|" +peer0.org1.example.com | "2019-04-22 06:17:47.646 UTC [msp.identity] Verify -> DEBU 3545 Verify: sig = 00000000 30 45 02 21 00 80 33 4e 3a 4d d8 73 bc e7 b7 64 |0E.!..3N:M.s...d| +peer0.org1.example.com | 00000010 35 f1 07 3e 86 a4 4d 3b 7e 4c cd 90 ff 14 22 32 |5..>..M;~L...."2| +peer0.org1.example.com | 00000020 5c 4e 9e e3 fa 02 20 45 53 7c 0d e2 2a 43 c1 52 |\N.... ES|..*C.R| +peer0.org1.example.com | 00000030 e2 8d 5a 26 64 07 bc 74 be a9 9d 11 1b ef 9b a6 |..Z&d..t........| +peer0.org1.example.com | 00000040 01 74 1c b6 21 55 0b |.t..!U.|" +peer0.org1.example.com | "2019-04-22 06:17:47.646 UTC [cauthdsl] func2 -> DEBU 3546 0xc003205a70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.647 UTC [cauthdsl] func1 -> DEBU 3547 0xc003205a70 gate 1555913867645307900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:47.647 UTC [policies] Evaluate -> DEBU 3548 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.647 UTC [policies] Evaluate -> DEBU 3549 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.647 UTC [policies] Evaluate -> DEBU 354a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.648 UTC [policies] Evaluate -> DEBU 354b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:47.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 354c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 354d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:47.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 354e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 " +peer0.org1.example.com | "2019-04-22 06:17:47.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 354f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 " +peer0.org1.example.com | "2019-04-22 06:17:47.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 3550 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:47.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 3551 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 3552 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3553 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.650 UTC [gossip.discovery] sendMemResponse -> DEBU 3554 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:47.650 UTC [msp] DeserializeIdentity -> DEBU 3555 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.651 UTC [msp] DeserializeIdentity -> DEBU 3556 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.651 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.652 UTC [gossip.comm] Send -> DEBU 3558 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:47.652 UTC [gossip.discovery] sendMemResponse -> DEBU 3559 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:47.652 UTC [gossip.comm] sendToEndpoint -> DEBU 355a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.652 UTC [gossip.comm] sendToEndpoint -> DEBU 355b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.788 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 355c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:47.789 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 355d Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:47.789 UTC [policies] Evaluate -> DEBU 355e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:17:47.789 UTC [policies] Evaluate -> DEBU 355f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:47.789 UTC [policies] Evaluate -> DEBU 3560 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:47.790 UTC [cauthdsl] func1 -> DEBU 3561 0xc003202af0 gate 1555913867790120300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:47.790 UTC [cauthdsl] func2 -> DEBU 3562 0xc003202af0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:47.790 UTC [cauthdsl] func2 -> DEBU 3563 0xc003202af0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:47.790 UTC [cauthdsl] func2 -> DEBU 3564 0xc003202af0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.790 UTC [msp.identity] Verify -> DEBU 3565 Verify: digest = 00000000 be eb af ee eb 74 1a 6d d5 30 75 8b f0 28 39 57 |.....t.m.0u..(9W| +peer0.org1.example.com | 00000010 0b 84 ef 8c 35 09 6f 99 19 fb c3 c6 9b b3 d0 04 |....5.o.........|" +peer0.org1.example.com | "2019-04-22 06:17:47.791 UTC [msp.identity] Verify -> DEBU 3566 Verify: sig = 00000000 30 44 02 20 30 f5 e7 e5 68 e9 76 74 63 35 af 33 |0D. 0...h.vtc5.3| +peer0.org1.example.com | 00000010 70 ea 8f d7 5c 3e 8e 1e 3d 37 0d 19 72 0e fe de |p...\>..=7..r...| +peer0.org1.example.com | 00000020 63 af 00 15 02 20 04 40 9c 09 8e 39 b9 c5 2b 54 |c.... .@...9..+T| +peer0.org1.example.com | 00000030 31 5c fe c0 41 be a3 77 76 f5 47 56 ca 80 2c a5 |1\..A..wv.GV..,.| +peer0.org1.example.com | 00000040 12 31 22 91 69 1f |.1".i.|" +peer0.org1.example.com | "2019-04-22 06:17:47.791 UTC [cauthdsl] func2 -> DEBU 3567 0xc003202af0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.791 UTC [cauthdsl] func1 -> DEBU 3568 0xc003202af0 gate 1555913867790120300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:47.791 UTC [policies] Evaluate -> DEBU 3569 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:47.792 UTC [policies] Evaluate -> DEBU 356a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:17:47.792 UTC [policies] Evaluate -> DEBU 356b Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:47.792 UTC [policies] Evaluate -> DEBU 356c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:17:47.792 UTC [blocksProvider] DeliverBlocks -> DEBU 356d [businesschannel] Adding payload to local buffer, blockNum = [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.793 UTC [gossip.state] addPayload -> DEBU 356e [businesschannel] Adding payload to local buffer, blockNum = [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.793 UTC [gossip.state] addPayload -> DEBU 356f Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:17:47.793 UTC [blocksProvider] DeliverBlocks -> DEBU 3571 [businesschannel] Gossiping block [8], peers number [3]" +peer0.org1.example.com | "2019-04-22 06:17:47.793 UTC [gossip.channel] AddToMsgStore -> DEBU 3572 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 8}, Envelope: 4093 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:17:47.794 UTC [gossip.pull] Add -> DEBU 3573 Added 8, total items: 8" +peer0.org1.example.com | "2019-04-22 06:17:47.793 UTC [gossip.state] deliverPayloads -> DEBU 3570 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.794 UTC [gossip.state] deliverPayloads -> DEBU 3574 [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:17:47.794 UTC [gossip.privdata] StoreBlock -> INFO 3575 [businesschannel] Received block [8] from buffer" +peer0.org1.example.com | "2019-04-22 06:17:47.795 UTC [gossip.privdata] StoreBlock -> DEBU 3576 [businesschannel] Validating block [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.795 UTC [committer.txvalidator] Validate -> DEBU 3577 [businesschannel] START Block Validation for block [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.795 UTC [committer.txvalidator] Validate -> DEBU 3578 expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:17:47.796 UTC [committer.txvalidator] validateTx -> DEBU 3579 [businesschannel] validateTx starts for block 0xc0036ab840 env 0xc002ed6370 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:47.796 UTC [protoutils] ValidateTransaction -> DEBU 357a ValidateTransactionEnvelope starts for envelope 0xc002ed6370" +peer0.org1.example.com | "2019-04-22 06:17:47.796 UTC [protoutils] ValidateTransaction -> DEBU 357b Header is channel_header:"\010\003\032\014\010\211\271\365\345\005\020\344\233\310\334\002\"\017businesschannel*@8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030{\017\353\347U\030\214\n\200\262z\315\026\036\277vu(:\204\023\177\000t" " +peer0.org1.example.com | "2019-04-22 06:17:47.796 UTC [protoutils] validateChannelHeader -> DEBU 357c validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:47.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 357d begin" +peer0.org1.example.com | "2019-04-22 06:17:47.797 UTC [msp] GetManagerForChain -> DEBU 357e Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:47.797 UTC [protoutils] checkSignatureFromCreator -> DEBU 357f creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +peer0.org1.example.com | "2019-04-22 06:17:47.797 UTC [protoutils] checkSignatureFromCreator -> DEBU 3580 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:47.797 UTC [msp.identity] Verify -> DEBU 3581 Verify: digest = 00000000 f2 d4 db 3b b3 ca 9f 40 f7 11 6c 72 45 c4 67 85 |...;...@..lrE.g.| +peer0.org1.example.com | 00000010 0b 4a 90 ec e8 56 ba 7e 04 cd 72 b3 ed 52 98 aa |.J...V.~..r..R..|" +peer0.org1.example.com | "2019-04-22 06:17:47.797 UTC [msp.identity] Verify -> DEBU 3582 Verify: sig = 00000000 30 45 02 21 00 d0 3d 02 05 ea 88 3c 8e 0f 48 f1 |0E.!..=....<..H.| +peer0.org1.example.com | 00000010 1e 84 5c ad 57 64 5d b7 51 d6 68 d5 a7 77 f3 c7 |..\.Wd].Q.h..w..| +peer0.org1.example.com | 00000020 6c 95 c1 fb 3a 02 20 69 6d 41 17 6a c3 75 f0 a8 |l...:. imA.j.u..| +peer0.org1.example.com | 00000030 9a 3a 16 27 b5 75 34 43 2f e8 04 c2 fd 9a 2f c1 |.:.'.u4C/...../.| +peer0.org1.example.com | 00000040 39 6c be 0b 61 f4 aa |9l..a..|" +peer0.org1.example.com | "2019-04-22 06:17:47.798 UTC [protoutils] checkSignatureFromCreator -> DEBU 3583 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:47.798 UTC [protoutils] validateEndorserTransaction -> DEBU 3584 validateEndorserTransaction starts for data 0xc003b0e000, header channel_header:"\010\003\032\014\010\211\271\365\345\005\020\344\233\310\334\002\"\017businesschannel*@8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030{\017\353\347U\030\214\n\200\262z\315\026\036\277vu(:\204\023\177\000t" " +peer0.org1.example.com | "2019-04-22 06:17:47.800 UTC [protoutils] validateEndorserTransaction -> DEBU 3585 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-04-22 06:17:47.800 UTC [protoutils] validateEndorserTransaction -> DEBU 3586 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-04-22 06:17:47.800 UTC [protoutils] ValidateTransaction -> DEBU 3587 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-04-22 06:17:47.800 UTC [committer.txvalidator] validateTx -> DEBU 3588 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:47.800 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3589 retrieveTransactionByID() - txId = [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +peer0.org1.example.com | "2019-04-22 06:17:47.801 UTC [committer.txvalidator] validateTx -> DEBU 358a Validating transaction with plugins" +peer0.org1.example.com | "2019-04-22 06:17:47.801 UTC [committer.txvalidator] Dispatch -> DEBU 358b [businesschannel] Dispatch starts for bytes 0xc0039cc000" +peer0.org1.example.com | "2019-04-22 06:17:47.801 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 358c constructing new query executor txid = [e64f6d81-a11f-4dee-a3d1-a7601285a5b3]" +peer0.org1.example.com | "2019-04-22 06:17:47.801 UTC [stateleveldb] GetState -> DEBU 358d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +peer0.org1.example.com | "2019-04-22 06:17:47.801 UTC [stateleveldb] GetState -> DEBU 358e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:47.801 UTC [stateleveldb] GetState -> DEBU 358f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +peer0.org1.example.com | "2019-04-22 06:17:47.802 UTC [stateleveldb] GetState -> DEBU 3590 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +peer0.org1.example.com | "2019-04-22 06:17:47.802 UTC [stateleveldb] GetState -> DEBU 3591 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +peer0.org1.example.com | "2019-04-22 06:17:47.802 UTC [lockbasedtxmgr] Done -> DEBU 3592 Done with transaction simulation / query execution [e64f6d81-a11f-4dee-a3d1-a7601285a5b3]" +peer0.org1.example.com | "2019-04-22 06:17:47.802 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 3593 Validating Tx 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-04-22 06:17:47.803 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 3594 constructing new query executor txid = [74ee2544-f5bc-4bf8-a4f1-0c74a8c69741]" +peer0.org1.example.com | "2019-04-22 06:17:47.803 UTC [lockbasedtxmgr] Done -> DEBU 3595 Done with transaction simulation / query execution [74ee2544-f5bc-4bf8-a4f1-0c74a8c69741]" +peer0.org1.example.com | "2019-04-22 06:17:47.803 UTC [cauthdsl] func1 -> DEBU 3596 0xc003d075b0 gate 1555913867803417800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:47.803 UTC [cauthdsl] func2 -> DEBU 3597 0xc003d075b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:47.803 UTC [cauthdsl] func2 -> DEBU 3598 0xc003d075b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:47.805 UTC [cauthdsl] func2 -> DEBU 3599 0xc003d075b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.805 UTC [msp.identity] Verify -> DEBU 359a Verify: digest = 00000000 f1 0d 3f 56 88 39 37 71 b8 21 29 7f 88 c7 fa b3 |..?V.97q.!).....| +peer0.org1.example.com | 00000010 d5 af 40 0e 4d 66 7b cf 8c 17 7f 74 e2 14 58 03 |..@.Mf{....t..X.|" +peer0.org1.example.com | "2019-04-22 06:17:47.806 UTC [msp.identity] Verify -> DEBU 359b Verify: sig = 00000000 30 45 02 21 00 dd e8 91 11 ca 7c 77 bd 7a 9f 87 |0E.!......|w.z..| +peer0.org1.example.com | 00000010 70 f9 6c 03 92 5c 52 bc 28 34 62 3a ed 41 35 64 |p.l..\R.(4b:.A5d| +peer0.org1.example.com | 00000020 e2 c6 17 87 8f 02 20 1c 29 c7 2b 40 fa 40 86 90 |...... .).+@.@..| +peer0.org1.example.com | 00000030 7d 85 a8 ba a0 0f ca c3 81 a8 a9 6a 31 7b b2 eb |}..........j1{..| +peer0.org1.example.com | 00000040 bf e7 68 47 87 b0 08 |..hG...|" +peer0.org1.example.com | "2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359c 0xc003d075b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359d 0xc003d075b0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359e 0xc003d075b0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359f 0xc003d075b0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:47.807 UTC [cauthdsl] func1 -> DEBU 35a0 0xc003d075b0 gate 1555913867803417800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:47.807 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 35a1 constructing new query executor txid = [9dd9a316-5635-4d81-b90a-d78530152db1]" +peer0.org1.example.com | "2019-04-22 06:17:47.809 UTC [lockbasedtxmgr] Done -> DEBU 35a2 Done with transaction simulation / query execution [9dd9a316-5635-4d81-b90a-d78530152db1]" +peer0.org1.example.com | "2019-04-22 06:17:47.809 UTC [msp] DeserializeIdentity -> DEBU 35a3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.810 UTC [msp] DeserializeIdentity -> DEBU 35a4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.810 UTC [msp] DeserializeIdentity -> DEBU 35a5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.810 UTC [msp] DeserializeIdentity -> DEBU 35a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.811 UTC [gossip.comm] Send -> DEBU 35a7 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 8}, Envelope: 4093 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:47.812 UTC [msp] DeserializeIdentity -> DEBU 35a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.812 UTC [msp] DeserializeIdentity -> DEBU 35a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:47.812 UTC [gossip.comm] sendToEndpoint -> DEBU 35aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 8}, Envelope: 4093 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:47.813 UTC [gossip.comm] sendToEndpoint -> DEBU 35ab Exiting" +peer0.org1.example.com | "2019-04-22 06:17:47.811 UTC [vscc] Validate -> DEBU 35ac block 8, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-04-22 06:17:47.825 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 35ad Transaction 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff appears to be valid" +peer0.org1.example.com | "2019-04-22 06:17:47.826 UTC [committer.txvalidator] Dispatch -> DEBU 35ae [businesschannel] Dispatch completes env bytes 0xc0039cc000" +peer0.org1.example.com | "2019-04-22 06:17:47.827 UTC [committer.txvalidator] validateTx -> DEBU 35af [businesschannel] validateTx completes for block 0xc0036ab840 env 0xc002ed6370 txn 0" +peer0.org1.example.com | "2019-04-22 06:17:47.827 UTC [committer.txvalidator] Validate -> DEBU 35b0 got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:17:47.832 UTC [committer.txvalidator] Validate -> INFO 35b1 [businesschannel] Validated block [8] in 31ms" +peer0.org1.example.com | "2019-04-22 06:17:47.839 UTC [gossip.privdata] listMissingPrivateData -> DEBU 35b2 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:17:47.840 UTC [gossip.privdata] StoreBlock -> DEBU 35b3 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:17:47.842 UTC [kvledger] CommitWithPvtData -> DEBU 35b4 [businesschannel] Validating state for block [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.844 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 35b5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:17:47.844 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 35b6 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:17:47.849 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 35b7 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:17:47.850 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35b8 ValidateAndPrepareBatch() for block number = [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.850 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35b9 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:47.851 UTC [valimpl] preprocessProtoBlock -> DEBU 35ba txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-04-22 06:17:47.851 UTC [stateleveldb] GetState -> DEBU 35bb GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:47.852 UTC [statebasedval] validateKVRead -> DEBU 35bc Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:47.852 UTC [stateleveldb] GetState -> DEBU 35bd GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:47.852 UTC [statebasedval] validateKVRead -> DEBU 35be Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:47.852 UTC [stateleveldb] GetState -> DEBU 35bf GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:47.852 UTC [statebasedval] validateKVRead -> DEBU 35c0 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:47.853 UTC [stateleveldb] GetState -> DEBU 35c1 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-04-22 06:17:47.853 UTC [statebasedval] validateKVRead -> DEBU 35c2 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +peer0.org1.example.com | "2019-04-22 06:17:47.853 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 35c3 Block [8] Transaction index [0] TxId [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff] marked as valid by state validator. ContainsPostOrderWrites [false]" +peer0.org1.example.com | "2019-04-22 06:17:47.854 UTC [valinternal] ApplyWriteSet -> DEBU 35c4 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00254a0c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00254a100)}" +peer0.org1.example.com | "2019-04-22 06:17:47.855 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35c5 validating rwset..." +peer0.org1.example.com | "2019-04-22 06:17:47.856 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35c6 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:17:47.856 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35c7 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:17:47.857 UTC [kvledger] CommitWithPvtData -> DEBU 35c8 [businesschannel] Committing block [8] to storage" +peer0.org1.example.com | "2019-04-22 06:17:47.857 UTC [ledgerstorage] CommitWithPvtData -> DEBU 35c9 Writing block [8] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:17:47.861 UTC [pvtdatastorage] Prepare -> DEBU 35ca Saved 0 private data write sets for block [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.864 UTC [fsblkstorage] indexBlock -> DEBU 35cb Indexing block [blockNum=8, blockHash=[]byte{0x87, 0x28, 0x3f, 0xd, 0x8c, 0x94, 0xcd, 0x21, 0x3f, 0x1, 0x49, 0xc1, 0xa, 0x2c, 0x32, 0xd1, 0x8, 0xa0, 0xc4, 0x5, 0x90, 0x89, 0x28, 0x51, 0x8e, 0x5a, 0xbc, 0x5, 0xe0, 0x40, 0x4d, 0xbb} txOffsets= +peer0.org1.example.com | txId=8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff locPointer=offset=70, bytesLength=3045 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:17:47.864 UTC [fsblkstorage] indexBlock -> DEBU 35cc Adding txLoc [fileSuffixNum=0, offset=94693, bytesLength=3045] for tx ID: [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff] to txid-index" +peer0.org1.example.com | "2019-04-22 06:17:47.864 UTC [fsblkstorage] indexBlock -> DEBU 35cd Adding txLoc [fileSuffixNum=0, offset=94693, bytesLength=3045] for tx number:[0] ID: [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:17:47.866 UTC [fsblkstorage] updateCheckpoint -> DEBU 35ce Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98675], isChainEmpty=[false], lastBlockNumber=[8]" +peer0.org1.example.com | "2019-04-22 06:17:47.866 UTC [pvtdatastorage] Commit -> DEBU 35cf Committing private data for block [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.869 UTC [pvtdatastorage] Commit -> DEBU 35d0 Committed private data for block [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.869 UTC [kvledger] CommitWithPvtData -> DEBU 35d1 [businesschannel] Committing block [8] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:17:47.869 UTC [lockbasedtxmgr] Commit -> DEBU 35d2 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:47.869 UTC [lockbasedtxmgr] Commit -> DEBU 35d3 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:47.870 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 35d4 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:17:47.870 UTC [lockbasedtxmgr] Commit -> DEBU 35d5 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:17:47.870 UTC [stateleveldb] ApplyUpdates -> DEBU 35d6 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-04-22 06:17:47.870 UTC [stateleveldb] ApplyUpdates -> DEBU 35d7 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-04-22 06:17:47.873 UTC [lockbasedtxmgr] Commit -> DEBU 35d8 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:17:47.873 UTC [lockbasedtxmgr] func1 -> DEBU 35d9 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:17:47.874 UTC [kvledger] CommitWithPvtData -> DEBU 35da [businesschannel] Committing block [8] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:17:47.874 UTC [historyleveldb] Commit -> DEBU 35db Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:17:47.873 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 35dc Preparing potential purge list working-set for expiringAtBlk [9]" +peer0.org1.example.com | "2019-04-22 06:17:47.875 UTC [leveldbhelper] GetIterator -> DEBU 35dd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:17:47.877 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 35df No expiry entry found for expiringAtBlk [9]" +peer0.org1.example.com | "2019-04-22 06:17:47.876 UTC [historyleveldb] Commit -> DEBU 35de Channel [businesschannel]: Updates committed to history database for blockNo [8]" +peer0.org1.example.com | "2019-04-22 06:17:47.877 UTC [kvledger] CommitWithPvtData -> INFO 35e0 [businesschannel] Committed block [8] with 1 transaction(s) in 34ms (state_validation=14ms block_commit=12ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:17:47.877 UTC [msp.identity] Sign -> DEBU 35e1 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020809 " +peer0.org1.example.com | "2019-04-22 06:17:47.877 UTC [msp.identity] Sign -> DEBU 35e2 Sign: digest: 8FBD7B7C6DD38FFE3D79529E4BD3470D8157671C1F438D19BB316B85AB3FC46F " +peer0.org1.example.com | "2019-04-22 06:17:47.878 UTC [gossip.state] commitBlock -> DEBU 35e3 [businesschannel] Committed block [8] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:17:48.023 UTC [gossip.gossip] handleMessage -> DEBU 35e4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.024 UTC [gossip.pull] HandleMessage -> DEBU 35e5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.025 UTC [msp] DeserializeIdentity -> DEBU 35e6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.029 UTC [msp] DeserializeIdentity -> DEBU 35e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.031 UTC [msp] DeserializeIdentity -> DEBU 35e8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.033 UTC [msp] DeserializeIdentity -> DEBU 35e9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.033 UTC [msp] DeserializeIdentity -> DEBU 35ea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.034 UTC [msp] DeserializeIdentity -> DEBU 35eb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.035 UTC [gossip.pull] SendDigest -> DEBU 35ec Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:48.035 UTC [gossip.gossip] handleMessage -> DEBU 35ed Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.042 UTC [gossip.gossip] handleMessage -> DEBU 35ee Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.043 UTC [gossip.gossip] handleMessage -> DEBU 35ef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.044 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35f1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:48.045 UTC [msp] DeserializeIdentity -> DEBU 35f2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.046 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35f4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35f5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.047 UTC [policies] Evaluate -> DEBU 35f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.048 UTC [policies] Evaluate -> DEBU 35f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.048 UTC [policies] Evaluate -> DEBU 35f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.049 UTC [cauthdsl] func1 -> DEBU 35f9 0xc002f988f0 gate 1555913868049073700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.049 UTC [cauthdsl] func2 -> DEBU 35fa 0xc002f988f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.049 UTC [cauthdsl] func2 -> DEBU 35fb 0xc002f988f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.050 UTC [cauthdsl] func2 -> DEBU 35fc 0xc002f988f0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.050 UTC [msp.identity] Verify -> DEBU 35fd Verify: digest = 00000000 b1 b5 c5 a8 63 a6 93 2f 94 b8 9c 74 1f 81 af 63 |....c../...t...c| +peer0.org1.example.com | 00000010 a7 8e fe 70 6a d7 ff 16 70 64 51 91 ea 4b b3 2b |...pj...pdQ..K.+|" +peer0.org1.example.com | "2019-04-22 06:17:48.050 UTC [msp.identity] Verify -> DEBU 35fe Verify: sig = 00000000 30 44 02 20 19 0e 41 2f ec f4 9a 3e 66 81 f2 67 |0D. ..A/...>f..g| +peer0.org1.example.com | 00000010 d0 a8 ae 62 b9 97 cf 97 e2 1f 8a ec 44 f6 e6 71 |...b........D..q| +peer0.org1.example.com | 00000020 9d df 27 1e 02 20 36 a7 d9 2b 1d 52 11 59 ca 21 |..'.. 6..+.R.Y.!| +peer0.org1.example.com | 00000030 be 06 0e 62 b0 8d e9 80 5b 14 9a 59 72 d4 b2 2e |...b....[..Yr...| +peer0.org1.example.com | 00000040 7e 50 8b cd c0 3f |~P...?|" +peer0.org1.example.com | "2019-04-22 06:17:48.051 UTC [cauthdsl] func2 -> DEBU 35ff 0xc002f988f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.051 UTC [cauthdsl] func1 -> DEBU 3600 0xc002f988f0 gate 1555913868049073700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.052 UTC [policies] Evaluate -> DEBU 3601 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.052 UTC [policies] Evaluate -> DEBU 3602 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.052 UTC [policies] Evaluate -> DEBU 3603 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.053 UTC [policies] Evaluate -> DEBU 3604 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 3605 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3606 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 3607 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 " +peer0.org1.example.com | "2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 3608 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 " +peer0.org1.example.com | "2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 3609 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 360a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.058 UTC [gossip.discovery] handleAliveMessage -> DEBU 360b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.058 UTC [gossip.discovery] handleMsgFromComm -> DEBU 360c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.058 UTC [gossip.discovery] sendMemResponse -> DEBU 360d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:48.058 UTC [msp] DeserializeIdentity -> DEBU 360e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.059 UTC [msp] DeserializeIdentity -> DEBU 360f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.059 UTC [msp] DeserializeIdentity -> DEBU 3610 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.059 UTC [gossip.comm] Send -> DEBU 3611 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:48.060 UTC [gossip.discovery] sendMemResponse -> DEBU 3612 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:48.060 UTC [gossip.comm] sendToEndpoint -> DEBU 3613 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.060 UTC [gossip.comm] sendToEndpoint -> DEBU 3614 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.187 UTC [endorser] ProcessProposal -> DEBU 3615 Entering: request from 192.168.224.9:49324" +peer0.org1.example.com | "2019-04-22 06:17:48.187 UTC [protoutils] ValidateProposalMessage -> DEBU 3616 ValidateProposalMessage starts for signed proposal 0xc002f3f270" +peer0.org1.example.com | "2019-04-22 06:17:48.187 UTC [protoutils] validateChannelHeader -> DEBU 3617 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:48.188 UTC [protoutils] checkSignatureFromCreator -> DEBU 3618 begin" +peer0.org1.example.com | "2019-04-22 06:17:48.188 UTC [msp] GetManagerForChain -> DEBU 3619 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:48.188 UTC [protoutils] checkSignatureFromCreator -> DEBU 361a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:48.188 UTC [protoutils] checkSignatureFromCreator -> DEBU 361b creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:48.189 UTC [msp.identity] Verify -> DEBU 361c Verify: digest = 00000000 ce b7 e1 64 61 d2 0a 38 ae ec 01 be d3 52 37 aa |...da..8.....R7.| +peer0.org1.example.com | 00000010 36 a8 ed ab 70 e6 ee fb 36 1d e4 dc 72 83 45 1a |6...p...6...r.E.|" +peer0.org1.example.com | "2019-04-22 06:17:48.189 UTC [msp.identity] Verify -> DEBU 361d Verify: sig = 00000000 30 44 02 20 04 ec 21 d6 cc 12 ab 93 98 fb 81 d6 |0D. ..!.........| +peer0.org1.example.com | 00000010 d0 74 e9 a5 a8 30 2b 63 fa 34 3b eb 04 9e 26 26 |.t...0+c.4;...&&| +peer0.org1.example.com | 00000020 34 95 86 c0 02 20 48 73 4b 77 0e 8b c1 5a 74 9c |4.... HsKw...Zt.| +peer0.org1.example.com | 00000030 29 9d f3 f5 cf cd cd 40 cb c0 c6 90 48 1b 45 4a |)......@....H.EJ| +peer0.org1.example.com | 00000040 03 34 41 e9 7d 60 |.4A.}`|" +peer0.org1.example.com | "2019-04-22 06:17:48.190 UTC [protoutils] checkSignatureFromCreator -> DEBU 361e exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:48.190 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 361f validateChaincodeProposalMessage starts for proposal 0xc0030ef650, header 0xc002f3f680" +peer0.org1.example.com | "2019-04-22 06:17:48.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3620 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:48.191 UTC [endorser] preProcess -> DEBU 3621 [businesschannel][fd3e8c7d] processing txid: fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95" +peer0.org1.example.com | "2019-04-22 06:17:48.192 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3622 retrieveTransactionByID() - txId = [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +peer0.org1.example.com | "2019-04-22 06:17:48.192 UTC [aclmgmt] CheckACL -> DEBU 3623 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-04-22 06:17:48.192 UTC [aclmgmt] CheckACL -> DEBU 3624 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-04-22 06:17:48.193 UTC [policies] Evaluate -> DEBU 3625 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.193 UTC [policies] Evaluate -> DEBU 3626 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.194 UTC [policies] Evaluate -> DEBU 3627 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.194 UTC [cauthdsl] func1 -> DEBU 3628 0xc00369be20 gate 1555913868194370400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.194 UTC [cauthdsl] func2 -> DEBU 3629 0xc00369be20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.194 UTC [cauthdsl] func2 -> DEBU 362a 0xc00369be20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.195 UTC [cauthdsl] func2 -> DEBU 362b 0xc00369be20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:48.195 UTC [cauthdsl] func2 -> DEBU 362c 0xc00369be20 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:48.196 UTC [cauthdsl] func1 -> DEBU 362d 0xc00369be20 gate 1555913868194370400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:48.196 UTC [policies] Evaluate -> DEBU 362e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:48.196 UTC [policies] Evaluate -> DEBU 362f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:48.196 UTC [policies] Evaluate -> DEBU 3630 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.197 UTC [cauthdsl] func1 -> DEBU 3631 0xc0025b4660 gate 1555913868197362100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.197 UTC [cauthdsl] func2 -> DEBU 3632 0xc0025b4660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.198 UTC [cauthdsl] func2 -> DEBU 3633 0xc0025b4660 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.198 UTC [cauthdsl] func2 -> DEBU 3634 0xc0025b4660 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.198 UTC [msp.identity] Verify -> DEBU 3635 Verify: digest = 00000000 ce b7 e1 64 61 d2 0a 38 ae ec 01 be d3 52 37 aa |...da..8.....R7.| +peer0.org1.example.com | 00000010 36 a8 ed ab 70 e6 ee fb 36 1d e4 dc 72 83 45 1a |6...p...6...r.E.|" +peer0.org1.example.com | "2019-04-22 06:17:48.199 UTC [msp.identity] Verify -> DEBU 3636 Verify: sig = 00000000 30 44 02 20 04 ec 21 d6 cc 12 ab 93 98 fb 81 d6 |0D. ..!.........| +peer0.org1.example.com | 00000010 d0 74 e9 a5 a8 30 2b 63 fa 34 3b eb 04 9e 26 26 |.t...0+c.4;...&&| +peer0.org1.example.com | 00000020 34 95 86 c0 02 20 48 73 4b 77 0e 8b c1 5a 74 9c |4.... HsKw...Zt.| +peer0.org1.example.com | 00000030 29 9d f3 f5 cf cd cd 40 cb c0 c6 90 48 1b 45 4a |)......@....H.EJ| +peer0.org1.example.com | 00000040 03 34 41 e9 7d 60 |.4A.}`|" +peer0.org1.example.com | "2019-04-22 06:17:48.199 UTC [cauthdsl] func2 -> DEBU 3637 0xc0025b4660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.200 UTC [cauthdsl] func1 -> DEBU 3638 0xc0025b4660 gate 1555913868197362100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.200 UTC [policies] Evaluate -> DEBU 3639 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:48.200 UTC [policies] Evaluate -> DEBU 363a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:17:48.201 UTC [policies] Evaluate -> DEBU 363b Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:48.201 UTC [policies] Evaluate -> DEBU 363c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:17:48.201 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 363d constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:17:48.201 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 363e constructing new tx simulator txid = [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +peer0.org1.example.com | "2019-04-22 06:17:48.202 UTC [endorser] SimulateProposal -> DEBU 363f [businesschannel][fd3e8c7d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:48.202 UTC [stateleveldb] GetState -> DEBU 3640 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:48.202 UTC [endorser] callChaincode -> INFO 3641 [businesschannel][fd3e8c7d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:48.202 UTC [stateleveldb] GetState -> DEBU 3642 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +peer0.org1.example.com | "2019-04-22 06:17:48.203 UTC [stateleveldb] GetState -> DEBU 3643 GetState(). ns=exp02, key=􏿿initialized" +peer0.org1.example.com | "2019-04-22 06:17:48.203 UTC [chaincode] Execute -> DEBU 3644 Entry" +peer0.org1.example.com | "2019-04-22 06:17:48.204 UTC [chaincode] handleMessage -> DEBU 3645 [fd3e8c7d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-04-22 06:17:48.204 UTC [chaincode] HandleTransaction -> DEBU 3646 [fd3e8c7d] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-04-22 06:17:48.205 UTC [chaincode] HandleGetState -> DEBU 3647 [fd3e8c7d] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:48.205 UTC [stateleveldb] GetState -> DEBU 3648 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-04-22 06:17:48.205 UTC [chaincode] HandleTransaction -> DEBU 3649 [fd3e8c7d] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-04-22 06:17:48.206 UTC [chaincode] handleMessage -> DEBU 364a [fd3e8c7d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:48.207 UTC [chaincode] Notify -> DEBU 364b [fd3e8c7d] notifying Txid:fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:48.207 UTC [chaincode] Execute -> DEBU 364c Exit" +peer0.org1.example.com | "2019-04-22 06:17:48.207 UTC [endorser] callChaincode -> INFO 364d [businesschannel][fd3e8c7d] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-04-22 06:17:48.207 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 364e Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:17:48.208 UTC [lockbasedtxmgr] Done -> DEBU 364f Done with transaction simulation / query execution [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +peer0.org1.example.com | "2019-04-22 06:17:48.208 UTC [endorser] SimulateProposal -> DEBU 3650 [businesschannel][fd3e8c7d] Exit" +peer0.org1.example.com | "2019-04-22 06:17:48.208 UTC [endorser] endorseProposal -> DEBU 3651 [businesschannel][fd3e8c7d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:17:48.209 UTC [endorser] endorseProposal -> DEBU 3652 [businesschannel][fd3e8c7d] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-04-22 06:17:48.209 UTC [endorser] EndorseWithPlugin -> DEBU 3653 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:48.209 UTC [msp.identity] Sign -> DEBU 3654 Sign: plaintext: 0A200568AD21C981682AB679F268FAB9...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:48.210 UTC [msp.identity] Sign -> DEBU 3655 Sign: digest: 931B896186FA9CDD3F3217664435BC4D8F59AA8F94AD2295BDC78740B82FFE6D " +peer0.org1.example.com | "2019-04-22 06:17:48.210 UTC [endorser] EndorseWithPlugin -> DEBU 3656 Exiting {plugin: escc, channel: businesschannel, tx: fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95, chaincode: exp02}" +peer0.org1.example.com | "2019-04-22 06:17:48.210 UTC [endorser] endorseProposal -> DEBU 3657 [businesschannel][fd3e8c7d] Exit" +peer0.org1.example.com | "2019-04-22 06:17:48.211 UTC [lockbasedtxmgr] Done -> DEBU 3658 Done with transaction simulation / query execution [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +peer0.org1.example.com | "2019-04-22 06:17:48.211 UTC [endorser] func1 -> DEBU 3659 Exit: request from 192.168.224.9:49324" +peer0.org1.example.com | "2019-04-22 06:17:48.212 UTC [comm.grpc.server] 1 -> INFO 365a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49324 grpc.code=OK grpc.call_duration=25.3071ms +peer0.org1.example.com | "2019-04-22 06:17:48.216 UTC [grpc] infof -> DEBU 365b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:48.217 UTC [grpc] infof -> DEBU 365c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:48.388 UTC [msp] DeserializeIdentity -> DEBU 365d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.388 UTC [msp] DeserializeIdentity -> DEBU 365e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.389 UTC [gossip.comm] Send -> DEBU 365f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3660 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3661 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3662 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3663 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3664 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3665 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.390 UTC [gossip.comm] func1 -> DEBU 3666 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.390 UTC [gossip.gossip] handleMessage -> DEBU 3667 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.390 UTC [msp] DeserializeIdentity -> DEBU 3668 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 3669 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +peer0.org1.example.com | 00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +peer0.org1.example.com | "2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 366a Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +peer0.org1.example.com | 00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +peer0.org1.example.com | 00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +peer0.org1.example.com | 00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +peer0.org1.example.com | 00000040 8d f6 86 08 00 13 |......|" +peer0.org1.example.com | "2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 366b Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 366c Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [msp] DeserializeIdentity -> DEBU 366d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [msp] DeserializeIdentity -> DEBU 366e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 366f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3670 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3671 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [policies] Evaluate -> DEBU 3672 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [policies] Evaluate -> DEBU 3673 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [policies] Evaluate -> DEBU 3674 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [cauthdsl] func1 -> DEBU 3675 0xc003600aa0 gate 1555913868392605500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 3676 0xc003600aa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 3677 0xc003600aa0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 3678 0xc003600aa0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [msp.identity] Verify -> DEBU 3679 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [msp.identity] Verify -> DEBU 367a Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 367b 0xc003600aa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.392 UTC [cauthdsl] func1 -> DEBU 367c 0xc003600aa0 gate 1555913868392605500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 367d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 367e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 367f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 3680 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.393 UTC [msp] DeserializeIdentity -> DEBU 3681 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.393 UTC [msp] DeserializeIdentity -> DEBU 3682 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3683 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3684 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3685 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.394 UTC [policies] Evaluate -> DEBU 3686 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [policies] Evaluate -> DEBU 3687 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [policies] Evaluate -> DEBU 3688 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [cauthdsl] func1 -> DEBU 3689 0xc003336270 gate 1555913868395362900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368a 0xc003336270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368b 0xc003336270 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368c 0xc003336270 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [msp.identity] Verify -> DEBU 368d Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [msp.identity] Verify -> DEBU 368e Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368f 0xc003336270 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.395 UTC [cauthdsl] func1 -> DEBU 3690 0xc003336270 gate 1555913868395362900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3691 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3692 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3693 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3694 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [msp] DeserializeIdentity -> DEBU 3695 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3696 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3697 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3698 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3699 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 369a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [cauthdsl] func1 -> DEBU 369b 0xc003337350 gate 1555913868396636700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [cauthdsl] func2 -> DEBU 369c 0xc003337350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [cauthdsl] func2 -> DEBU 369d 0xc003337350 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [cauthdsl] func2 -> DEBU 369e 0xc003337350 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [msp.identity] Verify -> DEBU 369f Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:48.396 UTC [msp.identity] Verify -> DEBU 36a0 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:48.398 UTC [gossip.comm] func1 -> DEBU 36a1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.400 UTC [cauthdsl] func2 -> DEBU 36a2 0xc003337350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.404 UTC [msp] DeserializeIdentity -> DEBU 36a3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.405 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.405 UTC [gossip.comm] Send -> DEBU 36a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:48.405 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.405 UTC [msp] DeserializeIdentity -> DEBU 36a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.406 UTC [gossip.comm] sendToEndpoint -> DEBU 36a8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.409 UTC [gossip.comm] sendToEndpoint -> DEBU 36a9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.409 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.409 UTC [gossip.comm] sendToEndpoint -> DEBU 36ab Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.410 UTC [gossip.comm] sendToEndpoint -> DEBU 36ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.410 UTC [gossip.comm] sendToEndpoint -> DEBU 36ad Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.405 UTC [cauthdsl] func1 -> DEBU 36ae 0xc003337350 gate 1555913868396636700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.413 UTC [policies] Evaluate -> DEBU 36af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.415 UTC [policies] Evaluate -> DEBU 36b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.416 UTC [policies] Evaluate -> DEBU 36b1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.416 UTC [policies] Evaluate -> DEBU 36b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.417 UTC [gossip.gossip] handleMessage -> DEBU 36b3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.418 UTC [gossip.gossip] handleMessage -> DEBU 36b4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.420 UTC [msp.identity] Verify -> DEBU 36b5 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +peer0.org1.example.com | 00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +peer0.org1.example.com | "2019-04-22 06:17:48.421 UTC [msp.identity] Verify -> DEBU 36b6 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +peer0.org1.example.com | 00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +peer0.org1.example.com | 00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +peer0.org1.example.com | 00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +peer0.org1.example.com | 00000040 8d f6 86 08 00 13 |......|" +peer0.org1.example.com | "2019-04-22 06:17:48.423 UTC [msp] DeserializeIdentity -> DEBU 36b7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.423 UTC [msp] DeserializeIdentity -> DEBU 36b8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36bb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.432 UTC [policies] Evaluate -> DEBU 36bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.433 UTC [gossip.comm] func1 -> DEBU 36bd Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.432 UTC [policies] Evaluate -> DEBU 36be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.435 UTC [policies] Evaluate -> DEBU 36bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.435 UTC [cauthdsl] func1 -> DEBU 36c0 0xc003739480 gate 1555913868435597400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.436 UTC [cauthdsl] func2 -> DEBU 36c1 0xc003739480 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.436 UTC [cauthdsl] func2 -> DEBU 36c2 0xc003739480 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.436 UTC [cauthdsl] func2 -> DEBU 36c3 0xc003739480 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.436 UTC [msp.identity] Verify -> DEBU 36c4 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +peer0.org1.example.com | 00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +peer0.org1.example.com | "2019-04-22 06:17:48.436 UTC [msp.identity] Verify -> DEBU 36c5 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +peer0.org1.example.com | 00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +peer0.org1.example.com | 00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +peer0.org1.example.com | 00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +peer0.org1.example.com | 00000040 f0 ce c7 ec 43 95 |....C.|" +peer0.org1.example.com | "2019-04-22 06:17:48.437 UTC [cauthdsl] func2 -> DEBU 36c6 0xc003739480 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [cauthdsl] func1 -> DEBU 36c7 0xc003739480 gate 1555913868435597400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36ca Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [msp] DeserializeIdentity -> DEBU 36cc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [msp] DeserializeIdentity -> DEBU 36cd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ce Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36cf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36d0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [policies] Evaluate -> DEBU 36d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [policies] Evaluate -> DEBU 36d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [policies] Evaluate -> DEBU 36d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [cauthdsl] func1 -> DEBU 36d4 0xc0029c6c50 gate 1555913868439149800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [cauthdsl] func2 -> DEBU 36d5 0xc0029c6c50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [cauthdsl] func2 -> DEBU 36d6 0xc0029c6c50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [cauthdsl] func2 -> DEBU 36d7 0xc0029c6c50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [msp.identity] Verify -> DEBU 36d8 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:48.439 UTC [msp.identity] Verify -> DEBU 36d9 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 36da 0xc0029c6c50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.440 UTC [cauthdsl] func1 -> DEBU 36db 0xc0029c6c50 gate 1555913868439149800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36dc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36de Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.441 UTC [msp.identity] Verify -> DEBU 36e0 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:48.441 UTC [msp.identity] Verify -> DEBU 36e1 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:48.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36e2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36e3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.441 UTC [policies] Evaluate -> DEBU 36e4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.441 UTC [policies] Evaluate -> DEBU 36e5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.441 UTC [policies] Evaluate -> DEBU 36e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func1 -> DEBU 36e7 0xc00267a350 gate 1555913868442990400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36e8 0xc00267a350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36e9 0xc00267a350 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36ea 0xc00267a350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36eb 0xc00267a350 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func1 -> DEBU 36ec 0xc00267a350 gate 1555913868442990400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [policies] Evaluate -> DEBU 36ed Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [policies] Evaluate -> DEBU 36ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [policies] Evaluate -> DEBU 36ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func1 -> DEBU 36f0 0xc00267ab90 gate 1555913868443463800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36f1 0xc00267ab90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36f2 0xc00267ab90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36f3 0xc00267ab90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [msp.identity] Verify -> DEBU 36f4 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:48.443 UTC [msp.identity] Verify -> DEBU 36f5 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [cauthdsl] func2 -> DEBU 36f6 0xc00267ab90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [cauthdsl] func1 -> DEBU 36f7 0xc00267ab90 gate 1555913868443463800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36f8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36fa Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [gossip.gossip] handleMessage -> DEBU 36fc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [gossip.gossip] handleMessage -> DEBU 36fd Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [msp] DeserializeIdentity -> DEBU 36fe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [msp.identity] Verify -> DEBU 36ff Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +peer0.org1.example.com | 00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +peer0.org1.example.com | "2019-04-22 06:17:48.444 UTC [msp.identity] Verify -> DEBU 3700 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +peer0.org1.example.com | 00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +peer0.org1.example.com | 00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +peer0.org1.example.com | 00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +peer0.org1.example.com | 00000040 8d f6 86 08 00 13 |......|" +peer0.org1.example.com | "2019-04-22 06:17:48.445 UTC [msp.identity] Verify -> DEBU 3701 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +peer0.org1.example.com | 00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +peer0.org1.example.com | "2019-04-22 06:17:48.445 UTC [msp.identity] Verify -> DEBU 3702 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +peer0.org1.example.com | 00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +peer0.org1.example.com | 00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +peer0.org1.example.com | 00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +peer0.org1.example.com | 00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +peer0.org1.example.com | "2019-04-22 06:17:48.445 UTC [msp] DeserializeIdentity -> DEBU 3703 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.445 UTC [msp] DeserializeIdentity -> DEBU 3704 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3705 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3706 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3707 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3708 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3709 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 370a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [cauthdsl] func1 -> DEBU 370b 0xc00393b4e0 gate 1555913868446317000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [cauthdsl] func2 -> DEBU 370c 0xc00393b4e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [cauthdsl] func2 -> DEBU 370d 0xc00393b4e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [cauthdsl] func2 -> DEBU 370e 0xc00393b4e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [msp.identity] Verify -> DEBU 370f Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +peer0.org1.example.com | 00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [msp.identity] Verify -> DEBU 3710 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +peer0.org1.example.com | 00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +peer0.org1.example.com | 00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +peer0.org1.example.com | 00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 3711 0xc00393b4e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [cauthdsl] func1 -> DEBU 3712 0xc00393b4e0 gate 1555913868446317000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3713 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.447 UTC [policies] Evaluate -> DEBU 3715 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.447 UTC [policies] Evaluate -> DEBU 3716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.448 UTC [msp] DeserializeIdentity -> DEBU 3717 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.448 UTC [msp] DeserializeIdentity -> DEBU 3718 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3719 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [policies] Evaluate -> DEBU 371c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [policies] Evaluate -> DEBU 371d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [policies] Evaluate -> DEBU 371e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [cauthdsl] func1 -> DEBU 371f 0xc0039b4cb0 gate 1555913868449759800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [cauthdsl] func2 -> DEBU 3720 0xc0039b4cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [cauthdsl] func2 -> DEBU 3721 0xc0039b4cb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [cauthdsl] func2 -> DEBU 3722 0xc0039b4cb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.449 UTC [msp.identity] Verify -> DEBU 3723 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:48.450 UTC [msp.identity] Verify -> DEBU 3724 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:48.453 UTC [cauthdsl] func2 -> DEBU 3725 0xc0039b4cb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [cauthdsl] func1 -> DEBU 3726 0xc0039b4cb0 gate 1555913868449759800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 3727 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 3728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 3729 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 372a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [msp] DeserializeIdentity -> DEBU 372b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 372e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 372f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [policies] Evaluate -> DEBU 3730 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [cauthdsl] func1 -> DEBU 3731 0xc0039b5d90 gate 1555913868455149200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3732 0xc0039b5d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3733 0xc0039b5d90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3734 0xc0039b5d90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [msp.identity] Verify -> DEBU 3735 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [msp.identity] Verify -> DEBU 3736 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3737 0xc0039b5d90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.455 UTC [cauthdsl] func1 -> DEBU 3738 0xc0039b5d90 gate 1555913868455149200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 3739 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 373a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 373b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 373c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [gossip.gossip] handleMessage -> DEBU 373d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [gossip.gossip] handleMessage -> DEBU 373e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [msp.identity] Verify -> DEBU 373f Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:17:48.456 UTC [msp.identity] Verify -> DEBU 3740 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:17:48.457 UTC [gossip.gossip] handleMessage -> DEBU 3741 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.500 UTC [msp] DeserializeIdentity -> DEBU 3742 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.500 UTC [msp] DeserializeIdentity -> DEBU 3743 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.501 UTC [gossip.pull] Hello -> DEBU 3744 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:48.501 UTC [msp] DeserializeIdentity -> DEBU 3745 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.502 UTC [msp] DeserializeIdentity -> DEBU 3746 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.502 UTC [gossip.comm] Send -> DEBU 3747 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:48.502 UTC [gossip.comm] sendToEndpoint -> DEBU 3748 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.503 UTC [gossip.comm] sendToEndpoint -> DEBU 3749 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.506 UTC [gossip.comm] func1 -> DEBU 374a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17073940157176406821 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.506 UTC [gossip.gossip] handleMessage -> DEBU 374b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17073940157176406821 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.506 UTC [gossip.pull] HandleMessage -> DEBU 374c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17073940157176406821 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.507 UTC [gossip.gossip] handleMessage -> DEBU 374d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.647 UTC [gossip.comm] func1 -> DEBU 374e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.647 UTC [gossip.gossip] handleMessage -> DEBU 374f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.648 UTC [msp] DeserializeIdentity -> DEBU 3750 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.648 UTC [msp] DeserializeIdentity -> DEBU 3751 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.649 UTC [gossip.gossip] handleMessage -> DEBU 3752 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.661 UTC [gossip.comm] func1 -> DEBU 3753 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.661 UTC [gossip.gossip] handleMessage -> DEBU 3754 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.662 UTC [msp.identity] Verify -> DEBU 3755 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:48.662 UTC [msp.identity] Verify -> DEBU 3756 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:48.663 UTC [gossip.gossip] handleMessage -> DEBU 3757 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.668 UTC [gossip.comm] func1 -> DEBU 3758 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.669 UTC [gossip.gossip] handleMessage -> DEBU 3759 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.670 UTC [msp.identity] Verify -> DEBU 375a Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:48.670 UTC [msp.identity] Verify -> DEBU 375b Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:48.671 UTC [msp] DeserializeIdentity -> DEBU 375c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.671 UTC [gossip.gossip] handleMessage -> DEBU 375d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.672 UTC [gossip.gossip] handleMessage -> DEBU 375e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.672 UTC [msp.identity] Verify -> DEBU 375f Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:48.673 UTC [msp.identity] Verify -> DEBU 3760 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:48.673 UTC [msp] DeserializeIdentity -> DEBU 3761 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.673 UTC [gossip.gossip] handleMessage -> DEBU 3762 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.686 UTC [gossip.comm] func1 -> DEBU 3763 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.687 UTC [gossip.gossip] handleMessage -> DEBU 3764 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.687 UTC [gossip.pull] HandleMessage -> DEBU 3765 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.688 UTC [gossip.pull] SendDigest -> DEBU 3766 Sending BLOCK_MSG digest: [3 4 5 6 7 8 1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:48.688 UTC [gossip.gossip] handleMessage -> DEBU 3767 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [endorser] ProcessProposal -> DEBU 3768 Entering: request from 192.168.224.9:49328" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [protoutils] ValidateProposalMessage -> DEBU 3769 ValidateProposalMessage starts for signed proposal 0xc0030b7950" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [protoutils] validateChannelHeader -> DEBU 376a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 376b begin" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [msp] GetManagerForChain -> DEBU 376c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 376d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 376e creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:48.796 UTC [msp.identity] Verify -> DEBU 376f Verify: digest = 00000000 fc 1f c6 af f1 09 c1 d0 4a b5 09 e6 5c df 77 2d |........J...\.w-| +peer0.org1.example.com | 00000010 1f 22 26 da 6b 8d d8 07 0d 40 31 43 d3 cd 49 ed |."&.k....@1C..I.|" +peer0.org1.example.com | "2019-04-22 06:17:48.797 UTC [msp.identity] Verify -> DEBU 3770 Verify: sig = 00000000 30 45 02 21 00 8d 7a b1 90 ff 9c de 83 62 34 49 |0E.!..z......b4I| +peer0.org1.example.com | 00000010 b3 ef b5 73 13 02 8d 3c be ba 91 19 74 ae 47 76 |...s...<....t.Gv| +peer0.org1.example.com | 00000020 df 99 7e 40 e9 02 20 2f fc 5a 8f d9 8b a5 87 d6 |..~@.. /.Z......| +peer0.org1.example.com | 00000030 0f 7a dc bb 37 05 94 34 95 f8 24 b8 ab e9 89 7d |.z..7..4..$....}| +peer0.org1.example.com | 00000040 03 12 6c 71 a7 c3 0c |..lq...|" +peer0.org1.example.com | "2019-04-22 06:17:48.798 UTC [protoutils] checkSignatureFromCreator -> DEBU 3771 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:48.798 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3772 validateChaincodeProposalMessage starts for proposal 0xc003475880, header 0xc0030b7d60" +peer0.org1.example.com | "2019-04-22 06:17:48.798 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3773 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:48.798 UTC [endorser] preProcess -> DEBU 3774 [businesschannel][41633219] processing txid: 416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196" +peer0.org1.example.com | "2019-04-22 06:17:48.799 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3775 retrieveTransactionByID() - txId = [416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196]" +peer0.org1.example.com | "2019-04-22 06:17:48.799 UTC [endorser] SimulateProposal -> DEBU 3776 [businesschannel][41633219] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:48.799 UTC [endorser] callChaincode -> INFO 3777 [businesschannel][41633219] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:48.800 UTC [chaincode] Execute -> DEBU 3778 Entry" +peer0.org1.example.com | "2019-04-22 06:17:48.801 UTC [qscc] Invoke -> DEBU 3779 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:48.801 UTC [aclmgmt] CheckACL -> DEBU 377a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-04-22 06:17:48.801 UTC [aclmgmt] CheckACL -> DEBU 377b acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:17:48.801 UTC [policies] Evaluate -> DEBU 377c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.801 UTC [policies] Evaluate -> DEBU 377d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.801 UTC [policies] Evaluate -> DEBU 377e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.802 UTC [cauthdsl] func1 -> DEBU 377f 0xc003e44ef0 gate 1555913868802382900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3780 0xc003e44ef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3781 0xc003e44ef0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3782 0xc003e44ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3783 0xc003e44ef0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:48.803 UTC [cauthdsl] func1 -> DEBU 3784 0xc003e44ef0 gate 1555913868802382900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:48.803 UTC [policies] Evaluate -> DEBU 3785 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.803 UTC [policies] Evaluate -> DEBU 3786 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.803 UTC [policies] Evaluate -> DEBU 3787 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.804 UTC [cauthdsl] func1 -> DEBU 3788 0xc003e45730 gate 1555913868804255500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.804 UTC [cauthdsl] func2 -> DEBU 3789 0xc003e45730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.804 UTC [cauthdsl] func2 -> DEBU 378a 0xc003e45730 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.804 UTC [cauthdsl] func2 -> DEBU 378b 0xc003e45730 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.804 UTC [msp.identity] Verify -> DEBU 378c Verify: digest = 00000000 fc 1f c6 af f1 09 c1 d0 4a b5 09 e6 5c df 77 2d |........J...\.w-| +peer0.org1.example.com | 00000010 1f 22 26 da 6b 8d d8 07 0d 40 31 43 d3 cd 49 ed |."&.k....@1C..I.|" +peer0.org1.example.com | "2019-04-22 06:17:48.805 UTC [msp.identity] Verify -> DEBU 378d Verify: sig = 00000000 30 45 02 21 00 8d 7a b1 90 ff 9c de 83 62 34 49 |0E.!..z......b4I| +peer0.org1.example.com | 00000010 b3 ef b5 73 13 02 8d 3c be ba 91 19 74 ae 47 76 |...s...<....t.Gv| +peer0.org1.example.com | 00000020 df 99 7e 40 e9 02 20 2f fc 5a 8f d9 8b a5 87 d6 |..~@.. /.Z......| +peer0.org1.example.com | 00000030 0f 7a dc bb 37 05 94 34 95 f8 24 b8 ab e9 89 7d |.z..7..4..$....}| +peer0.org1.example.com | 00000040 03 12 6c 71 a7 c3 0c |..lq...|" +peer0.org1.example.com | "2019-04-22 06:17:48.805 UTC [cauthdsl] func2 -> DEBU 378e 0xc003e45730 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.805 UTC [cauthdsl] func1 -> DEBU 378f 0xc003e45730 gate 1555913868804255500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3790 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3791 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3792 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3793 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.806 UTC [chaincode] handleMessage -> DEBU 3794 [41633219] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:48.806 UTC [chaincode] Notify -> DEBU 3795 [41633219] notifying Txid:416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:48.806 UTC [chaincode] Execute -> DEBU 3796 Exit" +peer0.org1.example.com | "2019-04-22 06:17:48.806 UTC [endorser] callChaincode -> INFO 3797 [businesschannel][41633219] Exit chaincode: name:"qscc" (7ms)" +peer0.org1.example.com | "2019-04-22 06:17:48.807 UTC [endorser] SimulateProposal -> DEBU 3798 [businesschannel][41633219] Exit" +peer0.org1.example.com | "2019-04-22 06:17:48.807 UTC [endorser] endorseProposal -> DEBU 3799 [businesschannel][41633219] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:48.807 UTC [endorser] endorseProposal -> DEBU 379a [businesschannel][41633219] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-04-22 06:17:48.807 UTC [endorser] EndorseWithPlugin -> DEBU 379b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196, chaincode: qscc}" +peer0.org1.example.com | "2019-04-22 06:17:48.807 UTC [msp.identity] Sign -> DEBU 379c Sign: plaintext: 0A20BD521112063463736C11B375B6AA...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:48.807 UTC [msp.identity] Sign -> DEBU 379d Sign: digest: 9F8C8C903E0231FC09B86AFB3CDE2D37193D92ACA8C6E789AF5902A17D0F13BF " +peer0.org1.example.com | "2019-04-22 06:17:48.807 UTC [endorser] EndorseWithPlugin -> DEBU 379e Exiting {plugin: escc, channel: businesschannel, tx: 416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196, chaincode: qscc}" +peer0.org1.example.com | "2019-04-22 06:17:48.808 UTC [endorser] endorseProposal -> DEBU 379f [businesschannel][41633219] Exit" +peer0.org1.example.com | "2019-04-22 06:17:48.808 UTC [endorser] func1 -> DEBU 37a0 Exit: request from 192.168.224.9:49328" +peer0.org1.example.com | "2019-04-22 06:17:48.808 UTC [comm.grpc.server] 1 -> INFO 37a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49328 grpc.code=OK grpc.call_duration=12.7052ms +peer0.org1.example.com | "2019-04-22 06:17:48.812 UTC [grpc] infof -> DEBU 37a2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:48.813 UTC [grpc] infof -> DEBU 37a3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:48.871 UTC [gossip.gossip] handleMessage -> DEBU 37a4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.872 UTC [msp] DeserializeIdentity -> DEBU 37a5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.873 UTC [msp] DeserializeIdentity -> DEBU 37a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.876 UTC [msp] DeserializeIdentity -> DEBU 37a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.876 UTC [gossip.gossip] handleMessage -> DEBU 37a8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.884 UTC [gossip.gossip] handleMessage -> DEBU 37a9 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913867850368300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.884 UTC [msp] DeserializeIdentity -> DEBU 37aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.884 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ac Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ad Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.884 UTC [policies] Evaluate -> DEBU 37ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.885 UTC [policies] Evaluate -> DEBU 37af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.885 UTC [policies] Evaluate -> DEBU 37b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.886 UTC [cauthdsl] func1 -> DEBU 37b1 0xc002f0d990 gate 1555913868886218100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.886 UTC [cauthdsl] func2 -> DEBU 37b2 0xc002f0d990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.886 UTC [cauthdsl] func2 -> DEBU 37b3 0xc002f0d990 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.886 UTC [cauthdsl] func2 -> DEBU 37b4 0xc002f0d990 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.886 UTC [msp.identity] Verify -> DEBU 37b5 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:48.887 UTC [msp.identity] Verify -> DEBU 37b6 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:48.888 UTC [gossip.comm] func1 -> DEBU 37b7 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913867850368300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.890 UTC [cauthdsl] func2 -> DEBU 37b8 0xc002f0d990 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.890 UTC [cauthdsl] func1 -> DEBU 37b9 0xc002f0d990 gate 1555913868886218100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.890 UTC [policies] Evaluate -> DEBU 37ba Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.890 UTC [policies] Evaluate -> DEBU 37bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.891 UTC [policies] Evaluate -> DEBU 37bc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.891 UTC [policies] Evaluate -> DEBU 37bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.891 UTC [msp] DeserializeIdentity -> DEBU 37be Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.892 UTC [gossip.gossip] handleMessage -> DEBU 37bf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:48.892 UTC [gossip.gossip] handleMessage -> DEBU 37c0 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913867850368300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:48.892 UTC [msp] DeserializeIdentity -> DEBU 37c1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:48.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37c3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37c4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:48.893 UTC [policies] Evaluate -> DEBU 37c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.893 UTC [policies] Evaluate -> DEBU 37c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:48.893 UTC [policies] Evaluate -> DEBU 37c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:48.894 UTC [cauthdsl] func1 -> DEBU 37c8 0xc0026433a0 gate 1555913868893977600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:48.894 UTC [cauthdsl] func2 -> DEBU 37c9 0xc0026433a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:48.894 UTC [cauthdsl] func2 -> DEBU 37ca 0xc0026433a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:48.894 UTC [cauthdsl] func2 -> DEBU 37cb 0xc0026433a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.894 UTC [msp.identity] Verify -> DEBU 37cc Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:48.895 UTC [msp.identity] Verify -> DEBU 37cd Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:48.896 UTC [cauthdsl] func2 -> DEBU 37ce 0xc0026433a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:48.896 UTC [cauthdsl] func1 -> DEBU 37cf 0xc0026433a0 gate 1555913868893977600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:48.896 UTC [msp] DeserializeIdentity -> DEBU 37d4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:48.897 UTC [gossip.gossip] handleMessage -> DEBU 37d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:49.036 UTC [endorser] ProcessProposal -> DEBU 37d6 Entering: request from 192.168.224.9:49332" +peer0.org1.example.com | "2019-04-22 06:17:49.037 UTC [protoutils] ValidateProposalMessage -> DEBU 37d7 ValidateProposalMessage starts for signed proposal 0xc0031d9400" +peer0.org1.example.com | "2019-04-22 06:17:49.037 UTC [protoutils] validateChannelHeader -> DEBU 37d8 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:49.037 UTC [protoutils] checkSignatureFromCreator -> DEBU 37d9 begin" +peer0.org1.example.com | "2019-04-22 06:17:49.038 UTC [msp] GetManagerForChain -> DEBU 37da Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:49.038 UTC [protoutils] checkSignatureFromCreator -> DEBU 37db creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:49.038 UTC [protoutils] checkSignatureFromCreator -> DEBU 37dc creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:49.038 UTC [msp.identity] Verify -> DEBU 37dd Verify: digest = 00000000 a6 07 04 5b b6 eb b2 0d 88 fd 0c 22 1a f3 a8 d6 |...[......."....| +peer0.org1.example.com | 00000010 9a b9 36 af 51 05 f4 8c e5 0d c7 b3 b8 e8 e7 23 |..6.Q..........#|" +peer0.org1.example.com | "2019-04-22 06:17:49.039 UTC [msp.identity] Verify -> DEBU 37de Verify: sig = 00000000 30 44 02 20 48 b8 3e fc 84 ef 9c a3 16 05 85 97 |0D. H.>.........| +peer0.org1.example.com | 00000010 cc 31 88 3a 0c b6 b2 86 ee b5 32 2a 77 11 74 87 |.1.:......2*w.t.| +peer0.org1.example.com | 00000020 37 1d ef d8 02 20 48 bb 70 68 95 b4 89 07 c1 74 |7.... H.ph.....t| +peer0.org1.example.com | 00000030 63 b4 44 11 e9 99 b1 6c 38 a0 68 a2 13 83 d9 9b |c.D....l8.h.....| +peer0.org1.example.com | 00000040 2f 14 d7 9a 94 2c |/....,|" +peer0.org1.example.com | "2019-04-22 06:17:49.039 UTC [protoutils] checkSignatureFromCreator -> DEBU 37df exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:49.040 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 37e0 validateChaincodeProposalMessage starts for proposal 0xc000180c40, header 0xc0031d9860" +peer0.org1.example.com | "2019-04-22 06:17:49.040 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 37e1 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:49.040 UTC [endorser] preProcess -> DEBU 37e2 [businesschannel][c26bd59b] processing txid: c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d" +peer0.org1.example.com | "2019-04-22 06:17:49.040 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 37e3 retrieveTransactionByID() - txId = [c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d]" +peer0.org1.example.com | "2019-04-22 06:17:49.041 UTC [endorser] SimulateProposal -> DEBU 37e4 [businesschannel][c26bd59b] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:49.041 UTC [endorser] callChaincode -> INFO 37e5 [businesschannel][c26bd59b] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:49.041 UTC [chaincode] Execute -> DEBU 37e6 Entry" +peer0.org1.example.com | "2019-04-22 06:17:49.042 UTC [qscc] Invoke -> DEBU 37e7 Invoke function: GetBlockByNumber on chain: businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:49.042 UTC [aclmgmt] CheckACL -> DEBU 37e8 acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +peer0.org1.example.com | "2019-04-22 06:17:49.042 UTC [aclmgmt] CheckACL -> DEBU 37e9 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:17:49.043 UTC [policies] Evaluate -> DEBU 37ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:49.043 UTC [policies] Evaluate -> DEBU 37eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:49.044 UTC [policies] Evaluate -> DEBU 37ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:49.044 UTC [cauthdsl] func1 -> DEBU 37ed 0xc00360fd90 gate 1555913869044479000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:49.044 UTC [cauthdsl] func2 -> DEBU 37ee 0xc00360fd90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:49.044 UTC [cauthdsl] func2 -> DEBU 37ef 0xc00360fd90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:49.045 UTC [cauthdsl] func2 -> DEBU 37f0 0xc00360fd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:49.045 UTC [cauthdsl] func2 -> DEBU 37f1 0xc00360fd90 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:49.045 UTC [cauthdsl] func1 -> DEBU 37f2 0xc00360fd90 gate 1555913869044479000 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:49.045 UTC [policies] Evaluate -> DEBU 37f3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:49.045 UTC [policies] Evaluate -> DEBU 37f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:49.046 UTC [policies] Evaluate -> DEBU 37f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:49.046 UTC [cauthdsl] func1 -> DEBU 37f6 0xc0027065d0 gate 1555913869046665400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:49.046 UTC [cauthdsl] func2 -> DEBU 37f7 0xc0027065d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:49.046 UTC [cauthdsl] func2 -> DEBU 37f8 0xc0027065d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:49.047 UTC [cauthdsl] func2 -> DEBU 37f9 0xc0027065d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:49.047 UTC [msp.identity] Verify -> DEBU 37fa Verify: digest = 00000000 a6 07 04 5b b6 eb b2 0d 88 fd 0c 22 1a f3 a8 d6 |...[......."....| +peer0.org1.example.com | 00000010 9a b9 36 af 51 05 f4 8c e5 0d c7 b3 b8 e8 e7 23 |..6.Q..........#|" +peer0.org1.example.com | "2019-04-22 06:17:49.048 UTC [msp.identity] Verify -> DEBU 37fb Verify: sig = 00000000 30 44 02 20 48 b8 3e fc 84 ef 9c a3 16 05 85 97 |0D. H.>.........| +peer0.org1.example.com | 00000010 cc 31 88 3a 0c b6 b2 86 ee b5 32 2a 77 11 74 87 |.1.:......2*w.t.| +peer0.org1.example.com | 00000020 37 1d ef d8 02 20 48 bb 70 68 95 b4 89 07 c1 74 |7.... H.ph.....t| +peer0.org1.example.com | 00000030 63 b4 44 11 e9 99 b1 6c 38 a0 68 a2 13 83 d9 9b |c.D....l8.h.....| +peer0.org1.example.com | 00000040 2f 14 d7 9a 94 2c |/....,|" +peer0.org1.example.com | "2019-04-22 06:17:49.048 UTC [cauthdsl] func2 -> DEBU 37fc 0xc0027065d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:49.048 UTC [cauthdsl] func1 -> DEBU 37fd 0xc0027065d0 gate 1555913869046665400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:49.049 UTC [policies] Evaluate -> DEBU 37fe Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:49.049 UTC [policies] Evaluate -> DEBU 37ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:49.050 UTC [policies] Evaluate -> DEBU 3800 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:49.050 UTC [policies] Evaluate -> DEBU 3801 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:49.050 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 3802 retrieveBlockByNumber() - blockNum = [2]" +peer0.org1.example.com | "2019-04-22 06:17:49.050 UTC [fsblkstorage] newBlockfileStream -> DEBU 3803 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47629]" +peer0.org1.example.com | "2019-04-22 06:17:49.051 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 3804 Remaining bytes=[51046], Going to peek [8] bytes" +peer0.org1.example.com | "2019-04-22 06:17:49.051 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 3805 Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47629], bytesOffset=[47632]}" +peer0.org1.example.com | "2019-04-22 06:17:49.051 UTC [chaincode] handleMessage -> DEBU 3806 [c26bd59b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:49.052 UTC [chaincode] Notify -> DEBU 3807 [c26bd59b] notifying Txid:c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:49.052 UTC [chaincode] Execute -> DEBU 3808 Exit" +peer0.org1.example.com | "2019-04-22 06:17:49.052 UTC [endorser] callChaincode -> INFO 3809 [businesschannel][c26bd59b] Exit chaincode: name:"qscc" (11ms)" +peer0.org1.example.com | "2019-04-22 06:17:49.052 UTC [endorser] SimulateProposal -> DEBU 380a [businesschannel][c26bd59b] Exit" +peer0.org1.example.com | "2019-04-22 06:17:49.053 UTC [endorser] endorseProposal -> DEBU 380b [businesschannel][c26bd59b] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:17:49.053 UTC [endorser] endorseProposal -> DEBU 380c [businesschannel][c26bd59b] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-04-22 06:17:49.053 UTC [endorser] EndorseWithPlugin -> DEBU 380d Entering endorsement for {plugin: escc, channel: businesschannel, tx: c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d, chaincode: qscc}" +peer0.org1.example.com | "2019-04-22 06:17:49.054 UTC [msp.identity] Sign -> DEBU 380e Sign: plaintext: 0A20F222D9CD97ADC98EB20A33DE5951...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:49.054 UTC [msp.identity] Sign -> DEBU 380f Sign: digest: A0881B2A45EA0D1E55B948650541B204BEAE70D11D33D2177373BF0B11606539 " +peer0.org1.example.com | "2019-04-22 06:17:49.055 UTC [endorser] EndorseWithPlugin -> DEBU 3810 Exiting {plugin: escc, channel: businesschannel, tx: c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d, chaincode: qscc}" +peer0.org1.example.com | "2019-04-22 06:17:49.055 UTC [endorser] endorseProposal -> DEBU 3811 [businesschannel][c26bd59b] Exit" +peer0.org1.example.com | "2019-04-22 06:17:49.056 UTC [endorser] func1 -> DEBU 3812 Exit: request from 192.168.224.9:49332" +peer0.org1.example.com | "2019-04-22 06:17:49.056 UTC [comm.grpc.server] 1 -> INFO 3813 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49332 grpc.code=OK grpc.call_duration=20.8717ms +peer0.org1.example.com | "2019-04-22 06:17:49.062 UTC [grpc] infof -> DEBU 3814 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:49.063 UTC [grpc] infof -> DEBU 3815 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:50.089 UTC [gossip.comm] func1 -> DEBU 3816 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.098 UTC [gossip.gossip] handleMessage -> DEBU 3817 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.098 UTC [msp] DeserializeIdentity -> DEBU 3818 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.099 UTC [msp] DeserializeIdentity -> DEBU 3819 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.100 UTC [msp] DeserializeIdentity -> DEBU 381a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.100 UTC [gossip.gossip] handleMessage -> DEBU 381b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.126 UTC [gossip.comm] func1 -> DEBU 381c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913867848776500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [gossip.gossip] handleMessage -> DEBU 381d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913867848776500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [msp] DeserializeIdentity -> DEBU 381e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 381f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3820 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3821 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [policies] Evaluate -> DEBU 3822 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [policies] Evaluate -> DEBU 3823 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [policies] Evaluate -> DEBU 3824 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [cauthdsl] func1 -> DEBU 3825 0xc003a27a70 gate 1555913870127748100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [cauthdsl] func2 -> DEBU 3826 0xc003a27a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [cauthdsl] func2 -> DEBU 3827 0xc003a27a70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [cauthdsl] func2 -> DEBU 3828 0xc003a27a70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:50.127 UTC [msp.identity] Verify -> DEBU 3829 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [msp.identity] Verify -> DEBU 382a Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [cauthdsl] func2 -> DEBU 382b 0xc003a27a70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [cauthdsl] func1 -> DEBU 382c 0xc003a27a70 gate 1555913870127748100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 382d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 382e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 382f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 3830 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [msp] DeserializeIdentity -> DEBU 3831 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.128 UTC [gossip.gossip] handleMessage -> DEBU 3832 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.654 UTC [endorser] ProcessProposal -> DEBU 3833 Entering: request from 192.168.224.9:49336" +peer0.org1.example.com | "2019-04-22 06:17:50.654 UTC [protoutils] ValidateProposalMessage -> DEBU 3834 ValidateProposalMessage starts for signed proposal 0xc003356550" +peer0.org1.example.com | "2019-04-22 06:17:50.654 UTC [protoutils] validateChannelHeader -> DEBU 3835 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:50.654 UTC [protoutils] checkSignatureFromCreator -> DEBU 3836 begin" +peer0.org1.example.com | "2019-04-22 06:17:50.654 UTC [msp] GetManagerForChain -> DEBU 3837 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:50.655 UTC [protoutils] checkSignatureFromCreator -> DEBU 3838 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:50.655 UTC [protoutils] checkSignatureFromCreator -> DEBU 3839 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:50.655 UTC [msp.identity] Verify -> DEBU 383a Verify: digest = 00000000 d4 ee 40 c1 7d af 9a f3 d2 91 32 65 93 44 bc 5b |..@.}.....2e.D.[| +peer0.org1.example.com | 00000010 8e cf 06 50 a4 aa b2 9d cc 56 0a a9 17 92 f7 f4 |...P.....V......|" +peer0.org1.example.com | "2019-04-22 06:17:50.656 UTC [msp.identity] Verify -> DEBU 383b Verify: sig = 00000000 30 45 02 21 00 fa 99 2b 79 a6 bf c2 3b 82 c7 61 |0E.!...+y...;..a| +peer0.org1.example.com | 00000010 5f cc 32 af ac 65 ca 35 29 76 bc ea 01 4c 7f c9 |_.2..e.5)v...L..| +peer0.org1.example.com | 00000020 ac bc 40 ba c4 02 20 03 e3 65 34 15 6c 62 ef f1 |..@... ..e4.lb..| +peer0.org1.example.com | 00000030 d1 11 07 32 9f 36 54 6a 05 4c 30 a7 96 ab 9e b6 |...2.6Tj.L0.....| +peer0.org1.example.com | 00000040 53 1d 31 5a 52 c4 2b |S.1ZR.+|" +peer0.org1.example.com | "2019-04-22 06:17:50.657 UTC [protoutils] checkSignatureFromCreator -> DEBU 383c exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:50.657 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 383d validateChaincodeProposalMessage starts for proposal 0xc0001d0770, header 0xc0033569b0" +peer0.org1.example.com | "2019-04-22 06:17:50.657 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 383e validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:50.657 UTC [endorser] preProcess -> DEBU 383f [businesschannel][a5dbf721] processing txid: a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94" +peer0.org1.example.com | "2019-04-22 06:17:50.658 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3840 retrieveTransactionByID() - txId = [a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94]" +peer0.org1.example.com | "2019-04-22 06:17:50.658 UTC [endorser] SimulateProposal -> DEBU 3841 [businesschannel][a5dbf721] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:50.658 UTC [endorser] callChaincode -> INFO 3842 [businesschannel][a5dbf721] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:50.658 UTC [chaincode] Execute -> DEBU 3843 Entry" +peer0.org1.example.com | "2019-04-22 06:17:50.659 UTC [cscc] Invoke -> DEBU 3844 Invoke function: GetConfigBlock" +peer0.org1.example.com | "2019-04-22 06:17:50.659 UTC [aclmgmt] CheckACL -> DEBU 3845 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +peer0.org1.example.com | "2019-04-22 06:17:50.659 UTC [aclmgmt] CheckACL -> DEBU 3846 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:17:50.660 UTC [policies] Evaluate -> DEBU 3847 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:50.660 UTC [policies] Evaluate -> DEBU 3848 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:50.660 UTC [policies] Evaluate -> DEBU 3849 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:50.660 UTC [cauthdsl] func1 -> DEBU 384a 0xc0024a8b80 gate 1555913870660922200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:50.661 UTC [cauthdsl] func2 -> DEBU 384b 0xc0024a8b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:50.661 UTC [cauthdsl] func2 -> DEBU 384c 0xc0024a8b80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:50.662 UTC [cauthdsl] func2 -> DEBU 384d 0xc0024a8b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:50.662 UTC [cauthdsl] func2 -> DEBU 384e 0xc0024a8b80 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:50.662 UTC [cauthdsl] func1 -> DEBU 384f 0xc0024a8b80 gate 1555913870660922200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:50.663 UTC [policies] Evaluate -> DEBU 3850 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.663 UTC [policies] Evaluate -> DEBU 3851 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.664 UTC [policies] Evaluate -> DEBU 3852 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:50.664 UTC [cauthdsl] func1 -> DEBU 3853 0xc0024a93c0 gate 1555913870664332700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:50.664 UTC [cauthdsl] func2 -> DEBU 3854 0xc0024a93c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:50.664 UTC [cauthdsl] func2 -> DEBU 3855 0xc0024a93c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:50.665 UTC [cauthdsl] func2 -> DEBU 3856 0xc0024a93c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:50.665 UTC [msp.identity] Verify -> DEBU 3857 Verify: digest = 00000000 d4 ee 40 c1 7d af 9a f3 d2 91 32 65 93 44 bc 5b |..@.}.....2e.D.[| +peer0.org1.example.com | 00000010 8e cf 06 50 a4 aa b2 9d cc 56 0a a9 17 92 f7 f4 |...P.....V......|" +peer0.org1.example.com | "2019-04-22 06:17:50.665 UTC [msp.identity] Verify -> DEBU 3858 Verify: sig = 00000000 30 45 02 21 00 fa 99 2b 79 a6 bf c2 3b 82 c7 61 |0E.!...+y...;..a| +peer0.org1.example.com | 00000010 5f cc 32 af ac 65 ca 35 29 76 bc ea 01 4c 7f c9 |_.2..e.5)v...L..| +peer0.org1.example.com | 00000020 ac bc 40 ba c4 02 20 03 e3 65 34 15 6c 62 ef f1 |..@... ..e4.lb..| +peer0.org1.example.com | 00000030 d1 11 07 32 9f 36 54 6a 05 4c 30 a7 96 ab 9e b6 |...2.6Tj.L0.....| +peer0.org1.example.com | 00000040 53 1d 31 5a 52 c4 2b |S.1ZR.+|" +peer0.org1.example.com | "2019-04-22 06:17:50.666 UTC [cauthdsl] func2 -> DEBU 3859 0xc0024a93c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:50.666 UTC [cauthdsl] func1 -> DEBU 385a 0xc0024a93c0 gate 1555913870664332700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:50.666 UTC [policies] Evaluate -> DEBU 385b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.666 UTC [policies] Evaluate -> DEBU 385c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.666 UTC [policies] Evaluate -> DEBU 385d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.667 UTC [policies] Evaluate -> DEBU 385e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.667 UTC [chaincode] handleMessage -> DEBU 385f [a5dbf721] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:50.667 UTC [chaincode] Notify -> DEBU 3860 [a5dbf721] notifying Txid:a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:50.667 UTC [chaincode] Execute -> DEBU 3861 Exit" +peer0.org1.example.com | "2019-04-22 06:17:50.668 UTC [endorser] callChaincode -> INFO 3862 [businesschannel][a5dbf721] Exit chaincode: name:"cscc" (9ms)" +peer0.org1.example.com | "2019-04-22 06:17:50.668 UTC [endorser] SimulateProposal -> DEBU 3863 [businesschannel][a5dbf721] Exit" +peer0.org1.example.com | "2019-04-22 06:17:50.668 UTC [endorser] endorseProposal -> DEBU 3864 [businesschannel][a5dbf721] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:50.668 UTC [endorser] endorseProposal -> DEBU 3865 [businesschannel][a5dbf721] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-04-22 06:17:50.669 UTC [endorser] EndorseWithPlugin -> DEBU 3866 Entering endorsement for {plugin: escc, channel: businesschannel, tx: a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94, chaincode: cscc}" +peer0.org1.example.com | "2019-04-22 06:17:50.669 UTC [msp.identity] Sign -> DEBU 3867 Sign: plaintext: 0A2000C9C74D2BA5F0BD1036F64C3E43...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:50.669 UTC [msp.identity] Sign -> DEBU 3868 Sign: digest: 291B739EBA8880793484A994C2EF1BDB0773A1764E354C17140143F31A775E63 " +peer0.org1.example.com | "2019-04-22 06:17:50.670 UTC [endorser] EndorseWithPlugin -> DEBU 3869 Exiting {plugin: escc, channel: businesschannel, tx: a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94, chaincode: cscc}" +peer0.org1.example.com | "2019-04-22 06:17:50.670 UTC [endorser] endorseProposal -> DEBU 386a [businesschannel][a5dbf721] Exit" +peer0.org1.example.com | "2019-04-22 06:17:50.670 UTC [endorser] func1 -> DEBU 386b Exit: request from 192.168.224.9:49336" +peer0.org1.example.com | "2019-04-22 06:17:50.670 UTC [comm.grpc.server] 1 -> INFO 386c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49336 grpc.code=OK grpc.call_duration=16.7963ms +peer0.org1.example.com | "2019-04-22 06:17:50.675 UTC [grpc] infof -> DEBU 386d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:50.677 UTC [grpc] warningf -> DEBU 386e transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49336: read: connection reset by peer" +peer0.org1.example.com | "2019-04-22 06:17:50.678 UTC [grpc] infof -> DEBU 386f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3870 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102D " +peer0.org1.example.com | "2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3871 Sign: digest: 6E41605A885339006ED7A54E4F06BBC90432C06381507F1BB7BA3E340B385B20 " +peer0.org1.example.com | "2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3872 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3873 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:50.841 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3874 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:50.846 UTC [msp] DeserializeIdentity -> DEBU 3875 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.846 UTC [msp] DeserializeIdentity -> DEBU 3876 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.847 UTC [msp] DeserializeIdentity -> DEBU 3877 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.848 UTC [gossip.comm] Send -> DEBU 3878 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 3879 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.852 UTC [gossip.comm] sendToEndpoint -> DEBU 387b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.849 UTC [msp] DeserializeIdentity -> DEBU 387a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.855 UTC [gossip.comm] Send -> DEBU 387c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.855 UTC [gossip.comm] Send -> DEBU 387d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.855 UTC [gossip.comm] sendToEndpoint -> DEBU 387e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.856 UTC [gossip.comm] sendToEndpoint -> DEBU 387f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3880 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3881 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.892 UTC [gossip.pull] Hello -> DEBU 3882 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:50.892 UTC [gossip.comm] Send -> DEBU 3883 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.893 UTC [gossip.pull] Hello -> DEBU 3884 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:50.893 UTC [gossip.comm] Send -> DEBU 3885 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.893 UTC [gossip.pull] Hello -> DEBU 3886 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:50.893 UTC [gossip.comm] Send -> DEBU 3887 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 3888 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 3889 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.899 UTC [gossip.gossip] handleMessage -> DEBU 388e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 415901031012235375 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.899 UTC [gossip.pull] HandleMessage -> DEBU 3890 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 415901031012235375 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.899 UTC [gossip.comm] func1 -> DEBU 388f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13283693601951021668 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.899 UTC [gossip.comm] func1 -> DEBU 3891 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10887226070778160143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.900 UTC [gossip.gossip] handleMessage -> DEBU 3892 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.901 UTC [gossip.gossip] handleMessage -> DEBU 3893 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13283693601951021668 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.901 UTC [gossip.pull] HandleMessage -> DEBU 3894 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13283693601951021668 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.902 UTC [gossip.gossip] handleMessage -> DEBU 3895 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.902 UTC [gossip.gossip] handleMessage -> DEBU 3896 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10887226070778160143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.903 UTC [gossip.pull] HandleMessage -> DEBU 3897 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10887226070778160143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.903 UTC [gossip.gossip] handleMessage -> DEBU 3898 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.944 UTC [msp.identity] Sign -> DEBU 3899 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102E " +peer0.org1.example.com | "2019-04-22 06:17:50.945 UTC [msp.identity] Sign -> DEBU 389a Sign: digest: 37A6BC74A66636F82D1579C60CBF3400CEAA49D7B6629D3C2B78F90B07A8659F " +peer0.org1.example.com | "2019-04-22 06:17:50.945 UTC [msp.identity] Sign -> DEBU 389b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:50.945 UTC [msp.identity] Sign -> DEBU 389c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:50.946 UTC [gossip.comm] Send -> DEBU 389d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.946 UTC [msp] DeserializeIdentity -> DEBU 389e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.946 UTC [gossip.comm] Send -> DEBU 389f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.947 UTC [msp] DeserializeIdentity -> DEBU 38a0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.947 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:50.947 UTC [gossip.comm] sendToEndpoint -> DEBU 38a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.948 UTC [gossip.comm] sendToEndpoint -> DEBU 38a3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.948 UTC [gossip.comm] sendToEndpoint -> DEBU 38a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.948 UTC [gossip.comm] sendToEndpoint -> DEBU 38a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.949 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.949 UTC [gossip.comm] sendToEndpoint -> DEBU 38a7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.952 UTC [gossip.comm] func1 -> DEBU 38a8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.953 UTC [gossip.gossip] handleMessage -> DEBU 38a9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.954 UTC [gossip.gossip] handleMessage -> DEBU 38aa Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38ac Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:50.955 UTC [msp.identity] Verify -> DEBU 38ad Verify: digest = 00000000 37 a6 bc 74 a6 66 36 f8 2d 15 79 c6 0c bf 34 00 |7..t.f6.-.y...4.| +peer0.org1.example.com | 00000010 ce aa 49 d7 b6 62 9d 3c 2b 78 f9 0b 07 a8 65 9f |..I..b.<+x....e.|" +peer0.org1.example.com | "2019-04-22 06:17:50.955 UTC [msp.identity] Verify -> DEBU 38ae Verify: sig = 00000000 30 44 02 20 4c 80 3c e8 d9 71 ae 1d 86 4f 5e 61 |0D. L.<..q...O^a| +peer0.org1.example.com | 00000010 a6 cc 83 35 6b c9 b3 e1 47 a1 14 68 9c 82 25 e1 |...5k...G..h..%.| +peer0.org1.example.com | 00000020 2c ef 52 a2 02 20 16 24 a6 43 4e eb 96 a3 76 01 |,.R.. .$.CN...v.| +peer0.org1.example.com | 00000030 e9 06 88 53 04 26 eb 79 d2 f6 71 ea f0 05 e6 0b |...S.&.y..q.....| +peer0.org1.example.com | 00000040 9d 54 75 f2 e3 63 |.Tu..c|" +peer0.org1.example.com | "2019-04-22 06:17:50.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 38af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.956 UTC [gossip.discovery] isSentByMe -> DEBU 38b0 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38b2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:50.957 UTC [msp] DeserializeIdentity -> DEBU 38b3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.957 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:50.958 UTC [policies] Evaluate -> DEBU 38b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:50.958 UTC [policies] Evaluate -> DEBU 38b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:50.958 UTC [policies] Evaluate -> DEBU 38b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:50.958 UTC [cauthdsl] func1 -> DEBU 38ba 0xc0031a1a00 gate 1555913870958488600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:50.958 UTC [cauthdsl] func2 -> DEBU 38bb 0xc0031a1a00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:50.958 UTC [cauthdsl] func2 -> DEBU 38bc 0xc0031a1a00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:50.959 UTC [cauthdsl] func2 -> DEBU 38bd 0xc0031a1a00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:50.959 UTC [msp.identity] Verify -> DEBU 38be Verify: digest = 00000000 b1 b5 c5 a8 63 a6 93 2f 94 b8 9c 74 1f 81 af 63 |....c../...t...c| +peer0.org1.example.com | 00000010 a7 8e fe 70 6a d7 ff 16 70 64 51 91 ea 4b b3 2b |...pj...pdQ..K.+|" +peer0.org1.example.com | "2019-04-22 06:17:50.959 UTC [msp.identity] Verify -> DEBU 38bf Verify: sig = 00000000 30 44 02 20 19 0e 41 2f ec f4 9a 3e 66 81 f2 67 |0D. ..A/...>f..g| +peer0.org1.example.com | 00000010 d0 a8 ae 62 b9 97 cf 97 e2 1f 8a ec 44 f6 e6 71 |...b........D..q| +peer0.org1.example.com | 00000020 9d df 27 1e 02 20 36 a7 d9 2b 1d 52 11 59 ca 21 |..'.. 6..+.R.Y.!| +peer0.org1.example.com | 00000030 be 06 0e 62 b0 8d e9 80 5b 14 9a 59 72 d4 b2 2e |...b....[..Yr...| +peer0.org1.example.com | 00000040 7e 50 8b cd c0 3f |~P...?|" +peer0.org1.example.com | "2019-04-22 06:17:50.960 UTC [cauthdsl] func2 -> DEBU 38c0 0xc0031a1a00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:50.960 UTC [cauthdsl] func1 -> DEBU 38c1 0xc0031a1a00 gate 1555913870958488600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:50.960 UTC [policies] Evaluate -> DEBU 38c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.960 UTC [policies] Evaluate -> DEBU 38c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.961 UTC [policies] Evaluate -> DEBU 38c4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.961 UTC [policies] Evaluate -> DEBU 38c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:50.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 38c6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 38c7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38c8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:50.961 UTC [gossip.comm] func1 -> DEBU 38c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.963 UTC [gossip.gossip] handleMessage -> DEBU 38cb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.962 UTC [msp.identity] Verify -> DEBU 38ca Verify: digest = 00000000 2b b1 63 6e 73 d8 c5 ee aa d2 82 9b 6f 99 a7 4d |+.cns.......o..M| +peer0.org1.example.com | 00000010 fe c9 bf 86 c9 7f 47 8e fd 35 38 7b 19 26 e6 1d |......G..58{.&..|" +peer0.org1.example.com | "2019-04-22 06:17:50.964 UTC [msp.identity] Verify -> DEBU 38cc Verify: sig = 00000000 30 45 02 21 00 a5 fe 1f aa f0 5b cc 3f 73 c1 05 |0E.!......[.?s..| +peer0.org1.example.com | 00000010 a2 f6 40 94 7e b5 35 00 ce de 68 f8 b2 df 3c 77 |..@.~.5...h... DEBU 38cd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ce Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.966 UTC [gossip.gossip] handleMessage -> DEBU 38d0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.967 UTC [gossip.gossip] handleMessage -> DEBU 38d1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.967 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38d3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:50.967 UTC [msp.identity] Verify -> DEBU 38d4 Verify: digest = 00000000 37 a6 bc 74 a6 66 36 f8 2d 15 79 c6 0c bf 34 00 |7..t.f6.-.y...4.| +peer0.org1.example.com | 00000010 ce aa 49 d7 b6 62 9d 3c 2b 78 f9 0b 07 a8 65 9f |..I..b.<+x....e.|" +peer0.org1.example.com | "2019-04-22 06:17:50.968 UTC [msp.identity] Verify -> DEBU 38d5 Verify: sig = 00000000 30 44 02 20 4c 80 3c e8 d9 71 ae 1d 86 4f 5e 61 |0D. L.<..q...O^a| +peer0.org1.example.com | 00000010 a6 cc 83 35 6b c9 b3 e1 47 a1 14 68 9c 82 25 e1 |...5k...G..h..%.| +peer0.org1.example.com | 00000020 2c ef 52 a2 02 20 16 24 a6 43 4e eb 96 a3 76 01 |,.R.. .$.CN...v.| +peer0.org1.example.com | 00000030 e9 06 88 53 04 26 eb 79 d2 f6 71 ea f0 05 e6 0b |...S.&.y..q.....| +peer0.org1.example.com | 00000040 9d 54 75 f2 e3 63 |.Tu..c|" +peer0.org1.example.com | "2019-04-22 06:17:50.969 UTC [msp.identity] Verify -> DEBU 38d6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:50.970 UTC [msp.identity] Verify -> DEBU 38d7 Verify: sig = 00000000 30 45 02 21 00 cb ea 59 2a cf fa e4 d3 8f fe eb |0E.!...Y*.......| +peer0.org1.example.com | 00000010 cc 10 bd 8d 92 4d 5b 61 f1 82 05 89 03 69 be 32 |.....M[a.....i.2| +peer0.org1.example.com | 00000020 00 da e4 f9 3d 02 20 2f c0 67 de 50 c0 98 6c a3 |....=. /.g.P..l.| +peer0.org1.example.com | 00000030 0b 10 2b 93 4b 43 6e 7b 59 30 aa 73 08 b7 4c 72 |..+.KCn{Y0.s..Lr| +peer0.org1.example.com | 00000040 0f 75 01 c8 ce bc cb |.u.....|" +peer0.org1.example.com | "2019-04-22 06:17:50.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.977 UTC [gossip.discovery] isSentByMe -> DEBU 38d9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 38da Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38db Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.980 UTC [gossip.gossip] handleMessage -> DEBU 38dc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.982 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38de Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:50.982 UTC [msp.identity] Verify -> DEBU 38df Verify: digest = 00000000 2b b1 63 6e 73 d8 c5 ee aa d2 82 9b 6f 99 a7 4d |+.cns.......o..M| +peer0.org1.example.com | 00000010 fe c9 bf 86 c9 7f 47 8e fd 35 38 7b 19 26 e6 1d |......G..58{.&..|" +peer0.org1.example.com | "2019-04-22 06:17:50.983 UTC [msp.identity] Verify -> DEBU 38e0 Verify: sig = 00000000 30 45 02 21 00 a5 fe 1f aa f0 5b cc 3f 73 c1 05 |0E.!......[.?s..| +peer0.org1.example.com | 00000010 a2 f6 40 94 7e b5 35 00 ce de 68 f8 b2 df 3c 77 |..@.~.5...h... DEBU 38e1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.983 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.984 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:50.986 UTC [msp.identity] Verify -> DEBU 38e4 Verify: digest = 00000000 37 a6 bc 74 a6 66 36 f8 2d 15 79 c6 0c bf 34 00 |7..t.f6.-.y...4.| +peer0.org1.example.com | 00000010 ce aa 49 d7 b6 62 9d 3c 2b 78 f9 0b 07 a8 65 9f |..I..b.<+x....e.|" +peer0.org1.example.com | "2019-04-22 06:17:50.986 UTC [msp.identity] Verify -> DEBU 38e5 Verify: sig = 00000000 30 44 02 20 4c 80 3c e8 d9 71 ae 1d 86 4f 5e 61 |0D. L.<..q...O^a| +peer0.org1.example.com | 00000010 a6 cc 83 35 6b c9 b3 e1 47 a1 14 68 9c 82 25 e1 |...5k...G..h..%.| +peer0.org1.example.com | 00000020 2c ef 52 a2 02 20 16 24 a6 43 4e eb 96 a3 76 01 |,.R.. .$.CN...v.| +peer0.org1.example.com | 00000030 e9 06 88 53 04 26 eb 79 d2 f6 71 ea f0 05 e6 0b |...S.&.y..q.....| +peer0.org1.example.com | 00000040 9d 54 75 f2 e3 63 |.Tu..c|" +peer0.org1.example.com | "2019-04-22 06:17:50.988 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.993 UTC [gossip.discovery] isSentByMe -> DEBU 38e7 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:50.994 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:50.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e9 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:50.996 UTC [msp] DeserializeIdentity -> DEBU 38ea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:50.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38eb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:50.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ec Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:50.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ed Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:50.999 UTC [endorser] ProcessProposal -> DEBU 38ee Entering: request from 192.168.224.9:49340" +peer0.org1.example.com | "2019-04-22 06:17:50.999 UTC [protoutils] ValidateProposalMessage -> DEBU 38ef ValidateProposalMessage starts for signed proposal 0xc003dd00a0" +peer0.org1.example.com | "2019-04-22 06:17:50.999 UTC [protoutils] validateChannelHeader -> DEBU 38f0 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:51.000 UTC [protoutils] checkSignatureFromCreator -> DEBU 38f1 begin" +peer0.org1.example.com | "2019-04-22 06:17:51.000 UTC [msp] GetManagerForChain -> DEBU 38f2 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:51.001 UTC [protoutils] checkSignatureFromCreator -> DEBU 38f3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:51.001 UTC [protoutils] checkSignatureFromCreator -> DEBU 38f4 creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:51.001 UTC [msp.identity] Verify -> DEBU 38f5 Verify: digest = 00000000 65 ca 6a 2d b4 87 ba 2a c6 2e 31 e2 6e cc b6 7b |e.j-...*..1.n..{| +peer0.org1.example.com | 00000010 9c 0d d7 3f 83 34 af e2 62 68 2b 13 83 79 25 89 |...?.4..bh+..y%.|" +peer0.org1.example.com | "2019-04-22 06:17:51.001 UTC [msp.identity] Verify -> DEBU 38f6 Verify: sig = 00000000 30 45 02 21 00 f1 1d 55 13 84 a1 39 b0 30 1b 7c |0E.!...U...9.0.|| +peer0.org1.example.com | 00000010 a1 a1 df 2a fc 3c 63 42 43 4c 38 99 ae 43 e7 c6 |...*. DEBU 38f7 exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:51.002 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 38f8 validateChaincodeProposalMessage starts for proposal 0xc000154770, header 0xc003dd04b0" +peer0.org1.example.com | "2019-04-22 06:17:51.002 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 38f9 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.002 UTC [endorser] preProcess -> DEBU 38fa [businesschannel][7bea3458] processing txid: 7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea" +peer0.org1.example.com | "2019-04-22 06:17:51.003 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 38fb retrieveTransactionByID() - txId = [7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea]" +peer0.org1.example.com | "2019-04-22 06:17:51.003 UTC [endorser] SimulateProposal -> DEBU 38fc [businesschannel][7bea3458] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.003 UTC [endorser] callChaincode -> INFO 38fd [businesschannel][7bea3458] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.003 UTC [chaincode] Execute -> DEBU 38fe Entry" +peer0.org1.example.com | "2019-04-22 06:17:51.004 UTC [cscc] Invoke -> DEBU 38ff Invoke function: GetChannels" +peer0.org1.example.com | "2019-04-22 06:17:51.004 UTC [msp.identity] Verify -> DEBU 3900 Verify: digest = 00000000 65 ca 6a 2d b4 87 ba 2a c6 2e 31 e2 6e cc b6 7b |e.j-...*..1.n..{| +peer0.org1.example.com | 00000010 9c 0d d7 3f 83 34 af e2 62 68 2b 13 83 79 25 89 |...?.4..bh+..y%.|" +peer0.org1.example.com | "2019-04-22 06:17:51.005 UTC [msp.identity] Verify -> DEBU 3901 Verify: sig = 00000000 30 45 02 21 00 f1 1d 55 13 84 a1 39 b0 30 1b 7c |0E.!...U...9.0.|| +peer0.org1.example.com | 00000010 a1 a1 df 2a fc 3c 63 42 43 4c 38 99 ae 43 e7 c6 |...*. DEBU 3902 [7bea3458] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:51.006 UTC [chaincode] Notify -> DEBU 3903 [7bea3458] notifying Txid:7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:51.006 UTC [chaincode] Execute -> DEBU 3904 Exit" +peer0.org1.example.com | "2019-04-22 06:17:51.006 UTC [endorser] callChaincode -> INFO 3905 [businesschannel][7bea3458] Exit chaincode: name:"cscc" (3ms)" +peer0.org1.example.com | "2019-04-22 06:17:51.007 UTC [endorser] SimulateProposal -> DEBU 3906 [businesschannel][7bea3458] Exit" +peer0.org1.example.com | "2019-04-22 06:17:51.007 UTC [endorser] endorseProposal -> DEBU 3907 [businesschannel][7bea3458] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.007 UTC [endorser] endorseProposal -> DEBU 3908 [businesschannel][7bea3458] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-04-22 06:17:51.007 UTC [endorser] EndorseWithPlugin -> DEBU 3909 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea, chaincode: cscc}" +peer0.org1.example.com | "2019-04-22 06:17:51.008 UTC [msp.identity] Sign -> DEBU 390a Sign: plaintext: 0A2049D50BDCD47ECC35185A8278470B...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:51.008 UTC [msp.identity] Sign -> DEBU 390b Sign: digest: EB336AB5DF20494F74831E248A653D482037D0E7D17DC601E5904D8EE6D4C962 " +peer0.org1.example.com | "2019-04-22 06:17:51.008 UTC [endorser] EndorseWithPlugin -> DEBU 390c Exiting {plugin: escc, channel: businesschannel, tx: 7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea, chaincode: cscc}" +peer0.org1.example.com | "2019-04-22 06:17:51.008 UTC [endorser] endorseProposal -> DEBU 390d [businesschannel][7bea3458] Exit" +peer0.org1.example.com | "2019-04-22 06:17:51.008 UTC [endorser] func1 -> DEBU 390e Exit: request from 192.168.224.9:49340" +peer0.org1.example.com | "2019-04-22 06:17:51.008 UTC [comm.grpc.server] 1 -> INFO 390f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49340 grpc.code=OK grpc.call_duration=9.6855ms +peer0.org1.example.com | "2019-04-22 06:17:50.998 UTC [policies] Evaluate -> DEBU 3910 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.009 UTC [policies] Evaluate -> DEBU 3911 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:51.009 UTC [policies] Evaluate -> DEBU 3912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.009 UTC [cauthdsl] func1 -> DEBU 3913 0xc003d22490 gate 1555913871009964300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3914 0xc003d22490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3915 0xc003d22490 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3916 0xc003d22490 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [msp.identity] Verify -> DEBU 3917 Verify: digest = 00000000 ae a5 a9 8f ea 8d 5d d3 33 2a de 80 86 54 36 87 |......].3*...T6.| +peer0.org1.example.com | 00000010 1b 36 4c 92 a6 76 93 49 0d c4 77 47 28 3c 3b e5 |.6L..v.I..wG(<;.|" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [msp.identity] Verify -> DEBU 3918 Verify: sig = 00000000 30 45 02 21 00 80 33 4e 3a 4d d8 73 bc e7 b7 64 |0E.!..3N:M.s...d| +peer0.org1.example.com | 00000010 35 f1 07 3e 86 a4 4d 3b 7e 4c cd 90 ff 14 22 32 |5..>..M;~L...."2| +peer0.org1.example.com | 00000020 5c 4e 9e e3 fa 02 20 45 53 7c 0d e2 2a 43 c1 52 |\N.... ES|..*C.R| +peer0.org1.example.com | 00000030 e2 8d 5a 26 64 07 bc 74 be a9 9d 11 1b ef 9b a6 |..Z&d..t........| +peer0.org1.example.com | 00000040 01 74 1c b6 21 55 0b |.t..!U.|" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3919 0xc003d22490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [cauthdsl] func1 -> DEBU 391a 0xc003d22490 gate 1555913871009964300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.011 UTC [gossip.discovery] handleAliveMessage -> DEBU 391f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.011 UTC [gossip.discovery] handleAliveMessage -> DEBU 3920 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3921 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.017 UTC [grpc] infof -> DEBU 3922 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:51.017 UTC [grpc] infof -> DEBU 3923 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:51.122 UTC [gossip.comm] func1 -> DEBU 3924 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.122 UTC [gossip.gossip] handleMessage -> DEBU 3925 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.124 UTC [gossip.gossip] handleMessage -> DEBU 3926 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.124 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3927 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3928 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:51.125 UTC [msp.identity] Verify -> DEBU 3929 Verify: digest = 00000000 b1 f6 17 03 8a 8a 86 a8 e7 78 e8 a8 99 83 7a ab |.........x....z.| +peer0.org1.example.com | 00000010 fe 9b 7c 17 62 67 ab bd c3 a8 11 95 f9 53 8e 68 |..|.bg.......S.h|" +peer0.org1.example.com | "2019-04-22 06:17:51.125 UTC [msp.identity] Verify -> DEBU 392a Verify: sig = 00000000 30 45 02 21 00 8a f4 ea a4 da 2a b9 ea 1f 8c 5c |0E.!......*....\| +peer0.org1.example.com | 00000010 a1 9b fe 0d 2d 68 87 d4 45 a4 d4 f6 1a 85 8d ac |....-h..E.......| +peer0.org1.example.com | 00000020 a4 b8 c4 e1 08 02 20 30 e8 9c 0b 79 89 7c 73 7e |...... 0...y.|s~| +peer0.org1.example.com | 00000030 ef 25 f1 d2 10 fc d0 22 e4 73 46 bf 19 d9 c6 61 |.%.....".sF....a| +peer0.org1.example.com | 00000040 8e e3 54 40 7c 76 ab |..T@|v.|" +peer0.org1.example.com | "2019-04-22 06:17:51.126 UTC [msp.identity] Verify -> DEBU 392b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:51.126 UTC [msp.identity] Verify -> DEBU 392c Verify: sig = 00000000 30 45 02 21 00 c1 61 b7 39 6e 98 44 5f 5e 53 03 |0E.!..a.9n.D_^S.| +peer0.org1.example.com | 00000010 3c af 18 ca 84 65 96 e9 58 d9 5c a1 33 db c0 c3 |<....e..X.\.3...| +peer0.org1.example.com | 00000020 dd e7 88 00 75 02 20 7f b6 57 72 6e 61 61 e3 97 |....u. ..Wrnaa..| +peer0.org1.example.com | 00000030 e9 2a 12 91 10 8c d9 00 00 c4 40 22 6a 52 f9 47 |.*........@"jR.G| +peer0.org1.example.com | 00000040 b7 e7 f7 ef bd a7 2e |.......|" +peer0.org1.example.com | "2019-04-22 06:17:51.127 UTC [gossip.discovery] handleAliveMessage -> DEBU 392d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 392e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:51.130 UTC [gossip.discovery] learnExistingMembers -> DEBU 392f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 " +peer0.org1.example.com | "2019-04-22 06:17:51.130 UTC [gossip.discovery] learnExistingMembers -> DEBU 3930 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 " +peer0.org1.example.com | "2019-04-22 06:17:51.131 UTC [gossip.discovery] learnExistingMembers -> DEBU 3931 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:51.131 UTC [gossip.discovery] learnExistingMembers -> DEBU 3932 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.131 UTC [gossip.discovery] handleAliveMessage -> DEBU 3933 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.131 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3934 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.133 UTC [gossip.comm] func1 -> DEBU 3935 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.133 UTC [gossip.gossip] handleMessage -> DEBU 3936 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.133 UTC [gossip.gossip] handleMessage -> DEBU 3937 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.134 UTC [msp] DeserializeIdentity -> DEBU 3938 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.134 UTC [msp] DeserializeIdentity -> DEBU 3939 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.135 UTC [msp] DeserializeIdentity -> DEBU 393a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.135 UTC [gossip.comm] Send -> DEBU 393b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:51.136 UTC [msp] DeserializeIdentity -> DEBU 393c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.136 UTC [gossip.comm] Send -> DEBU 393d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:51.137 UTC [gossip.comm] sendToEndpoint -> DEBU 393e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.140 UTC [gossip.comm] sendToEndpoint -> DEBU 393f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.141 UTC [gossip.gossip] handleMessage -> DEBU 3940 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3941 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3942 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.143 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3943 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3947 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.144 UTC [gossip.gossip] handleMessage -> DEBU 3944 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.144 UTC [gossip.comm] sendToEndpoint -> DEBU 3945 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.145 UTC [gossip.comm] func1 -> DEBU 3946 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.147 UTC [gossip.gossip] handleMessage -> DEBU 3949 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.148 UTC [gossip.pull] HandleMessage -> DEBU 394a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.146 UTC [gossip.comm] sendToEndpoint -> DEBU 3948 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.149 UTC [gossip.pull] SendDigest -> DEBU 394b Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:51.150 UTC [gossip.gossip] handleMessage -> DEBU 394c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.167 UTC [gossip.comm] func1 -> DEBU 394d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.168 UTC [gossip.gossip] handleMessage -> DEBU 394e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.169 UTC [gossip.gossip] handleMessage -> DEBU 394f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3950 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3951 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:51.172 UTC [msp.identity] Verify -> DEBU 3952 Verify: digest = 00000000 37 97 30 9b 46 bc db ea 6a 7f f2 81 88 00 fb b7 |7.0.F...j.......| +peer0.org1.example.com | 00000010 2e 47 8b a0 17 d2 c6 88 c0 76 c6 13 88 55 77 5b |.G.......v...Uw[|" +peer0.org1.example.com | "2019-04-22 06:17:51.173 UTC [msp.identity] Verify -> DEBU 3953 Verify: sig = 00000000 30 44 02 20 5a 02 57 a9 ab 04 2a c5 11 e8 04 92 |0D. Z.W...*.....| +peer0.org1.example.com | 00000010 c1 21 de 47 b6 1c 3a 46 a7 0d 5a 42 17 e7 47 96 |.!.G..:F..ZB..G.| +peer0.org1.example.com | 00000020 f7 9e 20 53 02 20 1b 70 ee ee 0c 8f 4e 60 de 02 |.. S. .p....N`..| +peer0.org1.example.com | 00000030 42 f6 39 6b 53 fd b7 4e e3 33 57 58 51 19 f8 f2 |B.9kS..N.3WXQ...| +peer0.org1.example.com | 00000040 cf fd 19 5a 65 8e |...Ze.|" +peer0.org1.example.com | "2019-04-22 06:17:51.175 UTC [msp.identity] Verify -> DEBU 3954 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:51.175 UTC [msp.identity] Verify -> DEBU 3955 Verify: sig = 00000000 30 44 02 20 52 44 17 a3 c1 44 a8 15 3a 24 1f 0d |0D. RD...D..:$..| +peer0.org1.example.com | 00000010 55 89 96 7a 0d b8 d9 aa 47 5a 1c 62 3b 63 6b ab |U..z....GZ.b;ck.| +peer0.org1.example.com | 00000020 c2 77 48 9b 02 20 3c dc 2f f5 05 a2 6b 27 61 4a |.wH.. <./...k'aJ| +peer0.org1.example.com | 00000030 4b 2e 4d 3d 96 56 1a 94 20 d4 59 bb 93 9e 2b 49 |K.M=.V.. .Y...+I| +peer0.org1.example.com | 00000040 20 42 62 9f cc 95 | Bb...|" +peer0.org1.example.com | "2019-04-22 06:17:51.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 3956 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 3957 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:51.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 3958 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 " +peer0.org1.example.com | "2019-04-22 06:17:51.179 UTC [gossip.discovery] learnExistingMembers -> DEBU 3959 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 " +peer0.org1.example.com | "2019-04-22 06:17:51.179 UTC [gossip.discovery] learnExistingMembers -> DEBU 395a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:51.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 395b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 395c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.181 UTC [gossip.discovery] sendMemResponse -> DEBU 395d Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:51.182 UTC [msp] DeserializeIdentity -> DEBU 395e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.182 UTC [msp] DeserializeIdentity -> DEBU 395f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.182 UTC [gossip.comm] Send -> DEBU 3960 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:51.183 UTC [gossip.discovery] sendMemResponse -> DEBU 3961 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:51.184 UTC [gossip.comm] sendToEndpoint -> DEBU 3962 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.184 UTC [gossip.comm] sendToEndpoint -> DEBU 3963 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3964 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.290 UTC [endorser] ProcessProposal -> DEBU 3965 Entering: request from 192.168.224.9:49344" +peer0.org1.example.com | "2019-04-22 06:17:51.290 UTC [protoutils] ValidateProposalMessage -> DEBU 3966 ValidateProposalMessage starts for signed proposal 0xc003e387d0" +peer0.org1.example.com | "2019-04-22 06:17:51.290 UTC [protoutils] validateChannelHeader -> DEBU 3967 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:17:51.290 UTC [protoutils] checkSignatureFromCreator -> DEBU 3968 begin" +peer0.org1.example.com | "2019-04-22 06:17:51.290 UTC [msp] GetManagerForChain -> DEBU 3969 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:17:51.291 UTC [protoutils] checkSignatureFromCreator -> DEBU 396a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:17:51.291 UTC [protoutils] checkSignatureFromCreator -> DEBU 396b creator is valid" +peer0.org1.example.com | "2019-04-22 06:17:51.291 UTC [msp.identity] Verify -> DEBU 396c Verify: digest = 00000000 ed a9 31 ea b2 fe 10 05 31 bc 4b 11 ec ce a2 2b |..1.....1.K....+| +peer0.org1.example.com | 00000010 ac ea 84 57 f8 7c 6b 00 85 b1 2f 00 8e d7 c2 5d |...W.|k.../....]|" +peer0.org1.example.com | "2019-04-22 06:17:51.291 UTC [msp.identity] Verify -> DEBU 396d Verify: sig = 00000000 30 44 02 20 5b 41 dc fe 68 ca 1f cc 0a 3b 2f b8 |0D. [A..h....;/.| +peer0.org1.example.com | 00000010 53 5e 62 b4 82 42 b5 8d 0e 3d 90 07 ad 5b 1a 89 |S^b..B...=...[..| +peer0.org1.example.com | 00000020 a6 29 e2 8d 02 20 42 94 81 a2 1b 15 e2 c8 e1 9f |.)... B.........| +peer0.org1.example.com | 00000030 13 ef d7 e1 39 3a 41 c0 c4 72 14 45 76 68 b1 a0 |....9:A..r.Evh..| +peer0.org1.example.com | 00000040 84 f2 6d 50 74 c0 |..mPt.|" +peer0.org1.example.com | "2019-04-22 06:17:51.292 UTC [protoutils] checkSignatureFromCreator -> DEBU 396e exits successfully" +peer0.org1.example.com | "2019-04-22 06:17:51.292 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 396f validateChaincodeProposalMessage starts for proposal 0xc0004630a0, header 0xc003e38be0" +peer0.org1.example.com | "2019-04-22 06:17:51.292 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3970 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.292 UTC [endorser] preProcess -> DEBU 3971 [businesschannel][4bfa0d04] processing txid: 4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5" +peer0.org1.example.com | "2019-04-22 06:17:51.293 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3972 retrieveTransactionByID() - txId = [4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5]" +peer0.org1.example.com | "2019-04-22 06:17:51.293 UTC [endorser] SimulateProposal -> DEBU 3973 [businesschannel][4bfa0d04] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.293 UTC [endorser] callChaincode -> INFO 3974 [businesschannel][4bfa0d04] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.294 UTC [chaincode] Execute -> DEBU 3975 Entry" +peer0.org1.example.com | "2019-04-22 06:17:51.294 UTC [cscc] Invoke -> DEBU 3976 Invoke function: GetConfigTree" +peer0.org1.example.com | "2019-04-22 06:17:51.294 UTC [aclmgmt] CheckACL -> DEBU 3977 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigTree" +peer0.org1.example.com | "2019-04-22 06:17:51.294 UTC [aclmgmt] CheckACL -> DEBU 3978 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:17:51.295 UTC [policies] Evaluate -> DEBU 3979 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.295 UTC [policies] Evaluate -> DEBU 397a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:51.295 UTC [policies] Evaluate -> DEBU 397b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.296 UTC [cauthdsl] func1 -> DEBU 397c 0xc0041f3560 gate 1555913871295840500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:51.296 UTC [cauthdsl] func2 -> DEBU 397d 0xc0041f3560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:51.296 UTC [cauthdsl] func2 -> DEBU 397e 0xc0041f3560 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:51.296 UTC [cauthdsl] func2 -> DEBU 397f 0xc0041f3560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:17:51.297 UTC [cauthdsl] func2 -> DEBU 3980 0xc0041f3560 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:51.297 UTC [cauthdsl] func1 -> DEBU 3981 0xc0041f3560 gate 1555913871295840500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:17:51.297 UTC [policies] Evaluate -> DEBU 3982 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.297 UTC [policies] Evaluate -> DEBU 3983 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.297 UTC [policies] Evaluate -> DEBU 3984 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.297 UTC [cauthdsl] func1 -> DEBU 3985 0xc0041f3da0 gate 1555913871297647400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:51.298 UTC [cauthdsl] func2 -> DEBU 3986 0xc0041f3da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:51.298 UTC [cauthdsl] func2 -> DEBU 3987 0xc0041f3da0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:51.298 UTC [cauthdsl] func2 -> DEBU 3988 0xc0041f3da0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.298 UTC [msp.identity] Verify -> DEBU 3989 Verify: digest = 00000000 ed a9 31 ea b2 fe 10 05 31 bc 4b 11 ec ce a2 2b |..1.....1.K....+| +peer0.org1.example.com | 00000010 ac ea 84 57 f8 7c 6b 00 85 b1 2f 00 8e d7 c2 5d |...W.|k.../....]|" +peer0.org1.example.com | "2019-04-22 06:17:51.298 UTC [msp.identity] Verify -> DEBU 398a Verify: sig = 00000000 30 44 02 20 5b 41 dc fe 68 ca 1f cc 0a 3b 2f b8 |0D. [A..h....;/.| +peer0.org1.example.com | 00000010 53 5e 62 b4 82 42 b5 8d 0e 3d 90 07 ad 5b 1a 89 |S^b..B...=...[..| +peer0.org1.example.com | 00000020 a6 29 e2 8d 02 20 42 94 81 a2 1b 15 e2 c8 e1 9f |.)... B.........| +peer0.org1.example.com | 00000030 13 ef d7 e1 39 3a 41 c0 c4 72 14 45 76 68 b1 a0 |....9:A..r.Evh..| +peer0.org1.example.com | 00000040 84 f2 6d 50 74 c0 |..mPt.|" +peer0.org1.example.com | "2019-04-22 06:17:51.299 UTC [cauthdsl] func2 -> DEBU 398b 0xc0041f3da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.299 UTC [cauthdsl] func1 -> DEBU 398c 0xc0041f3da0 gate 1555913871297647400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:51.299 UTC [policies] Evaluate -> DEBU 398d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.300 UTC [policies] Evaluate -> DEBU 398e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.300 UTC [policies] Evaluate -> DEBU 398f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.300 UTC [policies] Evaluate -> DEBU 3990 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.301 UTC [chaincode] handleMessage -> DEBU 3991 [4bfa0d04] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:17:51.301 UTC [chaincode] Notify -> DEBU 3992 [4bfa0d04] notifying Txid:4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5, channelID:businesschannel" +peer0.org1.example.com | "2019-04-22 06:17:51.302 UTC [chaincode] Execute -> DEBU 3993 Exit" +peer0.org1.example.com | "2019-04-22 06:17:51.302 UTC [endorser] callChaincode -> INFO 3994 [businesschannel][4bfa0d04] Exit chaincode: name:"cscc" (8ms)" +peer0.org1.example.com | "2019-04-22 06:17:51.302 UTC [endorser] SimulateProposal -> DEBU 3995 [businesschannel][4bfa0d04] Exit" +peer0.org1.example.com | "2019-04-22 06:17:51.302 UTC [endorser] endorseProposal -> DEBU 3996 [businesschannel][4bfa0d04] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:17:51.302 UTC [endorser] endorseProposal -> DEBU 3997 [businesschannel][4bfa0d04] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-04-22 06:17:51.303 UTC [endorser] EndorseWithPlugin -> DEBU 3998 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5, chaincode: cscc}" +peer0.org1.example.com | "2019-04-22 06:17:51.303 UTC [msp.identity] Sign -> DEBU 3999 Sign: plaintext: 0A201A8DD06510F54473E470969985FF...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-04-22 06:17:51.303 UTC [msp.identity] Sign -> DEBU 399a Sign: digest: BD67CD9DA9CEEADAA7489AD5700B34387B0EA60717712B24B4D1FCE1F5389501 " +peer0.org1.example.com | "2019-04-22 06:17:51.304 UTC [endorser] EndorseWithPlugin -> DEBU 399b Exiting {plugin: escc, channel: businesschannel, tx: 4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5, chaincode: cscc}" +peer0.org1.example.com | "2019-04-22 06:17:51.304 UTC [endorser] endorseProposal -> DEBU 399c [businesschannel][4bfa0d04] Exit" +peer0.org1.example.com | "2019-04-22 06:17:51.304 UTC [endorser] func1 -> DEBU 399d Exit: request from 192.168.224.9:49344" +peer0.org1.example.com | "2019-04-22 06:17:51.304 UTC [comm.grpc.server] 1 -> INFO 399e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49344 grpc.code=OK grpc.call_duration=15.6478ms +peer0.org1.example.com | "2019-04-22 06:17:51.309 UTC [grpc] warningf -> DEBU 399f transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49344: read: connection reset by peer" +peer0.org1.example.com | "2019-04-22 06:17:51.310 UTC [grpc] infof -> DEBU 39a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:51.311 UTC [grpc] infof -> DEBU 39a1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:17:51.466 UTC [gossip.election] waitForInterrupt -> DEBU 39a2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.466 UTC [gossip.election] IsLeader -> DEBU 39a3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:51.467 UTC [msp.identity] Sign -> DEBU 39a4 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100F1801 " +peer0.org1.example.com | "2019-04-22 06:17:51.467 UTC [msp.identity] Sign -> DEBU 39a5 Sign: digest: F39F5BAEE65B09138668FDE26D86B30A489DFD540185ADF6B25051D7795C387F " +peer0.org1.example.com | "2019-04-22 06:17:51.467 UTC [gossip.election] waitForInterrupt -> DEBU 39a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.474 UTC [gossip.comm] Send -> DEBU 39ab Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39ac Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.475 UTC [msp] DeserializeIdentity -> DEBU 39ad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.475 UTC [gossip.comm] sendToEndpoint -> DEBU 39ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.475 UTC [gossip.comm] sendToEndpoint -> DEBU 39af Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.598 UTC [gossip.comm] func1 -> DEBU 39b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.598 UTC [gossip.gossip] handleMessage -> DEBU 39b1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.598 UTC [gossip.gossip] handleMessage -> DEBU 39b2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.598 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39b4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:51.598 UTC [msp] DeserializeIdentity -> DEBU 39b5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.598 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [cauthdsl] func1 -> DEBU 39bc 0xc00293a430 gate 1555913871599293500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [cauthdsl] func2 -> DEBU 39bd 0xc00293a430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [cauthdsl] func2 -> DEBU 39be 0xc00293a430 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [cauthdsl] func2 -> DEBU 39bf 0xc00293a430 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [msp.identity] Verify -> DEBU 39c0 Verify: digest = 00000000 3f 1c db 0f 86 8f 8b be 26 03 72 43 3e 5b 00 93 |?.......&.rC>[..| +peer0.org1.example.com | 00000010 0b ae 0a d3 03 ba 87 88 c7 51 3b 5f 25 7a 3c c7 |.........Q;_%z<.|" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [msp.identity] Verify -> DEBU 39c1 Verify: sig = 00000000 30 44 02 20 61 7a b2 ac 6f 00 4e 52 36 e1 3a 12 |0D. az..o.NR6.:.| +peer0.org1.example.com | 00000010 1b 96 e9 fe 4f 7d 46 5d 1b 7b de d7 b0 ba 5e 6b |....O}F].{....^k| +peer0.org1.example.com | 00000020 99 e9 c2 b7 02 20 45 f1 49 e3 bc bb ba 7f 2d f1 |..... E.I.....-.| +peer0.org1.example.com | 00000030 a5 69 e5 16 12 9e e2 67 45 3c 65 09 a0 af ed 88 |.i.....gE DEBU 39c2 0xc00293a430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [cauthdsl] func1 -> DEBU 39c3 0xc00293a430 gate 1555913871599293500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39c9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ca updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 " +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39cb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 " +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39cc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39cd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] handleAliveMessage -> DEBU 39ce Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39cf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [msp] DeserializeIdentity -> DEBU 39d0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [msp] DeserializeIdentity -> DEBU 39d1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.600 UTC [msp] DeserializeIdentity -> DEBU 39d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.601 UTC [msp] DeserializeIdentity -> DEBU 39d3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.601 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.602 UTC [msp] DeserializeIdentity -> DEBU 39d5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.602 UTC [msp] DeserializeIdentity -> DEBU 39d6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.602 UTC [gossip.comm] Send -> DEBU 39d7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:51.602 UTC [msp] DeserializeIdentity -> DEBU 39d8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.603 UTC [gossip.comm] sendToEndpoint -> DEBU 39d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.603 UTC [gossip.comm] sendToEndpoint -> DEBU 39da Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.604 UTC [gossip.comm] Send -> DEBU 39db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:51.604 UTC [gossip.comm] sendToEndpoint -> DEBU 39dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.604 UTC [gossip.comm] sendToEndpoint -> DEBU 39dd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.615 UTC [gossip.comm] func1 -> DEBU 39de Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.615 UTC [gossip.gossip] handleMessage -> DEBU 39df Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.616 UTC [gossip.pull] HandleMessage -> DEBU 39e0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.616 UTC [msp] DeserializeIdentity -> DEBU 39e1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.616 UTC [msp] DeserializeIdentity -> DEBU 39e2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.617 UTC [msp] DeserializeIdentity -> DEBU 39e3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.617 UTC [gossip.comm] func1 -> DEBU 39e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [msp] DeserializeIdentity -> DEBU 39e5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [msp] DeserializeIdentity -> DEBU 39e6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [msp] DeserializeIdentity -> DEBU 39e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [gossip.pull] SendDigest -> DEBU 39e8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [gossip.gossip] handleMessage -> DEBU 39e9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [gossip.gossip] handleMessage -> DEBU 39ea Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [gossip.gossip] handleMessage -> DEBU 39eb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ed Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.619 UTC [gossip.gossip] handleMessage -> DEBU 39ee Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.619 UTC [gossip.gossip] handleMessage -> DEBU 39ef Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.644 UTC [gossip.comm] func1 -> DEBU 39f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.644 UTC [gossip.gossip] handleMessage -> DEBU 39f3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.644 UTC [gossip.gossip] handleMessage -> DEBU 39f4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.644 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39f6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [msp] DeserializeIdentity -> DEBU 39f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39f9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [policies] Evaluate -> DEBU 39fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [policies] Evaluate -> DEBU 39fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [policies] Evaluate -> DEBU 39fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [cauthdsl] func1 -> DEBU 39fe 0xc003537e60 gate 1555913871645581300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [cauthdsl] func2 -> DEBU 39ff 0xc003537e60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [cauthdsl] func2 -> DEBU 3a00 0xc003537e60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [cauthdsl] func2 -> DEBU 3a01 0xc003537e60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [msp.identity] Verify -> DEBU 3a02 Verify: digest = 00000000 a1 1b 96 59 77 77 5c 2a 5b 57 d1 98 43 05 34 63 |...Yww\*[W..C.4c| +peer0.org1.example.com | 00000010 dd 72 54 77 c3 7a d5 2f ed 63 a0 9f 94 e2 79 f7 |.rTw.z./.c....y.|" +peer0.org1.example.com | "2019-04-22 06:17:51.645 UTC [msp.identity] Verify -> DEBU 3a03 Verify: sig = 00000000 30 45 02 21 00 ed 6f 91 74 e0 7f af 0c 16 1a 82 |0E.!..o.t.......| +peer0.org1.example.com | 00000010 b8 3a e2 f4 aa 18 eb ec cd e9 cb 9c 36 43 99 ea |.:..........6C..| +peer0.org1.example.com | 00000020 f1 fd 51 c0 f6 02 20 4f 32 00 ec af c4 51 b5 ef |..Q... O2....Q..| +peer0.org1.example.com | 00000030 46 1f 6b b3 07 1f 02 3c d1 91 f5 38 23 58 8e e4 |F.k....<...8#X..| +peer0.org1.example.com | 00000040 88 73 78 4c 54 3a a5 |.sxLT:.|" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [cauthdsl] func2 -> DEBU 3a04 0xc003537e60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [cauthdsl] func1 -> DEBU 3a05 0xc003537e60 gate 1555913871645581300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a08 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a0a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 " +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 " +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a10 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a11 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [gossip.discovery] sendMemResponse -> DEBU 3a12 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:51.646 UTC [msp] DeserializeIdentity -> DEBU 3a13 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.647 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.649 UTC [msp] DeserializeIdentity -> DEBU 3a15 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:51.649 UTC [gossip.comm] Send -> DEBU 3a16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:51.649 UTC [gossip.discovery] sendMemResponse -> DEBU 3a17 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:51.650 UTC [gossip.comm] sendToEndpoint -> DEBU 3a18 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:51.650 UTC [gossip.comm] sendToEndpoint -> DEBU 3a19 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.021 UTC [gossip.gossip] handleMessage -> DEBU 3a1a Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.024 UTC [gossip.gossip] handleMessage -> DEBU 3a1b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.025 UTC [gossip.gossip] handleMessage -> DEBU 3a1d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.025 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a1e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:52.027 UTC [msp] DeserializeIdentity -> DEBU 3a1f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.027 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a22 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a23 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.028 UTC [gossip.comm] func1 -> DEBU 3a24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.028 UTC [policies] Evaluate -> DEBU 3a25 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.029 UTC [policies] Evaluate -> DEBU 3a26 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.029 UTC [policies] Evaluate -> DEBU 3a27 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.025 UTC [gossip.pull] HandleMessage -> DEBU 3a21 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.029 UTC [cauthdsl] func1 -> DEBU 3a28 0xc00390feb0 gate 1555913872029490900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.029 UTC [msp] DeserializeIdentity -> DEBU 3a29 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.030 UTC [msp] DeserializeIdentity -> DEBU 3a2a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.030 UTC [cauthdsl] func2 -> DEBU 3a2b 0xc00390feb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.030 UTC [cauthdsl] func2 -> DEBU 3a2c 0xc00390feb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.030 UTC [msp] DeserializeIdentity -> DEBU 3a2d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.030 UTC [cauthdsl] func2 -> DEBU 3a2e 0xc00390feb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.031 UTC [msp.identity] Verify -> DEBU 3a2f Verify: digest = 00000000 19 cc e7 8d d2 b6 7d 16 e6 4f 36 d3 50 0c 0a 30 |......}..O6.P..0| +peer0.org1.example.com | 00000010 64 37 ee df d1 9f 03 a6 1b a0 19 d2 d6 34 cf df |d7...........4..|" +peer0.org1.example.com | "2019-04-22 06:17:52.031 UTC [msp] DeserializeIdentity -> DEBU 3a30 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.031 UTC [msp] DeserializeIdentity -> DEBU 3a31 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.031 UTC [msp.identity] Verify -> DEBU 3a32 Verify: sig = 00000000 30 45 02 21 00 cb 0f c7 e3 8c e0 d9 22 85 48 ca |0E.!........".H.| +peer0.org1.example.com | 00000010 6d ef 22 bd 0b 75 52 ac 76 8f fb 06 34 b5 8b 12 |m."..uR.v...4...| +peer0.org1.example.com | 00000020 7c 8d 73 84 68 02 20 65 f3 95 d1 1c 44 b2 29 5d ||.s.h. e....D.)]| +peer0.org1.example.com | 00000030 6f a3 77 6f aa f5 14 1c cd d9 ad 51 19 3b bd 6d |o.wo.......Q.;.m| +peer0.org1.example.com | 00000040 78 87 e4 c4 08 60 93 |x....`.|" +peer0.org1.example.com | "2019-04-22 06:17:52.031 UTC [msp] DeserializeIdentity -> DEBU 3a33 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.032 UTC [gossip.pull] SendDigest -> DEBU 3a34 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:52.032 UTC [gossip.gossip] handleMessage -> DEBU 3a35 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.033 UTC [gossip.gossip] handleMessage -> DEBU 3a36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.034 UTC [cauthdsl] func2 -> DEBU 3a37 0xc00390feb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.034 UTC [cauthdsl] func1 -> DEBU 3a38 0xc00390feb0 gate 1555913872029490900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.034 UTC [gossip.comm] func1 -> DEBU 3a39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.034 UTC [policies] Evaluate -> DEBU 3a3a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.035 UTC [policies] Evaluate -> DEBU 3a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.035 UTC [policies] Evaluate -> DEBU 3a3c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.035 UTC [policies] Evaluate -> DEBU 3a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a3e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a40 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 " +peer0.org1.example.com | "2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a41 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 " +peer0.org1.example.com | "2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a42 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a43 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.037 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a44 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a45 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a47 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.037 UTC [gossip.gossip] handleMessage -> DEBU 3a48 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.037 UTC [gossip.gossip] handleMessage -> DEBU 3a49 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.038 UTC [gossip.gossip] handleMessage -> DEBU 3a4a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.043 UTC [gossip.gossip] handleMessage -> DEBU 3a4d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.043 UTC [gossip.gossip] handleMessage -> DEBU 3a4e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.044 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a50 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:52.044 UTC [msp] DeserializeIdentity -> DEBU 3a51 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a53 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a54 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.044 UTC [msp] DeserializeIdentity -> DEBU 3a52 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.045 UTC [msp] DeserializeIdentity -> DEBU 3a55 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.045 UTC [msp] DeserializeIdentity -> DEBU 3a56 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.046 UTC [msp] DeserializeIdentity -> DEBU 3a57 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.046 UTC [msp] DeserializeIdentity -> DEBU 3a58 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.046 UTC [msp] DeserializeIdentity -> DEBU 3a59 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.047 UTC [msp] DeserializeIdentity -> DEBU 3a5a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.047 UTC [gossip.comm] Send -> DEBU 3a5b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:52.047 UTC [msp] DeserializeIdentity -> DEBU 3a5c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.047 UTC [gossip.comm] Send -> DEBU 3a5d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a5e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a5f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a61 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a62 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.051 UTC [policies] Evaluate -> DEBU 3a63 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.051 UTC [policies] Evaluate -> DEBU 3a64 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.051 UTC [policies] Evaluate -> DEBU 3a65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.051 UTC [cauthdsl] func1 -> DEBU 3a66 0xc003a78070 gate 1555913872051679500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.052 UTC [cauthdsl] func2 -> DEBU 3a67 0xc003a78070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.052 UTC [cauthdsl] func2 -> DEBU 3a68 0xc003a78070 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.052 UTC [cauthdsl] func2 -> DEBU 3a69 0xc003a78070 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.052 UTC [msp.identity] Verify -> DEBU 3a6a Verify: digest = 00000000 1d cd 97 46 85 f9 82 99 03 b7 d1 cb 93 54 81 73 |...F.........T.s| +peer0.org1.example.com | 00000010 4a 11 f5 d1 99 7a 5b eb 51 aa 8e 59 e4 29 77 b8 |J....z[.Q..Y.)w.|" +peer0.org1.example.com | "2019-04-22 06:17:52.052 UTC [msp.identity] Verify -> DEBU 3a6b Verify: sig = 00000000 30 44 02 20 3e fe 44 17 f1 35 d4 68 c4 15 9b c3 |0D. >.D..5.h....| +peer0.org1.example.com | 00000010 7c 6a 08 cb 0d a8 6f da b9 cb df 5d 5a db 69 9b ||j....o....]Z.i.| +peer0.org1.example.com | 00000020 89 6e de 77 02 20 68 f2 39 76 ce a0 ca c5 ff 51 |.n.w. h.9v.....Q| +peer0.org1.example.com | 00000030 ca cd 2e 0c 21 b0 fe 97 d9 66 68 c7 5b 2f 93 74 |....!....fh.[/.t| +peer0.org1.example.com | 00000040 98 07 e7 43 a6 ff |...C..|" +peer0.org1.example.com | "2019-04-22 06:17:52.053 UTC [cauthdsl] func2 -> DEBU 3a6c 0xc003a78070 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.053 UTC [cauthdsl] func1 -> DEBU 3a6d 0xc003a78070 gate 1555913872051679500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.054 UTC [policies] Evaluate -> DEBU 3a6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.054 UTC [policies] Evaluate -> DEBU 3a6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.054 UTC [policies] Evaluate -> DEBU 3a70 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.055 UTC [policies] Evaluate -> DEBU 3a71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.055 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a72 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a73 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:52.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a74 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 " +peer0.org1.example.com | "2019-04-22 06:17:52.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a75 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 " +peer0.org1.example.com | "2019-04-22 06:17:52.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a76 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:52.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a77 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a78 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.056 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a79 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.056 UTC [gossip.discovery] sendMemResponse -> DEBU 3a7a Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:52.057 UTC [msp] DeserializeIdentity -> DEBU 3a7b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.057 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.057 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.058 UTC [gossip.comm] Send -> DEBU 3a7e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:52.058 UTC [gossip.discovery] sendMemResponse -> DEBU 3a7f Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:52.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3a80 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.059 UTC [gossip.comm] sendToEndpoint -> DEBU 3a81 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.394 UTC [msp] DeserializeIdentity -> DEBU 3a82 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.394 UTC [msp] DeserializeIdentity -> DEBU 3a83 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.395 UTC [gossip.comm] Send -> DEBU 3a84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:52.395 UTC [gossip.comm] sendToEndpoint -> DEBU 3a85 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.395 UTC [gossip.comm] sendToEndpoint -> DEBU 3a86 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.396 UTC [gossip.comm] sendToEndpoint -> DEBU 3a87 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.399 UTC [gossip.comm] sendToEndpoint -> DEBU 3a88 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.400 UTC [gossip.comm] sendToEndpoint -> DEBU 3a89 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.396 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.406 UTC [gossip.comm] func1 -> DEBU 3a8b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.406 UTC [gossip.gossip] handleMessage -> DEBU 3a8c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.407 UTC [msp.identity] Verify -> DEBU 3a8d Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:52.407 UTC [msp.identity] Verify -> DEBU 3a8e Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:52.408 UTC [msp.identity] Verify -> DEBU 3a8f Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:17:52.408 UTC [msp.identity] Verify -> DEBU 3a91 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:17:52.409 UTC [msp] DeserializeIdentity -> DEBU 3a92 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.409 UTC [msp] DeserializeIdentity -> DEBU 3a93 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a94 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a95 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.407 UTC [gossip.comm] func1 -> DEBU 3a90 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.413 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a96 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.413 UTC [policies] Evaluate -> DEBU 3a97 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.414 UTC [policies] Evaluate -> DEBU 3a98 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.414 UTC [policies] Evaluate -> DEBU 3a99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.414 UTC [cauthdsl] func1 -> DEBU 3a9a 0xc00370f3f0 gate 1555913872414958700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.415 UTC [cauthdsl] func2 -> DEBU 3a9b 0xc00370f3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.415 UTC [cauthdsl] func2 -> DEBU 3a9c 0xc00370f3f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.416 UTC [cauthdsl] func2 -> DEBU 3a9d 0xc00370f3f0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.416 UTC [msp.identity] Verify -> DEBU 3a9e Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:52.417 UTC [msp.identity] Verify -> DEBU 3a9f Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:52.418 UTC [cauthdsl] func2 -> DEBU 3aa0 0xc00370f3f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.418 UTC [cauthdsl] func1 -> DEBU 3aa1 0xc00370f3f0 gate 1555913872414958700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.419 UTC [policies] Evaluate -> DEBU 3aa2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.419 UTC [policies] Evaluate -> DEBU 3aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.419 UTC [policies] Evaluate -> DEBU 3aa4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.420 UTC [policies] Evaluate -> DEBU 3aa5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.420 UTC [msp] DeserializeIdentity -> DEBU 3aa6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.421 UTC [msp] DeserializeIdentity -> DEBU 3aa7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3aa8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aa9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aaa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.422 UTC [policies] Evaluate -> DEBU 3aab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.422 UTC [policies] Evaluate -> DEBU 3aac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.423 UTC [policies] Evaluate -> DEBU 3aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.423 UTC [cauthdsl] func1 -> DEBU 3aae 0xc0026b2bc0 gate 1555913872423781500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.424 UTC [cauthdsl] func2 -> DEBU 3aaf 0xc0026b2bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.424 UTC [cauthdsl] func2 -> DEBU 3ab0 0xc0026b2bc0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.424 UTC [cauthdsl] func2 -> DEBU 3ab1 0xc0026b2bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.424 UTC [msp.identity] Verify -> DEBU 3ab2 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:52.425 UTC [msp.identity] Verify -> DEBU 3ab3 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:52.425 UTC [cauthdsl] func2 -> DEBU 3ab4 0xc0026b2bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.425 UTC [cauthdsl] func1 -> DEBU 3ab5 0xc0026b2bc0 gate 1555913872423781500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.425 UTC [policies] Evaluate -> DEBU 3ab6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.426 UTC [policies] Evaluate -> DEBU 3ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.426 UTC [policies] Evaluate -> DEBU 3ab8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.426 UTC [policies] Evaluate -> DEBU 3ab9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.426 UTC [gossip.gossip] handleMessage -> DEBU 3aba Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.426 UTC [gossip.gossip] handleMessage -> DEBU 3abb Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.427 UTC [msp] DeserializeIdentity -> DEBU 3abc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.427 UTC [msp] DeserializeIdentity -> DEBU 3abd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.427 UTC [msp] DeserializeIdentity -> DEBU 3abe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.428 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3abf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.428 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.428 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.429 UTC [policies] Evaluate -> DEBU 3ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.429 UTC [policies] Evaluate -> DEBU 3ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.429 UTC [policies] Evaluate -> DEBU 3ac4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.429 UTC [cauthdsl] func1 -> DEBU 3ac5 0xc0026c26d0 gate 1555913872429807300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.430 UTC [cauthdsl] func2 -> DEBU 3ac6 0xc0026c26d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.430 UTC [cauthdsl] func2 -> DEBU 3ac7 0xc0026c26d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.430 UTC [cauthdsl] func2 -> DEBU 3ac8 0xc0026c26d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.430 UTC [msp.identity] Verify -> DEBU 3ac9 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:52.431 UTC [msp.identity] Verify -> DEBU 3aca Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:52.431 UTC [cauthdsl] func2 -> DEBU 3acb 0xc0026c26d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.432 UTC [cauthdsl] func1 -> DEBU 3acc 0xc0026c26d0 gate 1555913872429807300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.432 UTC [policies] Evaluate -> DEBU 3acd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.432 UTC [policies] Evaluate -> DEBU 3ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.432 UTC [policies] Evaluate -> DEBU 3acf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.433 UTC [policies] Evaluate -> DEBU 3ad0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.452 UTC [msp.identity] Verify -> DEBU 3ad1 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:17:52.453 UTC [msp.identity] Verify -> DEBU 3ad2 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:17:52.454 UTC [msp.identity] Verify -> DEBU 3ad3 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:52.455 UTC [msp.identity] Verify -> DEBU 3ad4 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:52.456 UTC [msp] DeserializeIdentity -> DEBU 3ad5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.456 UTC [msp] DeserializeIdentity -> DEBU 3ad6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.457 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ad7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.457 UTC [policies] Evaluate -> DEBU 3ada == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.458 UTC [policies] Evaluate -> DEBU 3adb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.458 UTC [policies] Evaluate -> DEBU 3adc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.458 UTC [cauthdsl] func1 -> DEBU 3add 0xc0024decf0 gate 1555913872458481000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.458 UTC [cauthdsl] func2 -> DEBU 3ade 0xc0024decf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.459 UTC [cauthdsl] func2 -> DEBU 3adf 0xc0024decf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.459 UTC [cauthdsl] func2 -> DEBU 3ae0 0xc0024decf0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.459 UTC [msp.identity] Verify -> DEBU 3ae1 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:52.459 UTC [msp.identity] Verify -> DEBU 3ae2 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:52.460 UTC [cauthdsl] func2 -> DEBU 3ae3 0xc0024decf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.460 UTC [cauthdsl] func1 -> DEBU 3ae4 0xc0024decf0 gate 1555913872458481000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.461 UTC [policies] Evaluate -> DEBU 3ae5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.461 UTC [policies] Evaluate -> DEBU 3ae6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.461 UTC [policies] Evaluate -> DEBU 3ae7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.462 UTC [policies] Evaluate -> DEBU 3ae8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.462 UTC [gossip.gossip] handleMessage -> DEBU 3ae9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.462 UTC [gossip.gossip] handleMessage -> DEBU 3aea Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.463 UTC [msp] DeserializeIdentity -> DEBU 3aeb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.464 UTC [msp] DeserializeIdentity -> DEBU 3aec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.465 UTC [msp] DeserializeIdentity -> DEBU 3aed Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.466 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3aee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aef Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3af0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.467 UTC [policies] Evaluate -> DEBU 3af1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.468 UTC [policies] Evaluate -> DEBU 3af2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.469 UTC [policies] Evaluate -> DEBU 3af3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.469 UTC [cauthdsl] func1 -> DEBU 3af4 0xc0028f2810 gate 1555913872469456100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.469 UTC [cauthdsl] func2 -> DEBU 3af5 0xc0028f2810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.469 UTC [cauthdsl] func2 -> DEBU 3af6 0xc0028f2810 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.470 UTC [cauthdsl] func2 -> DEBU 3af7 0xc0028f2810 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.471 UTC [msp.identity] Verify -> DEBU 3af8 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:52.471 UTC [msp.identity] Verify -> DEBU 3af9 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:52.473 UTC [cauthdsl] func2 -> DEBU 3afa 0xc0028f2810 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.473 UTC [cauthdsl] func1 -> DEBU 3afb 0xc0028f2810 gate 1555913872469456100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.474 UTC [policies] Evaluate -> DEBU 3afc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.475 UTC [policies] Evaluate -> DEBU 3afd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.476 UTC [policies] Evaluate -> DEBU 3afe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.476 UTC [policies] Evaluate -> DEBU 3aff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.477 UTC [msp.identity] Verify -> DEBU 3b00 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:17:52.477 UTC [msp.identity] Verify -> DEBU 3b01 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:17:52.478 UTC [msp.identity] Verify -> DEBU 3b02 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:52.478 UTC [msp.identity] Verify -> DEBU 3b03 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:52.485 UTC [msp] DeserializeIdentity -> DEBU 3b04 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.486 UTC [msp] DeserializeIdentity -> DEBU 3b05 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:52.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b07 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.495 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b08 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:52.496 UTC [policies] Evaluate -> DEBU 3b09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.498 UTC [policies] Evaluate -> DEBU 3b0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:52.498 UTC [policies] Evaluate -> DEBU 3b0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:52.499 UTC [cauthdsl] func1 -> DEBU 3b0c 0xc003ba4e70 gate 1555913872498928200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:52.499 UTC [cauthdsl] func2 -> DEBU 3b0d 0xc003ba4e70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:52.499 UTC [cauthdsl] func2 -> DEBU 3b0e 0xc003ba4e70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:52.500 UTC [cauthdsl] func2 -> DEBU 3b0f 0xc003ba4e70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.500 UTC [msp.identity] Verify -> DEBU 3b10 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:52.500 UTC [msp.identity] Verify -> DEBU 3b11 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:52.501 UTC [cauthdsl] func2 -> DEBU 3b12 0xc003ba4e70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:52.502 UTC [cauthdsl] func1 -> DEBU 3b13 0xc003ba4e70 gate 1555913872498928200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:52.502 UTC [policies] Evaluate -> DEBU 3b14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.502 UTC [policies] Evaluate -> DEBU 3b15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.503 UTC [policies] Evaluate -> DEBU 3b17 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.503 UTC [msp] DeserializeIdentity -> DEBU 3b16 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.504 UTC [msp] DeserializeIdentity -> DEBU 3b18 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.505 UTC [gossip.pull] Hello -> DEBU 3b19 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:52.505 UTC [msp] DeserializeIdentity -> DEBU 3b1a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.506 UTC [msp] DeserializeIdentity -> DEBU 3b1b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.506 UTC [gossip.comm] Send -> DEBU 3b1c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:52.506 UTC [gossip.comm] sendToEndpoint -> DEBU 3b1d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.507 UTC [gossip.comm] sendToEndpoint -> DEBU 3b1e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.503 UTC [policies] Evaluate -> DEBU 3b1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:52.508 UTC [gossip.gossip] handleMessage -> DEBU 3b20 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.509 UTC [gossip.comm] func1 -> DEBU 3b21 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15732855136372787225 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.509 UTC [gossip.gossip] handleMessage -> DEBU 3b22 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15732855136372787225 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.510 UTC [gossip.pull] HandleMessage -> DEBU 3b23 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15732855136372787225 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.510 UTC [gossip.gossip] handleMessage -> DEBU 3b24 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.648 UTC [gossip.comm] func1 -> DEBU 3b25 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.648 UTC [gossip.gossip] handleMessage -> DEBU 3b26 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.650 UTC [msp] DeserializeIdentity -> DEBU 3b27 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.650 UTC [msp] DeserializeIdentity -> DEBU 3b28 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.651 UTC [gossip.gossip] handleMessage -> DEBU 3b29 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.698 UTC [gossip.comm] func1 -> DEBU 3b2a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.698 UTC [gossip.gossip] handleMessage -> DEBU 3b2b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.699 UTC [gossip.pull] HandleMessage -> DEBU 3b2c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.699 UTC [gossip.pull] SendDigest -> DEBU 3b2d Sending BLOCK_MSG digest: [2 3 4 5 6 7 8 1] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:52.700 UTC [gossip.gossip] handleMessage -> DEBU 3b2e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:52.871 UTC [gossip.gossip] handleMessage -> DEBU 3b2f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:52.872 UTC [msp] DeserializeIdentity -> DEBU 3b30 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.873 UTC [msp] DeserializeIdentity -> DEBU 3b31 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.874 UTC [msp] DeserializeIdentity -> DEBU 3b32 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:52.874 UTC [gossip.gossip] handleMessage -> DEBU 3b33 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:53.087 UTC [gossip.comm] func1 -> DEBU 3b34 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:53.087 UTC [gossip.gossip] handleMessage -> DEBU 3b35 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:53.088 UTC [msp] DeserializeIdentity -> DEBU 3b36 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:53.089 UTC [msp] DeserializeIdentity -> DEBU 3b37 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:53.089 UTC [msp] DeserializeIdentity -> DEBU 3b38 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:53.090 UTC [gossip.gossip] handleMessage -> DEBU 3b39 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.859 UTC [gossip.pull] Hello -> DEBU 3b3a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:54.860 UTC [gossip.comm] Send -> DEBU 3b3b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:54.861 UTC [gossip.pull] Hello -> DEBU 3b3c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:54.861 UTC [gossip.comm] Send -> DEBU 3b3d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:54.862 UTC [gossip.pull] Hello -> DEBU 3b3e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:54.862 UTC [gossip.comm] Send -> DEBU 3b3f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:54.862 UTC [gossip.comm] sendToEndpoint -> DEBU 3b40 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.863 UTC [gossip.comm] sendToEndpoint -> DEBU 3b41 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.863 UTC [gossip.comm] sendToEndpoint -> DEBU 3b42 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.863 UTC [gossip.comm] sendToEndpoint -> DEBU 3b43 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.864 UTC [gossip.comm] sendToEndpoint -> DEBU 3b44 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.864 UTC [gossip.comm] sendToEndpoint -> DEBU 3b45 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.866 UTC [gossip.comm] func1 -> DEBU 3b46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3378671504501492866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.866 UTC [gossip.gossip] handleMessage -> DEBU 3b47 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3378671504501492866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.867 UTC [gossip.pull] HandleMessage -> DEBU 3b48 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3378671504501492866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.867 UTC [gossip.gossip] handleMessage -> DEBU 3b49 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.868 UTC [gossip.comm] func1 -> DEBU 3b4a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2875119863636552133 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.869 UTC [gossip.gossip] handleMessage -> DEBU 3b4b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2875119863636552133 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.869 UTC [gossip.pull] HandleMessage -> DEBU 3b4c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2875119863636552133 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.869 UTC [gossip.gossip] handleMessage -> DEBU 3b4d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.870 UTC [gossip.gossip] handleMessage -> DEBU 3b4e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8754125043664015702 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.870 UTC [gossip.pull] HandleMessage -> DEBU 3b4f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8754125043664015702 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.870 UTC [gossip.gossip] handleMessage -> DEBU 3b50 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b51 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102F " +peer0.org1.example.com | "2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b52 Sign: digest: 3E99B8956234215CEB859365E646D75B53FEC64025D19573FBE3555D90B33515 " +peer0.org1.example.com | "2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b53 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b54 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:54.914 UTC [gossip.comm] Send -> DEBU 3b55 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:54.914 UTC [msp] DeserializeIdentity -> DEBU 3b56 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:54.915 UTC [gossip.comm] Send -> DEBU 3b58 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:54.915 UTC [gossip.comm] sendToEndpoint -> DEBU 3b57 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.915 UTC [gossip.comm] sendToEndpoint -> DEBU 3b59 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.918 UTC [gossip.comm] func1 -> DEBU 3b5a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.919 UTC [gossip.gossip] handleMessage -> DEBU 3b5b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.919 UTC [gossip.gossip] handleMessage -> DEBU 3b5c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.915 UTC [msp] DeserializeIdentity -> DEBU 3b5e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:54.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b5d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b5f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:54.921 UTC [gossip.comm] Send -> DEBU 3b60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:54.921 UTC [gossip.comm] sendToEndpoint -> DEBU 3b61 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.921 UTC [gossip.comm] sendToEndpoint -> DEBU 3b62 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.922 UTC [msp.identity] Verify -> DEBU 3b63 Verify: digest = 00000000 3e 99 b8 95 62 34 21 5c eb 85 93 65 e6 46 d7 5b |>...b4!\...e.F.[| +peer0.org1.example.com | 00000010 53 fe c6 40 25 d1 95 73 fb e3 55 5d 90 b3 35 15 |S..@%..s..U]..5.|" +peer0.org1.example.com | "2019-04-22 06:17:54.922 UTC [msp.identity] Verify -> DEBU 3b64 Verify: sig = 00000000 30 45 02 21 00 bd 52 0c 42 c3 70 cf 31 60 53 59 |0E.!..R.B.p.1`SY| +peer0.org1.example.com | 00000010 6d ea 6e e2 64 18 44 c8 86 c9 2d 64 24 2e dc e5 |m.n.d.D...-d$...| +peer0.org1.example.com | 00000020 6f df 2c 70 7c 02 20 1c c0 23 7b d5 68 73 05 67 |o.,p|. ..#{.hs.g| +peer0.org1.example.com | 00000030 4c 2a d0 5f bc f9 db 89 2d 61 9f b2 32 c8 3a 84 |L*._....-a..2.:.| +peer0.org1.example.com | 00000040 bc a3 cf c6 a1 3d 64 |.....=d|" +peer0.org1.example.com | "2019-04-22 06:17:54.922 UTC [gossip.comm] sendToEndpoint -> DEBU 3b65 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.922 UTC [gossip.comm] sendToEndpoint -> DEBU 3b66 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.925 UTC [msp.identity] Verify -> DEBU 3b67 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:54.925 UTC [msp.identity] Verify -> DEBU 3b68 Verify: sig = 00000000 30 44 02 20 54 c5 92 e1 6f f2 47 25 00 2e 7e 60 |0D. T...o.G%..~`| +peer0.org1.example.com | 00000010 ca 38 12 53 7b 04 0c 17 74 b7 28 16 a3 98 b8 89 |.8.S{...t.(.....| +peer0.org1.example.com | 00000020 34 4f 5d 01 02 20 3b 1e 1e 3f 3c 50 0b f6 cd ed |4O].. ;..? DEBU 3b69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.927 UTC [gossip.gossip] handleMessage -> DEBU 3b6a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b6b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.929 UTC [gossip.discovery] isSentByMe -> DEBU 3b6c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b6d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b6e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.932 UTC [gossip.gossip] handleMessage -> DEBU 3b6f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b72 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:54.933 UTC [gossip.gossip] handleMessage -> DEBU 3b71 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.934 UTC [msp.identity] Verify -> DEBU 3b73 Verify: digest = 00000000 3e 99 b8 95 62 34 21 5c eb 85 93 65 e6 46 d7 5b |>...b4!\...e.F.[| +peer0.org1.example.com | 00000010 53 fe c6 40 25 d1 95 73 fb e3 55 5d 90 b3 35 15 |S..@%..s..U]..5.|" +peer0.org1.example.com | "2019-04-22 06:17:54.934 UTC [msp.identity] Verify -> DEBU 3b74 Verify: sig = 00000000 30 45 02 21 00 bd 52 0c 42 c3 70 cf 31 60 53 59 |0E.!..R.B.p.1`SY| +peer0.org1.example.com | 00000010 6d ea 6e e2 64 18 44 c8 86 c9 2d 64 24 2e dc e5 |m.n.d.D...-d$...| +peer0.org1.example.com | 00000020 6f df 2c 70 7c 02 20 1c c0 23 7b d5 68 73 05 67 |o.,p|. ..#{.hs.g| +peer0.org1.example.com | 00000030 4c 2a d0 5f bc f9 db 89 2d 61 9f b2 32 c8 3a 84 |L*._....-a..2.:.| +peer0.org1.example.com | 00000040 bc a3 cf c6 a1 3d 64 |.....=d|" +peer0.org1.example.com | "2019-04-22 06:17:54.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b75 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.935 UTC [gossip.discovery] isSentByMe -> DEBU 3b76 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b77 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b78 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:54.936 UTC [msp] DeserializeIdentity -> DEBU 3b79 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:54.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:54.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b7b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:54.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b7c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:54.940 UTC [policies] Evaluate -> DEBU 3b7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:54.940 UTC [policies] Evaluate -> DEBU 3b7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:54.941 UTC [policies] Evaluate -> DEBU 3b7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:54.941 UTC [cauthdsl] func1 -> DEBU 3b80 0xc00354bcf0 gate 1555913874941423600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:54.942 UTC [cauthdsl] func2 -> DEBU 3b81 0xc00354bcf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:54.942 UTC [cauthdsl] func2 -> DEBU 3b82 0xc00354bcf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:54.943 UTC [cauthdsl] func2 -> DEBU 3b83 0xc00354bcf0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:54.943 UTC [msp.identity] Verify -> DEBU 3b84 Verify: digest = 00000000 1d cd 97 46 85 f9 82 99 03 b7 d1 cb 93 54 81 73 |...F.........T.s| +peer0.org1.example.com | 00000010 4a 11 f5 d1 99 7a 5b eb 51 aa 8e 59 e4 29 77 b8 |J....z[.Q..Y.)w.|" +peer0.org1.example.com | "2019-04-22 06:17:54.943 UTC [msp.identity] Verify -> DEBU 3b85 Verify: sig = 00000000 30 44 02 20 3e fe 44 17 f1 35 d4 68 c4 15 9b c3 |0D. >.D..5.h....| +peer0.org1.example.com | 00000010 7c 6a 08 cb 0d a8 6f da b9 cb df 5d 5a db 69 9b ||j....o....]Z.i.| +peer0.org1.example.com | 00000020 89 6e de 77 02 20 68 f2 39 76 ce a0 ca c5 ff 51 |.n.w. h.9v.....Q| +peer0.org1.example.com | 00000030 ca cd 2e 0c 21 b0 fe 97 d9 66 68 c7 5b 2f 93 74 |....!....fh.[/.t| +peer0.org1.example.com | 00000040 98 07 e7 43 a6 ff |...C..|" +peer0.org1.example.com | "2019-04-22 06:17:54.944 UTC [cauthdsl] func2 -> DEBU 3b86 0xc00354bcf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:54.944 UTC [cauthdsl] func1 -> DEBU 3b87 0xc00354bcf0 gate 1555913874941423600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:54.944 UTC [policies] Evaluate -> DEBU 3b88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.945 UTC [policies] Evaluate -> DEBU 3b89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.945 UTC [policies] Evaluate -> DEBU 3b8a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.945 UTC [policies] Evaluate -> DEBU 3b8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b8c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b8d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b8e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:54.950 UTC [msp.identity] Verify -> DEBU 3b8f Verify: digest = 00000000 37 97 30 9b 46 bc db ea 6a 7f f2 81 88 00 fb b7 |7.0.F...j.......| +peer0.org1.example.com | 00000010 2e 47 8b a0 17 d2 c6 88 c0 76 c6 13 88 55 77 5b |.G.......v...Uw[|" +peer0.org1.example.com | "2019-04-22 06:17:54.951 UTC [msp.identity] Verify -> DEBU 3b90 Verify: sig = 00000000 30 44 02 20 5a 02 57 a9 ab 04 2a c5 11 e8 04 92 |0D. Z.W...*.....| +peer0.org1.example.com | 00000010 c1 21 de 47 b6 1c 3a 46 a7 0d 5a 42 17 e7 47 96 |.!.G..:F..ZB..G.| +peer0.org1.example.com | 00000020 f7 9e 20 53 02 20 1b 70 ee ee 0c 8f 4e 60 de 02 |.. S. .p....N`..| +peer0.org1.example.com | 00000030 42 f6 39 6b 53 fd b7 4e e3 33 57 58 51 19 f8 f2 |B.9kS..N.3WXQ...| +peer0.org1.example.com | 00000040 cf fd 19 5a 65 8e |...Ze.|" +peer0.org1.example.com | "2019-04-22 06:17:54.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b91 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b92 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b93 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.953 UTC [gossip.gossip] handleMessage -> DEBU 3b94 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b95 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b96 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:54.955 UTC [msp.identity] Verify -> DEBU 3b97 Verify: digest = 00000000 37 97 30 9b 46 bc db ea 6a 7f f2 81 88 00 fb b7 |7.0.F...j.......| +peer0.org1.example.com | 00000010 2e 47 8b a0 17 d2 c6 88 c0 76 c6 13 88 55 77 5b |.G.......v...Uw[|" +peer0.org1.example.com | "2019-04-22 06:17:54.955 UTC [msp.identity] Verify -> DEBU 3b98 Verify: sig = 00000000 30 44 02 20 5a 02 57 a9 ab 04 2a c5 11 e8 04 92 |0D. Z.W...*.....| +peer0.org1.example.com | 00000010 c1 21 de 47 b6 1c 3a 46 a7 0d 5a 42 17 e7 47 96 |.!.G..:F..ZB..G.| +peer0.org1.example.com | 00000020 f7 9e 20 53 02 20 1b 70 ee ee 0c 8f 4e 60 de 02 |.. S. .p....N`..| +peer0.org1.example.com | 00000030 42 f6 39 6b 53 fd b7 4e e3 33 57 58 51 19 f8 f2 |B.9kS..N.3WXQ...| +peer0.org1.example.com | 00000040 cf fd 19 5a 65 8e |...Ze.|" +peer0.org1.example.com | "2019-04-22 06:17:54.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b9a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b9b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:54.957 UTC [msp.identity] Verify -> DEBU 3b9c Verify: digest = 00000000 3e 99 b8 95 62 34 21 5c eb 85 93 65 e6 46 d7 5b |>...b4!\...e.F.[| +peer0.org1.example.com | 00000010 53 fe c6 40 25 d1 95 73 fb e3 55 5d 90 b3 35 15 |S..@%..s..U]..5.|" +peer0.org1.example.com | "2019-04-22 06:17:54.957 UTC [msp.identity] Verify -> DEBU 3b9d Verify: sig = 00000000 30 45 02 21 00 bd 52 0c 42 c3 70 cf 31 60 53 59 |0E.!..R.B.p.1`SY| +peer0.org1.example.com | 00000010 6d ea 6e e2 64 18 44 c8 86 c9 2d 64 24 2e dc e5 |m.n.d.D...-d$...| +peer0.org1.example.com | 00000020 6f df 2c 70 7c 02 20 1c c0 23 7b d5 68 73 05 67 |o.,p|. ..#{.hs.g| +peer0.org1.example.com | 00000030 4c 2a d0 5f bc f9 db 89 2d 61 9f b2 32 c8 3a 84 |L*._....-a..2.:.| +peer0.org1.example.com | 00000040 bc a3 cf c6 a1 3d 64 |.....=d|" +peer0.org1.example.com | "2019-04-22 06:17:54.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b9e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.958 UTC [gossip.discovery] isSentByMe -> DEBU 3b9f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ba0 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ba1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:54.958 UTC [msp] DeserializeIdentity -> DEBU 3ba2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:54.958 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ba3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:54.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:54.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:54.959 UTC [policies] Evaluate -> DEBU 3ba6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:54.959 UTC [policies] Evaluate -> DEBU 3ba7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:54.959 UTC [policies] Evaluate -> DEBU 3ba8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:54.960 UTC [cauthdsl] func1 -> DEBU 3ba9 0xc00337ff30 gate 1555913874960030800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:54.960 UTC [cauthdsl] func2 -> DEBU 3baa 0xc00337ff30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:54.961 UTC [cauthdsl] func2 -> DEBU 3bab 0xc00337ff30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:54.961 UTC [cauthdsl] func2 -> DEBU 3bac 0xc00337ff30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:54.961 UTC [msp.identity] Verify -> DEBU 3bad Verify: digest = 00000000 a1 1b 96 59 77 77 5c 2a 5b 57 d1 98 43 05 34 63 |...Yww\*[W..C.4c| +peer0.org1.example.com | 00000010 dd 72 54 77 c3 7a d5 2f ed 63 a0 9f 94 e2 79 f7 |.rTw.z./.c....y.|" +peer0.org1.example.com | "2019-04-22 06:17:54.961 UTC [msp.identity] Verify -> DEBU 3bae Verify: sig = 00000000 30 45 02 21 00 ed 6f 91 74 e0 7f af 0c 16 1a 82 |0E.!..o.t.......| +peer0.org1.example.com | 00000010 b8 3a e2 f4 aa 18 eb ec cd e9 cb 9c 36 43 99 ea |.:..........6C..| +peer0.org1.example.com | 00000020 f1 fd 51 c0 f6 02 20 4f 32 00 ec af c4 51 b5 ef |..Q... O2....Q..| +peer0.org1.example.com | 00000030 46 1f 6b b3 07 1f 02 3c d1 91 f5 38 23 58 8e e4 |F.k....<...8#X..| +peer0.org1.example.com | 00000040 88 73 78 4c 54 3a a5 |.sxLT:.|" +peer0.org1.example.com | "2019-04-22 06:17:54.962 UTC [cauthdsl] func2 -> DEBU 3baf 0xc00337ff30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:54.962 UTC [cauthdsl] func1 -> DEBU 3bb0 0xc00337ff30 gate 1555913874960030800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:54.963 UTC [policies] Evaluate -> DEBU 3bb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.963 UTC [policies] Evaluate -> DEBU 3bb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.963 UTC [policies] Evaluate -> DEBU 3bb3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.964 UTC [policies] Evaluate -> DEBU 3bb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:54.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bb5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:54.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bb6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:54.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bb7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.108 UTC [gossip.comm] func1 -> DEBU 3bb8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.109 UTC [gossip.gossip] handleMessage -> DEBU 3bb9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.110 UTC [gossip.pull] HandleMessage -> DEBU 3bba GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.111 UTC [gossip.pull] SendDigest -> DEBU 3bbb Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:55.112 UTC [gossip.gossip] handleMessage -> DEBU 3bbc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.157 UTC [gossip.comm] func1 -> DEBU 3bbd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.157 UTC [gossip.gossip] handleMessage -> DEBU 3bbe Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.158 UTC [gossip.gossip] handleMessage -> DEBU 3bbf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.158 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.158 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bc1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:55.159 UTC [msp.identity] Verify -> DEBU 3bc2 Verify: digest = 00000000 79 ef be f8 49 d7 c8 3a 9d f9 91 73 fc c7 50 45 |y...I..:...s..PE| +peer0.org1.example.com | 00000010 7a 06 4e ab 51 f6 f0 1d 21 dc 3d 5e 85 04 75 e7 |z.N.Q...!.=^..u.|" +peer0.org1.example.com | "2019-04-22 06:17:55.159 UTC [msp.identity] Verify -> DEBU 3bc3 Verify: sig = 00000000 30 45 02 21 00 a8 53 4e 46 59 8f eb 9f 69 39 f9 |0E.!..SNFY...i9.| +peer0.org1.example.com | 00000010 e7 5c a5 33 0a c1 12 4d b2 a7 13 f8 9e 80 cd 7e |.\.3...M.......~| +peer0.org1.example.com | 00000020 b2 85 be af 54 02 20 18 83 a6 b0 8c 8e 7e 52 2d |....T. ......~R-| +peer0.org1.example.com | 00000030 c4 7a 4b 0c 3c 49 f5 63 14 59 ef 29 9a 27 64 2a |.zK. DEBU 3bc4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:55.160 UTC [msp.identity] Verify -> DEBU 3bc5 Verify: sig = 00000000 30 45 02 21 00 f9 b1 ad 9d 8e 65 33 48 c1 7e 12 |0E.!......e3H.~.| +peer0.org1.example.com | 00000010 76 3c 61 d4 25 da 04 c5 80 d1 d7 59 28 0f 08 6a |v DEBU 3bc6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 " +peer0.org1.example.com | "2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 " +peer0.org1.example.com | "2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bca Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bcb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bcc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.162 UTC [gossip.discovery] sendMemResponse -> DEBU 3bcd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:55.162 UTC [msp] DeserializeIdentity -> DEBU 3bce Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.163 UTC [msp] DeserializeIdentity -> DEBU 3bcf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.163 UTC [gossip.comm] Send -> DEBU 3bd0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:55.163 UTC [gossip.discovery] sendMemResponse -> DEBU 3bd1 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:55.164 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.164 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bd4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [gossip.comm] func1 -> DEBU 3bd5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [gossip.gossip] handleMessage -> DEBU 3bd6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [gossip.pull] HandleMessage -> DEBU 3bd7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bd8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bd9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bda Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bdb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bdc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.595 UTC [msp] DeserializeIdentity -> DEBU 3bdd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.595 UTC [gossip.pull] SendDigest -> DEBU 3bde Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:55.595 UTC [gossip.gossip] handleMessage -> DEBU 3bdf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.608 UTC [gossip.comm] func1 -> DEBU 3be0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.608 UTC [gossip.gossip] handleMessage -> DEBU 3be1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.608 UTC [gossip.gossip] handleMessage -> DEBU 3be2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.608 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.608 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3be4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [msp] DeserializeIdentity -> DEBU 3be5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3be6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [policies] Evaluate -> DEBU 3be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [policies] Evaluate -> DEBU 3bea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [policies] Evaluate -> DEBU 3beb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [cauthdsl] func1 -> DEBU 3bec 0xc0030b4740 gate 1555913875609659900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [cauthdsl] func2 -> DEBU 3bed 0xc0030b4740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [cauthdsl] func2 -> DEBU 3bee 0xc0030b4740 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [cauthdsl] func2 -> DEBU 3bef 0xc0030b4740 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:55.609 UTC [msp.identity] Verify -> DEBU 3bf0 Verify: digest = 00000000 8e b0 09 cb 52 a6 01 60 8c 6e 24 d0 0b 6e 12 1a |....R..`.n$..n..| +peer0.org1.example.com | 00000010 5f 81 39 ab 79 f4 b5 e4 0b 0f aa 63 87 25 c0 9c |_.9.y......c.%..|" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [msp.identity] Verify -> DEBU 3bf1 Verify: sig = 00000000 30 44 02 20 01 d9 89 9b c5 60 23 fd e8 85 8b d3 |0D. .....`#.....| +peer0.org1.example.com | 00000010 8c ce 7a ae a4 52 71 1a 79 9b 90 f3 ce 82 d5 e3 |..z..Rq.y.......| +peer0.org1.example.com | 00000020 89 3b fd 3f 02 20 2a 2e a9 72 99 61 d5 12 e5 04 |.;.?. *..r.a....| +peer0.org1.example.com | 00000030 d4 f8 a3 68 b0 c0 be af 82 4c c0 cd f7 2e 78 a7 |...h.....L....x.| +peer0.org1.example.com | 00000040 7f 2a 5d 23 aa da |.*]#..|" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [cauthdsl] func2 -> DEBU 3bf2 0xc0030b4740 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [cauthdsl] func1 -> DEBU 3bf3 0xc0030b4740 gate 1555913875609659900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bf9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfa updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 " +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 " +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfd Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.610 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bfe Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bff Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [gossip.discovery] sendMemResponse -> DEBU 3c00 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [msp] DeserializeIdentity -> DEBU 3c01 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [msp] DeserializeIdentity -> DEBU 3c02 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [msp] DeserializeIdentity -> DEBU 3c03 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [gossip.comm] Send -> DEBU 3c04 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [gossip.discovery] sendMemResponse -> DEBU 3c05 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [gossip.comm] sendToEndpoint -> DEBU 3c06 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.611 UTC [gossip.comm] sendToEndpoint -> DEBU 3c07 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c08 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151030 " +peer0.org1.example.com | "2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c09 Sign: digest: 5FA4B15977FDB3140D6B208745E52888AE367E61E7A5C9CB68F91D758B608558 " +peer0.org1.example.com | "2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c0a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c0b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:55.807 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3c0c Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c0d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c0e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c0f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.807 UTC [gossip.comm] Send -> DEBU 3c10 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c11 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.807 UTC [gossip.comm] Send -> DEBU 3c12 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:55.808 UTC [gossip.comm] Send -> DEBU 3c13 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c14 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c15 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c17 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c18 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c19 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:55.995 UTC [gossip.gossip] handleMessage -> DEBU 3c1a Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.995 UTC [gossip.pull] HandleMessage -> DEBU 3c1b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:55.996 UTC [msp] DeserializeIdentity -> DEBU 3c1c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.997 UTC [msp] DeserializeIdentity -> DEBU 3c1d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.998 UTC [msp] DeserializeIdentity -> DEBU 3c1e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.998 UTC [msp] DeserializeIdentity -> DEBU 3c1f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.999 UTC [msp] DeserializeIdentity -> DEBU 3c20 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.999 UTC [msp] DeserializeIdentity -> DEBU 3c21 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:55.999 UTC [gossip.pull] SendDigest -> DEBU 3c22 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:56.000 UTC [gossip.gossip] handleMessage -> DEBU 3c23 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.014 UTC [gossip.gossip] handleMessage -> DEBU 3c24 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.015 UTC [gossip.gossip] handleMessage -> DEBU 3c25 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.016 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c27 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:56.017 UTC [msp] DeserializeIdentity -> DEBU 3c28 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.018 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c2a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c2b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.019 UTC [policies] Evaluate -> DEBU 3c2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.019 UTC [policies] Evaluate -> DEBU 3c2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.019 UTC [policies] Evaluate -> DEBU 3c2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.020 UTC [cauthdsl] func1 -> DEBU 3c2f 0xc003068e40 gate 1555913876020372000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.020 UTC [cauthdsl] func2 -> DEBU 3c30 0xc003068e40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.021 UTC [cauthdsl] func2 -> DEBU 3c31 0xc003068e40 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.021 UTC [cauthdsl] func2 -> DEBU 3c32 0xc003068e40 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.022 UTC [msp.identity] Verify -> DEBU 3c33 Verify: digest = 00000000 f5 53 67 ee 66 97 40 2d 90 93 2e bb 43 cc 06 f3 |.Sg.f.@-....C...| +peer0.org1.example.com | 00000010 b0 2d 2a b1 b3 cd de 4f 8f a7 70 a7 7e 45 bc d9 |.-*....O..p.~E..|" +peer0.org1.example.com | "2019-04-22 06:17:56.023 UTC [msp.identity] Verify -> DEBU 3c34 Verify: sig = 00000000 30 44 02 20 64 cf 3c 65 47 e0 2b c0 70 16 77 95 |0D. d. DEBU 3c35 0xc003068e40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.025 UTC [cauthdsl] func1 -> DEBU 3c36 0xc003068e40 gate 1555913876020372000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.025 UTC [policies] Evaluate -> DEBU 3c37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.026 UTC [policies] Evaluate -> DEBU 3c38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.028 UTC [policies] Evaluate -> DEBU 3c39 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.028 UTC [policies] Evaluate -> DEBU 3c3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c3b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:56.034 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 " +peer0.org1.example.com | "2019-04-22 06:17:56.035 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 " +peer0.org1.example.com | "2019-04-22 06:17:56.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:56.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c40 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c41 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.039 UTC [gossip.discovery] sendMemResponse -> DEBU 3c42 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:56.039 UTC [msp] DeserializeIdentity -> DEBU 3c43 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.039 UTC [msp] DeserializeIdentity -> DEBU 3c44 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.040 UTC [msp] DeserializeIdentity -> DEBU 3c45 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.040 UTC [gossip.comm] Send -> DEBU 3c46 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.040 UTC [gossip.discovery] sendMemResponse -> DEBU 3c47 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:56.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3c48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3c49 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.039 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c4a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.086 UTC [gossip.gossip] handleMessage -> DEBU 3c4b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.086 UTC [gossip.gossip] handleMessage -> DEBU 3c4c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.086 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c4d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.087 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c4e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:56.088 UTC [msp.identity] Verify -> DEBU 3c4f Verify: digest = 00000000 3f 49 f7 db 41 95 f7 e9 67 58 b0 6e ae 11 2c 12 |?I..A...gX.n..,.| +peer0.org1.example.com | 00000010 e5 bb f9 36 41 07 b9 fa 6a bb 4d e2 f0 e7 b4 51 |...6A...j.M....Q|" +peer0.org1.example.com | "2019-04-22 06:17:56.088 UTC [msp.identity] Verify -> DEBU 3c50 Verify: sig = 00000000 30 44 02 20 4b 81 9d f8 37 bd 37 9c de 0c fc 14 |0D. K...7.7.....| +peer0.org1.example.com | 00000010 2a 94 2b 98 c1 7e 18 2b 7a 58 61 6e 07 f4 6a 73 |*.+..~.+zXan..js| +peer0.org1.example.com | 00000020 8a de ce 4e 02 20 5e 8c 2e 1d fa e1 69 0a a3 28 |...N. ^.....i..(| +peer0.org1.example.com | 00000030 e5 aa f1 5c 84 dd 05 e5 68 78 33 3c f6 b0 ac 0d |...\....hx3<....| +peer0.org1.example.com | 00000040 2a 23 95 d4 d9 d2 |*#....|" +peer0.org1.example.com | "2019-04-22 06:17:56.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c51 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.089 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c52 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c53 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 " +peer0.org1.example.com | "2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c54 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 " +peer0.org1.example.com | "2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c55 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c56 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c57 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.093 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c58 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.094 UTC [gossip.comm] func1 -> DEBU 3c59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.094 UTC [gossip.gossip] handleMessage -> DEBU 3c5a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.095 UTC [gossip.gossip] handleMessage -> DEBU 3c5b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.096 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.099 UTC [msp] DeserializeIdentity -> DEBU 3c5e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.100 UTC [msp] DeserializeIdentity -> DEBU 3c5f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.101 UTC [gossip.comm] Send -> DEBU 3c60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.101 UTC [msp] DeserializeIdentity -> DEBU 3c61 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.102 UTC [gossip.comm] Send -> DEBU 3c62 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.102 UTC [gossip.comm] sendToEndpoint -> DEBU 3c63 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.102 UTC [gossip.comm] sendToEndpoint -> DEBU 3c64 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.104 UTC [gossip.comm] func1 -> DEBU 3c65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.104 UTC [gossip.gossip] handleMessage -> DEBU 3c66 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.105 UTC [gossip.gossip] handleMessage -> DEBU 3c67 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c69 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.106 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.106 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.353 UTC [msp] DeserializeIdentity -> DEBU 3c6c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [msp] DeserializeIdentity -> DEBU 3c6d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [gossip.comm] Send -> DEBU 3c6e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c70 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c71 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c72 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c73 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c74 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.357 UTC [gossip.comm] func1 -> DEBU 3c75 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.357 UTC [gossip.gossip] handleMessage -> DEBU 3c76 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.358 UTC [msp.identity] Verify -> DEBU 3c77 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:56.358 UTC [msp.identity] Verify -> DEBU 3c78 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:56.364 UTC [msp.identity] Verify -> DEBU 3c79 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:17:56.364 UTC [msp.identity] Verify -> DEBU 3c7a Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:17:56.364 UTC [msp] DeserializeIdentity -> DEBU 3c7b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.365 UTC [msp] DeserializeIdentity -> DEBU 3c7c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.374 UTC [gossip.comm] func1 -> DEBU 3c7d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c7f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [policies] Evaluate -> DEBU 3c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [policies] Evaluate -> DEBU 3c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [policies] Evaluate -> DEBU 3c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [cauthdsl] func1 -> DEBU 3c84 0xc00301e590 gate 1555913876377783400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.377 UTC [cauthdsl] func2 -> DEBU 3c85 0xc00301e590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.378 UTC [cauthdsl] func2 -> DEBU 3c86 0xc00301e590 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.378 UTC [cauthdsl] func2 -> DEBU 3c87 0xc00301e590 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.378 UTC [msp.identity] Verify -> DEBU 3c88 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:56.378 UTC [msp.identity] Verify -> DEBU 3c89 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:56.378 UTC [cauthdsl] func2 -> DEBU 3c8a 0xc00301e590 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.379 UTC [cauthdsl] func1 -> DEBU 3c8b 0xc00301e590 gate 1555913876377783400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.379 UTC [msp] DeserializeIdentity -> DEBU 3c90 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.379 UTC [msp] DeserializeIdentity -> DEBU 3c91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c92 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c93 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c94 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [policies] Evaluate -> DEBU 3c95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [policies] Evaluate -> DEBU 3c96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [policies] Evaluate -> DEBU 3c97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [cauthdsl] func1 -> DEBU 3c98 0xc00301fdb0 gate 1555913876380619600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [cauthdsl] func2 -> DEBU 3c99 0xc00301fdb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [cauthdsl] func2 -> DEBU 3c9a 0xc00301fdb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.380 UTC [cauthdsl] func2 -> DEBU 3c9b 0xc00301fdb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [msp.identity] Verify -> DEBU 3c9c Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [msp.identity] Verify -> DEBU 3c9d Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [cauthdsl] func2 -> DEBU 3c9e 0xc00301fdb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [cauthdsl] func1 -> DEBU 3c9f 0xc00301fdb0 gate 1555913876380619600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.381 UTC [gossip.gossip] handleMessage -> DEBU 3ca4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.382 UTC [gossip.gossip] handleMessage -> DEBU 3ca5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.382 UTC [msp] DeserializeIdentity -> DEBU 3ca6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.382 UTC [msp] DeserializeIdentity -> DEBU 3ca7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.382 UTC [msp] DeserializeIdentity -> DEBU 3ca8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ca9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3caa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [cauthdsl] func1 -> DEBU 3caf 0xc002fb1960 gate 1555913876383330500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb0 0xc002fb1960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb1 0xc002fb1960 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb2 0xc002fb1960 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [msp.identity] Verify -> DEBU 3cb3 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [msp.identity] Verify -> DEBU 3cb4 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb5 0xc002fb1960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [cauthdsl] func1 -> DEBU 3cb6 0xc002fb1960 gate 1555913876383330500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cb7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.384 UTC [policies] Evaluate -> DEBU 3cb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.384 UTC [policies] Evaluate -> DEBU 3cb9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.384 UTC [policies] Evaluate -> DEBU 3cba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.393 UTC [msp.identity] Verify -> DEBU 3cbb Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:17:56.393 UTC [msp.identity] Verify -> DEBU 3cbc Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:17:56.394 UTC [msp.identity] Verify -> DEBU 3cbd Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:56.395 UTC [msp.identity] Verify -> DEBU 3cbe Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:56.395 UTC [msp] DeserializeIdentity -> DEBU 3cbf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.396 UTC [msp] DeserializeIdentity -> DEBU 3cc0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cc1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cc2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cc3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.397 UTC [policies] Evaluate -> DEBU 3cc4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.397 UTC [policies] Evaluate -> DEBU 3cc5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.398 UTC [policies] Evaluate -> DEBU 3cc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.403 UTC [cauthdsl] func1 -> DEBU 3cc7 0xc002f45f90 gate 1555913876398283100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.403 UTC [cauthdsl] func2 -> DEBU 3cc8 0xc002f45f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.404 UTC [cauthdsl] func2 -> DEBU 3cc9 0xc002f45f90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.404 UTC [cauthdsl] func2 -> DEBU 3cca 0xc002f45f90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.404 UTC [msp.identity] Verify -> DEBU 3ccb Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:56.404 UTC [msp.identity] Verify -> DEBU 3ccc Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:56.405 UTC [cauthdsl] func2 -> DEBU 3ccd 0xc002f45f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.405 UTC [cauthdsl] func1 -> DEBU 3cce 0xc002f45f90 gate 1555913876398283100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.405 UTC [policies] Evaluate -> DEBU 3ccf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.405 UTC [policies] Evaluate -> DEBU 3cd0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.405 UTC [policies] Evaluate -> DEBU 3cd1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.406 UTC [policies] Evaluate -> DEBU 3cd2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.406 UTC [gossip.gossip] handleMessage -> DEBU 3cd3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.406 UTC [gossip.gossip] handleMessage -> DEBU 3cd4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.406 UTC [msp] DeserializeIdentity -> DEBU 3cd5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.407 UTC [msp] DeserializeIdentity -> DEBU 3cd6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.407 UTC [msp] DeserializeIdentity -> DEBU 3cd7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cd8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cda Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.407 UTC [policies] Evaluate -> DEBU 3cdb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.408 UTC [policies] Evaluate -> DEBU 3cdc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.408 UTC [policies] Evaluate -> DEBU 3cdd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.408 UTC [cauthdsl] func1 -> DEBU 3cde 0xc002f01c30 gate 1555913876408261700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.408 UTC [cauthdsl] func2 -> DEBU 3cdf 0xc002f01c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.408 UTC [cauthdsl] func2 -> DEBU 3ce0 0xc002f01c30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.408 UTC [cauthdsl] func2 -> DEBU 3ce1 0xc002f01c30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.408 UTC [msp.identity] Verify -> DEBU 3ce2 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [msp.identity] Verify -> DEBU 3ce3 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [cauthdsl] func2 -> DEBU 3ce4 0xc002f01c30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [cauthdsl] func1 -> DEBU 3ce5 0xc002f01c30 gate 1555913876408261700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.414 UTC [msp.identity] Verify -> DEBU 3cea Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:17:56.415 UTC [msp.identity] Verify -> DEBU 3ceb Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:17:56.415 UTC [msp.identity] Verify -> DEBU 3cec Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:17:56.415 UTC [msp.identity] Verify -> DEBU 3ced Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:17:56.415 UTC [msp] DeserializeIdentity -> DEBU 3cee Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.415 UTC [msp] DeserializeIdentity -> DEBU 3cef Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cf0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cf1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cf2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [policies] Evaluate -> DEBU 3cf3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [policies] Evaluate -> DEBU 3cf4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [policies] Evaluate -> DEBU 3cf5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [cauthdsl] func1 -> DEBU 3cf6 0xc002ee42d0 gate 1555913876416351000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [cauthdsl] func2 -> DEBU 3cf7 0xc002ee42d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [cauthdsl] func2 -> DEBU 3cf8 0xc002ee42d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [cauthdsl] func2 -> DEBU 3cf9 0xc002ee42d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [msp.identity] Verify -> DEBU 3cfa Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:17:56.416 UTC [msp.identity] Verify -> DEBU 3cfb Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:17:56.417 UTC [cauthdsl] func2 -> DEBU 3cfc 0xc002ee42d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.417 UTC [cauthdsl] func1 -> DEBU 3cfd 0xc002ee42d0 gate 1555913876416351000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3cfe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3cff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3d00 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3d01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.417 UTC [gossip.gossip] handleMessage -> DEBU 3d02 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.432 UTC [gossip.election] waitForInterrupt -> DEBU 3d03 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.433 UTC [gossip.election] IsLeader -> DEBU 3d04 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:17:56.434 UTC [msp.identity] Sign -> DEBU 3d05 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510101801 " +peer0.org1.example.com | "2019-04-22 06:17:56.435 UTC [msp.identity] Sign -> DEBU 3d06 Sign: digest: ACBC7824C74D6CFE8E81F94BFE09A007582C1EF6963C933F181CA8E8FADDD4F5 " +peer0.org1.example.com | "2019-04-22 06:17:56.435 UTC [gossip.election] waitForInterrupt -> DEBU 3d07 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:17:56.435 UTC [msp] DeserializeIdentity -> DEBU 3d08 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.435 UTC [msp] DeserializeIdentity -> DEBU 3d09 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.436 UTC [gossip.comm] Send -> DEBU 3d0c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3d0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3d10 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.472 UTC [msp] DeserializeIdentity -> DEBU 3d11 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.472 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.473 UTC [gossip.pull] Hello -> DEBU 3d13 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:56.474 UTC [msp] DeserializeIdentity -> DEBU 3d14 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.474 UTC [msp] DeserializeIdentity -> DEBU 3d15 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.475 UTC [gossip.comm] Send -> DEBU 3d16 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.476 UTC [gossip.comm] sendToEndpoint -> DEBU 3d17 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.476 UTC [gossip.comm] sendToEndpoint -> DEBU 3d18 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.479 UTC [gossip.comm] func1 -> DEBU 3d19 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9793289068570394303 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.479 UTC [gossip.gossip] handleMessage -> DEBU 3d1a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9793289068570394303 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.480 UTC [gossip.pull] HandleMessage -> DEBU 3d1b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9793289068570394303 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.481 UTC [gossip.gossip] handleMessage -> DEBU 3d1c Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.589 UTC [gossip.gossip] handleMessage -> DEBU 3d1d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.592 UTC [gossip.gossip] handleMessage -> DEBU 3d1e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.593 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d20 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:56.594 UTC [msp] DeserializeIdentity -> DEBU 3d21 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.601 UTC [gossip.comm] func1 -> DEBU 3d22 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.603 UTC [gossip.gossip] handleMessage -> DEBU 3d23 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.605 UTC [gossip.comm] func1 -> DEBU 3d24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.595 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d25 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d26 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [gossip.comm] func1 -> DEBU 3d27 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d28 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [policies] Evaluate -> DEBU 3d29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [policies] Evaluate -> DEBU 3d2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [policies] Evaluate -> DEBU 3d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [cauthdsl] func1 -> DEBU 3d2c 0xc002ec1210 gate 1555913876620698700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [cauthdsl] func2 -> DEBU 3d2d 0xc002ec1210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [cauthdsl] func2 -> DEBU 3d2e 0xc002ec1210 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [cauthdsl] func2 -> DEBU 3d2f 0xc002ec1210 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.620 UTC [msp.identity] Verify -> DEBU 3d30 Verify: digest = 00000000 e8 a2 fb 6d 55 31 1d d6 31 6f e1 71 00 21 28 25 |...mU1..1o.q.!(%| +peer0.org1.example.com | 00000010 6c b5 83 ba 04 23 7d d3 84 f7 df e1 4f 04 45 71 |l....#}.....O.Eq|" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [msp.identity] Verify -> DEBU 3d31 Verify: sig = 00000000 30 44 02 20 0a 15 e8 03 94 7d 58 1a f4 f7 9c 52 |0D. .....}X....R| +peer0.org1.example.com | 00000010 d3 98 63 70 fa 07 4b 41 d3 93 50 d4 ee 16 64 f8 |..cp..KA..P...d.| +peer0.org1.example.com | 00000020 5e 66 b9 57 02 20 4a 62 69 ed fa 0c e8 22 c2 57 |^f.W. Jbi....".W| +peer0.org1.example.com | 00000030 cb 08 bf c5 52 94 a8 a3 f2 ec a8 19 35 96 7f 58 |....R.......5..X| +peer0.org1.example.com | 00000040 66 33 a2 11 7e da |f3..~.|" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [cauthdsl] func2 -> DEBU 3d32 0xc002ec1210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [cauthdsl] func1 -> DEBU 3d33 0xc002ec1210 gate 1555913876620698700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d36 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d38 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d39 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 " +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 " +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d3e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d3f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d41 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d42 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d43 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d44 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d45 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.623 UTC [msp] DeserializeIdentity -> DEBU 3d46 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.623 UTC [msp] DeserializeIdentity -> DEBU 3d47 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.623 UTC [gossip.gossip] handleMessage -> DEBU 3d48 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d4a Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.631 UTC [msp] DeserializeIdentity -> DEBU 3d4b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.631 UTC [msp] DeserializeIdentity -> DEBU 3d4c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.632 UTC [msp] DeserializeIdentity -> DEBU 3d4d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.632 UTC [msp] DeserializeIdentity -> DEBU 3d4e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.632 UTC [msp] DeserializeIdentity -> DEBU 3d4f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.633 UTC [msp] DeserializeIdentity -> DEBU 3d50 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.633 UTC [gossip.comm] Send -> DEBU 3d51 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.633 UTC [msp] DeserializeIdentity -> DEBU 3d52 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.634 UTC [msp] DeserializeIdentity -> DEBU 3d54 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.634 UTC [gossip.comm] Send -> DEBU 3d55 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:56.633 UTC [gossip.comm] sendToEndpoint -> DEBU 3d53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3d56 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3d57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.642 UTC [gossip.comm] sendToEndpoint -> DEBU 3d58 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.664 UTC [gossip.comm] func1 -> DEBU 3d59 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.664 UTC [gossip.gossip] handleMessage -> DEBU 3d5a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.665 UTC [gossip.pull] HandleMessage -> DEBU 3d5b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.665 UTC [gossip.pull] SendDigest -> DEBU 3d5c Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:56.665 UTC [gossip.gossip] handleMessage -> DEBU 3d5d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.836 UTC [gossip.gossip] handleMessage -> DEBU 3d5e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.836 UTC [msp] DeserializeIdentity -> DEBU 3d5f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.836 UTC [msp] DeserializeIdentity -> DEBU 3d60 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.836 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.836 UTC [gossip.gossip] handleMessage -> DEBU 3d62 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.989 UTC [gossip.gossip] handleMessage -> DEBU 3d63 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.989 UTC [gossip.gossip] handleMessage -> DEBU 3d64 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d66 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:56.989 UTC [msp] DeserializeIdentity -> DEBU 3d67 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d69 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d6a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [policies] Evaluate -> DEBU 3d6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [policies] Evaluate -> DEBU 3d6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [policies] Evaluate -> DEBU 3d6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [cauthdsl] func1 -> DEBU 3d6e 0xc002a1ed60 gate 1555913876990437300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d6f 0xc002a1ed60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d70 0xc002a1ed60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d71 0xc002a1ed60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [msp.identity] Verify -> DEBU 3d72 Verify: digest = 00000000 10 83 4e 82 8b e6 39 dc 9e 06 78 8a 8d 5f 20 40 |..N...9...x.._ @| +peer0.org1.example.com | 00000010 19 09 aa e2 d3 ae 4e a7 a2 44 e6 25 d1 8d ef 26 |......N..D.%...&|" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [msp.identity] Verify -> DEBU 3d73 Verify: sig = 00000000 30 44 02 20 22 0e 8e 2e 9e 85 0d 88 17 3b 1d 05 |0D. "........;..| +peer0.org1.example.com | 00000010 f4 76 c4 a5 f2 80 57 4a 90 d9 67 b1 18 6e da 62 |.v....WJ..g..n.b| +peer0.org1.example.com | 00000020 5d 05 58 fe 02 20 48 3f 00 4d a3 74 a6 c2 0b 5d |].X.. H?.M.t...]| +peer0.org1.example.com | 00000030 55 82 ac 6c 03 31 1b ea 6a 4c 82 ea 97 a7 a1 2c |U..l.1..jL.....,| +peer0.org1.example.com | 00000040 ab e8 f5 da c8 4c |.....L|" +peer0.org1.example.com | "2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d74 0xc002a1ed60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [cauthdsl] func1 -> DEBU 3d75 0xc002a1ed60 gate 1555913876990437300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d76 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d78 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d79 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d7a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 " +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 " +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d80 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d81 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.996 UTC [gossip.comm] func1 -> DEBU 3d82 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.996 UTC [gossip.gossip] handleMessage -> DEBU 3d83 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.996 UTC [gossip.gossip] handleMessage -> DEBU 3d84 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d85 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d86 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:56.998 UTC [gossip.comm] func1 -> DEBU 3d87 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:56.999 UTC [gossip.gossip] handleMessage -> DEBU 3d88 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:57.001 UTC [msp] DeserializeIdentity -> DEBU 3d89 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.002 UTC [msp] DeserializeIdentity -> DEBU 3d8a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.002 UTC [msp] DeserializeIdentity -> DEBU 3d8b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.003 UTC [gossip.comm] Send -> DEBU 3d90 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:57.004 UTC [msp] DeserializeIdentity -> DEBU 3d91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.004 UTC [gossip.comm] Send -> DEBU 3d92 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d93 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d94 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d95 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d96 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:57.005 UTC [gossip.gossip] handleMessage -> DEBU 3d97 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:57.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:57.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d99 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:57.052 UTC [gossip.comm] func1 -> DEBU 3d9a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:57.052 UTC [gossip.gossip] handleMessage -> DEBU 3d9b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:57.052 UTC [msp] DeserializeIdentity -> DEBU 3d9c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.053 UTC [msp] DeserializeIdentity -> DEBU 3d9d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.053 UTC [msp] DeserializeIdentity -> DEBU 3d9e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:57.053 UTC [gossip.gossip] handleMessage -> DEBU 3d9f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.865 UTC [gossip.pull] Hello -> DEBU 3da0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:58.866 UTC [gossip.comm] Send -> DEBU 3da1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:58.866 UTC [gossip.pull] Hello -> DEBU 3da2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:58.866 UTC [gossip.comm] sendToEndpoint -> DEBU 3da3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.866 UTC [gossip.comm] sendToEndpoint -> DEBU 3da4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.866 UTC [gossip.comm] Send -> DEBU 3da5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:58.867 UTC [gossip.pull] Hello -> DEBU 3da6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:17:58.867 UTC [gossip.comm] Send -> DEBU 3da7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3da8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3da9 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3daa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.comm] func1 -> DEBU 3dab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14536065550433317564 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.gossip] handleMessage -> DEBU 3dac Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14536065550433317564 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.pull] HandleMessage -> DEBU 3dad GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14536065550433317564 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.gossip] handleMessage -> DEBU 3daf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3dae Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.871 UTC [gossip.gossip] handleMessage -> DEBU 3db0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9247242812469167990 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.871 UTC [gossip.pull] HandleMessage -> DEBU 3db1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9247242812469167990 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.872 UTC [gossip.gossip] handleMessage -> DEBU 3db2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.872 UTC [gossip.comm] func1 -> DEBU 3db3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 145740337483397912 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.872 UTC [gossip.gossip] handleMessage -> DEBU 3db4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 145740337483397912 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.872 UTC [gossip.pull] HandleMessage -> DEBU 3db5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 145740337483397912 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.873 UTC [gossip.gossip] handleMessage -> DEBU 3db6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.923 UTC [msp.identity] Sign -> DEBU 3db7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151031 " +peer0.org1.example.com | "2019-04-22 06:17:58.924 UTC [msp.identity] Sign -> DEBU 3db8 Sign: digest: B4E3523E60C185686A358A28D765B9C20EBBAD6E1A7590F25559A1677C2DF8EA " +peer0.org1.example.com | "2019-04-22 06:17:58.924 UTC [msp.identity] Sign -> DEBU 3db9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:17:58.925 UTC [msp.identity] Sign -> DEBU 3dba Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:17:58.925 UTC [msp] DeserializeIdentity -> DEBU 3dbb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:58.925 UTC [gossip.comm] Send -> DEBU 3dbc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:58.926 UTC [gossip.comm] Send -> DEBU 3dbd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:58.926 UTC [msp] DeserializeIdentity -> DEBU 3dbe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:58.926 UTC [gossip.comm] Send -> DEBU 3dbf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:58.926 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.926 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc3 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc5 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.934 UTC [gossip.comm] func1 -> DEBU 3dc6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.935 UTC [gossip.gossip] handleMessage -> DEBU 3dc7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.935 UTC [gossip.gossip] handleMessage -> DEBU 3dc8 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.935 UTC [gossip.gossip] handleMessage -> DEBU 3dca Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.935 UTC [gossip.comm] func1 -> DEBU 3dc9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dcb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dcc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:58.937 UTC [msp.identity] Verify -> DEBU 3dcd Verify: digest = 00000000 b4 e3 52 3e 60 c1 85 68 6a 35 8a 28 d7 65 b9 c2 |..R>`..hj5.(.e..| +peer0.org1.example.com | 00000010 0e bb ad 6e 1a 75 90 f2 55 59 a1 67 7c 2d f8 ea |...n.u..UY.g|-..|" +peer0.org1.example.com | "2019-04-22 06:17:58.937 UTC [msp.identity] Verify -> DEBU 3dce Verify: sig = 00000000 30 45 02 21 00 9c f0 51 c3 48 5d 97 2c b3 47 1a |0E.!...Q.H].,.G.| +peer0.org1.example.com | 00000010 92 0c aa d0 6d 4a 56 5b 11 18 35 62 bd f8 16 22 |....mJV[..5b..."| +peer0.org1.example.com | 00000020 c0 f1 a4 06 a0 02 20 65 10 67 9e 63 16 0d 7c af |...... e.g.c..|.| +peer0.org1.example.com | 00000030 57 fc f8 15 5c 87 18 aa 54 b0 6d f6 07 2d 50 50 |W...\...T.m..-PP| +peer0.org1.example.com | 00000040 c1 53 bb 3a 2e 22 2e |.S.:.".|" +peer0.org1.example.com | "2019-04-22 06:17:58.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dcf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.938 UTC [gossip.discovery] isSentByMe -> DEBU 3dd0 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd1 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dd2 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dd3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.939 UTC [gossip.gossip] handleMessage -> DEBU 3dd4 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.939 UTC [gossip.gossip] handleMessage -> DEBU 3dd5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.939 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dd6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:58.940 UTC [msp.identity] Verify -> DEBU 3dd7 Verify: digest = 00000000 b4 e3 52 3e 60 c1 85 68 6a 35 8a 28 d7 65 b9 c2 |..R>`..hj5.(.e..| +peer0.org1.example.com | 00000010 0e bb ad 6e 1a 75 90 f2 55 59 a1 67 7c 2d f8 ea |...n.u..UY.g|-..|" +peer0.org1.example.com | "2019-04-22 06:17:58.940 UTC [msp.identity] Verify -> DEBU 3dd8 Verify: sig = 00000000 30 45 02 21 00 9c f0 51 c3 48 5d 97 2c b3 47 1a |0E.!...Q.H].,.G.| +peer0.org1.example.com | 00000010 92 0c aa d0 6d 4a 56 5b 11 18 35 62 bd f8 16 22 |....mJV[..5b..."| +peer0.org1.example.com | 00000020 c0 f1 a4 06 a0 02 20 65 10 67 9e 63 16 0d 7c af |...... e.g.c..|.| +peer0.org1.example.com | 00000030 57 fc f8 15 5c 87 18 aa 54 b0 6d f6 07 2d 50 50 |W...\...T.m..-PP| +peer0.org1.example.com | 00000040 c1 53 bb 3a 2e 22 2e |.S.:.".|" +peer0.org1.example.com | "2019-04-22 06:17:58.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.941 UTC [gossip.discovery] isSentByMe -> DEBU 3dda Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ddb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ddc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ddd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dde Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:17:58.942 UTC [msp.identity] Verify -> DEBU 3de0 Verify: digest = 00000000 b4 e3 52 3e 60 c1 85 68 6a 35 8a 28 d7 65 b9 c2 |..R>`..hj5.(.e..| +peer0.org1.example.com | 00000010 0e bb ad 6e 1a 75 90 f2 55 59 a1 67 7c 2d f8 ea |...n.u..UY.g|-..|" +peer0.org1.example.com | "2019-04-22 06:17:58.942 UTC [msp.identity] Verify -> DEBU 3de1 Verify: sig = 00000000 30 45 02 21 00 9c f0 51 c3 48 5d 97 2c b3 47 1a |0E.!...Q.H].,.G.| +peer0.org1.example.com | 00000010 92 0c aa d0 6d 4a 56 5b 11 18 35 62 bd f8 16 22 |....mJV[..5b..."| +peer0.org1.example.com | 00000020 c0 f1 a4 06 a0 02 20 65 10 67 9e 63 16 0d 7c af |...... e.g.c..|.| +peer0.org1.example.com | 00000030 57 fc f8 15 5c 87 18 aa 54 b0 6d f6 07 2d 50 50 |W...\...T.m..-PP| +peer0.org1.example.com | 00000040 c1 53 bb 3a 2e 22 2e |.S.:.".|" +peer0.org1.example.com | "2019-04-22 06:17:58.942 UTC [gossip.gossip] handleMessage -> DEBU 3ddf Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.943 UTC [msp.identity] Verify -> DEBU 3de2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:17:58.943 UTC [msp.identity] Verify -> DEBU 3de3 Verify: sig = 00000000 30 44 02 20 2b 41 65 bc 2e c0 e9 97 64 79 e1 30 |0D. +Ae.....dy.0| +peer0.org1.example.com | 00000010 97 9c 11 f7 a8 27 28 35 ba d3 bd 36 4d 3a 06 fc |.....'(5...6M:..| +peer0.org1.example.com | 00000020 fa 1e 4f 88 02 20 0f 6e 82 1d 8f 7b 4d c8 d6 fe |..O.. .n...{M...| +peer0.org1.example.com | 00000030 21 11 46 e7 7c 98 6f 4e c1 9f 17 d8 e3 47 ef 0a |!.F.|.oN.....G..| +peer0.org1.example.com | 00000040 4a 1e 15 0b b0 36 |J....6|" +peer0.org1.example.com | "2019-04-22 06:17:58.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.944 UTC [gossip.discovery] isSentByMe -> DEBU 3de5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:17:58.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de6 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:58.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de7 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.110 UTC [gossip.comm] func1 -> DEBU 3de8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.111 UTC [gossip.gossip] handleMessage -> DEBU 3de9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.112 UTC [gossip.pull] HandleMessage -> DEBU 3dea GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.112 UTC [gossip.pull] SendDigest -> DEBU 3deb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:59.112 UTC [gossip.gossip] handleMessage -> DEBU 3dec Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.181 UTC [gossip.comm] func1 -> DEBU 3ded Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.182 UTC [gossip.gossip] handleMessage -> DEBU 3dee Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.182 UTC [gossip.gossip] handleMessage -> DEBU 3def Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3df0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3df1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:17:59.183 UTC [msp.identity] Verify -> DEBU 3df2 Verify: digest = 00000000 78 71 36 5b c7 e3 28 fc ab 6d 5c 89 a9 a9 fe 26 |xq6[..(..m\....&| +peer0.org1.example.com | 00000010 ba f3 84 72 2c c2 f6 37 7b 87 5d a0 4f 8a 56 d7 |...r,..7{.].O.V.|" +peer0.org1.example.com | "2019-04-22 06:17:59.184 UTC [msp.identity] Verify -> DEBU 3df3 Verify: sig = 00000000 30 45 02 21 00 c7 2a 09 a6 fa 8f 75 ea 4a aa b8 |0E.!..*....u.J..| +peer0.org1.example.com | 00000010 d7 cd 66 40 ee 44 70 e3 e5 d4 06 23 fe 1f 26 50 |..f@.Dp....#..&P| +peer0.org1.example.com | 00000020 65 18 dd 09 3a 02 20 1a b1 65 ce 82 90 85 c8 40 |e...:. ..e.....@| +peer0.org1.example.com | 00000030 d7 de 94 7e 78 4b f0 1c d3 c9 0e 90 49 f6 41 90 |...~xK......I.A.| +peer0.org1.example.com | 00000040 ff 9a 12 a3 d4 d8 42 |......B|" +peer0.org1.example.com | "2019-04-22 06:17:59.184 UTC [msp.identity] Verify -> DEBU 3df4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:17:59.185 UTC [msp.identity] Verify -> DEBU 3df5 Verify: sig = 00000000 30 43 02 20 27 2e fd 0f ae 56 a2 1d e7 53 85 e1 |0C. '....V...S..| +peer0.org1.example.com | 00000010 64 95 d3 91 a5 1c 89 b8 05 2e a7 20 35 1e d3 1f |d.......... 5...| +peer0.org1.example.com | 00000020 96 46 8b 8f 02 1f 72 c1 63 e8 a8 d4 c9 c7 61 b7 |.F....r.c.....a.| +peer0.org1.example.com | 00000030 cd 3e 7b 94 00 87 ec b4 f5 8d e2 79 d0 7a 6a 9f |.>{........y.zj.| +peer0.org1.example.com | 00000040 2e df cf d2 d0 |.....|" +peer0.org1.example.com | "2019-04-22 06:17:59.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3df6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:59.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 " +peer0.org1.example.com | "2019-04-22 06:17:59.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 " +peer0.org1.example.com | "2019-04-22 06:17:59.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dfa Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:59.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dfb Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dfc Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.188 UTC [gossip.discovery] sendMemResponse -> DEBU 3dfd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:17:59.188 UTC [msp] DeserializeIdentity -> DEBU 3dfe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.189 UTC [msp] DeserializeIdentity -> DEBU 3dff Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.189 UTC [gossip.comm] Send -> DEBU 3e00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:59.189 UTC [gossip.discovery] sendMemResponse -> DEBU 3e01 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 3e02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 3e03 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e04 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [gossip.comm] func1 -> DEBU 3e05 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [gossip.gossip] handleMessage -> DEBU 3e06 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [gossip.pull] HandleMessage -> DEBU 3e07 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e08 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e09 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [gossip.pull] SendDigest -> DEBU 3e0e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:59.586 UTC [gossip.gossip] handleMessage -> DEBU 3e0f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.609 UTC [gossip.comm] func1 -> DEBU 3e10 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.609 UTC [gossip.gossip] handleMessage -> DEBU 3e11 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.609 UTC [gossip.gossip] handleMessage -> DEBU 3e12 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e13 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.611 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e14 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:17:59.611 UTC [msp] DeserializeIdentity -> DEBU 3e15 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.611 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:17:59.612 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e17 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:59.612 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e18 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:17:59.612 UTC [policies] Evaluate -> DEBU 3e19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:59.614 UTC [policies] Evaluate -> DEBU 3e1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:17:59.614 UTC [policies] Evaluate -> DEBU 3e1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:17:59.614 UTC [cauthdsl] func1 -> DEBU 3e1c 0xc002536f10 gate 1555913879614767100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:17:59.615 UTC [cauthdsl] func2 -> DEBU 3e1d 0xc002536f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:17:59.615 UTC [cauthdsl] func2 -> DEBU 3e1e 0xc002536f10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:17:59.616 UTC [cauthdsl] func2 -> DEBU 3e1f 0xc002536f10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:17:59.617 UTC [msp.identity] Verify -> DEBU 3e20 Verify: digest = 00000000 d5 0d 3e 7e 25 d9 62 34 ce 99 d4 3e 67 36 e4 17 |..>~%.b4...>g6..| +peer0.org1.example.com | 00000010 6e 77 7c c3 76 3b dc dc 47 af 42 e1 0f 81 f7 0d |nw|.v;..G.B.....|" +peer0.org1.example.com | "2019-04-22 06:17:59.618 UTC [msp.identity] Verify -> DEBU 3e21 Verify: sig = 00000000 30 45 02 21 00 e6 2f 35 eb c7 df 18 82 f6 e3 76 |0E.!../5.......v| +peer0.org1.example.com | 00000010 fd bd 1f ed 48 b5 10 92 8d 22 81 78 81 69 21 60 |....H....".x.i!`| +peer0.org1.example.com | 00000020 09 19 76 4a fa 02 20 5c 9c d5 4c c0 9b 08 cd 9f |..vJ.. \..L.....| +peer0.org1.example.com | 00000030 fb f0 3d 90 8d 3f 8e c3 6d 45 f8 81 e4 04 55 d0 |..=..?..mE....U.| +peer0.org1.example.com | 00000040 56 2e 90 cd 19 3b 95 |V....;.|" +peer0.org1.example.com | "2019-04-22 06:17:59.618 UTC [cauthdsl] func2 -> DEBU 3e22 0xc002536f10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:17:59.619 UTC [cauthdsl] func1 -> DEBU 3e23 0xc002536f10 gate 1555913879614767100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:17:59.619 UTC [policies] Evaluate -> DEBU 3e24 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:59.619 UTC [policies] Evaluate -> DEBU 3e25 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:17:59.619 UTC [policies] Evaluate -> DEBU 3e26 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:59.620 UTC [policies] Evaluate -> DEBU 3e27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:17:59.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e28 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.620 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e29 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:17:59.620 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 " +peer0.org1.example.com | "2019-04-22 06:17:59.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 " +peer0.org1.example.com | "2019-04-22 06:17:59.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:17:59.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2d Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e2e Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e2f Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.622 UTC [gossip.discovery] sendMemResponse -> DEBU 3e30 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:17:59.622 UTC [msp] DeserializeIdentity -> DEBU 3e31 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.623 UTC [msp] DeserializeIdentity -> DEBU 3e32 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.623 UTC [msp] DeserializeIdentity -> DEBU 3e33 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.623 UTC [gossip.comm] Send -> DEBU 3e34 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:17:59.624 UTC [gossip.discovery] sendMemResponse -> DEBU 3e35 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:17:59.624 UTC [gossip.comm] sendToEndpoint -> DEBU 3e36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.625 UTC [gossip.comm] sendToEndpoint -> DEBU 3e37 Exiting" +peer0.org1.example.com | "2019-04-22 06:17:59.993 UTC [gossip.gossip] handleMessage -> DEBU 3e38 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.993 UTC [gossip.pull] HandleMessage -> DEBU 3e39 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:17:59.993 UTC [msp] DeserializeIdentity -> DEBU 3e3a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:17:59.994 UTC [gossip.pull] SendDigest -> DEBU 3e40 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:17:59.996 UTC [gossip.gossip] handleMessage -> DEBU 3e41 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.013 UTC [gossip.gossip] handleMessage -> DEBU 3e42 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.014 UTC [gossip.gossip] handleMessage -> DEBU 3e43 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e44 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.015 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e45 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:00.015 UTC [msp] DeserializeIdentity -> DEBU 3e46 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.038 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:00.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e48 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e49 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.038 UTC [policies] Evaluate -> DEBU 3e4a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [policies] Evaluate -> DEBU 3e4b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [policies] Evaluate -> DEBU 3e4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [cauthdsl] func1 -> DEBU 3e4d 0xc0024867c0 gate 1555913880039188500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e4e 0xc0024867c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e4f 0xc0024867c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e50 0xc0024867c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [msp.identity] Verify -> DEBU 3e51 Verify: digest = 00000000 3a f7 c5 54 4e ef 80 18 2e 38 fc d7 63 42 cd 7f |:..TN....8..cB..| +peer0.org1.example.com | 00000010 9d 7a 6e 6b 7c 86 98 17 a0 c8 4e d8 6e 78 e9 e3 |.znk|.....N.nx..|" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [msp.identity] Verify -> DEBU 3e52 Verify: sig = 00000000 30 45 02 21 00 de 44 d1 43 e7 2d 8b d0 17 34 db |0E.!..D.C.-...4.| +peer0.org1.example.com | 00000010 87 17 e9 6d 5b f0 de dc dd 51 4c af a0 93 84 fa |...m[....QL.....| +peer0.org1.example.com | 00000020 04 e9 59 03 20 02 20 03 1a c9 64 53 42 7a 0c c9 |..Y. . ...dSBz..| +peer0.org1.example.com | 00000030 21 08 a5 7d f4 d6 7e 8c 5b 95 96 57 7a 4f 01 da |!..}..~.[..WzO..| +peer0.org1.example.com | 00000040 f8 c5 c6 5f 79 5f 7e |..._y_~|" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e53 0xc0024867c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [cauthdsl] func1 -> DEBU 3e54 0xc0024867c0 gate 1555913880039188500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:00.039 UTC [policies] Evaluate -> DEBU 3e55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [policies] Evaluate -> DEBU 3e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [policies] Evaluate -> DEBU 3e57 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [policies] Evaluate -> DEBU 3e58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e59 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 " +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 " +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.041 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e5f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.041 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e60 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.041 UTC [gossip.discovery] sendMemResponse -> DEBU 3e61 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:00.041 UTC [msp] DeserializeIdentity -> DEBU 3e62 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.041 UTC [msp] DeserializeIdentity -> DEBU 3e63 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.042 UTC [msp] DeserializeIdentity -> DEBU 3e64 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.042 UTC [gossip.comm] Send -> DEBU 3e65 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:00.042 UTC [gossip.discovery] sendMemResponse -> DEBU 3e66 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:00.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e67 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e68 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [msp] DeserializeIdentity -> DEBU 3e69 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [msp] DeserializeIdentity -> DEBU 3e6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [gossip.comm] Send -> DEBU 3e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e70 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.355 UTC [gossip.comm] sendToEndpoint -> DEBU 3e71 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.358 UTC [gossip.comm] func1 -> DEBU 3e72 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.358 UTC [gossip.gossip] handleMessage -> DEBU 3e73 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.359 UTC [msp.identity] Verify -> DEBU 3e74 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:18:00.359 UTC [msp.identity] Verify -> DEBU 3e75 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:18:00.361 UTC [msp.identity] Verify -> DEBU 3e76 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:18:00.361 UTC [msp.identity] Verify -> DEBU 3e77 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:18:00.361 UTC [msp] DeserializeIdentity -> DEBU 3e78 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.361 UTC [msp] DeserializeIdentity -> DEBU 3e79 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [policies] Evaluate -> DEBU 3e7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [policies] Evaluate -> DEBU 3e7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [policies] Evaluate -> DEBU 3e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [cauthdsl] func1 -> DEBU 3e80 0xc0023d6d50 gate 1555913880362441500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [cauthdsl] func2 -> DEBU 3e81 0xc0023d6d50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [cauthdsl] func2 -> DEBU 3e82 0xc0023d6d50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [cauthdsl] func2 -> DEBU 3e83 0xc0023d6d50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [msp.identity] Verify -> DEBU 3e84 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:18:00.362 UTC [msp.identity] Verify -> DEBU 3e85 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0023d6d50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [cauthdsl] func1 -> DEBU 3e87 0xc0023d6d50 gate 1555913880362441500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e8a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [msp] DeserializeIdentity -> DEBU 3e8c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [msp] DeserializeIdentity -> DEBU 3e8d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e8e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e8f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e90 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e91 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e92 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [cauthdsl] func1 -> DEBU 3e94 0xc00236e570 gate 1555913880364134200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e95 0xc00236e570 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e96 0xc00236e570 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e97 0xc00236e570 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [msp.identity] Verify -> DEBU 3e98 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [msp.identity] Verify -> DEBU 3e99 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e9a 0xc00236e570 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [cauthdsl] func1 -> DEBU 3e9b 0xc00236e570 gate 1555913880364134200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.364 UTC [gossip.gossip] handleMessage -> DEBU 3ea0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [gossip.gossip] handleMessage -> DEBU 3ea1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [msp] DeserializeIdentity -> DEBU 3ea2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [msp] DeserializeIdentity -> DEBU 3ea3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [msp] DeserializeIdentity -> DEBU 3ea4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ea5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ea6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ea7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [policies] Evaluate -> DEBU 3ea8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [policies] Evaluate -> DEBU 3ea9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [policies] Evaluate -> DEBU 3eaa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [cauthdsl] func1 -> DEBU 3eab 0xc00230c100 gate 1555913880365897900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:00.365 UTC [cauthdsl] func2 -> DEBU 3eac 0xc00230c100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [cauthdsl] func2 -> DEBU 3ead 0xc00230c100 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [cauthdsl] func2 -> DEBU 3eae 0xc00230c100 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eaf Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eb0 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [cauthdsl] func2 -> DEBU 3eb1 0xc00230c100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [cauthdsl] func1 -> DEBU 3eb2 0xc00230c100 gate 1555913880365897900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eb7 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eb8 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:18:00.367 UTC [msp.identity] Verify -> DEBU 3eb9 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:18:00.367 UTC [msp.identity] Verify -> DEBU 3eba Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:18:00.367 UTC [msp] DeserializeIdentity -> DEBU 3ebb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.367 UTC [msp] DeserializeIdentity -> DEBU 3ebc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.375 UTC [gossip.comm] func1 -> DEBU 3ebd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ebe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ebf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [policies] Evaluate -> DEBU 3ec1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [policies] Evaluate -> DEBU 3ec2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [policies] Evaluate -> DEBU 3ec3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [cauthdsl] func1 -> DEBU 3ec4 0xc0022d8a30 gate 1555913880377773000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [cauthdsl] func2 -> DEBU 3ec5 0xc0022d8a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [cauthdsl] func2 -> DEBU 3ec6 0xc0022d8a30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [cauthdsl] func2 -> DEBU 3ec7 0xc0022d8a30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [msp.identity] Verify -> DEBU 3ec8 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:18:00.377 UTC [msp.identity] Verify -> DEBU 3ec9 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [cauthdsl] func2 -> DEBU 3eca 0xc0022d8a30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [cauthdsl] func1 -> DEBU 3ecb 0xc0022d8a30 gate 1555913880377773000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ecc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ecd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ece Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ecf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [gossip.gossip] handleMessage -> DEBU 3ed0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [gossip.gossip] handleMessage -> DEBU 3ed1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [msp] DeserializeIdentity -> DEBU 3ed2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.378 UTC [msp] DeserializeIdentity -> DEBU 3ed3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [msp] DeserializeIdentity -> DEBU 3ed4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ed5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [policies] Evaluate -> DEBU 3ed8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [policies] Evaluate -> DEBU 3ed9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [policies] Evaluate -> DEBU 3eda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [cauthdsl] func1 -> DEBU 3edb 0xc00229c4a0 gate 1555913880380691400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [cauthdsl] func2 -> DEBU 3edc 0xc00229c4a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [cauthdsl] func2 -> DEBU 3edd 0xc00229c4a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [cauthdsl] func2 -> DEBU 3ede 0xc00229c4a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.380 UTC [msp.identity] Verify -> DEBU 3edf Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [msp.identity] Verify -> DEBU 3ee0 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [cauthdsl] func2 -> DEBU 3ee1 0xc00229c4a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [cauthdsl] func1 -> DEBU 3ee2 0xc00229c4a0 gate 1555913880380691400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [msp.identity] Verify -> DEBU 3ee7 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:18:00.381 UTC [msp.identity] Verify -> DEBU 3ee8 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [msp.identity] Verify -> DEBU 3ee9 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [msp.identity] Verify -> DEBU 3eea Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [msp] DeserializeIdentity -> DEBU 3eeb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [msp] DeserializeIdentity -> DEBU 3eec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [policies] Evaluate -> DEBU 3ef0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.382 UTC [policies] Evaluate -> DEBU 3ef1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [policies] Evaluate -> DEBU 3ef2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [cauthdsl] func1 -> DEBU 3ef3 0xc002264b20 gate 1555913880383121100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef4 0xc002264b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef5 0xc002264b20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef6 0xc002264b20 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [msp.identity] Verify -> DEBU 3ef7 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [msp.identity] Verify -> DEBU 3ef8 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef9 0xc002264b20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [cauthdsl] func1 -> DEBU 3efa 0xc002264b20 gate 1555913880383121100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [policies] Evaluate -> DEBU 3efb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.383 UTC [policies] Evaluate -> DEBU 3efc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.384 UTC [policies] Evaluate -> DEBU 3efd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.384 UTC [policies] Evaluate -> DEBU 3efe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:00.384 UTC [gossip.gossip] handleMessage -> DEBU 3eff Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.476 UTC [msp] DeserializeIdentity -> DEBU 3f00 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.476 UTC [msp] DeserializeIdentity -> DEBU 3f01 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.477 UTC [gossip.pull] Hello -> DEBU 3f02 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:00.477 UTC [msp] DeserializeIdentity -> DEBU 3f03 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.477 UTC [msp] DeserializeIdentity -> DEBU 3f04 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.477 UTC [gossip.comm] Send -> DEBU 3f05 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:00.477 UTC [gossip.comm] sendToEndpoint -> DEBU 3f06 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.477 UTC [gossip.comm] sendToEndpoint -> DEBU 3f07 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.481 UTC [gossip.comm] func1 -> DEBU 3f08 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3280440632810648293 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.482 UTC [gossip.gossip] handleMessage -> DEBU 3f09 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3280440632810648293 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.482 UTC [gossip.pull] HandleMessage -> DEBU 3f0a GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3280440632810648293 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.482 UTC [gossip.gossip] handleMessage -> DEBU 3f0b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.622 UTC [gossip.comm] func1 -> DEBU 3f0c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.623 UTC [gossip.gossip] handleMessage -> DEBU 3f0d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.624 UTC [msp] DeserializeIdentity -> DEBU 3f0e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.625 UTC [msp] DeserializeIdentity -> DEBU 3f0f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.626 UTC [gossip.gossip] handleMessage -> DEBU 3f10 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.665 UTC [gossip.comm] func1 -> DEBU 3f11 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.665 UTC [gossip.gossip] handleMessage -> DEBU 3f12 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.666 UTC [gossip.pull] HandleMessage -> DEBU 3f13 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.666 UTC [gossip.pull] SendDigest -> DEBU 3f14 Sending BLOCK_MSG digest: [2 3 4 5 6 7 8 1] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:00.666 UTC [gossip.gossip] handleMessage -> DEBU 3f15 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f16 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151032 " +peer0.org1.example.com | "2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f17 Sign: digest: 995334B154038195A1751F7874FA4CDB8B488AE8115BE2CA8DD984DA98A317DB " +peer0.org1.example.com | "2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f18 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f19 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:00.807 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f1a Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:18:00.812 UTC [msp] DeserializeIdentity -> DEBU 3f1b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.813 UTC [msp] DeserializeIdentity -> DEBU 3f1c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.813 UTC [gossip.comm] Send -> DEBU 3f1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:00.813 UTC [msp] DeserializeIdentity -> DEBU 3f1e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.813 UTC [gossip.comm] Send -> DEBU 3f1f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:00.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3f20 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.813 UTC [msp] DeserializeIdentity -> DEBU 3f21 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3f22 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.814 UTC [gossip.comm] Send -> DEBU 3f23 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f25 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f26 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f27 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:00.840 UTC [gossip.gossip] handleMessage -> DEBU 3f28 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:00.840 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.843 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.843 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:00.844 UTC [gossip.gossip] handleMessage -> DEBU 3f2c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.051 UTC [gossip.comm] func1 -> DEBU 3f2d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.051 UTC [gossip.gossip] handleMessage -> DEBU 3f2e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.053 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.054 UTC [msp] DeserializeIdentity -> DEBU 3f30 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.054 UTC [msp] DeserializeIdentity -> DEBU 3f31 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.054 UTC [gossip.gossip] handleMessage -> DEBU 3f32 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.099 UTC [gossip.comm] func1 -> DEBU 3f33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.099 UTC [gossip.gossip] handleMessage -> DEBU 3f34 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.gossip] handleMessage -> DEBU 3f35 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f36 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f37 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f38 Verify: digest = 00000000 bf 55 74 b1 20 f5 7a 51 87 a4 82 de 27 53 25 06 |.Ut. .zQ....'S%.| +peer0.org1.example.com | 00000010 1d c4 3e 0b 6f 92 b8 83 0e 10 96 60 56 22 40 40 |..>.o......`V"@@|" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f39 Verify: sig = 00000000 30 44 02 20 1f 02 57 fd 76 42 bc e5 86 bd 36 c8 |0D. ..W.vB....6.| +peer0.org1.example.com | 00000010 2b aa 94 40 99 6f e6 22 5a 45 73 d8 a5 7e c7 df |+..@.o."ZEs..~..| +peer0.org1.example.com | 00000020 e0 7f 5f b4 02 20 38 30 9d fa 33 88 b2 e1 a7 f8 |.._.. 80..3.....| +peer0.org1.example.com | 00000030 44 6b 37 c5 30 7b e2 e9 23 0a 8b 04 b4 59 a6 43 |Dk7.0{..#....Y.C| +peer0.org1.example.com | 00000040 b0 18 cd c2 46 4d |....FM|" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f3a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f3b Verify: sig = 00000000 30 45 02 21 00 d2 dc 1f d7 11 13 32 c8 66 63 e9 |0E.!.......2.fc.| +peer0.org1.example.com | 00000010 6a be a5 b6 cb 25 b6 1f 2f 83 f6 b7 70 59 3d 6f |j....%../...pY=o| +peer0.org1.example.com | 00000020 3f 7c 56 fb aa 02 20 32 d4 36 42 f3 f9 85 01 8e |?|V... 2.6B.....| +peer0.org1.example.com | 00000030 d6 53 f3 95 52 32 bf ba 86 e5 9b 10 24 2e 19 af |.S..R2......$...| +peer0.org1.example.com | 00000040 e5 82 08 d6 86 a3 80 |.......|" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f3c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 " +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 " +peer0.org1.example.com | "2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f40 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:01.101 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f41 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f42 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f43 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.105 UTC [msp] DeserializeIdentity -> DEBU 3f44 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.105 UTC [msp] DeserializeIdentity -> DEBU 3f45 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.107 UTC [msp] DeserializeIdentity -> DEBU 3f46 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.107 UTC [gossip.comm] Send -> DEBU 3f47 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:01.108 UTC [msp] DeserializeIdentity -> DEBU 3f48 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.108 UTC [gossip.comm] Send -> DEBU 3f49 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:01.108 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.108 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.110 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.110 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.112 UTC [gossip.gossip] handleMessage -> DEBU 3f4e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.112 UTC [gossip.gossip] handleMessage -> DEBU 3f4f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.112 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f50 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f51 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.117 UTC [gossip.comm] func1 -> DEBU 3f52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.117 UTC [gossip.gossip] handleMessage -> DEBU 3f53 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.117 UTC [gossip.gossip] handleMessage -> DEBU 3f54 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f55 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f56 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.435 UTC [gossip.election] waitForInterrupt -> DEBU 3f57 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.436 UTC [gossip.election] IsLeader -> DEBU 3f58 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:18:01.436 UTC [msp.identity] Sign -> DEBU 3f59 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510111801 " +peer0.org1.example.com | "2019-04-22 06:18:01.436 UTC [msp.identity] Sign -> DEBU 3f5a Sign: digest: C86F6FBF68F4966EE1575F58C44E6900D848D1E95BCF5020A3CE5E019A7C1A42 " +peer0.org1.example.com | "2019-04-22 06:18:01.436 UTC [gossip.election] waitForInterrupt -> DEBU 3f5b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:18:01.438 UTC [msp] DeserializeIdentity -> DEBU 3f5c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.438 UTC [msp] DeserializeIdentity -> DEBU 3f5d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f5e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f5f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.439 UTC [gossip.comm] Send -> DEBU 3f60 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f61 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f62 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.439 UTC [gossip.comm] sendToEndpoint -> DEBU 3f63 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.439 UTC [gossip.comm] sendToEndpoint -> DEBU 3f64 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.570 UTC [gossip.comm] func1 -> DEBU 3f65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.570 UTC [gossip.gossip] handleMessage -> DEBU 3f66 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.570 UTC [gossip.gossip] handleMessage -> DEBU 3f67 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.570 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f69 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:01.570 UTC [msp] DeserializeIdentity -> DEBU 3f6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f6c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f6d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [policies] Evaluate -> DEBU 3f6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [policies] Evaluate -> DEBU 3f6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [policies] Evaluate -> DEBU 3f70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [cauthdsl] func1 -> DEBU 3f71 0xc000574930 gate 1555913881571406700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [cauthdsl] func2 -> DEBU 3f72 0xc000574930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [cauthdsl] func2 -> DEBU 3f73 0xc000574930 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [cauthdsl] func2 -> DEBU 3f74 0xc000574930 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [msp.identity] Verify -> DEBU 3f75 Verify: digest = 00000000 94 85 7d 61 18 5c d8 c7 c4 f5 0a b7 22 0b fc 1d |..}a.\......"...| +peer0.org1.example.com | 00000010 a4 59 43 a1 bb f8 a2 fc ad c2 0b d5 0c d4 a9 f6 |.YC.............|" +peer0.org1.example.com | "2019-04-22 06:18:01.571 UTC [msp.identity] Verify -> DEBU 3f76 Verify: sig = 00000000 30 45 02 21 00 c9 49 d6 67 00 d3 66 53 72 a9 7c |0E.!..I.g..fSr.|| +peer0.org1.example.com | 00000010 77 d2 ee 94 98 cc 2d 3b f9 1f 5f 38 52 e1 74 b9 |w.....-;.._8R.t.| +peer0.org1.example.com | 00000020 d5 0f 98 3e 6c 02 20 5d 29 85 70 21 3d 71 e3 b7 |...>l. ]).p!=q..| +peer0.org1.example.com | 00000030 96 51 4e 70 b1 81 d3 a3 e9 1d f5 14 ee d6 7c 8c |.QNp..........|.| +peer0.org1.example.com | 00000040 6e d7 d3 5d 7d d0 56 |n..]}.V|" +peer0.org1.example.com | "2019-04-22 06:18:01.592 UTC [gossip.gossip] handleMessage -> DEBU 3f77 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.594 UTC [cauthdsl] func2 -> DEBU 3f78 0xc000574930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:01.594 UTC [cauthdsl] func1 -> DEBU 3f79 0xc000574930 gate 1555913881571406700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:01.596 UTC [policies] Evaluate -> DEBU 3f7a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:01.596 UTC [policies] Evaluate -> DEBU 3f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:01.596 UTC [policies] Evaluate -> DEBU 3f7c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:01.599 UTC [gossip.comm] func1 -> DEBU 3f7d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.597 UTC [policies] Evaluate -> DEBU 3f7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:01.600 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f7f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f80 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:01.601 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f81 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 " +peer0.org1.example.com | "2019-04-22 06:18:01.601 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f82 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 " +peer0.org1.example.com | "2019-04-22 06:18:01.602 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f83 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:01.602 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f84 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.602 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f85 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.602 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f86 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f87 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.603 UTC [gossip.gossip] handleMessage -> DEBU 3f88 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.603 UTC [gossip.gossip] handleMessage -> DEBU 3f89 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.604 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.605 UTC [msp] DeserializeIdentity -> DEBU 3f8e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f8f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f90 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f92 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f93 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.607 UTC [msp] DeserializeIdentity -> DEBU 3f94 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.607 UTC [gossip.comm] Send -> DEBU 3f95 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:01.607 UTC [msp] DeserializeIdentity -> DEBU 3f96 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.607 UTC [gossip.comm] Send -> DEBU 3f97 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:01.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f98 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f99 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.609 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.609 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.993 UTC [gossip.gossip] handleMessage -> DEBU 3f9c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.994 UTC [gossip.gossip] handleMessage -> DEBU 3f9d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:01.994 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f9e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:01.994 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f9f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:01.994 UTC [msp] DeserializeIdentity -> DEBU 3fa0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:01.995 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fa1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:01.995 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:01.995 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:01.995 UTC [policies] Evaluate -> DEBU 3fa4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:01.996 UTC [policies] Evaluate -> DEBU 3fa5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:01.996 UTC [policies] Evaluate -> DEBU 3fa6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:01.996 UTC [cauthdsl] func1 -> DEBU 3fa7 0xc0005452f0 gate 1555913881996449200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:01.996 UTC [cauthdsl] func2 -> DEBU 3fa8 0xc0005452f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:01.996 UTC [cauthdsl] func2 -> DEBU 3fa9 0xc0005452f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:01.996 UTC [cauthdsl] func2 -> DEBU 3faa 0xc0005452f0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:01.997 UTC [msp.identity] Verify -> DEBU 3fab Verify: digest = 00000000 de ca 93 82 ab ad 75 c6 7c a7 74 04 47 64 cc f4 |......u.|.t.Gd..| +peer0.org1.example.com | 00000010 ee d1 51 ef 03 8b 1b c2 df ac ef ad df e6 d4 aa |..Q.............|" +peer0.org1.example.com | "2019-04-22 06:18:01.997 UTC [msp.identity] Verify -> DEBU 3fac Verify: sig = 00000000 30 44 02 20 69 da 3f 03 b8 db 4d 02 87 12 02 b5 |0D. i.?...M.....| +peer0.org1.example.com | 00000010 40 b3 66 61 b3 14 89 1c ba 0a b5 04 1e f0 00 a1 |@.fa............| +peer0.org1.example.com | 00000020 07 a1 36 df 02 20 27 33 70 e3 ab 6a 6e 0e f1 48 |..6.. '3p..jn..H| +peer0.org1.example.com | 00000030 fe d9 1a f9 71 98 6b 68 82 8f 74 29 b3 12 73 0b |....q.kh..t)..s.| +peer0.org1.example.com | 00000040 9f 41 94 ab f5 10 |.A....|" +peer0.org1.example.com | "2019-04-22 06:18:01.998 UTC [cauthdsl] func2 -> DEBU 3fad 0xc0005452f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:01.998 UTC [cauthdsl] func1 -> DEBU 3fae 0xc0005452f0 gate 1555913881996449200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:01.998 UTC [policies] Evaluate -> DEBU 3faf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:02.004 UTC [policies] Evaluate -> DEBU 3fb0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:02.004 UTC [policies] Evaluate -> DEBU 3fb1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:02.004 UTC [policies] Evaluate -> DEBU 3fb2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:02.004 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fb3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.004 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:02.004 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb5 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 " +peer0.org1.example.com | "2019-04-22 06:18:02.004 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb6 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 " +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fb9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fba Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.comm] func1 -> DEBU 3fbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.gossip] handleMessage -> DEBU 3fbd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fbc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.gossip] handleMessage -> DEBU 3fbe Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fbf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fc0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fc1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fc2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fc3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.007 UTC [msp] DeserializeIdentity -> DEBU 3fc4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.008 UTC [msp] DeserializeIdentity -> DEBU 3fc5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.009 UTC [gossip.comm] Send -> DEBU 3fc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.010 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.010 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.009 UTC [msp] DeserializeIdentity -> DEBU 3fc9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.012 UTC [msp] DeserializeIdentity -> DEBU 3fca Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.012 UTC [gossip.comm] Send -> DEBU 3fcb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.014 UTC [gossip.comm] sendToEndpoint -> DEBU 3fcd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.014 UTC [gossip.comm] sendToEndpoint -> DEBU 3fce Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.013 UTC [gossip.comm] func1 -> DEBU 3fcc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.014 UTC [gossip.gossip] handleMessage -> DEBU 3fcf Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.014 UTC [gossip.gossip] handleMessage -> DEBU 3fd0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fd1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fd2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.868 UTC [gossip.pull] Hello -> DEBU 3fd3 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:02.868 UTC [gossip.comm] Send -> DEBU 3fd4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.869 UTC [gossip.pull] Hello -> DEBU 3fd5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:02.869 UTC [gossip.comm] Send -> DEBU 3fd6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.869 UTC [gossip.pull] Hello -> DEBU 3fd7 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:02.869 UTC [gossip.comm] Send -> DEBU 3fd8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.869 UTC [gossip.comm] sendToEndpoint -> DEBU 3fd9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.870 UTC [gossip.comm] sendToEndpoint -> DEBU 3fda Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.870 UTC [gossip.comm] sendToEndpoint -> DEBU 3fdb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.871 UTC [gossip.comm] sendToEndpoint -> DEBU 3fdc Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3fdd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3fde Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.874 UTC [gossip.gossip] handleMessage -> DEBU 3fdf Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15281605375006860163 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.874 UTC [gossip.pull] HandleMessage -> DEBU 3fe0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15281605375006860163 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.875 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.875 UTC [gossip.comm] func1 -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18201895390485576267 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.876 UTC [gossip.gossip] handleMessage -> DEBU 3fe3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18201895390485576267 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.876 UTC [gossip.pull] HandleMessage -> DEBU 3fe4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18201895390485576267 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.876 UTC [gossip.gossip] handleMessage -> DEBU 3fe5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.877 UTC [gossip.comm] func1 -> DEBU 3fe6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 672223985744247501 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.878 UTC [gossip.gossip] handleMessage -> DEBU 3fe7 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 672223985744247501 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.878 UTC [gossip.pull] HandleMessage -> DEBU 3fe8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 672223985744247501 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.879 UTC [gossip.gossip] handleMessage -> DEBU 3fe9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3fea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151033 " +peer0.org1.example.com | "2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3feb Sign: digest: 97865AB1EAFDD2593CA477AD0D241EA8CABC489E02944F79F7472DE9AA8B051D " +peer0.org1.example.com | "2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3fec Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3fed Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:02.928 UTC [gossip.comm] Send -> DEBU 3fee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.928 UTC [gossip.comm] sendToEndpoint -> DEBU 3ff0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.928 UTC [gossip.comm] sendToEndpoint -> DEBU 3ff1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.928 UTC [msp] DeserializeIdentity -> DEBU 3fef Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.931 UTC [gossip.comm] func1 -> DEBU 3ff2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.931 UTC [gossip.gossip] handleMessage -> DEBU 3ff3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.931 UTC [gossip.gossip] handleMessage -> DEBU 3ff4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ff6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:02.931 UTC [gossip.comm] Send -> DEBU 3ff7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.932 UTC [msp.identity] Verify -> DEBU 3ff8 Verify: digest = 00000000 97 86 5a b1 ea fd d2 59 3c a4 77 ad 0d 24 1e a8 |..Z....Y<.w..$..| +peer0.org1.example.com | 00000010 ca bc 48 9e 02 94 4f 79 f7 47 2d e9 aa 8b 05 1d |..H...Oy.G-.....|" +peer0.org1.example.com | "2019-04-22 06:18:02.932 UTC [msp] DeserializeIdentity -> DEBU 3ff9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:02.932 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.933 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffd Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.932 UTC [gossip.comm] Send -> DEBU 3ffc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:02.932 UTC [msp.identity] Verify -> DEBU 3ffa Verify: sig = 00000000 30 44 02 20 68 19 e0 06 e5 fc 65 33 56 66 50 a2 |0D. h.....e3VfP.| +peer0.org1.example.com | 00000010 1a ac 7e 74 e5 30 32 95 25 a3 70 e0 70 36 52 88 |..~t.02.%.p.p6R.| +peer0.org1.example.com | 00000020 37 b3 b1 82 02 20 2d bb 1f d4 da f3 c5 ac 27 19 |7.... -.......'.| +peer0.org1.example.com | 00000030 4e e4 39 59 77 7c c9 86 1c 68 8e 21 fc 99 78 3e |N.9Yw|...h.!..x>| +peer0.org1.example.com | 00000040 b3 5f 61 38 cf b7 |._a8..|" +peer0.org1.example.com | "2019-04-22 06:18:02.938 UTC [msp.identity] Verify -> DEBU 3fff Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:18:02.938 UTC [msp.identity] Verify -> DEBU 4000 Verify: sig = 00000000 30 44 02 20 7a d1 c6 ec 6f 3b 71 a8 55 f0 c0 ba |0D. z...o;q.U...| +peer0.org1.example.com | 00000010 1f 1a c2 c7 e2 c8 df 17 89 04 e6 ee 65 3b 80 3b |............e;.;| +peer0.org1.example.com | 00000020 3d ff 20 c3 02 20 47 6f 29 b3 cf 79 20 5e bf 07 |=. .. Go)..y ^..| +peer0.org1.example.com | 00000030 4a 20 51 48 9d 8c fe 5c 9d 82 c5 31 c2 89 cd 64 |J QH...\...1...d| +peer0.org1.example.com | 00000040 21 25 4b 3a ab 6b |!%K:.k|" +peer0.org1.example.com | "2019-04-22 06:18:02.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4001 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.938 UTC [gossip.discovery] isSentByMe -> DEBU 4002 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4003 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4004 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.936 UTC [gossip.gossip] handleMessage -> DEBU 3ffe Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.939 UTC [gossip.gossip] handleMessage -> DEBU 4005 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4006 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4007 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:02.940 UTC [msp.identity] Verify -> DEBU 4008 Verify: digest = 00000000 97 86 5a b1 ea fd d2 59 3c a4 77 ad 0d 24 1e a8 |..Z....Y<.w..$..| +peer0.org1.example.com | 00000010 ca bc 48 9e 02 94 4f 79 f7 47 2d e9 aa 8b 05 1d |..H...Oy.G-.....|" +peer0.org1.example.com | "2019-04-22 06:18:02.940 UTC [msp.identity] Verify -> DEBU 4009 Verify: sig = 00000000 30 44 02 20 68 19 e0 06 e5 fc 65 33 56 66 50 a2 |0D. h.....e3VfP.| +peer0.org1.example.com | 00000010 1a ac 7e 74 e5 30 32 95 25 a3 70 e0 70 36 52 88 |..~t.02.%.p.p6R.| +peer0.org1.example.com | 00000020 37 b3 b1 82 02 20 2d bb 1f d4 da f3 c5 ac 27 19 |7.... -.......'.| +peer0.org1.example.com | 00000030 4e e4 39 59 77 7c c9 86 1c 68 8e 21 fc 99 78 3e |N.9Yw|...h.!..x>| +peer0.org1.example.com | 00000040 b3 5f 61 38 cf b7 |._a8..|" +peer0.org1.example.com | "2019-04-22 06:18:02.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 400a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.941 UTC [gossip.discovery] isSentByMe -> DEBU 400b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 400c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.941 UTC [gossip.comm] sendToEndpoint -> DEBU 400e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.942 UTC [gossip.comm] sendToEndpoint -> DEBU 400f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.947 UTC [gossip.comm] func1 -> DEBU 4010 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.947 UTC [gossip.gossip] handleMessage -> DEBU 4011 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.948 UTC [gossip.gossip] handleMessage -> DEBU 4012 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4013 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4014 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:02.948 UTC [msp.identity] Verify -> DEBU 4015 Verify: digest = 00000000 97 86 5a b1 ea fd d2 59 3c a4 77 ad 0d 24 1e a8 |..Z....Y<.w..$..| +peer0.org1.example.com | 00000010 ca bc 48 9e 02 94 4f 79 f7 47 2d e9 aa 8b 05 1d |..H...Oy.G-.....|" +peer0.org1.example.com | "2019-04-22 06:18:02.949 UTC [msp.identity] Verify -> DEBU 4016 Verify: sig = 00000000 30 44 02 20 68 19 e0 06 e5 fc 65 33 56 66 50 a2 |0D. h.....e3VfP.| +peer0.org1.example.com | 00000010 1a ac 7e 74 e5 30 32 95 25 a3 70 e0 70 36 52 88 |..~t.02.%.p.p6R.| +peer0.org1.example.com | 00000020 37 b3 b1 82 02 20 2d bb 1f d4 da f3 c5 ac 27 19 |7.... -.......'.| +peer0.org1.example.com | 00000030 4e e4 39 59 77 7c c9 86 1c 68 8e 21 fc 99 78 3e |N.9Yw|...h.!..x>| +peer0.org1.example.com | 00000040 b3 5f 61 38 cf b7 |._a8..|" +peer0.org1.example.com | "2019-04-22 06:18:02.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4017 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.949 UTC [gossip.discovery] isSentByMe -> DEBU 4018 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:02.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4019 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:02.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 401a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.109 UTC [gossip.comm] func1 -> DEBU 401b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.110 UTC [gossip.gossip] handleMessage -> DEBU 401c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.110 UTC [gossip.pull] HandleMessage -> DEBU 401d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.112 UTC [gossip.pull] SendDigest -> DEBU 401e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:03.112 UTC [gossip.gossip] handleMessage -> DEBU 401f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.184 UTC [gossip.comm] func1 -> DEBU 4020 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.184 UTC [gossip.gossip] handleMessage -> DEBU 4021 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [gossip.gossip] handleMessage -> DEBU 4022 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4023 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4024 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4025 Verify: digest = 00000000 f9 21 e0 ca 33 86 0e 66 d4 7f 3e b2 28 ee 93 93 |.!..3..f..>.(...| +peer0.org1.example.com | 00000010 6a a4 91 42 75 0c c1 8f 54 07 6f 56 d6 6f 38 9f |j..Bu...T.oV.o8.|" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4026 Verify: sig = 00000000 30 45 02 21 00 c5 f3 35 28 9a 72 57 1f 98 e3 62 |0E.!...5(.rW...b| +peer0.org1.example.com | 00000010 c4 5f 04 44 1d d4 ae 90 ee fe cc af 7f 8c 6f f4 |._.D..........o.| +peer0.org1.example.com | 00000020 3b 59 0a c0 86 02 20 33 a5 2c 24 a9 24 c6 ac 41 |;Y.... 3.,$.$..A| +peer0.org1.example.com | 00000030 c0 0c 49 09 50 3a f6 b5 fa 06 38 64 76 63 af 81 |..I.P:....8dvc..| +peer0.org1.example.com | 00000040 0e 7b 8e 99 f3 03 cc |.{.....|" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4027 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4028 Verify: sig = 00000000 30 44 02 20 63 4c b9 fb 57 01 f7 5d 57 7d 10 18 |0D. cL..W..]W}..| +peer0.org1.example.com | 00000010 67 b0 0d 8b a0 d2 a6 b0 4d cf 9b bc 12 77 1c 4e |g.......M....w.N| +peer0.org1.example.com | 00000020 3d f0 65 09 02 20 7e 46 a2 33 a1 e6 ff d7 d8 78 |=.e.. ~F.3.....x| +peer0.org1.example.com | 00000030 39 f8 1a 28 2a b0 25 cd b3 77 ce 9d 6a 5e 6c c4 |9..(*.%..w..j^l.| +peer0.org1.example.com | 00000040 ba 4f b3 c6 a7 61 |.O...a|" +peer0.org1.example.com | "2019-04-22 06:18:03.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 4029 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 " +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 " +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 402f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4030 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] sendMemResponse -> DEBU 4031 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [msp] DeserializeIdentity -> DEBU 4032 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [msp] DeserializeIdentity -> DEBU 4033 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.comm] Send -> DEBU 4034 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.discovery] sendMemResponse -> DEBU 4035 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4036 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4037 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.428 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4038 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.429 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4039 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.429 UTC [policies] Evaluate -> DEBU 403a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-04-22 06:18:03.429 UTC [policies] Evaluate -> DEBU 403b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.429 UTC [policies] Evaluate -> DEBU 403c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.430 UTC [cauthdsl] func1 -> DEBU 403d 0xc0003e4410 gate 1555913883430025000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.430 UTC [cauthdsl] func2 -> DEBU 403e 0xc0003e4410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.430 UTC [cauthdsl] func2 -> DEBU 403f 0xc0003e4410 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.430 UTC [cauthdsl] func2 -> DEBU 4040 0xc0003e4410 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.430 UTC [msp.identity] Verify -> DEBU 4041 Verify: digest = 00000000 70 bf 91 5b 60 50 5e dc 48 0e 06 71 12 b3 b7 5f |p..[`P^.H..q..._| +peer0.org1.example.com | 00000010 eb 25 35 cb b0 e0 83 bd 69 77 de ac aa cd d4 84 |.%5.....iw......|" +peer0.org1.example.com | "2019-04-22 06:18:03.431 UTC [msp.identity] Verify -> DEBU 4042 Verify: sig = 00000000 30 45 02 21 00 a7 5e 3c 18 2b 26 f2 53 65 6c 07 |0E.!..^<.+&.Sel.| +peer0.org1.example.com | 00000010 8f 32 67 f9 2b c5 f3 fa 84 90 48 c8 23 e5 a1 de |.2g.+.....H.#...| +peer0.org1.example.com | 00000020 cb 74 ed b2 a4 02 20 58 fb 7e f5 92 1c 9c 27 87 |.t.... X.~....'.| +peer0.org1.example.com | 00000030 db 68 9e be c7 98 2b 3b cd 31 97 e3 0b d6 78 75 |.h....+;.1....xu| +peer0.org1.example.com | 00000040 1d 58 8e 3c 89 21 bf |.X.<.!.|" +peer0.org1.example.com | "2019-04-22 06:18:03.431 UTC [cauthdsl] func2 -> DEBU 4043 0xc0003e4410 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.431 UTC [cauthdsl] func1 -> DEBU 4044 0xc0003e4410 gate 1555913883430025000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4045 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4046 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4047 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4048 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:18:03.433 UTC [blocksProvider] DeliverBlocks -> DEBU 4049 [businesschannel] Adding payload to local buffer, blockNum = [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.433 UTC [gossip.state] addPayload -> DEBU 404a [businesschannel] Adding payload to local buffer, blockNum = [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.433 UTC [gossip.state] addPayload -> DEBU 404b Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-04-22 06:18:03.433 UTC [blocksProvider] DeliverBlocks -> DEBU 404d [businesschannel] Gossiping block [9], peers number [3]" +peer0.org1.example.com | "2019-04-22 06:18:03.433 UTC [gossip.state] deliverPayloads -> DEBU 404c [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.434 UTC [gossip.state] deliverPayloads -> DEBU 404f [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-04-22 06:18:03.434 UTC [gossip.channel] AddToMsgStore -> DEBU 404e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35013 bytes, seq: 9}, Envelope: 35046 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-04-22 06:18:03.434 UTC [gossip.pull] Add -> DEBU 4051 Added 9, total items: 9" +peer0.org1.example.com | "2019-04-22 06:18:03.434 UTC [gossip.privdata] StoreBlock -> INFO 4050 [businesschannel] Received block [9] from buffer" +peer0.org1.example.com | "2019-04-22 06:18:03.435 UTC [gossip.privdata] StoreBlock -> DEBU 4052 [businesschannel] Validating block [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.435 UTC [committer.txvalidator] Validate -> DEBU 4053 [businesschannel] START Block Validation for block [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.436 UTC [committer.txvalidator] Validate -> DEBU 4054 expecting 1 block validation responses" +peer0.org1.example.com | "2019-04-22 06:18:03.436 UTC [committer.txvalidator] validateTx -> DEBU 4055 [businesschannel] validateTx starts for block 0xc0032a01c0 env 0xc0024cb770 txn 0" +peer0.org1.example.com | "2019-04-22 06:18:03.436 UTC [protoutils] ValidateTransaction -> DEBU 4056 ValidateTransactionEnvelope starts for envelope 0xc0024cb770" +peer0.org1.example.com | "2019-04-22 06:18:03.436 UTC [protoutils] ValidateTransaction -> DEBU 4057 Header is channel_header:"\010\001\032\006\010\233\271\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\215\272\257bT\027\013\3300\221\207S\275\344\3739\373\302O\2525C3\232" " +peer0.org1.example.com | "2019-04-22 06:18:03.436 UTC [protoutils] validateChannelHeader -> DEBU 4058 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-04-22 06:18:03.436 UTC [protoutils] checkSignatureFromCreator -> DEBU 4059 begin" +peer0.org1.example.com | "2019-04-22 06:18:03.437 UTC [msp] GetManagerForChain -> DEBU 405a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:18:03.437 UTC [protoutils] checkSignatureFromCreator -> DEBU 405b creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +peer0.org1.example.com | "2019-04-22 06:18:03.437 UTC [msp] Validate -> DEBU 405c MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.438 UTC [protoutils] checkSignatureFromCreator -> DEBU 405d creator is valid" +peer0.org1.example.com | "2019-04-22 06:18:03.438 UTC [msp.identity] Verify -> DEBU 405e Verify: digest = 00000000 47 27 60 5d ea cc 66 7f 41 e9 38 85 27 30 21 1e |G'`]..f.A.8.'0!.| +peer0.org1.example.com | 00000010 20 b5 e0 bd 4b 22 af 9e 91 6e f8 54 70 c3 75 3c | ...K"...n.Tp.u<|" +peer0.org1.example.com | "2019-04-22 06:18:03.439 UTC [msp.identity] Verify -> DEBU 405f Verify: sig = 00000000 30 44 02 20 31 5b e1 29 5d be 8a 00 a9 b9 6f 8b |0D. 1[.)].....o.| +peer0.org1.example.com | 00000010 06 fd 2d 3d 49 13 e4 86 ff b1 e3 7b bb 11 2f a7 |..-=I......{../.| +peer0.org1.example.com | 00000020 e8 4c 2c 00 02 20 2b 39 58 25 37 44 b6 da 79 71 |.L,.. +9X%7D..yq| +peer0.org1.example.com | 00000030 55 e6 d5 98 ff 2b be b5 48 14 67 53 8a 79 75 1d |U....+..H.gS.yu.| +peer0.org1.example.com | 00000040 aa ab fd c0 f2 f7 |......|" +peer0.org1.example.com | "2019-04-22 06:18:03.439 UTC [protoutils] checkSignatureFromCreator -> DEBU 4060 exits successfully" +peer0.org1.example.com | "2019-04-22 06:18:03.439 UTC [protoutils] validateConfigTransaction -> DEBU 4061 validateConfigTransaction starts for data 0xc003dbc000, header channel_header:"\010\001\032\006\010\233\271\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\215\272\257bT\027\013\3300\221\207S\275\344\3739\373\302O\2525C3\232" " +peer0.org1.example.com | "2019-04-22 06:18:03.439 UTC [committer.txvalidator] validateTx -> DEBU 4062 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4063 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4064 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4065 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4066 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4067 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-04-22 06:18:03.441 UTC [common.configtx] addToMap -> DEBU 4068 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.441 UTC [common.configtx] addToMap -> DEBU 4069 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.441 UTC [common.configtx] addToMap -> DEBU 406a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406b Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406c Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406d Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406e Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406f Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4070 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4071 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4072 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4073 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4074 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4075 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4076 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4077 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4078 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4079 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407a Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 407b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407c Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407d Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [gossip.comm] Send -> DEBU 407e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35013 bytes, seq: 9}, Envelope: 35046 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407f Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4080 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4081 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4082 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4083 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4084 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4085 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [gossip.comm] sendToEndpoint -> DEBU 4086 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35013 bytes, seq: 9}, Envelope: 35046 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [common.configtx] verifyDeltaSet -> DEBU 4087 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.442 UTC [gossip.comm] sendToEndpoint -> DEBU 4088 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 4089 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 408a Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 408b Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 408c Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.456 UTC [common.configtx] verifyDeltaSet -> DEBU 408d Processing change to key: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.457 UTC [common.configtx] policyForItem -> DEBU 408e Getting policy for item Application with mod_policy Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.458 UTC [policies] Manager -> DEBU 408f Manager Channel looking up path []" +peer0.org1.example.com | "2019-04-22 06:18:03.458 UTC [policies] Manager -> DEBU 4090 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:18:03.459 UTC [policies] Manager -> DEBU 4091 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.460 UTC [policies] Manager -> DEBU 4092 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-04-22 06:18:03.460 UTC [policies] Manager -> DEBU 4093 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:18:03.461 UTC [policies] Manager -> DEBU 4094 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.462 UTC [policies] Manager -> DEBU 4095 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-04-22 06:18:03.462 UTC [policies] Manager -> DEBU 4096 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.462 UTC [policies] Manager -> DEBU 4097 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.463 UTC [policies] Evaluate -> DEBU 4098 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer0.org1.example.com | "2019-04-22 06:18:03.463 UTC [policies] Evaluate -> DEBU 4099 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.463 UTC [policies] Evaluate -> DEBU 409a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-04-22 06:18:03.464 UTC [cauthdsl] deduplicate -> WARN 409b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:18:03.465 UTC [cauthdsl] func1 -> DEBU 409c 0xc00236c270 gate 1555913883465001600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.466 UTC [cauthdsl] func2 -> DEBU 409d 0xc00236c270 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-04-22 06:18:03.466 UTC [cauthdsl] func2 -> DEBU 409e 0xc00236c270 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.467 UTC [cauthdsl] func2 -> DEBU 409f 0xc00236c270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:18:03.468 UTC [cauthdsl] func2 -> DEBU 40a0 0xc00236c270 processing identity 1 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.469 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40a1 Checking if identity satisfies ADMIN role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.470 UTC [cauthdsl] func2 -> DEBU 40a2 0xc00236c270 principal matched by identity 1" +peer0.org1.example.com | "2019-04-22 06:18:03.473 UTC [msp.identity] Verify -> DEBU 40a3 Verify: digest = 00000000 0c fd 1f e5 b1 9b db 02 57 c4 82 57 bc d0 0c 4b |........W..W...K| +peer0.org1.example.com | 00000010 97 87 a9 3b ca 23 a8 c2 03 3c f3 1a f8 a3 07 57 |...;.#...<.....W|" +peer0.org1.example.com | "2019-04-22 06:18:03.473 UTC [msp.identity] Verify -> DEBU 40a4 Verify: sig = 00000000 30 45 02 21 00 d6 e0 8c 37 df 62 cb 69 f9 ca 73 |0E.!....7.b.i..s| +peer0.org1.example.com | 00000010 04 64 61 bf 99 26 93 ca 3d 45 f6 6f 0f 3d b9 61 |.da..&..=E.o.=.a| +peer0.org1.example.com | 00000020 7a af 77 b9 12 02 20 4a 16 64 bd 85 6e 43 d5 e7 |z.w... J.d..nC..| +peer0.org1.example.com | 00000030 28 07 12 4c 58 19 bf 43 c2 12 88 2a bf 28 75 09 |(..LX..C...*.(u.| +peer0.org1.example.com | 00000040 a5 e6 fa 2b 77 6d e3 |...+wm.|" +peer0.org1.example.com | "2019-04-22 06:18:03.475 UTC [cauthdsl] func2 -> DEBU 40a5 0xc00236c270 principal evaluation succeeds for identity 1" +peer0.org1.example.com | "2019-04-22 06:18:03.476 UTC [cauthdsl] func1 -> DEBU 40a6 0xc00236c270 gate 1555913883465001600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.476 UTC [policies] Evaluate -> DEBU 40a7 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.476 UTC [policies] Evaluate -> DEBU 40a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.477 UTC [policies] Evaluate -> DEBU 40a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-04-22 06:18:03.478 UTC [cauthdsl] deduplicate -> WARN 40aa De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:18:03.478 UTC [cauthdsl] func1 -> DEBU 40ab 0xc00236cb10 gate 1555913883478586700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.478 UTC [cauthdsl] func2 -> DEBU 40ac 0xc00236cb10 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-04-22 06:18:03.478 UTC [cauthdsl] func2 -> DEBU 40ad 0xc00236cb10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.479 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40ae Checking if identity satisfies ADMIN role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.479 UTC [cauthdsl] func2 -> DEBU 40af 0xc00236cb10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.479 UTC [msp.identity] Verify -> DEBU 40b0 Verify: digest = 00000000 8e 73 57 0e b7 c7 1b 71 9b 02 5f bd 37 50 74 25 |.sW....q.._.7Pt%| +peer0.org1.example.com | 00000010 06 6a 52 6c ef f6 86 21 8c 54 e2 73 5f 3d 4d 90 |.jRl...!.T.s_=M.|" +peer0.org1.example.com | "2019-04-22 06:18:03.479 UTC [msp.identity] Verify -> DEBU 40b1 Verify: sig = 00000000 30 45 02 21 00 f2 fa 21 f5 b5 4e 2e de a8 55 bd |0E.!...!..N...U.| +peer0.org1.example.com | 00000010 a8 cc 6e 98 b5 33 37 87 be c9 27 42 cf 21 2b 5f |..n..37...'B.!+_| +peer0.org1.example.com | 00000020 54 69 eb ed 1a 02 20 0b 2a d2 c7 e1 11 a3 64 cc |Ti.... .*.....d.| +peer0.org1.example.com | 00000030 0e 42 62 c5 f0 de 23 74 4d 0c 1a 46 43 50 06 27 |.Bb...#tM..FCP.'| +peer0.org1.example.com | 00000040 0b 25 bf 2c 59 22 e1 |.%.,Y".|" +peer0.org1.example.com | "2019-04-22 06:18:03.480 UTC [cauthdsl] func2 -> DEBU 40b2 0xc00236cb10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.480 UTC [cauthdsl] func1 -> DEBU 40b3 0xc00236cb10 gate 1555913883478586700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.481 UTC [policies] Evaluate -> DEBU 40b4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.482 UTC [policies] Evaluate -> DEBU 40b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.482 UTC [policies] Evaluate -> DEBU 40b6 Signature set satisfies policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.482 UTC [policies] Evaluate -> DEBU 40b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.483 UTC [common.configtx] verifyDeltaSet -> DEBU 40b8 Processing change to key: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.483 UTC [common.configtx] recurseConfigMap -> DEBU 40b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40ba Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40bb Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40bc Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40bd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.489 UTC [common.configtx] recurseConfigMap -> DEBU 40be Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40bf Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40c0 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40c2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.495 UTC [common.configtx] recurseConfigMap -> DEBU 40c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.495 UTC [common.configtx] recurseConfigMap -> DEBU 40c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.495 UTC [common.configtx] recurseConfigMap -> DEBU 40c5 Setting policy for key Admins to " +peer0.org1.example.com | "2019-04-22 06:18:03.496 UTC [common.configtx] recurseConfigMap -> DEBU 40c6 Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-04-22 06:18:03.498 UTC [common.configtx] recurseConfigMap -> DEBU 40c7 Setting policy for key LifecycleEndorsement to " +peer0.org1.example.com | "2019-04-22 06:18:03.498 UTC [common.configtx] recurseConfigMap -> DEBU 40c8 Setting policy for key Readers to " +peer0.org1.example.com | "2019-04-22 06:18:03.498 UTC [common.configtx] recurseConfigMap -> DEBU 40c9 Setting policy for key Writers to " +peer0.org1.example.com | "2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40ca Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40cb Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40cc Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40cd Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40ce Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40cf Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40d0 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40d1 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40d2 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.501 UTC [common.configtx] recurseConfigMap -> DEBU 40d3 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-04-22 06:18:03.501 UTC [common.channelconfig] NewStandardValues -> DEBU 40d4 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d5 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:18:03.502 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d6 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d7 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d8 Processing field: Consortium" +peer0.org1.example.com | "2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d9 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.506 UTC [common.channelconfig] NewStandardValues -> DEBU 40da Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40db Processing field: ACLs" +peer0.org1.example.com | "2019-04-22 06:18:03.507 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40dc Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.507 UTC [common.channelconfig] NewStandardValues -> DEBU 40dd Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.508 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40de Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:18:03.508 UTC [common.channelconfig] NewStandardValues -> DEBU 40df Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.508 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40e0 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.508 UTC [common.channelconfig] Validate -> DEBU 40e1 Anchor peers for org Org3MSP are " +peer0.org1.example.com | "2019-04-22 06:18:03.509 UTC [common.channelconfig] validateMSP -> DEBU 40e2 Setting up MSP for org Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.509 UTC [msp] newBccspMsp -> DEBU 40e3 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.509 UTC [msp] New -> DEBU 40e4 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.510 UTC [msp] Setup -> DEBU 40e5 Setting up MSP instance Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.510 UTC [msp.identity] newIdentity -> DEBU 40e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +peer0.org1.example.com | 6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +peer0.org1.example.com | CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.511 UTC [msp.identity] newIdentity -> DEBU 40e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +peer0.org1.example.com | zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +peer0.org1.example.com | u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +peer0.org1.example.com | R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.512 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40e8 Checking if identity satisfies role [CLIENT] for Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.513 UTC [msp] Validate -> DEBU 40e9 MSP Org3MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.519 UTC [msp] getCertificationChain -> DEBU 40ea MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.523 UTC [msp] hasOURole -> DEBU 40eb MSP Org3MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:18:03.524 UTC [msp] getCertificationChain -> DEBU 40ec MSP Org3MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.526 UTC [common.channelconfig] NewStandardValues -> DEBU 40ed Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.529 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40ee Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:18:03.530 UTC [common.channelconfig] NewStandardValues -> DEBU 40ef Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.530 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40f0 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.531 UTC [common.channelconfig] Validate -> DEBU 40f1 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-04-22 06:18:03.533 UTC [common.channelconfig] validateMSP -> DEBU 40f2 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.533 UTC [msp] newBccspMsp -> DEBU 40f3 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.534 UTC [msp] New -> DEBU 40f4 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.535 UTC [msp] Setup -> DEBU 40f5 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.535 UTC [msp.identity] newIdentity -> DEBU 40f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +peer0.org1.example.com | aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +peer0.org1.example.com | RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +peer0.org1.example.com | N0qzbu085qQXfAXf7yy4VoSHr1A6 +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.537 UTC [msp.identity] newIdentity -> DEBU 40f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.539 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40f8 Checking if identity satisfies role [CLIENT] for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.539 UTC [msp] Validate -> DEBU 40f9 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.549 UTC [msp] getCertificationChain -> DEBU 40fa MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.550 UTC [msp] hasOURole -> DEBU 40fb MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:18:03.550 UTC [msp] getCertificationChain -> DEBU 40fc MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.551 UTC [common.channelconfig] NewStandardValues -> DEBU 40fd Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.551 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40fe Processing field: AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:18:03.551 UTC [common.channelconfig] NewStandardValues -> DEBU 40ff Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.552 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4100 Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.552 UTC [common.channelconfig] Validate -> DEBU 4101 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-04-22 06:18:03.552 UTC [common.channelconfig] validateMSP -> DEBU 4102 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.552 UTC [comm.grpc.server] 1 -> INFO 4104 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.55Z grpc.peer_address=192.168.224.7:48424 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=292.1µs +peer0.org1.example.com | "2019-04-22 06:18:03.553 UTC [msp] newBccspMsp -> DEBU 4103 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.553 UTC [msp] New -> DEBU 4105 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.553 UTC [msp] Setup -> DEBU 4106 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.554 UTC [msp.identity] newIdentity -> DEBU 4107 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +peer0.org1.example.com | AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +peer0.org1.example.com | BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +peer0.org1.example.com | A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +peer0.org1.example.com | BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +peer0.org1.example.com | fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +peer0.org1.example.com | RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +peer0.org1.example.com | JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.555 UTC [msp.identity] newIdentity -> DEBU 4108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +peer0.org1.example.com | r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +peer0.org1.example.com | RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +peer0.org1.example.com | TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.556 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4109 Checking if identity satisfies role [CLIENT] for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.556 UTC [msp] Validate -> DEBU 410a MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.556 UTC [msp] getCertificationChain -> DEBU 410b MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.556 UTC [msp] hasOURole -> DEBU 410c MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-04-22 06:18:03.556 UTC [msp] getCertificationChain -> DEBU 410d MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.557 UTC [common.channelconfig] NewStandardValues -> DEBU 410e Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.557 UTC [msp.identity] Sign -> DEBU 410f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:03.559 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4110 Processing field: ConsensusType" +peer0.org1.example.com | "2019-04-22 06:18:03.559 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4111 Processing field: BatchSize" +peer0.org1.example.com | "2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4112 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4114 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4115 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4116 Processing field: Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.560 UTC [common.channelconfig] NewStandardValues -> DEBU 4117 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4118 Processing field: Endpoints" +peer0.org1.example.com | "2019-04-22 06:18:03.561 UTC [common.channelconfig] NewStandardValues -> DEBU 4119 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-04-22 06:18:03.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 411a Processing field: MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.563 UTC [common.channelconfig] validateMSP -> DEBU 411b Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:18:03.563 UTC [msp] newBccspMsp -> DEBU 411c Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.558 UTC [msp.identity] Sign -> DEBU 4113 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:03.564 UTC [msp] New -> DEBU 411d Creating Cache-MSP instance" +peer0.org1.example.com | "2019-04-22 06:18:03.564 UTC [msp] Setup -> DEBU 411f Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-04-22 06:18:03.565 UTC [msp.identity] newIdentity -> DEBU 4120 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +peer0.org1.example.com | bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +peer0.org1.example.com | XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +peer0.org1.example.com | MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +peer0.org1.example.com | DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +peer0.org1.example.com | b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +peer0.org1.example.com | t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.566 UTC [msp.identity] newIdentity -> DEBU 4121 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +peer0.org1.example.com | zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +peer0.org1.example.com | Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +peer0.org1.example.com | A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +peer0.org1.example.com | tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +peer0.org1.example.com | 0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.564 UTC [gossip.comm] authenticateRemotePeer -> DEBU 411e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.7:48424" +peer0.org1.example.com | "2019-04-22 06:18:03.568 UTC [msp] Validate -> DEBU 4122 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.568 UTC [msp] Setup -> DEBU 4123 Setting up the MSP manager (4 msps)" +peer0.org1.example.com | "2019-04-22 06:18:03.569 UTC [msp] Setup -> DEBU 4124 MSP manager setup complete, setup 4 msps" +peer0.org1.example.com | "2019-04-22 06:18:03.570 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4125 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48424" +peer0.org1.example.com | "2019-04-22 06:18:03.570 UTC [msp] DeserializeIdentity -> DEBU 4126 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.569 UTC [policies] NewManagerImpl -> DEBU 4127 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.570 UTC [policies] NewManagerImpl -> DEBU 4128 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.570 UTC [policies] NewManagerImpl -> DEBU 4129 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.570 UTC [policies] NewManagerImpl -> DEBU 412a Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.571 UTC [policies] NewManagerImpl -> DEBU 412c Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.571 UTC [policies] NewManagerImpl -> DEBU 412d Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.573 UTC [policies] NewManagerImpl -> DEBU 412e Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.574 UTC [policies] NewManagerImpl -> DEBU 412f Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.574 UTC [policies] NewManagerImpl -> DEBU 4130 Proposed new policy Admins for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.574 UTC [policies] NewManagerImpl -> DEBU 4131 Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4132 Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4133 Proposed new policy Writers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4134 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4135 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.576 UTC [policies] NewManagerImpl -> DEBU 4136 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.576 UTC [policies] NewManagerImpl -> DEBU 4137 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.576 UTC [policies] NewManagerImpl -> DEBU 4138 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 4139 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 413a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 413b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 413c Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.578 UTC [policies] NewManagerImpl -> DEBU 413d Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.578 UTC [policies] NewManagerImpl -> DEBU 413e Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.578 UTC [policies] NewManagerImpl -> DEBU 413f Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.579 UTC [policies] NewManagerImpl -> DEBU 4140 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-04-22 06:18:03.579 UTC [policies] NewManagerImpl -> DEBU 4141 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-04-22 06:18:03.579 UTC [policies] NewManagerImpl -> DEBU 4142 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-04-22 06:18:03.580 UTC [common.configtx] addToMap -> DEBU 4143 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-04-22 06:18:03.580 UTC [common.configtx] addToMap -> DEBU 4144 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-04-22 06:18:03.580 UTC [common.configtx] addToMap -> DEBU 4145 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.581 UTC [common.configtx] addToMap -> DEBU 4146 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:18:03.581 UTC [common.configtx] addToMap -> DEBU 4147 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.582 UTC [common.configtx] addToMap -> DEBU 4148 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.583 UTC [common.configtx] addToMap -> DEBU 4149 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.583 UTC [common.configtx] addToMap -> DEBU 414a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.583 UTC [common.configtx] addToMap -> DEBU 414b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414c Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.586 UTC [common.configtx] addToMap -> DEBU 4150 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.586 UTC [gossip.comm] func1 -> DEBU 4151 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.586 UTC [common.configtx] addToMap -> DEBU 4152 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.587 UTC [common.configtx] addToMap -> DEBU 4153 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.587 UTC [common.configtx] addToMap -> DEBU 4154 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-04-22 06:18:03.587 UTC [common.configtx] addToMap -> DEBU 4155 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.587 UTC [gossip.gossip] handleMessage -> DEBU 4156 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.591 UTC [common.configtx] addToMap -> DEBU 4158 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.591 UTC [gossip.pull] HandleMessage -> DEBU 4159 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.592 UTC [msp] DeserializeIdentity -> DEBU 415a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.592 UTC [common.configtx] addToMap -> DEBU 415b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.592 UTC [common.configtx] addToMap -> DEBU 415c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.592 UTC [msp] DeserializeIdentity -> DEBU 415d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.593 UTC [msp] DeserializeIdentity -> DEBU 415e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.593 UTC [msp] DeserializeIdentity -> DEBU 415f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.593 UTC [common.configtx] addToMap -> DEBU 4160 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.594 UTC [msp] DeserializeIdentity -> DEBU 4161 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.593 UTC [common.configtx] addToMap -> DEBU 4162 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-04-22 06:18:03.600 UTC [common.configtx] addToMap -> DEBU 4164 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.594 UTC [msp] DeserializeIdentity -> DEBU 4163 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.591 UTC [grpc] infof -> DEBU 4157 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:03.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 412b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.600 UTC [gossip.comm] func1 -> DEBU 4165 Got message: GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.600 UTC [common.configtx] addToMap -> DEBU 4166 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.601 UTC [gossip.pull] SendDigest -> DEBU 4167 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:03.602 UTC [common.configtx] addToMap -> DEBU 4169 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-04-22 06:18:03.602 UTC [gossip.gossip] handleMessage -> DEBU 416a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.602 UTC [common.configtx] addToMap -> DEBU 416b Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.603 UTC [gossip.gossip] handleMessage -> DEBU 416c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.603 UTC [gossip.gossip] handleMessage -> DEBU 416d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.603 UTC [common.configtx] addToMap -> DEBU 416e Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.604 UTC [common.configtx] addToMap -> DEBU 4170 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.605 UTC [common.configtx] addToMap -> DEBU 4171 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.601 UTC [msp] DeserializeIdentity -> DEBU 4168 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 416f Got message: GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.606 UTC [common.configtx] addToMap -> DEBU 4172 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:18:03.609 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4173 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:03.609 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4175 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.610 UTC [msp] DeserializeIdentity -> DEBU 4176 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.612 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4177 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4179 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.614 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 417a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.609 UTC [msp] DeserializeIdentity -> DEBU 4178 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.609 UTC [common.configtx] addToMap -> DEBU 4174 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.614 UTC [policies] Evaluate -> DEBU 417b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.615 UTC [gossip.comm] func1 -> DEBU 417c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.616 UTC [common.configtx] addToMap -> DEBU 417d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.617 UTC [common.configtx] addToMap -> DEBU 4181 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.616 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 417f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.616 UTC [policies] Evaluate -> DEBU 417e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.617 UTC [gossip.gossip] handleMessage -> DEBU 4180 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.621 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4182 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.622 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4184 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.625 UTC [policies] Evaluate -> DEBU 4185 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.625 UTC [policies] Evaluate -> DEBU 4186 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.625 UTC [policies] Evaluate -> DEBU 4187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.625 UTC [cauthdsl] func1 -> DEBU 4188 0xc002e9cbe0 gate 1555913883625524100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.625 UTC [cauthdsl] func2 -> DEBU 4189 0xc002e9cbe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.626 UTC [cauthdsl] func2 -> DEBU 418a 0xc002e9cbe0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.626 UTC [cauthdsl] func2 -> DEBU 418b 0xc002e9cbe0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.626 UTC [msp.identity] Verify -> DEBU 418c Verify: digest = 00000000 8c 65 72 f6 31 6d 54 44 ae 54 e4 2f bc 79 b5 a4 |.er.1mTD.T./.y..| +peer0.org1.example.com | 00000010 63 cd 73 1f 83 d5 61 80 02 83 7d 16 57 86 e6 01 |c.s...a...}.W...|" +peer0.org1.example.com | "2019-04-22 06:18:03.626 UTC [msp.identity] Verify -> DEBU 418d Verify: sig = 00000000 30 45 02 21 00 de f0 b6 3b 63 6d b7 c4 0c e6 64 |0E.!....;cm....d| +peer0.org1.example.com | 00000010 20 7c 28 47 b8 30 29 40 d8 86 42 19 0a 75 d2 1e | |(G.0)@..B..u..| +peer0.org1.example.com | 00000020 fe 5e ab 10 00 02 20 57 83 7b a6 4d 8a cf 86 da |.^.... W.{.M....| +peer0.org1.example.com | 00000030 b1 fb 44 47 24 ac a4 c2 af b4 28 de f5 f4 3c 73 |..DG$.....(... DEBU 418e 0xc002e9cbe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.627 UTC [cauthdsl] func1 -> DEBU 418f 0xc002e9cbe0 gate 1555913883625524100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4192 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.620 UTC [common.configtx] addToMap -> DEBU 4193 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4194 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.630 UTC [common.configtx] addToMap -> DEBU 4195 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-04-22 06:18:03.632 UTC [gossip.discovery] handleAliveMessage -> DEBU 4197 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.635 UTC [common.configtx] addToMap -> DEBU 4196 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-04-22 06:18:03.639 UTC [common.configtx] addToMap -> DEBU 4198 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-04-22 06:18:03.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 4199 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:03.641 UTC [common.configtx] addToMap -> DEBU 419a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-04-22 06:18:03.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 419b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 " +peer0.org1.example.com | "2019-04-22 06:18:03.642 UTC [gossip.discovery] learnExistingMembers -> DEBU 419c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 " +peer0.org1.example.com | "2019-04-22 06:18:03.643 UTC [common.configtx] addToMap -> DEBU 419d Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.644 UTC [gossip.discovery] learnExistingMembers -> DEBU 419e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:03.644 UTC [gossip.discovery] learnExistingMembers -> DEBU 419f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.645 UTC [common.configtx] addToMap -> DEBU 41a0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-04-22 06:18:03.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 41a1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.645 UTC [common.configtx] addToMap -> DEBU 41a2 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.650 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41a6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:03.651 UTC [msp] DeserializeIdentity -> DEBU 41a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.652 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41a9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.647 UTC [common.configtx] addToMap -> DEBU 41a3 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.653 UTC [common.configtx] addToMap -> DEBU 41aa Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.653 UTC [common.configtx] addToMap -> DEBU 41ab Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41ac Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41ad Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41ae Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41af Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [common.configtx] addToMap -> DEBU 41b0 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [common.configtx] addToMap -> DEBU 41b1 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [common.configtx] addToMap -> DEBU 41b2 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [common.channelconfig] LogSanityChecks -> DEBU 41b3 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [common.channelconfig] LogSanityChecks -> DEBU 41b4 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b5 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b6 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b7 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b8 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-04-22 06:18:03.656 UTC [policies] Manager -> DEBU 41b9 Manager Channel/Application has managers Org3MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ba Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.664 UTC [policies] Manager -> DEBU 41bd Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.664 UTC [policies] Manager -> DEBU 41be Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.664 UTC [policies] Evaluate -> DEBU 41bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.665 UTC [policies] Evaluate -> DEBU 41c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.665 UTC [common.channelconfig] LogSanityChecks -> DEBU 41c1 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-04-22 06:18:03.665 UTC [common.channelconfig] LogSanityChecks -> DEBU 41c2 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-04-22 06:18:03.666 UTC [common.channelconfig] LogSanityChecks -> DEBU 41c4 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-04-22 06:18:03.666 UTC [policies] Manager -> DEBU 41c5 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-04-22 06:18:03.666 UTC [policies] Evaluate -> DEBU 41c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.666 UTC [policies] Manager -> DEBU 41c6 Manager Channel has managers Application" +peer0.org1.example.com | "2019-04-22 06:18:03.667 UTC [cauthdsl] func1 -> DEBU 41c7 0xc002eb3fe0 gate 1555913883667112600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.667 UTC [cauthdsl] func2 -> DEBU 41c8 0xc002eb3fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.667 UTC [policies] Manager -> DEBU 41c9 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-04-22 06:18:03.668 UTC [policies] Manager -> DEBU 41ca Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-04-22 06:18:03.668 UTC [cauthdsl] func2 -> DEBU 41cb 0xc002eb3fe0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.668 UTC [cauthdsl] func2 -> DEBU 41cd 0xc002eb3fe0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.668 UTC [msp.identity] Verify -> DEBU 41ce Verify: digest = 00000000 52 65 b2 65 13 ad 29 fe a7 df e6 a3 fe 46 b8 5a |Re.e..)......F.Z| +peer0.org1.example.com | 00000010 51 81 8d 7b f4 c9 0c 74 d8 9c 87 80 d3 25 2d 5d |Q..{...t.....%-]|" +peer0.org1.example.com | "2019-04-22 06:18:03.668 UTC [policies] Manager -> DEBU 41cc Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-04-22 06:18:03.669 UTC [common.channelconfig] LogSanityChecks -> DEBU 41cf As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-04-22 06:18:03.668 UTC [msp.identity] Verify -> DEBU 41d0 Verify: sig = 00000000 30 44 02 20 7d 76 45 bc 9d 3c d1 6c 7c 56 53 2d |0D. }vE..<.l|VS-| +peer0.org1.example.com | 00000010 2d e2 b9 22 e5 7d 2b a9 23 02 b5 62 93 d4 e3 c4 |-..".}+.#..b....| +peer0.org1.example.com | 00000020 d7 51 0f 9d 02 20 78 19 56 1f fb f3 c9 19 75 9d |.Q... x.V.....u.| +peer0.org1.example.com | 00000030 3a da 14 70 e3 6f 43 2a 11 74 a7 e3 f7 76 28 98 |:..p.oC*.t...v(.| +peer0.org1.example.com | 00000040 32 38 47 55 33 a3 |28GU3.|" +peer0.org1.example.com | "2019-04-22 06:18:03.669 UTC [cauthdsl] func2 -> DEBU 41d1 0xc002eb3fe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.670 UTC [cauthdsl] func1 -> DEBU 41d3 0xc002eb3fe0 gate 1555913883667112600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.669 UTC [common.capabilities] Supported -> DEBU 41d2 Application capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:18:03.670 UTC [common.capabilities] Supported -> DEBU 41d5 Channel capability V2_0 is supported and is enabled" +peer0.org1.example.com | "2019-04-22 06:18:03.672 UTC [gossip.service] ProcessConfigUpdate -> DEBU 41d8 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:18:03.673 UTC [gossip.service] ProcessConfigUpdate -> DEBU 41d9 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:18:03.670 UTC [policies] Evaluate -> DEBU 41d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.673 UTC [policies] Evaluate -> DEBU 41da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.673 UTC [policies] Evaluate -> DEBU 41db Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.673 UTC [policies] Evaluate -> DEBU 41dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.673 UTC [gossip.service] updateAnchors -> DEBU 41dd Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-04-22 06:18:03.674 UTC [gossip.discovery] handleAliveMessage -> DEBU 41de Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 41df Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:03.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 " +peer0.org1.example.com | "2019-04-22 06:18:03.674 UTC [gossip.service] updateAnchors -> DEBU 41e1 Org3MSP anchor peers: []" +peer0.org1.example.com | "2019-04-22 06:18:03.675 UTC [gossip.service] updateAnchors -> DEBU 41e2 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-04-22 06:18:03.675 UTC [gossip.service] updateAnchors -> DEBU 41e3 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-04-22 06:18:03.675 UTC [msp] DeserializeIdentity -> DEBU 41e5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 " +peer0.org1.example.com | "2019-04-22 06:18:03.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.677 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:03.677 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 41ea Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41eb Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.678 UTC [gossip.discovery] sendMemResponse -> DEBU 41ec Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:03.677 UTC [policies] Evaluate -> DEBU 41ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.678 UTC [policies] Evaluate -> DEBU 41ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.679 UTC [msp] DeserializeIdentity -> DEBU 41ef Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.679 UTC [msp] DeserializeIdentity -> DEBU 41f1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.679 UTC [msp] DeserializeIdentity -> DEBU 41f2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.656 UTC [gossip.discovery] sendMemResponse -> DEBU 41bc Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:03.680 UTC [msp] DeserializeIdentity -> DEBU 41f3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.682 UTC [msp] DeserializeIdentity -> DEBU 41f4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.683 UTC [msp] DeserializeIdentity -> DEBU 41f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.684 UTC [gossip.comm] Send -> DEBU 41f6 Entering, sending GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:03.684 UTC [gossip.discovery] sendMemResponse -> DEBU 41f7 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:03.684 UTC [gossip.comm] sendToEndpoint -> DEBU 41f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.684 UTC [gossip.comm] sendToEndpoint -> DEBU 41f9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.622 UTC [policies] Evaluate -> DEBU 4183 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.685 UTC [cauthdsl] func1 -> DEBU 41fa 0xc0033dd100 gate 1555913883685781500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.686 UTC [cauthdsl] func2 -> DEBU 41fb 0xc0033dd100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.691 UTC [cauthdsl] func2 -> DEBU 41fd 0xc0033dd100 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.679 UTC [policies] Evaluate -> DEBU 41f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 41fe 0xc0033dd100 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.692 UTC [cauthdsl] func1 -> DEBU 41ff 0xc0033c9e10 gate 1555913883692327600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 4200 0xc0033c9e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 4201 0xc0033c9e10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.692 UTC [msp.identity] Verify -> DEBU 4202 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 4203 0xc0033c9e10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.693 UTC [msp.identity] Verify -> DEBU 4204 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:18:03.693 UTC [msp.identity] Verify -> DEBU 4205 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:18:03.694 UTC [msp.identity] Verify -> DEBU 4206 Verify: sig = 00000000 30 44 02 20 4a fe 17 ca d5 9d 3a a1 d3 54 ad a8 |0D. J.....:..T..| +peer0.org1.example.com | 00000010 f0 1f f7 7a f5 ed 93 1f 79 13 10 4d c5 29 97 46 |...z....y..M.).F| +peer0.org1.example.com | 00000020 24 3f a1 80 02 20 6f 75 11 a4 c1 c9 9c 8d 70 f3 |$?... ou......p.| +peer0.org1.example.com | 00000030 c6 5c 37 24 13 94 41 a2 93 4b bf d7 35 60 10 2c |.\7$..A..K..5`.,| +peer0.org1.example.com | 00000040 f9 de 6c 51 f8 73 |..lQ.s|" +peer0.org1.example.com | "2019-04-22 06:18:03.695 UTC [cauthdsl] func2 -> DEBU 4207 0xc0033c9e10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.695 UTC [cauthdsl] func1 -> DEBU 4208 0xc0033c9e10 gate 1555913883692327600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 4209 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 420a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 420b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 420c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 420d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 420e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.698 UTC [policies] Evaluate -> DEBU 420f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.698 UTC [policies] Evaluate -> DEBU 4210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.698 UTC [cauthdsl] func2 -> DEBU 4211 0xc0033dd100 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.698 UTC [cauthdsl] func1 -> DEBU 4212 0xc0033dd100 gate 1555913883685781500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.699 UTC [policies] Evaluate -> DEBU 4214 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.699 UTC [policies] Evaluate -> DEBU 4215 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.699 UTC [policies] Evaluate -> DEBU 4216 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.680 UTC [gossip.comm] Send -> DEBU 41fc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:03.698 UTC [policies] Evaluate -> DEBU 4213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.672 UTC [comm.grpc.server] 1 -> INFO 41d7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.671Z grpc.peer_address=192.168.224.5:47712 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=94.4µs +peer0.org1.example.com | "2019-04-22 06:18:03.656 UTC [gossip.gossip] handleMessage -> DEBU 41bb Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.672 UTC [comm.grpc.server] 1 -> INFO 41d6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.671Z grpc.peer_address=192.168.224.8:55334 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=123.2µs +peer0.org1.example.com | "2019-04-22 06:18:03.700 UTC [policies] Evaluate -> DEBU 4217 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.700 UTC [gossip.discovery] sendMemResponse -> DEBU 4218 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:03.700 UTC [cauthdsl] func1 -> DEBU 4219 0xc00370ced0 gate 1555913883700484300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.700 UTC [gossip.comm] sendToEndpoint -> DEBU 421a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.701 UTC [gossip.comm] authenticateRemotePeer -> DEBU 421b Authenticated 192.168.224.7:48424" +peer0.org1.example.com | "2019-04-22 06:18:03.703 UTC [gossip.comm] GossipStream -> DEBU 421e Servicing 192.168.224.7:48424" +peer0.org1.example.com | "2019-04-22 06:18:03.703 UTC [gossip.comm] serviceConnection -> DEBU 421f Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:18:03.703 UTC [gossip.comm] writeToStream -> DEBU 4220 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:03.702 UTC [cauthdsl] func2 -> DEBU 421c 0xc00370ced0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.704 UTC [cauthdsl] func2 -> DEBU 4221 0xc00370ced0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.704 UTC [cauthdsl] func2 -> DEBU 4222 0xc00370ced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-04-22 06:18:03.704 UTC [cauthdsl] func2 -> DEBU 4223 0xc00370ced0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.704 UTC [cauthdsl] func1 -> DEBU 4224 0xc00370ced0 gate 1555913883700484300 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.704 UTC [policies] Evaluate -> DEBU 4225 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.704 UTC [policies] Evaluate -> DEBU 4226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.707 UTC [policies] Evaluate -> DEBU 4228 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.708 UTC [cauthdsl] func1 -> DEBU 4229 0xc00370ddf0 gate 1555913883708756600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.708 UTC [cauthdsl] func2 -> DEBU 422a 0xc00370ddf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.708 UTC [cauthdsl] func2 -> DEBU 422b 0xc00370ddf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.709 UTC [cauthdsl] func2 -> DEBU 422c 0xc00370ddf0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.709 UTC [msp.identity] Verify -> DEBU 422d Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:18:03.709 UTC [msp.identity] Verify -> DEBU 422e Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:18:03.710 UTC [cauthdsl] func2 -> DEBU 422f 0xc00370ddf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.710 UTC [cauthdsl] func1 -> DEBU 4230 0xc00370ddf0 gate 1555913883708756600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4231 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4232 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4233 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4234 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.711 UTC [msp] DeserializeIdentity -> DEBU 4235 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4236 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4237 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.711 UTC [policies] Evaluate -> DEBU 4238 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.712 UTC [policies] Evaluate -> DEBU 4239 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.711 UTC [grpc] infof -> DEBU 423a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:03.712 UTC [policies] Evaluate -> DEBU 423b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.712 UTC [cauthdsl] func1 -> DEBU 423c 0xc0031fced0 gate 1555913883712618600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.712 UTC [cauthdsl] func2 -> DEBU 423d 0xc0031fced0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.712 UTC [cauthdsl] func2 -> DEBU 423e 0xc0031fced0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.713 UTC [cauthdsl] func2 -> DEBU 423f 0xc0031fced0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.713 UTC [msp.identity] Verify -> DEBU 4240 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:18:03.713 UTC [msp.identity] Verify -> DEBU 4241 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:18:03.714 UTC [cauthdsl] func2 -> DEBU 4242 0xc0031fced0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.714 UTC [cauthdsl] func1 -> DEBU 4243 0xc0031fced0 gate 1555913883712618600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.714 UTC [policies] Evaluate -> DEBU 4244 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.715 UTC [policies] Evaluate -> DEBU 4245 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.715 UTC [policies] Evaluate -> DEBU 4246 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.715 UTC [policies] Evaluate -> DEBU 4247 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.715 UTC [gossip.gossip] JoinChan -> INFO 4248 Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-04-22 06:18:03.715 UTC [gossip.gossip] learnAnchorPeers -> INFO 4249 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:18:03.716 UTC [gossip.discovery] Connect -> DEBU 424b Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-04-22 06:18:03.716 UTC [gossip.comm] func2 -> DEBU 424c Client 192.168.224.7:48424 disconnected" +peer0.org1.example.com | "2019-04-22 06:18:03.716 UTC [gossip.discovery] Connect -> DEBU 424d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.716 UTC [gossip.gossip] learnAnchorPeers -> INFO 424e No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:18:03.716 UTC [gossip.gossip] learnAnchorPeers -> INFO 424f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:18:03.717 UTC [gossip.gossip] learnAnchorPeers -> INFO 4250 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:18:03.716 UTC [comm.grpc.server] 1 -> INFO 4251 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.555Z grpc.peer_address=192.168.224.7:48424 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=160.4745ms +peer0.org1.example.com | "2019-04-22 06:18:03.717 UTC [gossip.service] updateEndpoints -> DEBU 4252 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-04-22 06:18:03.718 UTC [msp] DeserializeIdentity -> DEBU 4253 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.718 UTC [gossip.comm] readFromStream -> DEBU 4254 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:18:03.718 UTC [gossip.comm] writeToStream -> DEBU 4255 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:03.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4256 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.720 UTC [msp] DeserializeIdentity -> DEBU 4257 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.722 UTC [grpc] DialContext -> DEBU 4258 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:18:03.722 UTC [grpc] DialContext -> DEBU 4259 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:18:03.722 UTC [grpc] NewAddress -> DEBU 425a ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:18:03.723 UTC [grpc] switchBalancer -> DEBU 425b ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:18:03.723 UTC [grpc] HandleSubConnStateChange -> DEBU 425c pickfirstBalancer: HandleSubConnStateChange: 0xc003514640, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:18:03.702 UTC [gossip.comm] sendToEndpoint -> DEBU 421d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.705 UTC [msp.identity] Sign -> DEBU 4227 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:03.723 UTC [msp.identity] Sign -> DEBU 425d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:03.724 UTC [gossip.comm] authenticateRemotePeer -> DEBU 425e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:47712" +peer0.org1.example.com | "2019-04-22 06:18:03.724 UTC [gossip.comm] authenticateRemotePeer -> DEBU 425f Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47712" +peer0.org1.example.com | "2019-04-22 06:18:03.715 UTC [gossip.comm] readFromStream -> DEBU 424a Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:18:03.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4260 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.727 UTC [peer] updateTrustedRoots -> DEBU 4261 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:18:03.734 UTC [msp.identity] Sign -> DEBU 4262 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:03.734 UTC [msp.identity] Sign -> DEBU 4263 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:03.735 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4264 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:55334" +peer0.org1.example.com | "2019-04-22 06:18:03.735 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4265 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55334" +peer0.org1.example.com | "2019-04-22 06:18:03.736 UTC [msp] DeserializeIdentity -> DEBU 4266 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4267 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.736 UTC [msp] DeserializeIdentity -> DEBU 4268 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4269 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.739 UTC [msp.identity] Verify -> DEBU 426a Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:18:03.739 UTC [msp.identity] Verify -> DEBU 426b Verify: sig = 00000000 30 44 02 20 64 31 98 72 c4 1b 8d 03 dc d9 83 a4 |0D. d1.r........| +peer0.org1.example.com | 00000010 68 ee a4 e8 84 70 8e b1 80 ab c2 2a 9c 5f a4 11 |h....p.....*._..| +peer0.org1.example.com | 00000020 24 2f 84 cc 02 20 1a 7e fa a6 61 49 b0 ee fe b7 |$/... .~..aI....| +peer0.org1.example.com | 00000030 5b b1 86 5b fd f7 fb 26 80 d0 34 31 dc f7 02 78 |[..[...&..41...x| +peer0.org1.example.com | 00000040 1c 0f 42 49 01 22 |..BI."|" +peer0.org1.example.com | "2019-04-22 06:18:03.741 UTC [gossip.comm] authenticateRemotePeer -> DEBU 426c Authenticated 192.168.224.5:47712" +peer0.org1.example.com | "2019-04-22 06:18:03.742 UTC [gossip.comm] GossipStream -> DEBU 426d Servicing 192.168.224.5:47712" +peer0.org1.example.com | "2019-04-22 06:18:03.742 UTC [gossip.comm] serviceConnection -> DEBU 426e Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:18:03.750 UTC [gossip.comm] readFromStream -> DEBU 426f a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:18:03.751 UTC [msp] DeserializeIdentity -> DEBU 4270 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.751 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4272 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4273 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.752 UTC [policies] Evaluate -> DEBU 4274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.754 UTC [policies] Evaluate -> DEBU 4275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.754 UTC [policies] Evaluate -> DEBU 4276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.754 UTC [cauthdsl] func1 -> DEBU 4277 0xc0039a20d0 gate 1555913883754242000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.754 UTC [cauthdsl] func2 -> DEBU 4278 0xc0039a20d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.754 UTC [cauthdsl] func2 -> DEBU 4279 0xc0039a20d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.755 UTC [cauthdsl] func2 -> DEBU 427a 0xc0039a20d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.755 UTC [msp.identity] Verify -> DEBU 427b Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:18:03.756 UTC [msp.identity] Verify -> DEBU 427c Verify: sig = 00000000 30 45 02 21 00 b1 6c bb ae 6f f9 9f f8 bb 6e f6 |0E.!..l..o....n.| +peer0.org1.example.com | 00000010 15 af 93 c4 6d d5 a2 16 02 e7 71 35 14 16 4c 41 |....m.....q5..LA| +peer0.org1.example.com | 00000020 5c 32 61 5a f4 02 20 2c 89 dd f8 99 73 66 29 7e |\2aZ.. ,....sf)~| +peer0.org1.example.com | 00000030 a6 19 36 a8 9b f3 17 63 bf a3 ac 73 0b 75 3a bf |..6....c...s.u:.| +peer0.org1.example.com | 00000040 d7 da 4b e4 63 5b 89 |..K.c[.|" +peer0.org1.example.com | "2019-04-22 06:18:03.757 UTC [cauthdsl] func2 -> DEBU 427d 0xc0039a20d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.757 UTC [cauthdsl] func1 -> DEBU 427e 0xc0039a20d0 gate 1555913883754242000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.758 UTC [policies] Evaluate -> DEBU 427f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.760 UTC [peer] buildTrustedRootsForChain -> DEBU 4280 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4281 adding app root CAs for MSP [Org3MSP]" +peer0.org1.example.com | "2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4282 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4283 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4284 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-04-22 06:18:03.762 UTC [committer.txvalidator] validateTx -> DEBU 4285 config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-04-22 06:18:03.762 UTC [committer.txvalidator] validateTx -> DEBU 4286 [businesschannel] validateTx completes for block 0xc0032a01c0 env 0xc0024cb770 txn 0" +peer0.org1.example.com | "2019-04-22 06:18:03.762 UTC [committer.txvalidator] Validate -> DEBU 4287 got result for idx 0, code 0" +peer0.org1.example.com | "2019-04-22 06:18:03.762 UTC [committer.txvalidator] Validate -> INFO 4288 [businesschannel] Validated block [9] in 327ms" +peer0.org1.example.com | "2019-04-22 06:18:03.763 UTC [gossip.privdata] listMissingPrivateData -> DEBU 4289 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-04-22 06:18:03.763 UTC [gossip.privdata] StoreBlock -> DEBU 428a [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-04-22 06:18:03.764 UTC [committer] preCommit -> DEBU 428b Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-04-22 06:18:03.764 UTC [kvledger] CommitWithPvtData -> DEBU 428c [businesschannel] Validating state for block [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.764 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 428d Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-04-22 06:18:03.764 UTC [policies] Evaluate -> DEBU 428e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.764 UTC [policies] Evaluate -> DEBU 428f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.764 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 4290 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-04-22 06:18:03.765 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 4291 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-04-22 06:18:03.765 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 4292 ValidateAndPrepareBatch() for block number = [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.764 UTC [policies] Evaluate -> DEBU 4293 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.765 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4294 Authenticated 192.168.224.8:55334" +peer0.org1.example.com | "2019-04-22 06:18:03.766 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 4295 preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:18:03.766 UTC [valimpl] preprocessProtoBlock -> DEBU 4296 txType=CONFIG" +peer0.org1.example.com | "2019-04-22 06:18:03.765 UTC [gossip.comm] GossipStream -> DEBU 4297 Servicing 192.168.224.8:55334" +peer0.org1.example.com | "2019-04-22 06:18:03.766 UTC [gossip.comm] writeToStream -> DEBU 4298 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:03.766 UTC [valimpl] processNonEndorserTx -> DEBU 4299 Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-04-22 06:18:03.766 UTC [valimpl] processNonEndorserTx -> DEBU 429a Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-04-22 06:18:03.766 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 429b constructing new tx simulator" +peer0.org1.example.com | "2019-04-22 06:18:03.767 UTC [gossip.comm] writeToStream -> DEBU 429c Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:03.767 UTC [gossip.comm] serviceConnection -> DEBU 429d Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:18:03.767 UTC [gossip.comm] func2 -> DEBU 429e Client 192.168.224.8:55156 disconnected" +peer0.org1.example.com | "2019-04-22 06:18:03.768 UTC [comm.grpc.server] 1 -> INFO 42a0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.8:55156 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m15.7782549s +peer0.org1.example.com | "2019-04-22 06:18:03.766 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 429f constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-04-22 06:18:03.769 UTC [peer] GenerateSimulationResults -> DEBU 42a1 Processing CONFIG" +peer0.org1.example.com | "2019-04-22 06:18:03.769 UTC [peer] processChannelConfigTx -> DEBU 42a2 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-04-22 06:18:03.770 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 42a3 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-04-22 06:18:03.770 UTC [lockbasedtxmgr] Done -> DEBU 42a4 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-04-22 06:18:03.770 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 42a5 Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.771 UTC [valinternal] ApplyWriteSet -> DEBU 42a6 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00224f8c0)}" +peer0.org1.example.com | "2019-04-22 06:18:03.771 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 42a7 validating rwset..." +peer0.org1.example.com | "2019-04-22 06:18:03.771 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 42a8 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-04-22 06:18:03.771 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 42a9 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-04-22 06:18:03.772 UTC [kvledger] CommitWithPvtData -> DEBU 42aa [businesschannel] Committing block [9] to storage" +peer0.org1.example.com | "2019-04-22 06:18:03.772 UTC [ledgerstorage] CommitWithPvtData -> DEBU 42ab Writing block [9] to pvt block store" +peer0.org1.example.com | "2019-04-22 06:18:03.775 UTC [gossip.comm] readFromStream -> DEBU 42ac Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-04-22 06:18:03.776 UTC [gossip.comm] func2 -> DEBU 42ad Client 192.168.224.5:47712 disconnected" +peer0.org1.example.com | "2019-04-22 06:18:03.777 UTC [pvtdatastorage] Prepare -> DEBU 42ae Saved 0 private data write sets for block [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.777 UTC [comm.grpc.server] 1 -> INFO 42af streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.705Z grpc.peer_address=192.168.224.5:47712 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=72.2563ms +peer0.org1.example.com | "2019-04-22 06:18:03.778 UTC [grpc] infof -> DEBU 42b0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:03.779 UTC [grpc] infof -> DEBU 42b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:03.779 UTC [gossip.comm] writeToStream -> DEBU 42b2 Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:03.783 UTC [fsblkstorage] indexBlock -> DEBU 42b3 Indexing block [blockNum=9, blockHash=[]byte{0x78, 0x7a, 0x67, 0xb8, 0x41, 0xd5, 0x69, 0x5a, 0xe5, 0xed, 0xc7, 0x2, 0x28, 0x9c, 0x7e, 0xe2, 0xc1, 0x3a, 0x7, 0xce, 0xc4, 0xf8, 0x4f, 0x8e, 0xe3, 0x8b, 0xa5, 0x79, 0x20, 0x3, 0xac, 0xeb} txOffsets= +peer0.org1.example.com | txId= locPointer=offset=71, bytesLength=33993 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-04-22 06:18:03.783 UTC [fsblkstorage] indexBlock -> DEBU 42b5 txid [] is a duplicate of a previous tx. Not indexing in txid-index" +peer0.org1.example.com | "2019-04-22 06:18:03.783 UTC [fsblkstorage] indexBlock -> DEBU 42b6 Adding txLoc [fileSuffixNum=0, offset=98746, bytesLength=33993] for tx number:[0] ID: [] to blockNumTranNum index" +peer0.org1.example.com | "2019-04-22 06:18:03.783 UTC [grpc] infof -> DEBU 42b4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:03.785 UTC [gossip.comm] serviceConnection -> DEBU 42b7 Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:18:03.786 UTC [gossip.comm] func2 -> DEBU 42b8 Client 192.168.224.8:55334 disconnected" +peer0.org1.example.com | "2019-04-22 06:18:03.786 UTC [fsblkstorage] updateCheckpoint -> DEBU 42b9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133677], isChainEmpty=[false], lastBlockNumber=[9]" +peer0.org1.example.com | "2019-04-22 06:18:03.787 UTC [pvtdatastorage] Commit -> DEBU 42ba Committing private data for block [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.786 UTC [comm.grpc.server] 1 -> INFO 42bb streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.723Z grpc.peer_address=192.168.224.8:55334 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=52.3578ms +peer0.org1.example.com | "2019-04-22 06:18:03.789 UTC [gossip.comm] writeToStream -> DEBU 42bc Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:03.790 UTC [pvtdatastorage] Commit -> DEBU 42bd Committed private data for block [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.790 UTC [grpc] HandleSubConnStateChange -> DEBU 42bf pickfirstBalancer: HandleSubConnStateChange: 0xc003514640, READY" +peer0.org1.example.com | "2019-04-22 06:18:03.790 UTC [kvledger] CommitWithPvtData -> DEBU 42be [businesschannel] Committing block [9] transactions to state database" +peer0.org1.example.com | "2019-04-22 06:18:03.790 UTC [lockbasedtxmgr] Commit -> DEBU 42c0 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-04-22 06:18:03.791 UTC [lockbasedtxmgr] Commit -> DEBU 42c1 Committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:18:03.791 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 42c2 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-04-22 06:18:03.791 UTC [lockbasedtxmgr] Commit -> DEBU 42c3 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-04-22 06:18:03.791 UTC [stateleveldb] ApplyUpdates -> DEBU 42c4 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-04-22 06:18:03.792 UTC [gossip.comm] readFromStream -> DEBU 42c5 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:18:03.795 UTC [msp.identity] Sign -> DEBU 42c6 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:03.795 UTC [msp.identity] Sign -> DEBU 42c7 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:03.796 UTC [gossip.comm] authenticateRemotePeer -> DEBU 42c8 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:18:03.796 UTC [lockbasedtxmgr] Commit -> DEBU 42c9 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-04-22 06:18:03.796 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 42ca Preparing potential purge list working-set for expiringAtBlk [10]" +peer0.org1.example.com | "2019-04-22 06:18:03.796 UTC [leveldbhelper] GetIterator -> DEBU 42cb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]" +peer0.org1.example.com | "2019-04-22 06:18:03.796 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 42cc No expiry entry found for expiringAtBlk [10]" +peer0.org1.example.com | "2019-04-22 06:18:03.797 UTC [lockbasedtxmgr] func1 -> DEBU 42cd launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-04-22 06:18:03.797 UTC [kvledger] CommitWithPvtData -> DEBU 42ce [businesschannel] Committing block [9] transactions to history database" +peer0.org1.example.com | "2019-04-22 06:18:03.797 UTC [historyleveldb] Commit -> DEBU 42cf Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions" +peer0.org1.example.com | "2019-04-22 06:18:03.797 UTC [historyleveldb] Commit -> DEBU 42d0 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-04-22 06:18:03.800 UTC [historyleveldb] Commit -> DEBU 42d1 Channel [businesschannel]: Updates committed to history database for blockNo [9]" +peer0.org1.example.com | "2019-04-22 06:18:03.800 UTC [kvledger] CommitWithPvtData -> INFO 42d2 [businesschannel] Committed block [9] with 1 transaction(s) in 36ms (state_validation=7ms block_commit=18ms state_commit=6ms)" +peer0.org1.example.com | "2019-04-22 06:18:03.801 UTC [msp.identity] Sign -> DEBU 42d3 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A02080A " +peer0.org1.example.com | "2019-04-22 06:18:03.801 UTC [msp.identity] Sign -> DEBU 42d4 Sign: digest: AEF04312DAA24B1866F1AD89D6B52F66BFA9707649778DCD638E40C34503E857 " +peer0.org1.example.com | "2019-04-22 06:18:03.801 UTC [gossip.state] commitBlock -> DEBU 42d5 [businesschannel] Committed block [9] with 1 transaction(s)" +peer0.org1.example.com | "2019-04-22 06:18:03.804 UTC [gossip.comm] authenticateRemotePeer -> DEBU 42d6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:18:03.804 UTC [msp] DeserializeIdentity -> DEBU 42d7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.805 UTC [msp] DeserializeIdentity -> DEBU 42d8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.805 UTC [msp.identity] newIdentity -> DEBU 42d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +peer0.org1.example.com | wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +peer0.org1.example.com | UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +peer0.org1.example.com | 7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.806 UTC [msp] Validate -> DEBU 42da MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.806 UTC [grpc] infof -> DEBU 42db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:03.807 UTC [msp] getCertificationChain -> DEBU 42dc MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.808 UTC [msp] DeserializeIdentity -> DEBU 42de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.809 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.809 UTC [msp] DeserializeIdentity -> DEBU 42e0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42e1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42e2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42e3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.811 UTC [policies] Evaluate -> DEBU 42e4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.812 UTC [policies] Evaluate -> DEBU 42e5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.812 UTC [policies] Evaluate -> DEBU 42e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.812 UTC [cauthdsl] func1 -> DEBU 42e7 0xc003ef7c00 gate 1555913883812515900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.813 UTC [cauthdsl] func2 -> DEBU 42e8 0xc003ef7c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.813 UTC [cauthdsl] func2 -> DEBU 42e9 0xc003ef7c00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.813 UTC [cauthdsl] func2 -> DEBU 42ea 0xc003ef7c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:03.814 UTC [cauthdsl] func2 -> DEBU 42eb 0xc003ef7c00 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.814 UTC [cauthdsl] func1 -> DEBU 42ec 0xc003ef7c00 gate 1555913883812515900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.814 UTC [policies] Evaluate -> DEBU 42ed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.814 UTC [policies] Evaluate -> DEBU 42ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.814 UTC [policies] Evaluate -> DEBU 42ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.815 UTC [cauthdsl] func1 -> DEBU 42f0 0xc003f76460 gate 1555913883815344100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.815 UTC [cauthdsl] func2 -> DEBU 42f1 0xc003f76460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.816 UTC [cauthdsl] func2 -> DEBU 42f2 0xc003f76460 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.816 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 42f3 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.817 UTC [msp] Validate -> DEBU 42f4 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.817 UTC [msp] getCertificationChain -> DEBU 42f5 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.818 UTC [cauthdsl] func2 -> DEBU 42f6 0xc003f76460 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.818 UTC [msp.identity] Verify -> DEBU 42f7 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:18:03.818 UTC [msp.identity] Verify -> DEBU 42f8 Verify: sig = 00000000 30 44 02 20 13 15 7d 47 a5 d9 51 70 49 cc fa cd |0D. ..}G..QpI...| +peer0.org1.example.com | 00000010 fe 86 7d 29 52 43 d9 7c f2 aa ec 19 4b c3 1a 61 |..})RC.|....K..a| +peer0.org1.example.com | 00000020 66 b3 8e 68 02 20 6c d7 bc 4f 83 d1 85 4c fd 77 |f..h. l..O...L.w| +peer0.org1.example.com | 00000030 a2 cb b8 7c 13 47 be 52 0a fc d2 bd 98 38 ef 9b |...|.G.R.....8..| +peer0.org1.example.com | 00000040 5c ae f4 fa 7a 9d |\...z.|" +peer0.org1.example.com | "2019-04-22 06:18:03.819 UTC [cauthdsl] func2 -> DEBU 42f9 0xc003f76460 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.819 UTC [cauthdsl] func1 -> DEBU 42fa 0xc003f76460 gate 1555913883815344100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.819 UTC [policies] Evaluate -> DEBU 42fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.819 UTC [policies] Evaluate -> DEBU 42fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.820 UTC [policies] Evaluate -> DEBU 42fd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.821 UTC [policies] Evaluate -> DEBU 42fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.821 UTC [gossip.comm] authenticateRemotePeer -> DEBU 42ff Authenticated 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:18:03.822 UTC [grpc] infof -> DEBU 4300 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:03.821 UTC [msp] DeserializeIdentity -> DEBU 4301 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.822 UTC [msp.identity] Sign -> DEBU 4302 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151038 " +peer0.org1.example.com | "2019-04-22 06:18:03.822 UTC [msp.identity] Sign -> DEBU 4303 Sign: digest: F0C96BA5DA8FF726034B4E520A68366157B17388B79D14BC68C7E8F5729CF9F9 " +peer0.org1.example.com | "2019-04-22 06:18:03.823 UTC [msp.identity] Sign -> DEBU 4304 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:03.823 UTC [msp.identity] Sign -> DEBU 4305 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:03.824 UTC [msp] DeserializeIdentity -> DEBU 4306 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.825 UTC [gossip.comm] Send -> DEBU 4307 Entering, sending GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:03.825 UTC [gossip.comm] sendToEndpoint -> DEBU 4308 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.825 UTC [gossip.comm] createConnection -> DEBU 4309 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:03.827 UTC [grpc] DialContext -> DEBU 430a parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:18:03.827 UTC [grpc] DialContext -> DEBU 430b scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:18:03.827 UTC [grpc] NewAddress -> DEBU 430c ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:18:03.827 UTC [grpc] switchBalancer -> DEBU 430d ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:18:03.828 UTC [grpc] HandleSubConnStateChange -> DEBU 430e pickfirstBalancer: HandleSubConnStateChange: 0xc003202ad0, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:18:03.834 UTC [grpc] HandleSubConnStateChange -> DEBU 430f pickfirstBalancer: HandleSubConnStateChange: 0xc003202ad0, READY" +peer0.org1.example.com | "2019-04-22 06:18:03.838 UTC [msp.identity] Sign -> DEBU 4310 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:03.839 UTC [msp.identity] Sign -> DEBU 4311 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:03.840 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4312 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:18:03.841 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4313 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:18:03.841 UTC [msp] DeserializeIdentity -> DEBU 4314 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4315 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.843 UTC [msp] DeserializeIdentity -> DEBU 4316 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4317 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.844 UTC [msp] DeserializeIdentity -> DEBU 4318 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.845 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4319 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 431a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 431b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.845 UTC [policies] Evaluate -> DEBU 431c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.845 UTC [policies] Evaluate -> DEBU 431d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.846 UTC [policies] Evaluate -> DEBU 431e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.846 UTC [cauthdsl] func1 -> DEBU 431f 0xc003600790 gate 1555913883846628700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4320 0xc003600790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4321 0xc003600790 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4322 0xc003600790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4323 0xc003600790 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.848 UTC [cauthdsl] func1 -> DEBU 4324 0xc003600790 gate 1555913883846628700 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.848 UTC [policies] Evaluate -> DEBU 4325 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.849 UTC [policies] Evaluate -> DEBU 4326 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.849 UTC [policies] Evaluate -> DEBU 4327 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.850 UTC [cauthdsl] func1 -> DEBU 4328 0xc003600fd0 gate 1555913883849934600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.850 UTC [cauthdsl] func2 -> DEBU 4329 0xc003600fd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.851 UTC [cauthdsl] func2 -> DEBU 432a 0xc003600fd0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.851 UTC [cauthdsl] func2 -> DEBU 432b 0xc003600fd0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.852 UTC [msp.identity] Verify -> DEBU 432c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +peer0.org1.example.com | 00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +peer0.org1.example.com | "2019-04-22 06:18:03.852 UTC [msp.identity] Verify -> DEBU 432d Verify: sig = 00000000 30 44 02 20 64 10 4d 3b 96 af 4c 51 75 05 65 fb |0D. d.M;..LQu.e.| +peer0.org1.example.com | 00000010 9b b4 86 3a ac 56 37 5b 3b fb d0 8e 1d a2 27 cc |...:.V7[;.....'.| +peer0.org1.example.com | 00000020 0a 5b 97 90 02 20 60 1f 0a 4d 61 44 15 ec 0a 82 |.[... `..MaD....| +peer0.org1.example.com | 00000030 0b c1 04 aa e2 14 bd 83 60 67 62 be 6a 80 da 87 |........`gb.j...| +peer0.org1.example.com | 00000040 90 cd 4a 71 6d ce |..Jqm.|" +peer0.org1.example.com | "2019-04-22 06:18:03.853 UTC [cauthdsl] func2 -> DEBU 432e 0xc003600fd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.853 UTC [cauthdsl] func1 -> DEBU 432f 0xc003600fd0 gate 1555913883849934600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.853 UTC [policies] Evaluate -> DEBU 4330 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.853 UTC [policies] Evaluate -> DEBU 4331 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.854 UTC [policies] Evaluate -> DEBU 4332 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.854 UTC [policies] Evaluate -> DEBU 4333 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.854 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4334 Authenticated 192.168.224.8:7051" +peer0.org1.example.com | "2019-04-22 06:18:03.855 UTC [gossip.comm] createConnection -> DEBU 4335 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 4336 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.862 UTC [gossip.comm] func1 -> DEBU 4337 Got message: GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.862 UTC [gossip.gossip] handleMessage -> DEBU 4338 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.862 UTC [gossip.gossip] handleMessage -> DEBU 4339 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 433a Got message: GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.863 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 433b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:03.864 UTC [msp.identity] Verify -> DEBU 433c Verify: digest = 00000000 f9 21 e0 ca 33 86 0e 66 d4 7f 3e b2 28 ee 93 93 |.!..3..f..>.(...| +peer0.org1.example.com | 00000010 6a a4 91 42 75 0c c1 8f 54 07 6f 56 d6 6f 38 9f |j..Bu...T.oV.o8.|" +peer0.org1.example.com | "2019-04-22 06:18:03.864 UTC [msp.identity] Verify -> DEBU 433d Verify: sig = 00000000 30 45 02 21 00 c5 f3 35 28 9a 72 57 1f 98 e3 62 |0E.!...5(.rW...b| +peer0.org1.example.com | 00000010 c4 5f 04 44 1d d4 ae 90 ee fe cc af 7f 8c 6f f4 |._.D..........o.| +peer0.org1.example.com | 00000020 3b 59 0a c0 86 02 20 33 a5 2c 24 a9 24 c6 ac 41 |;Y.... 3.,$.$..A| +peer0.org1.example.com | 00000030 c0 0c 49 09 50 3a f6 b5 fa 06 38 64 76 63 af 81 |..I.P:....8dvc..| +peer0.org1.example.com | 00000040 0e 7b 8e 99 f3 03 cc |.{.....|" +peer0.org1.example.com | "2019-04-22 06:18:03.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 433e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 433f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4340 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:03.867 UTC [msp.identity] Verify -> DEBU 4341 Verify: digest = 00000000 f0 c9 6b a5 da 8f f7 26 03 4b 4e 52 0a 68 36 61 |..k....&.KNR.h6a| +peer0.org1.example.com | 00000010 57 b1 73 88 b7 9d 14 bc 68 c7 e8 f5 72 9c f9 f9 |W.s.....h...r...|" +peer0.org1.example.com | "2019-04-22 06:18:03.867 UTC [msp.identity] Verify -> DEBU 4342 Verify: sig = 00000000 30 44 02 20 35 9a 07 d8 40 98 b7 9e 1e 7d c8 1c |0D. 5...@....}..| +peer0.org1.example.com | 00000010 18 9a 38 23 c0 20 19 5c d0 25 c2 35 4e c0 bb 4b |..8#. .\.%.5N..K| +peer0.org1.example.com | 00000020 d9 e5 9e 2f 02 20 72 4b a8 9d 95 ff 16 59 5b fa |.../. rK.....Y[.| +peer0.org1.example.com | 00000030 7c 58 2d 97 35 5f 66 60 3d 9d 40 14 ab be af 96 ||X-.5_f`=.@.....| +peer0.org1.example.com | 00000040 ea c2 89 b6 32 66 |....2f|" +peer0.org1.example.com | "2019-04-22 06:18:03.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 4343 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.868 UTC [gossip.discovery] isSentByMe -> DEBU 4344 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 4345 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.869 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4346 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:03.869 UTC [msp] DeserializeIdentity -> DEBU 4347 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.869 UTC [msp] DeserializeIdentity -> DEBU 4348 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.870 UTC [msp.identity] newIdentity -> DEBU 4349 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +peer0.org1.example.com | pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +peer0.org1.example.com | WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +peer0.org1.example.com | KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:03.870 UTC [msp] Validate -> DEBU 434a MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.871 UTC [msp] getCertificationChain -> DEBU 434b MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 434c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:03.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 434d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 434e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:03.871 UTC [policies] Evaluate -> DEBU 434f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.872 UTC [policies] Evaluate -> DEBU 4350 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:03.872 UTC [policies] Evaluate -> DEBU 4351 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.872 UTC [cauthdsl] func1 -> DEBU 4352 0xc00393b1a0 gate 1555913883872412200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.872 UTC [cauthdsl] func2 -> DEBU 4353 0xc00393b1a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.872 UTC [cauthdsl] func2 -> DEBU 4354 0xc00393b1a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.877 UTC [cauthdsl] func2 -> DEBU 4355 0xc00393b1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:03.877 UTC [cauthdsl] func2 -> DEBU 4356 0xc00393b1a0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.878 UTC [cauthdsl] func1 -> DEBU 4357 0xc00393b1a0 gate 1555913883872412200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:03.881 UTC [policies] Evaluate -> DEBU 4358 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.881 UTC [policies] Evaluate -> DEBU 4359 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.881 UTC [policies] Evaluate -> DEBU 435a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:03.883 UTC [cauthdsl] func1 -> DEBU 435b 0xc00393ba00 gate 1555913883883228700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:03.884 UTC [cauthdsl] func2 -> DEBU 435c 0xc00393ba00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:03.885 UTC [cauthdsl] func2 -> DEBU 435d 0xc00393ba00 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:03.885 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 435e Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-04-22 06:18:03.885 UTC [msp] Validate -> DEBU 435f MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:03.886 UTC [msp] getCertificationChain -> DEBU 4360 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:03.886 UTC [cauthdsl] func2 -> DEBU 4361 0xc00393ba00 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.886 UTC [msp.identity] Verify -> DEBU 4362 Verify: digest = 00000000 52 65 b2 65 13 ad 29 fe a7 df e6 a3 fe 46 b8 5a |Re.e..)......F.Z| +peer0.org1.example.com | 00000010 51 81 8d 7b f4 c9 0c 74 d8 9c 87 80 d3 25 2d 5d |Q..{...t.....%-]|" +peer0.org1.example.com | "2019-04-22 06:18:03.886 UTC [msp.identity] Verify -> DEBU 4363 Verify: sig = 00000000 30 44 02 20 7d 76 45 bc 9d 3c d1 6c 7c 56 53 2d |0D. }vE..<.l|VS-| +peer0.org1.example.com | 00000010 2d e2 b9 22 e5 7d 2b a9 23 02 b5 62 93 d4 e3 c4 |-..".}+.#..b....| +peer0.org1.example.com | 00000020 d7 51 0f 9d 02 20 78 19 56 1f fb f3 c9 19 75 9d |.Q... x.V.....u.| +peer0.org1.example.com | 00000030 3a da 14 70 e3 6f 43 2a 11 74 a7 e3 f7 76 28 98 |:..p.oC*.t...v(.| +peer0.org1.example.com | 00000040 32 38 47 55 33 a3 |28GU3.|" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [cauthdsl] func2 -> DEBU 4364 0xc00393ba00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [cauthdsl] func1 -> DEBU 4365 0xc00393ba00 gate 1555913883883228700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4366 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4367 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4368 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4369 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [gossip.discovery] learnNewMembers -> DEBU 436a Entering: learnedMembers={[]}, deadMembers={[]}" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [gossip.discovery] learnNewMembers -> DEBU 436b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 436c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:03.997 UTC [gossip.comm] func1 -> DEBU 436d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.998 UTC [gossip.gossip] handleMessage -> DEBU 436e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.998 UTC [gossip.pull] HandleMessage -> DEBU 436f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:03.999 UTC [msp] DeserializeIdentity -> DEBU 4370 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:03.999 UTC [msp] DeserializeIdentity -> DEBU 4371 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.000 UTC [msp] DeserializeIdentity -> DEBU 4372 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.000 UTC [msp] DeserializeIdentity -> DEBU 4373 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.001 UTC [msp] DeserializeIdentity -> DEBU 4374 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.001 UTC [msp] DeserializeIdentity -> DEBU 4375 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.002 UTC [gossip.pull] SendDigest -> DEBU 4376 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:04.002 UTC [gossip.gossip] handleMessage -> DEBU 4377 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.013 UTC [gossip.comm] func1 -> DEBU 4378 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.013 UTC [gossip.gossip] handleMessage -> DEBU 4379 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.013 UTC [gossip.gossip] handleMessage -> DEBU 437a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.013 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.014 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 437c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:04.014 UTC [msp] DeserializeIdentity -> DEBU 437d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.014 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 437e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 437f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4380 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.014 UTC [policies] Evaluate -> DEBU 4381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.015 UTC [policies] Evaluate -> DEBU 4382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.015 UTC [policies] Evaluate -> DEBU 4383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.015 UTC [cauthdsl] func1 -> DEBU 4384 0xc000598aa0 gate 1555913884015405200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.015 UTC [cauthdsl] func2 -> DEBU 4385 0xc000598aa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.015 UTC [cauthdsl] func2 -> DEBU 4386 0xc000598aa0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.016 UTC [cauthdsl] func2 -> DEBU 4387 0xc000598aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.016 UTC [cauthdsl] func2 -> DEBU 4388 0xc000598aa0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.016 UTC [cauthdsl] func1 -> DEBU 4389 0xc000598aa0 gate 1555913884015405200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.016 UTC [policies] Evaluate -> DEBU 438a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.016 UTC [policies] Evaluate -> DEBU 438b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.016 UTC [policies] Evaluate -> DEBU 438c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.017 UTC [cauthdsl] func1 -> DEBU 438d 0xc000599340 gate 1555913884017036600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.017 UTC [cauthdsl] func2 -> DEBU 438e 0xc000599340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.017 UTC [cauthdsl] func2 -> DEBU 438f 0xc000599340 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.017 UTC [cauthdsl] func2 -> DEBU 4390 0xc000599340 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.017 UTC [msp.identity] Verify -> DEBU 4391 Verify: digest = 00000000 12 f7 10 e3 40 90 66 a3 8e 8e 33 61 d9 23 85 97 |....@.f...3a.#..| +peer0.org1.example.com | 00000010 86 a2 4d b4 12 e0 9d 33 81 1d 41 3a f9 1c bb 9a |..M....3..A:....|" +peer0.org1.example.com | "2019-04-22 06:18:04.017 UTC [msp.identity] Verify -> DEBU 4392 Verify: sig = 00000000 30 45 02 21 00 81 f1 26 25 90 1d c5 e5 28 3d e7 |0E.!...&%....(=.| +peer0.org1.example.com | 00000010 94 75 aa d8 15 aa 91 ee c2 63 c3 34 f1 6b 0e 66 |.u.......c.4.k.f| +peer0.org1.example.com | 00000020 d5 a6 78 9c ce 02 20 3a 96 1a a0 49 d9 0d 30 4c |..x... :...I..0L| +peer0.org1.example.com | 00000030 cb 07 a0 86 84 9b de c6 42 a4 31 a7 be 54 6b e9 |........B.1..Tk.| +peer0.org1.example.com | 00000040 5c 5c 00 20 60 7e df |\\. `~.|" +peer0.org1.example.com | "2019-04-22 06:18:04.018 UTC [cauthdsl] func2 -> DEBU 4393 0xc000599340 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.018 UTC [cauthdsl] func1 -> DEBU 4394 0xc000599340 gate 1555913884017036600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4395 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4397 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 4399 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 439a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 " +peer0.org1.example.com | "2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 " +peer0.org1.example.com | "2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.025 UTC [gossip.discovery] handleAliveMessage -> DEBU 439f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43a0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.025 UTC [gossip.discovery] sendMemResponse -> DEBU 43a1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:04.025 UTC [msp] DeserializeIdentity -> DEBU 43a2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.025 UTC [msp] DeserializeIdentity -> DEBU 43a3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.026 UTC [msp] DeserializeIdentity -> DEBU 43a4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.026 UTC [gossip.comm] Send -> DEBU 43a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:04.026 UTC [gossip.discovery] sendMemResponse -> DEBU 43a6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:04.026 UTC [gossip.comm] sendToEndpoint -> DEBU 43a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.026 UTC [gossip.comm] sendToEndpoint -> DEBU 43a8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.354 UTC [msp] DeserializeIdentity -> DEBU 43a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.355 UTC [msp] DeserializeIdentity -> DEBU 43aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.356 UTC [gossip.comm] Send -> DEBU 43ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:04.357 UTC [gossip.comm] sendToEndpoint -> DEBU 43ac Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.357 UTC [gossip.comm] sendToEndpoint -> DEBU 43ad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.357 UTC [gossip.comm] createConnection -> DEBU 43af Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:04.357 UTC [gossip.comm] createConnection -> DEBU 43b0 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:04.358 UTC [grpc] DialContext -> DEBU 43b1 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:18:04.359 UTC [grpc] DialContext -> DEBU 43b2 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:18:04.359 UTC [grpc] NewAddress -> DEBU 43b3 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:18:04.359 UTC [grpc] switchBalancer -> DEBU 43b4 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:18:04.359 UTC [grpc] HandleSubConnStateChange -> DEBU 43b5 pickfirstBalancer: HandleSubConnStateChange: 0xc0042a0b40, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:18:04.357 UTC [gossip.comm] sendToEndpoint -> DEBU 43ae Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.359 UTC [gossip.comm] sendToEndpoint -> DEBU 43b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.362 UTC [grpc] DialContext -> DEBU 43b7 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:18:04.363 UTC [grpc] DialContext -> DEBU 43b8 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:18:04.363 UTC [grpc] NewAddress -> DEBU 43b9 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:18:04.364 UTC [grpc] switchBalancer -> DEBU 43bc ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:18:04.363 UTC [grpc] HandleSubConnStateChange -> DEBU 43ba pickfirstBalancer: HandleSubConnStateChange: 0xc0042a0b40, READY" +peer0.org1.example.com | "2019-04-22 06:18:04.364 UTC [msp] DeserializeIdentity -> DEBU 43bb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.365 UTC [grpc] HandleSubConnStateChange -> DEBU 43bd pickfirstBalancer: HandleSubConnStateChange: 0xc00228e0b0, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:18:04.366 UTC [msp] DeserializeIdentity -> DEBU 43be Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.366 UTC [gossip.comm] Send -> DEBU 43bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:04.366 UTC [msp] DeserializeIdentity -> DEBU 43c0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.367 UTC [msp] DeserializeIdentity -> DEBU 43c1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.368 UTC [gossip.comm] func1 -> DEBU 43c6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.368 UTC [gossip.gossip] handleMessage -> DEBU 43c7 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.368 UTC [msp] DeserializeIdentity -> DEBU 43c8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.368 UTC [msp.identity] Verify -> DEBU 43c9 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:18:04.368 UTC [msp.identity] Verify -> DEBU 43ca Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:18:04.369 UTC [msp.identity] Verify -> DEBU 43cb Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:18:04.369 UTC [msp.identity] Verify -> DEBU 43cc Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [msp] DeserializeIdentity -> DEBU 43cd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [msp] DeserializeIdentity -> DEBU 43ce Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43d1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43d2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [policies] Evaluate -> DEBU 43d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [policies] Evaluate -> DEBU 43d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.372 UTC [policies] Evaluate -> DEBU 43d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.372 UTC [cauthdsl] func1 -> DEBU 43d6 0xc0026d8590 gate 1555913884372101600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.372 UTC [cauthdsl] func2 -> DEBU 43d7 0xc0026d8590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.372 UTC [cauthdsl] func2 -> DEBU 43d8 0xc0026d8590 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.372 UTC [cauthdsl] func2 -> DEBU 43d9 0xc0026d8590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.373 UTC [cauthdsl] func2 -> DEBU 43da 0xc0026d8590 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.373 UTC [cauthdsl] func1 -> DEBU 43db 0xc0026d8590 gate 1555913884372101600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.373 UTC [policies] Evaluate -> DEBU 43dc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.373 UTC [policies] Evaluate -> DEBU 43dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.374 UTC [policies] Evaluate -> DEBU 43de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.376 UTC [cauthdsl] func1 -> DEBU 43df 0xc0026d8dd0 gate 1555913884376834000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.376 UTC [cauthdsl] func2 -> DEBU 43e0 0xc0026d8dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [cauthdsl] func2 -> DEBU 43e1 0xc0026d8dd0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [cauthdsl] func2 -> DEBU 43e2 0xc0026d8dd0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [msp.identity] Verify -> DEBU 43e3 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [msp.identity] Verify -> DEBU 43e4 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0026d8dd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [cauthdsl] func1 -> DEBU 43e6 0xc0026d8dd0 gate 1555913884376834000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [policies] Evaluate -> DEBU 43e7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.377 UTC [policies] Evaluate -> DEBU 43e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.378 UTC [policies] Evaluate -> DEBU 43e9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.378 UTC [policies] Evaluate -> DEBU 43ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.378 UTC [msp] DeserializeIdentity -> DEBU 43eb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.378 UTC [msp] DeserializeIdentity -> DEBU 43ec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.379 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43ee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.379 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43ef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.379 UTC [policies] Evaluate -> DEBU 43f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.380 UTC [policies] Evaluate -> DEBU 43f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.383 UTC [policies] Evaluate -> DEBU 43f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.383 UTC [cauthdsl] func1 -> DEBU 43f3 0xc0027025a0 gate 1555913884383467600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.383 UTC [cauthdsl] func2 -> DEBU 43f4 0xc0027025a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.384 UTC [cauthdsl] func2 -> DEBU 43f5 0xc0027025a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.385 UTC [cauthdsl] func2 -> DEBU 43f6 0xc0027025a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.386 UTC [cauthdsl] func2 -> DEBU 43f7 0xc0027025a0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.386 UTC [cauthdsl] func1 -> DEBU 43f8 0xc0027025a0 gate 1555913884383467600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.387 UTC [policies] Evaluate -> DEBU 43f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.387 UTC [policies] Evaluate -> DEBU 43fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.387 UTC [policies] Evaluate -> DEBU 43fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.388 UTC [cauthdsl] func1 -> DEBU 43fc 0xc002702de0 gate 1555913884388102600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.388 UTC [cauthdsl] func2 -> DEBU 43fd 0xc002702de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.388 UTC [cauthdsl] func2 -> DEBU 43fe 0xc002702de0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.389 UTC [cauthdsl] func2 -> DEBU 43ff 0xc002702de0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.389 UTC [msp.identity] Verify -> DEBU 4400 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:04.389 UTC [msp.identity] Verify -> DEBU 4401 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:04.389 UTC [cauthdsl] func2 -> DEBU 4402 0xc002702de0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.389 UTC [cauthdsl] func1 -> DEBU 4403 0xc002702de0 gate 1555913884388102600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.389 UTC [policies] Evaluate -> DEBU 4404 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.389 UTC [policies] Evaluate -> DEBU 4405 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 4406 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 4407 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [msp] DeserializeIdentity -> DEBU 4408 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4409 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 440a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 440b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 440c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 440d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [cauthdsl] func1 -> DEBU 440e 0xc002703ec0 gate 1555913884390649800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 440f 0xc002703ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 4410 0xc002703ec0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 4411 0xc002703ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 4412 0xc002703ec0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [cauthdsl] func1 -> DEBU 4413 0xc002703ec0 gate 1555913884390649800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 4414 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [policies] Evaluate -> DEBU 4415 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [policies] Evaluate -> DEBU 4416 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [cauthdsl] func1 -> DEBU 4417 0xc00319a700 gate 1555913884391240300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [cauthdsl] func2 -> DEBU 4418 0xc00319a700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [cauthdsl] func2 -> DEBU 4419 0xc00319a700 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [cauthdsl] func2 -> DEBU 441a 0xc00319a700 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [msp.identity] Verify -> DEBU 441b Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:04.391 UTC [msp.identity] Verify -> DEBU 441c Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [cauthdsl] func2 -> DEBU 441d 0xc00319a700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [cauthdsl] func1 -> DEBU 441e 0xc00319a700 gate 1555913884391240300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 441f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 4420 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 4421 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 4422 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [gossip.gossip] handleMessage -> DEBU 4423 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.371 UTC [msp.identity] Sign -> DEBU 43d0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:04.392 UTC [msp.identity] Sign -> DEBU 4424 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:04.393 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4425 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.394 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4426 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.395 UTC [msp] DeserializeIdentity -> DEBU 4427 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.395 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4428 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.395 UTC [msp] DeserializeIdentity -> DEBU 4429 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 442a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.396 UTC [msp] DeserializeIdentity -> DEBU 442b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 442c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 442d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 442e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.397 UTC [policies] Evaluate -> DEBU 442f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.398 UTC [policies] Evaluate -> DEBU 4430 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.398 UTC [policies] Evaluate -> DEBU 4431 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.398 UTC [cauthdsl] func1 -> DEBU 4432 0xc003d50ff0 gate 1555913884398533500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.398 UTC [cauthdsl] func2 -> DEBU 4433 0xc003d50ff0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.398 UTC [cauthdsl] func2 -> DEBU 4434 0xc003d50ff0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.399 UTC [cauthdsl] func2 -> DEBU 4435 0xc003d50ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.399 UTC [cauthdsl] func2 -> DEBU 4436 0xc003d50ff0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.399 UTC [cauthdsl] func1 -> DEBU 4437 0xc003d50ff0 gate 1555913884398533500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.400 UTC [policies] Evaluate -> DEBU 4438 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.400 UTC [policies] Evaluate -> DEBU 4439 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.400 UTC [policies] Evaluate -> DEBU 443a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.401 UTC [cauthdsl] func1 -> DEBU 443b 0xc003d51830 gate 1555913884401125600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.401 UTC [cauthdsl] func2 -> DEBU 443c 0xc003d51830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.401 UTC [cauthdsl] func2 -> DEBU 443d 0xc003d51830 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.401 UTC [cauthdsl] func2 -> DEBU 443e 0xc003d51830 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.402 UTC [msp.identity] Verify -> DEBU 443f Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +peer0.org1.example.com | 00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +peer0.org1.example.com | "2019-04-22 06:18:04.402 UTC [msp.identity] Verify -> DEBU 4440 Verify: sig = 00000000 30 45 02 21 00 f8 1c dd ee ee 35 ed 90 e9 35 95 |0E.!......5...5.| +peer0.org1.example.com | 00000010 79 3d 23 ee ad 34 24 ef 43 b3 7f bf 9c c2 6c 28 |y=#..4$.C.....l(| +peer0.org1.example.com | 00000020 7d 03 65 dc f7 02 20 57 24 73 12 bd 3a 4b 59 ec |}.e... W$s..:KY.| +peer0.org1.example.com | 00000030 2f ee bf 16 33 7c 84 b3 19 4d 98 05 38 d8 9c 89 |/...3|...M..8...| +peer0.org1.example.com | 00000040 89 2d a4 84 db 89 3c |.-....<|" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [cauthdsl] func2 -> DEBU 4441 0xc003d51830 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [cauthdsl] func1 -> DEBU 4442 0xc003d51830 gate 1555913884401125600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4443 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4447 Authenticated 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.403 UTC [gossip.comm] createConnection -> DEBU 4448 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.404 UTC [gossip.comm] sendToEndpoint -> DEBU 4449 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.404 UTC [gossip.comm] sendToEndpoint -> DEBU 444a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.406 UTC [gossip.comm] func1 -> DEBU 444b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.407 UTC [gossip.gossip] handleMessage -> DEBU 444c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.408 UTC [msp] DeserializeIdentity -> DEBU 444d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.409 UTC [msp.identity] Verify -> DEBU 444e Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +peer0.org1.example.com | 00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +peer0.org1.example.com | "2019-04-22 06:18:04.409 UTC [msp.identity] Verify -> DEBU 444f Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +peer0.org1.example.com | 00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +peer0.org1.example.com | 00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +peer0.org1.example.com | 00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +peer0.org1.example.com | 00000040 25 da d5 53 c3 69 |%..S.i|" +peer0.org1.example.com | "2019-04-22 06:18:04.409 UTC [msp.identity] Verify -> DEBU 4450 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +peer0.org1.example.com | 00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +peer0.org1.example.com | "2019-04-22 06:18:04.410 UTC [msp.identity] Verify -> DEBU 4451 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +peer0.org1.example.com | 00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +peer0.org1.example.com | 00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +peer0.org1.example.com | 00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +peer0.org1.example.com | 00000040 0e 36 62 6e f2 98 |.6bn..|" +peer0.org1.example.com | "2019-04-22 06:18:04.410 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [msp] DeserializeIdentity -> DEBU 4453 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4454 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4455 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4456 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [policies] Evaluate -> DEBU 4457 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [policies] Evaluate -> DEBU 4458 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [policies] Evaluate -> DEBU 4459 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.411 UTC [cauthdsl] func1 -> DEBU 445a 0xc003d36340 gate 1555913884411894900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445b 0xc003d36340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445c 0xc003d36340 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445d 0xc003d36340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445e 0xc003d36340 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.412 UTC [cauthdsl] func1 -> DEBU 445f 0xc003d36340 gate 1555913884411894900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.412 UTC [policies] Evaluate -> DEBU 4460 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.412 UTC [policies] Evaluate -> DEBU 4461 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [policies] Evaluate -> DEBU 4462 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [cauthdsl] func1 -> DEBU 4463 0xc003d36b80 gate 1555913884413059000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4464 0xc003d36b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4465 0xc003d36b80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4466 0xc003d36b80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [msp.identity] Verify -> DEBU 4467 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [msp.identity] Verify -> DEBU 4468 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4469 0xc003d36b80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.413 UTC [cauthdsl] func1 -> DEBU 446a 0xc003d36b80 gate 1555913884413059000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.414 UTC [msp] DeserializeIdentity -> DEBU 446f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.414 UTC [msp] DeserializeIdentity -> DEBU 4470 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4471 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4472 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4473 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [policies] Evaluate -> DEBU 4474 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [policies] Evaluate -> DEBU 4475 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [policies] Evaluate -> DEBU 4476 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [cauthdsl] func1 -> DEBU 4477 0xc003390350 gate 1555913884415738800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [cauthdsl] func2 -> DEBU 4478 0xc003390350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [cauthdsl] func2 -> DEBU 4479 0xc003390350 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.415 UTC [cauthdsl] func2 -> DEBU 447a 0xc003390350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.416 UTC [cauthdsl] func2 -> DEBU 447b 0xc003390350 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.416 UTC [cauthdsl] func1 -> DEBU 447c 0xc003390350 gate 1555913884415738800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.416 UTC [policies] Evaluate -> DEBU 447d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.416 UTC [policies] Evaluate -> DEBU 447e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.416 UTC [policies] Evaluate -> DEBU 447f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.416 UTC [cauthdsl] func1 -> DEBU 4480 0xc003390b90 gate 1555913884416903800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4481 0xc003390b90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4482 0xc003390b90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4483 0xc003390b90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.417 UTC [msp.identity] Verify -> DEBU 4484 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:04.417 UTC [msp.identity] Verify -> DEBU 4485 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4486 0xc003390b90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.417 UTC [cauthdsl] func1 -> DEBU 4487 0xc003390b90 gate 1555913884416903800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 4488 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 4489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 448a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 448b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.419 UTC [msp] DeserializeIdentity -> DEBU 448c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 448d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.423 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 448e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.423 UTC [policies] Evaluate -> DEBU 448f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.427 UTC [policies] Evaluate -> DEBU 4490 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 4491 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [cauthdsl] func1 -> DEBU 4492 0xc003391c70 gate 1555913884428146400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4493 0xc003391c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4494 0xc003391c70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4495 0xc003391c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4496 0xc003391c70 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [cauthdsl] func1 -> DEBU 4497 0xc003391c70 gate 1555913884428146400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 4498 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 4499 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 449a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.428 UTC [cauthdsl] func1 -> DEBU 449b 0xc00353e4b0 gate 1555913884428957800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 449c 0xc00353e4b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 449d 0xc00353e4b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 449e 0xc00353e4b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [msp.identity] Verify -> DEBU 449f Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [msp.identity] Verify -> DEBU 44a0 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 44a1 0xc00353e4b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [cauthdsl] func1 -> DEBU 44a2 0xc00353e4b0 gate 1555913884428957800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.429 UTC [gossip.gossip] handleMessage -> DEBU 44a7 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.434 UTC [grpc] HandleSubConnStateChange -> DEBU 44a8 pickfirstBalancer: HandleSubConnStateChange: 0xc00228e0b0, READY" +peer0.org1.example.com | "2019-04-22 06:18:04.435 UTC [comm.grpc.server] 1 -> INFO 44a9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:06.435Z grpc.peer_address=192.168.224.5:47726 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.4µs +peer0.org1.example.com | "2019-04-22 06:18:04.436 UTC [msp.identity] Sign -> DEBU 44aa Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [msp.identity] Sign -> DEBU 44ab Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44ac Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [msp.identity] Sign -> DEBU 44ad Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [msp.identity] Sign -> DEBU 44ae Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44af Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44b0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:47726" +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [msp.identity] Verify -> DEBU 44b1 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:18:04.437 UTC [msp.identity] Verify -> DEBU 44b2 Verify: sig = 00000000 30 45 02 21 00 89 33 a6 93 94 37 0d c2 f5 d8 1e |0E.!..3...7.....| +peer0.org1.example.com | 00000010 80 16 83 b8 ac 81 b2 d6 de e8 ff 41 ed 85 58 3e |...........A..X>| +peer0.org1.example.com | 00000020 9d 70 74 a5 40 02 20 33 2c 85 06 90 49 f5 79 b3 |.pt.@. 3,...I.y.| +peer0.org1.example.com | 00000030 2c 8a 00 e5 8a 86 d8 82 0d 8b 98 a3 14 8c bb 0e |,...............| +peer0.org1.example.com | 00000040 5a 6d e0 bf 80 87 6b |Zm....k|" +peer0.org1.example.com | "2019-04-22 06:18:04.438 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44b3 Authenticated 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.438 UTC [gossip.comm] createConnection -> DEBU 44b4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.438 UTC [gossip.comm] sendToEndpoint -> DEBU 44b5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.438 UTC [gossip.comm] sendToEndpoint -> DEBU 44b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.440 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44b7 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47726" +peer0.org1.example.com | "2019-04-22 06:18:04.441 UTC [gossip.comm] func1 -> DEBU 44b8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.441 UTC [gossip.gossip] handleMessage -> DEBU 44b9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.441 UTC [msp.identity] Verify -> DEBU 44ba Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:18:04.441 UTC [msp.identity] Verify -> DEBU 44bb Verify: sig = 00000000 30 44 02 20 7f a1 2a 89 eb 9e ac ac d6 a0 84 5e |0D. ..*........^| +peer0.org1.example.com | 00000010 55 d1 2f 7f 2c 5c 41 f5 3c 1c cc 09 f5 ed da 82 |U./.,\A.<.......| +peer0.org1.example.com | 00000020 84 67 93 03 02 20 34 ca f1 c2 4f 7b 22 e4 bf 13 |.g... 4...O{"...| +peer0.org1.example.com | 00000030 f8 27 22 01 1e cd 27 07 aa a6 3d 6a c6 48 b2 f6 |.'"...'...=j.H..| +peer0.org1.example.com | 00000040 16 eb a5 87 73 d6 |....s.|" +peer0.org1.example.com | "2019-04-22 06:18:04.441 UTC [msp] DeserializeIdentity -> DEBU 44bc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44bd Authenticated 192.168.224.5:47726" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] GossipStream -> DEBU 44be Servicing 192.168.224.5:47726" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] writeToStream -> DEBU 44bf Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] serviceConnection -> DEBU 44c0 Closing reading from stream" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [msp] DeserializeIdentity -> DEBU 44c1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] readFromStream -> DEBU 44c2 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] readFromStream -> DEBU 44c3 Got error, aborting: EOF" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] func2 -> DEBU 44c5 Client 192.168.224.5:47726 disconnected" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [comm.grpc.server] 1 -> INFO 44c6 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:47726 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=5.2417ms +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [grpc] infof -> DEBU 44c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [policies] Evaluate -> DEBU 44ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [gossip.comm] writeToStream -> DEBU 44cb Closing writing to stream" +peer0.org1.example.com | "2019-04-22 06:18:04.442 UTC [policies] Evaluate -> DEBU 44cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.443 UTC [policies] Evaluate -> DEBU 44cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.443 UTC [grpc] infof -> DEBU 44ce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:04.443 UTC [cauthdsl] func1 -> DEBU 44cf 0xc0031cea70 gate 1555913884443534400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.443 UTC [cauthdsl] func2 -> DEBU 44d0 0xc0031cea70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.444 UTC [cauthdsl] func2 -> DEBU 44d1 0xc0031cea70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.444 UTC [cauthdsl] func2 -> DEBU 44d2 0xc0031cea70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.444 UTC [cauthdsl] func2 -> DEBU 44d3 0xc0031cea70 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.444 UTC [cauthdsl] func1 -> DEBU 44d4 0xc0031cea70 gate 1555913884443534400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.444 UTC [policies] Evaluate -> DEBU 44d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.444 UTC [policies] Evaluate -> DEBU 44d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.444 UTC [policies] Evaluate -> DEBU 44d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.445 UTC [cauthdsl] func1 -> DEBU 44d8 0xc0031cf2b0 gate 1555913884444924600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.445 UTC [cauthdsl] func2 -> DEBU 44d9 0xc0031cf2b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.445 UTC [cauthdsl] func2 -> DEBU 44da 0xc0031cf2b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.445 UTC [cauthdsl] func2 -> DEBU 44db 0xc0031cf2b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.445 UTC [msp.identity] Verify -> DEBU 44dc Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +peer0.org1.example.com | 00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +peer0.org1.example.com | "2019-04-22 06:18:04.445 UTC [msp.identity] Verify -> DEBU 44dd Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +peer0.org1.example.com | 00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +peer0.org1.example.com | 00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +peer0.org1.example.com | 00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +peer0.org1.example.com | 00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +peer0.org1.example.com | "2019-04-22 06:18:04.446 UTC [cauthdsl] func2 -> DEBU 44de 0xc0031cf2b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.446 UTC [cauthdsl] func1 -> DEBU 44df 0xc0031cf2b0 gate 1555913884444924600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.447 UTC [msp] DeserializeIdentity -> DEBU 44e4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.447 UTC [msp] DeserializeIdentity -> DEBU 44e5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.447 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44e6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44e7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44e8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.448 UTC [policies] Evaluate -> DEBU 44e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.448 UTC [policies] Evaluate -> DEBU 44ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.448 UTC [policies] Evaluate -> DEBU 44eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.448 UTC [cauthdsl] func1 -> DEBU 44ec 0xc0030d0a80 gate 1555913884448548200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.448 UTC [cauthdsl] func2 -> DEBU 44ed 0xc0030d0a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.448 UTC [cauthdsl] func2 -> DEBU 44ee 0xc0030d0a80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.449 UTC [cauthdsl] func2 -> DEBU 44ef 0xc0030d0a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.449 UTC [cauthdsl] func2 -> DEBU 44f0 0xc0030d0a80 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.449 UTC [cauthdsl] func1 -> DEBU 44f1 0xc0030d0a80 gate 1555913884448548200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.449 UTC [policies] Evaluate -> DEBU 44f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.449 UTC [policies] Evaluate -> DEBU 44f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.449 UTC [policies] Evaluate -> DEBU 44f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.450 UTC [cauthdsl] func1 -> DEBU 44f5 0xc0030d12c0 gate 1555913884450102900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.450 UTC [cauthdsl] func2 -> DEBU 44f6 0xc0030d12c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.450 UTC [cauthdsl] func2 -> DEBU 44f7 0xc0030d12c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.450 UTC [cauthdsl] func2 -> DEBU 44f8 0xc0030d12c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.450 UTC [msp.identity] Verify -> DEBU 44f9 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +peer0.org1.example.com | 00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +peer0.org1.example.com | "2019-04-22 06:18:04.450 UTC [msp.identity] Verify -> DEBU 44fa Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +peer0.org1.example.com | 00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +peer0.org1.example.com | 00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +peer0.org1.example.com | 00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +peer0.org1.example.com | 00000040 2b 88 59 07 24 0f |+.Y.$.|" +peer0.org1.example.com | "2019-04-22 06:18:04.451 UTC [cauthdsl] func2 -> DEBU 44fb 0xc0030d12c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.451 UTC [cauthdsl] func1 -> DEBU 44fc 0xc0030d12c0 gate 1555913884450102900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 44fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 44fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 44ff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 4500 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.452 UTC [msp.identity] Verify -> DEBU 4501 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:04.452 UTC [msp.identity] Verify -> DEBU 4502 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:04.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4503 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4504 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [policies] Evaluate -> DEBU 4505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [policies] Evaluate -> DEBU 4506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [policies] Evaluate -> DEBU 4507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [msp] DeserializeIdentity -> DEBU 4508 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [msp.identity] newIdentity -> DEBU 4509 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +peer0.org1.example.com | F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +peer0.org1.example.com | LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +peer0.org1.example.com | NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [cauthdsl] func1 -> DEBU 450a 0xc00303e9c0 gate 1555913884453661300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [cauthdsl] func2 -> DEBU 450b 0xc00303e9c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [cauthdsl] func2 -> DEBU 450c 0xc00303e9c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 450d Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:04.453 UTC [msp] Validate -> DEBU 450e MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [msp] getCertificationChain -> DEBU 450f MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [cauthdsl] func2 -> DEBU 4510 0xc00303e9c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 4511 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 4512 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [cauthdsl] func2 -> DEBU 4513 0xc00303e9c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [cauthdsl] func1 -> DEBU 4514 0xc00303e9c0 gate 1555913884453661300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4515 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4516 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4517 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4518 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 4519 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 451a Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:04.455 UTC [gossip.gossip] handleMessage -> DEBU 451b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.455 UTC [gossip.gossip] handleMessage -> DEBU 451c Entering, 192.168.224.5:47726 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.455 UTC [msp.identity] Verify -> DEBU 451d Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:04.455 UTC [msp.identity] Verify -> DEBU 451e Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:04.455 UTC [gossip.gossip] handleMessage -> DEBU 451f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.478 UTC [msp] DeserializeIdentity -> DEBU 4520 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.478 UTC [msp] DeserializeIdentity -> DEBU 4521 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.479 UTC [gossip.pull] Hello -> DEBU 4522 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.479 UTC [msp] DeserializeIdentity -> DEBU 4523 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.480 UTC [msp] DeserializeIdentity -> DEBU 4524 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.480 UTC [gossip.comm] Send -> DEBU 4525 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:04.481 UTC [gossip.comm] sendToEndpoint -> DEBU 4526 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.481 UTC [gossip.comm] createConnection -> DEBU 4527 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:04.482 UTC [grpc] DialContext -> DEBU 4528 parsed scheme: """ +peer0.org1.example.com | "2019-04-22 06:18:04.483 UTC [grpc] DialContext -> DEBU 4529 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-04-22 06:18:04.483 UTC [grpc] NewAddress -> DEBU 452a ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-04-22 06:18:04.483 UTC [grpc] switchBalancer -> DEBU 452b ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-04-22 06:18:04.483 UTC [grpc] HandleSubConnStateChange -> DEBU 452c pickfirstBalancer: HandleSubConnStateChange: 0xc003166da0, CONNECTING" +peer0.org1.example.com | "2019-04-22 06:18:04.489 UTC [grpc] HandleSubConnStateChange -> DEBU 452d pickfirstBalancer: HandleSubConnStateChange: 0xc003166da0, READY" +peer0.org1.example.com | "2019-04-22 06:18:04.491 UTC [msp.identity] Sign -> DEBU 452e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +peer0.org1.example.com | "2019-04-22 06:18:04.491 UTC [msp.identity] Sign -> DEBU 452f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +peer0.org1.example.com | "2019-04-22 06:18:04.491 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4530 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.492 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4531 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.494 UTC [msp.identity] Verify -> DEBU 4532 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +peer0.org1.example.com | 00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +peer0.org1.example.com | "2019-04-22 06:18:04.494 UTC [msp.identity] Verify -> DEBU 4533 Verify: sig = 00000000 30 44 02 20 52 a6 62 a5 6c 8f 41 25 00 cc ce ed |0D. R.b.l.A%....| +peer0.org1.example.com | 00000010 61 df 85 6f fb 15 b2 d5 43 46 a2 cd 20 e6 6b 9e |a..o....CF.. .k.| +peer0.org1.example.com | 00000020 cf 92 b0 c6 02 20 11 3c f1 62 6a 52 c1 0a 09 61 |..... .<.bjR...a| +peer0.org1.example.com | 00000030 55 f7 bc 64 28 af 15 a3 3b 61 bd 6c c9 00 4b f0 |U..d(...;a.l..K.| +peer0.org1.example.com | 00000040 4e 52 57 8c b4 20 |NRW.. |" +peer0.org1.example.com | "2019-04-22 06:18:04.495 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4534 Authenticated 192.168.224.5:7051" +peer0.org1.example.com | "2019-04-22 06:18:04.495 UTC [gossip.comm] createConnection -> DEBU 4535 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.495 UTC [gossip.comm] sendToEndpoint -> DEBU 4536 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.497 UTC [gossip.comm] func1 -> DEBU 4537 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2555333910633718609 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.497 UTC [gossip.gossip] handleMessage -> DEBU 4538 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2555333910633718609 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.498 UTC [gossip.pull] HandleMessage -> DEBU 4539 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2555333910633718609 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.498 UTC [gossip.gossip] handleMessage -> DEBU 453a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.614 UTC [gossip.comm] func1 -> DEBU 453b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.614 UTC [gossip.gossip] handleMessage -> DEBU 453c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.615 UTC [msp] DeserializeIdentity -> DEBU 453d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.615 UTC [msp] DeserializeIdentity -> DEBU 453e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.615 UTC [gossip.gossip] handleMessage -> DEBU 453f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.623 UTC [gossip.comm] func1 -> DEBU 4540 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.623 UTC [gossip.gossip] handleMessage -> DEBU 4541 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.623 UTC [msp.identity] Verify -> DEBU 4542 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:04.624 UTC [msp.identity] Verify -> DEBU 4543 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:04.624 UTC [msp] DeserializeIdentity -> DEBU 4544 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.624 UTC [gossip.gossip] handleMessage -> DEBU 4545 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.624 UTC [gossip.comm] func1 -> DEBU 4546 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.624 UTC [gossip.gossip] handleMessage -> DEBU 4547 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.624 UTC [msp.identity] Verify -> DEBU 4548 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:04.625 UTC [msp.identity] Verify -> DEBU 4549 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:04.625 UTC [gossip.gossip] handleMessage -> DEBU 454a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.643 UTC [gossip.comm] func1 -> DEBU 454b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.643 UTC [gossip.gossip] handleMessage -> DEBU 454c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.644 UTC [msp.identity] Verify -> DEBU 454d Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:04.644 UTC [msp.identity] Verify -> DEBU 454e Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:04.644 UTC [msp] DeserializeIdentity -> DEBU 454f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.645 UTC [gossip.gossip] handleMessage -> DEBU 4550 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.666 UTC [gossip.comm] func1 -> DEBU 4551 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.667 UTC [gossip.gossip] handleMessage -> DEBU 4552 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.667 UTC [gossip.pull] HandleMessage -> DEBU 4553 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.668 UTC [gossip.pull] SendDigest -> DEBU 4554 Sending BLOCK_MSG digest: [6 8 1 3 5 9 2 4 7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:04.668 UTC [gossip.gossip] handleMessage -> DEBU 4555 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.839 UTC [gossip.comm] func1 -> DEBU 4556 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.839 UTC [gossip.gossip] handleMessage -> DEBU 4557 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.840 UTC [msp] DeserializeIdentity -> DEBU 4558 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.840 UTC [msp] DeserializeIdentity -> DEBU 4559 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.840 UTC [msp] DeserializeIdentity -> DEBU 455a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.841 UTC [gossip.gossip] handleMessage -> DEBU 455b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:04.843 UTC [gossip.comm] func1 -> DEBU 455c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913883657070400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.843 UTC [gossip.gossip] handleMessage -> DEBU 455d Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913883657070400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:04.843 UTC [msp] DeserializeIdentity -> DEBU 455e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 455f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:04.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4560 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4561 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:04.844 UTC [policies] Evaluate -> DEBU 4562 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.844 UTC [policies] Evaluate -> DEBU 4563 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:04.844 UTC [policies] Evaluate -> DEBU 4564 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.844 UTC [cauthdsl] func1 -> DEBU 4565 0xc00316e1e0 gate 1555913884844788600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.845 UTC [cauthdsl] func2 -> DEBU 4566 0xc00316e1e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.845 UTC [cauthdsl] func2 -> DEBU 4567 0xc00316e1e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.845 UTC [cauthdsl] func2 -> DEBU 4568 0xc00316e1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:04.846 UTC [cauthdsl] func2 -> DEBU 4569 0xc00316e1e0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.846 UTC [cauthdsl] func1 -> DEBU 456a 0xc00316e1e0 gate 1555913884844788600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:04.846 UTC [policies] Evaluate -> DEBU 456b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.846 UTC [policies] Evaluate -> DEBU 456c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.847 UTC [policies] Evaluate -> DEBU 456d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:04.847 UTC [cauthdsl] func1 -> DEBU 456e 0xc00316ea20 gate 1555913884847572000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:04.847 UTC [cauthdsl] func2 -> DEBU 456f 0xc00316ea20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:04.847 UTC [cauthdsl] func2 -> DEBU 4570 0xc00316ea20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:04.847 UTC [cauthdsl] func2 -> DEBU 4571 0xc00316ea20 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.847 UTC [msp.identity] Verify -> DEBU 4572 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:04.848 UTC [msp.identity] Verify -> DEBU 4573 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:04.848 UTC [cauthdsl] func2 -> DEBU 4574 0xc00316ea20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:04.848 UTC [cauthdsl] func1 -> DEBU 4575 0xc00316ea20 gate 1555913884847572000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4576 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4577 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4578 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:04.849 UTC [msp] DeserializeIdentity -> DEBU 457a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:04.850 UTC [gossip.gossip] handleMessage -> DEBU 457b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:05.052 UTC [gossip.comm] func1 -> DEBU 457c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:05.052 UTC [gossip.gossip] handleMessage -> DEBU 457d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:05.052 UTC [msp] DeserializeIdentity -> DEBU 457e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.053 UTC [msp] DeserializeIdentity -> DEBU 457f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.053 UTC [msp] DeserializeIdentity -> DEBU 4580 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.053 UTC [gossip.gossip] handleMessage -> DEBU 4581 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [gossip.comm] func1 -> DEBU 4582 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913883569847800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [gossip.gossip] handleMessage -> DEBU 4583 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913883569847800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [msp] DeserializeIdentity -> DEBU 4584 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4585 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4586 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4587 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4588 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4589 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 458a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [cauthdsl] func1 -> DEBU 458b 0xc000270c70 gate 1555913885060652400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458c 0xc000270c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458d 0xc000270c70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458e 0xc000270c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458f 0xc000270c70 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [cauthdsl] func1 -> DEBU 4590 0xc000270c70 gate 1555913885060652400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4591 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4593 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [cauthdsl] func1 -> DEBU 4594 0xc0002714b0 gate 1555913885061022400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 4595 0xc0002714b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 4596 0xc0002714b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 4597 0xc0002714b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [msp.identity] Verify -> DEBU 4598 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [msp.identity] Verify -> DEBU 4599 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 459a 0xc0002714b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [cauthdsl] func1 -> DEBU 459b 0xc0002714b0 gate 1555913885061022400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [msp] DeserializeIdentity -> DEBU 45a0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.061 UTC [gossip.gossip] handleMessage -> DEBU 45a1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:05.808 UTC [msp.identity] Sign -> DEBU 45a2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151039 " +peer0.org1.example.com | "2019-04-22 06:18:05.808 UTC [msp.identity] Sign -> DEBU 45a3 Sign: digest: C82B1AA13AE800FCD423D4AC2FF8FA1DA8679EAD5E5C1EF89D7557AD82CE2D51 " +peer0.org1.example.com | "2019-04-22 06:18:05.808 UTC [msp.identity] Sign -> DEBU 45a4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:05.809 UTC [msp.identity] Sign -> DEBU 45a5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:05.809 UTC [gossip.discovery] periodicalSendAlive -> DEBU 45a6 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:18:05.812 UTC [msp] DeserializeIdentity -> DEBU 45a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.813 UTC [msp] DeserializeIdentity -> DEBU 45a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.814 UTC [msp] DeserializeIdentity -> DEBU 45a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.814 UTC [gossip.comm] Send -> DEBU 45aa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:05.815 UTC [gossip.comm] Send -> DEBU 45ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:05.815 UTC [gossip.comm] sendToEndpoint -> DEBU 45ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:05.815 UTC [gossip.comm] sendToEndpoint -> DEBU 45ae Exiting" +peer0.org1.example.com | "2019-04-22 06:18:05.815 UTC [msp] DeserializeIdentity -> DEBU 45ad Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:05.816 UTC [gossip.comm] Send -> DEBU 45af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:05.816 UTC [gossip.comm] sendToEndpoint -> DEBU 45b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:05.817 UTC [gossip.comm] sendToEndpoint -> DEBU 45b1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:05.817 UTC [gossip.comm] sendToEndpoint -> DEBU 45b2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:05.825 UTC [gossip.comm] sendToEndpoint -> DEBU 45b3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.104 UTC [gossip.comm] func1 -> DEBU 45b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.104 UTC [gossip.gossip] handleMessage -> DEBU 45b5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.104 UTC [gossip.gossip] handleMessage -> DEBU 45b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45b8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:06.104 UTC [msp.identity] Verify -> DEBU 45b9 Verify: digest = 00000000 bb 46 f3 2d 26 d3 7f 95 59 b8 f8 d2 ed d9 81 2b |.F.-&...Y......+| +peer0.org1.example.com | 00000010 a4 a3 1b c6 c0 8b c1 5e ff 74 ec b1 d0 9c cc 1c |.......^.t......|" +peer0.org1.example.com | "2019-04-22 06:18:06.104 UTC [msp.identity] Verify -> DEBU 45ba Verify: sig = 00000000 30 44 02 20 04 26 59 f5 e2 0c 27 b8 48 cd f0 52 |0D. .&Y...'.H..R| +peer0.org1.example.com | 00000010 fc 21 b1 09 9a 0d e2 c2 4b 62 61 81 c4 7a 7f 3a |.!......Kba..z.:| +peer0.org1.example.com | 00000020 90 21 9f f9 02 20 09 8e 2c 9e 1e 9e f2 5a da ec |.!... ..,....Z..| +peer0.org1.example.com | 00000030 cf cd 51 bd fb c1 e2 9d cb 6e 3a 7c aa 3c 9e c3 |..Q......n:|.<..| +peer0.org1.example.com | 00000040 d3 61 d3 ad 5c 0f |.a..\.|" +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [msp.identity] Verify -> DEBU 45bb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [msp.identity] Verify -> DEBU 45bc Verify: sig = 00000000 30 44 02 20 6c 49 d7 65 e5 85 bb e5 95 96 65 ef |0D. lI.e......e.| +peer0.org1.example.com | 00000010 49 ee 55 5d 80 ab 6a ea c2 e1 15 de 23 45 81 3a |I.U]..j.....#E.:| +peer0.org1.example.com | 00000020 db 5a d5 d1 02 20 69 6d 30 3d ba ac a0 05 22 41 |.Z... im0=...."A| +peer0.org1.example.com | 00000030 86 df 5c e8 69 61 a0 a5 03 40 77 33 94 9d 55 df |..\.ia...@w3..U.| +peer0.org1.example.com | 00000040 b3 c8 f1 b9 f6 f8 |......|" +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [gossip.discovery] handleAliveMessage -> DEBU 45bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45be Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45bf updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 " +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45c0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 " +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45c1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45c2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 45c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.106 UTC [gossip.comm] Send -> DEBU 45c8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.107 UTC [gossip.comm] Send -> DEBU 45ca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45cb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45cc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45cd Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45ce Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.112 UTC [gossip.comm] func1 -> DEBU 45cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.112 UTC [gossip.gossip] handleMessage -> DEBU 45d0 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.112 UTC [gossip.gossip] handleMessage -> DEBU 45d1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45d3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.436 UTC [gossip.election] waitForInterrupt -> DEBU 45d4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.437 UTC [gossip.election] IsLeader -> DEBU 45d5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:18:06.438 UTC [msp.identity] Sign -> DEBU 45d6 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510121801 " +peer0.org1.example.com | "2019-04-22 06:18:06.439 UTC [msp.identity] Sign -> DEBU 45d7 Sign: digest: A437F6D4E4090460EF7DF557B9502CDF2DC3D2213907175C025D06D6DEA7F362 " +peer0.org1.example.com | "2019-04-22 06:18:06.439 UTC [gossip.election] waitForInterrupt -> DEBU 45d8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:18:06.450 UTC [msp] DeserializeIdentity -> DEBU 45d9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.451 UTC [msp] DeserializeIdentity -> DEBU 45da Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.451 UTC [msp] DeserializeIdentity -> DEBU 45db Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.452 UTC [msp] DeserializeIdentity -> DEBU 45dc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.452 UTC [gossip.comm] Send -> DEBU 45dd Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.453 UTC [msp] DeserializeIdentity -> DEBU 45de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.453 UTC [msp] DeserializeIdentity -> DEBU 45df Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.453 UTC [gossip.comm] sendToEndpoint -> DEBU 45e0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.454 UTC [gossip.comm] sendToEndpoint -> DEBU 45e1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.582 UTC [gossip.comm] func1 -> DEBU 45e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.582 UTC [gossip.gossip] handleMessage -> DEBU 45e3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.582 UTC [gossip.gossip] handleMessage -> DEBU 45e4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.583 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45e6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:06.583 UTC [msp] DeserializeIdentity -> DEBU 45e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:06.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45e9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:06.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45ea Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:06.585 UTC [policies] Evaluate -> DEBU 45eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:06.585 UTC [policies] Evaluate -> DEBU 45ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:06.585 UTC [policies] Evaluate -> DEBU 45ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:06.585 UTC [cauthdsl] func1 -> DEBU 45ee 0xc003bd03a0 gate 1555913886585648300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:06.586 UTC [cauthdsl] func2 -> DEBU 45ef 0xc003bd03a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:06.586 UTC [cauthdsl] func2 -> DEBU 45f0 0xc003bd03a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:06.586 UTC [cauthdsl] func2 -> DEBU 45f1 0xc003bd03a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:06.587 UTC [cauthdsl] func2 -> DEBU 45f2 0xc003bd03a0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:06.587 UTC [cauthdsl] func1 -> DEBU 45f3 0xc003bd03a0 gate 1555913886585648300 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:06.587 UTC [policies] Evaluate -> DEBU 45f4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:06.587 UTC [policies] Evaluate -> DEBU 45f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:06.587 UTC [policies] Evaluate -> DEBU 45f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:06.587 UTC [cauthdsl] func1 -> DEBU 45f7 0xc003bd0be0 gate 1555913886587773300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:06.588 UTC [cauthdsl] func2 -> DEBU 45f8 0xc003bd0be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:06.588 UTC [cauthdsl] func2 -> DEBU 45f9 0xc003bd0be0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:06.588 UTC [cauthdsl] func2 -> DEBU 45fa 0xc003bd0be0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:06.588 UTC [msp.identity] Verify -> DEBU 45fb Verify: digest = 00000000 7f 6a 55 64 fd fe 33 c8 5e 23 25 fc fb 89 40 46 |.jUd..3.^#%...@F| +peer0.org1.example.com | 00000010 10 d0 09 84 df 8a 6a e1 46 30 e2 d5 c4 9a 22 b7 |......j.F0....".|" +peer0.org1.example.com | "2019-04-22 06:18:06.588 UTC [msp.identity] Verify -> DEBU 45fc Verify: sig = 00000000 30 44 02 20 51 cb b1 3e 05 9b d1 ed 2c ef 2e 26 |0D. Q..>....,..&| +peer0.org1.example.com | 00000010 5a 17 2a b4 a4 bd 16 c7 be 62 df c8 80 ab c4 0f |Z.*......b......| +peer0.org1.example.com | 00000020 b9 54 0e a8 02 20 4e f1 e2 26 db 96 db 64 74 97 |.T... N..&...dt.| +peer0.org1.example.com | 00000030 3e 01 43 70 c6 8a f5 9d 57 86 3a 0a aa cd b3 49 |>.Cp....W.:....I| +peer0.org1.example.com | 00000040 86 c6 c6 f0 0a d7 |......|" +peer0.org1.example.com | "2019-04-22 06:18:06.589 UTC [cauthdsl] func2 -> DEBU 45fd 0xc003bd0be0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:06.589 UTC [cauthdsl] func1 -> DEBU 45fe 0xc003bd0be0 gate 1555913886587773300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 45ff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 4600 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 4601 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 4602 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:06.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 4603 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 4604 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4605 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 " +peer0.org1.example.com | "2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4606 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 " +peer0.org1.example.com | "2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4607 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4608 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.591 UTC [gossip.discovery] handleAliveMessage -> DEBU 4609 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 460a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.592 UTC [gossip.comm] func1 -> DEBU 460b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.593 UTC [gossip.gossip] handleMessage -> DEBU 460c Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.593 UTC [gossip.gossip] handleMessage -> DEBU 460d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 460e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 460f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.596 UTC [gossip.comm] func1 -> DEBU 4610 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.597 UTC [gossip.gossip] handleMessage -> DEBU 4611 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.597 UTC [gossip.gossip] handleMessage -> DEBU 4612 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4613 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4614 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.601 UTC [msp] DeserializeIdentity -> DEBU 4615 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.602 UTC [msp] DeserializeIdentity -> DEBU 4616 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.603 UTC [msp] DeserializeIdentity -> DEBU 4617 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.603 UTC [msp] DeserializeIdentity -> DEBU 4618 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.603 UTC [msp] DeserializeIdentity -> DEBU 4619 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.604 UTC [msp] DeserializeIdentity -> DEBU 461a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.604 UTC [msp] DeserializeIdentity -> DEBU 461b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.605 UTC [gossip.comm] Send -> DEBU 461c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.605 UTC [msp] DeserializeIdentity -> DEBU 461d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.606 UTC [msp] DeserializeIdentity -> DEBU 461e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.606 UTC [gossip.comm] Send -> DEBU 461f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4620 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4621 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.609 UTC [gossip.comm] sendToEndpoint -> DEBU 4622 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.610 UTC [gossip.comm] sendToEndpoint -> DEBU 4623 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.870 UTC [gossip.pull] Hello -> DEBU 4624 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:06.871 UTC [gossip.comm] Send -> DEBU 4625 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.871 UTC [gossip.pull] Hello -> DEBU 4626 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:06.871 UTC [gossip.comm] Send -> DEBU 4628 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.872 UTC [gossip.pull] Hello -> DEBU 4629 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:06.872 UTC [gossip.comm] Send -> DEBU 462b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.872 UTC [gossip.comm] sendToEndpoint -> DEBU 462c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.873 UTC [gossip.comm] sendToEndpoint -> DEBU 462d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.871 UTC [gossip.comm] sendToEndpoint -> DEBU 4627 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.872 UTC [gossip.comm] sendToEndpoint -> DEBU 462a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.874 UTC [gossip.comm] func1 -> DEBU 462f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5847558899932564495 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.874 UTC [gossip.comm] sendToEndpoint -> DEBU 462e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.875 UTC [gossip.comm] sendToEndpoint -> DEBU 4630 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.875 UTC [gossip.comm] func1 -> DEBU 4631 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10190551097248945473 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.877 UTC [gossip.comm] func1 -> DEBU 4632 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2170085643431276118 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.877 UTC [gossip.gossip] handleMessage -> DEBU 4633 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5847558899932564495 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.880 UTC [gossip.pull] HandleMessage -> DEBU 4634 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5847558899932564495 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.881 UTC [gossip.gossip] handleMessage -> DEBU 4635 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.882 UTC [gossip.gossip] handleMessage -> DEBU 4636 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10190551097248945473 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.882 UTC [gossip.pull] HandleMessage -> DEBU 4637 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10190551097248945473 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.883 UTC [gossip.gossip] handleMessage -> DEBU 4638 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.884 UTC [gossip.gossip] handleMessage -> DEBU 4639 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2170085643431276118 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.885 UTC [gossip.pull] HandleMessage -> DEBU 463a GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2170085643431276118 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.886 UTC [gossip.gossip] handleMessage -> DEBU 463b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.938 UTC [msp.identity] Sign -> DEBU 463c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103A " +peer0.org1.example.com | "2019-04-22 06:18:06.938 UTC [msp.identity] Sign -> DEBU 463d Sign: digest: 0465A2942E7DEB2E43A5FD78C55C8C234CDB2837037E9A5945923A03FC039E00 " +peer0.org1.example.com | "2019-04-22 06:18:06.939 UTC [msp.identity] Sign -> DEBU 463e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:06.939 UTC [msp.identity] Sign -> DEBU 463f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:06.939 UTC [gossip.comm] Send -> DEBU 4640 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.940 UTC [msp] DeserializeIdentity -> DEBU 4641 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.940 UTC [gossip.comm] Send -> DEBU 4642 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.940 UTC [msp] DeserializeIdentity -> DEBU 4643 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.941 UTC [gossip.comm] Send -> DEBU 4644 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:06.941 UTC [gossip.comm] sendToEndpoint -> DEBU 4645 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4646 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4647 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4648 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4649 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.943 UTC [gossip.comm] sendToEndpoint -> DEBU 464a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.947 UTC [gossip.comm] func1 -> DEBU 464b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.947 UTC [gossip.gossip] handleMessage -> DEBU 464d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.948 UTC [gossip.gossip] handleMessage -> DEBU 464e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 464f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4650 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:06.947 UTC [gossip.comm] func1 -> DEBU 464c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.949 UTC [gossip.gossip] handleMessage -> DEBU 4652 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.948 UTC [msp.identity] Verify -> DEBU 4651 Verify: digest = 00000000 04 65 a2 94 2e 7d eb 2e 43 a5 fd 78 c5 5c 8c 23 |.e...}..C..x.\.#| +peer0.org1.example.com | 00000010 4c db 28 37 03 7e 9a 59 45 92 3a 03 fc 03 9e 00 |L.(7.~.YE.:.....|" +peer0.org1.example.com | "2019-04-22 06:18:06.949 UTC [gossip.comm] func1 -> DEBU 4653 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.949 UTC [msp.identity] Verify -> DEBU 4654 Verify: sig = 00000000 30 44 02 20 7d 65 5a 00 88 68 72 64 a6 1b 45 4e |0D. }eZ..hrd..EN| +peer0.org1.example.com | 00000010 46 df 28 7d 39 3e 5b 66 91 9c 44 4b 63 22 e1 37 |F.(}9>[f..DKc".7| +peer0.org1.example.com | 00000020 18 f0 55 b5 02 20 6a 6f 61 17 fd c5 f3 d8 46 42 |..U.. joa.....FB| +peer0.org1.example.com | 00000030 44 9d 6d 7b d6 2c 5a 56 93 1e 6d 97 4d 8e 8c 15 |D.m{.,ZV..m.M...| +peer0.org1.example.com | 00000040 3e 8e dd 19 0d 1f |>.....|" +peer0.org1.example.com | "2019-04-22 06:18:06.951 UTC [msp.identity] Verify -> DEBU 4655 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:18:06.952 UTC [msp.identity] Verify -> DEBU 4656 Verify: sig = 00000000 30 44 02 20 6e 1c 7d 31 ad e7 8a 6f d3 03 89 21 |0D. n.}1...o...!| +peer0.org1.example.com | 00000010 03 76 cd a9 8c 41 85 be 7c 0c 2d 5e 6d fd c8 3c |.v...A..|.-^m..<| +peer0.org1.example.com | 00000020 ff a4 6b 4f 02 20 33 f7 56 f9 7e 49 74 eb 4b 9e |..kO. 3.V.~It.K.| +peer0.org1.example.com | 00000030 64 89 77 79 dd 0f 06 52 ce 42 23 74 be 38 38 f9 |d.wy...R.B#t.88.| +peer0.org1.example.com | 00000040 ef 56 b0 9e e0 79 |.V...y|" +peer0.org1.example.com | "2019-04-22 06:18:06.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 4657 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.953 UTC [gossip.discovery] isSentByMe -> DEBU 4658 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4659 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 465a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 465b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.955 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 465d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:06.954 UTC [gossip.gossip] handleMessage -> DEBU 465c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.955 UTC [gossip.gossip] handleMessage -> DEBU 465e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.956 UTC [msp.identity] Verify -> DEBU 465f Verify: digest = 00000000 04 65 a2 94 2e 7d eb 2e 43 a5 fd 78 c5 5c 8c 23 |.e...}..C..x.\.#| +peer0.org1.example.com | 00000010 4c db 28 37 03 7e 9a 59 45 92 3a 03 fc 03 9e 00 |L.(7.~.YE.:.....|" +peer0.org1.example.com | "2019-04-22 06:18:06.956 UTC [msp.identity] Verify -> DEBU 4660 Verify: sig = 00000000 30 44 02 20 7d 65 5a 00 88 68 72 64 a6 1b 45 4e |0D. }eZ..hrd..EN| +peer0.org1.example.com | 00000010 46 df 28 7d 39 3e 5b 66 91 9c 44 4b 63 22 e1 37 |F.(}9>[f..DKc".7| +peer0.org1.example.com | 00000020 18 f0 55 b5 02 20 6a 6f 61 17 fd c5 f3 d8 46 42 |..U.. joa.....FB| +peer0.org1.example.com | 00000030 44 9d 6d 7b d6 2c 5a 56 93 1e 6d 97 4d 8e 8c 15 |D.m{.,ZV..m.M...| +peer0.org1.example.com | 00000040 3e 8e dd 19 0d 1f |>.....|" +peer0.org1.example.com | "2019-04-22 06:18:06.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 4661 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.957 UTC [gossip.discovery] isSentByMe -> DEBU 4662 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 4663 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4664 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4665 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4667 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:06.958 UTC [gossip.gossip] handleMessage -> DEBU 4666 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.959 UTC [msp.identity] Verify -> DEBU 4668 Verify: digest = 00000000 04 65 a2 94 2e 7d eb 2e 43 a5 fd 78 c5 5c 8c 23 |.e...}..C..x.\.#| +peer0.org1.example.com | 00000010 4c db 28 37 03 7e 9a 59 45 92 3a 03 fc 03 9e 00 |L.(7.~.YE.:.....|" +peer0.org1.example.com | "2019-04-22 06:18:06.959 UTC [msp.identity] Verify -> DEBU 4669 Verify: sig = 00000000 30 44 02 20 7d 65 5a 00 88 68 72 64 a6 1b 45 4e |0D. }eZ..hrd..EN| +peer0.org1.example.com | 00000010 46 df 28 7d 39 3e 5b 66 91 9c 44 4b 63 22 e1 37 |F.(}9>[f..DKc".7| +peer0.org1.example.com | 00000020 18 f0 55 b5 02 20 6a 6f 61 17 fd c5 f3 d8 46 42 |..U.. joa.....FB| +peer0.org1.example.com | 00000030 44 9d 6d 7b d6 2c 5a 56 93 1e 6d 97 4d 8e 8c 15 |D.m{.,ZV..m.M...| +peer0.org1.example.com | 00000040 3e 8e dd 19 0d 1f |>.....|" +peer0.org1.example.com | "2019-04-22 06:18:06.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 466a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.960 UTC [gossip.discovery] isSentByMe -> DEBU 466b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 466c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU 466d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.994 UTC [gossip.comm] func1 -> DEBU 466e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.995 UTC [gossip.gossip] handleMessage -> DEBU 466f Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.995 UTC [gossip.gossip] handleMessage -> DEBU 4670 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:06.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4671 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:06.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4672 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:06.997 UTC [msp] DeserializeIdentity -> DEBU 4673 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:06.998 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4674 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:06.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4675 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:06.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4676 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:06.999 UTC [policies] Evaluate -> DEBU 4677 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:06.999 UTC [policies] Evaluate -> DEBU 4678 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:07.000 UTC [policies] Evaluate -> DEBU 4679 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:07.000 UTC [cauthdsl] func1 -> DEBU 467a 0xc003871d90 gate 1555913887000416200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:07.000 UTC [cauthdsl] func2 -> DEBU 467b 0xc003871d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:07.000 UTC [cauthdsl] func2 -> DEBU 467c 0xc003871d90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:07.001 UTC [cauthdsl] func2 -> DEBU 467d 0xc003871d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:07.001 UTC [cauthdsl] func2 -> DEBU 467e 0xc003871d90 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:07.002 UTC [cauthdsl] func1 -> DEBU 467f 0xc003871d90 gate 1555913887000416200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:07.002 UTC [policies] Evaluate -> DEBU 4680 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.002 UTC [policies] Evaluate -> DEBU 4681 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.002 UTC [policies] Evaluate -> DEBU 4682 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:07.003 UTC [cauthdsl] func1 -> DEBU 4683 0xc003db85d0 gate 1555913887003074400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:07.003 UTC [cauthdsl] func2 -> DEBU 4684 0xc003db85d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:07.004 UTC [cauthdsl] func2 -> DEBU 4686 0xc003db85d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:07.004 UTC [gossip.comm] func1 -> DEBU 4685 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.005 UTC [gossip.comm] func1 -> DEBU 4687 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.006 UTC [cauthdsl] func2 -> DEBU 4688 0xc003db85d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:07.007 UTC [msp.identity] Verify -> DEBU 468a Verify: digest = 00000000 dc f2 24 ef 17 da 4c b1 6e 26 a0 47 70 3e ca c9 |..$...L.n&.Gp>..| +peer0.org1.example.com | 00000010 ee c2 89 7b b4 dc 2a be 6d ce 94 18 37 f1 fd bf |...{..*.m...7...|" +peer0.org1.example.com | "2019-04-22 06:18:07.006 UTC [gossip.gossip] handleMessage -> DEBU 4689 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.007 UTC [msp.identity] Verify -> DEBU 468b Verify: sig = 00000000 30 44 02 20 2f c4 07 d6 b6 7e da ff 90 3e 1e 13 |0D. /....~...>..| +peer0.org1.example.com | 00000010 df e5 34 f0 9a b1 b2 19 98 38 0b fa 3d 07 77 c5 |..4......8..=.w.| +peer0.org1.example.com | 00000020 82 b5 2d bd 02 20 42 dd 7f 7b 69 3c f0 6f 80 ae |..-.. B..{i<.o..| +peer0.org1.example.com | 00000030 10 24 20 0d 62 11 3e 18 ce 0a 4c b4 a9 ce 84 8a |.$ .b.>...L.....| +peer0.org1.example.com | 00000040 0e ad 4a 0d 8f 77 |..J..w|" +peer0.org1.example.com | "2019-04-22 06:18:07.008 UTC [cauthdsl] func2 -> DEBU 468c 0xc003db85d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:07.008 UTC [cauthdsl] func1 -> DEBU 468d 0xc003db85d0 gate 1555913887003074400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:07.009 UTC [policies] Evaluate -> DEBU 468e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.009 UTC [policies] Evaluate -> DEBU 468f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.009 UTC [policies] Evaluate -> DEBU 4690 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.010 UTC [policies] Evaluate -> DEBU 4691 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 4692 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 4693 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:07.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 4694 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 " +peer0.org1.example.com | "2019-04-22 06:18:07.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 4695 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 " +peer0.org1.example.com | "2019-04-22 06:18:07.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 4696 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:07.012 UTC [gossip.discovery] learnExistingMembers -> DEBU 4697 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.012 UTC [gossip.discovery] handleAliveMessage -> DEBU 4698 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.013 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4699 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 469a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 469c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.014 UTC [gossip.gossip] handleMessage -> DEBU 469b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.016 UTC [gossip.gossip] handleMessage -> DEBU 469d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.018 UTC [msp] DeserializeIdentity -> DEBU 469e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.018 UTC [msp] DeserializeIdentity -> DEBU 46a0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.019 UTC [msp] DeserializeIdentity -> DEBU 46a1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.019 UTC [msp] DeserializeIdentity -> DEBU 46a2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.018 UTC [gossip.gossip] handleMessage -> DEBU 469f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.020 UTC [msp] DeserializeIdentity -> DEBU 46a3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.022 UTC [msp] DeserializeIdentity -> DEBU 46a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.026 UTC [msp] DeserializeIdentity -> DEBU 46a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.028 UTC [gossip.comm] Send -> DEBU 46a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:07.029 UTC [gossip.comm] sendToEndpoint -> DEBU 46a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.029 UTC [gossip.comm] sendToEndpoint -> DEBU 46aa Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.030 UTC [msp] DeserializeIdentity -> DEBU 46ab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.032 UTC [gossip.comm] Send -> DEBU 46ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:07.033 UTC [gossip.comm] sendToEndpoint -> DEBU 46ad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.035 UTC [gossip.comm] sendToEndpoint -> DEBU 46ae Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.110 UTC [gossip.comm] func1 -> DEBU 46af Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.110 UTC [gossip.gossip] handleMessage -> DEBU 46b0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.111 UTC [gossip.pull] HandleMessage -> DEBU 46b1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.111 UTC [gossip.pull] SendDigest -> DEBU 46b2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:07.111 UTC [gossip.gossip] handleMessage -> DEBU 46b3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.188 UTC [gossip.comm] func1 -> DEBU 46b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.189 UTC [gossip.gossip] handleMessage -> DEBU 46b5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.189 UTC [gossip.gossip] handleMessage -> DEBU 46b6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 46b8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:07.190 UTC [msp.identity] Verify -> DEBU 46b9 Verify: digest = 00000000 83 a2 05 c2 ad 79 97 67 08 0e ce 6c 53 3c b9 e4 |.....y.g...lS<..| +peer0.org1.example.com | 00000010 e3 b1 36 f6 48 23 16 bb 82 b2 1a ed 2e ac 00 e2 |..6.H#..........|" +peer0.org1.example.com | "2019-04-22 06:18:07.190 UTC [msp.identity] Verify -> DEBU 46ba Verify: sig = 00000000 30 44 02 20 21 b8 9a 2d 93 d6 10 cd a2 04 1c 2f |0D. !..-......./| +peer0.org1.example.com | 00000010 e2 e9 f0 b5 b8 52 58 b4 a9 a5 17 a4 25 50 1e ac |.....RX.....%P..| +peer0.org1.example.com | 00000020 da 46 37 6f 02 20 0d 78 7c 81 51 90 0d a7 5b 23 |.F7o. .x|.Q...[#| +peer0.org1.example.com | 00000030 9a 6c 2b 97 20 79 88 80 bd 2d 4b 00 ee e0 e1 0c |.l+. y...-K.....| +peer0.org1.example.com | 00000040 46 18 c9 cd 07 21 |F....!|" +peer0.org1.example.com | "2019-04-22 06:18:07.190 UTC [msp.identity] Verify -> DEBU 46bb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:07.191 UTC [msp.identity] Verify -> DEBU 46bc Verify: sig = 00000000 30 44 02 20 68 be 72 de 29 a7 2c ef 65 5e 28 44 |0D. h.r.).,.e^(D| +peer0.org1.example.com | 00000010 2d 87 56 77 3b 01 8d d9 41 56 5e a5 51 01 57 ac |-.Vw;...AV^.Q.W.| +peer0.org1.example.com | 00000020 13 89 13 12 02 20 48 7f d0 5b 6c 67 1b fa 55 1c |..... H..[lg..U.| +peer0.org1.example.com | 00000030 07 0e ba 77 fe b5 71 b1 2d e9 a6 00 ca 17 9b 47 |...w..q.-......G| +peer0.org1.example.com | 00000040 18 61 75 4d ea 6e |.auM.n|" +peer0.org1.example.com | "2019-04-22 06:18:07.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 46bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 46be Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:07.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 46bf updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 " +peer0.org1.example.com | "2019-04-22 06:18:07.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 46c0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 " +peer0.org1.example.com | "2019-04-22 06:18:07.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 46c1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:07.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 46c2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 46c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.193 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46c4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.193 UTC [gossip.discovery] sendMemResponse -> DEBU 46c5 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:07.194 UTC [msp] DeserializeIdentity -> DEBU 46c6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.194 UTC [msp] DeserializeIdentity -> DEBU 46c7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.195 UTC [gossip.comm] Send -> DEBU 46c8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:07.195 UTC [gossip.discovery] sendMemResponse -> DEBU 46c9 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:07.195 UTC [gossip.comm] sendToEndpoint -> DEBU 46ca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.195 UTC [gossip.comm] sendToEndpoint -> DEBU 46cb Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.589 UTC [gossip.comm] func1 -> DEBU 46cc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.590 UTC [gossip.gossip] handleMessage -> DEBU 46cd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.591 UTC [gossip.pull] HandleMessage -> DEBU 46ce GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.591 UTC [msp] DeserializeIdentity -> DEBU 46cf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.591 UTC [msp] DeserializeIdentity -> DEBU 46d0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.592 UTC [msp] DeserializeIdentity -> DEBU 46d1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.592 UTC [msp] DeserializeIdentity -> DEBU 46d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.592 UTC [msp] DeserializeIdentity -> DEBU 46d3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.593 UTC [msp] DeserializeIdentity -> DEBU 46d4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.593 UTC [gossip.pull] SendDigest -> DEBU 46d5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:07.593 UTC [gossip.gossip] handleMessage -> DEBU 46d6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.621 UTC [gossip.comm] func1 -> DEBU 46d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.621 UTC [gossip.gossip] handleMessage -> DEBU 46d8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.622 UTC [gossip.gossip] handleMessage -> DEBU 46d9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.623 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 46db Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:07.623 UTC [msp] DeserializeIdentity -> DEBU 46dc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.624 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:07.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:07.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46df Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:07.625 UTC [policies] Evaluate -> DEBU 46e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:07.625 UTC [policies] Evaluate -> DEBU 46e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:07.625 UTC [policies] Evaluate -> DEBU 46e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:07.626 UTC [cauthdsl] func1 -> DEBU 46e3 0xc0042a9b10 gate 1555913887626003900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:07.626 UTC [cauthdsl] func2 -> DEBU 46e4 0xc0042a9b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:07.626 UTC [cauthdsl] func2 -> DEBU 46e5 0xc0042a9b10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:07.627 UTC [cauthdsl] func2 -> DEBU 46e6 0xc0042a9b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:07.627 UTC [cauthdsl] func2 -> DEBU 46e7 0xc0042a9b10 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:07.628 UTC [cauthdsl] func1 -> DEBU 46e8 0xc0042a9b10 gate 1555913887626003900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:07.628 UTC [policies] Evaluate -> DEBU 46e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.628 UTC [policies] Evaluate -> DEBU 46ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.628 UTC [policies] Evaluate -> DEBU 46eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:07.628 UTC [cauthdsl] func1 -> DEBU 46ec 0xc0038d4350 gate 1555913887628909600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:07.629 UTC [cauthdsl] func2 -> DEBU 46ed 0xc0038d4350 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:07.629 UTC [cauthdsl] func2 -> DEBU 46ee 0xc0038d4350 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:07.629 UTC [cauthdsl] func2 -> DEBU 46ef 0xc0038d4350 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:07.629 UTC [msp.identity] Verify -> DEBU 46f0 Verify: digest = 00000000 0f 4e 3e 6b b8 91 4d 79 ee 12 6e e1 8f c3 60 d4 |.N>k..My..n...`.| +peer0.org1.example.com | 00000010 31 df 29 94 6f 73 23 ee 93 12 30 ad 44 4b eb 88 |1.).os#...0.DK..|" +peer0.org1.example.com | "2019-04-22 06:18:07.629 UTC [msp.identity] Verify -> DEBU 46f1 Verify: sig = 00000000 30 45 02 21 00 8f 7c 0f ab 39 31 55 1e d6 84 1e |0E.!..|..91U....| +peer0.org1.example.com | 00000010 c2 09 9d f9 2a 99 2f c3 30 90 8f c6 9b d3 4c 9d |....*./.0.....L.| +peer0.org1.example.com | 00000020 ae b6 b7 3e f2 02 20 11 78 c6 16 af b2 04 a8 4b |...>.. .x......K| +peer0.org1.example.com | 00000030 19 fc f4 91 cd 3c 7b e8 ae f4 9e 69 17 3b b9 17 |.....<{....i.;..| +peer0.org1.example.com | 00000040 15 fd 2a 71 7e ee bf |..*q~..|" +peer0.org1.example.com | "2019-04-22 06:18:07.630 UTC [cauthdsl] func2 -> DEBU 46f2 0xc0038d4350 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:07.630 UTC [cauthdsl] func1 -> DEBU 46f3 0xc0038d4350 gate 1555913887628909600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:07.631 UTC [policies] Evaluate -> DEBU 46f4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.631 UTC [policies] Evaluate -> DEBU 46f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.632 UTC [policies] Evaluate -> DEBU 46f6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.632 UTC [policies] Evaluate -> DEBU 46f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:07.633 UTC [gossip.discovery] handleAliveMessage -> DEBU 46f8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 46f9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:07.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fa updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 " +peer0.org1.example.com | "2019-04-22 06:18:07.634 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 " +peer0.org1.example.com | "2019-04-22 06:18:07.634 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:07.635 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fd Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.635 UTC [gossip.discovery] handleAliveMessage -> DEBU 46fe Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46ff Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.635 UTC [gossip.discovery] sendMemResponse -> DEBU 4700 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:07.636 UTC [msp] DeserializeIdentity -> DEBU 4701 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.636 UTC [msp] DeserializeIdentity -> DEBU 4702 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.637 UTC [msp] DeserializeIdentity -> DEBU 4703 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:07.638 UTC [gossip.comm] Send -> DEBU 4704 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:07.639 UTC [gossip.discovery] sendMemResponse -> DEBU 4705 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:07.639 UTC [gossip.comm] sendToEndpoint -> DEBU 4706 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:07.640 UTC [gossip.comm] sendToEndpoint -> DEBU 4707 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:07.998 UTC [gossip.comm] func1 -> DEBU 4708 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.000 UTC [gossip.gossip] handleMessage -> DEBU 4709 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.000 UTC [gossip.pull] HandleMessage -> DEBU 470a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.000 UTC [msp] DeserializeIdentity -> DEBU 470b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.001 UTC [msp] DeserializeIdentity -> DEBU 470c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.002 UTC [msp] DeserializeIdentity -> DEBU 470d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.002 UTC [msp] DeserializeIdentity -> DEBU 470e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.003 UTC [msp] DeserializeIdentity -> DEBU 470f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.003 UTC [msp] DeserializeIdentity -> DEBU 4710 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.003 UTC [gossip.pull] SendDigest -> DEBU 4711 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:08.004 UTC [gossip.gossip] handleMessage -> DEBU 4712 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.017 UTC [gossip.comm] func1 -> DEBU 4713 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.017 UTC [gossip.gossip] handleMessage -> DEBU 4714 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.018 UTC [gossip.gossip] handleMessage -> DEBU 4715 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.018 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4716 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.018 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4717 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:08.022 UTC [msp] DeserializeIdentity -> DEBU 4718 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4719 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:08.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 471a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 471b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.024 UTC [policies] Evaluate -> DEBU 471c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.024 UTC [policies] Evaluate -> DEBU 471d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:08.024 UTC [policies] Evaluate -> DEBU 471e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.024 UTC [cauthdsl] func1 -> DEBU 471f 0xc0038c9970 gate 1555913888024772400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.024 UTC [cauthdsl] func2 -> DEBU 4720 0xc0038c9970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.025 UTC [cauthdsl] func2 -> DEBU 4721 0xc0038c9970 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.025 UTC [cauthdsl] func2 -> DEBU 4722 0xc0038c9970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:08.025 UTC [cauthdsl] func2 -> DEBU 4723 0xc0038c9970 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.025 UTC [cauthdsl] func1 -> DEBU 4724 0xc0038c9970 gate 1555913888024772400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.026 UTC [policies] Evaluate -> DEBU 4725 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.026 UTC [policies] Evaluate -> DEBU 4726 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.026 UTC [policies] Evaluate -> DEBU 4727 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.026 UTC [cauthdsl] func1 -> DEBU 4728 0xc003e781b0 gate 1555913888026771500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.027 UTC [cauthdsl] func2 -> DEBU 4729 0xc003e781b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.027 UTC [cauthdsl] func2 -> DEBU 472a 0xc003e781b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.027 UTC [cauthdsl] func2 -> DEBU 472b 0xc003e781b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.027 UTC [msp.identity] Verify -> DEBU 472c Verify: digest = 00000000 d2 ac 04 7c 81 1b 99 2b 43 f6 96 3c 35 32 27 b3 |...|...+C..<52'.| +peer0.org1.example.com | 00000010 e3 59 9d 9f b2 a2 ce 27 a1 55 83 87 cc 35 8c 23 |.Y.....'.U...5.#|" +peer0.org1.example.com | "2019-04-22 06:18:08.028 UTC [msp.identity] Verify -> DEBU 472d Verify: sig = 00000000 30 45 02 21 00 82 30 03 be 61 4a 6f 1b d6 46 0d |0E.!..0..aJo..F.| +peer0.org1.example.com | 00000010 ec 09 5d ca 86 19 93 3f 48 8b bb 3d 9a de ea 7d |..]....?H..=...}| +peer0.org1.example.com | 00000020 d0 3a f2 c0 d0 02 20 36 69 6d 8d a4 e7 5a 56 5e |.:.... 6im...ZV^| +peer0.org1.example.com | 00000030 23 6d cd 69 49 df 90 35 f9 89 18 23 08 9b 9e c6 |#m.iI..5...#....| +peer0.org1.example.com | 00000040 96 7e b7 50 c6 64 ee |.~.P.d.|" +peer0.org1.example.com | "2019-04-22 06:18:08.028 UTC [cauthdsl] func2 -> DEBU 472e 0xc003e781b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.028 UTC [cauthdsl] func1 -> DEBU 472f 0xc003e781b0 gate 1555913888026771500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4730 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4731 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4732 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4733 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.029 UTC [gossip.discovery] handleAliveMessage -> DEBU 4734 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4735 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4736 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 " +peer0.org1.example.com | "2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4737 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 " +peer0.org1.example.com | "2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4738 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:08.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4739 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.031 UTC [gossip.discovery] handleAliveMessage -> DEBU 473a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 473b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.031 UTC [gossip.discovery] sendMemResponse -> DEBU 473c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:08.032 UTC [msp] DeserializeIdentity -> DEBU 473d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.032 UTC [msp] DeserializeIdentity -> DEBU 473e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.032 UTC [msp] DeserializeIdentity -> DEBU 473f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.033 UTC [gossip.comm] Send -> DEBU 4740 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:08.034 UTC [gossip.discovery] sendMemResponse -> DEBU 4741 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:08.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4742 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4743 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.353 UTC [msp] DeserializeIdentity -> DEBU 4744 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.354 UTC [msp] DeserializeIdentity -> DEBU 4745 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.354 UTC [gossip.comm] Send -> DEBU 4746 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:08.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4747 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4748 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.358 UTC [gossip.comm] sendToEndpoint -> DEBU 4749 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.358 UTC [gossip.comm] sendToEndpoint -> DEBU 474a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.359 UTC [gossip.comm] func1 -> DEBU 474b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.360 UTC [gossip.gossip] handleMessage -> DEBU 474d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.361 UTC [msp] DeserializeIdentity -> DEBU 474f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.362 UTC [msp] DeserializeIdentity -> DEBU 4750 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.361 UTC [gossip.comm] func1 -> DEBU 474e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.355 UTC [gossip.comm] sendToEndpoint -> DEBU 474c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.363 UTC [msp] DeserializeIdentity -> DEBU 4751 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.363 UTC [gossip.comm] sendToEndpoint -> DEBU 4752 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.364 UTC [gossip.comm] func1 -> DEBU 4753 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4754 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:08.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4755 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4756 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.366 UTC [policies] Evaluate -> DEBU 4757 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.367 UTC [policies] Evaluate -> DEBU 4758 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:08.368 UTC [policies] Evaluate -> DEBU 4759 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.368 UTC [cauthdsl] func1 -> DEBU 475a 0xc003edf2a0 gate 1555913888368944000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.369 UTC [cauthdsl] func2 -> DEBU 475b 0xc003edf2a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.369 UTC [cauthdsl] func2 -> DEBU 475c 0xc003edf2a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.370 UTC [cauthdsl] func2 -> DEBU 475d 0xc003edf2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:08.370 UTC [cauthdsl] func2 -> DEBU 475e 0xc003edf2a0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.370 UTC [cauthdsl] func1 -> DEBU 475f 0xc003edf2a0 gate 1555913888368944000 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.371 UTC [policies] Evaluate -> DEBU 4760 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.371 UTC [policies] Evaluate -> DEBU 4761 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.371 UTC [policies] Evaluate -> DEBU 4762 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.372 UTC [cauthdsl] func1 -> DEBU 4763 0xc003edfae0 gate 1555913888372104900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4764 0xc003edfae0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4765 0xc003edfae0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4766 0xc003edfae0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.373 UTC [msp.identity] Verify -> DEBU 4767 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:08.373 UTC [msp.identity] Verify -> DEBU 4768 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4769 0xc003edfae0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.375 UTC [cauthdsl] func1 -> DEBU 476a 0xc003edfae0 gate 1555913888372104900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.376 UTC [msp.identity] Verify -> DEBU 476f Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:08.377 UTC [msp.identity] Verify -> DEBU 4770 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:08.378 UTC [msp.identity] Verify -> DEBU 4771 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:08.380 UTC [msp.identity] Verify -> DEBU 4772 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:08.382 UTC [msp] DeserializeIdentity -> DEBU 4773 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.384 UTC [msp] DeserializeIdentity -> DEBU 4774 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.389 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4775 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:08.389 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4776 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.390 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4777 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.390 UTC [policies] Evaluate -> DEBU 4778 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.391 UTC [policies] Evaluate -> DEBU 4779 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:08.391 UTC [policies] Evaluate -> DEBU 477a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.392 UTC [cauthdsl] func1 -> DEBU 477b 0xc002f640f0 gate 1555913888392452700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.392 UTC [cauthdsl] func2 -> DEBU 477c 0xc002f640f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.393 UTC [cauthdsl] func2 -> DEBU 477d 0xc002f640f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.394 UTC [cauthdsl] func2 -> DEBU 477e 0xc002f640f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:08.396 UTC [cauthdsl] func2 -> DEBU 477f 0xc002f640f0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.397 UTC [cauthdsl] func1 -> DEBU 4780 0xc002f640f0 gate 1555913888392452700 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.397 UTC [policies] Evaluate -> DEBU 4781 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.398 UTC [policies] Evaluate -> DEBU 4782 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.399 UTC [policies] Evaluate -> DEBU 4783 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.400 UTC [cauthdsl] func1 -> DEBU 4784 0xc002f64930 gate 1555913888400075700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.400 UTC [cauthdsl] func2 -> DEBU 4785 0xc002f64930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.401 UTC [cauthdsl] func2 -> DEBU 4786 0xc002f64930 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.402 UTC [cauthdsl] func2 -> DEBU 4787 0xc002f64930 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.404 UTC [msp.identity] Verify -> DEBU 4788 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:08.407 UTC [msp.identity] Verify -> DEBU 4789 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:08.410 UTC [cauthdsl] func2 -> DEBU 478a 0xc002f64930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.410 UTC [cauthdsl] func1 -> DEBU 478b 0xc002f64930 gate 1555913888400075700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:08.411 UTC [policies] Evaluate -> DEBU 478c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.411 UTC [policies] Evaluate -> DEBU 478d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.412 UTC [policies] Evaluate -> DEBU 478e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.412 UTC [policies] Evaluate -> DEBU 478f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.413 UTC [gossip.gossip] handleMessage -> DEBU 4790 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.413 UTC [gossip.gossip] handleMessage -> DEBU 4791 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.414 UTC [msp] DeserializeIdentity -> DEBU 4792 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.414 UTC [msp] DeserializeIdentity -> DEBU 4793 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.414 UTC [msp] DeserializeIdentity -> DEBU 4794 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.415 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4795 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:08.418 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4796 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.419 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4797 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.420 UTC [policies] Evaluate -> DEBU 4798 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.421 UTC [policies] Evaluate -> DEBU 4799 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:08.421 UTC [policies] Evaluate -> DEBU 479a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.422 UTC [cauthdsl] func1 -> DEBU 479b 0xc002f72440 gate 1555913888422370000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.423 UTC [cauthdsl] func2 -> DEBU 479c 0xc002f72440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.423 UTC [cauthdsl] func2 -> DEBU 479d 0xc002f72440 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.424 UTC [cauthdsl] func2 -> DEBU 479e 0xc002f72440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:08.424 UTC [cauthdsl] func2 -> DEBU 479f 0xc002f72440 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [cauthdsl] func1 -> DEBU 47a0 0xc002f72440 gate 1555913888422370000 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [cauthdsl] func1 -> DEBU 47a4 0xc002f72c80 gate 1555913888425495000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47a5 0xc002f72c80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47a6 0xc002f72c80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47a7 0xc002f72c80 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [msp.identity] Verify -> DEBU 47a8 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [msp.identity] Verify -> DEBU 47a9 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47aa 0xc002f72c80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [cauthdsl] func1 -> DEBU 47ab 0xc002f72c80 gate 1555913888425495000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [policies] Evaluate -> DEBU 47ae Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [policies] Evaluate -> DEBU 47af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b0 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b1 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b2 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b3 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [msp] DeserializeIdentity -> DEBU 47b4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.426 UTC [msp] DeserializeIdentity -> DEBU 47b5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47b7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47b8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47bc 0xc003745290 gate 1555913888427231500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47bd 0xc003745290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47be 0xc003745290 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47bf 0xc003745290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c0 0xc003745290 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47c1 0xc003745290 gate 1555913888427231500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47c5 0xc003745ad0 gate 1555913888427575100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c6 0xc003745ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c7 0xc003745ad0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c8 0xc003745ad0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [msp.identity] Verify -> DEBU 47c9 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [msp.identity] Verify -> DEBU 47ca Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47cb 0xc003745ad0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47cc 0xc003745ad0 gate 1555913888427575100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.428 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.428 UTC [policies] Evaluate -> DEBU 47cf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.428 UTC [policies] Evaluate -> DEBU 47d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.428 UTC [gossip.gossip] handleMessage -> DEBU 47d1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.428 UTC [gossip.gossip] handleMessage -> DEBU 47d2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.428 UTC [msp.identity] Verify -> DEBU 47d3 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:08.428 UTC [msp.identity] Verify -> DEBU 47d4 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:08.431 UTC [msp.identity] Verify -> DEBU 47d5 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:08.432 UTC [msp.identity] Verify -> DEBU 47d6 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:08.432 UTC [msp] DeserializeIdentity -> DEBU 47d7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.433 UTC [msp] DeserializeIdentity -> DEBU 47d8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.434 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:08.434 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47da Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47db Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.435 UTC [policies] Evaluate -> DEBU 47dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.435 UTC [policies] Evaluate -> DEBU 47dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:08.435 UTC [policies] Evaluate -> DEBU 47de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.436 UTC [cauthdsl] func1 -> DEBU 47df 0xc002760320 gate 1555913888436303400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.436 UTC [cauthdsl] func2 -> DEBU 47e0 0xc002760320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.436 UTC [cauthdsl] func2 -> DEBU 47e1 0xc002760320 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.436 UTC [cauthdsl] func2 -> DEBU 47e2 0xc002760320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:08.437 UTC [cauthdsl] func2 -> DEBU 47e3 0xc002760320 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.437 UTC [cauthdsl] func1 -> DEBU 47e4 0xc002760320 gate 1555913888436303400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.437 UTC [policies] Evaluate -> DEBU 47e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.437 UTC [policies] Evaluate -> DEBU 47e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.437 UTC [policies] Evaluate -> DEBU 47e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.438 UTC [cauthdsl] func1 -> DEBU 47e8 0xc002760b60 gate 1555913888438680700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.440 UTC [cauthdsl] func2 -> DEBU 47e9 0xc002760b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.441 UTC [cauthdsl] func2 -> DEBU 47ea 0xc002760b60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.442 UTC [cauthdsl] func2 -> DEBU 47eb 0xc002760b60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.442 UTC [msp.identity] Verify -> DEBU 47ec Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:08.443 UTC [msp.identity] Verify -> DEBU 47ed Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:08.444 UTC [cauthdsl] func2 -> DEBU 47ee 0xc002760b60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.444 UTC [cauthdsl] func1 -> DEBU 47ef 0xc002760b60 gate 1555913888438680700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:08.444 UTC [policies] Evaluate -> DEBU 47f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.444 UTC [policies] Evaluate -> DEBU 47f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.444 UTC [policies] Evaluate -> DEBU 47f2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.445 UTC [policies] Evaluate -> DEBU 47f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.445 UTC [msp] DeserializeIdentity -> DEBU 47f4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.445 UTC [msp] DeserializeIdentity -> DEBU 47f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:08.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47f7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47f8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:08.447 UTC [policies] Evaluate -> DEBU 47f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.448 UTC [policies] Evaluate -> DEBU 47fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:08.448 UTC [policies] Evaluate -> DEBU 47fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.449 UTC [cauthdsl] func1 -> DEBU 47fc 0xc0027b8330 gate 1555913888449098700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.449 UTC [cauthdsl] func2 -> DEBU 47fd 0xc0027b8330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.450 UTC [cauthdsl] func2 -> DEBU 47fe 0xc0027b8330 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.451 UTC [cauthdsl] func2 -> DEBU 47ff 0xc0027b8330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:08.452 UTC [cauthdsl] func2 -> DEBU 4800 0xc0027b8330 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.453 UTC [cauthdsl] func1 -> DEBU 4801 0xc0027b8330 gate 1555913888449098700 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:08.453 UTC [policies] Evaluate -> DEBU 4802 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.455 UTC [policies] Evaluate -> DEBU 4803 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.455 UTC [policies] Evaluate -> DEBU 4804 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:08.456 UTC [cauthdsl] func1 -> DEBU 4805 0xc0027b8b70 gate 1555913888456050300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:08.456 UTC [cauthdsl] func2 -> DEBU 4806 0xc0027b8b70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:08.456 UTC [cauthdsl] func2 -> DEBU 4807 0xc0027b8b70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:08.456 UTC [cauthdsl] func2 -> DEBU 4808 0xc0027b8b70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.457 UTC [msp.identity] Verify -> DEBU 4809 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:08.457 UTC [msp.identity] Verify -> DEBU 480a Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:08.457 UTC [cauthdsl] func2 -> DEBU 480b 0xc0027b8b70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:08.458 UTC [cauthdsl] func1 -> DEBU 480c 0xc0027b8b70 gate 1555913888456050300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:08.458 UTC [policies] Evaluate -> DEBU 480d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.458 UTC [policies] Evaluate -> DEBU 480e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.459 UTC [policies] Evaluate -> DEBU 480f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.459 UTC [policies] Evaluate -> DEBU 4810 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:08.459 UTC [gossip.gossip] handleMessage -> DEBU 4811 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.482 UTC [msp] DeserializeIdentity -> DEBU 4812 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.482 UTC [msp] DeserializeIdentity -> DEBU 4813 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.483 UTC [gossip.pull] Hello -> DEBU 4814 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:08.483 UTC [msp] DeserializeIdentity -> DEBU 4815 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.484 UTC [msp] DeserializeIdentity -> DEBU 4816 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.484 UTC [gossip.comm] Send -> DEBU 4817 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:08.485 UTC [gossip.comm] sendToEndpoint -> DEBU 4818 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.485 UTC [gossip.comm] sendToEndpoint -> DEBU 4819 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.487 UTC [gossip.comm] func1 -> DEBU 481a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18002325364841574706 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.487 UTC [gossip.gossip] handleMessage -> DEBU 481b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18002325364841574706 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.487 UTC [gossip.pull] HandleMessage -> DEBU 481c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18002325364841574706 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.488 UTC [gossip.gossip] handleMessage -> DEBU 481d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.612 UTC [gossip.comm] func1 -> DEBU 481e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.612 UTC [gossip.gossip] handleMessage -> DEBU 481f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.612 UTC [msp] DeserializeIdentity -> DEBU 4820 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.612 UTC [msp] DeserializeIdentity -> DEBU 4821 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.613 UTC [gossip.gossip] handleMessage -> DEBU 4822 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.667 UTC [gossip.comm] func1 -> DEBU 4823 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.667 UTC [gossip.gossip] handleMessage -> DEBU 4824 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.668 UTC [gossip.pull] HandleMessage -> DEBU 4825 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.668 UTC [gossip.pull] SendDigest -> DEBU 4826 Sending BLOCK_MSG digest: [2 4 7 9 1 3 5 6 8] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:08.668 UTC [gossip.gossip] handleMessage -> DEBU 4827 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:08.836 UTC [gossip.comm] func1 -> DEBU 4828 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.836 UTC [gossip.gossip] handleMessage -> DEBU 4829 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:08.836 UTC [msp] DeserializeIdentity -> DEBU 482a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.836 UTC [msp] DeserializeIdentity -> DEBU 482b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.836 UTC [msp] DeserializeIdentity -> DEBU 482c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:08.836 UTC [gossip.gossip] handleMessage -> DEBU 482d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:09.051 UTC [gossip.comm] func1 -> DEBU 482e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:09.052 UTC [gossip.gossip] handleMessage -> DEBU 482f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:09.052 UTC [msp] DeserializeIdentity -> DEBU 4830 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:09.055 UTC [msp] DeserializeIdentity -> DEBU 4831 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:09.056 UTC [msp] DeserializeIdentity -> DEBU 4832 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:09.056 UTC [gossip.gossip] handleMessage -> DEBU 4833 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.772 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 4834 Sleeping 25s" +peer0.org1.example.com | "2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4835 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103B " +peer0.org1.example.com | "2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4836 Sign: digest: DEE35CD0CAB71E326DD0EABEFE06AC245736C23CC26BA69D22B38F01DC4E1D90 " +peer0.org1.example.com | "2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4837 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4838 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:10.810 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4839 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:18:10.816 UTC [msp] DeserializeIdentity -> DEBU 483a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.817 UTC [msp] DeserializeIdentity -> DEBU 483b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.817 UTC [gossip.comm] Send -> DEBU 483c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.817 UTC [msp] DeserializeIdentity -> DEBU 483d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.817 UTC [gossip.comm] sendToEndpoint -> DEBU 483e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.817 UTC [gossip.comm] sendToEndpoint -> DEBU 4840 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.817 UTC [gossip.comm] Send -> DEBU 483f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.818 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.818 UTC [gossip.comm] sendToEndpoint -> DEBU 4842 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.818 UTC [gossip.comm] sendToEndpoint -> DEBU 4843 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.834 UTC [gossip.comm] Send -> DEBU 4844 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.836 UTC [gossip.comm] sendToEndpoint -> DEBU 4845 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.836 UTC [gossip.comm] sendToEndpoint -> DEBU 4846 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.838 UTC [gossip.comm] func1 -> DEBU 4847 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.842 UTC [gossip.gossip] handleMessage -> DEBU 4848 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.842 UTC [gossip.gossip] handleMessage -> DEBU 4849 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.843 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 484b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.843 UTC [msp.identity] Verify -> DEBU 484c Verify: digest = 00000000 de e3 5c d0 ca b7 1e 32 6d d0 ea be fe 06 ac 24 |..\....2m......$| +peer0.org1.example.com | 00000010 57 36 c2 3c c2 6b a6 9d 22 b3 8f 01 dc 4e 1d 90 |W6.<.k.."....N..|" +peer0.org1.example.com | "2019-04-22 06:18:10.844 UTC [msp.identity] Verify -> DEBU 484d Verify: sig = 00000000 30 45 02 21 00 d7 3c d7 a8 a0 1c a9 62 de c4 c4 |0E.!..<.....b...| +peer0.org1.example.com | 00000010 e3 5a ff 74 be 17 c7 6a 50 1b 21 5b f7 c7 7b f5 |.Z.t...jP.![..{.| +peer0.org1.example.com | 00000020 ae 25 bd b4 f2 02 20 74 f7 8c 76 5d 9e 2e fe cf |.%.... t..v]....| +peer0.org1.example.com | 00000030 df 71 57 ff 7c c9 ea 95 f2 49 ca 75 d1 cd e3 72 |.qW.|....I.u...r| +peer0.org1.example.com | 00000040 90 98 2f f4 41 bd 37 |../.A.7|" +peer0.org1.example.com | "2019-04-22 06:18:10.844 UTC [gossip.discovery] isSentByMe -> DEBU 484e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.pull] Hello -> DEBU 4850 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] Send -> DEBU 4851 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.pull] Hello -> DEBU 4852 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] Send -> DEBU 4853 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.pull] Hello -> DEBU 4854 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] Send -> DEBU 4855 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4856 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4857 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4858 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4859 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 485a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 485b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.879 UTC [gossip.comm] func1 -> DEBU 485c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1921362074575652060 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.879 UTC [gossip.gossip] handleMessage -> DEBU 485d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1921362074575652060 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.879 UTC [gossip.pull] HandleMessage -> DEBU 485e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1921362074575652060 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.879 UTC [gossip.gossip] handleMessage -> DEBU 485f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.880 UTC [gossip.comm] func1 -> DEBU 4860 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3408879253475122900 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.880 UTC [gossip.gossip] handleMessage -> DEBU 4861 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3408879253475122900 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.880 UTC [gossip.pull] HandleMessage -> DEBU 4862 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3408879253475122900 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.880 UTC [gossip.gossip] handleMessage -> DEBU 4863 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.882 UTC [gossip.comm] func1 -> DEBU 4864 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3702341060551438682 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.882 UTC [gossip.gossip] handleMessage -> DEBU 4865 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3702341060551438682 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.882 UTC [gossip.pull] HandleMessage -> DEBU 4866 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3702341060551438682 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.882 UTC [gossip.gossip] handleMessage -> DEBU 4867 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 4868 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103C " +peer0.org1.example.com | "2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 4869 Sign: digest: 9B3AB46E7DD83DBA34978418BF4C28EECFA482AA295EB36F1D8853D4B08FFBDC " +peer0.org1.example.com | "2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 486a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 486b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:10.942 UTC [gossip.comm] Send -> DEBU 486c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [msp] DeserializeIdentity -> DEBU 486d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [gossip.comm] Send -> DEBU 486e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [gossip.comm] Send -> DEBU 4870 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4871 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4872 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4873 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4874 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4875 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4876 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.963 UTC [gossip.comm] func1 -> DEBU 4877 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.963 UTC [gossip.gossip] handleMessage -> DEBU 4878 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.963 UTC [gossip.gossip] handleMessage -> DEBU 4879 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.963 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.963 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 487b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.964 UTC [gossip.comm] func1 -> DEBU 487c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.964 UTC [gossip.gossip] handleMessage -> DEBU 487d Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.964 UTC [msp.identity] Verify -> DEBU 487e Verify: digest = 00000000 9b 3a b4 6e 7d d8 3d ba 34 97 84 18 bf 4c 28 ee |.:.n}.=.4....L(.| +peer0.org1.example.com | 00000010 cf a4 82 aa 29 5e b3 6f 1d 88 53 d4 b0 8f fb dc |....)^.o..S.....|" +peer0.org1.example.com | "2019-04-22 06:18:10.964 UTC [msp.identity] Verify -> DEBU 487f Verify: sig = 00000000 30 45 02 21 00 ef 93 01 3e f6 06 2e 0b 8f 47 ab |0E.!....>.....G.| +peer0.org1.example.com | 00000010 f2 e0 01 fc f9 37 ab cf 6e 6b 22 a7 6e aa cc 91 |.....7..nk".n...| +peer0.org1.example.com | 00000020 0b 63 20 7a fd 02 20 06 28 1f 7d 4b 21 d6 4b b3 |.c z.. .(.}K!.K.| +peer0.org1.example.com | 00000030 6e 71 84 25 0b f0 f3 26 c7 f3 e9 8c d7 16 3d 11 |nq.%...&......=.| +peer0.org1.example.com | 00000040 5e 2c cd 9c 6d ae 71 |^,..m.q|" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 4880 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [gossip.discovery] isSentByMe -> DEBU 4881 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 4882 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4883 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [msp] DeserializeIdentity -> DEBU 4884 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4885 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4886 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4887 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4888 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4889 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 488a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [cauthdsl] func1 -> DEBU 488b 0xc003c213f0 gate 1555913890966378900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488c 0xc003c213f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488d 0xc003c213f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488e 0xc003c213f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488f 0xc003c213f0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [cauthdsl] func1 -> DEBU 4890 0xc003c213f0 gate 1555913890966378900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4891 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4892 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [cauthdsl] func1 -> DEBU 4894 0xc003c21c30 gate 1555913890967025400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 4895 0xc003c21c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 4896 0xc003c21c30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 4897 0xc003c21c30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [msp.identity] Verify -> DEBU 4898 Verify: digest = 00000000 d2 ac 04 7c 81 1b 99 2b 43 f6 96 3c 35 32 27 b3 |...|...+C..<52'.| +peer0.org1.example.com | 00000010 e3 59 9d 9f b2 a2 ce 27 a1 55 83 87 cc 35 8c 23 |.Y.....'.U...5.#|" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [msp.identity] Verify -> DEBU 4899 Verify: sig = 00000000 30 45 02 21 00 82 30 03 be 61 4a 6f 1b d6 46 0d |0E.!..0..aJo..F.| +peer0.org1.example.com | 00000010 ec 09 5d ca 86 19 93 3f 48 8b bb 3d 9a de ea 7d |..]....?H..=...}| +peer0.org1.example.com | 00000020 d0 3a f2 c0 d0 02 20 36 69 6d 8d a4 e7 5a 56 5e |.:.... 6im...ZV^| +peer0.org1.example.com | 00000030 23 6d cd 69 49 df 90 35 f9 89 18 23 08 9b 9e c6 |#m.iI..5...#....| +peer0.org1.example.com | 00000040 96 7e b7 50 c6 64 ee |.~.P.d.|" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 489a 0xc003c21c30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:10.967 UTC [cauthdsl] func1 -> DEBU 489b 0xc003c21c30 gate 1555913890967025400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.975 UTC [gossip.comm] func1 -> DEBU 48a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48a3 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.975 UTC [msp.identity] Verify -> DEBU 48a4 Verify: digest = 00000000 83 a2 05 c2 ad 79 97 67 08 0e ce 6c 53 3c b9 e4 |.....y.g...lS<..| +peer0.org1.example.com | 00000010 e3 b1 36 f6 48 23 16 bb 82 b2 1a ed 2e ac 00 e2 |..6.H#..........|" +peer0.org1.example.com | "2019-04-22 06:18:10.975 UTC [msp.identity] Verify -> DEBU 48a5 Verify: sig = 00000000 30 44 02 20 21 b8 9a 2d 93 d6 10 cd a2 04 1c 2f |0D. !..-......./| +peer0.org1.example.com | 00000010 e2 e9 f0 b5 b8 52 58 b4 a9 a5 17 a4 25 50 1e ac |.....RX.....%P..| +peer0.org1.example.com | 00000020 da 46 37 6f 02 20 0d 78 7c 81 51 90 0d a7 5b 23 |.F7o. .x|.Q...[#| +peer0.org1.example.com | 00000030 9a 6c 2b 97 20 79 88 80 bd 2d 4b 00 ee e0 e1 0c |.l+. y...-K.....| +peer0.org1.example.com | 00000040 46 18 c9 cd 07 21 |F....!|" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a7 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48a8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48a9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48aa Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [msp] DeserializeIdentity -> DEBU 48ab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [gossip.gossip] handleMessage -> DEBU 48ac Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [gossip.gossip] handleMessage -> DEBU 48ad Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48ae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48af Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48b0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [policies] Evaluate -> DEBU 48b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [policies] Evaluate -> DEBU 48b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [policies] Evaluate -> DEBU 48b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [cauthdsl] func1 -> DEBU 48b4 0xc00417a310 gate 1555913890976784600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b5 0xc00417a310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b6 0xc00417a310 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b7 0xc00417a310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b8 0xc00417a310 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:10.976 UTC [cauthdsl] func1 -> DEBU 48b9 0xc00417a310 gate 1555913890976784600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48ba Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [cauthdsl] func1 -> DEBU 48bd 0xc00417ab50 gate 1555913890977131400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48be 0xc00417ab50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48bf 0xc00417ab50 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48c0 0xc00417ab50 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [msp.identity] Verify -> DEBU 48c1 Verify: digest = 00000000 0f 4e 3e 6b b8 91 4d 79 ee 12 6e e1 8f c3 60 d4 |.N>k..My..n...`.| +peer0.org1.example.com | 00000010 31 df 29 94 6f 73 23 ee 93 12 30 ad 44 4b eb 88 |1.).os#...0.DK..|" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [msp.identity] Verify -> DEBU 48c2 Verify: sig = 00000000 30 45 02 21 00 8f 7c 0f ab 39 31 55 1e d6 84 1e |0E.!..|..91U....| +peer0.org1.example.com | 00000010 c2 09 9d f9 2a 99 2f c3 30 90 8f c6 9b d3 4c 9d |....*./.0.....L.| +peer0.org1.example.com | 00000020 ae b6 b7 3e f2 02 20 11 78 c6 16 af b2 04 a8 4b |...>.. .x......K| +peer0.org1.example.com | 00000030 19 fc f4 91 cd 3c 7b e8 ae f4 9e 69 17 3b b9 17 |.....<{....i.;..| +peer0.org1.example.com | 00000040 15 fd 2a 71 7e ee bf |..*q~..|" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48c3 0xc00417ab50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [cauthdsl] func1 -> DEBU 48c4 0xc00417ab50 gate 1555913890977131400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 48c9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 48ca Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48cb Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.977 UTC [msp.identity] Verify -> DEBU 48cc Verify: digest = 00000000 83 a2 05 c2 ad 79 97 67 08 0e ce 6c 53 3c b9 e4 |.....y.g...lS<..| +peer0.org1.example.com | 00000010 e3 b1 36 f6 48 23 16 bb 82 b2 1a ed 2e ac 00 e2 |..6.H#..........|" +peer0.org1.example.com | "2019-04-22 06:18:10.978 UTC [msp.identity] Verify -> DEBU 48cd Verify: sig = 00000000 30 44 02 20 21 b8 9a 2d 93 d6 10 cd a2 04 1c 2f |0D. !..-......./| +peer0.org1.example.com | 00000010 e2 e9 f0 b5 b8 52 58 b4 a9 a5 17 a4 25 50 1e ac |.....RX.....%P..| +peer0.org1.example.com | 00000020 da 46 37 6f 02 20 0d 78 7c 81 51 90 0d a7 5b 23 |.F7o. .x|.Q...[#| +peer0.org1.example.com | 00000030 9a 6c 2b 97 20 79 88 80 bd 2d 4b 00 ee e0 e1 0c |.l+. y...-K.....| +peer0.org1.example.com | 00000040 46 18 c9 cd 07 21 |F....!|" +peer0.org1.example.com | "2019-04-22 06:18:10.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 48ce Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 48cf Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.978 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48d0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.984 UTC [msp.identity] Verify -> DEBU 48d1 Verify: digest = 00000000 9b 3a b4 6e 7d d8 3d ba 34 97 84 18 bf 4c 28 ee |.:.n}.=.4....L(.| +peer0.org1.example.com | 00000010 cf a4 82 aa 29 5e b3 6f 1d 88 53 d4 b0 8f fb dc |....)^.o..S.....|" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [msp.identity] Verify -> DEBU 48d2 Verify: sig = 00000000 30 45 02 21 00 ef 93 01 3e f6 06 2e 0b 8f 47 ab |0E.!....>.....G.| +peer0.org1.example.com | 00000010 f2 e0 01 fc f9 37 ab cf 6e 6b 22 a7 6e aa cc 91 |.....7..nk".n...| +peer0.org1.example.com | 00000020 0b 63 20 7a fd 02 20 06 28 1f 7d 4b 21 d6 4b b3 |.c z.. .(.}K!.K.| +peer0.org1.example.com | 00000030 6e 71 84 25 0b f0 f3 26 c7 f3 e9 8c d7 16 3d 11 |nq.%...&......=.| +peer0.org1.example.com | 00000040 5e 2c cd 9c 6d ae 71 |^,..m.q|" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [gossip.discovery] handleAliveMessage -> DEBU 48d3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [gossip.discovery] isSentByMe -> DEBU 48d4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [gossip.discovery] handleAliveMessage -> DEBU 48d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48d6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [gossip.gossip] handleMessage -> DEBU 48d8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.985 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48d9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:10.986 UTC [msp.identity] Verify -> DEBU 48da Verify: digest = 00000000 9b 3a b4 6e 7d d8 3d ba 34 97 84 18 bf 4c 28 ee |.:.n}.=.4....L(.| +peer0.org1.example.com | 00000010 cf a4 82 aa 29 5e b3 6f 1d 88 53 d4 b0 8f fb dc |....)^.o..S.....|" +peer0.org1.example.com | "2019-04-22 06:18:10.986 UTC [msp.identity] Verify -> DEBU 48db Verify: sig = 00000000 30 45 02 21 00 ef 93 01 3e f6 06 2e 0b 8f 47 ab |0E.!....>.....G.| +peer0.org1.example.com | 00000010 f2 e0 01 fc f9 37 ab cf 6e 6b 22 a7 6e aa cc 91 |.....7..nk".n...| +peer0.org1.example.com | 00000020 0b 63 20 7a fd 02 20 06 28 1f 7d 4b 21 d6 4b b3 |.c z.. .(.}K!.K.| +peer0.org1.example.com | 00000030 6e 71 84 25 0b f0 f3 26 c7 f3 e9 8c d7 16 3d 11 |nq.%...&......=.| +peer0.org1.example.com | 00000040 5e 2c cd 9c 6d ae 71 |^,..m.q|" +peer0.org1.example.com | "2019-04-22 06:18:10.987 UTC [msp.identity] Verify -> DEBU 48dc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:18:10.987 UTC [msp.identity] Verify -> DEBU 48dd Verify: sig = 00000000 30 44 02 20 69 b6 ba 71 3d 3b e2 01 25 ac 0e 5f |0D. i..q=;..%.._| +peer0.org1.example.com | 00000010 d1 9c a1 3d 9f 99 76 8a 9f a9 ca cc d7 4b 46 d6 |...=..v......KF.| +peer0.org1.example.com | 00000020 fa a1 2f 87 02 20 1d 2a 8c 7d 0b f6 33 ad 72 e2 |../.. .*.}..3.r.| +peer0.org1.example.com | 00000030 0f 9e ec ec b8 7a 22 d7 68 28 d2 84 e8 6b b8 81 |.....z".h(...k..| +peer0.org1.example.com | 00000040 43 dd 16 51 88 0c |C..Q..|" +peer0.org1.example.com | "2019-04-22 06:18:10.987 UTC [gossip.discovery] handleAliveMessage -> DEBU 48de Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.988 UTC [gossip.discovery] isSentByMe -> DEBU 48df Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:10.988 UTC [gossip.discovery] handleAliveMessage -> DEBU 48e0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:10.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.102 UTC [gossip.comm] func1 -> DEBU 48e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.102 UTC [gossip.gossip] handleMessage -> DEBU 48e3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.102 UTC [gossip.gossip] handleMessage -> DEBU 48e4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.102 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48e6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48e7 Verify: digest = 00000000 96 7b f5 dd d0 14 af 47 0f b8 7f a3 f8 49 f7 3e |.{.....G.....I.>| +peer0.org1.example.com | 00000010 0b 5f 31 b8 79 5f 83 c6 61 a5 b6 b2 9a 94 43 2c |._1.y_..a.....C,|" +peer0.org1.example.com | "2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48e8 Verify: sig = 00000000 30 44 02 20 5b e1 37 87 b2 b9 8c 2c 1d 0e c6 ea |0D. [.7....,....| +peer0.org1.example.com | 00000010 6e ae 20 cd dd 86 40 bd 30 2d 1b 19 f5 11 14 50 |n. ...@.0-.....P| +peer0.org1.example.com | 00000020 bc d2 72 3e 02 20 17 94 6b 68 9a 91 e8 cc 2e c5 |..r>. ..kh......| +peer0.org1.example.com | 00000030 f9 0e ae 15 83 da 7d 2f 5c dd 1b 8c 1c f2 09 70 |......}/\......p| +peer0.org1.example.com | 00000040 bf 12 fc 2b 35 94 |...+5.|" +peer0.org1.example.com | "2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48e9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48ea Verify: sig = 00000000 30 45 02 21 00 84 ca 67 f7 b9 e5 f3 96 8f 60 f0 |0E.!...g......`.| +peer0.org1.example.com | 00000010 77 34 f1 14 a7 6a 5f 72 76 3b 0c e0 0e ce 07 c8 |w4...j_rv;......| +peer0.org1.example.com | 00000020 05 46 62 4a 34 02 20 5a ce d1 9c 5e 72 0a 69 53 |.FbJ4. Z...^r.iS| +peer0.org1.example.com | 00000030 4f c0 da 47 71 2a 52 56 1c 4c 31 32 1e ea df ff |O..Gq*RV.L12....| +peer0.org1.example.com | 00000040 4d ab 47 19 cc 99 94 |M.G....|" +peer0.org1.example.com | "2019-04-22 06:18:11.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 48eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ec Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:11.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ed updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 " +peer0.org1.example.com | "2019-04-22 06:18:11.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ee Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 " +peer0.org1.example.com | "2019-04-22 06:18:11.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ef Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:11.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 48f0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 48f1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48f2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.112 UTC [msp] DeserializeIdentity -> DEBU 48f3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.113 UTC [msp] DeserializeIdentity -> DEBU 48f4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.113 UTC [msp] DeserializeIdentity -> DEBU 48f5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.114 UTC [gossip.comm] Send -> DEBU 48f6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:11.114 UTC [msp] DeserializeIdentity -> DEBU 48f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.114 UTC [gossip.comm] Send -> DEBU 48f8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48f9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48fa Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48fc Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.comm] func1 -> DEBU 48fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 48fe Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.pull] HandleMessage -> DEBU 48ff GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.pull] SendDigest -> DEBU 4900 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 4901 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.comm] func1 -> DEBU 4902 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 4903 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 4904 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4905 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4906 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.124 UTC [gossip.comm] func1 -> DEBU 4907 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.124 UTC [gossip.gossip] handleMessage -> DEBU 4908 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.125 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4909 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.125 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.125 UTC [gossip.gossip] handleMessage -> DEBU 490b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.189 UTC [gossip.comm] func1 -> DEBU 490c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.189 UTC [gossip.gossip] handleMessage -> DEBU 490d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.189 UTC [gossip.gossip] handleMessage -> DEBU 490e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4910 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4911 Verify: digest = 00000000 1a 40 26 b7 04 2c 3b ba 13 22 90 0b 8a b3 d5 55 |.@&..,;..".....U| +peer0.org1.example.com | 00000010 f3 83 90 5b 6f 55 da 7a 2f 80 4f c6 c9 09 ce 84 |...[oU.z/.O.....|" +peer0.org1.example.com | "2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4912 Verify: sig = 00000000 30 45 02 21 00 88 d0 6a f4 07 31 82 f2 87 ab 2d |0E.!...j..1....-| +peer0.org1.example.com | 00000010 69 50 d2 8d 31 65 4d 30 db 6d 5e e4 b3 f1 34 ad |iP..1eM0.m^...4.| +peer0.org1.example.com | 00000020 1f a4 36 c2 d0 02 20 06 c8 e2 2c 9b a0 e9 bc fc |..6... ...,.....| +peer0.org1.example.com | 00000030 db fa 5c 50 d4 07 3b ec a6 07 4f 1c 2d ef d8 41 |..\P..;...O.-..A| +peer0.org1.example.com | 00000040 20 50 6d 44 e5 c6 73 | PmD..s|" +peer0.org1.example.com | "2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4913 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4914 Verify: sig = 00000000 30 44 02 20 34 30 2a 73 96 b9 08 a0 f9 12 93 26 |0D. 40*s.......&| +peer0.org1.example.com | 00000010 38 d8 03 fc d8 f0 c9 6a 79 ee 98 bd 43 09 b1 5a |8......jy...C..Z| +peer0.org1.example.com | 00000020 f4 73 b9 1e 02 20 22 b6 e6 d5 cb cc 47 56 c4 95 |.s... ".....GV..| +peer0.org1.example.com | 00000030 b9 42 63 f1 ec 9b f4 cd f4 1a 1d 54 5d 06 36 68 |.Bc........T].6h| +peer0.org1.example.com | 00000040 12 ed 8c d1 66 d8 |....f.|" +peer0.org1.example.com | "2019-04-22 06:18:11.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 4915 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 4916 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:11.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 4917 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 " +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 4918 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 " +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 4919 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 491a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 491b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 491c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.discovery] sendMemResponse -> DEBU 491d Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [msp] DeserializeIdentity -> DEBU 491e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [msp] DeserializeIdentity -> DEBU 491f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.comm] Send -> DEBU 4920 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.discovery] sendMemResponse -> DEBU 4921 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.comm] sendToEndpoint -> DEBU 4922 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.191 UTC [gossip.comm] sendToEndpoint -> DEBU 4923 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.440 UTC [gossip.election] waitForInterrupt -> DEBU 4924 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.440 UTC [gossip.election] IsLeader -> DEBU 4925 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:18:11.440 UTC [msp.identity] Sign -> DEBU 4926 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510131801 " +peer0.org1.example.com | "2019-04-22 06:18:11.440 UTC [msp.identity] Sign -> DEBU 4927 Sign: digest: EC90BBC7D8D11F94DD18BFFB944918CDA41F7AD4C45FD422B5ECD20F29539F85 " +peer0.org1.example.com | "2019-04-22 06:18:11.440 UTC [gossip.election] waitForInterrupt -> DEBU 4928 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:18:11.448 UTC [msp] DeserializeIdentity -> DEBU 4929 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.449 UTC [msp] DeserializeIdentity -> DEBU 492a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.450 UTC [msp] DeserializeIdentity -> DEBU 492b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.450 UTC [msp] DeserializeIdentity -> DEBU 492c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.450 UTC [gossip.comm] Send -> DEBU 492d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:11.451 UTC [msp] DeserializeIdentity -> DEBU 492e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.451 UTC [msp] DeserializeIdentity -> DEBU 492f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.451 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.451 UTC [gossip.comm] sendToEndpoint -> DEBU 4931 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.577 UTC [gossip.comm] func1 -> DEBU 4932 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.580 UTC [gossip.gossip] handleMessage -> DEBU 4933 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.580 UTC [gossip.gossip] handleMessage -> DEBU 4934 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.581 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4935 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4936 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:11.582 UTC [msp] DeserializeIdentity -> DEBU 4937 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.582 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:11.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4939 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:11.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 493a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:11.583 UTC [policies] Evaluate -> DEBU 493b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.584 UTC [policies] Evaluate -> DEBU 493c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:11.584 UTC [policies] Evaluate -> DEBU 493d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.585 UTC [cauthdsl] func1 -> DEBU 493e 0xc003c6f140 gate 1555913891585441400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:11.585 UTC [cauthdsl] func2 -> DEBU 493f 0xc003c6f140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:11.586 UTC [cauthdsl] func2 -> DEBU 4940 0xc003c6f140 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:11.586 UTC [cauthdsl] func2 -> DEBU 4941 0xc003c6f140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:11.586 UTC [cauthdsl] func2 -> DEBU 4942 0xc003c6f140 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:11.587 UTC [cauthdsl] func1 -> DEBU 4943 0xc003c6f140 gate 1555913891585441400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:11.587 UTC [policies] Evaluate -> DEBU 4944 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.588 UTC [policies] Evaluate -> DEBU 4945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.588 UTC [policies] Evaluate -> DEBU 4946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.589 UTC [cauthdsl] func1 -> DEBU 4947 0xc003c6f980 gate 1555913891589466400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:11.590 UTC [cauthdsl] func2 -> DEBU 4948 0xc003c6f980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:11.590 UTC [cauthdsl] func2 -> DEBU 4949 0xc003c6f980 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:11.591 UTC [cauthdsl] func2 -> DEBU 494a 0xc003c6f980 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:11.592 UTC [msp.identity] Verify -> DEBU 494b Verify: digest = 00000000 94 5b ec 34 be 88 28 c5 67 70 b6 bd f4 0a 61 65 |.[.4..(.gp....ae| +peer0.org1.example.com | 00000010 2f 3a c9 d4 f4 00 14 c8 2f 97 63 0b 85 c7 48 75 |/:....../.c...Hu|" +peer0.org1.example.com | "2019-04-22 06:18:11.592 UTC [msp.identity] Verify -> DEBU 494c Verify: sig = 00000000 30 45 02 21 00 9f 72 44 ae b7 71 4a cf e0 2b 5f |0E.!..rD..qJ..+_| +peer0.org1.example.com | 00000010 bc 5e d3 16 b9 47 72 b0 ca 0f 76 a3 f2 85 2f b0 |.^...Gr...v.../.| +peer0.org1.example.com | 00000020 18 1c 3a 8f c7 02 20 3e 92 e7 c8 f8 14 03 b1 c8 |..:... >........| +peer0.org1.example.com | 00000030 15 03 39 92 a4 5d 5c 7a a8 51 62 8f 49 6a d2 48 |..9..]\z.Qb.Ij.H| +peer0.org1.example.com | 00000040 df e1 69 20 86 60 d8 |..i .`.|" +peer0.org1.example.com | "2019-04-22 06:18:11.593 UTC [cauthdsl] func2 -> DEBU 494d 0xc003c6f980 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:11.594 UTC [cauthdsl] func1 -> DEBU 494e 0xc003c6f980 gate 1555913891589466400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 494f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 4950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 4951 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 4952 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] handleAliveMessage -> DEBU 4953 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4954 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4955 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 " +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4956 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 " +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4957 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4958 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] handleAliveMessage -> DEBU 4959 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [msp] DeserializeIdentity -> DEBU 495b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [msp] DeserializeIdentity -> DEBU 495c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.595 UTC [msp] DeserializeIdentity -> DEBU 495d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 495e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 495f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 4960 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [gossip.comm] Send -> DEBU 4961 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 4962 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 4963 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [gossip.comm] Send -> DEBU 4964 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [gossip.comm] sendToEndpoint -> DEBU 4965 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.596 UTC [gossip.comm] sendToEndpoint -> DEBU 4966 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.597 UTC [gossip.comm] sendToEndpoint -> DEBU 4967 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.597 UTC [gossip.comm] sendToEndpoint -> DEBU 4968 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.597 UTC [gossip.comm] func1 -> DEBU 4969 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.597 UTC [gossip.gossip] handleMessage -> DEBU 496a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.gossip] handleMessage -> DEBU 496b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 496c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 496d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.comm] func1 -> DEBU 496e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.gossip] handleMessage -> DEBU 496f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.gossip] handleMessage -> DEBU 4970 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4971 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4972 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.620 UTC [gossip.comm] func1 -> DEBU 4973 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.620 UTC [gossip.gossip] handleMessage -> DEBU 4974 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.620 UTC [gossip.pull] HandleMessage -> DEBU 4975 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.620 UTC [msp] DeserializeIdentity -> DEBU 4976 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.622 UTC [msp] DeserializeIdentity -> DEBU 4977 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.622 UTC [msp] DeserializeIdentity -> DEBU 4978 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.622 UTC [msp] DeserializeIdentity -> DEBU 4979 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.623 UTC [msp] DeserializeIdentity -> DEBU 497a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.623 UTC [msp] DeserializeIdentity -> DEBU 497b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.624 UTC [gossip.pull] SendDigest -> DEBU 497c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:11.625 UTC [gossip.gossip] handleMessage -> DEBU 497d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.651 UTC [gossip.comm] func1 -> DEBU 497e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.652 UTC [gossip.gossip] handleMessage -> DEBU 497f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.652 UTC [gossip.gossip] handleMessage -> DEBU 4980 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4981 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.652 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4982 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:11.652 UTC [msp] DeserializeIdentity -> DEBU 4983 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4984 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4985 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4986 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:11.653 UTC [policies] Evaluate -> DEBU 4987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.653 UTC [policies] Evaluate -> DEBU 4988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:11.654 UTC [policies] Evaluate -> DEBU 4989 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.654 UTC [cauthdsl] func1 -> DEBU 498a 0xc003586930 gate 1555913891654219500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:11.654 UTC [cauthdsl] func2 -> DEBU 498b 0xc003586930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:11.654 UTC [cauthdsl] func2 -> DEBU 498c 0xc003586930 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:11.654 UTC [cauthdsl] func2 -> DEBU 498d 0xc003586930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:11.656 UTC [cauthdsl] func2 -> DEBU 498e 0xc003586930 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:11.656 UTC [cauthdsl] func1 -> DEBU 498f 0xc003586930 gate 1555913891654219500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:11.656 UTC [policies] Evaluate -> DEBU 4990 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.657 UTC [policies] Evaluate -> DEBU 4991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.657 UTC [policies] Evaluate -> DEBU 4992 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.658 UTC [cauthdsl] func1 -> DEBU 4993 0xc003587170 gate 1555913891658661900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:11.659 UTC [cauthdsl] func2 -> DEBU 4994 0xc003587170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:11.659 UTC [cauthdsl] func2 -> DEBU 4995 0xc003587170 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:11.661 UTC [cauthdsl] func2 -> DEBU 4996 0xc003587170 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:11.661 UTC [msp.identity] Verify -> DEBU 4997 Verify: digest = 00000000 4a 0c 64 7f 73 2e 71 9b 2b 17 55 08 0b 47 42 f3 |J.d.s.q.+.U..GB.| +peer0.org1.example.com | 00000010 76 6a e0 96 17 ac 0a 8e fa 33 c4 54 78 f6 0f b3 |vj.......3.Tx...|" +peer0.org1.example.com | "2019-04-22 06:18:11.662 UTC [msp.identity] Verify -> DEBU 4998 Verify: sig = 00000000 30 45 02 21 00 b2 f1 2f c7 01 38 fc 90 e2 82 3b |0E.!.../..8....;| +peer0.org1.example.com | 00000010 c6 f1 a1 29 16 2a 59 dd b4 78 38 8d 69 01 fb 2e |...).*Y..x8.i...| +peer0.org1.example.com | 00000020 53 06 ff d4 86 02 20 2b ec 12 04 dd 4c 96 22 46 |S..... +....L."F| +peer0.org1.example.com | 00000030 dd a6 6e b0 a0 ab 5c d8 3a 07 be 3d 9f ae fc d1 |..n...\.:..=....| +peer0.org1.example.com | 00000040 bf e4 90 0d 2b d3 59 |....+.Y|" +peer0.org1.example.com | "2019-04-22 06:18:11.666 UTC [cauthdsl] func2 -> DEBU 4999 0xc003587170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:11.666 UTC [cauthdsl] func1 -> DEBU 499a 0xc003587170 gate 1555913891658661900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:11.667 UTC [policies] Evaluate -> DEBU 499b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.667 UTC [policies] Evaluate -> DEBU 499c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [policies] Evaluate -> DEBU 499d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [policies] Evaluate -> DEBU 499e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 499f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 " +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 " +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 49a5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [gossip.discovery] sendMemResponse -> DEBU 49a7 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:11.670 UTC [msp] DeserializeIdentity -> DEBU 49a8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.671 UTC [msp] DeserializeIdentity -> DEBU 49a9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.671 UTC [msp] DeserializeIdentity -> DEBU 49aa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.671 UTC [gossip.comm] Send -> DEBU 49ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:11.671 UTC [gossip.comm] sendToEndpoint -> DEBU 49ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.671 UTC [gossip.comm] sendToEndpoint -> DEBU 49ad Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.671 UTC [gossip.discovery] sendMemResponse -> DEBU 49ae Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:11.996 UTC [gossip.comm] func1 -> DEBU 49af Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.996 UTC [gossip.gossip] handleMessage -> DEBU 49b0 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.996 UTC [gossip.gossip] handleMessage -> DEBU 49b1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49b3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [msp] DeserializeIdentity -> DEBU 49b4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func1 -> DEBU 49bb 0xc003e52ab0 gate 1555913891997393000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49bc 0xc003e52ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49bd 0xc003e52ab0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49be 0xc003e52ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49bf 0xc003e52ab0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func1 -> DEBU 49c0 0xc003e52ab0 gate 1555913891997393000 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func1 -> DEBU 49c4 0xc003e532f0 gate 1555913891997724700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49c5 0xc003e532f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49c6 0xc003e532f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49c7 0xc003e532f0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:11.997 UTC [msp.identity] Verify -> DEBU 49c8 Verify: digest = 00000000 09 7b b5 a1 07 ba 00 a3 27 cc fd 0e 0a 42 4e c2 |.{......'....BN.| +peer0.org1.example.com | 00000010 36 77 b6 e4 93 80 99 c5 5e e4 c3 83 72 71 3f 4c |6w......^...rq?L|" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [msp.identity] Verify -> DEBU 49c9 Verify: sig = 00000000 30 45 02 21 00 9e 9c d3 75 ee 8d 4b f4 74 67 b0 |0E.!....u..K.tg.| +peer0.org1.example.com | 00000010 a8 15 25 7e a5 1c 96 f5 00 80 e2 7a a2 f6 30 5b |..%~.......z..0[| +peer0.org1.example.com | 00000020 34 70 d5 20 2e 02 20 33 bc 7e 2a 6b ec 31 60 7f |4p. .. 3.~*k.1`.| +peer0.org1.example.com | 00000030 fb 9b 98 7c 60 55 f9 84 26 41 dd 05 bb 86 c3 7b |...|`U..&A.....{| +peer0.org1.example.com | 00000040 6c 35 7b 41 96 ed aa |l5{A...|" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [cauthdsl] func2 -> DEBU 49ca 0xc003e532f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [cauthdsl] func1 -> DEBU 49cb 0xc003e532f0 gate 1555913891997724700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49ce Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 49d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 " +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 " +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 49d6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:11.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49d7 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.000 UTC [gossip.comm] func1 -> DEBU 49d8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.000 UTC [gossip.gossip] handleMessage -> DEBU 49d9 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.001 UTC [gossip.pull] HandleMessage -> DEBU 49da GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49db Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49dc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49dd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49de Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.002 UTC [msp] DeserializeIdentity -> DEBU 49df Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.002 UTC [msp] DeserializeIdentity -> DEBU 49e0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.002 UTC [gossip.pull] SendDigest -> DEBU 49e1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:12.002 UTC [gossip.gossip] handleMessage -> DEBU 49e2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.004 UTC [gossip.comm] func1 -> DEBU 49e3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.005 UTC [gossip.gossip] handleMessage -> DEBU 49e4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.005 UTC [gossip.gossip] handleMessage -> DEBU 49e5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49e6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49e7 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.008 UTC [msp] DeserializeIdentity -> DEBU 49e8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.008 UTC [msp] DeserializeIdentity -> DEBU 49e9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.009 UTC [msp] DeserializeIdentity -> DEBU 49ea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.009 UTC [msp] DeserializeIdentity -> DEBU 49eb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.010 UTC [msp] DeserializeIdentity -> DEBU 49ec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.010 UTC [msp] DeserializeIdentity -> DEBU 49ed Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.010 UTC [msp] DeserializeIdentity -> DEBU 49ee Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.011 UTC [gossip.comm] Send -> DEBU 49ef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:12.011 UTC [msp] DeserializeIdentity -> DEBU 49f0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.011 UTC [gossip.comm] Send -> DEBU 49f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:12.012 UTC [gossip.comm] sendToEndpoint -> DEBU 49f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.012 UTC [gossip.comm] sendToEndpoint -> DEBU 49f3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.012 UTC [gossip.comm] sendToEndpoint -> DEBU 49f4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.013 UTC [gossip.comm] sendToEndpoint -> DEBU 49f5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.015 UTC [gossip.comm] func1 -> DEBU 49f6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.015 UTC [gossip.gossip] handleMessage -> DEBU 49f7 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.016 UTC [gossip.gossip] handleMessage -> DEBU 49f8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.016 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.017 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49fa Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:12.017 UTC [msp] DeserializeIdentity -> DEBU 49fb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.018 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:12.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49fd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49fe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.023 UTC [policies] Evaluate -> DEBU 49ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.023 UTC [policies] Evaluate -> DEBU 4a00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:12.023 UTC [policies] Evaluate -> DEBU 4a01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.024 UTC [cauthdsl] func1 -> DEBU 4a02 0xc0027f0b60 gate 1555913892023806400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.024 UTC [cauthdsl] func2 -> DEBU 4a03 0xc0027f0b60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.024 UTC [cauthdsl] func2 -> DEBU 4a04 0xc0027f0b60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.025 UTC [cauthdsl] func2 -> DEBU 4a05 0xc0027f0b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:12.025 UTC [cauthdsl] func2 -> DEBU 4a06 0xc0027f0b60 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.025 UTC [cauthdsl] func1 -> DEBU 4a07 0xc0027f0b60 gate 1555913892023806400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.029 UTC [policies] Evaluate -> DEBU 4a08 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.029 UTC [policies] Evaluate -> DEBU 4a09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.029 UTC [policies] Evaluate -> DEBU 4a0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.029 UTC [cauthdsl] func1 -> DEBU 4a0b 0xc0027f13a0 gate 1555913892029612800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.029 UTC [cauthdsl] func2 -> DEBU 4a0c 0xc0027f13a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.030 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc0027f13a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.030 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc0027f13a0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.030 UTC [msp.identity] Verify -> DEBU 4a0f Verify: digest = 00000000 67 1e b8 9b 6f 31 3e cf 99 d8 9a c5 b3 81 87 98 |g...o1>.........| +peer0.org1.example.com | 00000010 9c c5 2c 2f 8e 8e 0a 7a cf b3 01 d9 21 c2 74 ab |..,/...z....!.t.|" +peer0.org1.example.com | "2019-04-22 06:18:12.030 UTC [msp.identity] Verify -> DEBU 4a10 Verify: sig = 00000000 30 45 02 21 00 a5 3c 43 11 ba dd dd a8 0d a9 2d |0E.!.. DEBU 4a11 0xc0027f13a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.031 UTC [cauthdsl] func1 -> DEBU 4a12 0xc0027f13a0 gate 1555913892029612800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:12.031 UTC [policies] Evaluate -> DEBU 4a13 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.031 UTC [policies] Evaluate -> DEBU 4a14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.032 UTC [policies] Evaluate -> DEBU 4a15 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.032 UTC [policies] Evaluate -> DEBU 4a16 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a17 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a18 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a19 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 " +peer0.org1.example.com | "2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a1a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 " +peer0.org1.example.com | "2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a1b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:12.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a1c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.033 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a1d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.033 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a1e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.033 UTC [gossip.discovery] sendMemResponse -> DEBU 4a1f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:12.033 UTC [msp] DeserializeIdentity -> DEBU 4a20 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.033 UTC [msp] DeserializeIdentity -> DEBU 4a21 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.033 UTC [msp] DeserializeIdentity -> DEBU 4a22 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.034 UTC [gossip.comm] Send -> DEBU 4a23 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:12.034 UTC [gossip.discovery] sendMemResponse -> DEBU 4a24 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:12.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4a25 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4a26 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.047 UTC [gossip.comm] func1 -> DEBU 4a27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.048 UTC [gossip.gossip] handleMessage -> DEBU 4a28 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.049 UTC [gossip.gossip] handleMessage -> DEBU 4a29 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.049 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a2a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.050 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a2b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.353 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [msp] DeserializeIdentity -> DEBU 4a2d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [gossip.comm] Send -> DEBU 4a2e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a31 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a32 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a34 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [gossip.comm] func1 -> DEBU 4a35 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [gossip.gossip] handleMessage -> DEBU 4a36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [msp] DeserializeIdentity -> DEBU 4a37 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [msp] DeserializeIdentity -> DEBU 4a38 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [msp] DeserializeIdentity -> DEBU 4a39 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a3b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.357 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a3c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [cauthdsl] func1 -> DEBU 4a40 0xc00279fbf0 gate 1555913892358236700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a41 0xc00279fbf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a42 0xc00279fbf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a43 0xc00279fbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a44 0xc00279fbf0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [cauthdsl] func1 -> DEBU 4a45 0xc00279fbf0 gate 1555913892358236700 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a46 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [cauthdsl] func1 -> DEBU 4a49 0xc0037ec430 gate 1555913892359268100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4a 0xc0037ec430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4b 0xc0037ec430 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4c 0xc0037ec430 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [msp.identity] Verify -> DEBU 4a4d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [msp.identity] Verify -> DEBU 4a4e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4f 0xc0037ec430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [cauthdsl] func1 -> DEBU 4a50 0xc0037ec430 gate 1555913892359268100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a53 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.360 UTC [policies] Evaluate -> DEBU 4a54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a55 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a56 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a57 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a58 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:12.360 UTC [msp] DeserializeIdentity -> DEBU 4a59 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [msp] DeserializeIdentity -> DEBU 4a5a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a5b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a5c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a5d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a60 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [cauthdsl] func1 -> DEBU 4a61 0xc003ad8a40 gate 1555913892361666100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a62 0xc003ad8a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a63 0xc003ad8a40 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a64 0xc003ad8a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a65 0xc003ad8a40 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [cauthdsl] func1 -> DEBU 4a66 0xc003ad8a40 gate 1555913892361666100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a67 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [cauthdsl] func1 -> DEBU 4a6a 0xc003ad9280 gate 1555913892362026000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a6b 0xc003ad9280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a6c 0xc003ad9280 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a6d 0xc003ad9280 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [msp.identity] Verify -> DEBU 4a6e Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [msp.identity] Verify -> DEBU 4a6f Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [gossip.comm] func1 -> DEBU 4a70 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a71 0xc003ad9280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.363 UTC [cauthdsl] func1 -> DEBU 4a72 0xc003ad9280 gate 1555913892362026000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a75 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [gossip.gossip] handleMessage -> DEBU 4a77 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [gossip.gossip] handleMessage -> DEBU 4a78 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [msp] DeserializeIdentity -> DEBU 4a79 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [msp] DeserializeIdentity -> DEBU 4a7a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [msp] DeserializeIdentity -> DEBU 4a7b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a7d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a7e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [policies] Evaluate -> DEBU 4a7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [policies] Evaluate -> DEBU 4a80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [policies] Evaluate -> DEBU 4a81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [cauthdsl] func1 -> DEBU 4a82 0xc003af0d90 gate 1555913892364876100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.364 UTC [cauthdsl] func2 -> DEBU 4a83 0xc003af0d90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [cauthdsl] func2 -> DEBU 4a84 0xc003af0d90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [cauthdsl] func2 -> DEBU 4a85 0xc003af0d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [cauthdsl] func2 -> DEBU 4a86 0xc003af0d90 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [cauthdsl] func1 -> DEBU 4a87 0xc003af0d90 gate 1555913892364876100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [policies] Evaluate -> DEBU 4a88 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [policies] Evaluate -> DEBU 4a89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [policies] Evaluate -> DEBU 4a8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [gossip.comm] func1 -> DEBU 4a8b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.365 UTC [cauthdsl] func1 -> DEBU 4a8c 0xc003af15d0 gate 1555913892365405700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a8d 0xc003af15d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a8e 0xc003af15d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a8f 0xc003af15d0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [msp.identity] Verify -> DEBU 4a90 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [msp.identity] Verify -> DEBU 4a91 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a92 0xc003af15d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [cauthdsl] func1 -> DEBU 4a93 0xc003af15d0 gate 1555913892365405700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:12.366 UTC [policies] Evaluate -> DEBU 4a94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.367 UTC [policies] Evaluate -> DEBU 4a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.367 UTC [policies] Evaluate -> DEBU 4a96 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.367 UTC [policies] Evaluate -> DEBU 4a97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.367 UTC [msp.identity] Verify -> DEBU 4a98 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:12.367 UTC [msp.identity] Verify -> DEBU 4a99 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:12.367 UTC [msp.identity] Verify -> DEBU 4a9a Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:12.368 UTC [msp.identity] Verify -> DEBU 4a9b Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:12.368 UTC [msp] DeserializeIdentity -> DEBU 4a9c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.368 UTC [msp] DeserializeIdentity -> DEBU 4a9d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.368 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:12.368 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a9f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.368 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aa0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aa1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aa2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aa3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func1 -> DEBU 4aa4 0xc004145be0 gate 1555913892369218600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa5 0xc004145be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa6 0xc004145be0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa7 0xc004145be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc004145be0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func1 -> DEBU 4aa9 0xc004145be0 gate 1555913892369218600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aaa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func1 -> DEBU 4aad 0xc00415a420 gate 1555913892369810300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aae 0xc00415a420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aaf 0xc00415a420 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4ab0 0xc00415a420 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.369 UTC [msp.identity] Verify -> DEBU 4ab1 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [msp.identity] Verify -> DEBU 4ab2 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [cauthdsl] func2 -> DEBU 4ab3 0xc00415a420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [cauthdsl] func1 -> DEBU 4ab4 0xc00415a420 gate 1555913892369810300 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [gossip.gossip] handleMessage -> DEBU 4ab9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.370 UTC [gossip.gossip] handleMessage -> DEBU 4aba Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abb Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abc Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abd Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abe Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:12.371 UTC [msp] DeserializeIdentity -> DEBU 4abf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.371 UTC [msp] DeserializeIdentity -> DEBU 4ac0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ac1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ac2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ac3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [policies] Evaluate -> DEBU 4ac4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [policies] Evaluate -> DEBU 4ac5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [policies] Evaluate -> DEBU 4ac6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [cauthdsl] func1 -> DEBU 4ac7 0xc00258cc70 gate 1555913892372550300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4ac8 0xc00258cc70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4ac9 0xc00258cc70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4aca 0xc00258cc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4acb 0xc00258cc70 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [cauthdsl] func1 -> DEBU 4acc 0xc00258cc70 gate 1555913892372550300 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [policies] Evaluate -> DEBU 4acd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [policies] Evaluate -> DEBU 4ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [policies] Evaluate -> DEBU 4acf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [cauthdsl] func1 -> DEBU 4ad0 0xc00258d4b0 gate 1555913892373219200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [cauthdsl] func2 -> DEBU 4ad1 0xc00258d4b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [cauthdsl] func2 -> DEBU 4ad2 0xc00258d4b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [cauthdsl] func2 -> DEBU 4ad3 0xc00258d4b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.373 UTC [msp.identity] Verify -> DEBU 4ad4 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [msp.identity] Verify -> DEBU 4ad5 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [cauthdsl] func2 -> DEBU 4ad6 0xc00258d4b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [cauthdsl] func1 -> DEBU 4ad7 0xc00258d4b0 gate 1555913892373219200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4ad8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4ad9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4ada Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4adb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [msp] DeserializeIdentity -> DEBU 4adc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.374 UTC [msp] DeserializeIdentity -> DEBU 4add Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ade Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4adf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ae0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [policies] Evaluate -> DEBU 4ae1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [policies] Evaluate -> DEBU 4ae2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [policies] Evaluate -> DEBU 4ae3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [cauthdsl] func1 -> DEBU 4ae4 0xc003c76c80 gate 1555913892375458200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae5 0xc003c76c80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae6 0xc003c76c80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae7 0xc003c76c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae8 0xc003c76c80 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [cauthdsl] func1 -> DEBU 4ae9 0xc003c76c80 gate 1555913892375458200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4aea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4aeb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4aec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [cauthdsl] func1 -> DEBU 4aed 0xc003c774c0 gate 1555913892376196100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4aee 0xc003c774c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4aef 0xc003c774c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4af0 0xc003c774c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [msp.identity] Verify -> DEBU 4af1 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [msp.identity] Verify -> DEBU 4af2 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4af3 0xc003c774c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [cauthdsl] func1 -> DEBU 4af4 0xc003c774c0 gate 1555913892376196100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4af5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.377 UTC [policies] Evaluate -> DEBU 4af6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.377 UTC [policies] Evaluate -> DEBU 4af7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.377 UTC [policies] Evaluate -> DEBU 4af8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:12.377 UTC [gossip.gossip] handleMessage -> DEBU 4af9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.486 UTC [msp] DeserializeIdentity -> DEBU 4afa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.487 UTC [msp] DeserializeIdentity -> DEBU 4afb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.487 UTC [gossip.pull] Hello -> DEBU 4afc Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:12.487 UTC [msp] DeserializeIdentity -> DEBU 4afd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.488 UTC [msp] DeserializeIdentity -> DEBU 4afe Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.489 UTC [gossip.comm] Send -> DEBU 4aff Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:12.490 UTC [gossip.comm] sendToEndpoint -> DEBU 4b00 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.490 UTC [gossip.comm] sendToEndpoint -> DEBU 4b01 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.492 UTC [gossip.comm] func1 -> DEBU 4b02 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18356046123090285597 , Msg_type: BLOCK_MSG, digests: [3 8 9 1 2 6 7 4 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.492 UTC [gossip.gossip] handleMessage -> DEBU 4b03 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18356046123090285597 , Msg_type: BLOCK_MSG, digests: [3 8 9 1 2 6 7 4 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.492 UTC [gossip.pull] HandleMessage -> DEBU 4b04 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18356046123090285597 , Msg_type: BLOCK_MSG, digests: [3 8 9 1 2 6 7 4 5], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.492 UTC [gossip.gossip] handleMessage -> DEBU 4b05 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.613 UTC [gossip.comm] func1 -> DEBU 4b06 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.613 UTC [gossip.gossip] handleMessage -> DEBU 4b07 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.614 UTC [msp] DeserializeIdentity -> DEBU 4b08 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.614 UTC [msp] DeserializeIdentity -> DEBU 4b09 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.614 UTC [gossip.gossip] handleMessage -> DEBU 4b0a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.669 UTC [gossip.comm] func1 -> DEBU 4b0b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.670 UTC [gossip.gossip] handleMessage -> DEBU 4b0c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.670 UTC [gossip.pull] HandleMessage -> DEBU 4b0d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.671 UTC [gossip.pull] SendDigest -> DEBU 4b0e Sending BLOCK_MSG digest: [2 4 7 9 1 3 5 6 8] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:12.671 UTC [gossip.gossip] handleMessage -> DEBU 4b0f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:12.836 UTC [gossip.comm] func1 -> DEBU 4b10 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.837 UTC [gossip.gossip] handleMessage -> DEBU 4b11 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:12.837 UTC [msp] DeserializeIdentity -> DEBU 4b12 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.838 UTC [msp] DeserializeIdentity -> DEBU 4b13 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.838 UTC [msp] DeserializeIdentity -> DEBU 4b14 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:12.838 UTC [gossip.gossip] handleMessage -> DEBU 4b15 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:13.052 UTC [gossip.comm] func1 -> DEBU 4b16 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:13.052 UTC [gossip.gossip] handleMessage -> DEBU 4b17 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:13.052 UTC [msp] DeserializeIdentity -> DEBU 4b18 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:13.053 UTC [msp] DeserializeIdentity -> DEBU 4b19 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:13.053 UTC [msp] DeserializeIdentity -> DEBU 4b1a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:13.053 UTC [gossip.gossip] handleMessage -> DEBU 4b1b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.pull] Hello -> DEBU 4b1c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] Send -> DEBU 4b1d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.pull] Hello -> DEBU 4b1e Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] Send -> DEBU 4b1f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.pull] Hello -> DEBU 4b20 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] Send -> DEBU 4b21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b23 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b24 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b25 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b26 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b27 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.comm] func1 -> DEBU 4b28 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1288460362703616860 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1288460362703616860 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.pull] HandleMessage -> DEBU 4b2b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1288460362703616860 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.comm] func1 -> DEBU 4b29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4534385695869609483 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2d Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4534385695869609483 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.pull] HandleMessage -> DEBU 4b2e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4534385695869609483 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.882 UTC [gossip.comm] func1 -> DEBU 4b30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7096727527193406498 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.882 UTC [gossip.gossip] handleMessage -> DEBU 4b31 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7096727527193406498 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.882 UTC [gossip.pull] HandleMessage -> DEBU 4b32 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7096727527193406498 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.882 UTC [gossip.gossip] handleMessage -> DEBU 4b33 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b34 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103D " +peer0.org1.example.com | "2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b35 Sign: digest: 016D9736476045572B6AEBBE10A7303CD28832561DAD78F2DEB1E227D6EB711A " +peer0.org1.example.com | "2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b36 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b37 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] Send -> DEBU 4b38 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [msp] DeserializeIdentity -> DEBU 4b39 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] Send -> DEBU 4b3a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [msp] DeserializeIdentity -> DEBU 4b3b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] Send -> DEBU 4b3c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b40 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b41 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b42 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.947 UTC [gossip.comm] func1 -> DEBU 4b43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.947 UTC [gossip.gossip] handleMessage -> DEBU 4b44 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.947 UTC [gossip.gossip] handleMessage -> DEBU 4b45 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b47 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:14.947 UTC [msp.identity] Verify -> DEBU 4b48 Verify: digest = 00000000 01 6d 97 36 47 60 45 57 2b 6a eb be 10 a7 30 3c |.m.6G`EW+j....0<| +peer0.org1.example.com | 00000010 d2 88 32 56 1d ad 78 f2 de b1 e2 27 d6 eb 71 1a |..2V..x....'..q.|" +peer0.org1.example.com | "2019-04-22 06:18:14.947 UTC [msp.identity] Verify -> DEBU 4b49 Verify: sig = 00000000 30 44 02 20 29 f7 4a c9 b2 fc db 37 2a e5 60 91 |0D. ).J....7*.`.| +peer0.org1.example.com | 00000010 6b 3f 24 c0 cb 65 31 6a 09 b9 14 a6 cb 88 d2 22 |k?$..e1j......."| +peer0.org1.example.com | 00000020 8d 8e 36 3d 02 20 38 b2 39 82 68 c5 54 93 fa b1 |..6=. 8.9.h.T...| +peer0.org1.example.com | 00000030 3c df 2b d0 1d cb 67 12 bf c5 9f 4a 81 7a b1 00 |<.+...g....J.z..| +peer0.org1.example.com | 00000040 89 d1 1c 0c 2e c3 |......|" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b4a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [gossip.discovery] isSentByMe -> DEBU 4b4b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b4c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b4d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [msp] DeserializeIdentity -> DEBU 4b4e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b4f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b50 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b51 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b52 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b53 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [cauthdsl] func1 -> DEBU 4b55 0xc00419f3f0 gate 1555913894948672100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b56 0xc00419f3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b57 0xc00419f3f0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b58 0xc00419f3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b59 0xc00419f3f0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [cauthdsl] func1 -> DEBU 4b5a 0xc00419f3f0 gate 1555913894948672100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b5b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [cauthdsl] func1 -> DEBU 4b5e 0xc00419fc30 gate 1555913894949007400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [cauthdsl] func2 -> DEBU 4b5f 0xc00419fc30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [cauthdsl] func2 -> DEBU 4b60 0xc00419fc30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [cauthdsl] func2 -> DEBU 4b61 0xc00419fc30 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b62 Verify: digest = 00000000 67 1e b8 9b 6f 31 3e cf 99 d8 9a c5 b3 81 87 98 |g...o1>.........| +peer0.org1.example.com | 00000010 9c c5 2c 2f 8e 8e 0a 7a cf b3 01 d9 21 c2 74 ab |..,/...z....!.t.|" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b63 Verify: sig = 00000000 30 45 02 21 00 a5 3c 43 11 ba dd dd a8 0d a9 2d |0E.!.. DEBU 4b64 0xc00419fc30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [cauthdsl] func1 -> DEBU 4b65 0xc00419fc30 gate 1555913894949007400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b66 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b68 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b6a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b6b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b6c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b6d Verify: digest = 00000000 1a 40 26 b7 04 2c 3b ba 13 22 90 0b 8a b3 d5 55 |.@&..,;..".....U| +peer0.org1.example.com | 00000010 f3 83 90 5b 6f 55 da 7a 2f 80 4f c6 c9 09 ce 84 |...[oU.z/.O.....|" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b6e Verify: sig = 00000000 30 45 02 21 00 88 d0 6a f4 07 31 82 f2 87 ab 2d |0E.!...j..1....-| +peer0.org1.example.com | 00000010 69 50 d2 8d 31 65 4d 30 db 6d 5e e4 b3 f1 34 ad |iP..1eM0.m^...4.| +peer0.org1.example.com | 00000020 1f a4 36 c2 d0 02 20 06 c8 e2 2c 9b a0 e9 bc fc |..6... ...,.....| +peer0.org1.example.com | 00000030 db fa 5c 50 d4 07 3b ec a6 07 4f 1c 2d ef d8 41 |..\P..;...O.-..A| +peer0.org1.example.com | 00000040 20 50 6d 44 e5 c6 73 | PmD..s|" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b6f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b70 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b71 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.comm] func1 -> DEBU 4b72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.gossip] handleMessage -> DEBU 4b73 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.gossip] handleMessage -> DEBU 4b74 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [msp.identity] Verify -> DEBU 4b77 Verify: digest = 00000000 1a 40 26 b7 04 2c 3b ba 13 22 90 0b 8a b3 d5 55 |.@&..,;..".....U| +peer0.org1.example.com | 00000010 f3 83 90 5b 6f 55 da 7a 2f 80 4f c6 c9 09 ce 84 |...[oU.z/.O.....|" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [msp.identity] Verify -> DEBU 4b78 Verify: sig = 00000000 30 45 02 21 00 88 d0 6a f4 07 31 82 f2 87 ab 2d |0E.!...j..1....-| +peer0.org1.example.com | 00000010 69 50 d2 8d 31 65 4d 30 db 6d 5e e4 b3 f1 34 ad |iP..1eM0.m^...4.| +peer0.org1.example.com | 00000020 1f a4 36 c2 d0 02 20 06 c8 e2 2c 9b a0 e9 bc fc |..6... ...,.....| +peer0.org1.example.com | 00000030 db fa 5c 50 d4 07 3b ec a6 07 4f 1c 2d ef d8 41 |..\P..;...O.-..A| +peer0.org1.example.com | 00000040 20 50 6d 44 e5 c6 73 | PmD..s|" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.comm] func1 -> DEBU 4b79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.gossip] handleMessage -> DEBU 4b7a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b7c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b7d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:14.950 UTC [msp.identity] Verify -> DEBU 4b7e Verify: digest = 00000000 01 6d 97 36 47 60 45 57 2b 6a eb be 10 a7 30 3c |.m.6G`EW+j....0<| +peer0.org1.example.com | 00000010 d2 88 32 56 1d ad 78 f2 de b1 e2 27 d6 eb 71 1a |..2V..x....'..q.|" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [msp.identity] Verify -> DEBU 4b7f Verify: sig = 00000000 30 44 02 20 29 f7 4a c9 b2 fc db 37 2a e5 60 91 |0D. ).J....7*.`.| +peer0.org1.example.com | 00000010 6b 3f 24 c0 cb 65 31 6a 09 b9 14 a6 cb 88 d2 22 |k?$..e1j......."| +peer0.org1.example.com | 00000020 8d 8e 36 3d 02 20 38 b2 39 82 68 c5 54 93 fa b1 |..6=. 8.9.h.T...| +peer0.org1.example.com | 00000030 3c df 2b d0 1d cb 67 12 bf c5 9f 4a 81 7a b1 00 |<.+...g....J.z..| +peer0.org1.example.com | 00000040 89 d1 1c 0c 2e c3 |......|" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b80 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [gossip.discovery] isSentByMe -> DEBU 4b81 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b82 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b83 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [msp] DeserializeIdentity -> DEBU 4b84 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:14.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b86 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b87 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b8b 0xc003be3cf0 gate 1555913894952204500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8c 0xc003be3cf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8d 0xc003be3cf0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8e 0xc003be3cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8f 0xc003be3cf0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b90 0xc003be3cf0 gate 1555913894952204500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b94 0xc003bf2530 gate 1555913894952592600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b95 0xc003bf2530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b96 0xc003bf2530 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b97 0xc003bf2530 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [msp.identity] Verify -> DEBU 4b98 Verify: digest = 00000000 4a 0c 64 7f 73 2e 71 9b 2b 17 55 08 0b 47 42 f3 |J.d.s.q.+.U..GB.| +peer0.org1.example.com | 00000010 76 6a e0 96 17 ac 0a 8e fa 33 c4 54 78 f6 0f b3 |vj.......3.Tx...|" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [msp.identity] Verify -> DEBU 4b99 Verify: sig = 00000000 30 45 02 21 00 b2 f1 2f c7 01 38 fc 90 e2 82 3b |0E.!.../..8....;| +peer0.org1.example.com | 00000010 c6 f1 a1 29 16 2a 59 dd b4 78 38 8d 69 01 fb 2e |...).*Y..x8.i...| +peer0.org1.example.com | 00000020 53 06 ff d4 86 02 20 2b ec 12 04 dd 4c 96 22 46 |S..... +....L."F| +peer0.org1.example.com | 00000030 dd a6 6e b0 a0 ab 5c d8 3a 07 be 3d 9f ae fc d1 |..n...\.:..=....| +peer0.org1.example.com | 00000040 bf e4 90 0d 2b d3 59 |....+.Y|" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b9a 0xc003bf2530 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b9b 0xc003bf2530 gate 1555913894952592600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ba0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ba1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [gossip.gossip] handleMessage -> DEBU 4ba4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ba5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba6 Verify: digest = 00000000 01 6d 97 36 47 60 45 57 2b 6a eb be 10 a7 30 3c |.m.6G`EW+j....0<| +peer0.org1.example.com | 00000010 d2 88 32 56 1d ad 78 f2 de b1 e2 27 d6 eb 71 1a |..2V..x....'..q.|" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba7 Verify: sig = 00000000 30 44 02 20 29 f7 4a c9 b2 fc db 37 2a e5 60 91 |0D. ).J....7*.`.| +peer0.org1.example.com | 00000010 6b 3f 24 c0 cb 65 31 6a 09 b9 14 a6 cb 88 d2 22 |k?$..e1j......."| +peer0.org1.example.com | 00000020 8d 8e 36 3d 02 20 38 b2 39 82 68 c5 54 93 fa b1 |..6=. 8.9.h.T...| +peer0.org1.example.com | 00000030 3c df 2b d0 1d cb 67 12 bf c5 9f 4a 81 7a b1 00 |<.+...g....J.z..| +peer0.org1.example.com | 00000040 89 d1 1c 0c 2e c3 |......|" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba8 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba9 Verify: sig = 00000000 30 45 02 21 00 b8 21 cb 18 fa e4 3e 9d 17 6a 24 |0E.!..!....>..j$| +peer0.org1.example.com | 00000010 9c 94 67 63 ae 39 8e d9 7e de a7 3e 1c 93 12 1a |..gc.9..~..>....| +peer0.org1.example.com | 00000020 46 52 5e cc b3 02 20 7b 90 8c 63 80 61 d7 0a 4c |FR^... {..c.a..L| +peer0.org1.example.com | 00000030 32 67 5f 51 59 0f 2b 27 70 cb ad b5 d2 21 79 ab |2g_QY.+'p....!y.| +peer0.org1.example.com | 00000040 8c 01 83 31 e6 09 d9 |...1...|" +peer0.org1.example.com | "2019-04-22 06:18:14.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4baa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.954 UTC [gossip.discovery] isSentByMe -> DEBU 4bab Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:14.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bac Exiting" +peer0.org1.example.com | "2019-04-22 06:18:14.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bad Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.114 UTC [gossip.comm] func1 -> DEBU 4bae Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.114 UTC [gossip.gossip] handleMessage -> DEBU 4baf Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.114 UTC [gossip.pull] HandleMessage -> DEBU 4bb0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.114 UTC [gossip.pull] SendDigest -> DEBU 4bb1 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:15.114 UTC [gossip.gossip] handleMessage -> DEBU 4bb2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.191 UTC [gossip.comm] func1 -> DEBU 4bb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.194 UTC [gossip.gossip] handleMessage -> DEBU 4bb4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.194 UTC [gossip.gossip] handleMessage -> DEBU 4bb5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bb6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.195 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bb7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:15.195 UTC [msp.identity] Verify -> DEBU 4bb8 Verify: digest = 00000000 c1 f3 46 42 2a 5a 21 96 fc 52 ed 7b da 85 62 5f |..FB*Z!..R.{..b_| +peer0.org1.example.com | 00000010 ba 31 b1 f7 60 b4 93 b2 a9 c0 19 3f a1 26 00 1f |.1..`......?.&..|" +peer0.org1.example.com | "2019-04-22 06:18:15.195 UTC [msp.identity] Verify -> DEBU 4bb9 Verify: sig = 00000000 30 45 02 21 00 db 15 cd 75 10 c1 64 81 8c 9f a3 |0E.!....u..d....| +peer0.org1.example.com | 00000010 11 94 b6 af 74 49 47 7f ec 40 c7 4d ea fc 2a e4 |....tIG..@.M..*.| +peer0.org1.example.com | 00000020 a4 ae a4 f9 04 02 20 17 37 e6 02 b2 d4 ea 21 80 |...... .7.....!.| +peer0.org1.example.com | 00000030 72 d5 23 d2 93 9d 3b f2 c6 c2 f2 f9 9c 05 b4 6e |r.#...;........n| +peer0.org1.example.com | 00000040 c0 a3 31 a6 20 f5 8a |..1. ..|" +peer0.org1.example.com | "2019-04-22 06:18:15.196 UTC [msp.identity] Verify -> DEBU 4bba Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:15.196 UTC [msp.identity] Verify -> DEBU 4bbb Verify: sig = 00000000 30 45 02 21 00 bf 87 11 26 21 74 d4 5f 12 49 43 |0E.!....&!t._.IC| +peer0.org1.example.com | 00000010 cb 48 b3 1c 8f 4a 91 ae 70 48 e6 65 5e 5f d7 6c |.H...J..pH.e^_.l| +peer0.org1.example.com | 00000020 41 fd 54 2e 29 02 20 52 26 e5 ea 93 2e fc f3 49 |A.T.). R&......I| +peer0.org1.example.com | 00000030 46 63 e1 46 73 a3 b3 06 45 a3 05 84 ec 06 16 ff |Fc.Fs...E.......| +peer0.org1.example.com | 00000040 67 b9 2c 0d 27 5e e6 |g.,.'^.|" +peer0.org1.example.com | "2019-04-22 06:18:15.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bbc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bbd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:15.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bbe updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 " +peer0.org1.example.com | "2019-04-22 06:18:15.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bbf Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 " +peer0.org1.example.com | "2019-04-22 06:18:15.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:15.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bc2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bc3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.198 UTC [gossip.discovery] sendMemResponse -> DEBU 4bc4 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:15.198 UTC [msp] DeserializeIdentity -> DEBU 4bc5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.198 UTC [msp] DeserializeIdentity -> DEBU 4bc6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.199 UTC [gossip.comm] Send -> DEBU 4bc7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:15.199 UTC [gossip.discovery] sendMemResponse -> DEBU 4bc8 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:15.199 UTC [gossip.comm] sendToEndpoint -> DEBU 4bc9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.200 UTC [gossip.comm] sendToEndpoint -> DEBU 4bca Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.621 UTC [gossip.comm] func1 -> DEBU 4bcb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [gossip.gossip] handleMessage -> DEBU 4bcc Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [gossip.pull] HandleMessage -> DEBU 4bcd GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bce Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bcf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [gossip.pull] SendDigest -> DEBU 4bd4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:15.622 UTC [gossip.gossip] handleMessage -> DEBU 4bd5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.637 UTC [gossip.comm] func1 -> DEBU 4bd6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.637 UTC [gossip.gossip] handleMessage -> DEBU 4bd7 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.637 UTC [gossip.gossip] handleMessage -> DEBU 4bd8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bd9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.637 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bda Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:15.637 UTC [msp] DeserializeIdentity -> DEBU 4bdb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4bdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bdd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bde Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4bdf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [cauthdsl] func1 -> DEBU 4be2 0xc003b22fa0 gate 1555913895638436200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be3 0xc003b22fa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be4 0xc003b22fa0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be5 0xc003b22fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be6 0xc003b22fa0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [cauthdsl] func1 -> DEBU 4be7 0xc003b22fa0 gate 1555913895638436200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4bea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [cauthdsl] func1 -> DEBU 4beb 0xc003b237e0 gate 1555913895639029600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bec 0xc003b237e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bed 0xc003b237e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bee 0xc003b237e0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [msp.identity] Verify -> DEBU 4bef Verify: digest = 00000000 40 f0 92 62 89 b7 b3 33 fc af 40 97 c6 82 1e a7 |@..b...3..@.....| +peer0.org1.example.com | 00000010 ad 37 4e 41 3a 71 21 56 bd 71 b9 f9 18 1c 1b 13 |.7NA:q!V.q......|" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [msp.identity] Verify -> DEBU 4bf0 Verify: sig = 00000000 30 44 02 20 5a e2 98 1f c0 3b d1 a3 88 68 4f e9 |0D. Z....;...hO.| +peer0.org1.example.com | 00000010 0e 72 b9 fc a7 84 80 8f 9f e5 69 78 cc c3 a3 ff |.r........ix....| +peer0.org1.example.com | 00000020 0e fc f5 b7 02 20 48 15 78 6e ae 83 09 39 7f 8f |..... H.xn...9..| +peer0.org1.example.com | 00000030 f6 5d 50 f8 19 9d 38 4c 4f 14 06 da 79 fb 9c c0 |.]P...8LO...y...| +peer0.org1.example.com | 00000040 40 de 2b ec 34 eb |@.+.4.|" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bf1 0xc003b237e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [cauthdsl] func1 -> DEBU 4bf2 0xc003b237e0 gate 1555913895639029600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bf7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bf8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bf9 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 " +peer0.org1.example.com | "2019-04-22 06:18:15.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bfa Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 " +peer0.org1.example.com | "2019-04-22 06:18:15.643 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bfb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:15.643 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bfc Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bfd Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.644 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bfe Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.644 UTC [gossip.discovery] sendMemResponse -> DEBU 4bff Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:15.644 UTC [msp] DeserializeIdentity -> DEBU 4c00 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.644 UTC [msp] DeserializeIdentity -> DEBU 4c01 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.650 UTC [msp] DeserializeIdentity -> DEBU 4c02 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.651 UTC [gossip.comm] Send -> DEBU 4c03 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:15.654 UTC [gossip.comm] sendToEndpoint -> DEBU 4c04 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.654 UTC [gossip.comm] sendToEndpoint -> DEBU 4c05 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.653 UTC [gossip.discovery] sendMemResponse -> DEBU 4c06 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c07 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103E " +peer0.org1.example.com | "2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c08 Sign: digest: 6FA5A45D2F253067B483AAC0660681B9B57F8463BA7455BA1DF65398C4140A5A " +peer0.org1.example.com | "2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c09 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c0a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:15.811 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4c0b Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:18:15.822 UTC [msp] DeserializeIdentity -> DEBU 4c0c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.823 UTC [msp] DeserializeIdentity -> DEBU 4c0d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.823 UTC [msp] DeserializeIdentity -> DEBU 4c0e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.823 UTC [gossip.comm] Send -> DEBU 4c0f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:15.823 UTC [msp] DeserializeIdentity -> DEBU 4c10 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:15.823 UTC [gossip.comm] Send -> DEBU 4c11 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c12 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c13 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.824 UTC [gossip.comm] Send -> DEBU 4c14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c15 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c17 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c18 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [gossip.comm] func1 -> DEBU 4c19 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [gossip.gossip] handleMessage -> DEBU 4c1a Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [gossip.pull] HandleMessage -> DEBU 4c1b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c20 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c21 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [gossip.pull] SendDigest -> DEBU 4c22 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:16.004 UTC [gossip.gossip] handleMessage -> DEBU 4c23 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.027 UTC [gossip.comm] func1 -> DEBU 4c24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.027 UTC [gossip.gossip] handleMessage -> DEBU 4c25 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.027 UTC [gossip.gossip] handleMessage -> DEBU 4c26 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.027 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.027 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c28 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:16.028 UTC [msp] DeserializeIdentity -> DEBU 4c29 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.028 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c2b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c2c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.029 UTC [policies] Evaluate -> DEBU 4c2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.029 UTC [policies] Evaluate -> DEBU 4c2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.029 UTC [policies] Evaluate -> DEBU 4c2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.029 UTC [cauthdsl] func1 -> DEBU 4c30 0xc00291b550 gate 1555913896029664100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.029 UTC [cauthdsl] func2 -> DEBU 4c31 0xc00291b550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.030 UTC [cauthdsl] func2 -> DEBU 4c32 0xc00291b550 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.030 UTC [cauthdsl] func2 -> DEBU 4c33 0xc00291b550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.030 UTC [cauthdsl] func2 -> DEBU 4c34 0xc00291b550 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.030 UTC [cauthdsl] func1 -> DEBU 4c35 0xc00291b550 gate 1555913896029664100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.030 UTC [policies] Evaluate -> DEBU 4c36 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.030 UTC [policies] Evaluate -> DEBU 4c37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.030 UTC [policies] Evaluate -> DEBU 4c38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.031 UTC [cauthdsl] func1 -> DEBU 4c39 0xc00291bd90 gate 1555913896031101600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3a 0xc00291bd90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3b 0xc00291bd90 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3c 0xc00291bd90 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.031 UTC [msp.identity] Verify -> DEBU 4c3d Verify: digest = 00000000 f1 e0 4d a8 06 9d 78 cc 31 05 d5 2c e5 6a 86 f9 |..M...x.1..,.j..| +peer0.org1.example.com | 00000010 52 fa 3d db 1b 75 54 53 dc 27 b5 51 0a 5e 51 50 |R.=..uTS.'.Q.^QP|" +peer0.org1.example.com | "2019-04-22 06:18:16.031 UTC [msp.identity] Verify -> DEBU 4c3e Verify: sig = 00000000 30 44 02 20 1c 6d b2 da d6 4e b9 fe 67 06 bd 2d |0D. .m...N..g..-| +peer0.org1.example.com | 00000010 53 68 54 83 5e 1d cc c1 22 2d 6d 15 b0 8e d3 57 |ShT.^..."-m....W| +peer0.org1.example.com | 00000020 da cf 45 34 02 20 32 79 6f 84 fc a5 c7 15 af 4e |..E4. 2yo......N| +peer0.org1.example.com | 00000030 83 cf df 9c ec ac 1a 9f a0 ef c0 d4 be e5 03 a6 |................| +peer0.org1.example.com | 00000040 da 7a 72 0f 1b 69 |.zr..i|" +peer0.org1.example.com | "2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3f 0xc00291bd90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.049 UTC [cauthdsl] func1 -> DEBU 4c40 0xc00291bd90 gate 1555913896031101600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.050 UTC [policies] Evaluate -> DEBU 4c41 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.051 UTC [policies] Evaluate -> DEBU 4c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.053 UTC [policies] Evaluate -> DEBU 4c43 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.054 UTC [policies] Evaluate -> DEBU 4c44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.054 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c46 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:16.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c47 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 " +peer0.org1.example.com | "2019-04-22 06:18:16.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c48 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 " +peer0.org1.example.com | "2019-04-22 06:18:16.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c49 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:16.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c4a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c4b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c4c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.057 UTC [gossip.discovery] sendMemResponse -> DEBU 4c4d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:16.057 UTC [msp] DeserializeIdentity -> DEBU 4c4e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.081 UTC [msp] DeserializeIdentity -> DEBU 4c4f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.081 UTC [msp] DeserializeIdentity -> DEBU 4c50 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.081 UTC [gossip.comm] Send -> DEBU 4c51 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.081 UTC [gossip.discovery] sendMemResponse -> DEBU 4c52 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:16.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4c53 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4c54 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.106 UTC [gossip.comm] func1 -> DEBU 4c55 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.gossip] handleMessage -> DEBU 4c56 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.gossip] handleMessage -> DEBU 4c57 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c59 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5a Verify: digest = 00000000 87 9a 97 1e 9e a1 0b 26 90 c5 1d db b4 45 fb 83 |.......&.....E..| +peer0.org1.example.com | 00000010 5b e9 e8 28 32 3c 33 b5 ee 9d bb 85 91 d2 39 e7 |[..(2<3.......9.|" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5b Verify: sig = 00000000 30 44 02 20 2d b2 12 dd 42 8e 1c 1a e4 25 76 a0 |0D. -...B....%v.| +peer0.org1.example.com | 00000010 45 00 12 63 94 c7 91 bc 4f 64 4e 85 b4 1f dd 7f |E..c....OdN.....| +peer0.org1.example.com | 00000020 e5 53 a3 b8 02 20 30 e4 4b 71 b0 d0 12 61 5f cd |.S... 0.Kq...a_.| +peer0.org1.example.com | 00000030 e9 a5 96 e8 b1 e0 7c da f1 16 5b 4e 1e f7 c5 e0 |......|...[N....| +peer0.org1.example.com | 00000040 d4 66 cc fc 83 51 |.f...Q|" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5d Verify: sig = 00000000 30 45 02 21 00 d3 20 1e 64 4c dd 32 2a a3 78 de |0E.!.. .dL.2*.x.| +peer0.org1.example.com | 00000010 28 b5 1c b5 96 05 d8 f0 f5 78 6b db 7d 94 0b eb |(........xk.}...| +peer0.org1.example.com | 00000020 36 46 4f e0 05 02 20 70 46 49 52 f2 e0 6f 34 15 |6FO... pFIR..o4.| +peer0.org1.example.com | 00000030 da 5b 15 93 87 01 89 72 23 c3 92 7f 02 5e 2d b6 |.[.....r#....^-.| +peer0.org1.example.com | 00000040 6b 7d e3 14 7d 94 ed |k}..}..|" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c60 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 " +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c61 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 " +peer0.org1.example.com | "2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:16.108 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c63 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.108 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c64 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c65 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c66 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c67 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c68 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [gossip.comm] Send -> DEBU 4c69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c6a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [gossip.comm] Send -> DEBU 4c6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.117 UTC [gossip.comm] func1 -> DEBU 4c70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.117 UTC [gossip.gossip] handleMessage -> DEBU 4c71 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.117 UTC [gossip.gossip] handleMessage -> DEBU 4c72 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c73 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c74 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.123 UTC [gossip.comm] func1 -> DEBU 4c75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.123 UTC [gossip.gossip] handleMessage -> DEBU 4c76 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.123 UTC [gossip.gossip] handleMessage -> DEBU 4c77 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c79 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.354 UTC [msp] DeserializeIdentity -> DEBU 4c7a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.355 UTC [msp] DeserializeIdentity -> DEBU 4c7b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.355 UTC [gossip.comm] Send -> DEBU 4c7c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4c7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4c7e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4c7f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4c80 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4c81 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.359 UTC [gossip.comm] func1 -> DEBU 4c82 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.359 UTC [gossip.gossip] handleMessage -> DEBU 4c83 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.360 UTC [msp] DeserializeIdentity -> DEBU 4c84 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.360 UTC [msp] DeserializeIdentity -> DEBU 4c85 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.360 UTC [msp] DeserializeIdentity -> DEBU 4c86 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.360 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c87 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c88 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c89 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [cauthdsl] func1 -> DEBU 4c8d 0xc003792f30 gate 1555913896361435900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c8e 0xc003792f30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c8f 0xc003792f30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c90 0xc003792f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c91 0xc003792f30 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [cauthdsl] func1 -> DEBU 4c92 0xc003792f30 gate 1555913896361435900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c93 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [cauthdsl] func1 -> DEBU 4c96 0xc003793770 gate 1555913896361988800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c97 0xc003793770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c98 0xc003793770 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c99 0xc003793770 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [msp.identity] Verify -> DEBU 4c9a Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [msp.identity] Verify -> DEBU 4c9b Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c9c 0xc003793770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [cauthdsl] func1 -> DEBU 4c9d 0xc003793770 gate 1555913896361988800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4c9e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4c9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4ca0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4ca1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.363 UTC [msp.identity] Verify -> DEBU 4ca2 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:16.363 UTC [msp.identity] Verify -> DEBU 4ca3 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:16.363 UTC [msp.identity] Verify -> DEBU 4ca4 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [msp.identity] Verify -> DEBU 4ca5 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [msp] DeserializeIdentity -> DEBU 4ca6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [msp] DeserializeIdentity -> DEBU 4ca7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ca8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ca9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4caa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [policies] Evaluate -> DEBU 4cab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [policies] Evaluate -> DEBU 4cac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [policies] Evaluate -> DEBU 4cad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.364 UTC [cauthdsl] func1 -> DEBU 4cae 0xc0037a5d80 gate 1555913896364947400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4caf 0xc0037a5d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb0 0xc0037a5d80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb1 0xc0037a5d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb2 0xc0037a5d80 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func1 -> DEBU 4cb3 0xc0037a5d80 gate 1555913896364947400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [policies] Evaluate -> DEBU 4cb4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [policies] Evaluate -> DEBU 4cb5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [policies] Evaluate -> DEBU 4cb6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func1 -> DEBU 4cb7 0xc0037be5c0 gate 1555913896365410100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb8 0xc0037be5c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb9 0xc0037be5c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cba 0xc0037be5c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [msp.identity] Verify -> DEBU 4cbb Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [msp.identity] Verify -> DEBU 4cbc Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cbd 0xc0037be5c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.365 UTC [cauthdsl] func1 -> DEBU 4cbe 0xc0037be5c0 gate 1555913896365410100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cbf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cc1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cc2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [gossip.gossip] handleMessage -> DEBU 4cc3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [gossip.comm] func1 -> DEBU 4cc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [gossip.gossip] handleMessage -> DEBU 4cc5 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [msp] DeserializeIdentity -> DEBU 4cc6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.366 UTC [msp] DeserializeIdentity -> DEBU 4cc7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [msp] DeserializeIdentity -> DEBU 4cc8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4cc9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cca Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ccb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [policies] Evaluate -> DEBU 4ccc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [policies] Evaluate -> DEBU 4ccd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [policies] Evaluate -> DEBU 4cce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [cauthdsl] func1 -> DEBU 4ccf 0xc003f30230 gate 1555913896367612800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd0 0xc003f30230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd1 0xc003f30230 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd2 0xc003f30230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd3 0xc003f30230 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [cauthdsl] func1 -> DEBU 4cd4 0xc003f30230 gate 1555913896367612800 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [policies] Evaluate -> DEBU 4cd5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [policies] Evaluate -> DEBU 4cd6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [policies] Evaluate -> DEBU 4cd7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [cauthdsl] func1 -> DEBU 4cd8 0xc003f30a70 gate 1555913896368285000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cd9 0xc003f30a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cda 0xc003f30a70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cdb 0xc003f30a70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [msp.identity] Verify -> DEBU 4cdc Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [msp.identity] Verify -> DEBU 4cdd Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cde 0xc003f30a70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.369 UTC [cauthdsl] func1 -> DEBU 4cdf 0xc003f30a70 gate 1555913896368285000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.369 UTC [policies] Evaluate -> DEBU 4ce0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.369 UTC [policies] Evaluate -> DEBU 4ce1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.369 UTC [policies] Evaluate -> DEBU 4ce2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.370 UTC [policies] Evaluate -> DEBU 4ce3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.370 UTC [msp.identity] Verify -> DEBU 4ce4 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:16.370 UTC [msp.identity] Verify -> DEBU 4ce5 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:16.372 UTC [msp.identity] Verify -> DEBU 4ce6 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:16.372 UTC [msp.identity] Verify -> DEBU 4ce7 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:16.373 UTC [msp] DeserializeIdentity -> DEBU 4ce8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.374 UTC [msp] DeserializeIdentity -> DEBU 4ce9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4cea Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ceb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cec Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ced Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [policies] Evaluate -> DEBU 4cee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [gossip.comm] func1 -> DEBU 4cef Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [policies] Evaluate -> DEBU 4cf0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [policies] Evaluate -> DEBU 4cf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [cauthdsl] func1 -> DEBU 4cf2 0xc003f47080 gate 1555913896375698400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf3 0xc003f47080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf4 0xc003f47080 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf5 0xc003f47080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf6 0xc003f47080 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.375 UTC [cauthdsl] func1 -> DEBU 4cf7 0xc003f47080 gate 1555913896375698400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [policies] Evaluate -> DEBU 4cf8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [policies] Evaluate -> DEBU 4cf9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [policies] Evaluate -> DEBU 4cfa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [cauthdsl] func1 -> DEBU 4cfb 0xc003f478c0 gate 1555913896376564900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [cauthdsl] func2 -> DEBU 4cfc 0xc003f478c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [cauthdsl] func2 -> DEBU 4cfd 0xc003f478c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [cauthdsl] func2 -> DEBU 4cfe 0xc003f478c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [msp.identity] Verify -> DEBU 4cff Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:16.376 UTC [msp.identity] Verify -> DEBU 4d00 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [cauthdsl] func2 -> DEBU 4d01 0xc003f478c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [cauthdsl] func1 -> DEBU 4d02 0xc003f478c0 gate 1555913896376564900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d05 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [gossip.gossip] handleMessage -> DEBU 4d07 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.377 UTC [gossip.gossip] handleMessage -> DEBU 4d08 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.378 UTC [msp.identity] Verify -> DEBU 4d09 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:16.378 UTC [msp.identity] Verify -> DEBU 4d0a Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:16.379 UTC [msp.identity] Verify -> DEBU 4d0b Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:16.379 UTC [msp.identity] Verify -> DEBU 4d0c Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:16.379 UTC [msp] DeserializeIdentity -> DEBU 4d0d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.379 UTC [msp] DeserializeIdentity -> DEBU 4d0e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d10 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d11 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func1 -> DEBU 4d15 0xc003958110 gate 1555913896380318400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d16 0xc003958110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d17 0xc003958110 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d18 0xc003958110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d19 0xc003958110 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func1 -> DEBU 4d1a 0xc003958110 gate 1555913896380318400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d1b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d1c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d1d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func1 -> DEBU 4d1e 0xc003958950 gate 1555913896380767800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d1f 0xc003958950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d20 0xc003958950 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d21 0xc003958950 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.380 UTC [msp.identity] Verify -> DEBU 4d22 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [msp.identity] Verify -> DEBU 4d23 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [cauthdsl] func2 -> DEBU 4d24 0xc003958950 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [cauthdsl] func1 -> DEBU 4d25 0xc003958950 gate 1555913896380767800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d28 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [msp] DeserializeIdentity -> DEBU 4d2a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [msp] DeserializeIdentity -> DEBU 4d2b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.381 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d2c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d2d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d2e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func1 -> DEBU 4d32 0xc003974120 gate 1555913896382258600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d33 0xc003974120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d34 0xc003974120 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d35 0xc003974120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d36 0xc003974120 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func1 -> DEBU 4d37 0xc003974120 gate 1555913896382258600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d38 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func1 -> DEBU 4d3b 0xc003974960 gate 1555913896382859800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d3c 0xc003974960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [cauthdsl] func2 -> DEBU 4d3d 0xc003974960 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [cauthdsl] func2 -> DEBU 4d3e 0xc003974960 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [msp.identity] Verify -> DEBU 4d3f Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [msp.identity] Verify -> DEBU 4d40 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [cauthdsl] func2 -> DEBU 4d41 0xc003974960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [cauthdsl] func1 -> DEBU 4d42 0xc003974960 gate 1555913896382859800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d43 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d45 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.383 UTC [gossip.gossip] handleMessage -> DEBU 4d47 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.444 UTC [gossip.election] waitForInterrupt -> DEBU 4d48 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.444 UTC [gossip.election] IsLeader -> DEBU 4d49 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:18:16.444 UTC [msp.identity] Sign -> DEBU 4d4a Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510141801 " +peer0.org1.example.com | "2019-04-22 06:18:16.444 UTC [msp.identity] Sign -> DEBU 4d4b Sign: digest: 6BA78C4951DE27327110743AE6AC3826AADF1414E348F6A69FCF32A9DF2B1F57 " +peer0.org1.example.com | "2019-04-22 06:18:16.445 UTC [gossip.election] waitForInterrupt -> DEBU 4d4c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:18:16.455 UTC [msp] DeserializeIdentity -> DEBU 4d4d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.455 UTC [msp] DeserializeIdentity -> DEBU 4d4e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.455 UTC [msp] DeserializeIdentity -> DEBU 4d4f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.456 UTC [msp] DeserializeIdentity -> DEBU 4d50 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.459 UTC [gossip.comm] Send -> DEBU 4d51 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.463 UTC [gossip.comm] sendToEndpoint -> DEBU 4d52 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.467 UTC [gossip.comm] sendToEndpoint -> DEBU 4d53 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.469 UTC [msp] DeserializeIdentity -> DEBU 4d54 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.469 UTC [msp] DeserializeIdentity -> DEBU 4d55 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.501 UTC [msp] DeserializeIdentity -> DEBU 4d56 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.502 UTC [msp] DeserializeIdentity -> DEBU 4d57 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.502 UTC [gossip.pull] Hello -> DEBU 4d58 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:16.502 UTC [msp] DeserializeIdentity -> DEBU 4d59 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.502 UTC [msp] DeserializeIdentity -> DEBU 4d5a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.502 UTC [gossip.comm] Send -> DEBU 4d5b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.502 UTC [gossip.comm] sendToEndpoint -> DEBU 4d5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.503 UTC [gossip.comm] sendToEndpoint -> DEBU 4d5d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.505 UTC [gossip.comm] func1 -> DEBU 4d5e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6022486830287658786 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.505 UTC [gossip.gossip] handleMessage -> DEBU 4d5f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6022486830287658786 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.505 UTC [gossip.pull] HandleMessage -> DEBU 4d60 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6022486830287658786 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.506 UTC [gossip.gossip] handleMessage -> DEBU 4d61 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.593 UTC [gossip.comm] func1 -> DEBU 4d62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.608 UTC [gossip.gossip] handleMessage -> DEBU 4d64 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.593 UTC [gossip.comm] func1 -> DEBU 4d63 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.610 UTC [gossip.gossip] handleMessage -> DEBU 4d65 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.612 UTC [gossip.gossip] handleMessage -> DEBU 4d67 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.612 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d68 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:16.612 UTC [msp] DeserializeIdentity -> DEBU 4d69 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.613 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d6b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d6c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.613 UTC [policies] Evaluate -> DEBU 4d6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.613 UTC [policies] Evaluate -> DEBU 4d6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.613 UTC [policies] Evaluate -> DEBU 4d6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.613 UTC [cauthdsl] func1 -> DEBU 4d70 0xc003de7a30 gate 1555913896613627900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.624 UTC [cauthdsl] func2 -> DEBU 4d71 0xc003de7a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.625 UTC [cauthdsl] func2 -> DEBU 4d72 0xc003de7a30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.626 UTC [gossip.comm] func1 -> DEBU 4d73 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.633 UTC [gossip.comm] func1 -> DEBU 4d74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.644 UTC [cauthdsl] func2 -> DEBU 4d75 0xc003de7a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.645 UTC [cauthdsl] func2 -> DEBU 4d76 0xc003de7a30 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.645 UTC [cauthdsl] func1 -> DEBU 4d77 0xc003de7a30 gate 1555913896613627900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.646 UTC [policies] Evaluate -> DEBU 4d78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.647 UTC [policies] Evaluate -> DEBU 4d79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.648 UTC [policies] Evaluate -> DEBU 4d7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.649 UTC [cauthdsl] func1 -> DEBU 4d7b 0xc003ddebb0 gate 1555913896648667500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.649 UTC [cauthdsl] func2 -> DEBU 4d7c 0xc003ddebb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.651 UTC [cauthdsl] func2 -> DEBU 4d7d 0xc003ddebb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.652 UTC [cauthdsl] func2 -> DEBU 4d7e 0xc003ddebb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.652 UTC [msp.identity] Verify -> DEBU 4d7f Verify: digest = 00000000 04 3e 63 d2 35 0f 1a e5 8d 72 45 09 9c b9 f6 30 |.>c.5....rE....0| +peer0.org1.example.com | 00000010 69 05 75 5e ca 46 e2 18 b5 ed fe 25 73 c7 39 2a |i.u^.F.....%s.9*|" +peer0.org1.example.com | "2019-04-22 06:18:16.661 UTC [msp.identity] Verify -> DEBU 4d80 Verify: sig = 00000000 30 44 02 20 5a cd c2 81 2a 9e b0 a2 9c b2 67 e0 |0D. Z...*.....g.| +peer0.org1.example.com | 00000010 33 af e4 4d 29 78 8c 7b 8c 7b 5a ad f8 a9 41 ee |3..M)x.{.{Z...A.| +peer0.org1.example.com | 00000020 16 cc a4 f1 02 20 3c 61 43 b8 24 15 5b 53 8c 6c |..... DEBU 4d81 0xc003ddebb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.663 UTC [cauthdsl] func1 -> DEBU 4d82 0xc003ddebb0 gate 1555913896648667500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.663 UTC [policies] Evaluate -> DEBU 4d83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.663 UTC [policies] Evaluate -> DEBU 4d84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.664 UTC [policies] Evaluate -> DEBU 4d85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.664 UTC [policies] Evaluate -> DEBU 4d86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d88 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:16.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d89 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 " +peer0.org1.example.com | "2019-04-22 06:18:16.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 " +peer0.org1.example.com | "2019-04-22 06:18:16.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:16.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d8d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d8e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.667 UTC [gossip.gossip] handleMessage -> DEBU 4d8f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.668 UTC [gossip.gossip] handleMessage -> DEBU 4d90 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.668 UTC [msp] DeserializeIdentity -> DEBU 4d91 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.677 UTC [msp] DeserializeIdentity -> DEBU 4d92 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.677 UTC [gossip.gossip] handleMessage -> DEBU 4d93 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.679 UTC [gossip.gossip] handleMessage -> DEBU 4d96 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.678 UTC [msp] DeserializeIdentity -> DEBU 4d94 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.678 UTC [gossip.comm] func1 -> DEBU 4d95 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.680 UTC [msp] DeserializeIdentity -> DEBU 4d97 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.688 UTC [msp] DeserializeIdentity -> DEBU 4d98 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.690 UTC [msp] DeserializeIdentity -> DEBU 4d99 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.691 UTC [msp] DeserializeIdentity -> DEBU 4d9a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.693 UTC [msp] DeserializeIdentity -> DEBU 4d9b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.695 UTC [msp] DeserializeIdentity -> DEBU 4d9c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.697 UTC [gossip.comm] Send -> DEBU 4d9d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.698 UTC [msp] DeserializeIdentity -> DEBU 4d9e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.701 UTC [gossip.comm] Send -> DEBU 4da0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:16.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4d9f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.709 UTC [gossip.comm] sendToEndpoint -> DEBU 4da1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.710 UTC [gossip.comm] sendToEndpoint -> DEBU 4da2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4da5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.715 UTC [gossip.comm] sendToEndpoint -> DEBU 4da4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.716 UTC [gossip.gossip] handleMessage -> DEBU 4da6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.717 UTC [gossip.gossip] handleMessage -> DEBU 4da7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.717 UTC [gossip.pull] HandleMessage -> DEBU 4da8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.717 UTC [gossip.pull] SendDigest -> DEBU 4da9 Sending BLOCK_MSG digest: [8 1 3 5 6 2 4 7 9] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:16.717 UTC [gossip.gossip] handleMessage -> DEBU 4daa Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4dab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4dac Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.836 UTC [gossip.comm] func1 -> DEBU 4dad Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.836 UTC [gossip.gossip] handleMessage -> DEBU 4dae Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.837 UTC [msp] DeserializeIdentity -> DEBU 4daf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.837 UTC [msp] DeserializeIdentity -> DEBU 4db0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.845 UTC [msp] DeserializeIdentity -> DEBU 4db1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.845 UTC [gossip.gossip] handleMessage -> DEBU 4db2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.995 UTC [gossip.comm] func1 -> DEBU 4db3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.995 UTC [gossip.gossip] handleMessage -> DEBU 4db4 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.995 UTC [gossip.gossip] handleMessage -> DEBU 4db5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4db6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4db7 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [msp] DeserializeIdentity -> DEBU 4db8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4db9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dbb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dbc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dbd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dbe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func1 -> DEBU 4dbf 0xc003e1f6b0 gate 1555913896996436600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc0 0xc003e1f6b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc1 0xc003e1f6b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc2 0xc003e1f6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc3 0xc003e1f6b0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func1 -> DEBU 4dc4 0xc003e1f6b0 gate 1555913896996436600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dc5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dc6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dc7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func1 -> DEBU 4dc8 0xc003e1fef0 gate 1555913896996859400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc9 0xc003e1fef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dca 0xc003e1fef0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dcb 0xc003e1fef0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [msp.identity] Verify -> DEBU 4dcc Verify: digest = 00000000 d8 95 ce 7b 87 fc 30 52 d8 e5 ea f0 22 bc bc a4 |...{..0R...."...| +peer0.org1.example.com | 00000010 60 c8 e5 ec 6b 24 60 df 2c 5a f3 1e 0c 59 06 31 |`...k$`.,Z...Y.1|" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [msp.identity] Verify -> DEBU 4dcd Verify: sig = 00000000 30 45 02 21 00 ac d4 dd c9 fa 37 41 1d 31 5e be |0E.!......7A.1^.| +peer0.org1.example.com | 00000010 d7 43 07 f9 de 5e 87 79 a0 7b 6b 48 58 f4 aa ea |.C...^.y.{kHX...| +peer0.org1.example.com | 00000020 3f 2c c3 44 97 02 20 22 d2 6c 24 75 63 5c 4f db |?,.D.. ".l$uc\O.| +peer0.org1.example.com | 00000030 a0 da f4 da 9d 3e b0 1a 41 9b 55 fa 61 c3 3b 02 |.....>..A.U.a.;.| +peer0.org1.example.com | 00000040 82 a5 a1 7a 3f bc 66 |...z?.f|" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [cauthdsl] func2 -> DEBU 4dce 0xc003e1fef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [cauthdsl] func1 -> DEBU 4dcf 0xc003e1fef0 gate 1555913896996859400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 4dd4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:16.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd6 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 " +peer0.org1.example.com | "2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd7 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 " +peer0.org1.example.com | "2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:16.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 4dda Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ddb Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.004 UTC [gossip.comm] func1 -> DEBU 4ddc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.004 UTC [gossip.gossip] handleMessage -> DEBU 4ddd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.004 UTC [gossip.gossip] handleMessage -> DEBU 4dde Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ddf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4de0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.005 UTC [gossip.comm] func1 -> DEBU 4de1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.005 UTC [gossip.gossip] handleMessage -> DEBU 4de2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.005 UTC [gossip.gossip] handleMessage -> DEBU 4de3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4de4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4de5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4dea Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [msp] DeserializeIdentity -> DEBU 4deb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [msp] DeserializeIdentity -> DEBU 4dec Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [gossip.comm] Send -> DEBU 4ded Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [msp] DeserializeIdentity -> DEBU 4dee Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [gossip.comm] Send -> DEBU 4def Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:17.050 UTC [gossip.comm] func1 -> DEBU 4df4 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.050 UTC [gossip.gossip] handleMessage -> DEBU 4df5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:17.051 UTC [msp] DeserializeIdentity -> DEBU 4df6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.051 UTC [msp] DeserializeIdentity -> DEBU 4df7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.051 UTC [msp] DeserializeIdentity -> DEBU 4df8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:17.051 UTC [gossip.gossip] handleMessage -> DEBU 4df9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.pull] Hello -> DEBU 4dfa Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.comm] Send -> DEBU 4dfb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.pull] Hello -> DEBU 4dfc Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.comm] Send -> DEBU 4dfd Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.pull] Hello -> DEBU 4dfe Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.comm] Send -> DEBU 4dff Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e00 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e01 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e03 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.880 UTC [gossip.comm] sendToEndpoint -> DEBU 4e04 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.880 UTC [gossip.comm] sendToEndpoint -> DEBU 4e05 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.882 UTC [gossip.comm] func1 -> DEBU 4e06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7592540667956556189 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.882 UTC [gossip.gossip] handleMessage -> DEBU 4e07 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7592540667956556189 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.882 UTC [gossip.pull] HandleMessage -> DEBU 4e08 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7592540667956556189 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.882 UTC [gossip.gossip] handleMessage -> DEBU 4e09 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.882 UTC [gossip.comm] func1 -> DEBU 4e0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8116035663129203458 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e0b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8116035663129203458 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.883 UTC [gossip.pull] HandleMessage -> DEBU 4e0c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8116035663129203458 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e0d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.883 UTC [gossip.comm] func1 -> DEBU 4e0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2284014064508842567 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e0f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2284014064508842567 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.883 UTC [gossip.pull] HandleMessage -> DEBU 4e10 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2284014064508842567 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e11 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.945 UTC [msp.identity] Sign -> DEBU 4e12 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103F " +peer0.org1.example.com | "2019-04-22 06:18:18.945 UTC [msp.identity] Sign -> DEBU 4e13 Sign: digest: 5B34AFEEE60AE670910A218497E15FBD9529E9CD957EADB9666908BECA0CB3C7 " +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [msp.identity] Sign -> DEBU 4e14 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [msp.identity] Sign -> DEBU 4e15 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [gossip.comm] Send -> DEBU 4e16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [msp] DeserializeIdentity -> DEBU 4e17 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [gossip.comm] Send -> DEBU 4e18 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [msp] DeserializeIdentity -> DEBU 4e19 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [gossip.comm] Send -> DEBU 4e1c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.947 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.947 UTC [gossip.comm] sendToEndpoint -> DEBU 4e20 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.comm] func1 -> DEBU 4e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.comm] func1 -> DEBU 4e22 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.gossip] handleMessage -> DEBU 4e23 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.gossip] handleMessage -> DEBU 4e24 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.gossip] handleMessage -> DEBU 4e25 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.comm] func1 -> DEBU 4e26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e28 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [msp.identity] Verify -> DEBU 4e29 Verify: digest = 00000000 5b 34 af ee e6 0a e6 70 91 0a 21 84 97 e1 5f bd |[4.....p..!..._.| +peer0.org1.example.com | 00000010 95 29 e9 cd 95 7e ad b9 66 69 08 be ca 0c b3 c7 |.)...~..fi......|" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [msp.identity] Verify -> DEBU 4e2a Verify: sig = 00000000 30 44 02 20 1e c2 86 b0 87 b2 c5 65 71 d7 1a e0 |0D. .......eq...| +peer0.org1.example.com | 00000010 5e bc fb b9 c9 d0 b5 96 48 14 f4 f0 23 72 b8 04 |^.......H...#r..| +peer0.org1.example.com | 00000020 d2 4a e3 d4 02 20 0f 1a 4d 3c 9c b1 38 b2 ee 7e |.J... ..M<..8..~| +peer0.org1.example.com | 00000030 7c 66 fc 4d 35 1d c1 25 d5 8b b1 8c 8b 22 a1 02 ||f.M5..%....."..| +peer0.org1.example.com | 00000040 73 71 76 6a 4b 13 |sqvjK.|" +peer0.org1.example.com | "2019-04-22 06:18:18.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e2b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] isSentByMe -> DEBU 4e2c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e2d Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e2e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e2f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e30 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [msp.identity] Verify -> DEBU 4e31 Verify: digest = 00000000 5b 34 af ee e6 0a e6 70 91 0a 21 84 97 e1 5f bd |[4.....p..!..._.| +peer0.org1.example.com | 00000010 95 29 e9 cd 95 7e ad b9 66 69 08 be ca 0c b3 c7 |.)...~..fi......|" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [msp.identity] Verify -> DEBU 4e32 Verify: sig = 00000000 30 44 02 20 1e c2 86 b0 87 b2 c5 65 71 d7 1a e0 |0D. .......eq...| +peer0.org1.example.com | 00000010 5e bc fb b9 c9 d0 b5 96 48 14 f4 f0 23 72 b8 04 |^.......H...#r..| +peer0.org1.example.com | 00000020 d2 4a e3 d4 02 20 0f 1a 4d 3c 9c b1 38 b2 ee 7e |.J... ..M<..8..~| +peer0.org1.example.com | 00000030 7c 66 fc 4d 35 1d c1 25 d5 8b b1 8c 8b 22 a1 02 ||f.M5..%....."..| +peer0.org1.example.com | 00000040 73 71 76 6a 4b 13 |sqvjK.|" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e33 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] isSentByMe -> DEBU 4e34 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e35 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e36 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.gossip] handleMessage -> DEBU 4e37 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.gossip] handleMessage -> DEBU 4e38 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.gossip] handleMessage -> DEBU 4e39 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e3a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e3b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3c Verify: digest = 00000000 5b 34 af ee e6 0a e6 70 91 0a 21 84 97 e1 5f bd |[4.....p..!..._.| +peer0.org1.example.com | 00000010 95 29 e9 cd 95 7e ad b9 66 69 08 be ca 0c b3 c7 |.)...~..fi......|" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3d Verify: sig = 00000000 30 44 02 20 1e c2 86 b0 87 b2 c5 65 71 d7 1a e0 |0D. .......eq...| +peer0.org1.example.com | 00000010 5e bc fb b9 c9 d0 b5 96 48 14 f4 f0 23 72 b8 04 |^.......H...#r..| +peer0.org1.example.com | 00000020 d2 4a e3 d4 02 20 0f 1a 4d 3c 9c b1 38 b2 ee 7e |.J... ..M<..8..~| +peer0.org1.example.com | 00000030 7c 66 fc 4d 35 1d c1 25 d5 8b b1 8c 8b 22 a1 02 ||f.M5..%....."..| +peer0.org1.example.com | 00000040 73 71 76 6a 4b 13 |sqvjK.|" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3f Verify: sig = 00000000 30 44 02 20 64 c0 60 b6 39 fe a2 c7 60 03 a1 1b |0D. d.`.9...`...| +peer0.org1.example.com | 00000010 89 98 fc a5 da fb 1e a6 45 3e 0f 15 47 b6 e6 d2 |........E>..G...| +peer0.org1.example.com | 00000020 3d d1 78 f7 02 20 79 35 e0 d6 a6 01 ba 51 b4 03 |=.x.. y5.....Q..| +peer0.org1.example.com | 00000030 f9 92 d7 c4 f1 17 ff 84 55 f1 e8 f3 fe db 6e d8 |........U.....n.| +peer0.org1.example.com | 00000040 42 28 7d b7 ff 11 |B(}...|" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [gossip.discovery] isSentByMe -> DEBU 4e41 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e42 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:18.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e43 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.119 UTC [gossip.comm] func1 -> DEBU 4e44 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.119 UTC [gossip.gossip] handleMessage -> DEBU 4e45 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.119 UTC [gossip.pull] HandleMessage -> DEBU 4e46 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.119 UTC [gossip.pull] SendDigest -> DEBU 4e47 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:19.119 UTC [gossip.gossip] handleMessage -> DEBU 4e48 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.205 UTC [gossip.comm] func1 -> DEBU 4e49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.205 UTC [gossip.gossip] handleMessage -> DEBU 4e4a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.205 UTC [gossip.gossip] handleMessage -> DEBU 4e4b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.205 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e4d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e4e Verify: digest = 00000000 77 7a 1c 63 f0 64 e9 b2 2b f0 bf ab 11 d3 a1 ce |wz.c.d..+.......| +peer0.org1.example.com | 00000010 b9 d5 1c 82 3a d6 07 d9 f6 3a 4d 70 c2 b4 dd 8a |....:....:Mp....|" +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e4f Verify: sig = 00000000 30 44 02 20 7d c9 b0 ce 66 d9 64 61 15 d9 89 a5 |0D. }...f.da....| +peer0.org1.example.com | 00000010 38 7c 56 c0 70 a0 a4 66 2d 98 1b fe b9 39 f5 c2 |8|V.p..f-....9..| +peer0.org1.example.com | 00000020 e6 6a 0c 21 02 20 14 d9 bc 94 ae 70 af b2 21 88 |.j.!. .....p..!.| +peer0.org1.example.com | 00000030 49 67 ce 2e 1e a7 ac af 72 5c 55 0d aa 12 71 d9 |Ig......r\U...q.| +peer0.org1.example.com | 00000040 c4 38 3d 3e 4e 42 |.8=>NB|" +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e50 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e51 Verify: sig = 00000000 30 45 02 21 00 a2 4b 53 e3 a7 27 c1 de 52 2d 49 |0E.!..KS..'..R-I| +peer0.org1.example.com | 00000010 8c 65 51 07 70 a0 99 28 6d eb 49 93 2f 10 e7 f6 |.eQ.p..(m.I./...| +peer0.org1.example.com | 00000020 89 21 3f ad ca 02 20 05 94 1b f6 14 ee d1 4f 60 |.!?... .......O`| +peer0.org1.example.com | 00000030 fd 3b ce 52 1b 45 35 4d 10 53 43 cf 6c 44 eb 55 |.;.R.E5M.SC.lD.U| +peer0.org1.example.com | 00000040 f5 f4 3f 17 43 87 71 |..?.C.q|" +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e52 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e53 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e54 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 " +peer0.org1.example.com | "2019-04-22 06:18:19.206 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e55 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 " +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e56 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e57 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e58 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e59 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.discovery] sendMemResponse -> DEBU 4e5a Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [msp] DeserializeIdentity -> DEBU 4e5b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [msp] DeserializeIdentity -> DEBU 4e5c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.comm] Send -> DEBU 4e5d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.discovery] sendMemResponse -> DEBU 4e5e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.comm] sendToEndpoint -> DEBU 4e5f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.207 UTC [gossip.comm] sendToEndpoint -> DEBU 4e60 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.622 UTC [gossip.comm] func1 -> DEBU 4e61 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.622 UTC [gossip.gossip] handleMessage -> DEBU 4e62 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.622 UTC [gossip.pull] HandleMessage -> DEBU 4e63 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.622 UTC [msp] DeserializeIdentity -> DEBU 4e64 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.622 UTC [msp] DeserializeIdentity -> DEBU 4e65 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e66 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e67 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e68 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e69 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.623 UTC [gossip.pull] SendDigest -> DEBU 4e6a Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:19.623 UTC [gossip.gossip] handleMessage -> DEBU 4e6b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.643 UTC [gossip.comm] func1 -> DEBU 4e6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.643 UTC [gossip.gossip] handleMessage -> DEBU 4e6d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.648 UTC [gossip.gossip] handleMessage -> DEBU 4e6e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e6f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.648 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e70 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:19.649 UTC [msp] DeserializeIdentity -> DEBU 4e71 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:19.650 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e73 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:19.650 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e74 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:19.651 UTC [policies] Evaluate -> DEBU 4e75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:19.651 UTC [policies] Evaluate -> DEBU 4e76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:19.651 UTC [policies] Evaluate -> DEBU 4e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:19.651 UTC [cauthdsl] func1 -> DEBU 4e78 0xc00429c260 gate 1555913899651262600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e79 0xc00429c260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e7a 0xc00429c260 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e7b 0xc00429c260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e7c 0xc00429c260 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:19.654 UTC [cauthdsl] func1 -> DEBU 4e7d 0xc00429c260 gate 1555913899651262600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:19.654 UTC [policies] Evaluate -> DEBU 4e7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:19.654 UTC [policies] Evaluate -> DEBU 4e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:19.654 UTC [policies] Evaluate -> DEBU 4e80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:19.655 UTC [cauthdsl] func1 -> DEBU 4e81 0xc00429caa0 gate 1555913899655491100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:19.655 UTC [cauthdsl] func2 -> DEBU 4e82 0xc00429caa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:19.656 UTC [cauthdsl] func2 -> DEBU 4e83 0xc00429caa0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:19.657 UTC [cauthdsl] func2 -> DEBU 4e84 0xc00429caa0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:19.657 UTC [msp.identity] Verify -> DEBU 4e85 Verify: digest = 00000000 74 02 1b 4a b3 37 17 14 01 f7 75 ae c9 26 dc 6d |t..J.7....u..&.m| +peer0.org1.example.com | 00000010 6d 15 ed 47 b2 1f 81 50 33 98 37 84 1a f8 6c 04 |m..G...P3.7...l.|" +peer0.org1.example.com | "2019-04-22 06:18:19.657 UTC [msp.identity] Verify -> DEBU 4e86 Verify: sig = 00000000 30 44 02 20 38 33 72 12 f3 06 5f b4 5c 64 c1 cf |0D. 83r..._.\d..| +peer0.org1.example.com | 00000010 37 be f6 40 e9 fe fe 11 95 af e9 ea 2e bd 97 dc |7..@............| +peer0.org1.example.com | 00000020 57 60 d7 30 02 20 13 43 cc ea bc 83 72 66 18 6a |W`.0. .C....rf.j| +peer0.org1.example.com | 00000030 25 c7 e9 a2 7e 71 78 99 3d 94 0e 28 88 d1 f3 a8 |%...~qx.=..(....| +peer0.org1.example.com | 00000040 6a c4 f3 a0 ca 9b |j.....|" +peer0.org1.example.com | "2019-04-22 06:18:19.657 UTC [cauthdsl] func2 -> DEBU 4e87 0xc00429caa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:19.658 UTC [cauthdsl] func1 -> DEBU 4e88 0xc00429caa0 gate 1555913899655491100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:19.658 UTC [policies] Evaluate -> DEBU 4e89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:19.659 UTC [policies] Evaluate -> DEBU 4e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:19.659 UTC [policies] Evaluate -> DEBU 4e8b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:19.659 UTC [policies] Evaluate -> DEBU 4e8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:19.660 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e8d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:19.661 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 " +peer0.org1.example.com | "2019-04-22 06:18:19.661 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e90 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 " +peer0.org1.example.com | "2019-04-22 06:18:19.662 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e91 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:19.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e92 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e93 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e94 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:19.664 UTC [gossip.discovery] sendMemResponse -> DEBU 4e95 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:19.665 UTC [msp] DeserializeIdentity -> DEBU 4e96 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.666 UTC [msp] DeserializeIdentity -> DEBU 4e97 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.667 UTC [msp] DeserializeIdentity -> DEBU 4e98 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:19.669 UTC [gossip.comm] Send -> DEBU 4e99 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:19.670 UTC [gossip.discovery] sendMemResponse -> DEBU 4e9a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:19.670 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:19.671 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.004 UTC [gossip.comm] func1 -> DEBU 4e9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.004 UTC [gossip.gossip] handleMessage -> DEBU 4e9e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.004 UTC [gossip.pull] HandleMessage -> DEBU 4e9f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [gossip.pull] SendDigest -> DEBU 4ea6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:20.005 UTC [gossip.gossip] handleMessage -> DEBU 4ea7 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.028 UTC [gossip.comm] func1 -> DEBU 4ea8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.028 UTC [gossip.gossip] handleMessage -> DEBU 4ea9 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.028 UTC [gossip.gossip] handleMessage -> DEBU 4eaa Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.028 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4eab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.028 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4eac Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [msp] DeserializeIdentity -> DEBU 4ead Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4eae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eaf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eb0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [policies] Evaluate -> DEBU 4eb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [policies] Evaluate -> DEBU 4eb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [policies] Evaluate -> DEBU 4eb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.029 UTC [cauthdsl] func1 -> DEBU 4eb4 0xc00349c620 gate 1555913900029899200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb5 0xc00349c620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb6 0xc00349c620 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb7 0xc00349c620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb8 0xc00349c620 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func1 -> DEBU 4eb9 0xc00349c620 gate 1555913900029899200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [policies] Evaluate -> DEBU 4eba Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [policies] Evaluate -> DEBU 4ebb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [policies] Evaluate -> DEBU 4ebc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func1 -> DEBU 4ebd 0xc00349ce60 gate 1555913900030583900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4ebe 0xc00349ce60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4ebf 0xc00349ce60 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4ec0 0xc00349ce60 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [msp.identity] Verify -> DEBU 4ec1 Verify: digest = 00000000 3f b8 ec fe 21 83 f2 22 95 9c ac 9a be c5 41 d7 |?...!.."......A.| +peer0.org1.example.com | 00000010 49 71 b7 bb 5e ba 29 47 e3 21 ad 7e 6a f5 55 0c |Iq..^.)G.!.~j.U.|" +peer0.org1.example.com | "2019-04-22 06:18:20.030 UTC [msp.identity] Verify -> DEBU 4ec2 Verify: sig = 00000000 30 45 02 21 00 da da 3f bf ff e3 a4 d4 0a 08 bd |0E.!...?........| +peer0.org1.example.com | 00000010 22 c1 67 7d 09 df 2f b6 8f 72 06 de 76 b1 36 01 |".g}../..r..v.6.| +peer0.org1.example.com | 00000020 51 17 01 2e 1a 02 20 65 1e be e3 2a 2b b3 d2 5c |Q..... e...*+..\| +peer0.org1.example.com | 00000030 cc e8 55 ae 31 0f 16 c3 40 f6 aa c3 b1 5b 97 43 |..U.1...@....[.C| +peer0.org1.example.com | 00000040 f2 48 26 6b 42 da 4d |.H&kB.M|" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [cauthdsl] func2 -> DEBU 4ec3 0xc00349ce60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [cauthdsl] func1 -> DEBU 4ec4 0xc00349ce60 gate 1555913900030583900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ec9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4eca Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ecb updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 " +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ecc Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 " +peer0.org1.example.com | "2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ecd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ece Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ecf Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ed0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [gossip.discovery] sendMemResponse -> DEBU 4ed1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [msp] DeserializeIdentity -> DEBU 4ed2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [msp] DeserializeIdentity -> DEBU 4ed3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [msp] DeserializeIdentity -> DEBU 4ed4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [gossip.comm] Send -> DEBU 4ed5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:20.032 UTC [gossip.discovery] sendMemResponse -> DEBU 4ed6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:20.033 UTC [gossip.comm] sendToEndpoint -> DEBU 4ed7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.033 UTC [gossip.comm] sendToEndpoint -> DEBU 4ed8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.355 UTC [msp] DeserializeIdentity -> DEBU 4ed9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.355 UTC [msp] DeserializeIdentity -> DEBU 4eda Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.355 UTC [gossip.comm] Send -> DEBU 4edb Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:20.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4edc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4edd Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4ede Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4edf Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.359 UTC [gossip.comm] func1 -> DEBU 4ee2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.359 UTC [gossip.gossip] handleMessage -> DEBU 4ee3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.360 UTC [msp.identity] Verify -> DEBU 4ee4 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:20.360 UTC [msp.identity] Verify -> DEBU 4ee5 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:20.361 UTC [msp.identity] Verify -> DEBU 4ee6 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:20.361 UTC [msp.identity] Verify -> DEBU 4ee7 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:20.362 UTC [msp] DeserializeIdentity -> DEBU 4ee8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.362 UTC [msp] DeserializeIdentity -> DEBU 4ee9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.363 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4eea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:20.363 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eeb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eec Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.364 UTC [policies] Evaluate -> DEBU 4eed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.364 UTC [policies] Evaluate -> DEBU 4eee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:20.364 UTC [policies] Evaluate -> DEBU 4eef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.365 UTC [cauthdsl] func1 -> DEBU 4ef0 0xc0034c7380 gate 1555913900365474100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.365 UTC [cauthdsl] func2 -> DEBU 4ef1 0xc0034c7380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.365 UTC [cauthdsl] func2 -> DEBU 4ef2 0xc0034c7380 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.366 UTC [cauthdsl] func2 -> DEBU 4ef3 0xc0034c7380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:20.366 UTC [cauthdsl] func2 -> DEBU 4ef4 0xc0034c7380 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.366 UTC [cauthdsl] func1 -> DEBU 4ef5 0xc0034c7380 gate 1555913900365474100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.366 UTC [policies] Evaluate -> DEBU 4ef6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.367 UTC [policies] Evaluate -> DEBU 4ef7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.367 UTC [policies] Evaluate -> DEBU 4ef8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.367 UTC [cauthdsl] func1 -> DEBU 4ef9 0xc0034c7bc0 gate 1555913900367485100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.367 UTC [cauthdsl] func2 -> DEBU 4efa 0xc0034c7bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.367 UTC [cauthdsl] func2 -> DEBU 4efb 0xc0034c7bc0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.368 UTC [cauthdsl] func2 -> DEBU 4efc 0xc0034c7bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.368 UTC [msp.identity] Verify -> DEBU 4efd Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:20.368 UTC [msp.identity] Verify -> DEBU 4efe Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:20.369 UTC [cauthdsl] func2 -> DEBU 4eff 0xc0034c7bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.369 UTC [gossip.comm] func1 -> DEBU 4f00 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.370 UTC [gossip.comm] func1 -> DEBU 4f01 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.371 UTC [cauthdsl] func1 -> DEBU 4f02 0xc0034c7bc0 gate 1555913900367485100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:20.371 UTC [policies] Evaluate -> DEBU 4f03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.371 UTC [policies] Evaluate -> DEBU 4f04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.371 UTC [policies] Evaluate -> DEBU 4f05 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.372 UTC [policies] Evaluate -> DEBU 4f06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.372 UTC [msp] DeserializeIdentity -> DEBU 4f07 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.373 UTC [msp] DeserializeIdentity -> DEBU 4f08 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.373 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:20.374 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f0a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.374 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f0b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.374 UTC [policies] Evaluate -> DEBU 4f0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.374 UTC [policies] Evaluate -> DEBU 4f0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:20.374 UTC [policies] Evaluate -> DEBU 4f0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.375 UTC [cauthdsl] func1 -> DEBU 4f0f 0xc0034d9390 gate 1555913900375097600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.375 UTC [cauthdsl] func2 -> DEBU 4f10 0xc0034d9390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.375 UTC [cauthdsl] func2 -> DEBU 4f11 0xc0034d9390 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.376 UTC [cauthdsl] func2 -> DEBU 4f12 0xc0034d9390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:20.376 UTC [cauthdsl] func2 -> DEBU 4f13 0xc0034d9390 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.377 UTC [cauthdsl] func1 -> DEBU 4f14 0xc0034d9390 gate 1555913900375097600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.378 UTC [policies] Evaluate -> DEBU 4f15 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.378 UTC [policies] Evaluate -> DEBU 4f16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.378 UTC [policies] Evaluate -> DEBU 4f17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.378 UTC [cauthdsl] func1 -> DEBU 4f18 0xc0034d9bd0 gate 1555913900378747500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.379 UTC [cauthdsl] func2 -> DEBU 4f19 0xc0034d9bd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.379 UTC [cauthdsl] func2 -> DEBU 4f1a 0xc0034d9bd0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.380 UTC [cauthdsl] func2 -> DEBU 4f1b 0xc0034d9bd0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.380 UTC [msp.identity] Verify -> DEBU 4f1c Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:20.381 UTC [msp.identity] Verify -> DEBU 4f1d Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:20.382 UTC [cauthdsl] func2 -> DEBU 4f1e 0xc0034d9bd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.383 UTC [cauthdsl] func1 -> DEBU 4f1f 0xc0034d9bd0 gate 1555913900378747500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:20.383 UTC [policies] Evaluate -> DEBU 4f20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.384 UTC [policies] Evaluate -> DEBU 4f21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.384 UTC [policies] Evaluate -> DEBU 4f22 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.385 UTC [policies] Evaluate -> DEBU 4f23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.385 UTC [gossip.gossip] handleMessage -> DEBU 4f24 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.386 UTC [gossip.gossip] handleMessage -> DEBU 4f25 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.386 UTC [msp] DeserializeIdentity -> DEBU 4f26 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.387 UTC [msp] DeserializeIdentity -> DEBU 4f27 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.387 UTC [msp] DeserializeIdentity -> DEBU 4f28 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.388 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:20.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f2a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f2b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.388 UTC [policies] Evaluate -> DEBU 4f2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.388 UTC [policies] Evaluate -> DEBU 4f2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:20.388 UTC [policies] Evaluate -> DEBU 4f2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func1 -> DEBU 4f2f 0xc0042dd6e0 gate 1555913900389008200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f30 0xc0042dd6e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f31 0xc0042dd6e0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f32 0xc0042dd6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f33 0xc0042dd6e0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func1 -> DEBU 4f34 0xc0042dd6e0 gate 1555913900389008200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [policies] Evaluate -> DEBU 4f35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [policies] Evaluate -> DEBU 4f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [policies] Evaluate -> DEBU 4f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func1 -> DEBU 4f38 0xc0042ddf20 gate 1555913900389345100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f39 0xc0042ddf20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f3a 0xc0042ddf20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f3b 0xc0042ddf20 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [msp.identity] Verify -> DEBU 4f3c Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:20.389 UTC [msp.identity] Verify -> DEBU 4f3d Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:20.390 UTC [cauthdsl] func2 -> DEBU 4f3e 0xc0042ddf20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.390 UTC [cauthdsl] func1 -> DEBU 4f3f 0xc0042ddf20 gate 1555913900389345100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f42 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.392 UTC [msp.identity] Verify -> DEBU 4f44 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:20.392 UTC [msp.identity] Verify -> DEBU 4f45 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:20.393 UTC [msp.identity] Verify -> DEBU 4f46 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:20.393 UTC [msp.identity] Verify -> DEBU 4f47 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:20.393 UTC [msp] DeserializeIdentity -> DEBU 4f48 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.394 UTC [msp] DeserializeIdentity -> DEBU 4f49 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f4b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f4c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [policies] Evaluate -> DEBU 4f4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [policies] Evaluate -> DEBU 4f4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [policies] Evaluate -> DEBU 4f4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [cauthdsl] func1 -> DEBU 4f50 0xc004316530 gate 1555913900395386200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [cauthdsl] func2 -> DEBU 4f51 0xc004316530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [cauthdsl] func2 -> DEBU 4f52 0xc004316530 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.395 UTC [cauthdsl] func2 -> DEBU 4f53 0xc004316530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:20.396 UTC [cauthdsl] func2 -> DEBU 4f54 0xc004316530 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.396 UTC [cauthdsl] func1 -> DEBU 4f55 0xc004316530 gate 1555913900395386200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [policies] Evaluate -> DEBU 4f56 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [policies] Evaluate -> DEBU 4f57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [policies] Evaluate -> DEBU 4f58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [cauthdsl] func1 -> DEBU 4f59 0xc004316d70 gate 1555913900397631500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [cauthdsl] func2 -> DEBU 4f5a 0xc004316d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [cauthdsl] func2 -> DEBU 4f5b 0xc004316d70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [cauthdsl] func2 -> DEBU 4f5c 0xc004316d70 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [msp.identity] Verify -> DEBU 4f5d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:20.397 UTC [msp.identity] Verify -> DEBU 4f5e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:20.398 UTC [cauthdsl] func2 -> DEBU 4f5f 0xc004316d70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.398 UTC [cauthdsl] func1 -> DEBU 4f60 0xc004316d70 gate 1555913900397631500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:20.398 UTC [policies] Evaluate -> DEBU 4f61 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.398 UTC [policies] Evaluate -> DEBU 4f62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.399 UTC [policies] Evaluate -> DEBU 4f63 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.400 UTC [policies] Evaluate -> DEBU 4f64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.400 UTC [gossip.gossip] handleMessage -> DEBU 4f65 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.401 UTC [gossip.gossip] handleMessage -> DEBU 4f66 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.402 UTC [msp] DeserializeIdentity -> DEBU 4f67 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.402 UTC [msp] DeserializeIdentity -> DEBU 4f68 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.402 UTC [msp] DeserializeIdentity -> DEBU 4f69 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.403 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:20.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f6b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f6c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.403 UTC [policies] Evaluate -> DEBU 4f6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.403 UTC [policies] Evaluate -> DEBU 4f6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:20.403 UTC [policies] Evaluate -> DEBU 4f6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.404 UTC [cauthdsl] func1 -> DEBU 4f70 0xc004324880 gate 1555913900403979600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.406 UTC [cauthdsl] func2 -> DEBU 4f71 0xc004324880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.407 UTC [cauthdsl] func2 -> DEBU 4f72 0xc004324880 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.408 UTC [cauthdsl] func2 -> DEBU 4f73 0xc004324880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f74 0xc004324880 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [cauthdsl] func1 -> DEBU 4f75 0xc004324880 gate 1555913900403979600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [policies] Evaluate -> DEBU 4f76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [policies] Evaluate -> DEBU 4f77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [policies] Evaluate -> DEBU 4f78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [cauthdsl] func1 -> DEBU 4f79 0xc0043250c0 gate 1555913900409301400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f7a 0xc0043250c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f7b 0xc0043250c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f7c 0xc0043250c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [msp.identity] Verify -> DEBU 4f7d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:20.409 UTC [msp.identity] Verify -> DEBU 4f7e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:20.412 UTC [cauthdsl] func2 -> DEBU 4f7f 0xc0043250c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.412 UTC [cauthdsl] func1 -> DEBU 4f80 0xc0043250c0 gate 1555913900409301400 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:20.412 UTC [policies] Evaluate -> DEBU 4f81 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.413 UTC [policies] Evaluate -> DEBU 4f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.413 UTC [policies] Evaluate -> DEBU 4f83 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.413 UTC [policies] Evaluate -> DEBU 4f84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.414 UTC [msp.identity] Verify -> DEBU 4f85 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:20.414 UTC [msp.identity] Verify -> DEBU 4f86 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:20.415 UTC [msp.identity] Verify -> DEBU 4f87 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:20.415 UTC [msp.identity] Verify -> DEBU 4f88 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:20.415 UTC [msp] DeserializeIdentity -> DEBU 4f89 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.416 UTC [msp] DeserializeIdentity -> DEBU 4f8a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f8c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f8d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [cauthdsl] func1 -> DEBU 4f91 0xc0043396d0 gate 1555913900417707300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f92 0xc0043396d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f93 0xc0043396d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f94 0xc0043396d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f95 0xc0043396d0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [cauthdsl] func1 -> DEBU 4f96 0xc0043396d0 gate 1555913900417707300 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f97 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4f99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [cauthdsl] func1 -> DEBU 4f9a 0xc004339f10 gate 1555913900418046100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4f9b 0xc004339f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4f9c 0xc004339f10 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4f9d 0xc004339f10 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [msp.identity] Verify -> DEBU 4f9e Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [msp.identity] Verify -> DEBU 4f9f Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4fa0 0xc004339f10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [cauthdsl] func1 -> DEBU 4fa1 0xc004339f10 gate 1555913900418046100 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:20.418 UTC [gossip.gossip] handleMessage -> DEBU 4fa6 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.503 UTC [msp] DeserializeIdentity -> DEBU 4fa7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.504 UTC [msp] DeserializeIdentity -> DEBU 4fa8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.504 UTC [gossip.pull] Hello -> DEBU 4fa9 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:20.504 UTC [msp] DeserializeIdentity -> DEBU 4faa Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.504 UTC [msp] DeserializeIdentity -> DEBU 4fab Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.504 UTC [gossip.comm] Send -> DEBU 4fac Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:20.504 UTC [gossip.comm] sendToEndpoint -> DEBU 4fad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.505 UTC [gossip.comm] sendToEndpoint -> DEBU 4fae Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.506 UTC [gossip.comm] func1 -> DEBU 4faf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10663997115154472173 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 8 4 5 6 7], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.507 UTC [gossip.gossip] handleMessage -> DEBU 4fb0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10663997115154472173 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 8 4 5 6 7], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.507 UTC [gossip.pull] HandleMessage -> DEBU 4fb1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10663997115154472173 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 8 4 5 6 7], Envelope: 61 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.508 UTC [gossip.gossip] handleMessage -> DEBU 4fb2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.616 UTC [gossip.comm] func1 -> DEBU 4fb3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.616 UTC [gossip.gossip] handleMessage -> DEBU 4fb4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.617 UTC [msp] DeserializeIdentity -> DEBU 4fb5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.617 UTC [msp] DeserializeIdentity -> DEBU 4fb6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.617 UTC [gossip.gossip] handleMessage -> DEBU 4fb7 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.678 UTC [gossip.comm] func1 -> DEBU 4fb8 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.678 UTC [gossip.gossip] handleMessage -> DEBU 4fb9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.678 UTC [gossip.pull] HandleMessage -> DEBU 4fba GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.679 UTC [gossip.pull] SendDigest -> DEBU 4fbb Sending BLOCK_MSG digest: [2 4 7 9 1 3 5 6 8] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:20.679 UTC [gossip.gossip] handleMessage -> DEBU 4fbc Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.812 UTC [msp.identity] Sign -> DEBU 4fbd Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151040 " +peer0.org1.example.com | "2019-04-22 06:18:20.812 UTC [msp.identity] Sign -> DEBU 4fbe Sign: digest: FC3675D4BE6D825AEA8E4403D8BC180846A597CDBADB110A3A3C6B060B2F4940 " +peer0.org1.example.com | "2019-04-22 06:18:20.813 UTC [msp.identity] Sign -> DEBU 4fbf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:20.813 UTC [msp.identity] Sign -> DEBU 4fc0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:20.813 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4fc1 Sleeping 5s" +peer0.org1.example.com | "2019-04-22 06:18:20.820 UTC [msp] DeserializeIdentity -> DEBU 4fc2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.821 UTC [msp] DeserializeIdentity -> DEBU 4fc3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.822 UTC [msp] DeserializeIdentity -> DEBU 4fc4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.822 UTC [gossip.comm] Send -> DEBU 4fc5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:20.823 UTC [gossip.comm] Send -> DEBU 4fc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:20.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4fc7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4fc8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.824 UTC [msp] DeserializeIdentity -> DEBU 4fc9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.826 UTC [gossip.comm] Send -> DEBU 4fca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:20.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4fcb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.830 UTC [gossip.comm] sendToEndpoint -> DEBU 4fcc Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.829 UTC [gossip.comm] sendToEndpoint -> DEBU 4fcd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.836 UTC [gossip.comm] func1 -> DEBU 4fce Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.837 UTC [gossip.gossip] handleMessage -> DEBU 4fcf Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:20.838 UTC [msp] DeserializeIdentity -> DEBU 4fd0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.838 UTC [msp] DeserializeIdentity -> DEBU 4fd1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.839 UTC [msp] DeserializeIdentity -> DEBU 4fd2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:20.839 UTC [gossip.gossip] handleMessage -> DEBU 4fd3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.834 UTC [gossip.comm] sendToEndpoint -> DEBU 4fd4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:20.977 UTC [endorser] ProcessProposal -> DEBU 4fd5 Entering: request from 192.168.224.9:49444" +peer0.org1.example.com | "2019-04-22 06:18:20.978 UTC [protoutils] ValidateProposalMessage -> DEBU 4fd6 ValidateProposalMessage starts for signed proposal 0xc002828780" +peer0.org1.example.com | "2019-04-22 06:18:20.978 UTC [protoutils] validateChannelHeader -> DEBU 4fd7 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:18:20.978 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fd8 begin" +peer0.org1.example.com | "2019-04-22 06:18:20.978 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fd9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:18:20.978 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fda creator is valid" +peer0.org1.example.com | "2019-04-22 06:18:20.978 UTC [msp.identity] Verify -> DEBU 4fdb Verify: digest = 00000000 d5 3f 34 b5 74 7c 49 46 70 63 9f 60 a0 e2 4b 91 |.?4.t|IFpc.`..K.| +peer0.org1.example.com | 00000010 34 06 9f 63 b6 e4 ad 56 79 fe 81 15 d6 9e b8 9a |4..c...Vy.......|" +peer0.org1.example.com | "2019-04-22 06:18:20.978 UTC [msp.identity] Verify -> DEBU 4fdc Verify: sig = 00000000 30 45 02 21 00 aa da 5c 28 0f fc ef de 1e ed 00 |0E.!...\(.......| +peer0.org1.example.com | 00000010 c8 b0 7a 38 d3 d5 f0 0c f1 29 83 b9 27 cc ac f0 |..z8.....)..'...| +peer0.org1.example.com | 00000020 1a 97 07 d4 7c 02 20 53 59 02 29 27 4f 85 37 89 |....|. SY.)'O.7.| +peer0.org1.example.com | 00000030 39 63 d1 ac 81 c8 51 22 cf e3 6f f6 b7 71 6c bd |9c....Q"..o..ql.| +peer0.org1.example.com | 00000040 cd fb db 8e f3 bd 7a |......z|" +peer0.org1.example.com | "2019-04-22 06:18:20.979 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fdd exits successfully" +peer0.org1.example.com | "2019-04-22 06:18:20.979 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4fde validateChaincodeProposalMessage starts for proposal 0xc003f113b0, header 0xc002828b90" +peer0.org1.example.com | "2019-04-22 06:18:20.979 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4fdf validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:18:20.979 UTC [endorser] preProcess -> DEBU 4fe0 [][edd58b23] processing txid: edd58b23ab5e847144c0c1b336b8277680414504b7f73682303956fc3233f370" +peer0.org1.example.com | "2019-04-22 06:18:20.979 UTC [endorser] SimulateProposal -> DEBU 4fe1 [][edd58b23] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:18:20.979 UTC [endorser] callChaincode -> INFO 4fe2 [][edd58b23] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:18:20.979 UTC [chaincode] Execute -> DEBU 4fe3 Entry" +peer0.org1.example.com | "2019-04-22 06:18:20.980 UTC [cscc] Invoke -> DEBU 4fe4 Invoke function: GetChannels" +peer0.org1.example.com | "2019-04-22 06:18:20.980 UTC [msp.identity] Verify -> DEBU 4fe5 Verify: digest = 00000000 d5 3f 34 b5 74 7c 49 46 70 63 9f 60 a0 e2 4b 91 |.?4.t|IFpc.`..K.| +peer0.org1.example.com | 00000010 34 06 9f 63 b6 e4 ad 56 79 fe 81 15 d6 9e b8 9a |4..c...Vy.......|" +peer0.org1.example.com | "2019-04-22 06:18:20.980 UTC [msp.identity] Verify -> DEBU 4fe6 Verify: sig = 00000000 30 45 02 21 00 aa da 5c 28 0f fc ef de 1e ed 00 |0E.!...\(.......| +peer0.org1.example.com | 00000010 c8 b0 7a 38 d3 d5 f0 0c f1 29 83 b9 27 cc ac f0 |..z8.....)..'...| +peer0.org1.example.com | 00000020 1a 97 07 d4 7c 02 20 53 59 02 29 27 4f 85 37 89 |....|. SY.)'O.7.| +peer0.org1.example.com | 00000030 39 63 d1 ac 81 c8 51 22 cf e3 6f f6 b7 71 6c bd |9c....Q"..o..ql.| +peer0.org1.example.com | 00000040 cd fb db 8e f3 bd 7a |......z|" +peer0.org1.example.com | "2019-04-22 06:18:20.981 UTC [chaincode] handleMessage -> DEBU 4fe7 [edd58b23] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:18:20.981 UTC [chaincode] Notify -> DEBU 4fe8 [edd58b23] notifying Txid:edd58b23ab5e847144c0c1b336b8277680414504b7f73682303956fc3233f370, channelID:" +peer0.org1.example.com | "2019-04-22 06:18:20.981 UTC [chaincode] Execute -> DEBU 4fe9 Exit" +peer0.org1.example.com | "2019-04-22 06:18:20.981 UTC [endorser] callChaincode -> INFO 4fea [][edd58b23] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:18:20.981 UTC [endorser] SimulateProposal -> DEBU 4feb [][edd58b23] Exit" +peer0.org1.example.com | "2019-04-22 06:18:20.981 UTC [endorser] func1 -> DEBU 4fec Exit: request from 192.168.224.9:49444" +peer0.org1.example.com | "2019-04-22 06:18:20.981 UTC [comm.grpc.server] 1 -> INFO 4fed unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49444 grpc.code=OK grpc.call_duration=4.1283ms +peer0.org1.example.com | "2019-04-22 06:18:20.985 UTC [grpc] warningf -> DEBU 4fee transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49444: read: connection reset by peer" +peer0.org1.example.com | "2019-04-22 06:18:20.986 UTC [grpc] infof -> DEBU 4fef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:21.050 UTC [gossip.comm] func1 -> DEBU 4ff0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.052 UTC [gossip.gossip] handleMessage -> DEBU 4ff1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.052 UTC [msp] DeserializeIdentity -> DEBU 4ff2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.052 UTC [msp] DeserializeIdentity -> DEBU 4ff3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.053 UTC [msp] DeserializeIdentity -> DEBU 4ff4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.053 UTC [gossip.gossip] handleMessage -> DEBU 4ff5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.094 UTC [gossip.comm] func1 -> DEBU 4ff6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.098 UTC [gossip.gossip] handleMessage -> DEBU 4ff7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.098 UTC [gossip.comm] func1 -> DEBU 4ff8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.098 UTC [gossip.gossip] handleMessage -> DEBU 4ff9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.098 UTC [gossip.gossip] handleMessage -> DEBU 4ffa Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ffb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ffc Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:21.099 UTC [msp.identity] Verify -> DEBU 4ffd Verify: digest = 00000000 22 63 91 aa f6 69 f0 83 99 6c 11 14 38 e1 e9 55 |"c...i...l..8..U| +peer0.org1.example.com | 00000010 4c ab 4f f4 25 56 b4 2f c2 cb c8 ee 8e 8b 4f 29 |L.O.%V./......O)|" +peer0.org1.example.com | "2019-04-22 06:18:21.100 UTC [msp.identity] Verify -> DEBU 4ffe Verify: sig = 00000000 30 45 02 21 00 bd 52 06 26 d2 eb 00 88 04 15 06 |0E.!..R.&.......| +peer0.org1.example.com | 00000010 e0 e2 46 d8 f3 dd 84 0e 54 1b 8c b8 fd 98 c3 0c |..F.....T.......| +peer0.org1.example.com | 00000020 bc be 28 65 80 02 20 2d dd 63 85 1f 0b db 49 1c |..(e.. -.c....I.| +peer0.org1.example.com | 00000030 dc 96 66 ed 56 9d 78 e1 de cd 7b 5d e8 83 bd 38 |..f.V.x...{]...8| +peer0.org1.example.com | 00000040 5a dc fe b4 01 16 8c |Z......|" +peer0.org1.example.com | "2019-04-22 06:18:21.100 UTC [msp.identity] Verify -> DEBU 4fff Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:21.100 UTC [msp.identity] Verify -> DEBU 5000 Verify: sig = 00000000 30 45 02 21 00 f5 56 89 a6 61 29 27 fe 2f 1a 81 |0E.!..V..a)'./..| +peer0.org1.example.com | 00000010 6a 88 87 4e 3b 2e 7c 0b 78 6f 3f 77 46 81 f8 2d |j..N;.|.xo?wF..-| +peer0.org1.example.com | 00000020 c2 8e 22 18 74 02 20 15 8d b3 f7 70 34 dc e6 0a |..".t. ....p4...| +peer0.org1.example.com | 00000030 14 40 df 7f 1e 23 5b b8 68 eb 4a 60 02 72 7a 8c |.@...#[.h.J`.rz.| +peer0.org1.example.com | 00000040 77 d9 d0 65 39 ee b3 |w..e9..|" +peer0.org1.example.com | "2019-04-22 06:18:21.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 5001 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.101 UTC [gossip.discovery] learnExistingMembers -> DEBU 5002 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:21.102 UTC [gossip.discovery] learnExistingMembers -> DEBU 5003 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 " +peer0.org1.example.com | "2019-04-22 06:18:21.102 UTC [gossip.discovery] learnExistingMembers -> DEBU 5004 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 " +peer0.org1.example.com | "2019-04-22 06:18:21.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 5005 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:21.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 5006 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 5007 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5008 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.106 UTC [gossip.comm] func1 -> DEBU 5009 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.107 UTC [gossip.gossip] handleMessage -> DEBU 500c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.107 UTC [gossip.gossip] handleMessage -> DEBU 500d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.108 UTC [gossip.gossip] handleMessage -> DEBU 5010 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.108 UTC [msp] DeserializeIdentity -> DEBU 5011 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.108 UTC [msp] DeserializeIdentity -> DEBU 5012 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.108 UTC [msp] DeserializeIdentity -> DEBU 5013 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.109 UTC [gossip.comm] Send -> DEBU 5014 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:21.109 UTC [msp] DeserializeIdentity -> DEBU 5015 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.109 UTC [gossip.comm] Send -> DEBU 5016 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:21.109 UTC [gossip.comm] sendToEndpoint -> DEBU 5017 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.109 UTC [gossip.comm] sendToEndpoint -> DEBU 5018 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.109 UTC [gossip.comm] sendToEndpoint -> DEBU 5019 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.110 UTC [gossip.comm] sendToEndpoint -> DEBU 501a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.445 UTC [gossip.election] waitForInterrupt -> DEBU 501b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.445 UTC [gossip.election] IsLeader -> DEBU 501c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +peer0.org1.example.com | "2019-04-22 06:18:21.446 UTC [msp.identity] Sign -> DEBU 501d Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510151801 " +peer0.org1.example.com | "2019-04-22 06:18:21.446 UTC [msp.identity] Sign -> DEBU 501e Sign: digest: 23EB0AA6B5CB21FAA30A44FFE1E215A5431ABF102667FE23BDFAFC94DB9509A4 " +peer0.org1.example.com | "2019-04-22 06:18:21.446 UTC [gossip.election] waitForInterrupt -> DEBU 501f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +peer0.org1.example.com | "2019-04-22 06:18:21.455 UTC [msp] DeserializeIdentity -> DEBU 5020 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.456 UTC [msp] DeserializeIdentity -> DEBU 5021 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.456 UTC [msp] DeserializeIdentity -> DEBU 5022 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.458 UTC [msp] DeserializeIdentity -> DEBU 5023 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.459 UTC [gossip.comm] Send -> DEBU 5024 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:21.461 UTC [msp] DeserializeIdentity -> DEBU 5025 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.461 UTC [gossip.comm] sendToEndpoint -> DEBU 5026 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.461 UTC [gossip.comm] sendToEndpoint -> DEBU 5027 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.462 UTC [msp] DeserializeIdentity -> DEBU 5028 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.585 UTC [gossip.comm] func1 -> DEBU 5029 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.585 UTC [gossip.gossip] handleMessage -> DEBU 502a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.585 UTC [gossip.gossip] handleMessage -> DEBU 502b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 502c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 502d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:21.585 UTC [msp] DeserializeIdentity -> DEBU 502e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 502f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5030 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5031 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [policies] Evaluate -> DEBU 5032 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [policies] Evaluate -> DEBU 5033 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [policies] Evaluate -> DEBU 5034 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [cauthdsl] func1 -> DEBU 5035 0xc0028b7400 gate 1555913901586743700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5036 0xc0028b7400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5037 0xc0028b7400 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5038 0xc0028b7400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5039 0xc0028b7400 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [cauthdsl] func1 -> DEBU 503a 0xc0028b7400 gate 1555913901586743700 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 503b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 503c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 503d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [cauthdsl] func1 -> DEBU 503e 0xc0028b7c40 gate 1555913901587203500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 503f 0xc0028b7c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 5040 0xc0028b7c40 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 5041 0xc0028b7c40 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [msp.identity] Verify -> DEBU 5042 Verify: digest = 00000000 8c eb 72 fa 07 0b c9 a4 b2 79 cc 10 44 a6 2c 45 |..r......y..D.,E| +peer0.org1.example.com | 00000010 dd f8 7d 71 ba d3 d9 fd 80 53 a2 e5 e1 57 19 05 |..}q.....S...W..|" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [msp.identity] Verify -> DEBU 5043 Verify: sig = 00000000 30 44 02 20 1e 55 d9 17 42 23 5b 31 01 76 cb 6b |0D. .U..B#[1.v.k| +peer0.org1.example.com | 00000010 d8 89 c5 97 db 94 07 b8 42 f7 8d 51 4d 26 0c 68 |........B..QM&.h| +peer0.org1.example.com | 00000020 f3 83 2a 14 02 20 10 5e 70 f1 47 57 45 6f 32 79 |..*.. .^p.GWEo2y| +peer0.org1.example.com | 00000030 15 b1 26 29 59 d1 27 1f 40 eb 0b 90 f2 fc 3d b7 |..&)Y.'.@.....=.| +peer0.org1.example.com | 00000040 34 18 d6 b0 25 0c |4...%.|" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 5044 0xc0028b7c40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [cauthdsl] func1 -> DEBU 5045 0xc0028b7c40 gate 1555913901587203500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5046 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5047 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5048 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5049 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 504a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 504b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:21.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 504c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 " +peer0.org1.example.com | "2019-04-22 06:18:21.601 UTC [gossip.discovery] learnExistingMembers -> DEBU 504d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 " +peer0.org1.example.com | "2019-04-22 06:18:21.602 UTC [gossip.discovery] learnExistingMembers -> DEBU 504e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.discovery] learnExistingMembers -> DEBU 504f Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.discovery] handleAliveMessage -> DEBU 5050 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5051 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.comm] func1 -> DEBU 5052 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.gossip] handleMessage -> DEBU 5053 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.gossip] handleMessage -> DEBU 5054 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5055 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5056 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 5057 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 5058 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 5059 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 505a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 505b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 505c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.604 UTC [gossip.comm] Send -> DEBU 505d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:21.605 UTC [msp] DeserializeIdentity -> DEBU 505e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.605 UTC [msp] DeserializeIdentity -> DEBU 505f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.605 UTC [gossip.comm] sendToEndpoint -> DEBU 5060 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.605 UTC [gossip.comm] sendToEndpoint -> DEBU 5061 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.606 UTC [gossip.comm] Send -> DEBU 5062 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:21.606 UTC [gossip.comm] sendToEndpoint -> DEBU 5063 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.606 UTC [gossip.comm] sendToEndpoint -> DEBU 5064 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.615 UTC [gossip.comm] func1 -> DEBU 5065 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.615 UTC [gossip.gossip] handleMessage -> DEBU 5066 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.615 UTC [gossip.gossip] handleMessage -> DEBU 5067 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5068 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5069 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:21.946 UTC [endorser] ProcessProposal -> DEBU 506a Entering: request from 192.168.224.9:49452" +peer0.org1.example.com | "2019-04-22 06:18:21.946 UTC [protoutils] ValidateProposalMessage -> DEBU 506b ValidateProposalMessage starts for signed proposal 0xc0028aaaa0" +peer0.org1.example.com | "2019-04-22 06:18:21.947 UTC [protoutils] validateChannelHeader -> DEBU 506c validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-04-22 06:18:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 506d begin" +peer0.org1.example.com | "2019-04-22 06:18:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 506e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +peer0.org1.example.com | "2019-04-22 06:18:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 506f creator is valid" +peer0.org1.example.com | "2019-04-22 06:18:21.947 UTC [msp.identity] Verify -> DEBU 5070 Verify: digest = 00000000 28 9c 6b f7 87 8c d8 7e af b0 20 dc 2c 1a 67 d6 |(.k....~.. .,.g.| +peer0.org1.example.com | 00000010 dd f4 d3 69 30 65 b6 7b f1 a5 9a 00 10 97 81 f9 |...i0e.{........|" +peer0.org1.example.com | "2019-04-22 06:18:21.948 UTC [msp.identity] Verify -> DEBU 5071 Verify: sig = 00000000 30 44 02 20 02 4a 9e 01 37 bd 96 3e 8a 1e ca 6a |0D. .J..7..>...j| +peer0.org1.example.com | 00000010 4b 4d 92 54 a4 f6 9c 03 4b 54 f5 ce b3 b3 19 95 |KM.T....KT......| +peer0.org1.example.com | 00000020 fc 88 17 90 02 20 46 f7 0f 58 9f 10 c8 2d cd b5 |..... F..X...-..| +peer0.org1.example.com | 00000030 ee ba 3a 1e f5 d9 b7 c9 3b 24 f9 23 f8 4d e9 55 |..:.....;$.#.M.U| +peer0.org1.example.com | 00000040 be 02 dd b4 30 bc |....0.|" +peer0.org1.example.com | "2019-04-22 06:18:21.949 UTC [protoutils] checkSignatureFromCreator -> DEBU 5072 exits successfully" +peer0.org1.example.com | "2019-04-22 06:18:21.950 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5073 validateChaincodeProposalMessage starts for proposal 0xc00289a700, header 0xc0028aaeb0" +peer0.org1.example.com | "2019-04-22 06:18:21.950 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5074 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:18:21.950 UTC [endorser] preProcess -> DEBU 5075 [][cc3ea70d] processing txid: cc3ea70dc71aefa20425ee57f935225230a145c14a8a566d693b68757d56856b" +peer0.org1.example.com | "2019-04-22 06:18:21.951 UTC [endorser] SimulateProposal -> DEBU 5076 [][cc3ea70d] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:18:21.951 UTC [endorser] callChaincode -> INFO 5077 [][cc3ea70d] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:18:21.951 UTC [chaincode] Execute -> DEBU 5078 Entry" +peer0.org1.example.com | "2019-04-22 06:18:21.952 UTC [qscc] Invoke -> DEBU 5079 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-04-22 06:18:21.952 UTC [aclmgmt] CheckACL -> DEBU 507a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-04-22 06:18:21.952 UTC [aclmgmt] CheckACL -> DEBU 507b acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-04-22 06:18:21.952 UTC [policies] Evaluate -> DEBU 507c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:21.953 UTC [policies] Evaluate -> DEBU 507d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:21.953 UTC [policies] Evaluate -> DEBU 507e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:21.954 UTC [msp] DeserializeIdentity -> DEBU 507f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:21.954 UTC [msp.identity] newIdentity -> DEBU 5080 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +peer0.org1.example.com | WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +peer0.org1.example.com | cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +peer0.org1.example.com | gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +peer0.org1.example.com | l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +peer0.org1.example.com | VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +peer0.org1.example.com | zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +peer0.org1.example.com | 1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-04-22 06:18:21.955 UTC [cauthdsl] func1 -> DEBU 5081 0xc00402ccb0 gate 1555913901954983700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:21.955 UTC [cauthdsl] func2 -> DEBU 5082 0xc00402ccb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:21.955 UTC [cauthdsl] func2 -> DEBU 5083 0xc00402ccb0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:21.955 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5084 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-04-22 06:18:21.955 UTC [msp] Validate -> DEBU 5085 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-04-22 06:18:21.956 UTC [msp] getCertificationChain -> DEBU 5086 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-04-22 06:18:21.956 UTC [cauthdsl] func2 -> DEBU 5087 0xc00402ccb0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:21.956 UTC [msp.identity] Verify -> DEBU 5088 Verify: digest = 00000000 28 9c 6b f7 87 8c d8 7e af b0 20 dc 2c 1a 67 d6 |(.k....~.. .,.g.| +peer0.org1.example.com | 00000010 dd f4 d3 69 30 65 b6 7b f1 a5 9a 00 10 97 81 f9 |...i0e.{........|" +peer0.org1.example.com | "2019-04-22 06:18:21.957 UTC [msp.identity] Verify -> DEBU 5089 Verify: sig = 00000000 30 44 02 20 02 4a 9e 01 37 bd 96 3e 8a 1e ca 6a |0D. .J..7..>...j| +peer0.org1.example.com | 00000010 4b 4d 92 54 a4 f6 9c 03 4b 54 f5 ce b3 b3 19 95 |KM.T....KT......| +peer0.org1.example.com | 00000020 fc 88 17 90 02 20 46 f7 0f 58 9f 10 c8 2d cd b5 |..... F..X...-..| +peer0.org1.example.com | 00000030 ee ba 3a 1e f5 d9 b7 c9 3b 24 f9 23 f8 4d e9 55 |..:.....;$.#.M.U| +peer0.org1.example.com | 00000040 be 02 dd b4 30 bc |....0.|" +peer0.org1.example.com | "2019-04-22 06:18:21.957 UTC [cauthdsl] func2 -> DEBU 508a 0xc00402ccb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:21.957 UTC [cauthdsl] func1 -> DEBU 508b 0xc00402ccb0 gate 1555913901954983700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:21.957 UTC [policies] Evaluate -> DEBU 508c Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.958 UTC [policies] Evaluate -> DEBU 508d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.958 UTC [policies] Evaluate -> DEBU 508e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.958 UTC [policies] Evaluate -> DEBU 508f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:21.958 UTC [chaincode] handleMessage -> DEBU 5090 [cc3ea70d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-04-22 06:18:21.959 UTC [chaincode] Notify -> DEBU 5091 [cc3ea70d] notifying Txid:cc3ea70dc71aefa20425ee57f935225230a145c14a8a566d693b68757d56856b, channelID:" +peer0.org1.example.com | "2019-04-22 06:18:21.960 UTC [chaincode] Execute -> DEBU 5092 Exit" +peer0.org1.example.com | "2019-04-22 06:18:21.961 UTC [endorser] callChaincode -> INFO 5093 [][cc3ea70d] Exit chaincode: name:"qscc" (9ms)" +peer0.org1.example.com | "2019-04-22 06:18:21.961 UTC [endorser] SimulateProposal -> DEBU 5094 [][cc3ea70d] Exit" +peer0.org1.example.com | "2019-04-22 06:18:21.962 UTC [endorser] func1 -> DEBU 5095 Exit: request from 192.168.224.9:49452" +peer0.org1.example.com | "2019-04-22 06:18:21.962 UTC [comm.grpc.server] 1 -> INFO 5096 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49452 grpc.code=OK grpc.call_duration=16.2453ms +peer0.org1.example.com | "2019-04-22 06:18:21.967 UTC [grpc] warningf -> DEBU 5097 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49452: read: connection reset by peer" +peer0.org1.example.com | "2019-04-22 06:18:21.968 UTC [grpc] infof -> DEBU 5098 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-04-22 06:18:21.996 UTC [gossip.comm] func1 -> DEBU 5099 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.999 UTC [gossip.gossip] handleMessage -> DEBU 509a Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:21.999 UTC [gossip.gossip] handleMessage -> DEBU 509b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.000 UTC [gossip.discovery] handleMsgFromComm -> DEBU 509c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.000 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 509d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:22.000 UTC [msp] DeserializeIdentity -> DEBU 509e Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.001 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 509f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:22.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:22.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:22.002 UTC [policies] Evaluate -> DEBU 50a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:22.002 UTC [policies] Evaluate -> DEBU 50a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:22.002 UTC [policies] Evaluate -> DEBU 50a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:22.002 UTC [cauthdsl] func1 -> DEBU 50a5 0xc0040430d0 gate 1555913902002733100 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:22.002 UTC [cauthdsl] func2 -> DEBU 50a6 0xc0040430d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:22.004 UTC [cauthdsl] func2 -> DEBU 50a7 0xc0040430d0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:22.004 UTC [cauthdsl] func2 -> DEBU 50a8 0xc0040430d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:22.004 UTC [cauthdsl] func2 -> DEBU 50a9 0xc0040430d0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:22.005 UTC [cauthdsl] func1 -> DEBU 50aa 0xc0040430d0 gate 1555913902002733100 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:22.006 UTC [gossip.comm] func1 -> DEBU 50ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.006 UTC [gossip.gossip] handleMessage -> DEBU 50ac Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.007 UTC [gossip.comm] func1 -> DEBU 50ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.005 UTC [policies] Evaluate -> DEBU 50ae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:22.007 UTC [policies] Evaluate -> DEBU 50af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:22.008 UTC [policies] Evaluate -> DEBU 50b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:22.008 UTC [cauthdsl] func1 -> DEBU 50b1 0xc004043910 gate 1555913902008211700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:22.009 UTC [cauthdsl] func2 -> DEBU 50b2 0xc004043910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:22.009 UTC [cauthdsl] func2 -> DEBU 50b3 0xc004043910 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:22.011 UTC [cauthdsl] func2 -> DEBU 50b4 0xc004043910 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:22.011 UTC [msp.identity] Verify -> DEBU 50b5 Verify: digest = 00000000 fc c8 0f 8a 3e ba b8 5f 53 07 b4 db b6 c2 ca 7c |....>.._S......|| +peer0.org1.example.com | 00000010 6a d6 9f a7 83 a2 81 59 f6 21 a4 ab b0 f3 11 2e |j......Y.!......|" +peer0.org1.example.com | "2019-04-22 06:18:22.012 UTC [msp.identity] Verify -> DEBU 50b6 Verify: sig = 00000000 30 45 02 21 00 b5 aa 2b 11 fb c2 ed 1c 4e 1f 7b |0E.!...+.....N.{| +peer0.org1.example.com | 00000010 76 47 49 b5 7f c5 f8 a5 96 07 9f 1d 14 d2 5b 19 |vGI...........[.| +peer0.org1.example.com | 00000020 95 7e 64 cc 6e 02 20 33 5f 22 cb 1b 5b 61 f5 61 |.~d.n. 3_"..[a.a| +peer0.org1.example.com | 00000030 a3 af 33 6a c5 65 87 5e b3 65 ac e6 a3 9a b7 f3 |..3j.e.^.e......| +peer0.org1.example.com | 00000040 f6 c3 92 d3 cf ae db |.......|" +peer0.org1.example.com | "2019-04-22 06:18:22.013 UTC [cauthdsl] func2 -> DEBU 50b7 0xc004043910 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:22.013 UTC [cauthdsl] func1 -> DEBU 50b8 0xc004043910 gate 1555913902008211700 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:22.013 UTC [policies] Evaluate -> DEBU 50b9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:22.014 UTC [policies] Evaluate -> DEBU 50ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:22.014 UTC [policies] Evaluate -> DEBU 50bb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:22.015 UTC [policies] Evaluate -> DEBU 50bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:22.015 UTC [gossip.discovery] handleAliveMessage -> DEBU 50bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.016 UTC [gossip.discovery] learnExistingMembers -> DEBU 50be Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:22.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 50bf updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 " +peer0.org1.example.com | "2019-04-22 06:18:22.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 50c0 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 " +peer0.org1.example.com | "2019-04-22 06:18:22.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 50c1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:22.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 50c2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.022 UTC [gossip.discovery] handleAliveMessage -> DEBU 50c3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50c4 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.022 UTC [gossip.gossip] handleMessage -> DEBU 50c5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.023 UTC [gossip.gossip] handleMessage -> DEBU 50c6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50c7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50c8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.023 UTC [gossip.gossip] handleMessage -> DEBU 50c9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50cb Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.028 UTC [msp] DeserializeIdentity -> DEBU 50cc Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.028 UTC [msp] DeserializeIdentity -> DEBU 50cd Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50ce Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50cf Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50d0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50d1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.030 UTC [msp] DeserializeIdentity -> DEBU 50d2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.030 UTC [gossip.comm] Send -> DEBU 50d3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.030 UTC [msp] DeserializeIdentity -> DEBU 50d4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.030 UTC [gossip.comm] Send -> DEBU 50d5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d7 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.879 UTC [gossip.pull] Hello -> DEBU 50da Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] Send -> DEBU 50db Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.pull] Hello -> DEBU 50dc Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] Send -> DEBU 50dd Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.pull] Hello -> DEBU 50de Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] Send -> DEBU 50df Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 50e0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 50e1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 50e2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 50e3 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 50e4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 50e5 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.881 UTC [gossip.comm] func1 -> DEBU 50e6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16725407709412473716 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.881 UTC [gossip.gossip] handleMessage -> DEBU 50e7 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16725407709412473716 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.881 UTC [gossip.pull] HandleMessage -> DEBU 50e8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16725407709412473716 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.881 UTC [gossip.gossip] handleMessage -> DEBU 50e9 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.comm] func1 -> DEBU 50ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12494088954235170955 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.gossip] handleMessage -> DEBU 50eb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12494088954235170955 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.pull] HandleMessage -> DEBU 50ec GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12494088954235170955 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.gossip] handleMessage -> DEBU 50ed Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.comm] func1 -> DEBU 50ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7963324723888608314 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.gossip] handleMessage -> DEBU 50ef Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7963324723888608314 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.pull] HandleMessage -> DEBU 50f0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7963324723888608314 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.882 UTC [gossip.gossip] handleMessage -> DEBU 50f1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.947 UTC [msp.identity] Sign -> DEBU 50f2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151041 " +peer0.org1.example.com | "2019-04-22 06:18:22.947 UTC [msp.identity] Sign -> DEBU 50f3 Sign: digest: A56E8318B55A5FC3FE8A8E5139A4C4F408EF69A5349CBB91CED9D87CFBFE4A82 " +peer0.org1.example.com | "2019-04-22 06:18:22.947 UTC [msp.identity] Sign -> DEBU 50f4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-04-22 06:18:22.947 UTC [msp.identity] Sign -> DEBU 50f5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-04-22 06:18:22.947 UTC [gossip.comm] Send -> DEBU 50f6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.947 UTC [msp] DeserializeIdentity -> DEBU 50f7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.947 UTC [gossip.comm] Send -> DEBU 50f8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.948 UTC [msp] DeserializeIdentity -> DEBU 50f9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:22.948 UTC [gossip.comm] Send -> DEBU 50fa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:22.948 UTC [gossip.comm] sendToEndpoint -> DEBU 50fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.948 UTC [gossip.comm] sendToEndpoint -> DEBU 50fc Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.948 UTC [gossip.comm] sendToEndpoint -> DEBU 50fd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.948 UTC [gossip.comm] sendToEndpoint -> DEBU 50fe Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.950 UTC [gossip.comm] sendToEndpoint -> DEBU 50ff Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.951 UTC [gossip.comm] sendToEndpoint -> DEBU 5100 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.comm] func1 -> DEBU 5101 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.gossip] handleMessage -> DEBU 5102 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.gossip] handleMessage -> DEBU 5103 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5104 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5105 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [msp.identity] Verify -> DEBU 5106 Verify: digest = 00000000 a5 6e 83 18 b5 5a 5f c3 fe 8a 8e 51 39 a4 c4 f4 |.n...Z_....Q9...| +peer0.org1.example.com | 00000010 08 ef 69 a5 34 9c bb 91 ce d9 d8 7c fb fe 4a 82 |..i.4......|..J.|" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [msp.identity] Verify -> DEBU 5107 Verify: sig = 00000000 30 44 02 20 22 9c 82 6c 03 e5 e3 13 cd d0 87 cf |0D. "..l........| +peer0.org1.example.com | 00000010 86 f6 1e 29 06 47 c9 1a ad 11 d8 a5 f9 2d 25 be |...).G.......-%.| +peer0.org1.example.com | 00000020 57 77 a0 c5 02 20 3d 6d ab cb 98 66 b8 37 b3 ac |Ww... =m...f.7..| +peer0.org1.example.com | 00000030 48 38 ae 7c f3 43 dc b5 af ed 5a d5 40 00 8e 54 |H8.|.C....Z.@..T| +peer0.org1.example.com | 00000040 0e 70 17 63 18 2e |.p.c..|" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 5108 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.discovery] isSentByMe -> DEBU 5109 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 510a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 510b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.954 UTC [gossip.comm] func1 -> DEBU 510c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [gossip.gossip] handleMessage -> DEBU 510d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [gossip.gossip] handleMessage -> DEBU 510e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 510f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5110 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [msp.identity] Verify -> DEBU 5111 Verify: digest = 00000000 a5 6e 83 18 b5 5a 5f c3 fe 8a 8e 51 39 a4 c4 f4 |.n...Z_....Q9...| +peer0.org1.example.com | 00000010 08 ef 69 a5 34 9c bb 91 ce d9 d8 7c fb fe 4a 82 |..i.4......|..J.|" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [msp.identity] Verify -> DEBU 5112 Verify: sig = 00000000 30 44 02 20 22 9c 82 6c 03 e5 e3 13 cd d0 87 cf |0D. "..l........| +peer0.org1.example.com | 00000010 86 f6 1e 29 06 47 c9 1a ad 11 d8 a5 f9 2d 25 be |...).G.......-%.| +peer0.org1.example.com | 00000020 57 77 a0 c5 02 20 3d 6d ab cb 98 66 b8 37 b3 ac |Ww... =m...f.7..| +peer0.org1.example.com | 00000030 48 38 ae 7c f3 43 dc b5 af ed 5a d5 40 00 8e 54 |H8.|.C....Z.@..T| +peer0.org1.example.com | 00000040 0e 70 17 63 18 2e |.p.c..|" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [msp.identity] Verify -> DEBU 5113 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-04-22 06:18:22.955 UTC [msp.identity] Verify -> DEBU 5114 Verify: sig = 00000000 30 44 02 20 37 1b e0 d7 6b 39 62 c9 39 8f ce 30 |0D. 7...k9b.9..0| +peer0.org1.example.com | 00000010 c6 65 19 68 e4 2d c3 95 bd cb 75 78 02 7b 2f 32 |.e.h.-....ux.{/2| +peer0.org1.example.com | 00000020 10 d5 0d 05 02 20 0d e0 00 32 ff a2 aa af 73 9a |..... ...2....s.| +peer0.org1.example.com | 00000030 cc df 94 a0 ab ec f4 27 8e 43 3b 39 42 7d fc 04 |.......'.C;9B}..| +peer0.org1.example.com | 00000040 b8 45 84 9d a6 f9 |.E....|" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 5115 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.discovery] isSentByMe -> DEBU 5116 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 5117 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5118 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.comm] func1 -> DEBU 5119 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.gossip] handleMessage -> DEBU 511a Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.gossip] handleMessage -> DEBU 511b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 511c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.957 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 511d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +peer0.org1.example.com | "2019-04-22 06:18:22.957 UTC [msp.identity] Verify -> DEBU 511e Verify: digest = 00000000 a5 6e 83 18 b5 5a 5f c3 fe 8a 8e 51 39 a4 c4 f4 |.n...Z_....Q9...| +peer0.org1.example.com | 00000010 08 ef 69 a5 34 9c bb 91 ce d9 d8 7c fb fe 4a 82 |..i.4......|..J.|" +peer0.org1.example.com | "2019-04-22 06:18:22.957 UTC [msp.identity] Verify -> DEBU 511f Verify: sig = 00000000 30 44 02 20 22 9c 82 6c 03 e5 e3 13 cd d0 87 cf |0D. "..l........| +peer0.org1.example.com | 00000010 86 f6 1e 29 06 47 c9 1a ad 11 d8 a5 f9 2d 25 be |...).G.......-%.| +peer0.org1.example.com | 00000020 57 77 a0 c5 02 20 3d 6d ab cb 98 66 b8 37 b3 ac |Ww... =m...f.7..| +peer0.org1.example.com | 00000030 48 38 ae 7c f3 43 dc b5 af ed 5a d5 40 00 8e 54 |H8.|.C....Z.@..T| +peer0.org1.example.com | 00000040 0e 70 17 63 18 2e |.p.c..|" +peer0.org1.example.com | "2019-04-22 06:18:22.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 5120 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.957 UTC [gossip.discovery] isSentByMe -> DEBU 5121 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:22.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 5122 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:22.969 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5123 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.121 UTC [gossip.comm] func1 -> DEBU 5124 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.121 UTC [gossip.gossip] handleMessage -> DEBU 5125 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.121 UTC [gossip.pull] HandleMessage -> DEBU 5126 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.122 UTC [gossip.pull] SendDigest -> DEBU 5127 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:23.122 UTC [gossip.gossip] handleMessage -> DEBU 5128 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.192 UTC [gossip.comm] func1 -> DEBU 5129 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.195 UTC [gossip.gossip] handleMessage -> DEBU 512a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.195 UTC [gossip.gossip] handleMessage -> DEBU 512b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.195 UTC [gossip.discovery] handleMsgFromComm -> DEBU 512c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.195 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 512d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:23.196 UTC [msp.identity] Verify -> DEBU 512e Verify: digest = 00000000 10 a1 bf 2c 20 e8 5b 35 41 9e da c9 64 0c 04 ef |..., .[5A...d...| +peer0.org1.example.com | 00000010 1e 94 67 c8 99 13 c4 ad b5 0e 97 1b a1 9e ed 4c |..g............L|" +peer0.org1.example.com | "2019-04-22 06:18:23.196 UTC [msp.identity] Verify -> DEBU 512f Verify: sig = 00000000 30 44 02 20 41 f1 bc 54 d4 90 53 ac 79 16 d7 c5 |0D. A..T..S.y...| +peer0.org1.example.com | 00000010 97 3d a5 14 10 23 f7 44 7b af ba 80 c4 e4 f9 6e |.=...#.D{......n| +peer0.org1.example.com | 00000020 67 6f 5d e9 02 20 71 90 01 41 d6 07 1c 26 e4 5e |go].. q..A...&.^| +peer0.org1.example.com | 00000030 de 75 f9 20 8a 46 47 c7 21 d1 bb c5 07 a9 92 dc |.u. .FG.!.......| +peer0.org1.example.com | 00000040 3c 6e 79 9c 90 16 | DEBU 5130 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-04-22 06:18:23.196 UTC [msp.identity] Verify -> DEBU 5131 Verify: sig = 00000000 30 44 02 20 4e 62 9b 17 b6 a7 01 cc 7c 55 44 19 |0D. Nb......|UD.| +peer0.org1.example.com | 00000010 25 a5 c8 b8 1b ee ec df 57 f9 c4 e1 b5 88 cd f7 |%.......W.......| +peer0.org1.example.com | 00000020 6d 03 98 65 02 20 2f 16 e1 a5 6a 27 96 82 58 f3 |m..e. /...j'..X.| +peer0.org1.example.com | 00000030 bd b9 15 97 67 ec 79 96 56 d8 f7 24 17 f8 31 79 |....g.y.V..$..1y| +peer0.org1.example.com | 00000040 fb 35 2c fa 2b 7e |.5,.+~|" +peer0.org1.example.com | "2019-04-22 06:18:23.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 5132 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 5133 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:71 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:23.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 5134 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:71 " +peer0.org1.example.com | "2019-04-22 06:18:23.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 5135 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:71 " +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 5136 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 5137 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 5138 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5139 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.discovery] sendMemResponse -> DEBU 513a Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [msp] DeserializeIdentity -> DEBU 513b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [msp] DeserializeIdentity -> DEBU 513c Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.comm] Send -> DEBU 513d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.discovery] sendMemResponse -> DEBU 513e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.comm] sendToEndpoint -> DEBU 513f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.197 UTC [gossip.comm] sendToEndpoint -> DEBU 5140 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.590 UTC [gossip.comm] func1 -> DEBU 5141 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.591 UTC [gossip.gossip] handleMessage -> DEBU 5142 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.591 UTC [gossip.pull] HandleMessage -> DEBU 5143 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.591 UTC [msp] DeserializeIdentity -> DEBU 5144 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.591 UTC [msp] DeserializeIdentity -> DEBU 5145 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.591 UTC [msp] DeserializeIdentity -> DEBU 5146 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.591 UTC [msp] DeserializeIdentity -> DEBU 5147 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.591 UTC [msp] DeserializeIdentity -> DEBU 5148 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.592 UTC [msp] DeserializeIdentity -> DEBU 5149 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.592 UTC [gossip.pull] SendDigest -> DEBU 514a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:23.592 UTC [gossip.gossip] handleMessage -> DEBU 514b Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [gossip.comm] func1 -> DEBU 514c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [gossip.gossip] handleMessage -> DEBU 514d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [gossip.gossip] handleMessage -> DEBU 514e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 514f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5150 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [msp] DeserializeIdentity -> DEBU 5151 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5152 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5153 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5154 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [policies] Evaluate -> DEBU 5155 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [policies] Evaluate -> DEBU 5156 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:23.630 UTC [policies] Evaluate -> DEBU 5157 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func1 -> DEBU 5158 0xc0043987a0 gate 1555913903631044600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func2 -> DEBU 5159 0xc0043987a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func2 -> DEBU 515a 0xc0043987a0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func2 -> DEBU 515b 0xc0043987a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func2 -> DEBU 515c 0xc0043987a0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func1 -> DEBU 515d 0xc0043987a0 gate 1555913903631044600 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [policies] Evaluate -> DEBU 515e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [policies] Evaluate -> DEBU 515f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [policies] Evaluate -> DEBU 5160 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func1 -> DEBU 5161 0xc004398fe0 gate 1555913903631517900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func2 -> DEBU 5162 0xc004398fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func2 -> DEBU 5163 0xc004398fe0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:23.631 UTC [cauthdsl] func2 -> DEBU 5164 0xc004398fe0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:23.632 UTC [msp.identity] Verify -> DEBU 5165 Verify: digest = 00000000 f6 6a ea eb 34 35 66 95 21 fe fc 69 09 7c 41 6b |.j..45f.!..i.|Ak| +peer0.org1.example.com | 00000010 1e 3f 12 96 39 3c 3b de 3d ab 6a b2 d9 6f e4 be |.?..9<;.=.j..o..|" +peer0.org1.example.com | "2019-04-22 06:18:23.632 UTC [msp.identity] Verify -> DEBU 5166 Verify: sig = 00000000 30 44 02 20 60 27 f3 40 c8 c2 af f3 eb ee 0d 5d |0D. `'.@.......]| +peer0.org1.example.com | 00000010 9d d5 18 c1 a6 f1 9a b7 85 06 0e 95 27 81 e3 af |............'...| +peer0.org1.example.com | 00000020 8a c5 82 e8 02 20 79 bd 99 5f 2d c2 74 62 e9 40 |..... y.._-.tb.@| +peer0.org1.example.com | 00000030 98 5c 9d 5a a1 89 69 a3 5d fc d9 a5 94 5a b1 c6 |.\.Z..i.]....Z..| +peer0.org1.example.com | 00000040 e1 6f b3 7b 90 25 |.o.{.%|" +peer0.org1.example.com | "2019-04-22 06:18:23.634 UTC [cauthdsl] func2 -> DEBU 5167 0xc004398fe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:23.635 UTC [cauthdsl] func1 -> DEBU 5168 0xc004398fe0 gate 1555913903631517900 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:23.635 UTC [policies] Evaluate -> DEBU 5169 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.635 UTC [policies] Evaluate -> DEBU 516a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.635 UTC [policies] Evaluate -> DEBU 516b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.636 UTC [policies] Evaluate -> DEBU 516c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 516d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 516e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:70 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:23.636 UTC [gossip.discovery] learnExistingMembers -> DEBU 516f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:70 " +peer0.org1.example.com | "2019-04-22 06:18:23.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 5170 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:70 " +peer0.org1.example.com | "2019-04-22 06:18:23.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 5171 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:23.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 5172 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 5173 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5174 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.637 UTC [gossip.discovery] sendMemResponse -> DEBU 5175 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +peer0.org1.example.com | "2019-04-22 06:18:23.637 UTC [msp] DeserializeIdentity -> DEBU 5176 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.638 UTC [msp] DeserializeIdentity -> DEBU 5177 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.638 UTC [msp] DeserializeIdentity -> DEBU 5178 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.638 UTC [gossip.comm] Send -> DEBU 5179 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:23.638 UTC [gossip.discovery] sendMemResponse -> DEBU 517a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:23.638 UTC [gossip.comm] sendToEndpoint -> DEBU 517b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.638 UTC [gossip.comm] sendToEndpoint -> DEBU 517c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.972 UTC [gossip.comm] func1 -> DEBU 517d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.972 UTC [gossip.gossip] handleMessage -> DEBU 517e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.972 UTC [gossip.pull] HandleMessage -> DEBU 517f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.972 UTC [msp] DeserializeIdentity -> DEBU 5180 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.972 UTC [msp] DeserializeIdentity -> DEBU 5181 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.973 UTC [msp] DeserializeIdentity -> DEBU 5182 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.973 UTC [msp] DeserializeIdentity -> DEBU 5183 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.973 UTC [msp] DeserializeIdentity -> DEBU 5184 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.973 UTC [msp] DeserializeIdentity -> DEBU 5185 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.973 UTC [gossip.pull] SendDigest -> DEBU 5186 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:23.973 UTC [gossip.gossip] handleMessage -> DEBU 5187 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.996 UTC [gossip.comm] func1 -> DEBU 5188 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [gossip.gossip] handleMessage -> DEBU 5189 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [gossip.gossip] handleMessage -> DEBU 518a Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [gossip.discovery] handleMsgFromComm -> DEBU 518b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 518c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [msp] DeserializeIdentity -> DEBU 518d Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 518e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 518f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5190 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [policies] Evaluate -> DEBU 5191 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [policies] Evaluate -> DEBU 5192 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [policies] Evaluate -> DEBU 5193 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [cauthdsl] func1 -> DEBU 5194 0xc0043cc040 gate 1555913903997827300 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [cauthdsl] func2 -> DEBU 5195 0xc0043cc040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [cauthdsl] func2 -> DEBU 5196 0xc0043cc040 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:23.997 UTC [cauthdsl] func2 -> DEBU 5197 0xc0043cc040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func2 -> DEBU 5198 0xc0043cc040 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func1 -> DEBU 5199 0xc0043cc040 gate 1555913903997827300 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [policies] Evaluate -> DEBU 519a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [policies] Evaluate -> DEBU 519b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [policies] Evaluate -> DEBU 519c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func1 -> DEBU 519d 0xc0043cc880 gate 1555913903998228200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func2 -> DEBU 519e 0xc0043cc880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func2 -> DEBU 519f 0xc0043cc880 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func2 -> DEBU 51a0 0xc0043cc880 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [msp.identity] Verify -> DEBU 51a1 Verify: digest = 00000000 c0 3d 5b 5f ea b3 10 25 c5 ca 01 3f 76 42 6a 62 |.=[_...%...?vBjb| +peer0.org1.example.com | 00000010 47 92 4b 01 42 50 bb 2c 7d 87 8f 0f 55 65 21 c0 |G.K.BP.,}...Ue!.|" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [msp.identity] Verify -> DEBU 51a2 Verify: sig = 00000000 30 44 02 20 4b 8b 40 1c bd 29 db 61 3c d0 7b ec |0D. K.@..).a<.{.| +peer0.org1.example.com | 00000010 4a 20 af 16 c5 0f 37 e3 93 36 60 4a 65 a1 53 ba |J ....7..6`Je.S.| +peer0.org1.example.com | 00000020 c8 61 2e 9a 02 20 7a b8 17 53 eb 88 5f df c4 5c |.a... z..S.._..\| +peer0.org1.example.com | 00000030 07 5f 05 df 48 30 e1 d1 c6 d1 21 70 88 7b e6 61 |._..H0....!p.{.a| +peer0.org1.example.com | 00000040 34 b0 f5 9b 5e a5 |4...^.|" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func2 -> DEBU 51a3 0xc0043cc880 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:23.998 UTC [cauthdsl] func1 -> DEBU 51a4 0xc0043cc880 gate 1555913903998228200 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [policies] Evaluate -> DEBU 51a5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [policies] Evaluate -> DEBU 51a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [policies] Evaluate -> DEBU 51a7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [policies] Evaluate -> DEBU 51a8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 51a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 51aa Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 51ab updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:66 " +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 51ac Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:66 " +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 51ad Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [gossip.discovery] learnExistingMembers -> DEBU 51ae Exiting" +peer0.org1.example.com | "2019-04-22 06:18:23.999 UTC [gossip.discovery] handleAliveMessage -> DEBU 51af Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 51b0 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.005 UTC [gossip.discovery] sendMemResponse -> DEBU 51b1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +peer0.org1.example.com | "2019-04-22 06:18:24.005 UTC [msp] DeserializeIdentity -> DEBU 51b2 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.005 UTC [msp] DeserializeIdentity -> DEBU 51b3 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.005 UTC [msp] DeserializeIdentity -> DEBU 51b4 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.006 UTC [gossip.comm] Send -> DEBU 51b5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:24.006 UTC [gossip.discovery] sendMemResponse -> DEBU 51b6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +peer0.org1.example.com | "2019-04-22 06:18:24.006 UTC [gossip.comm] sendToEndpoint -> DEBU 51b7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.006 UTC [gossip.comm] sendToEndpoint -> DEBU 51b8 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [msp] DeserializeIdentity -> DEBU 51b9 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [msp] DeserializeIdentity -> DEBU 51ba Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [gossip.comm] Send -> DEBU 51bb Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [gossip.comm] sendToEndpoint -> DEBU 51bc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [gossip.comm] sendToEndpoint -> DEBU 51bd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [gossip.comm] sendToEndpoint -> DEBU 51be Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [gossip.comm] sendToEndpoint -> DEBU 51bf Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [gossip.comm] sendToEndpoint -> DEBU 51c0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.321 UTC [gossip.comm] sendToEndpoint -> DEBU 51c1 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.323 UTC [gossip.comm] func1 -> DEBU 51c2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.323 UTC [gossip.comm] func1 -> DEBU 51c3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.323 UTC [gossip.gossip] handleMessage -> DEBU 51c4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.324 UTC [msp.identity] Verify -> DEBU 51c5 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:24.324 UTC [msp.identity] Verify -> DEBU 51c6 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:24.325 UTC [msp.identity] Verify -> DEBU 51c7 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:24.325 UTC [msp.identity] Verify -> DEBU 51c8 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:24.325 UTC [gossip.comm] func1 -> DEBU 51c9 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.325 UTC [msp] DeserializeIdentity -> DEBU 51ca Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.326 UTC [msp] DeserializeIdentity -> DEBU 51cb Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.327 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 51cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:24.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51cd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.327 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51ce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.328 UTC [policies] Evaluate -> DEBU 51cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.328 UTC [policies] Evaluate -> DEBU 51d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:24.328 UTC [policies] Evaluate -> DEBU 51d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.329 UTC [cauthdsl] func1 -> DEBU 51d2 0xc0043ddc20 gate 1555913904329089500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.329 UTC [cauthdsl] func2 -> DEBU 51d3 0xc0043ddc20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.329 UTC [cauthdsl] func2 -> DEBU 51d4 0xc0043ddc20 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.329 UTC [cauthdsl] func2 -> DEBU 51d5 0xc0043ddc20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:24.332 UTC [cauthdsl] func2 -> DEBU 51d6 0xc0043ddc20 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.332 UTC [cauthdsl] func1 -> DEBU 51d7 0xc0043ddc20 gate 1555913904329089500 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.333 UTC [policies] Evaluate -> DEBU 51d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.333 UTC [policies] Evaluate -> DEBU 51d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.334 UTC [policies] Evaluate -> DEBU 51da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.334 UTC [cauthdsl] func1 -> DEBU 51db 0xc004408460 gate 1555913904334760600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.336 UTC [cauthdsl] func2 -> DEBU 51dc 0xc004408460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.336 UTC [cauthdsl] func2 -> DEBU 51dd 0xc004408460 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.336 UTC [cauthdsl] func2 -> DEBU 51de 0xc004408460 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.337 UTC [msp.identity] Verify -> DEBU 51df Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:24.337 UTC [msp.identity] Verify -> DEBU 51e0 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:24.338 UTC [cauthdsl] func2 -> DEBU 51e1 0xc004408460 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.338 UTC [cauthdsl] func1 -> DEBU 51e2 0xc004408460 gate 1555913904334760600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:24.339 UTC [policies] Evaluate -> DEBU 51e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.339 UTC [policies] Evaluate -> DEBU 51e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.340 UTC [policies] Evaluate -> DEBU 51e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.340 UTC [policies] Evaluate -> DEBU 51e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.340 UTC [msp] DeserializeIdentity -> DEBU 51e7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.340 UTC [msp] DeserializeIdentity -> DEBU 51e8 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.344 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 51e9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:24.345 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51ea Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.345 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 51eb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.345 UTC [policies] Evaluate -> DEBU 51ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.345 UTC [policies] Evaluate -> DEBU 51ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:24.348 UTC [policies] Evaluate -> DEBU 51ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.348 UTC [cauthdsl] func1 -> DEBU 51ef 0xc004409c30 gate 1555913904348696900 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.349 UTC [cauthdsl] func2 -> DEBU 51f0 0xc004409c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.349 UTC [cauthdsl] func2 -> DEBU 51f1 0xc004409c30 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.349 UTC [cauthdsl] func2 -> DEBU 51f2 0xc004409c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:24.349 UTC [cauthdsl] func2 -> DEBU 51f3 0xc004409c30 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.350 UTC [cauthdsl] func1 -> DEBU 51f4 0xc004409c30 gate 1555913904348696900 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.350 UTC [policies] Evaluate -> DEBU 51f5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [policies] Evaluate -> DEBU 51f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [policies] Evaluate -> DEBU 51f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [cauthdsl] func1 -> DEBU 51f8 0xc004416470 gate 1555913904351322000 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [cauthdsl] func2 -> DEBU 51f9 0xc004416470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [cauthdsl] func2 -> DEBU 51fa 0xc004416470 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [cauthdsl] func2 -> DEBU 51fb 0xc004416470 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [msp.identity] Verify -> DEBU 51fc Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [msp.identity] Verify -> DEBU 51fd Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [cauthdsl] func2 -> DEBU 51fe 0xc004416470 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [cauthdsl] func1 -> DEBU 51ff 0xc004416470 gate 1555913904351322000 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [policies] Evaluate -> DEBU 5200 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.351 UTC [policies] Evaluate -> DEBU 5201 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.352 UTC [policies] Evaluate -> DEBU 5202 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.352 UTC [policies] Evaluate -> DEBU 5203 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.352 UTC [gossip.gossip] handleMessage -> DEBU 5204 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.352 UTC [gossip.gossip] handleMessage -> DEBU 5205 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.352 UTC [msp] DeserializeIdentity -> DEBU 5206 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.352 UTC [msp] DeserializeIdentity -> DEBU 5207 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.353 UTC [msp] DeserializeIdentity -> DEBU 5208 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.353 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5209 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:24.353 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 520a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.353 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 520b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.354 UTC [policies] Evaluate -> DEBU 520c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.354 UTC [policies] Evaluate -> DEBU 520d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:24.355 UTC [policies] Evaluate -> DEBU 520e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.355 UTC [cauthdsl] func1 -> DEBU 520f 0xc004417f80 gate 1555913904355190400 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.355 UTC [cauthdsl] func2 -> DEBU 5210 0xc004417f80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.355 UTC [cauthdsl] func2 -> DEBU 5211 0xc004417f80 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.356 UTC [cauthdsl] func2 -> DEBU 5212 0xc004417f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:24.356 UTC [cauthdsl] func2 -> DEBU 5213 0xc004417f80 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.356 UTC [cauthdsl] func1 -> DEBU 5214 0xc004417f80 gate 1555913904355190400 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.356 UTC [policies] Evaluate -> DEBU 5215 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.356 UTC [policies] Evaluate -> DEBU 5216 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.356 UTC [policies] Evaluate -> DEBU 5217 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.356 UTC [cauthdsl] func1 -> DEBU 5218 0xc00442e7c0 gate 1555913904356854500 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.357 UTC [cauthdsl] func2 -> DEBU 5219 0xc00442e7c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.357 UTC [cauthdsl] func2 -> DEBU 521a 0xc00442e7c0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.357 UTC [cauthdsl] func2 -> DEBU 521b 0xc00442e7c0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.358 UTC [msp.identity] Verify -> DEBU 521c Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:24.358 UTC [msp.identity] Verify -> DEBU 521d Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:24.358 UTC [cauthdsl] func2 -> DEBU 521e 0xc00442e7c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.359 UTC [cauthdsl] func1 -> DEBU 521f 0xc00442e7c0 gate 1555913904356854500 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:24.359 UTC [policies] Evaluate -> DEBU 5220 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.359 UTC [policies] Evaluate -> DEBU 5221 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.359 UTC [policies] Evaluate -> DEBU 5222 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.360 UTC [policies] Evaluate -> DEBU 5223 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.360 UTC [msp.identity] Verify -> DEBU 5224 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:24.361 UTC [msp.identity] Verify -> DEBU 5225 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:24.361 UTC [msp.identity] Verify -> DEBU 5226 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:24.362 UTC [msp.identity] Verify -> DEBU 5227 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:24.362 UTC [msp] DeserializeIdentity -> DEBU 5228 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.363 UTC [msp] DeserializeIdentity -> DEBU 5229 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.364 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 522a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:24.365 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 522b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.365 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 522c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.365 UTC [policies] Evaluate -> DEBU 522d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.365 UTC [policies] Evaluate -> DEBU 522e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:24.365 UTC [policies] Evaluate -> DEBU 522f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.366 UTC [cauthdsl] func1 -> DEBU 5230 0xc004448dd0 gate 1555913904366278700 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.366 UTC [cauthdsl] func2 -> DEBU 5231 0xc004448dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.366 UTC [cauthdsl] func2 -> DEBU 5232 0xc004448dd0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.367 UTC [cauthdsl] func2 -> DEBU 5233 0xc004448dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:24.367 UTC [cauthdsl] func2 -> DEBU 5234 0xc004448dd0 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.368 UTC [cauthdsl] func1 -> DEBU 5235 0xc004448dd0 gate 1555913904366278700 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.368 UTC [policies] Evaluate -> DEBU 5236 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.368 UTC [policies] Evaluate -> DEBU 5237 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.368 UTC [policies] Evaluate -> DEBU 5238 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.368 UTC [cauthdsl] func1 -> DEBU 5239 0xc004449610 gate 1555913904368882600 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.368 UTC [cauthdsl] func2 -> DEBU 523a 0xc004449610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [cauthdsl] func2 -> DEBU 523b 0xc004449610 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [cauthdsl] func2 -> DEBU 523c 0xc004449610 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [msp.identity] Verify -> DEBU 523d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [msp.identity] Verify -> DEBU 523e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [cauthdsl] func2 -> DEBU 523f 0xc004449610 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [cauthdsl] func1 -> DEBU 5240 0xc004449610 gate 1555913904368882600 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [policies] Evaluate -> DEBU 5241 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [policies] Evaluate -> DEBU 5242 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [policies] Evaluate -> DEBU 5243 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [policies] Evaluate -> DEBU 5244 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [gossip.gossip] handleMessage -> DEBU 5245 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [gossip.gossip] handleMessage -> DEBU 5246 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.369 UTC [msp] DeserializeIdentity -> DEBU 5247 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.370 UTC [msp] DeserializeIdentity -> DEBU 5248 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.370 UTC [msp] DeserializeIdentity -> DEBU 5249 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.371 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 524a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:24.372 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 524b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.372 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 524c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.373 UTC [policies] Evaluate -> DEBU 524d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.373 UTC [policies] Evaluate -> DEBU 524e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:24.373 UTC [policies] Evaluate -> DEBU 524f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.374 UTC [cauthdsl] func1 -> DEBU 5250 0xc00445d120 gate 1555913904373939200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.374 UTC [cauthdsl] func2 -> DEBU 5251 0xc00445d120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.374 UTC [cauthdsl] func2 -> DEBU 5252 0xc00445d120 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.374 UTC [cauthdsl] func2 -> DEBU 5253 0xc00445d120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:24.374 UTC [cauthdsl] func2 -> DEBU 5254 0xc00445d120 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.374 UTC [cauthdsl] func1 -> DEBU 5255 0xc00445d120 gate 1555913904373939200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [policies] Evaluate -> DEBU 5256 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [policies] Evaluate -> DEBU 5257 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [policies] Evaluate -> DEBU 5258 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [cauthdsl] func1 -> DEBU 5259 0xc00445d960 gate 1555913904376699800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [cauthdsl] func2 -> DEBU 525a 0xc00445d960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [cauthdsl] func2 -> DEBU 525b 0xc00445d960 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [cauthdsl] func2 -> DEBU 525c 0xc00445d960 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.376 UTC [msp.identity] Verify -> DEBU 525d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +peer0.org1.example.com | 00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [msp.identity] Verify -> DEBU 525e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +peer0.org1.example.com | 00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +peer0.org1.example.com | 00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +peer0.org1.example.com | 00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +peer0.org1.example.com | 00000040 02 82 88 47 2f e9 a9 |...G/..|" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [cauthdsl] func2 -> DEBU 525f 0xc00445d960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [cauthdsl] func1 -> DEBU 5260 0xc00445d960 gate 1555913904376699800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [policies] Evaluate -> DEBU 5261 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [policies] Evaluate -> DEBU 5262 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [policies] Evaluate -> DEBU 5263 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [policies] Evaluate -> DEBU 5264 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [msp.identity] Verify -> DEBU 5265 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +peer0.org1.example.com | 00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +peer0.org1.example.com | "2019-04-22 06:18:24.377 UTC [msp.identity] Verify -> DEBU 5266 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +peer0.org1.example.com | 00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +peer0.org1.example.com | 00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +peer0.org1.example.com | 00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +peer0.org1.example.com | 00000040 d4 bd 07 53 46 05 |...SF.|" +peer0.org1.example.com | "2019-04-22 06:18:24.378 UTC [msp.identity] Verify -> DEBU 5267 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +peer0.org1.example.com | 00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +peer0.org1.example.com | "2019-04-22 06:18:24.378 UTC [msp.identity] Verify -> DEBU 5268 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +peer0.org1.example.com | 00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +peer0.org1.example.com | 00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +peer0.org1.example.com | 00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +peer0.org1.example.com | 00000040 9d 52 87 7c df b8 69 |.R.|..i|" +peer0.org1.example.com | "2019-04-22 06:18:24.378 UTC [msp] DeserializeIdentity -> DEBU 5269 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.378 UTC [msp] DeserializeIdentity -> DEBU 526a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 526b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 526c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 526d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [policies] Evaluate -> DEBU 526e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [policies] Evaluate -> DEBU 526f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [policies] Evaluate -> DEBU 5270 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func1 -> DEBU 5271 0xc00446ff70 gate 1555913904379420200 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func2 -> DEBU 5272 0xc00446ff70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func2 -> DEBU 5273 0xc00446ff70 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func2 -> DEBU 5274 0xc00446ff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func2 -> DEBU 5275 0xc00446ff70 principal evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func1 -> DEBU 5276 0xc00446ff70 gate 1555913904379420200 evaluation fails" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [policies] Evaluate -> DEBU 5277 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [policies] Evaluate -> DEBU 5278 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [policies] Evaluate -> DEBU 5279 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func1 -> DEBU 527a 0xc00448e7b0 gate 1555913904379904800 evaluation starts" +peer0.org1.example.com | "2019-04-22 06:18:24.379 UTC [cauthdsl] func2 -> DEBU 527b 0xc00448e7b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [cauthdsl] func2 -> DEBU 527c 0xc00448e7b0 processing identity 0 with bytes of 10c48e0" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [cauthdsl] func2 -> DEBU 527d 0xc00448e7b0 principal matched by identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [msp.identity] Verify -> DEBU 527e Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +peer0.org1.example.com | 00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [msp.identity] Verify -> DEBU 527f Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +peer0.org1.example.com | 00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +peer0.org1.example.com | 00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +peer0.org1.example.com | 00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +peer0.org1.example.com | 00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [cauthdsl] func2 -> DEBU 5280 0xc00448e7b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [cauthdsl] func1 -> DEBU 5281 0xc00448e7b0 gate 1555913904379904800 evaluation succeeds" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [policies] Evaluate -> DEBU 5282 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [policies] Evaluate -> DEBU 5283 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [policies] Evaluate -> DEBU 5284 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [policies] Evaluate -> DEBU 5285 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-04-22 06:18:24.380 UTC [gossip.gossip] handleMessage -> DEBU 5286 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.472 UTC [msp] DeserializeIdentity -> DEBU 5287 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.473 UTC [msp] DeserializeIdentity -> DEBU 5288 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.473 UTC [gossip.pull] Hello -> DEBU 5289 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:18:24.474 UTC [msp] DeserializeIdentity -> DEBU 528a Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.474 UTC [msp] DeserializeIdentity -> DEBU 528b Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.474 UTC [gossip.comm] Send -> DEBU 528c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-04-22 06:18:24.475 UTC [gossip.comm] sendToEndpoint -> DEBU 528d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.475 UTC [gossip.comm] sendToEndpoint -> DEBU 528e Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.477 UTC [gossip.comm] func1 -> DEBU 528f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8632752681262064408 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.477 UTC [gossip.gossip] handleMessage -> DEBU 5290 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8632752681262064408 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.477 UTC [gossip.pull] HandleMessage -> DEBU 5291 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8632752681262064408 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.477 UTC [gossip.gossip] handleMessage -> DEBU 5292 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.579 UTC [gossip.comm] func1 -> DEBU 5293 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.579 UTC [gossip.gossip] handleMessage -> DEBU 5294 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.580 UTC [msp] DeserializeIdentity -> DEBU 5295 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.580 UTC [msp] DeserializeIdentity -> DEBU 5296 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.581 UTC [gossip.gossip] handleMessage -> DEBU 5297 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.648 UTC [gossip.comm] func1 -> DEBU 5298 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.648 UTC [gossip.gossip] handleMessage -> DEBU 5299 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.649 UTC [gossip.pull] HandleMessage -> DEBU 529a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.649 UTC [gossip.pull] SendDigest -> DEBU 529b Sending BLOCK_MSG digest: [1 3 5 6 8 2 4 7 9] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +peer0.org1.example.com | "2019-04-22 06:18:24.649 UTC [gossip.gossip] handleMessage -> DEBU 529c Exiting" +peer0.org1.example.com | "2019-04-22 06:18:24.803 UTC [gossip.comm] func1 -> DEBU 529d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.804 UTC [gossip.gossip] handleMessage -> DEBU 529e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:24.805 UTC [msp] DeserializeIdentity -> DEBU 529f Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.806 UTC [msp] DeserializeIdentity -> DEBU 52a0 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.807 UTC [msp] DeserializeIdentity -> DEBU 52a1 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:24.808 UTC [gossip.gossip] handleMessage -> DEBU 52a2 Exiting" +peer0.org1.example.com | "2019-04-22 06:18:25.017 UTC [gossip.comm] func1 -> DEBU 52a3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:25.017 UTC [gossip.gossip] handleMessage -> DEBU 52a4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-04-22 06:18:25.018 UTC [msp] DeserializeIdentity -> DEBU 52a5 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:25.018 UTC [msp] DeserializeIdentity -> DEBU 52a6 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:25.022 UTC [msp] DeserializeIdentity -> DEBU 52a7 Obtaining identity" +peer0.org1.example.com | "2019-04-22 06:18:25.023 UTC [gossip.gossip] handleMessage -> DEBU 52a8 Exiting" diff --git a/hyperledger_fabric/latest/raft/logs/dev_orderer.log b/hyperledger_fabric/latest/raft/logs/dev_orderer.log index 86f3c977..e355723e 100644 --- a/hyperledger_fabric/latest/raft/logs/dev_orderer.log +++ b/hyperledger_fabric/latest/raft/logs/dev_orderer.log @@ -1,5 +1,253 @@ -2019-02-28 03:15:33.126 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -[002 02-28 03:15:33.37 UTC] [%{longpkg}] %{callpath} -> INFO Orderer config values: +2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for debug +2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for debug.DeliverTraceDir setting to +2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for debug.BroadcastTraceDir setting to +2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 006 Found map[interface{}]interface{} value for operations +2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for operations.TLS +2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for operations.TLS.Certificate setting to +2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.818 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for operations.TLS.PrivateKey setting to +2019-04-22 06:16:27.818 UTC [viperutil] unmarshalJSON -> DEBU 00c Unmarshal JSON: value is not a string: false +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 00d Found real value for operations.TLS.ClientAuthRequired setting to bool false +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 00e Unmarshal JSON: value is not a string: [] +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 00f Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 010 Unmarshal JSON: value is not a string: false +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 011 Found real value for operations.TLS.Enabled setting to bool false +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 014 Found map[interface{}]interface{} value for metrics +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 015 Found map[string]interface{} value for metrics.Statsd +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for metrics.Statsd.Prefix setting to +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for metrics.Statsd.Network setting to string udp +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 01a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 01b Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 01c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 01d Found real value for metrics.Statsd.WriteInterval setting to string 30s +2019-04-22 06:16:27.819 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for metrics.Provider setting to string prometheus +2019-04-22 06:16:27.819 UTC [viperutil] getKeysRecursively -> DEBU 020 Found map[interface{}]interface{} value for consensus +2019-04-22 06:16:27.820 UTC [viperutil] unmarshalJSON -> DEBU 021 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 022 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2019-04-22 06:16:27.820 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 025 Found map[interface{}]interface{} value for general +2019-04-22 06:16:27.820 UTC [viperutil] getKeysRecursively -> DEBU 026 Found map[string]interface{} value for general.Keepalive +2019-04-22 06:16:27.827 UTC [viperutil] unmarshalJSON -> DEBU 027 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.831 UTC [viperutil] getKeysRecursively -> DEBU 028 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2019-04-22 06:16:27.831 UTC [viperutil] unmarshalJSON -> DEBU 029 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.831 UTC [viperutil] getKeysRecursively -> DEBU 02a Found real value for general.Keepalive.ServerInterval setting to string 7200s +2019-04-22 06:16:27.831 UTC [viperutil] unmarshalJSON -> DEBU 02b Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.831 UTC [viperutil] getKeysRecursively -> DEBU 02c Found real value for general.Keepalive.ServerTimeout setting to string 20s +2019-04-22 06:16:27.832 UTC [viperutil] unmarshalJSON -> DEBU 02d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-04-22 06:16:27.832 UTC [viperutil] getKeysRecursively -> DEBU 02e Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2019-04-22 06:16:27.832 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-04-22 06:16:27.832 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.ListenAddress setting to string 0.0.0.0 +2019-04-22 06:16:27.832 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2019-04-22 06:16:27.832 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for general.LocalMSPID setting to string OrdererMSP +2019-04-22 06:16:27.835 UTC [viperutil] getKeysRecursively -> DEBU 033 Found map[string]interface{} value for general.Authentication +2019-04-22 06:16:27.835 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-04-22 06:16:27.835 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.Authentication.TimeWindow setting to string 15m +2019-04-22 06:16:27.835 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-04-22 06:16:27.835 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.GenesisMethod setting to string file +2019-04-22 06:16:27.835 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.LedgerType setting to string file +2019-04-22 06:16:27.836 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03c Found map[string]interface{} value for general.BCCSP +2019-04-22 06:16:27.836 UTC [viperutil] unmarshalJSON -> DEBU 03d Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03e Found real value for general.BCCSP.Default setting to string SW +2019-04-22 06:16:27.836 UTC [viperutil] getKeysRecursively -> DEBU 03f Found map[string]interface{} value for general.BCCSP.SW +2019-04-22 06:16:27.836 UTC [viperutil] unmarshalJSON -> DEBU 040 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 041 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 042 Unmarshal JSON: value is not a string: 256 +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 043 Found real value for general.BCCSP.SW.Security setting to int 256 +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 044 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 047 Found map[string]interface{} value for general.Profile +2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value is not a string: false +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Profile.Enabled setting to bool false +2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 04c Found map[string]interface{} value for general.Cluster +2019-04-22 06:16:27.837 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2019-04-22 06:16:27.837 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for general.Cluster.SendBufferSize setting to string 10 +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.Cluster.ListenPort setting to +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.Cluster.ListenAddress setting to +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.Cluster.ServerCertificate setting to +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 059 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 05a Found real value for general.Cluster.ServerPrivateKey setting to +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 05b Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.838 UTC [viperutil] getKeysRecursively -> DEBU 05c Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2019-04-22 06:16:27.838 UTC [viperutil] unmarshalJSON -> DEBU 05d Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 05e Found real value for general.ListenPort setting to string 7050 +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 05f Found map[string]interface{} value for general.TLS +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 060 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 061 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 062 Unmarshal JSON: value is not a string: false +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 063 Found real value for general.TLS.ClientAuthRequired setting to bool false +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 064 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 065 Found real value for general.TLS.ClientRootCAs setting to +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.TLS.Enabled setting to string true +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 06c Found map[interface{}]interface{} value for fileledger +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 06d Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2019-04-22 06:16:27.839 UTC [viperutil] getKeysRecursively -> DEBU 06e Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2019-04-22 06:16:27.839 UTC [viperutil] unmarshalJSON -> DEBU 06f Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-04-22 06:16:27.850 UTC [viperutil] getKeysRecursively -> DEBU 070 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2019-04-22 06:16:27.850 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[interface{}]interface{} value for ramledger +2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value is not a string: 1000 +2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for ramledger.HistorySize setting to int 1000 +2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 074 Found map[interface{}]interface{} value for kafka +2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 075 Found map[string]interface{} value for kafka.Topic +2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: 3 +2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: false +2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for kafka.Verbose setting to bool false +2019-04-22 06:16:27.851 UTC [viperutil] getKeysRecursively -> DEBU 07a Found map[string]interface{} value for kafka.TLS +2019-04-22 06:16:27.851 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for kafka.TLS.Certificate setting to +2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for kafka.TLS.RootCAs setting to +2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value is not a string: false +2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for kafka.TLS.Enabled setting to bool false +2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for kafka.TLS.PrivateKey setting to +2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 083 Found map[string]interface{} value for kafka.SASLPlain +2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.852 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for kafka.SASLPlain.Password setting to +2019-04-22 06:16:27.852 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value is not a string: false +2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for kafka.SASLPlain.Enabled setting to bool false +2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 088 Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 089 Found real value for kafka.SASLPlain.User setting to +2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value is not a string: +2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Version setting to +2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.Retry +2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.Retry.LongInterval setting to string 5m +2019-04-22 06:16:27.853 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2019-04-22 06:16:27.853 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.LongTotal setting to string 12h +2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 091 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 092 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 093 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 096 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 097 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 098 Found map[string]interface{} value for kafka.Retry.Metadata +2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2019-04-22 06:16:27.854 UTC [viperutil] unmarshalJSON -> DEBU 09b Unmarshal JSON: value is not a string: 3 +2019-04-22 06:16:27.854 UTC [viperutil] getKeysRecursively -> DEBU 09c Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 09d Found map[string]interface{} value for kafka.Retry.Producer +2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: 3 +2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.Retry.Consumer +2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.Retry.ShortInterval setting to string 5s +2019-04-22 06:16:27.855 UTC [viperutil] unmarshalJSON -> DEBU 0a7 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-04-22 06:16:27.855 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found real value for kafka.Retry.ShortTotal setting to string 10m +2019-04-22 06:16:27.855 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0a9 map[ramledger:map[HistorySize:1000] kafka:map[Retry:map[LongTotal:12h NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Metadata:map[RetryMax:3 RetryBackoff:250ms] Producer:map[RetryBackoff:100ms RetryMax:3] Consumer:map[RetryBackoff:2s] ShortInterval:5s ShortTotal:10m LongInterval:5m] Topic:map[ReplicationFactor:3] Verbose:false TLS:map[Certificate: RootCAs: Enabled:false PrivateKey:] SASLPlain:map[Password: Enabled:false User:] Version:] debug:map[DeliverTraceDir: BroadcastTraceDir:] operations:map[TLS:map[ClientAuthRequired:false ClientRootCAs:[] Enabled:false Certificate: PrivateKey:] ListenAddress:0.0.0.0:8443] metrics:map[Statsd:map[WriteInterval:30s Prefix: Network:udp Address:127.0.0.1:8125] Provider:prometheus] consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] general:map[GenesisFile:/var/hyperledger/orderer/orderer.genesis.block BCCSP:map[Default:SW SW:map[Hash:SHA2 Security:256 FileKeyStore:map[KeyStore:]]] LocalMSPDir:/var/hyperledger/orderer/msp Authentication:map[TimeWindow:15m] LedgerType:file GenesisMethod:file Cluster:map[ListenPort: ListenAddress: ServerCertificate: ServerPrivateKey: SendBufferSize:10 ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key] ListenPort:7050 TLS:map[RootCAs:[/var/hyperledger/orderer/tls/ca.crt] ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key Certificate:/var/hyperledger/orderer/tls/server.crt] Keepalive:map[ServerMinInterval:60s ServerInterval:7200s ServerTimeout:20s] ListenAddress:0.0.0.0 GenesisProfile:SampleInsecureSolo LocalMSPID:OrdererMSP Profile:map[Enabled:false Address:0.0.0.0:6060]] fileledger:map[Prefix:hyperledger-fabric-ordererledger Location:/var/hyperledger/production/orderer]] +2019-04-22 06:16:27.856 UTC [localconfig] completeInitialization -> INFO 0aa Kafka.Version unset, setting to 0.10.2.0 +"2019-04-22 06:16:27.862 UTC [bccsp_sw] openKeyStore -> DEBU 0ab KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +"2019-04-22 06:16:27.862 UTC [bccsp] initBCCSP -> DEBU 0ac Initialize BCCSP [SW]" +"2019-04-22 06:16:27.862 UTC [msp] getPemMaterialFromDir -> DEBU 0ad Reading directory /var/hyperledger/orderer/msp/signcerts" +"2019-04-22 06:16:27.884 UTC [msp] getPemMaterialFromDir -> DEBU 0ae Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2019-04-22 06:16:27.891 UTC [msp] getPemMaterialFromDir -> DEBU 0af Reading directory /var/hyperledger/orderer/msp/cacerts" +"2019-04-22 06:16:27.897 UTC [msp] getPemMaterialFromDir -> DEBU 0b0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2019-04-22 06:16:27.903 UTC [msp] getPemMaterialFromDir -> DEBU 0b1 Reading directory /var/hyperledger/orderer/msp/admincerts" +"2019-04-22 06:16:27.913 UTC [msp] getPemMaterialFromDir -> DEBU 0b2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +"2019-04-22 06:16:27.920 UTC [msp] getPemMaterialFromDir -> DEBU 0b3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2019-04-22 06:16:27.923 UTC [msp] getMspConfig -> DEBU 0b4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2019-04-22 06:16:27.923 UTC [msp] getPemMaterialFromDir -> DEBU 0b5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2019-04-22 06:16:27.934 UTC [msp] getPemMaterialFromDir -> DEBU 0b6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2019-04-22 06:16:27.937 UTC [msp] getPemMaterialFromDir -> DEBU 0b7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2019-04-22 06:16:27.938 UTC [msp] getMspConfig -> DEBU 0b8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2019-04-22 06:16:27.938 UTC [msp] getPemMaterialFromDir -> DEBU 0b9 Reading directory /var/hyperledger/orderer/msp/crls" +"2019-04-22 06:16:27.939 UTC [msp] getMspConfig -> DEBU 0ba crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2019-04-22 06:16:27.939 UTC [msp] getMspConfig -> DEBU 0bb MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +"2019-04-22 06:16:27.939 UTC [msp] newBccspMsp -> DEBU 0bc Creating BCCSP-based MSP instance" +"2019-04-22 06:16:27.940 UTC [msp] New -> DEBU 0bd Creating Cache-MSP instance" +"2019-04-22 06:16:27.940 UTC [msp] loadLocaMSP -> DEBU 0be Created new local MSP" +"2019-04-22 06:16:27.940 UTC [msp] Setup -> DEBU 0bf Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:27.940 UTC [msp.identity] newIdentity -> DEBU 0c0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.940 UTC [msp.identity] newIdentity -> DEBU 0c1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.948 UTC [msp.identity] newIdentity -> DEBU 0c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.955 UTC [bccsp_sw] loadPrivateKey -> DEBU 0c3 Loading private key [9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8] at [/var/hyperledger/orderer/msp/keystore/9b6501f6c43731fc0adc439fd980566471d8d8099a7b4d65db42e1a7265ef0e8_sk]..." +"2019-04-22 06:16:27.965 UTC [msp.identity] newIdentity -> DEBU 0c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.966 UTC [msp] setupSigningIdentity -> DEBU 0c5 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-04-22 06:16:27.966 UTC [msp] Validate -> DEBU 0c6 MSP OrdererMSP validating identity" +"2019-04-22 06:16:27.967 UTC [orderer.common.server] prettyPrintStruct -> INFO 0c7 Orderer config values: General.LedgerType = "file" General.ListenAddress = "0.0.0.0" General.ListenPort = 7050 @@ -13,9 +261,9 @@ General.Cluster.ListenPort = 0 General.Cluster.ServerCertificate = "" General.Cluster.ServerPrivateKey = "" - General.Cluster.ClientCertificate = "" - General.Cluster.ClientPrivateKey = "" - General.Cluster.RootCAs = [/etc/hyperledger/fabric/tls/ca.crt] + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [] General.Cluster.DialTimeout = 5s General.Cluster.RPCTimeout = 7s General.Cluster.ReplicationBufferSize = 20971520 @@ -24,6 +272,7 @@ General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s General.Cluster.ReplicationMaxRetries = 12 General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s General.Keepalive.ServerMinInterval = 1m0s General.Keepalive.ServerInterval = 2h0m0s General.Keepalive.ServerTimeout = 20s @@ -47,8 +296,8 @@ FileLedger.Location = "/var/hyperledger/production/orderer" FileLedger.Prefix = "hyperledger-fabric-ordererledger" RAMLedger.HistorySize = 1000 - Kafka.Retry.ShortInterval = 1s - Kafka.Retry.ShortTotal = 30s + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s Kafka.Retry.LongInterval = 5m0s Kafka.Retry.LongTotal = 12h0m0s Kafka.Retry.NetworkTimeouts.DialTimeout = 10s @@ -59,7 +308,7 @@ Kafka.Retry.Producer.RetryMax = 3 Kafka.Retry.Producer.RetryBackoff = 100ms Kafka.Retry.Consumer.RetryBackoff = 2s - Kafka.Verbose = true + Kafka.Verbose = false Kafka.Version = 0.10.2.0 Kafka.TLS.Enabled = false Kafka.TLS.PrivateKey = "" @@ -73,7 +322,7 @@ Kafka.Topic.ReplicationFactor = 3 Debug.BroadcastTraceDir = "" Debug.DeliverTraceDir = "" - Consensus = map[WALDir:/var/hyperledger/production/orderer/etcdraft/wal SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot EvictionSuspicion:10m] + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] Operations.ListenAddress = "0.0.0.0:8443" Operations.TLS.Enabled = false Operations.TLS.PrivateKey = "" @@ -85,138 +334,10021 @@ Metrics.Statsd.Network = "udp" Metrics.Statsd.Address = "127.0.0.1:8125" Metrics.Statsd.WriteInterval = 30s - Metrics.Statsd.Prefix = "" -[003 02-28 03:15:33.86 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer with TLS enabled -[004 02-28 03:15:33.89 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -[005 02-28 03:15:34.01 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block 0 -[006 02-28 03:15:34.04 UTC] [%{longpkg}] %{callpath} -> INFO Starting system channel 'testchainid' with genesis block hash 771af1716c1f80986256250b678791d672cb8b75b2d5b8871393510f89d488d7 and orderer type kafka -[007 02-28 03:15:34.04 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer: - Version: 1.4.0 + Metrics.Statsd.Prefix = """ +"2019-04-22 06:16:27.971 UTC [common.channelconfig] NewStandardValues -> DEBU 0c8 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0c9 Processing field: HashingAlgorithm" +"2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ca Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cb Processing field: OrdererAddresses" +"2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cc Processing field: Consortium" +"2019-04-22 06:16:27.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cd Processing field: Capabilities" +"2019-04-22 06:16:27.971 UTC [common.channelconfig] NewStandardValues -> DEBU 0ce Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0cf Processing field: ConsensusType" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d0 Processing field: BatchSize" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d1 Processing field: BatchTimeout" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d2 Processing field: KafkaBrokers" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d3 Processing field: ChannelRestrictions" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d4 Processing field: Capabilities" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] NewStandardValues -> DEBU 0d5 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d6 Processing field: Endpoints" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] NewStandardValues -> DEBU 0d7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0d8 Processing field: MSP" +"2019-04-22 06:16:27.972 UTC [common.channelconfig] validateMSP -> DEBU 0d9 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:27.972 UTC [msp] newBccspMsp -> DEBU 0da Creating BCCSP-based MSP instance" +"2019-04-22 06:16:27.972 UTC [msp] New -> DEBU 0db Creating Cache-MSP instance" +"2019-04-22 06:16:27.972 UTC [msp] Setup -> DEBU 0dc Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:27.972 UTC [msp.identity] newIdentity -> DEBU 0dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.973 UTC [msp.identity] newIdentity -> DEBU 0de Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.973 UTC [msp] Validate -> DEBU 0df MSP OrdererMSP validating identity" +"2019-04-22 06:16:27.973 UTC [common.channelconfig] NewStandardValues -> DEBU 0e0 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-04-22 06:16:27.973 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e1 Processing field: ChannelCreationPolicy" +"2019-04-22 06:16:27.973 UTC [common.channelconfig] NewStandardValues -> DEBU 0e2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:27.973 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e3 Processing field: MSP" +"2019-04-22 06:16:27.973 UTC [common.channelconfig] validateMSP -> DEBU 0e4 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:27.973 UTC [msp] newBccspMsp -> DEBU 0e5 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:27.973 UTC [msp] New -> DEBU 0e6 Creating Cache-MSP instance" +"2019-04-22 06:16:27.973 UTC [msp] Setup -> DEBU 0e7 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:27.974 UTC [msp.identity] newIdentity -> DEBU 0e8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.974 UTC [msp.identity] newIdentity -> DEBU 0e9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.974 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0ea Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:27.974 UTC [msp] Validate -> DEBU 0eb MSP Org1MSP validating identity" +"2019-04-22 06:16:27.974 UTC [msp] getCertificationChain -> DEBU 0ec MSP Org1MSP getting certification chain" +"2019-04-22 06:16:27.975 UTC [msp] hasOURole -> DEBU 0ed MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:27.975 UTC [msp] getCertificationChain -> DEBU 0ee MSP Org1MSP getting certification chain" +"2019-04-22 06:16:27.975 UTC [common.channelconfig] NewStandardValues -> DEBU 0ef Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:27.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: MSP" +"2019-04-22 06:16:27.975 UTC [common.channelconfig] validateMSP -> DEBU 0f1 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:27.975 UTC [msp] newBccspMsp -> DEBU 0f2 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:27.975 UTC [msp] New -> DEBU 0f3 Creating Cache-MSP instance" +"2019-04-22 06:16:27.975 UTC [msp] Setup -> DEBU 0f4 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:27.975 UTC [msp.identity] newIdentity -> DEBU 0f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.975 UTC [msp.identity] newIdentity -> DEBU 0f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.976 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 0f7 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:27.976 UTC [msp] Validate -> DEBU 0f8 MSP Org2MSP validating identity" +"2019-04-22 06:16:27.976 UTC [msp] getCertificationChain -> DEBU 0f9 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:27.976 UTC [msp] hasOURole -> DEBU 0fa MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:27.976 UTC [msp] getCertificationChain -> DEBU 0fb MSP Org2MSP getting certification chain" +"2019-04-22 06:16:27.977 UTC [msp] Setup -> DEBU 0fc Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:27.977 UTC [msp] Setup -> DEBU 0fd MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 0fe Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 0ff Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 100 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 101 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 102 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 103 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 104 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 105 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 106 Proposed new policy Admins for Channel/Consortiums" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 107 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 108 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 109 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10a Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10b Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10c Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10d Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:27.977 UTC [policies] GetPolicy -> DEBU 10e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 10f Proposed new policy Readers for Channel" +"2019-04-22 06:16:27.977 UTC [policies] GetPolicy -> DEBU 110 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-04-22 06:16:27.977 UTC [policies] NewManagerImpl -> DEBU 111 Proposed new policy Writers for Channel" +"2019-04-22 06:16:27.978 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Admins for Channel" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 113 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 114 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 115 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 116 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 117 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 118 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 119 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 11f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:27.978 UTC [common.configtx] addToMap -> DEBU 120 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:27.979 UTC [common.configtx] addToMap -> DEBU 121 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:27.979 UTC [common.configtx] addToMap -> DEBU 122 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:27.979 UTC [common.configtx] addToMap -> DEBU 123 Adding to config map: [Group] /Channel/Consortiums" +"2019-04-22 06:16:27.981 UTC [common.configtx] addToMap -> DEBU 124 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-04-22 06:16:27.981 UTC [common.configtx] addToMap -> DEBU 125 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.982 UTC [common.configtx] addToMap -> DEBU 126 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-04-22 06:16:27.983 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-04-22 06:16:27.983 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-04-22 06:16:27.983 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-04-22 06:16:27.984 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:27.985 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:27.986 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] NewStandardValues -> DEBU 13a Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13b Processing field: HashingAlgorithm" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13c Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13d Processing field: OrdererAddresses" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13e Processing field: Consortium" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 13f Processing field: Capabilities" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] NewStandardValues -> DEBU 140 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 141 Processing field: ConsensusType" +"2019-04-22 06:16:27.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 142 Processing field: BatchSize" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 143 Processing field: BatchTimeout" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 144 Processing field: KafkaBrokers" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 145 Processing field: ChannelRestrictions" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 146 Processing field: Capabilities" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] NewStandardValues -> DEBU 147 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 148 Processing field: Endpoints" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] NewStandardValues -> DEBU 149 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 14a Processing field: MSP" +"2019-04-22 06:16:27.987 UTC [common.channelconfig] validateMSP -> DEBU 14b Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:27.987 UTC [msp] newBccspMsp -> DEBU 14c Creating BCCSP-based MSP instance" +"2019-04-22 06:16:27.987 UTC [msp] New -> DEBU 14d Creating Cache-MSP instance" +"2019-04-22 06:16:27.987 UTC [msp] Setup -> DEBU 14e Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:27.987 UTC [msp.identity] newIdentity -> DEBU 14f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.988 UTC [msp.identity] newIdentity -> DEBU 150 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.988 UTC [msp] Validate -> DEBU 151 MSP OrdererMSP validating identity" +"2019-04-22 06:16:27.988 UTC [common.channelconfig] NewStandardValues -> DEBU 152 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-04-22 06:16:27.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU 153 Processing field: ChannelCreationPolicy" +"2019-04-22 06:16:27.988 UTC [common.channelconfig] NewStandardValues -> DEBU 154 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:27.988 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155 Processing field: MSP" +"2019-04-22 06:16:27.988 UTC [common.channelconfig] validateMSP -> DEBU 156 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:27.988 UTC [msp] newBccspMsp -> DEBU 157 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:27.988 UTC [msp] New -> DEBU 158 Creating Cache-MSP instance" +"2019-04-22 06:16:27.988 UTC [msp] Setup -> DEBU 159 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:27.988 UTC [msp.identity] newIdentity -> DEBU 15a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.988 UTC [msp.identity] newIdentity -> DEBU 15b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.989 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 15c Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:27.989 UTC [msp] Validate -> DEBU 15d MSP Org1MSP validating identity" +"2019-04-22 06:16:27.989 UTC [msp] getCertificationChain -> DEBU 15e MSP Org1MSP getting certification chain" +"2019-04-22 06:16:27.989 UTC [msp] hasOURole -> DEBU 15f MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:27.989 UTC [msp] getCertificationChain -> DEBU 160 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:27.989 UTC [common.channelconfig] NewStandardValues -> DEBU 161 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:27.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: MSP" +"2019-04-22 06:16:27.989 UTC [common.channelconfig] validateMSP -> DEBU 163 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:27.989 UTC [msp] newBccspMsp -> DEBU 164 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:27.989 UTC [msp] New -> DEBU 165 Creating Cache-MSP instance" +"2019-04-22 06:16:27.989 UTC [msp] Setup -> DEBU 166 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:27.990 UTC [msp.identity] newIdentity -> DEBU 167 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.990 UTC [msp.identity] newIdentity -> DEBU 168 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:27.990 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 169 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:27.990 UTC [msp] Validate -> DEBU 16a MSP Org2MSP validating identity" +"2019-04-22 06:16:27.990 UTC [msp] getCertificationChain -> DEBU 16b MSP Org2MSP getting certification chain" +"2019-04-22 06:16:27.991 UTC [msp] hasOURole -> DEBU 16c MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:27.991 UTC [msp] getCertificationChain -> DEBU 16d MSP Org2MSP getting certification chain" +"2019-04-22 06:16:27.991 UTC [msp] Setup -> DEBU 16e Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:27.991 UTC [msp] Setup -> DEBU 16f MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 170 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 171 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 172 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 173 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 174 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 175 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 176 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 177 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 178 Proposed new policy Admins for Channel/Consortiums" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 179 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17a Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17b Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17c Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17d Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Admins for Channel" +"2019-04-22 06:16:27.991 UTC [policies] GetPolicy -> DEBU 181 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-04-22 06:16:27.991 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Readers for Channel" +"2019-04-22 06:16:27.991 UTC [policies] GetPolicy -> DEBU 183 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-04-22 06:16:27.992 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Writers for Channel" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 185 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 186 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 187 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 188 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 189 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18d Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 18f Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 190 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 191 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 192 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Group] /Channel/Consortiums" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:27.992 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:27.993 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:27.994 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:27.994 UTC [msp] GetDefaultSigningIdentity -> DEBU 1ac Obtaining default signing identity" +"2019-04-22 06:16:27.994 UTC [orderer.common.server] createLedgerFactory -> DEBU 1ad Ledger dir: /var/hyperledger/production/orderer" +"2019-04-22 06:16:27.994 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1ae CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2019-04-22 06:16:27.994 UTC [kvledger.util] logDirStatus -> DEBU 1af Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2019-04-22 06:16:27.994 UTC [kvledger.util] logDirStatus -> DEBU 1b0 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2019-04-22 06:16:28.054 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1b1 Booted with a genesis block, replication isn't an option" +"2019-04-22 06:16:28.075 UTC [orderer.common.server] initializeServerConfig -> INFO 1b2 Starting orderer with TLS enabled" +"2019-04-22 06:16:28.076 UTC [orderer.common.server] configureClusterListener -> INFO 1b3 Cluster listener is not configured, defaulting to use the general listener on port 7050" +"2019-04-22 06:16:28.084 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b4 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2019-04-22 06:16:28.084 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1b5 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2019-04-22 06:16:28.085 UTC [kvledger.util] logDirStatus -> DEBU 1b6 Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2019-04-22 06:16:28.085 UTC [kvledger.util] logDirStatus -> DEBU 1b7 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2019-04-22 06:16:28.085 UTC [fsblkstorage] newBlockfileMgr -> INFO 1b8 Getting block information from block storage" +"2019-04-22 06:16:28.085 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1b9 Retrieving checkpoint info from block files" +"2019-04-22 06:16:28.085 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1ba retrieveLastFileSuffix()" +"2019-04-22 06:16:28.085 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1bb retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-04-22 06:16:28.085 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bc Last file number found = -1" +"2019-04-22 06:16:28.085 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1bd No block file found" +"2019-04-22 06:16:28.085 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1be Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000184940)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-04-22 06:16:28.088 UTC [fsblkstorage] newBlockIndex -> DEBU 1bf newBlockIndex() - indexItems:[[BlockNum]]" +"2019-04-22 06:16:28.094 UTC [fsblkstorage] indexBlock -> DEBU 1c0 Indexing block [blockNum=0, blockHash=[]byte{0xbc, 0xca, 0xe2, 0xa, 0xaa, 0xb2, 0x1, 0xa5, 0x5c, 0x9e, 0xe8, 0x23, 0xa5, 0x33, 0xd6, 0x77, 0xfe, 0xba, 0x8c, 0x90, 0x63, 0xb3, 0x2a, 0x63, 0xe, 0xfd, 0x47, 0xc9, 0x84, 0xa7, 0x3, 0x3d} txOffsets= +txId=d7921cec05f57cede225e40c40427ef50974637a60806026573552a75fd9ba28 locPointer=offset=39, bytesLength=18371 +]" +"2019-04-22 06:16:28.098 UTC [fsblkstorage] updateCheckpoint -> DEBU 1c1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[18415], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1c2 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c3 Processing field: HashingAlgorithm" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: OrdererAddresses" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: Consortium" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: Capabilities" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: ConsensusType" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ca Processing field: BatchSize" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: BatchTimeout" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: KafkaBrokers" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: ChannelRestrictions" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: Capabilities" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1cf Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Endpoints" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:28.099 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: MSP" +"2019-04-22 06:16:28.100 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:28.100 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:28.100 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +"2019-04-22 06:16:28.100 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:28.100 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.100 UTC [msp.identity] newIdentity -> DEBU 1d8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.101 UTC [msp] Validate -> DEBU 1d9 MSP OrdererMSP validating identity" +"2019-04-22 06:16:28.101 UTC [common.channelconfig] NewStandardValues -> DEBU 1da Initializing protos for *channelconfig.ConsortiumProtos" +"2019-04-22 06:16:28.101 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: ChannelCreationPolicy" +"2019-04-22 06:16:28.101 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:28.101 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: MSP" +"2019-04-22 06:16:28.101 UTC [common.channelconfig] validateMSP -> DEBU 1de Setting up MSP for org Org1MSP" +"2019-04-22 06:16:28.101 UTC [msp] newBccspMsp -> DEBU 1df Creating BCCSP-based MSP instance" +"2019-04-22 06:16:28.101 UTC [msp] New -> DEBU 1e0 Creating Cache-MSP instance" +"2019-04-22 06:16:28.101 UTC [msp] Setup -> DEBU 1e1 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:28.101 UTC [msp.identity] newIdentity -> DEBU 1e2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.101 UTC [msp.identity] newIdentity -> DEBU 1e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.102 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1e4 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:28.102 UTC [msp] Validate -> DEBU 1e5 MSP Org1MSP validating identity" +"2019-04-22 06:16:28.103 UTC [msp] getCertificationChain -> DEBU 1e6 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:28.103 UTC [msp] hasOURole -> DEBU 1e7 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:28.103 UTC [msp] getCertificationChain -> DEBU 1e8 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:28.103 UTC [common.channelconfig] NewStandardValues -> DEBU 1e9 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:28.103 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ea Processing field: MSP" +"2019-04-22 06:16:28.103 UTC [common.channelconfig] validateMSP -> DEBU 1eb Setting up MSP for org Org2MSP" +"2019-04-22 06:16:28.103 UTC [msp] newBccspMsp -> DEBU 1ec Creating BCCSP-based MSP instance" +"2019-04-22 06:16:28.103 UTC [msp] New -> DEBU 1ed Creating Cache-MSP instance" +"2019-04-22 06:16:28.104 UTC [msp] Setup -> DEBU 1ee Setting up MSP instance Org2MSP" +"2019-04-22 06:16:28.104 UTC [msp.identity] newIdentity -> DEBU 1ef Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.104 UTC [msp.identity] newIdentity -> DEBU 1f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.105 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1f1 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:28.105 UTC [msp] Validate -> DEBU 1f2 MSP Org2MSP validating identity" +"2019-04-22 06:16:28.105 UTC [msp] getCertificationChain -> DEBU 1f3 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:28.105 UTC [msp] hasOURole -> DEBU 1f4 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:28.105 UTC [msp] getCertificationChain -> DEBU 1f5 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:28.105 UTC [msp] Setup -> DEBU 1f6 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:28.105 UTC [msp] Setup -> DEBU 1f7 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:28.105 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.105 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 205 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Admins for Channel/Consortiums" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 208 Proposed new policy Admins for Channel" +"2019-04-22 06:16:28.106 UTC [policies] GetPolicy -> DEBU 209 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-04-22 06:16:28.106 UTC [policies] NewManagerImpl -> DEBU 20a Proposed new policy Readers for Channel" +"2019-04-22 06:16:28.106 UTC [policies] GetPolicy -> DEBU 20b Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-04-22 06:16:28.107 UTC [policies] NewManagerImpl -> DEBU 20c Proposed new policy Writers for Channel" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Group] /Channel" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:28.107 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Group] /Channel/Consortiums" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-04-22 06:16:28.108 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-04-22 06:16:28.114 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 231 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 232 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:28.115 UTC [common.configtx] addToMap -> DEBU 233 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] Next -> DEBU 234 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] newBlockfileStream -> DEBU 235 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 236 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 237 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 blockbytes [18412] read from file [0]" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] Next -> DEBU 239 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] newBlockfileStream -> DEBU 23a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23b Remaining bytes=[18415], Going to peek [8] bytes" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23c Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:28.116 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23d blockbytes [18412] read from file [0]" +"2019-04-22 06:16:28.117 UTC [common.channelconfig] NewStandardValues -> DEBU 23e Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: HashingAlgorithm" +"2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 241 Processing field: OrdererAddresses" +"2019-04-22 06:16:28.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: Consortium" +"2019-04-22 06:16:28.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: Capabilities" +"2019-04-22 06:16:28.122 UTC [common.channelconfig] NewStandardValues -> DEBU 244 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:28.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: ConsensusType" +"2019-04-22 06:16:28.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: BatchSize" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: BatchTimeout" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 248 Processing field: KafkaBrokers" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: ChannelRestrictions" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24a Processing field: Capabilities" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] NewStandardValues -> DEBU 24b Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24c Processing field: Endpoints" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: MSP" +"2019-04-22 06:16:28.123 UTC [common.channelconfig] validateMSP -> DEBU 24f Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:28.123 UTC [msp] newBccspMsp -> DEBU 250 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:28.123 UTC [msp] New -> DEBU 251 Creating Cache-MSP instance" +"2019-04-22 06:16:28.123 UTC [msp] Setup -> DEBU 252 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:28.123 UTC [msp.identity] newIdentity -> DEBU 253 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.123 UTC [msp.identity] newIdentity -> DEBU 254 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.124 UTC [msp] Validate -> DEBU 255 MSP OrdererMSP validating identity" +"2019-04-22 06:16:28.124 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-04-22 06:16:28.124 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: ChannelCreationPolicy" +"2019-04-22 06:16:28.124 UTC [common.channelconfig] NewStandardValues -> DEBU 258 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:28.124 UTC [common.channelconfig] initializeProtosStruct -> DEBU 259 Processing field: MSP" +"2019-04-22 06:16:28.124 UTC [common.channelconfig] validateMSP -> DEBU 25a Setting up MSP for org Org1MSP" +"2019-04-22 06:16:28.124 UTC [msp] newBccspMsp -> DEBU 25b Creating BCCSP-based MSP instance" +"2019-04-22 06:16:28.124 UTC [msp] New -> DEBU 25c Creating Cache-MSP instance" +"2019-04-22 06:16:28.124 UTC [msp] Setup -> DEBU 25d Setting up MSP instance Org1MSP" +"2019-04-22 06:16:28.124 UTC [msp.identity] newIdentity -> DEBU 25e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.125 UTC [msp.identity] newIdentity -> DEBU 25f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.127 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 260 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:28.127 UTC [msp] Validate -> DEBU 261 MSP Org1MSP validating identity" +"2019-04-22 06:16:28.127 UTC [msp] getCertificationChain -> DEBU 262 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:28.127 UTC [msp] hasOURole -> DEBU 263 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:28.127 UTC [msp] getCertificationChain -> DEBU 264 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:28.127 UTC [common.channelconfig] NewStandardValues -> DEBU 265 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:28.127 UTC [common.channelconfig] initializeProtosStruct -> DEBU 266 Processing field: MSP" +"2019-04-22 06:16:28.127 UTC [common.channelconfig] validateMSP -> DEBU 267 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:28.127 UTC [msp] newBccspMsp -> DEBU 268 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:28.128 UTC [msp] New -> DEBU 269 Creating Cache-MSP instance" +"2019-04-22 06:16:28.128 UTC [msp] Setup -> DEBU 26a Setting up MSP instance Org2MSP" +"2019-04-22 06:16:28.128 UTC [msp.identity] newIdentity -> DEBU 26b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.128 UTC [msp.identity] newIdentity -> DEBU 26c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:28.129 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 26d Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:28.129 UTC [msp] Validate -> DEBU 26e MSP Org2MSP validating identity" +"2019-04-22 06:16:28.129 UTC [msp] getCertificationChain -> DEBU 26f MSP Org2MSP getting certification chain" +"2019-04-22 06:16:28.129 UTC [msp] hasOURole -> DEBU 270 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:28.129 UTC [msp] getCertificationChain -> DEBU 271 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:28.130 UTC [msp] Setup -> DEBU 272 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:28.130 UTC [msp] Setup -> DEBU 273 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 275 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 277 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:28.130 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:28.132 UTC [policies] NewManagerImpl -> DEBU 27a Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:28.132 UTC [policies] NewManagerImpl -> DEBU 27b Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27c Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27d Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27e Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 27f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 280 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 281 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 282 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 283 Proposed new policy Admins for Channel/Consortiums" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 284 Proposed new policy Admins for Channel" +"2019-04-22 06:16:28.133 UTC [policies] GetPolicy -> DEBU 285 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 286 Proposed new policy Readers for Channel" +"2019-04-22 06:16:28.133 UTC [policies] GetPolicy -> DEBU 287 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-04-22 06:16:28.133 UTC [policies] NewManagerImpl -> DEBU 288 Proposed new policy Writers for Channel" +"2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:28.133 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Group] /Channel/Consortiums" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-04-22 06:16:28.134 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a1 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a2 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a4 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a5 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a7 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a8 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2a9 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2aa Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:28.135 UTC [common.configtx] addToMap -> DEBU 2ab Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2ac Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2ad Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2ae Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:28.136 UTC [common.configtx] addToMap -> DEBU 2af Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:28.136 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b0 As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:28.136 UTC [common.channelconfig] LogSanityChecks -> DEBU 2b1 As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b2 Manager Channel looking up path [Application]" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b3 Manager Channel has managers Orderer" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b4 Manager Channel has managers Consortiums" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b5 Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b6 Manager Channel has managers Orderer" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b7 Manager Channel has managers Consortiums" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b8 Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:28.136 UTC [policies] Manager -> DEBU 2b9 Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:28.136 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ba As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:28.136 UTC [common.capabilities] Supported -> DEBU 2bb Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:16:28.136 UTC [common.capabilities] Supported -> DEBU 2bc Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:28.136 UTC [orderer.common.server] func1 -> DEBU 2bd Executing callback to update root CAs" +"2019-04-22 06:16:28.136 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2be updating root CAs for channel [testchainid]" +"2019-04-22 06:16:28.137 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2bf adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:16:28.137 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c0 adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:16:28.137 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2c1 adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:16:28.137 UTC [fsblkstorage] Next -> DEBU 2c2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:28.137 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:28.137 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c4 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-04-22 06:16:28.137 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c5 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:28.137 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 blockbytes [18412] read from file [0]" +"2019-04-22 06:16:28.137 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2c7 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2019-04-22 06:16:28.137 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2c8 EvictionSuspicion not set, defaulting to 10m0s" +"2019-04-22 06:16:28.141 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c9 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2019-04-22 06:16:28.141 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2ca No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2019-04-22 06:16:28.150 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2cb Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2019-04-22 06:16:28.161 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cc Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2019-04-22 06:16:28.161 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2cd Appending 0 entries to memory storage" channel=testchainid node=1 +"2019-04-22 06:16:28.162 UTC [fsblkstorage] Next -> DEBU 2ce Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:28.162 UTC [fsblkstorage] newBlockfileStream -> DEBU 2cf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:28.162 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d0 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-04-22 06:16:28.162 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d1 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:28.163 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d2 blockbytes [18412] read from file [0]" +"2019-04-22 06:16:28.164 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2d3 [channel: testchainid] Done creating channel support resources" +"2019-04-22 06:16:28.164 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2d4 Creating system channel msg processor for channel testchainid" +"2019-04-22 06:16:28.165 UTC [fsblkstorage] Next -> DEBU 2d5 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:28.165 UTC [fsblkstorage] newBlockfileStream -> DEBU 2d6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:28.165 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d7 Remaining bytes=[18415], Going to peek [8] bytes" +"2019-04-22 06:16:28.165 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d8 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:28.165 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2d9 blockbytes [18412] read from file [0]" +"2019-04-22 06:16:28.166 UTC [orderer.commmon.multichannel] Initialize -> INFO 2da Starting system channel 'testchainid' with genesis block hash bccae20aaab201a55c9ee823a533d677feba8c9063b32a630efd47c984a7033d and orderer type etcdraft" +"2019-04-22 06:16:28.166 UTC [orderer.consensus.etcdraft] Start -> INFO 2db Starting Raft node" channel=testchainid node=1 +"2019-04-22 06:16:28.166 UTC [orderer.common.cluster] Configure -> INFO 2dc Entering, channel: testchainid, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +]" +"2019-04-22 06:16:28.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2dd Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2019-04-22 06:16:28.167 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2de Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-04-22 06:16:28.167 UTC [orderer.common.cluster] func1 -> DEBU 2df Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + for channel testchainid" +"2019-04-22 06:16:28.168 UTC [grpc] DialContext -> DEBU 2e0 parsed scheme: """ +"2019-04-22 06:16:28.168 UTC [grpc] DialContext -> DEBU 2e1 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:28.168 UTC [grpc] NewAddress -> DEBU 2e2 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2019-04-22 06:16:28.169 UTC [grpc] switchBalancer -> DEBU 2e3 ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:28.169 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e4 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2019-04-22 06:16:28.171 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2e6 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-04-22 06:16:28.169 UTC [grpc] HandleSubConnStateChange -> DEBU 2e5 pickfirstBalancer: HandleSubConnStateChange: 0xc00024e010, CONNECTING" +"2019-04-22 06:16:28.172 UTC [orderer.common.cluster] func1 -> DEBU 2e7 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- + for channel testchainid" +"2019-04-22 06:16:28.172 UTC [grpc] DialContext -> DEBU 2e8 parsed scheme: """ +"2019-04-22 06:16:28.172 UTC [grpc] DialContext -> DEBU 2e9 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:28.172 UTC [grpc] NewAddress -> DEBU 2ea ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2019-04-22 06:16:28.173 UTC [grpc] switchBalancer -> DEBU 2eb ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:28.173 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ec 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-04-22 06:16:28.173 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2ee 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-04-22 06:16:28.173 UTC [grpc] HandleSubConnStateChange -> DEBU 2ed pickfirstBalancer: HandleSubConnStateChange: 0xc00024e330, CONNECTING" +"2019-04-22 06:16:28.174 UTC [orderer.common.cluster] Configure -> INFO 2ef Exiting" +"2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] start -> DEBU 2f0 Starting raft node: #peers: 3" channel=testchainid node=1 +"2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] start -> INFO 2f1 Starting raft node as part of a new channel" channel=testchainid node=1 +"2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f2 1 became follower at term 0" channel=testchainid node=1 +"2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2f3 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2019-04-22 06:16:28.175 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2f4 1 became follower at term 1" channel=testchainid node=1 +"2019-04-22 06:16:28.176 UTC [orderer.common.server] Start -> INFO 2f5 Starting orderer: + Version: 2.0.0 Commit SHA: development build Go version: go1.11.5 - OS/Arch: linux/amd64 -[008 02-28 03:15:34.04 UTC] [%{longpkg}] %{callpath} -> INFO Beginning to serve requests -[009 02-28 03:15:34.06 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the topic for this channel... -[00a 02-28 03:15:56.71 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the producer for this channel... -[00b 02-28 03:15:56.72 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Producer set up successfully -[00c 02-28 03:15:56.72 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] About to post the CONNECT message... -[00d 02-28 03:15:58.65 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] CONNECT message posted successfully -[00e 02-28 03:15:58.65 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the parent consumer for this channel... -[00f 02-28 03:15:58.71 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Parent consumer set up successfully -[010 02-28 03:15:58.71 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)... -[011 02-28 03:15:58.77 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Channel consumer set up successfully -[012 02-28 03:15:58.82 UTC] [%{longpkg}] %{callpath} -> INFO [channel: testchainid] Start phase completed successfully -[013 02-28 03:16:08.99 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -[014 02-28 03:16:09.01 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53832 grpc.code=OK grpc.call_duration=155.0212ms -[015 02-28 03:16:09.05 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block 0 -[016 02-28 03:16:09.05 UTC] [%{longpkg}] %{callpath} -> INFO Created and starting new chain businesschannel -[017 02-28 03:16:09.05 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the topic for this channel... -[018 02-28 03:16:09.06 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53830 because of consenter error -[019 02-28 03:16:09.06 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53830 grpc.code=OK grpc.call_duration=224.5306ms -[01a 02-28 03:16:09.30 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53838 because of consenter error -[01b 02-28 03:16:09.30 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53838 grpc.code=OK grpc.call_duration=212.243ms -[01c 02-28 03:16:09.43 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the producer for this channel... -[01d 02-28 03:16:09.46 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Producer set up successfully -[01e 02-28 03:16:09.46 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] About to post the CONNECT message... -[01f 02-28 03:16:09.58 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53840 because of consenter error -[020 02-28 03:16:09.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53840 grpc.code=OK grpc.call_duration=200.4706ms -[021 02-28 03:16:09.80 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53846 because of consenter error -[022 02-28 03:16:09.80 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53846 grpc.code=OK grpc.call_duration=204.0983ms -[023 02-28 03:16:10.02 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53848 because of consenter error -[024 02-28 03:16:10.02 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53848 grpc.code=OK grpc.call_duration=202.0332ms -[025 02-28 03:16:10.23 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53854 because of consenter error -[026 02-28 03:16:10.24 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53854 grpc.code=OK grpc.call_duration=201.8249ms -[027 02-28 03:16:10.45 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53858 because of consenter error -[028 02-28 03:16:10.46 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53858 grpc.code=OK grpc.call_duration=204.577ms -[029 02-28 03:16:10.68 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53860 because of consenter error -[02a 02-28 03:16:10.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53860 grpc.code=OK grpc.call_duration=218.503ms -[02b 02-28 03:16:10.96 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53864 because of consenter error -[02c 02-28 03:16:10.96 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53864 grpc.code=OK grpc.call_duration=204.0672ms -[02d 02-28 03:16:11.24 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53866 because of consenter error -[02e 02-28 03:16:11.25 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53866 grpc.code=OK grpc.call_duration=222.4605ms -[02f 02-28 03:16:11.50 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] CONNECT message posted successfully -[030 02-28 03:16:11.50 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the parent consumer for this channel... -[031 02-28 03:16:11.51 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Parent consumer set up successfully -[032 02-28 03:16:11.51 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)... -[033 02-28 03:16:11.53 UTC] [%{longpkg}] %{callpath} -> WARN [channel: businesschannel] Rejecting deliver request for 172.28.0.6:53868 because of consenter error -[034 02-28 03:16:11.53 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53868 grpc.code=OK grpc.call_duration=205.1203ms -[035 02-28 03:16:11.70 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Channel consumer set up successfully -[036 02-28 03:16:11.73 UTC] [%{longpkg}] %{callpath} -> INFO [channel: businesschannel] Start phase completed successfully -[037 02-28 03:16:11.84 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53874 grpc.code=OK grpc.call_duration=256.1619ms -[038 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53908: rpc error: code = Canceled desc = context canceled -[03a 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53908 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=69.4443ms -[039 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53910: rpc error: code = Canceled desc = context canceled -[03b 02-28 03:16:16.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53910 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=56.0448ms -[03c 02-28 03:16:18.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53916: rpc error: code = Canceled desc = context canceled -[03d 02-28 03:16:18.93 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:53916 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=144.3606ms -[03e 02-28 03:16:18.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53918: rpc error: code = Canceled desc = context canceled -[03f 02-28 03:16:18.95 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53918 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=140.6368ms -[040 02-28 03:16:24.24 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.14:47114 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.5387103s -[041 02-28 03:17:11.85 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53980: rpc error: code = Canceled desc = context canceled -[042 02-28 03:17:11.85 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53980 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.5368747s -[043 02-28 03:17:55.56 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:53998: rpc error: code = Canceled desc = context canceled -[044 02-28 03:17:55.56 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:53998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.1122ms -[045 02-28 03:17:58.26 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54012: rpc error: code = Canceled desc = context canceled -[046 02-28 03:17:58.26 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:54012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=46.6709ms -[047 02-28 03:18:04.72 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54062: rpc error: code = Canceled desc = context canceled -[048 02-28 03:18:04.72 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.5046ms -[049 02-28 03:18:05.12 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54064: rpc error: code = Canceled desc = context canceled -[04a 02-28 03:18:05.12 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54064 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.9987ms -[04b 02-28 03:18:05.36 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54066: rpc error: code = Canceled desc = context canceled -[04c 02-28 03:18:05.36 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2082ms -[04d 02-28 03:18:05.66 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54068: rpc error: code = Canceled desc = context canceled -[04e 02-28 03:18:05.66 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.1116ms -[04f 02-28 03:18:05.97 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54070: rpc error: code = Canceled desc = context canceled -[050 02-28 03:18:05.97 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=61.9088ms -[051 02-28 03:18:06.16 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54072: rpc error: code = Canceled desc = context canceled -[052 02-28 03:18:06.16 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.2948ms -[053 02-28 03:18:06.39 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54074: rpc error: code = Canceled desc = context canceled -[054 02-28 03:18:06.39 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54074 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2278ms -[055 02-28 03:18:06.64 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54076: rpc error: code = Canceled desc = context canceled -[056 02-28 03:18:06.65 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.0671ms -[057 02-28 03:18:06.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54078: rpc error: code = Canceled desc = context canceled -[058 02-28 03:18:06.92 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54078 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.1341ms -[059 02-28 03:18:07.13 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54080: rpc error: code = Canceled desc = context canceled -[05a 02-28 03:18:07.13 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54080 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0353ms -[05b 02-28 03:18:07.39 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54082: rpc error: code = Canceled desc = context canceled -[05c 02-28 03:18:07.40 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54082 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.0492ms -[05d 02-28 03:18:07.63 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54084: rpc error: code = Canceled desc = context canceled -[05e 02-28 03:18:07.63 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.009ms -[05f 02-28 03:18:19.75 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -[060 02-28 03:18:19.76 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -[061 02-28 03:18:19.81 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -[062 02-28 03:18:19.81 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -[063 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54086: rpc error: code = Canceled desc = context canceled -[064 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54086 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=89.9368ms -[065 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54088: rpc error: code = Canceled desc = context canceled -[066 02-28 03:18:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.28.0.6:54088 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=77.9045ms -[067 02-28 03:18:22.00 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54112: rpc error: code = Canceled desc = context canceled -[068 02-28 03:18:22.00 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54112 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.8183ms -[069 02-28 03:18:22.18 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54114: rpc error: code = Canceled desc = context canceled -[06a 02-28 03:18:22.18 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54114 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.2779ms -[06b 02-28 03:18:22.84 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54116: rpc error: code = Canceled desc = context canceled -[06c 02-28 03:18:22.84 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54116 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.5206ms -[06d 02-28 03:18:23.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54118: rpc error: code = Canceled desc = context canceled -[06e 02-28 03:18:23.07 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54118 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.4903ms -[06f 02-28 03:18:23.26 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54120: rpc error: code = Canceled desc = context canceled -[070 02-28 03:18:23.26 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54120 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.6267ms -[071 02-28 03:18:23.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54122: rpc error: code = Canceled desc = context canceled -[072 02-28 03:18:23.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54122 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.9503ms -[073 02-28 03:18:23.75 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54124: rpc error: code = Canceled desc = context canceled -[074 02-28 03:18:23.75 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54124 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2949ms -[075 02-28 03:18:23.98 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54126: rpc error: code = Canceled desc = context canceled -[076 02-28 03:18:23.98 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54126 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.5484ms -[077 02-28 03:18:24.20 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54128: rpc error: code = Canceled desc = context canceled -[078 02-28 03:18:24.20 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54128 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.6568ms -[079 02-28 03:18:24.44 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54130: rpc error: code = Canceled desc = context canceled -[07a 02-28 03:18:24.44 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54130 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.9623ms -[07b 02-28 03:18:24.72 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54132: rpc error: code = Canceled desc = context canceled -[07c 02-28 03:18:24.72 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54132 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.5518ms -[07d 02-28 03:18:24.99 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54134: rpc error: code = Canceled desc = context canceled -[07e 02-28 03:18:24.99 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54134 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.9978ms -[07f 02-28 03:18:25.21 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54136: rpc error: code = Canceled desc = context canceled -[080 02-28 03:18:25.21 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54136 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8164ms -[081 02-28 03:18:25.41 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54138: rpc error: code = Canceled desc = context canceled -[082 02-28 03:18:25.41 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54138 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.071ms -[083 02-28 03:18:25.76 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.28.0.6:54140: rpc error: code = Canceled desc = context canceled -[084 02-28 03:18:25.76 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.28.0.6:54140 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.1155ms + OS/Arch: linux/amd64" +"2019-04-22 06:16:28.176 UTC [orderer.common.server] Start -> INFO 2f6 Beginning to serve requests" +"2019-04-22 06:16:28.179 UTC [orderer.consensus.etcdraft] apply -> INFO 2f7 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-04-22 06:16:28.179 UTC [orderer.consensus.etcdraft] apply -> INFO 2f8 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-04-22 06:16:28.179 UTC [orderer.consensus.etcdraft] apply -> INFO 2f9 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-04-22 06:16:28.215 UTC [grpc] HandleSubConnStateChange -> DEBU 2fa pickfirstBalancer: HandleSubConnStateChange: 0xc00024e010, READY" +"2019-04-22 06:16:28.222 UTC [grpc] HandleSubConnStateChange -> DEBU 2fb pickfirstBalancer: HandleSubConnStateChange: 0xc00024e330, READY" +"2019-04-22 06:16:28.330 UTC [orderer.common.cluster] Step -> DEBU 2fc Connection from orderer2.example.com(192.168.224.2:57130)" +"2019-04-22 06:16:28.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2fd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:28.331 UTC [orderer.consensus.etcdraft] Step -> INFO 2fe 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +"2019-04-22 06:16:28.331 UTC [orderer.common.cluster] NewStream -> DEBU 2ff Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-04-22 06:16:28.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 300 Sending msg of 28 bytes to 3 on channel testchainid took 152µs" +"2019-04-22 06:16:28.332 UTC [orderer.common.cluster.step] sendMessage -> DEBU 301 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.6µs " +"2019-04-22 06:16:28.335 UTC [orderer.common.cluster.step] handleMessage -> DEBU 302 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:28.335 UTC [orderer.consensus.etcdraft] Step -> INFO 303 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2019-04-22 06:16:28.335 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 304 1 became follower at term 2" channel=testchainid node=1 +"2019-04-22 06:16:28.335 UTC [orderer.consensus.etcdraft] Step -> INFO 305 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2019-04-22 06:16:28.337 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 306 Sending msg of 28 bytes to 3 on channel testchainid took 34.1µs" +"2019-04-22 06:16:28.337 UTC [orderer.common.cluster.step] sendMessage -> DEBU 307 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.3µs " +"2019-04-22 06:16:28.344 UTC [orderer.common.cluster.step] handleMessage -> DEBU 308 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 36" +"2019-04-22 06:16:28.344 UTC [orderer.consensus.etcdraft] run -> INFO 309 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2019-04-22 06:16:28.346 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30a Sending msg of 28 bytes to 3 on channel testchainid took 123.6µs" +"2019-04-22 06:16:28.346 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.8µs " +"2019-04-22 06:16:28.346 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 30c Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2019-04-22 06:16:28.347 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:28.348 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30e Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +"2019-04-22 06:16:28.348 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.5µs " +"2019-04-22 06:16:28.832 UTC [orderer.common.cluster.step] handleMessage -> DEBU 310 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:28.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 311 Sending msg of 28 bytes to 3 on channel testchainid took 73.6µs" +"2019-04-22 06:16:28.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +"2019-04-22 06:16:29.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 313 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:29.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 314 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +"2019-04-22 06:16:29.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 315 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.5µs " +"2019-04-22 06:16:29.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 316 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:29.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 317 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +"2019-04-22 06:16:29.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.2µs " +"2019-04-22 06:16:30.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 319 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:30.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31a Sending msg of 28 bytes to 3 on channel testchainid took 38.6µs" +"2019-04-22 06:16:30.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +"2019-04-22 06:16:30.828 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:30.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31d Sending msg of 28 bytes to 3 on channel testchainid took 162.5µs" +"2019-04-22 06:16:30.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.4µs " +"2019-04-22 06:16:31.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:31.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 320 Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" +"2019-04-22 06:16:31.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 321 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 261.5µs " +"2019-04-22 06:16:31.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:31.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 323 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +"2019-04-22 06:16:31.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU 324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +"2019-04-22 06:16:32.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:32.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +"2019-04-22 06:16:32.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +"2019-04-22 06:16:32.832 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:32.833 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2019-04-22 06:16:32.833 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.1µs " +"2019-04-22 06:16:33.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:33.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32c Sending msg of 28 bytes to 3 on channel testchainid took 48.6µs" +"2019-04-22 06:16:33.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 368.6µs " +"2019-04-22 06:16:33.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 32e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:33.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 32f Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" +"2019-04-22 06:16:33.832 UTC [orderer.common.cluster.step] sendMessage -> DEBU 330 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 724.1µs " +"2019-04-22 06:16:34.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 331 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:34.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 332 Sending msg of 28 bytes to 3 on channel testchainid took 80.4µs" +"2019-04-22 06:16:34.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 333 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 689.6µs " +"2019-04-22 06:16:34.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 334 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:34.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 335 Sending msg of 28 bytes to 3 on channel testchainid took 33.7µs" +"2019-04-22 06:16:34.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 336 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 617.2µs " +"2019-04-22 06:16:35.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 337 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:35.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 338 Sending msg of 28 bytes to 3 on channel testchainid took 30.6µs" +"2019-04-22 06:16:35.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 339 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +"2019-04-22 06:16:35.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:35.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33b Sending msg of 28 bytes to 3 on channel testchainid took 36.1µs" +"2019-04-22 06:16:35.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157µs " +"2019-04-22 06:16:36.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 33d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:36.332 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 33e Sending msg of 28 bytes to 3 on channel testchainid took 117.3µs" +"2019-04-22 06:16:36.332 UTC [orderer.common.cluster.step] sendMessage -> DEBU 33f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 528.7µs " +"2019-04-22 06:16:36.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 340 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:36.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 341 Sending msg of 28 bytes to 3 on channel testchainid took 45.6µs" +"2019-04-22 06:16:36.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 342 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 466.6µs " +"2019-04-22 06:16:37.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 343 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:37.332 UTC [orderer.common.cluster.step] sendMessage -> DEBU 344 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.3µs " +"2019-04-22 06:16:37.332 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 345 Sending msg of 28 bytes to 3 on channel testchainid took 187.2µs" +"2019-04-22 06:16:37.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 346 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:37.832 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 347 Sending msg of 28 bytes to 3 on channel testchainid took 43.9µs" +"2019-04-22 06:16:37.832 UTC [orderer.common.cluster.step] sendMessage -> DEBU 348 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.7µs " +"2019-04-22 06:16:38.116 UTC [orderer.common.server] replicateDisabledChains -> DEBU 349 No inactive chains to try to replicate" +"2019-04-22 06:16:38.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 34a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:38.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 34b Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +"2019-04-22 06:16:38.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 34c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234µs " +"2019-04-22 06:16:38.389 UTC [orderer.common.server] Deliver -> DEBU 34d Starting new Deliver handler" +"2019-04-22 06:16:38.389 UTC [common.deliver] Handle -> DEBU 34e Starting new deliver loop for 192.168.224.9:34480" +"2019-04-22 06:16:38.389 UTC [common.deliver] Handle -> DEBU 34f Attempting to read seek info message from 192.168.224.9:34480" +"2019-04-22 06:16:38.402 UTC [orderer.common.server] Broadcast -> DEBU 350 Starting new Broadcast handler" +"2019-04-22 06:16:38.403 UTC [orderer.common.broadcast] Handle -> DEBU 351 Starting new broadcast loop for 192.168.224.9:34482" +"2019-04-22 06:16:38.404 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 352 [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34482" +"2019-04-22 06:16:38.405 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 353 Processing config update tx with system channel message processor for channel ID businesschannel" +"2019-04-22 06:16:38.405 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 354 Processing channel create tx for channel businesschannel on system channel testchainid" +"2019-04-22 06:16:38.407 UTC [common.channelconfig] NewStandardValues -> DEBU 355 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:38.407 UTC [common.channelconfig] initializeProtosStruct -> DEBU 356 Processing field: HashingAlgorithm" +"2019-04-22 06:16:38.407 UTC [common.channelconfig] initializeProtosStruct -> DEBU 357 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:38.408 UTC [common.channelconfig] initializeProtosStruct -> DEBU 358 Processing field: OrdererAddresses" +"2019-04-22 06:16:38.408 UTC [common.channelconfig] initializeProtosStruct -> DEBU 359 Processing field: Consortium" +"2019-04-22 06:16:38.408 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35a Processing field: Capabilities" +"2019-04-22 06:16:38.409 UTC [common.channelconfig] NewStandardValues -> DEBU 35b Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:38.409 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35c Processing field: ConsensusType" +"2019-04-22 06:16:38.410 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35d Processing field: BatchSize" +"2019-04-22 06:16:38.410 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35e Processing field: BatchTimeout" +"2019-04-22 06:16:38.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35f Processing field: KafkaBrokers" +"2019-04-22 06:16:38.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU 360 Processing field: ChannelRestrictions" +"2019-04-22 06:16:38.411 UTC [common.channelconfig] initializeProtosStruct -> DEBU 361 Processing field: Capabilities" +"2019-04-22 06:16:38.412 UTC [common.channelconfig] NewStandardValues -> DEBU 362 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:38.412 UTC [common.channelconfig] initializeProtosStruct -> DEBU 363 Processing field: Endpoints" +"2019-04-22 06:16:38.413 UTC [common.channelconfig] NewStandardValues -> DEBU 364 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.413 UTC [common.channelconfig] initializeProtosStruct -> DEBU 365 Processing field: MSP" +"2019-04-22 06:16:38.413 UTC [common.channelconfig] validateMSP -> DEBU 366 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:38.414 UTC [msp] newBccspMsp -> DEBU 367 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.415 UTC [msp] New -> DEBU 368 Creating Cache-MSP instance" +"2019-04-22 06:16:38.415 UTC [msp] Setup -> DEBU 369 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:38.416 UTC [msp.identity] newIdentity -> DEBU 36a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.416 UTC [msp.identity] newIdentity -> DEBU 36b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.416 UTC [msp] Validate -> DEBU 36c MSP OrdererMSP validating identity" +"2019-04-22 06:16:38.416 UTC [common.channelconfig] NewStandardValues -> DEBU 36d Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:38.416 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36e Processing field: ACLs" +"2019-04-22 06:16:38.416 UTC [common.channelconfig] initializeProtosStruct -> DEBU 36f Processing field: Capabilities" +"2019-04-22 06:16:38.416 UTC [common.channelconfig] NewStandardValues -> DEBU 370 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.418 UTC [common.channelconfig] initializeProtosStruct -> DEBU 371 Processing field: AnchorPeers" +"2019-04-22 06:16:38.418 UTC [common.channelconfig] NewStandardValues -> DEBU 372 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.418 UTC [common.channelconfig] initializeProtosStruct -> DEBU 373 Processing field: MSP" +"2019-04-22 06:16:38.419 UTC [common.channelconfig] Validate -> DEBU 374 Anchor peers for org Org1MSP are " +"2019-04-22 06:16:38.419 UTC [common.channelconfig] validateMSP -> DEBU 375 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:38.419 UTC [msp] newBccspMsp -> DEBU 376 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.419 UTC [msp] New -> DEBU 377 Creating Cache-MSP instance" +"2019-04-22 06:16:38.419 UTC [msp] Setup -> DEBU 378 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:38.419 UTC [msp.identity] newIdentity -> DEBU 379 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.419 UTC [msp.identity] newIdentity -> DEBU 37a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.419 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37b Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:38.419 UTC [msp] Validate -> DEBU 37c MSP Org1MSP validating identity" +"2019-04-22 06:16:38.420 UTC [msp] getCertificationChain -> DEBU 37d MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.420 UTC [msp] hasOURole -> DEBU 37e MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:38.420 UTC [msp] getCertificationChain -> DEBU 37f MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.420 UTC [common.channelconfig] NewStandardValues -> DEBU 380 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.420 UTC [common.channelconfig] initializeProtosStruct -> DEBU 381 Processing field: AnchorPeers" +"2019-04-22 06:16:38.420 UTC [common.channelconfig] NewStandardValues -> DEBU 382 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.420 UTC [common.channelconfig] initializeProtosStruct -> DEBU 383 Processing field: MSP" +"2019-04-22 06:16:38.420 UTC [common.channelconfig] Validate -> DEBU 384 Anchor peers for org Org2MSP are " +"2019-04-22 06:16:38.420 UTC [common.channelconfig] validateMSP -> DEBU 385 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:38.420 UTC [msp] newBccspMsp -> DEBU 386 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.420 UTC [msp] New -> DEBU 387 Creating Cache-MSP instance" +"2019-04-22 06:16:38.420 UTC [msp] Setup -> DEBU 388 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:38.420 UTC [msp.identity] newIdentity -> DEBU 389 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.421 UTC [msp.identity] newIdentity -> DEBU 38a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.421 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 38b Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:38.421 UTC [msp] Validate -> DEBU 38c MSP Org2MSP validating identity" +"2019-04-22 06:16:38.421 UTC [msp] getCertificationChain -> DEBU 38d MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.421 UTC [msp] hasOURole -> DEBU 38e MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:38.421 UTC [msp] getCertificationChain -> DEBU 38f MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.422 UTC [msp] Setup -> DEBU 390 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:38.422 UTC [msp] Setup -> DEBU 391 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 392 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 393 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 394 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 395 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 396 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 397 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 398 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 399 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39a Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39b Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39d Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39e Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 39f Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a0 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a1 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-04-22 06:16:38.422 UTC [policies] GetPolicy -> DEBU 3a2 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a3 Proposed new policy Admins for Channel" +"2019-04-22 06:16:38.422 UTC [policies] GetPolicy -> DEBU 3a4 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-04-22 06:16:38.422 UTC [policies] NewManagerImpl -> DEBU 3a5 Proposed new policy Readers for Channel" +"2019-04-22 06:16:38.426 UTC [policies] GetPolicy -> DEBU 3a6 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-04-22 06:16:38.426 UTC [policies] NewManagerImpl -> DEBU 3a7 Proposed new policy Writers for Channel" +"2019-04-22 06:16:38.427 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.427 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:38.428 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:38.429 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:38.429 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:38.430 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:38.430 UTC [common.configtx] addToMap -> DEBU 3b1 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:38.430 UTC [common.configtx] addToMap -> DEBU 3b2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:38.431 UTC [common.configtx] addToMap -> DEBU 3b3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:38.431 UTC [common.configtx] addToMap -> DEBU 3b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:38.431 UTC [common.configtx] addToMap -> DEBU 3b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:38.432 UTC [common.configtx] addToMap -> DEBU 3b6 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:38.432 UTC [common.configtx] addToMap -> DEBU 3b7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:38.432 UTC [common.configtx] addToMap -> DEBU 3b8 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.433 UTC [common.configtx] addToMap -> DEBU 3b9 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.433 UTC [common.configtx] addToMap -> DEBU 3ba Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:38.433 UTC [common.configtx] addToMap -> DEBU 3bb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:38.434 UTC [common.configtx] addToMap -> DEBU 3bc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.434 UTC [common.configtx] addToMap -> DEBU 3bd Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:38.435 UTC [common.configtx] addToMap -> DEBU 3be Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:38.436 UTC [common.configtx] addToMap -> DEBU 3bf Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.436 UTC [common.configtx] addToMap -> DEBU 3c0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:38.437 UTC [common.configtx] addToMap -> DEBU 3c1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:38.437 UTC [common.configtx] addToMap -> DEBU 3c2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:38.438 UTC [common.configtx] addToMap -> DEBU 3c3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:38.438 UTC [common.configtx] addToMap -> DEBU 3c4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:38.438 UTC [common.configtx] addToMap -> DEBU 3c5 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-04-22 06:16:38.439 UTC [common.configtx] addToMap -> DEBU 3c6 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:38.439 UTC [common.configtx] addToMap -> DEBU 3c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3c9 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3ca Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cb Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cc Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cd Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3ce Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3cf Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3d0 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.440 UTC [common.configtx] addToMap -> DEBU 3d1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d2 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d3 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d4 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d7 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d8 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3d9 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3da Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3db Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3dc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3dd Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:38.441 UTC [common.configtx] addToMap -> DEBU 3de Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.441 UTC [common.configtx] verifyDeltaSet -> DEBU 3df Processing change to key: [Group] /Channel/Application" +"2019-04-22 06:16:38.441 UTC [common.configtx] policyForItem -> DEBU 3e0 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-04-22 06:16:38.441 UTC [policies] Manager -> DEBU 3e1 Manager Channel looking up path []" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e2 Manager Channel has managers Orderer" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e3 Manager Channel has managers Application" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e4 Manager Channel looking up path [Application]" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e5 Manager Channel has managers Orderer" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e6 Manager Channel has managers Application" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e7 Manager Channel/Application looking up path []" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e8 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:38.442 UTC [policies] Manager -> DEBU 3e9 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:38.442 UTC [policies] Evaluate -> DEBU 3ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-04-22 06:16:38.442 UTC [policies] Evaluate -> DEBU 3eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:38.442 UTC [policies] Evaluate -> DEBU 3ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:16:38.442 UTC [msp] DeserializeIdentity -> DEBU 3ed Obtaining identity" +"2019-04-22 06:16:38.442 UTC [msp.identity] newIdentity -> DEBU 3ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.442 UTC [cauthdsl] func1 -> DEBU 3ef 0xc000c15bb0 gate 1555913798442752000 evaluation starts" +"2019-04-22 06:16:38.442 UTC [cauthdsl] func2 -> DEBU 3f0 0xc000c15bb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:38.442 UTC [cauthdsl] func2 -> DEBU 3f1 0xc000c15bb0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:38.442 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f2 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-04-22 06:16:38.442 UTC [cauthdsl] func2 -> DEBU 3f3 0xc000c15bb0 principal matched by identity 0" +"2019-04-22 06:16:38.442 UTC [msp.identity] Verify -> DEBU 3f4 Verify: digest = 00000000 a8 4b ca 9f 8a ef ce 6e 35 78 9c 94 89 37 8d 63 |.K.....n5x...7.c| +00000010 f9 28 84 f9 bb ab 1e a6 fb 1b ab fb 7b 47 43 26 |.(..........{GC&|" +"2019-04-22 06:16:38.443 UTC [msp.identity] Verify -> DEBU 3f5 Verify: sig = 00000000 30 45 02 21 00 ca bc be 2c 38 ef 04 a8 ba 2f 2b |0E.!....,8..../+| +00000010 6f ed 8d 96 dd 0d 24 a1 08 3b 44 03 2f 86 90 aa |o.....$..;D./...| +00000020 60 2b 51 31 87 02 20 06 7a b9 a2 30 6f 61 54 a8 |`+Q1.. .z..0oaT.| +00000030 fb 70 a9 b3 91 e8 c1 33 77 13 e7 cb c5 7f a2 ff |.p.....3w.......| +00000040 d1 ba 5f 6b 1e 2f e6 |.._k./.|" +"2019-04-22 06:16:38.443 UTC [cauthdsl] func2 -> DEBU 3f6 0xc000c15bb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:38.443 UTC [cauthdsl] func1 -> DEBU 3f7 0xc000c15bb0 gate 1555913798442752000 evaluation succeeds" +"2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3f8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3fa Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-04-22 06:16:38.443 UTC [policies] Evaluate -> DEBU 3fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3fc Processing change to key: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3fd Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3fe Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 3ff Processing change to key: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 400 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 401 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:38.443 UTC [common.configtx] verifyDeltaSet -> DEBU 402 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:38.443 UTC [common.configtx] recurseConfigMap -> DEBU 403 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 404 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 405 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 406 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 407 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 408 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 409 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40e Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 40f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 410 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 411 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 412 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 413 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 414 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 415 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 416 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 417 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 418 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.444 UTC [common.configtx] recurseConfigMap -> DEBU 419 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41a Sign: plaintext: 0AD2060A1B08011A0608C6B8F5E50522...638372D19938FBFF7D6A639AEDD7755B " +"2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41b Sign: digest: BB618B48FE09E33783AFE19AEFC7FD437E5E7D443710A18EB0D3FEDD591B6218 " +"2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41c Sign: plaintext: 0ACE060A1708041A0608C6B8F5E50522...D9C17C6C3794FC7EC4ED0F6EAD651A5F " +"2019-04-22 06:16:38.445 UTC [msp.identity] Sign -> DEBU 41d Sign: digest: 506A891A32D02BEBC13E324A81DF6C067206ECB495BE5272783C5DBE49D49A06 " +"2019-04-22 06:16:38.451 UTC [policies] Evaluate -> DEBU 41e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:38.451 UTC [policies] Evaluate -> DEBU 41f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:38.451 UTC [policies] Evaluate -> DEBU 420 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-04-22 06:16:38.452 UTC [policies] Evaluate -> DEBU 421 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:38.452 UTC [policies] Evaluate -> DEBU 422 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:16:38.452 UTC [msp] DeserializeIdentity -> DEBU 423 Obtaining identity" +"2019-04-22 06:16:38.452 UTC [msp.identity] newIdentity -> DEBU 424 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.453 UTC [cauthdsl] func1 -> DEBU 425 0xc0001723f0 gate 1555913798453641700 evaluation starts" +"2019-04-22 06:16:38.453 UTC [cauthdsl] func2 -> DEBU 426 0xc0001723f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:38.453 UTC [cauthdsl] func2 -> DEBU 427 0xc0001723f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:38.453 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 428 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:16:38.453 UTC [msp] Validate -> DEBU 429 MSP OrdererMSP validating identity" +"2019-04-22 06:16:38.454 UTC [cauthdsl] func2 -> DEBU 42a 0xc0001723f0 principal matched by identity 0" +"2019-04-22 06:16:38.454 UTC [msp.identity] Verify -> DEBU 42b Verify: digest = 00000000 50 6a 89 1a 32 d0 2b eb c1 3e 32 4a 81 df 6c 06 |Pj..2.+..>2J..l.| +00000010 72 06 ec b4 95 be 52 72 78 3c 5d be 49 d4 9a 06 |r.....Rrx<].I...|" +"2019-04-22 06:16:38.456 UTC [msp.identity] Verify -> DEBU 42c Verify: sig = 00000000 30 45 02 21 00 d8 96 7c 94 5a 11 bf 17 9f ad 22 |0E.!...|.Z....."| +00000010 bf 54 e9 c5 f1 d7 9b 86 ec 3b 56 b8 63 14 de 76 |.T.......;V.c..v| +00000020 3d a6 42 f9 ef 02 20 1d 3a 50 0b 86 f6 9c 03 88 |=.B... .:P......| +00000030 19 e7 2b 6b d7 6d d0 ea 25 23 21 b9 7e d5 ce dc |..+k.m..%#!.~...| +00000040 04 55 db 64 c7 cc eb |.U.d...|" +"2019-04-22 06:16:38.457 UTC [cauthdsl] func2 -> DEBU 42d 0xc0001723f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:38.457 UTC [cauthdsl] func1 -> DEBU 42e 0xc0001723f0 gate 1555913798453641700 evaluation succeeds" +"2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 42f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 430 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 431 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 432 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 433 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:38.457 UTC [policies] Evaluate -> DEBU 434 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:38.458 UTC [common.channelconfig] NewStandardValues -> DEBU 435 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: HashingAlgorithm" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 437 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: OrdererAddresses" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 439 Processing field: Consortium" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43a Processing field: Capabilities" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] NewStandardValues -> DEBU 43b Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43c Processing field: ConsensusType" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43d Processing field: BatchSize" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43e Processing field: BatchTimeout" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 43f Processing field: KafkaBrokers" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 440 Processing field: ChannelRestrictions" +"2019-04-22 06:16:38.459 UTC [common.channelconfig] initializeProtosStruct -> DEBU 441 Processing field: Capabilities" +"2019-04-22 06:16:38.460 UTC [common.channelconfig] NewStandardValues -> DEBU 442 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:38.460 UTC [common.channelconfig] initializeProtosStruct -> DEBU 443 Processing field: Endpoints" +"2019-04-22 06:16:38.460 UTC [common.channelconfig] NewStandardValues -> DEBU 444 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.460 UTC [common.channelconfig] initializeProtosStruct -> DEBU 445 Processing field: MSP" +"2019-04-22 06:16:38.460 UTC [common.channelconfig] validateMSP -> DEBU 446 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:38.460 UTC [msp] newBccspMsp -> DEBU 447 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.460 UTC [msp] New -> DEBU 448 Creating Cache-MSP instance" +"2019-04-22 06:16:38.460 UTC [msp] Setup -> DEBU 449 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:38.460 UTC [msp.identity] newIdentity -> DEBU 44a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.461 UTC [msp.identity] newIdentity -> DEBU 44b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.461 UTC [msp] Validate -> DEBU 44c MSP OrdererMSP validating identity" +"2019-04-22 06:16:38.461 UTC [common.channelconfig] NewStandardValues -> DEBU 44d Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:38.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44e Processing field: ACLs" +"2019-04-22 06:16:38.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 44f Processing field: Capabilities" +"2019-04-22 06:16:38.461 UTC [common.channelconfig] NewStandardValues -> DEBU 450 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 451 Processing field: AnchorPeers" +"2019-04-22 06:16:38.462 UTC [common.channelconfig] NewStandardValues -> DEBU 452 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 453 Processing field: MSP" +"2019-04-22 06:16:38.462 UTC [common.channelconfig] Validate -> DEBU 454 Anchor peers for org Org2MSP are " +"2019-04-22 06:16:38.462 UTC [common.channelconfig] validateMSP -> DEBU 455 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:38.462 UTC [msp] newBccspMsp -> DEBU 456 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.462 UTC [msp] New -> DEBU 457 Creating Cache-MSP instance" +"2019-04-22 06:16:38.462 UTC [msp] Setup -> DEBU 458 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:38.462 UTC [msp.identity] newIdentity -> DEBU 459 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.462 UTC [msp.identity] newIdentity -> DEBU 45a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.463 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 45b Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:38.463 UTC [msp] Validate -> DEBU 45c MSP Org2MSP validating identity" +"2019-04-22 06:16:38.463 UTC [msp] getCertificationChain -> DEBU 45d MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.463 UTC [msp] hasOURole -> DEBU 45e MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:38.464 UTC [msp] getCertificationChain -> DEBU 45f MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.464 UTC [common.channelconfig] NewStandardValues -> DEBU 460 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU 461 Processing field: AnchorPeers" +"2019-04-22 06:16:38.464 UTC [common.channelconfig] NewStandardValues -> DEBU 462 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.464 UTC [common.channelconfig] initializeProtosStruct -> DEBU 463 Processing field: MSP" +"2019-04-22 06:16:38.464 UTC [common.channelconfig] Validate -> DEBU 464 Anchor peers for org Org1MSP are " +"2019-04-22 06:16:38.464 UTC [common.channelconfig] validateMSP -> DEBU 465 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:38.464 UTC [msp] newBccspMsp -> DEBU 466 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.464 UTC [msp] New -> DEBU 467 Creating Cache-MSP instance" +"2019-04-22 06:16:38.465 UTC [msp] Setup -> DEBU 468 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:38.465 UTC [msp.identity] newIdentity -> DEBU 469 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.465 UTC [msp.identity] newIdentity -> DEBU 46a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.466 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 46b Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:38.466 UTC [msp] Validate -> DEBU 46c MSP Org1MSP validating identity" +"2019-04-22 06:16:38.466 UTC [msp] getCertificationChain -> DEBU 46d MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.467 UTC [msp] hasOURole -> DEBU 46e MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:38.467 UTC [msp] getCertificationChain -> DEBU 46f MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.467 UTC [msp] Setup -> DEBU 470 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:38.467 UTC [msp] Setup -> DEBU 471 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 472 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 473 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 474 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 475 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 476 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.467 UTC [policies] NewManagerImpl -> DEBU 477 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 478 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 479 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47a Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47e Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 47f Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 480 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 481 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:38.468 UTC [policies] GetPolicy -> DEBU 482 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 483 Proposed new policy Admins for Channel" +"2019-04-22 06:16:38.468 UTC [policies] GetPolicy -> DEBU 484 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-04-22 06:16:38.468 UTC [policies] NewManagerImpl -> DEBU 485 Proposed new policy Readers for Channel" +"2019-04-22 06:16:38.469 UTC [policies] GetPolicy -> DEBU 486 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-04-22 06:16:38.469 UTC [policies] NewManagerImpl -> DEBU 487 Proposed new policy Writers for Channel" +"2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:38.469 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 494 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 495 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 496 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:38.470 UTC [common.configtx] addToMap -> DEBU 497 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 498 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 499 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 49f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 4a0 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:38.471 UTC [common.configtx] addToMap -> DEBU 4a1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a5 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a8 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4a9 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4aa Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ab Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ac Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ad Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.472 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:38.473 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.473 UTC [common.configtx] verifyDeltaSet -> DEBU 4bf Processing change to key: [Group] /Channel/Application" +"2019-04-22 06:16:38.473 UTC [common.configtx] policyForItem -> DEBU 4c0 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c1 Manager Channel looking up path []" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c2 Manager Channel has managers Application" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c3 Manager Channel has managers Orderer" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c4 Manager Channel looking up path [Application]" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c5 Manager Channel has managers Application" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c6 Manager Channel has managers Orderer" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c7 Manager Channel/Application looking up path []" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c8 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:38.473 UTC [policies] Manager -> DEBU 4c9 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:38.473 UTC [policies] Evaluate -> DEBU 4ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-04-22 06:16:38.473 UTC [policies] Evaluate -> DEBU 4cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:16:38.474 UTC [msp] DeserializeIdentity -> DEBU 4cd Obtaining identity" +"2019-04-22 06:16:38.474 UTC [msp.identity] newIdentity -> DEBU 4ce Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.474 UTC [cauthdsl] func1 -> DEBU 4cf 0xc00054af00 gate 1555913798474450200 evaluation starts" +"2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d0 0xc00054af00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d1 0xc00054af00 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:38.474 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4d2 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d3 0xc00054af00 principal matched by identity 0" +"2019-04-22 06:16:38.474 UTC [msp.identity] Verify -> DEBU 4d4 Verify: digest = 00000000 a8 4b ca 9f 8a ef ce 6e 35 78 9c 94 89 37 8d 63 |.K.....n5x...7.c| +00000010 f9 28 84 f9 bb ab 1e a6 fb 1b ab fb 7b 47 43 26 |.(..........{GC&|" +"2019-04-22 06:16:38.474 UTC [msp.identity] Verify -> DEBU 4d5 Verify: sig = 00000000 30 45 02 21 00 ca bc be 2c 38 ef 04 a8 ba 2f 2b |0E.!....,8..../+| +00000010 6f ed 8d 96 dd 0d 24 a1 08 3b 44 03 2f 86 90 aa |o.....$..;D./...| +00000020 60 2b 51 31 87 02 20 06 7a b9 a2 30 6f 61 54 a8 |`+Q1.. .z..0oaT.| +00000030 fb 70 a9 b3 91 e8 c1 33 77 13 e7 cb c5 7f a2 ff |.p.....3w.......| +00000040 d1 ba 5f 6b 1e 2f e6 |.._k./.|" +"2019-04-22 06:16:38.474 UTC [cauthdsl] func2 -> DEBU 4d6 0xc00054af00 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:38.474 UTC [cauthdsl] func1 -> DEBU 4d7 0xc00054af00 gate 1555913798474450200 evaluation succeeds" +"2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4d8 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4da Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-04-22 06:16:38.474 UTC [policies] Evaluate -> DEBU 4db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4dc Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4dd Processing change to key: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4de Processing change to key: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4df Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4e0 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4e1 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:38.475 UTC [common.configtx] verifyDeltaSet -> DEBU 4e2 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4e9 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4ea Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4eb Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4ec Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.475 UTC [common.configtx] recurseConfigMap -> DEBU 4ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.476 UTC [common.configtx] recurseConfigMap -> DEBU 4ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.479 UTC [common.configtx] recurseConfigMap -> DEBU 4ef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.479 UTC [common.configtx] recurseConfigMap -> DEBU 4f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f4 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f5 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.480 UTC [common.configtx] recurseConfigMap -> DEBU 4f8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.481 UTC [common.configtx] recurseConfigMap -> DEBU 4f9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:38.481 UTC [common.channelconfig] NewStandardValues -> DEBU 4fa Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fb Processing field: HashingAlgorithm" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fc Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: OrdererAddresses" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: Consortium" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: Capabilities" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] NewStandardValues -> DEBU 500 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 501 Processing field: ConsensusType" +"2019-04-22 06:16:38.481 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: BatchSize" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 503 Processing field: BatchTimeout" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: KafkaBrokers" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 505 Processing field: ChannelRestrictions" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 506 Processing field: Capabilities" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] NewStandardValues -> DEBU 507 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 508 Processing field: Endpoints" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] NewStandardValues -> DEBU 509 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] initializeProtosStruct -> DEBU 50a Processing field: MSP" +"2019-04-22 06:16:38.482 UTC [common.channelconfig] validateMSP -> DEBU 50b Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:38.482 UTC [msp] newBccspMsp -> DEBU 50c Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.482 UTC [msp] New -> DEBU 50d Creating Cache-MSP instance" +"2019-04-22 06:16:38.483 UTC [msp] Setup -> DEBU 50e Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:38.483 UTC [msp.identity] newIdentity -> DEBU 50f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.484 UTC [msp.identity] newIdentity -> DEBU 510 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.484 UTC [msp] Validate -> DEBU 511 MSP OrdererMSP validating identity" +"2019-04-22 06:16:38.484 UTC [common.channelconfig] NewStandardValues -> DEBU 512 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 513 Processing field: ACLs" +"2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 514 Processing field: Capabilities" +"2019-04-22 06:16:38.485 UTC [common.channelconfig] NewStandardValues -> DEBU 515 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 516 Processing field: AnchorPeers" +"2019-04-22 06:16:38.485 UTC [common.channelconfig] NewStandardValues -> DEBU 517 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.485 UTC [common.channelconfig] initializeProtosStruct -> DEBU 518 Processing field: MSP" +"2019-04-22 06:16:38.485 UTC [common.channelconfig] Validate -> DEBU 519 Anchor peers for org Org1MSP are " +"2019-04-22 06:16:38.486 UTC [common.channelconfig] validateMSP -> DEBU 51a Setting up MSP for org Org1MSP" +"2019-04-22 06:16:38.486 UTC [msp] newBccspMsp -> DEBU 51b Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.486 UTC [msp] New -> DEBU 51c Creating Cache-MSP instance" +"2019-04-22 06:16:38.486 UTC [msp] Setup -> DEBU 51d Setting up MSP instance Org1MSP" +"2019-04-22 06:16:38.487 UTC [msp.identity] newIdentity -> DEBU 51e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.487 UTC [msp.identity] newIdentity -> DEBU 51f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.487 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 520 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:38.487 UTC [msp] Validate -> DEBU 521 MSP Org1MSP validating identity" +"2019-04-22 06:16:38.488 UTC [msp] getCertificationChain -> DEBU 522 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.488 UTC [msp] hasOURole -> DEBU 523 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:38.488 UTC [msp] getCertificationChain -> DEBU 524 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.488 UTC [common.channelconfig] NewStandardValues -> DEBU 525 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.488 UTC [common.channelconfig] initializeProtosStruct -> DEBU 526 Processing field: AnchorPeers" +"2019-04-22 06:16:38.488 UTC [common.channelconfig] NewStandardValues -> DEBU 527 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.488 UTC [common.channelconfig] initializeProtosStruct -> DEBU 528 Processing field: MSP" +"2019-04-22 06:16:38.488 UTC [common.channelconfig] Validate -> DEBU 529 Anchor peers for org Org2MSP are " +"2019-04-22 06:16:38.489 UTC [common.channelconfig] validateMSP -> DEBU 52a Setting up MSP for org Org2MSP" +"2019-04-22 06:16:38.489 UTC [msp] newBccspMsp -> DEBU 52b Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.489 UTC [msp] New -> DEBU 52c Creating Cache-MSP instance" +"2019-04-22 06:16:38.489 UTC [msp] Setup -> DEBU 52d Setting up MSP instance Org2MSP" +"2019-04-22 06:16:38.489 UTC [msp.identity] newIdentity -> DEBU 52e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.490 UTC [msp.identity] newIdentity -> DEBU 52f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.490 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 530 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:38.490 UTC [msp] Validate -> DEBU 531 MSP Org2MSP validating identity" +"2019-04-22 06:16:38.491 UTC [msp] getCertificationChain -> DEBU 532 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.491 UTC [msp] hasOURole -> DEBU 533 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:38.491 UTC [msp] getCertificationChain -> DEBU 534 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.491 UTC [msp] Setup -> DEBU 535 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:38.491 UTC [msp] Setup -> DEBU 536 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:38.491 UTC [policies] NewManagerImpl -> DEBU 537 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.491 UTC [policies] NewManagerImpl -> DEBU 538 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.491 UTC [policies] NewManagerImpl -> DEBU 539 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53a Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53b Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53c Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53d Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53e Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 53f Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 540 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 541 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 542 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 543 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 544 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 545 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 546 Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 547 Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 548 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 549 Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:38.492 UTC [policies] NewManagerImpl -> DEBU 54a Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:38.493 UTC [policies] NewManagerImpl -> DEBU 54b Proposed new policy Writers for Channel" +"2019-04-22 06:16:38.493 UTC [policies] NewManagerImpl -> DEBU 54c Proposed new policy Admins for Channel" +"2019-04-22 06:16:38.493 UTC [policies] NewManagerImpl -> DEBU 54d Proposed new policy Readers for Channel" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.493 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:38.494 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 567 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:38.495 UTC [common.configtx] addToMap -> DEBU 568 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 569 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 56f Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 570 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:38.496 UTC [common.configtx] addToMap -> DEBU 571 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 572 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 573 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 574 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 575 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 576 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 577 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 578 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:38.497 UTC [common.configtx] addToMap -> DEBU 579 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:38.497 UTC [common.capabilities] Supported -> DEBU 57a Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:16:38.497 UTC [common.capabilities] Supported -> DEBU 57b Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:38.498 UTC [orderer.common.cluster] NewStream -> DEBU 57c Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2019-04-22 06:16:38.498 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 57d Sending msg of 24746 bytes to 3 on channel testchainid took 182.9µs" +"2019-04-22 06:16:38.498 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 57e [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34482" +"2019-04-22 06:16:38.500 UTC [orderer.common.cluster.step] sendMessage -> DEBU 57f Send of SubmitRequest for channel testchainid with payload of size 24746 to orderer2.example.com(orderer2.example.com:7050) took 1.43ms " +"2019-04-22 06:16:38.504 UTC [orderer.common.broadcast] Handle -> DEBU 580 Received EOF from 192.168.224.9:34482, hangup" +"2019-04-22 06:16:38.505 UTC [orderer.common.server] func1 -> DEBU 581 Closing Broadcast stream" +"2019-04-22 06:16:38.510 UTC [comm.grpc.server] 1 -> INFO 582 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34482 grpc.code=OK grpc.call_duration=107.7729ms +"2019-04-22 06:16:38.511 UTC [common.deliver] deliverBlocks -> DEBU 583 Rejecting deliver for 192.168.224.9:34480 because channel businesschannel not found" +"2019-04-22 06:16:38.511 UTC [orderer.common.server] func1 -> DEBU 584 Closing Deliver stream" +"2019-04-22 06:16:38.511 UTC [comm.grpc.server] 1 -> INFO 585 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34480 grpc.code=OK grpc.call_duration=121.92ms +"2019-04-22 06:16:38.513 UTC [orderer.common.cluster.step] handleMessage -> DEBU 586 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 24955" +"2019-04-22 06:16:38.514 UTC [orderer.common.cluster.step] handleMessage -> DEBU 587 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:38.520 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 588 Sending msg of 28 bytes to 3 on channel testchainid took 141.9µs" +"2019-04-22 06:16:38.535 UTC [orderer.common.cluster.step] sendMessage -> DEBU 589 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.4µs " +"2019-04-22 06:16:38.536 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 58a Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +"2019-04-22 06:16:38.536 UTC [orderer.common.cluster.step] sendMessage -> DEBU 58b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186µs " +"2019-04-22 06:16:38.536 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 58c Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2019-04-22 06:16:38.537 UTC [common.channelconfig] NewStandardValues -> DEBU 58d Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:38.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58e Processing field: HashingAlgorithm" +"2019-04-22 06:16:38.537 UTC [common.channelconfig] initializeProtosStruct -> DEBU 58f Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:38.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 590 Processing field: OrdererAddresses" +"2019-04-22 06:16:38.538 UTC [common.channelconfig] initializeProtosStruct -> DEBU 591 Processing field: Consortium" +"2019-04-22 06:16:38.539 UTC [common.channelconfig] initializeProtosStruct -> DEBU 592 Processing field: Capabilities" +"2019-04-22 06:16:38.540 UTC [common.channelconfig] NewStandardValues -> DEBU 593 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:38.540 UTC [common.channelconfig] initializeProtosStruct -> DEBU 594 Processing field: ACLs" +"2019-04-22 06:16:38.540 UTC [common.channelconfig] initializeProtosStruct -> DEBU 595 Processing field: Capabilities" +"2019-04-22 06:16:38.541 UTC [common.channelconfig] NewStandardValues -> DEBU 596 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.542 UTC [common.channelconfig] initializeProtosStruct -> DEBU 597 Processing field: AnchorPeers" +"2019-04-22 06:16:38.543 UTC [common.channelconfig] NewStandardValues -> DEBU 598 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.543 UTC [common.channelconfig] initializeProtosStruct -> DEBU 599 Processing field: MSP" +"2019-04-22 06:16:38.544 UTC [common.channelconfig] Validate -> DEBU 59a Anchor peers for org Org1MSP are " +"2019-04-22 06:16:38.544 UTC [common.channelconfig] validateMSP -> DEBU 59b Setting up MSP for org Org1MSP" +"2019-04-22 06:16:38.544 UTC [msp] newBccspMsp -> DEBU 59c Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.545 UTC [msp] New -> DEBU 59d Creating Cache-MSP instance" +"2019-04-22 06:16:38.547 UTC [msp] Setup -> DEBU 59e Setting up MSP instance Org1MSP" +"2019-04-22 06:16:38.548 UTC [msp.identity] newIdentity -> DEBU 59f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.551 UTC [msp.identity] newIdentity -> DEBU 5a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.561 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5a1 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:38.563 UTC [msp] Validate -> DEBU 5a2 MSP Org1MSP validating identity" +"2019-04-22 06:16:38.564 UTC [msp] getCertificationChain -> DEBU 5a3 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.564 UTC [msp] hasOURole -> DEBU 5a4 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:38.565 UTC [msp] getCertificationChain -> DEBU 5a5 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:38.566 UTC [common.channelconfig] NewStandardValues -> DEBU 5a6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:38.567 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a7 Processing field: AnchorPeers" +"2019-04-22 06:16:38.567 UTC [common.channelconfig] NewStandardValues -> DEBU 5a8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5a9 Processing field: MSP" +"2019-04-22 06:16:38.572 UTC [common.channelconfig] Validate -> DEBU 5aa Anchor peers for org Org2MSP are " +"2019-04-22 06:16:38.572 UTC [common.channelconfig] validateMSP -> DEBU 5ab Setting up MSP for org Org2MSP" +"2019-04-22 06:16:38.572 UTC [msp] newBccspMsp -> DEBU 5ac Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.576 UTC [msp] New -> DEBU 5ad Creating Cache-MSP instance" +"2019-04-22 06:16:38.577 UTC [msp] Setup -> DEBU 5ae Setting up MSP instance Org2MSP" +"2019-04-22 06:16:38.578 UTC [msp.identity] newIdentity -> DEBU 5af Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.590 UTC [msp.identity] newIdentity -> DEBU 5b1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.588 UTC [orderer.common.server] Deliver -> DEBU 5b0 Starting new Deliver handler" +"2019-04-22 06:16:38.591 UTC [common.deliver] Handle -> DEBU 5b2 Starting new deliver loop for 192.168.224.9:34484" +"2019-04-22 06:16:38.594 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5b3 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:38.591 UTC [common.deliver] Handle -> DEBU 5b4 Attempting to read seek info message from 192.168.224.9:34484" +"2019-04-22 06:16:38.596 UTC [msp] Validate -> DEBU 5b5 MSP Org2MSP validating identity" +"2019-04-22 06:16:38.599 UTC [msp] getCertificationChain -> DEBU 5b6 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.600 UTC [msp] hasOURole -> DEBU 5b7 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:38.600 UTC [msp] getCertificationChain -> DEBU 5b8 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:38.601 UTC [common.channelconfig] NewStandardValues -> DEBU 5b9 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:38.601 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ba Processing field: ConsensusType" +"2019-04-22 06:16:38.601 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bb Processing field: BatchSize" +"2019-04-22 06:16:38.602 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bc Processing field: BatchTimeout" +"2019-04-22 06:16:38.602 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bd Processing field: KafkaBrokers" +"2019-04-22 06:16:38.603 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5be Processing field: ChannelRestrictions" +"2019-04-22 06:16:38.603 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5bf Processing field: Capabilities" +"2019-04-22 06:16:38.604 UTC [common.channelconfig] NewStandardValues -> DEBU 5c0 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:38.604 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c1 Processing field: Endpoints" +"2019-04-22 06:16:38.605 UTC [common.channelconfig] NewStandardValues -> DEBU 5c2 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:38.605 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5c3 Processing field: MSP" +"2019-04-22 06:16:38.605 UTC [common.channelconfig] validateMSP -> DEBU 5c4 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:38.606 UTC [msp] newBccspMsp -> DEBU 5c5 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:38.606 UTC [msp] New -> DEBU 5c6 Creating Cache-MSP instance" +"2019-04-22 06:16:38.606 UTC [msp] Setup -> DEBU 5c7 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:38.606 UTC [msp.identity] newIdentity -> DEBU 5c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.607 UTC [msp.identity] newIdentity -> DEBU 5c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:38.608 UTC [msp] Validate -> DEBU 5ca MSP OrdererMSP validating identity" +"2019-04-22 06:16:38.608 UTC [msp] Setup -> DEBU 5cb Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:38.609 UTC [msp] Setup -> DEBU 5cc MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5cd Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5ce Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5cf Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.609 UTC [policies] NewManagerImpl -> DEBU 5d0 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d1 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d2 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d3 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.610 UTC [policies] NewManagerImpl -> DEBU 5d4 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:38.611 UTC [policies] NewManagerImpl -> DEBU 5d5 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:38.611 UTC [policies] NewManagerImpl -> DEBU 5d6 Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:38.612 UTC [policies] NewManagerImpl -> DEBU 5d7 Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:38.612 UTC [policies] NewManagerImpl -> DEBU 5d8 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:38.612 UTC [policies] NewManagerImpl -> DEBU 5d9 Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:38.613 UTC [policies] NewManagerImpl -> DEBU 5da Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.614 UTC [policies] NewManagerImpl -> DEBU 5db Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.614 UTC [policies] NewManagerImpl -> DEBU 5dc Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.615 UTC [policies] NewManagerImpl -> DEBU 5dd Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:38.615 UTC [policies] NewManagerImpl -> DEBU 5de Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:38.615 UTC [policies] NewManagerImpl -> DEBU 5df Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e0 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e1 Proposed new policy Writers for Channel" +"2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e2 Proposed new policy Admins for Channel" +"2019-04-22 06:16:38.616 UTC [policies] NewManagerImpl -> DEBU 5e3 Proposed new policy Readers for Channel" +"2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e4 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e5 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e6 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:38.617 UTC [common.configtx] addToMap -> DEBU 5e7 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5e9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5eb Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:38.618 UTC [common.configtx] addToMap -> DEBU 5ec Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:38.619 UTC [common.configtx] addToMap -> DEBU 5ed Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:38.619 UTC [common.configtx] addToMap -> DEBU 5ee Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:38.619 UTC [common.configtx] addToMap -> DEBU 5ef Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:38.620 UTC [common.configtx] addToMap -> DEBU 5f0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:38.620 UTC [common.configtx] addToMap -> DEBU 5f1 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:38.620 UTC [common.configtx] addToMap -> DEBU 5f2 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:38.621 UTC [common.configtx] addToMap -> DEBU 5f3 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:38.621 UTC [common.configtx] addToMap -> DEBU 5f4 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:38.622 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:38.622 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:38.622 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:38.623 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:38.626 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:38.627 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:38.627 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:38.627 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:38.628 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:38.628 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:38.628 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:38.629 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:38.629 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:38.629 UTC [common.configtx] addToMap -> DEBU 606 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:38.630 UTC [common.configtx] addToMap -> DEBU 607 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:38.630 UTC [common.configtx] addToMap -> DEBU 608 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 609 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60a Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60b Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:38.631 UTC [common.configtx] addToMap -> DEBU 60d Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:38.632 UTC [common.configtx] addToMap -> DEBU 60e Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:38.632 UTC [common.configtx] addToMap -> DEBU 60f Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:38.632 UTC [common.channelconfig] LogSanityChecks -> DEBU 610 As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:38.632 UTC [common.channelconfig] LogSanityChecks -> DEBU 611 As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 612 Manager Channel looking up path [Application]" +"2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 613 Manager Channel has managers Application" +"2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 614 Manager Channel has managers Orderer" +"2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 615 Manager Channel/Application looking up path []" +"2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 616 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:38.633 UTC [policies] Manager -> DEBU 617 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:38.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 618 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:38.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 619 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:38.634 UTC [common.channelconfig] LogSanityChecks -> DEBU 61a As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:38.635 UTC [policies] Manager -> DEBU 61b Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:38.635 UTC [policies] Manager -> DEBU 61c Manager Channel has managers Orderer" +"2019-04-22 06:16:38.636 UTC [policies] Manager -> DEBU 61d Manager Channel has managers Application" +"2019-04-22 06:16:38.636 UTC [policies] Manager -> DEBU 61e Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:38.636 UTC [policies] Manager -> DEBU 61f Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:38.636 UTC [common.channelconfig] LogSanityChecks -> DEBU 620 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:38.637 UTC [common.capabilities] Supported -> DEBU 621 Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:16:38.637 UTC [common.capabilities] Supported -> DEBU 622 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] newBlockfileMgr -> DEBU 623 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-04-22 06:16:38.637 UTC [kvledger.util] CreateDirIfMissing -> DEBU 624 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2019-04-22 06:16:38.637 UTC [kvledger.util] logDirStatus -> DEBU 625 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2019-04-22 06:16:38.637 UTC [kvledger.util] logDirStatus -> DEBU 626 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] newBlockfileMgr -> INFO 627 Getting block information from block storage" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 628 Retrieving checkpoint info from block files" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 629 retrieveLastFileSuffix()" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 62a retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 62b Last file number found = -1" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 62c No block file found" +"2019-04-22 06:16:38.637 UTC [fsblkstorage] newBlockfileMgr -> DEBU 62d Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000558d20)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-04-22 06:16:38.641 UTC [fsblkstorage] newBlockIndex -> DEBU 62e newBlockIndex() - indexItems:[[BlockNum]]" +"2019-04-22 06:16:38.642 UTC [orderer.common.server] func1 -> DEBU 62f Executing callback to update root CAs" +"2019-04-22 06:16:38.642 UTC [orderer.common.server] updateTrustedRoots -> DEBU 630 updating root CAs for channel [businesschannel]" +"2019-04-22 06:16:38.644 UTC [orderer.common.server] updateTrustedRoots -> DEBU 631 adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:16:38.647 UTC [orderer.common.server] updateTrustedRoots -> DEBU 632 adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:16:38.647 UTC [orderer.common.server] updateTrustedRoots -> DEBU 633 adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:16:38.651 UTC [fsblkstorage] indexBlock -> DEBU 634 Indexing block [blockNum=0, blockHash=[]byte{0xf6, 0x29, 0x3f, 0xa6, 0x1, 0x5a, 0xaa, 0xb2, 0x22, 0x71, 0xbf, 0x53, 0xb7, 0xa0, 0x31, 0x1f, 0xef, 0xf7, 0x76, 0xb6, 0xf7, 0x7c, 0x76, 0x93, 0xe4, 0xd4, 0x23, 0x7, 0xcb, 0xf9, 0x42, 0x5c} txOffsets= +txId= locPointer=offset=39, bytesLength=23896 +]" +"2019-04-22 06:16:38.655 UTC [fsblkstorage] updateCheckpoint -> DEBU 635 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23940], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-04-22 06:16:38.655 UTC [fsblkstorage] Next -> DEBU 636 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:38.655 UTC [fsblkstorage] newBlockfileStream -> DEBU 637 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:38.656 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 638 Remaining bytes=[23940], Going to peek [8] bytes" +"2019-04-22 06:16:38.656 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 639 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:38.657 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 63a blockbytes [23937] read from file [0]" +"2019-04-22 06:16:38.658 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 63b [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2019-04-22 06:16:38.658 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 63c EvictionSuspicion not set, defaulting to 10m0s" +"2019-04-22 06:16:38.658 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 63d No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2019-04-22 06:16:38.659 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 63e No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2019-04-22 06:16:38.664 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 63f Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2019-04-22 06:16:38.665 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 640 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2019-04-22 06:16:38.665 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 641 Appending 0 entries to memory storage" channel=businesschannel node=1 +"2019-04-22 06:16:38.665 UTC [fsblkstorage] Next -> DEBU 642 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:38.666 UTC [fsblkstorage] newBlockfileStream -> DEBU 643 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:38.667 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 644 Remaining bytes=[23940], Going to peek [8] bytes" +"2019-04-22 06:16:38.667 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 645 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:38.667 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 646 blockbytes [23937] read from file [0]" +"2019-04-22 06:16:38.668 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 647 [channel: businesschannel] Done creating channel support resources" +"2019-04-22 06:16:38.668 UTC [orderer.commmon.multichannel] newChain -> INFO 648 Created and starting new chain businesschannel" +"2019-04-22 06:16:38.668 UTC [orderer.consensus.etcdraft] Start -> INFO 649 Starting Raft node" channel=businesschannel node=1 +"2019-04-22 06:16:38.669 UTC [orderer.common.cluster] Configure -> INFO 64a Entering, channel: businesschannel, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +]" +"2019-04-22 06:16:38.669 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64b Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2019-04-22 06:16:38.669 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64c Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-04-22 06:16:38.669 UTC [orderer.common.cluster] func1 -> DEBU 64d Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAMIGV2dR0uvFgvN2i9Qc4JAwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABI+BYoFFOBnYSBHhuofZ/wfqDzhRiNmXYm45c1CotslI +wzigDOt2A2XQPhAz8PT+cpSRiSR0LxhCeEyPjqp/ePqjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNHADBEAiEAk2H96/k22Suhf0fe8f3H20EbchKDtP/Ajuk8DXNa/qEC +H2fNObjrxxF/orF3/bOo+PZ/WnKMZmPVFLgo+cM9kpM= +-----END CERTIFICATE----- + for channel businesschannel" +"2019-04-22 06:16:38.669 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2019-04-22 06:16:38.670 UTC [orderer.common.cluster] updateStubInMapping -> INFO 64f Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-04-22 06:16:38.670 UTC [orderer.common.cluster] func1 -> DEBU 650 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAIq2Aoi+gIfsr/086U5kpyMwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABMucHyQH/cKh84ETjJdyMm/3nYYP5o+7F0uoo9+HLww2 +fsD8nVvdrRQJNPW0AAuJjaxekOJkdS5HUsKFfqmyzj+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIB4FrFE9k6AvaymPlsAiUHd6uC7A4fGFdvt6En83Dyr5 +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNHADBEAiAPCuo8SEHL2yUpzG9EGazQ961E2XYojL+n7KBKgN1J6wIg +YL4DJ31/iIamMoETFzTHqR5ZBPEU14THnTrHSoPI6Qk= +-----END CERTIFICATE----- + for channel businesschannel" +"2019-04-22 06:16:38.670 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 651 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-04-22 06:16:38.670 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 652 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-04-22 06:16:38.671 UTC [orderer.common.cluster] Configure -> INFO 653 Exiting" +"2019-04-22 06:16:38.671 UTC [orderer.consensus.etcdraft] start -> DEBU 654 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2019-04-22 06:16:38.671 UTC [orderer.consensus.etcdraft] start -> INFO 655 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2019-04-22 06:16:38.672 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 656 1 became follower at term 0" channel=businesschannel node=1 +"2019-04-22 06:16:38.672 UTC [orderer.consensus.etcdraft] newRaft -> INFO 657 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2019-04-22 06:16:38.672 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 658 1 became follower at term 1" channel=businesschannel node=1 +"2019-04-22 06:16:38.673 UTC [orderer.consensus.etcdraft] run -> INFO 659 This node is picked to start campaign" channel=businesschannel node=1 +"2019-04-22 06:16:38.674 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 65a [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2019-04-22 06:16:38.674 UTC [msp.identity] Sign -> DEBU 65b Sign: plaintext: 0A00120B0A090A03010203100418050A...A90EC401B38C45839F581B9740AF1F09 " +"2019-04-22 06:16:38.675 UTC [msp.identity] Sign -> DEBU 65c Sign: digest: 67C72C0F7EA7DB7DDD5F80482256A26CA859D71A624646CCF518DC1B26005830 " +"2019-04-22 06:16:38.678 UTC [orderer.consensus.etcdraft] apply -> INFO 65d Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-04-22 06:16:38.679 UTC [orderer.consensus.etcdraft] apply -> INFO 65e Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-04-22 06:16:38.679 UTC [orderer.consensus.etcdraft] apply -> INFO 65f Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-04-22 06:16:38.680 UTC [fsblkstorage] indexBlock -> DEBU 660 Indexing block [blockNum=1, blockHash=[]byte{0x41, 0x47, 0x51, 0xca, 0x5b, 0xad, 0xe7, 0x33, 0x3a, 0xb, 0xc9, 0xfd, 0x91, 0x3, 0x18, 0x36, 0x7f, 0x31, 0x21, 0x4b, 0x89, 0x8c, 0x23, 0xc9, 0xb2, 0xcb, 0x2a, 0xcd, 0xd0, 0xa0, 0x74, 0xb2} txOffsets= +txId= locPointer=offset=71, bytesLength=24826 +]" +"2019-04-22 06:16:38.683 UTC [fsblkstorage] updateCheckpoint -> DEBU 661 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[44243], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-04-22 06:16:38.683 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 662 [channel: testchainid] Wrote block [1]" +"2019-04-22 06:16:38.783 UTC [common.deliver] deliverBlocks -> WARN 663 [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34484 because of consenter error" +"2019-04-22 06:16:38.784 UTC [orderer.common.server] func1 -> DEBU 664 Closing Deliver stream" +"2019-04-22 06:16:38.784 UTC [comm.grpc.server] 1 -> INFO 665 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34484 grpc.code=OK grpc.call_duration=196.1123ms +"2019-04-22 06:16:38.799 UTC [orderer.common.server] Deliver -> DEBU 666 Starting new Deliver handler" +"2019-04-22 06:16:38.799 UTC [common.deliver] Handle -> DEBU 667 Starting new deliver loop for 192.168.224.9:34486" +"2019-04-22 06:16:38.799 UTC [common.deliver] Handle -> DEBU 668 Attempting to read seek info message from 192.168.224.9:34486" +"2019-04-22 06:16:38.831 UTC [orderer.common.cluster.step] handleMessage -> DEBU 669 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:38.832 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66a Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +"2019-04-22 06:16:38.833 UTC [orderer.common.cluster.step] sendMessage -> DEBU 66b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 431.2µs " +"2019-04-22 06:16:39.003 UTC [common.deliver] deliverBlocks -> WARN 66c [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34486 because of consenter error" +"2019-04-22 06:16:39.004 UTC [orderer.common.server] func1 -> DEBU 66d Closing Deliver stream" +"2019-04-22 06:16:39.004 UTC [comm.grpc.server] 1 -> INFO 66e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34486 grpc.code=OK grpc.call_duration=204.7664ms +"2019-04-22 06:16:39.018 UTC [orderer.common.server] Deliver -> DEBU 66f Starting new Deliver handler" +"2019-04-22 06:16:39.019 UTC [common.deliver] Handle -> DEBU 670 Starting new deliver loop for 192.168.224.9:34488" +"2019-04-22 06:16:39.019 UTC [common.deliver] Handle -> DEBU 671 Attempting to read seek info message from 192.168.224.9:34488" +"2019-04-22 06:16:39.221 UTC [common.deliver] deliverBlocks -> WARN 672 [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34488 because of consenter error" +"2019-04-22 06:16:39.222 UTC [orderer.common.server] func1 -> DEBU 673 Closing Deliver stream" +"2019-04-22 06:16:39.222 UTC [comm.grpc.server] 1 -> INFO 674 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34488 grpc.code=OK grpc.call_duration=204.0475ms +"2019-04-22 06:16:39.235 UTC [orderer.common.server] Deliver -> DEBU 675 Starting new Deliver handler" +"2019-04-22 06:16:39.235 UTC [common.deliver] Handle -> DEBU 676 Starting new deliver loop for 192.168.224.9:34490" +"2019-04-22 06:16:39.236 UTC [common.deliver] Handle -> DEBU 677 Attempting to read seek info message from 192.168.224.9:34490" +"2019-04-22 06:16:39.332 UTC [orderer.common.cluster.step] handleMessage -> DEBU 678 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:39.333 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 679 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +"2019-04-22 06:16:39.333 UTC [orderer.common.cluster.step] sendMessage -> DEBU 67a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " +"2019-04-22 06:16:39.439 UTC [common.deliver] deliverBlocks -> WARN 67b [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34490 because of consenter error" +"2019-04-22 06:16:39.440 UTC [orderer.common.server] func1 -> DEBU 67c Closing Deliver stream" +"2019-04-22 06:16:39.440 UTC [comm.grpc.server] 1 -> INFO 67d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34490 grpc.code=OK grpc.call_duration=205.6087ms +"2019-04-22 06:16:39.453 UTC [orderer.common.server] Deliver -> DEBU 67e Starting new Deliver handler" +"2019-04-22 06:16:39.453 UTC [common.deliver] Handle -> DEBU 67f Starting new deliver loop for 192.168.224.9:34492" +"2019-04-22 06:16:39.453 UTC [common.deliver] Handle -> DEBU 680 Attempting to read seek info message from 192.168.224.9:34492" +"2019-04-22 06:16:39.654 UTC [common.deliver] deliverBlocks -> WARN 681 [channel: businesschannel] Rejecting deliver request for 192.168.224.9:34492 because of consenter error" +"2019-04-22 06:16:39.655 UTC [orderer.common.server] func1 -> DEBU 682 Closing Deliver stream" +"2019-04-22 06:16:39.655 UTC [comm.grpc.server] 1 -> INFO 683 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34492 grpc.code=OK grpc.call_duration=202.3277ms +"2019-04-22 06:16:39.673 UTC [orderer.consensus.etcdraft] Step -> INFO 684 1 is starting a new election at term 1" channel=businesschannel node=1 +"2019-04-22 06:16:39.673 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 685 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2019-04-22 06:16:39.674 UTC [orderer.consensus.etcdraft] poll -> INFO 686 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2019-04-22 06:16:39.674 UTC [orderer.consensus.etcdraft] campaign -> INFO 687 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2019-04-22 06:16:39.675 UTC [orderer.consensus.etcdraft] campaign -> INFO 688 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2019-04-22 06:16:39.675 UTC [orderer.common.cluster] NewStream -> DEBU 689 Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2019-04-22 06:16:39.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68a Sending msg of 28 bytes to 2 on channel businesschannel took 621.3µs" +"2019-04-22 06:16:39.676 UTC [orderer.common.cluster] NewStream -> DEBU 68b Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-04-22 06:16:39.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.1µs " +"2019-04-22 06:16:39.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 68d Sending msg of 28 bytes to 3 on channel businesschannel took 763.6µs" +"2019-04-22 06:16:39.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 68e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.5µs " +"2019-04-22 06:16:39.680 UTC [orderer.common.cluster] Step -> DEBU 68f Connection from orderer2.example.com(192.168.224.2:57130)" +"2019-04-22 06:16:39.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 691 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.681 UTC [orderer.consensus.etcdraft] poll -> INFO 692 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +"2019-04-22 06:16:39.680 UTC [orderer.common.cluster] Step -> DEBU 690 Connection from orderer1.example.com(192.168.224.3:45624)" +"2019-04-22 06:16:39.682 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 693 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-04-22 06:16:39.682 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 694 1 became candidate at term 2" channel=businesschannel node=1 +"2019-04-22 06:16:39.682 UTC [orderer.consensus.etcdraft] poll -> INFO 695 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2019-04-22 06:16:39.683 UTC [orderer.consensus.etcdraft] campaign -> INFO 696 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2019-04-22 06:16:39.683 UTC [orderer.consensus.etcdraft] campaign -> INFO 697 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2019-04-22 06:16:39.683 UTC [orderer.common.cluster.step] handleMessage -> DEBU 698 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.685 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 699 Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +"2019-04-22 06:16:39.685 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 69a Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +"2019-04-22 06:16:39.686 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.2µs " +"2019-04-22 06:16:39.686 UTC [orderer.common.cluster.step] sendMessage -> DEBU 69c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.6µs " +"2019-04-22 06:16:39.686 UTC [orderer.common.server] Deliver -> DEBU 69d Starting new Deliver handler" +"2019-04-22 06:16:39.687 UTC [common.deliver] Handle -> DEBU 69e Starting new deliver loop for 192.168.224.9:34494" +"2019-04-22 06:16:39.688 UTC [common.deliver] Handle -> DEBU 69f Attempting to read seek info message from 192.168.224.9:34494" +"2019-04-22 06:16:39.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a0 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6a1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.692 UTC [orderer.consensus.etcdraft] poll -> INFO 6a2 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2019-04-22 06:16:39.692 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6a3 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-04-22 06:16:39.693 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6a4 1 became leader at term 2" channel=businesschannel node=1 +"2019-04-22 06:16:39.693 UTC [orderer.consensus.etcdraft] run -> INFO 6a5 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2019-04-22 06:16:39.695 UTC [orderer.consensus.etcdraft] run -> INFO 6a6 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2019-04-22 06:16:39.695 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6a7 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2019-04-22 06:16:39.696 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6a8 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2019-04-22 06:16:39.696 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6a9 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 194µs " +"2019-04-22 06:16:39.695 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6aa Sending msg of 36 bytes to 2 on channel businesschannel took 28.8µs" +"2019-04-22 06:16:39.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ab Sending msg of 36 bytes to 3 on channel businesschannel took 154.7µs" +"2019-04-22 06:16:39.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ac Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 343.4µs " +"2019-04-22 06:16:39.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ad Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.702 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ae Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2019-04-22 06:16:39.702 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6af Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 452.6µs " +"2019-04-22 06:16:39.702 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6b0 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2019-04-22 06:16:39.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.704 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b2 Sending msg of 28 bytes to 3 on channel businesschannel took 273.9µs" +"2019-04-22 06:16:39.704 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b3 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.705 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 202.9µs " +"2019-04-22 06:16:39.706 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:39.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:39.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b7 Sending msg of 28 bytes to 3 on channel testchainid took 51.3µs" +"2019-04-22 06:16:39.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.3µs " +"2019-04-22 06:16:39.887 UTC [policies] Evaluate -> DEBU 6b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:16:39.887 UTC [policies] Evaluate -> DEBU 6ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:39.888 UTC [policies] Evaluate -> DEBU 6bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:39.888 UTC [policies] Evaluate -> DEBU 6bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:39.889 UTC [policies] Evaluate -> DEBU 6bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:39.889 UTC [msp] DeserializeIdentity -> DEBU 6be Obtaining identity" +"2019-04-22 06:16:39.889 UTC [msp.identity] newIdentity -> DEBU 6bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:39.890 UTC [cauthdsl] func1 -> DEBU 6c0 0xc000ec8600 gate 1555913799890029900 evaluation starts" +"2019-04-22 06:16:39.890 UTC [cauthdsl] func2 -> DEBU 6c1 0xc000ec8600 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:39.890 UTC [cauthdsl] func2 -> DEBU 6c2 0xc000ec8600 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:39.890 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6c3 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:39.890 UTC [msp] Validate -> DEBU 6c4 MSP Org1MSP validating identity" +"2019-04-22 06:16:39.891 UTC [msp] getCertificationChain -> DEBU 6c5 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:39.892 UTC [cauthdsl] func2 -> DEBU 6c6 0xc000ec8600 principal matched by identity 0" +"2019-04-22 06:16:39.892 UTC [msp.identity] Verify -> DEBU 6c7 Verify: digest = 00000000 2e 89 e4 7a d0 f9 5d 16 c6 21 d0 50 47 cf 6b dc |...z..]..!.PG.k.| +00000010 94 8b 85 75 d6 e0 bb 50 7c c3 47 2c 8f f9 37 13 |...u...P|.G,..7.|" +"2019-04-22 06:16:39.892 UTC [msp.identity] Verify -> DEBU 6c8 Verify: sig = 00000000 30 44 02 20 36 19 23 fd 0b 98 23 58 d9 79 7b 27 |0D. 6.#...#X.y{'| +00000010 9e 44 d4 e6 61 9a 8d d1 fc bd e2 0f e5 27 29 52 |.D..a........')R| +00000020 a5 96 df 09 02 20 13 66 04 76 13 55 da ff c1 f0 |..... .f.v.U....| +00000030 ab e4 90 0f be d3 e3 ea a6 31 92 2e c1 b7 47 49 |.........1....GI| +00000040 07 5c 10 c5 fe bc |.\....|" +"2019-04-22 06:16:39.893 UTC [cauthdsl] func2 -> DEBU 6c9 0xc000ec8600 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:39.893 UTC [cauthdsl] func1 -> DEBU 6ca 0xc000ec8600 gate 1555913799890029900 evaluation succeeds" +"2019-04-22 06:16:39.893 UTC [policies] Evaluate -> DEBU 6cb Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6cd Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6cf Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:16:39.894 UTC [policies] Evaluate -> DEBU 6d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:16:39.895 UTC [common.deliver] deliverBlocks -> DEBU 6d1 [channel: businesschannel] Received seekInfo (0xc000dd7f40) start: > stop: > from 192.168.224.9:34494" +"2019-04-22 06:16:39.895 UTC [fsblkstorage] Next -> DEBU 6d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-04-22 06:16:39.895 UTC [fsblkstorage] newBlockfileStream -> DEBU 6d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-04-22 06:16:39.896 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6d4 Remaining bytes=[23940], Going to peek [8] bytes" +"2019-04-22 06:16:39.896 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6d5 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:16:39.896 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 6d6 blockbytes [23937] read from file [0]" +"2019-04-22 06:16:39.896 UTC [common.deliver] deliverBlocks -> DEBU 6d7 [channel: businesschannel] Delivering block [0] for (0xc000dd7f40) for 192.168.224.9:34494" +"2019-04-22 06:16:39.897 UTC [common.deliver] deliverBlocks -> DEBU 6d8 [channel: businesschannel] Done delivering to 192.168.224.9:34494 for (0xc000dd7f40)" +"2019-04-22 06:16:39.897 UTC [common.deliver] Handle -> DEBU 6d9 Waiting for new SeekInfo from 192.168.224.9:34494" +"2019-04-22 06:16:39.897 UTC [common.deliver] Handle -> DEBU 6da Attempting to read seek info message from 192.168.224.9:34494" +"2019-04-22 06:16:39.901 UTC [grpc] warningf -> DEBU 6db transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.4:7050->192.168.224.9:34494: read: connection reset by peer" +"2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:39.901 UTC [common.deliver] Handle -> WARN 6de Error reading from 192.168.224.9:34494: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6e0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:39.901 UTC [orderer.common.server] func1 -> DEBU 6e1 Closing Deliver stream" +"2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6e3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6dc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:39.902 UTC [grpc] infof -> DEBU 6e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:39.902 UTC [grpc] infof -> DEBU 6e6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:39.902 UTC [comm.grpc.server] 1 -> INFO 6e5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34494 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=216.5729ms +"2019-04-22 06:16:39.901 UTC [grpc] infof -> DEBU 6df transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:40.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e7 Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" +"2019-04-22 06:16:40.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e8 Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +"2019-04-22 06:16:40.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101µs " +"2019-04-22 06:16:40.173 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.2µs " +"2019-04-22 06:16:40.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6eb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:40.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ec Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:40.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ed Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:40.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ee Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +"2019-04-22 06:16:40.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +"2019-04-22 06:16:40.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 3 on channel businesschannel took 28.8µs" +"2019-04-22 06:16:40.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-04-22 06:16:40.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.3µs " +"2019-04-22 06:16:40.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.7µs " +"2019-04-22 06:16:40.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:40.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:40.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:40.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f7 Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +"2019-04-22 06:16:40.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 547.6µs " +"2019-04-22 06:16:41.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f9 Sending msg of 28 bytes to 2 on channel businesschannel took 44µs" +"2019-04-22 06:16:41.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.5µs " +"2019-04-22 06:16:41.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.1µs " +"2019-04-22 06:16:41.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fc Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +"2019-04-22 06:16:41.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fd Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:41.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:41.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ff Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:41.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 700 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2019-04-22 06:16:41.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU 701 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +"2019-04-22 06:16:41.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 702 Sending msg of 28 bytes to 2 on channel businesschannel took 46µs" +"2019-04-22 06:16:41.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 703 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 277.1µs " +"2019-04-22 06:16:41.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 704 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +"2019-04-22 06:16:41.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 705 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.6µs " +"2019-04-22 06:16:41.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 706 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:41.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 707 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:41.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 708 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:41.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 709 Sending msg of 28 bytes to 3 on channel testchainid took 32.8µs" +"2019-04-22 06:16:41.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.1µs " +"2019-04-22 06:16:42.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70b Sending msg of 28 bytes to 2 on channel businesschannel took 29.3µs" +"2019-04-22 06:16:42.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70c Sending msg of 28 bytes to 3 on channel businesschannel took 26.8µs" +"2019-04-22 06:16:42.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.7µs " +"2019-04-22 06:16:42.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.5µs " +"2019-04-22 06:16:42.175 UTC [orderer.common.cluster.step] handleMessage -> DEBU 70f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:42.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU 710 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:42.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 711 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:42.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 712 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +"2019-04-22 06:16:42.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 713 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +"2019-04-22 06:16:42.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 714 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +"2019-04-22 06:16:42.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 715 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +"2019-04-22 06:16:42.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 716 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.4µs " +"2019-04-22 06:16:42.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 717 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.4µs " +"2019-04-22 06:16:42.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 718 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:42.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 719 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:42.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 71a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:42.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71b Sending msg of 28 bytes to 3 on channel testchainid took 52.9µs" +"2019-04-22 06:16:42.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.7µs " +"2019-04-22 06:16:43.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71d Sending msg of 28 bytes to 2 on channel businesschannel took 1.2315ms" +"2019-04-22 06:16:43.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 71e Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" +"2019-04-22 06:16:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 71f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 802.2µs " +"2019-04-22 06:16:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 720 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 415.1µs " +"2019-04-22 06:16:43.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 721 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 722 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU 723 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:43.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 724 Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" +"2019-04-22 06:16:43.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU 725 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 695.7µs " +"2019-04-22 06:16:43.540 UTC [orderer.common.server] Deliver -> DEBU 726 Starting new Deliver handler" +"2019-04-22 06:16:43.541 UTC [common.deliver] Handle -> DEBU 727 Starting new deliver loop for 192.168.224.9:34520" +"2019-04-22 06:16:43.541 UTC [common.deliver] Handle -> DEBU 728 Attempting to read seek info message from 192.168.224.9:34520" +"2019-04-22 06:16:43.556 UTC [orderer.common.server] Broadcast -> DEBU 729 Starting new Broadcast handler" +"2019-04-22 06:16:43.556 UTC [orderer.common.broadcast] Handle -> DEBU 72a Starting new broadcast loop for 192.168.224.9:34522" +"2019-04-22 06:16:43.556 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 72b [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34522" +"2019-04-22 06:16:43.556 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 72c Processing config update message for channel businesschannel" +"2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 72d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 72e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 72f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 730 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:43.557 UTC [policies] Evaluate -> DEBU 731 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:43.557 UTC [cauthdsl] func1 -> DEBU 732 0xc000ec7b60 gate 1555913803557755200 evaluation starts" +"2019-04-22 06:16:43.558 UTC [cauthdsl] func2 -> DEBU 733 0xc000ec7b60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:43.558 UTC [cauthdsl] func2 -> DEBU 734 0xc000ec7b60 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:43.558 UTC [cauthdsl] func2 -> DEBU 735 0xc000ec7b60 principal matched by identity 0" +"2019-04-22 06:16:43.558 UTC [msp.identity] Verify -> DEBU 736 Verify: digest = 00000000 51 1c 19 82 c7 6e a2 35 51 f1 eb b5 3a ab c1 e0 |Q....n.5Q...:...| +00000010 e7 80 e8 a3 aa 35 c2 09 d7 b8 6d ba 50 5f 01 cc |.....5....m.P_..|" +"2019-04-22 06:16:43.558 UTC [msp.identity] Verify -> DEBU 737 Verify: sig = 00000000 30 45 02 21 00 b9 b2 e9 b9 af 9b 58 98 ec 2d b3 |0E.!.......X..-.| +00000010 43 6b 54 70 7f 78 08 61 52 3d ce 40 c3 8f c1 49 |CkTp.x.aR=.@...I| +00000020 9a b9 0b e8 73 02 20 16 9f c9 0d 7f d8 4f ae 4e |....s. ......O.N| +00000030 4d 94 59 9b fd c7 40 a1 2c a5 8a 13 0d 6f ec 32 |M.Y...@.,....o.2| +00000040 ce 7c dc 16 1e ca 9e |.|.....|" +"2019-04-22 06:16:43.559 UTC [cauthdsl] func2 -> DEBU 738 0xc000ec7b60 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:43.559 UTC [cauthdsl] func1 -> DEBU 739 0xc000ec7b60 gate 1555913803557755200 evaluation succeeds" +"2019-04-22 06:16:43.559 UTC [policies] Evaluate -> DEBU 73a Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73c Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:43.560 UTC [policies] Evaluate -> DEBU 73e Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:43.561 UTC [policies] Evaluate -> DEBU 73f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:43.561 UTC [common.configtx] addToMap -> DEBU 740 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:43.561 UTC [common.configtx] addToMap -> DEBU 741 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:43.562 UTC [common.configtx] addToMap -> DEBU 742 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.563 UTC [common.configtx] addToMap -> DEBU 743 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:43.563 UTC [common.configtx] addToMap -> DEBU 744 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.563 UTC [common.configtx] addToMap -> DEBU 745 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.564 UTC [common.configtx] addToMap -> DEBU 746 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:43.564 UTC [common.configtx] addToMap -> DEBU 747 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:43.565 UTC [common.configtx] addToMap -> DEBU 748 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:43.565 UTC [common.configtx] addToMap -> DEBU 749 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:43.566 UTC [common.configtx] addToMap -> DEBU 74a Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.566 UTC [common.configtx] addToMap -> DEBU 74b Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:43.567 UTC [common.configtx] addToMap -> DEBU 74c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:43.567 UTC [common.configtx] addToMap -> DEBU 74d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:43.568 UTC [common.configtx] addToMap -> DEBU 74e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:43.568 UTC [common.configtx] addToMap -> DEBU 74f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.568 UTC [common.configtx] addToMap -> DEBU 750 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.569 UTC [common.configtx] verifyDeltaSet -> DEBU 751 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:43.570 UTC [common.configtx] verifyDeltaSet -> DEBU 752 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.570 UTC [common.configtx] policyForItem -> DEBU 753 Getting policy for item Org1MSP with mod_policy Admins" +"2019-04-22 06:16:43.571 UTC [policies] Manager -> DEBU 754 Manager Channel looking up path [Application]" +"2019-04-22 06:16:43.571 UTC [policies] Manager -> DEBU 755 Manager Channel has managers Application" +"2019-04-22 06:16:43.571 UTC [policies] Manager -> DEBU 756 Manager Channel has managers Orderer" +"2019-04-22 06:16:43.572 UTC [policies] Manager -> DEBU 757 Manager Channel/Application looking up path []" +"2019-04-22 06:16:43.572 UTC [policies] Manager -> DEBU 758 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:43.572 UTC [policies] Manager -> DEBU 759 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75a Manager Channel/Application looking up path [Org1MSP]" +"2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75b Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75c Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:43.573 UTC [policies] Manager -> DEBU 75d Manager Channel/Application/Org1MSP looking up path []" +"2019-04-22 06:16:43.574 UTC [policies] Evaluate -> DEBU 75e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:16:43.574 UTC [cauthdsl] func1 -> DEBU 75f 0xc000ee8c80 gate 1555913803574586500 evaluation starts" +"2019-04-22 06:16:43.574 UTC [cauthdsl] func2 -> DEBU 760 0xc000ee8c80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:43.575 UTC [cauthdsl] func2 -> DEBU 761 0xc000ee8c80 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:43.575 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 762 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-04-22 06:16:43.575 UTC [cauthdsl] func2 -> DEBU 763 0xc000ee8c80 principal matched by identity 0" +"2019-04-22 06:16:43.575 UTC [msp.identity] Verify -> DEBU 764 Verify: digest = 00000000 d6 49 94 91 b8 a6 6c b3 a9 57 7e f9 27 5b 5a e3 |.I....l..W~.'[Z.| +00000010 52 1c 53 ad 04 db 62 c2 c0 a6 ee 8e 58 ad 10 22 |R.S...b.....X.."|" +"2019-04-22 06:16:43.576 UTC [msp.identity] Verify -> DEBU 765 Verify: sig = 00000000 30 45 02 21 00 b6 e5 83 b1 2b 25 37 b2 dd 37 82 |0E.!.....+%7..7.| +00000010 40 97 d8 59 11 aa 3d 47 e7 b8 07 a1 02 6c 44 3d |@..Y..=G.....lD=| +00000020 29 92 c8 73 f6 02 20 19 98 95 d4 4a ac 07 77 69 |)..s.. ....J..wi| +00000030 64 8c 79 a9 77 84 ee d8 1d 99 b4 5d 73 3e 6a 75 |d.y.w......]s>ju| +00000040 bb a0 cb 16 1c 5f d4 |....._.|" +"2019-04-22 06:16:43.576 UTC [cauthdsl] func2 -> DEBU 766 0xc000ee8c80 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:43.576 UTC [cauthdsl] func1 -> DEBU 767 0xc000ee8c80 gate 1555913803574586500 evaluation succeeds" +"2019-04-22 06:16:43.576 UTC [policies] Evaluate -> DEBU 768 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.576 UTC [policies] Evaluate -> DEBU 769 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76a Setting policy for key Admins to " +"2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76b Setting policy for key Endorsement to " +"2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76c Setting policy for key Readers to " +"2019-04-22 06:16:43.577 UTC [common.configtx] recurseConfigMap -> DEBU 76d Setting policy for key Writers to " +"2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 76e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 76f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 770 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.578 UTC [common.configtx] recurseConfigMap -> DEBU 771 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 772 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 773 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 774 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 775 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 776 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 777 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 778 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 779 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 77a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.579 UTC [common.configtx] recurseConfigMap -> DEBU 77b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 77f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.580 UTC [common.configtx] recurseConfigMap -> DEBU 780 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.580 UTC [common.channelconfig] NewStandardValues -> DEBU 781 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:43.581 UTC [common.channelconfig] initializeProtosStruct -> DEBU 782 Processing field: HashingAlgorithm" +"2019-04-22 06:16:43.581 UTC [common.channelconfig] initializeProtosStruct -> DEBU 783 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:43.581 UTC [common.channelconfig] initializeProtosStruct -> DEBU 784 Processing field: OrdererAddresses" +"2019-04-22 06:16:43.582 UTC [common.channelconfig] initializeProtosStruct -> DEBU 785 Processing field: Consortium" +"2019-04-22 06:16:43.582 UTC [common.channelconfig] initializeProtosStruct -> DEBU 786 Processing field: Capabilities" +"2019-04-22 06:16:43.583 UTC [common.channelconfig] NewStandardValues -> DEBU 787 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:43.583 UTC [common.channelconfig] initializeProtosStruct -> DEBU 788 Processing field: ConsensusType" +"2019-04-22 06:16:43.583 UTC [common.channelconfig] initializeProtosStruct -> DEBU 789 Processing field: BatchSize" +"2019-04-22 06:16:43.583 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78a Processing field: BatchTimeout" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78b Processing field: KafkaBrokers" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78c Processing field: ChannelRestrictions" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78d Processing field: Capabilities" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] NewStandardValues -> DEBU 78e Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 78f Processing field: Endpoints" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] NewStandardValues -> DEBU 790 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 791 Processing field: MSP" +"2019-04-22 06:16:43.584 UTC [common.channelconfig] validateMSP -> DEBU 792 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:43.585 UTC [msp] newBccspMsp -> DEBU 793 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:43.585 UTC [msp] New -> DEBU 794 Creating Cache-MSP instance" +"2019-04-22 06:16:43.585 UTC [msp] Setup -> DEBU 795 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:43.586 UTC [msp.identity] newIdentity -> DEBU 796 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.586 UTC [msp.identity] newIdentity -> DEBU 797 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.587 UTC [msp] Validate -> DEBU 798 MSP OrdererMSP validating identity" +"2019-04-22 06:16:43.587 UTC [common.channelconfig] NewStandardValues -> DEBU 799 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79a Processing field: ACLs" +"2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79b Processing field: Capabilities" +"2019-04-22 06:16:43.588 UTC [common.channelconfig] NewStandardValues -> DEBU 79c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79d Processing field: AnchorPeers" +"2019-04-22 06:16:43.588 UTC [common.channelconfig] NewStandardValues -> DEBU 79e Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:43.588 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79f Processing field: MSP" +"2019-04-22 06:16:43.589 UTC [common.channelconfig] Validate -> DEBU 7a0 Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:16:43.589 UTC [common.channelconfig] validateMSP -> DEBU 7a1 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:43.589 UTC [msp] newBccspMsp -> DEBU 7a2 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:43.589 UTC [msp] New -> DEBU 7a3 Creating Cache-MSP instance" +"2019-04-22 06:16:43.589 UTC [msp] Setup -> DEBU 7a4 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:43.590 UTC [msp.identity] newIdentity -> DEBU 7a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.591 UTC [msp.identity] newIdentity -> DEBU 7a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.592 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7a7 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:43.592 UTC [msp] Validate -> DEBU 7a8 MSP Org1MSP validating identity" +"2019-04-22 06:16:43.593 UTC [msp] getCertificationChain -> DEBU 7a9 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:43.594 UTC [msp] hasOURole -> DEBU 7aa MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:43.594 UTC [msp] getCertificationChain -> DEBU 7ab MSP Org1MSP getting certification chain" +"2019-04-22 06:16:43.595 UTC [common.channelconfig] NewStandardValues -> DEBU 7ac Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:43.595 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ad Processing field: AnchorPeers" +"2019-04-22 06:16:43.595 UTC [common.channelconfig] NewStandardValues -> DEBU 7ae Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:43.595 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7af Processing field: MSP" +"2019-04-22 06:16:43.595 UTC [common.channelconfig] Validate -> DEBU 7b0 Anchor peers for org Org2MSP are " +"2019-04-22 06:16:43.595 UTC [common.channelconfig] validateMSP -> DEBU 7b1 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:43.595 UTC [msp] newBccspMsp -> DEBU 7b2 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:43.596 UTC [msp] New -> DEBU 7b3 Creating Cache-MSP instance" +"2019-04-22 06:16:43.596 UTC [msp] Setup -> DEBU 7b4 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:43.597 UTC [msp.identity] newIdentity -> DEBU 7b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.597 UTC [msp.identity] newIdentity -> DEBU 7b6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.598 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 7b7 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:43.598 UTC [msp] Validate -> DEBU 7b8 MSP Org2MSP validating identity" +"2019-04-22 06:16:43.599 UTC [msp] getCertificationChain -> DEBU 7b9 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:43.599 UTC [msp] hasOURole -> DEBU 7ba MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:43.599 UTC [msp] getCertificationChain -> DEBU 7bb MSP Org2MSP getting certification chain" +"2019-04-22 06:16:43.600 UTC [msp] Setup -> DEBU 7bc Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:43.600 UTC [msp] Setup -> DEBU 7bd MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:43.600 UTC [policies] NewManagerImpl -> DEBU 7be Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.600 UTC [policies] NewManagerImpl -> DEBU 7bf Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c0 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c1 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c2 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c3 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c4 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.601 UTC [policies] NewManagerImpl -> DEBU 7c5 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c6 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c7 Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c8 Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7c9 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7ca Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7cb Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7cc Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7cd Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.602 UTC [policies] NewManagerImpl -> DEBU 7ce Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:43.603 UTC [policies] NewManagerImpl -> DEBU 7cf Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:43.603 UTC [policies] NewManagerImpl -> DEBU 7d0 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:43.603 UTC [policies] NewManagerImpl -> DEBU 7d1 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:43.605 UTC [policies] NewManagerImpl -> DEBU 7d2 Proposed new policy Readers for Channel" +"2019-04-22 06:16:43.605 UTC [policies] NewManagerImpl -> DEBU 7d3 Proposed new policy Writers for Channel" +"2019-04-22 06:16:43.605 UTC [policies] NewManagerImpl -> DEBU 7d4 Proposed new policy Admins for Channel" +"2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d5 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d6 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d7 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7d9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:43.606 UTC [common.configtx] addToMap -> DEBU 7da Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:43.607 UTC [common.configtx] addToMap -> DEBU 7db Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:43.607 UTC [common.configtx] addToMap -> DEBU 7dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.607 UTC [common.configtx] addToMap -> DEBU 7dd Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7de Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7df Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:43.608 UTC [common.configtx] addToMap -> DEBU 7e4 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e5 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e6 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e7 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:43.609 UTC [common.configtx] addToMap -> DEBU 7e8 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7e9 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ea Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7eb Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ec Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ed Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ee Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:43.610 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:43.611 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:43.611 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:43.611 UTC [common.configtx] addToMap -> DEBU 7f2 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f3 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f6 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f7 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:43.612 UTC [common.configtx] addToMap -> DEBU 7f8 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7f9 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fa Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fb Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fc Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:43.613 UTC [common.configtx] addToMap -> DEBU 7fd Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:43.614 UTC [common.configtx] addToMap -> DEBU 7fe Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:43.614 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:43.614 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:43.615 UTC [common.configtx] addToMap -> DEBU 801 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:43.615 UTC [common.channelconfig] LogSanityChecks -> DEBU 802 As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:43.615 UTC [common.channelconfig] LogSanityChecks -> DEBU 803 As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:43.615 UTC [policies] Manager -> DEBU 804 Manager Channel looking up path [Application]" +"2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 805 Manager Channel has managers Application" +"2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 806 Manager Channel has managers Orderer" +"2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 807 Manager Channel/Application looking up path []" +"2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 808 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:43.616 UTC [policies] Manager -> DEBU 809 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 80a As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 80b As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 80c As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 80d Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 80e Manager Channel has managers Application" +"2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 80f Manager Channel has managers Orderer" +"2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 810 Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:43.617 UTC [policies] Manager -> DEBU 811 Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:43.617 UTC [common.channelconfig] LogSanityChecks -> DEBU 812 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:43.617 UTC [common.capabilities] Supported -> DEBU 813 Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:16:43.617 UTC [common.capabilities] Supported -> DEBU 814 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:43.618 UTC [msp.identity] Sign -> DEBU 815 Sign: plaintext: 0AD2060A1B08011A0608CBB8F5E50522...A12CA58A130D6FEC32CE7CDC161ECA9E " +"2019-04-22 06:16:43.618 UTC [msp.identity] Sign -> DEBU 816 Sign: digest: 8CFB29F29774256ECB51C7A36A77AD9302764F057312555481BE8FDD1DE1EC03 " +"2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 817 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 818 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 819 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 81a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:43.619 UTC [policies] Evaluate -> DEBU 81b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:43.619 UTC [msp] DeserializeIdentity -> DEBU 81c Obtaining identity" +"2019-04-22 06:16:43.619 UTC [msp.identity] newIdentity -> DEBU 81d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.620 UTC [cauthdsl] func1 -> DEBU 81e 0xc000d290f0 gate 1555913803620069100 evaluation starts" +"2019-04-22 06:16:43.620 UTC [cauthdsl] func2 -> DEBU 81f 0xc000d290f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:43.620 UTC [cauthdsl] func2 -> DEBU 820 0xc000d290f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:43.621 UTC [cauthdsl] func2 -> DEBU 821 0xc000d290f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:16:43.621 UTC [cauthdsl] func2 -> DEBU 822 0xc000d290f0 principal evaluation fails" +"2019-04-22 06:16:43.621 UTC [cauthdsl] func1 -> DEBU 823 0xc000d290f0 gate 1555913803620069100 evaluation fails" +"2019-04-22 06:16:43.621 UTC [policies] Evaluate -> DEBU 824 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.622 UTC [policies] Evaluate -> DEBU 825 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.622 UTC [policies] Evaluate -> DEBU 826 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:16:43.622 UTC [cauthdsl] func1 -> DEBU 827 0xc000e90360 gate 1555913803622448400 evaluation starts" +"2019-04-22 06:16:43.622 UTC [cauthdsl] func2 -> DEBU 828 0xc000e90360 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:43.622 UTC [cauthdsl] func2 -> DEBU 829 0xc000e90360 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:43.623 UTC [cauthdsl] func2 -> DEBU 82a 0xc000e90360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:16:43.623 UTC [cauthdsl] func2 -> DEBU 82b 0xc000e90360 principal evaluation fails" +"2019-04-22 06:16:43.623 UTC [cauthdsl] func1 -> DEBU 82c 0xc000e90360 gate 1555913803622448400 evaluation fails" +"2019-04-22 06:16:43.623 UTC [policies] Evaluate -> DEBU 82d Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:43.623 UTC [policies] Evaluate -> DEBU 82e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:43.623 UTC [policies] func1 -> DEBU 82f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 830 Signature set did not satisfy policy /Channel/Application/Writers" +"2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 831 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 832 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 833 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:43.624 UTC [policies] Evaluate -> DEBU 834 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:16:43.624 UTC [cauthdsl] func1 -> DEBU 835 0xc000e911c0 gate 1555913803624894500 evaluation starts" +"2019-04-22 06:16:43.624 UTC [cauthdsl] func2 -> DEBU 836 0xc000e911c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:43.624 UTC [cauthdsl] func2 -> DEBU 837 0xc000e911c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:43.625 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 838 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:16:43.625 UTC [msp] Validate -> DEBU 839 MSP OrdererMSP validating identity" +"2019-04-22 06:16:43.626 UTC [cauthdsl] func2 -> DEBU 83a 0xc000e911c0 principal matched by identity 0" +"2019-04-22 06:16:43.627 UTC [msp.identity] Verify -> DEBU 83b Verify: digest = 00000000 8c fb 29 f2 97 74 25 6e cb 51 c7 a3 6a 77 ad 93 |..)..t%n.Q..jw..| +00000010 02 76 4f 05 73 12 55 54 81 be 8f dd 1d e1 ec 03 |.vO.s.UT........|" +"2019-04-22 06:16:43.627 UTC [msp.identity] Verify -> DEBU 83c Verify: sig = 00000000 30 45 02 21 00 bd 75 92 bd 1d 96 bc be ea dc 3d |0E.!..u........=| +00000010 fb 98 91 b2 a3 02 76 bf 4a 0c 33 b5 75 a1 50 7a |......v.J.3.u.Pz| +00000020 6b f0 2a bc 99 02 20 1d ee 1f fb 71 ef 20 49 e2 |k.*... ....q. I.| +00000030 d6 f3 f6 58 29 c2 2a 6c 4c 9a 95 cf 6e da c5 3c |...X).*lL...n..<| +00000040 e2 3e 85 6c 50 84 6f |.>.lP.o|" +"2019-04-22 06:16:43.627 UTC [cauthdsl] func2 -> DEBU 83d 0xc000e911c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:43.627 UTC [cauthdsl] func1 -> DEBU 83e 0xc000e911c0 gate 1555913803624894500 evaluation succeeds" +"2019-04-22 06:16:43.627 UTC [policies] Evaluate -> DEBU 83f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:43.627 UTC [policies] Evaluate -> DEBU 840 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 841 Signature set satisfies policy /Channel/Orderer/Writers" +"2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 842 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 843 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:43.628 UTC [policies] Evaluate -> DEBU 844 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:43.628 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 845 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34522" +"2019-04-22 06:16:43.631 UTC [orderer.consensus.etcdraft] propose -> INFO 846 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:16:43.631 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 847 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-04-22 06:16:43.631 UTC [orderer.consensus.etcdraft] 2 -> DEBU 848 Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:16:43.634 UTC [orderer.common.broadcast] Handle -> WARN 849 Error reading from 192.168.224.9:34522: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:43.635 UTC [orderer.common.server] func1 -> DEBU 84a Closing Broadcast stream" +"2019-04-22 06:16:43.635 UTC [comm.grpc.server] 1 -> INFO 84b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34522 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=79.0446ms +"2019-04-22 06:16:43.635 UTC [grpc] infof -> DEBU 84c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:43.635 UTC [common.deliver] Handle -> WARN 84d Error reading from 192.168.224.9:34520: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:43.635 UTC [orderer.common.server] func1 -> DEBU 84e Closing Deliver stream" +"2019-04-22 06:16:43.635 UTC [comm.grpc.server] 1 -> INFO 84f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34520 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=95.1722ms +"2019-04-22 06:16:43.636 UTC [grpc] infof -> DEBU 850 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:43.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 851 Sending msg of 22809 bytes to 3 on channel businesschannel took 100µs" +"2019-04-22 06:16:43.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 852 Sending msg of 22809 bytes to 2 on channel businesschannel took 23.2µs" +"2019-04-22 06:16:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU 853 Send of ConsensusRequest for channel businesschannel with payload of size 22809 to orderer1.example.com(orderer1.example.com:7050) took 105.3µs " +"2019-04-22 06:16:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU 854 Send of ConsensusRequest for channel businesschannel with payload of size 22809 to orderer2.example.com(orderer2.example.com:7050) took 85µs " +"2019-04-22 06:16:43.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU 855 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.645 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 856 Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2019-04-22 06:16:43.648 UTC [common.configtx] addToMap -> DEBU 857 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:43.651 UTC [common.configtx] addToMap -> DEBU 858 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:43.651 UTC [common.configtx] addToMap -> DEBU 859 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.652 UTC [common.configtx] addToMap -> DEBU 85a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:43.653 UTC [common.configtx] addToMap -> DEBU 85b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.653 UTC [common.configtx] addToMap -> DEBU 85c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:43.653 UTC [common.configtx] addToMap -> DEBU 85d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:43.654 UTC [common.configtx] addToMap -> DEBU 85e Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.654 UTC [common.configtx] addToMap -> DEBU 85f Adding to config map: [Group] /Channel" +"2019-04-22 06:16:43.655 UTC [common.configtx] addToMap -> DEBU 860 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:43.655 UTC [common.configtx] addToMap -> DEBU 861 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.655 UTC [common.configtx] addToMap -> DEBU 862 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:43.656 UTC [common.configtx] addToMap -> DEBU 863 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 864 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 865 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 866 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.657 UTC [common.configtx] addToMap -> DEBU 867 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:43.658 UTC [common.configtx] verifyDeltaSet -> DEBU 868 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.658 UTC [common.configtx] policyForItem -> DEBU 869 Getting policy for item Org1MSP with mod_policy Admins" +"2019-04-22 06:16:43.659 UTC [policies] Manager -> DEBU 86a Manager Channel looking up path [Application]" +"2019-04-22 06:16:43.659 UTC [policies] Manager -> DEBU 86b Manager Channel has managers Application" +"2019-04-22 06:16:43.659 UTC [policies] Manager -> DEBU 86c Manager Channel has managers Orderer" +"2019-04-22 06:16:43.660 UTC [policies] Manager -> DEBU 86d Manager Channel/Application looking up path []" +"2019-04-22 06:16:43.660 UTC [policies] Manager -> DEBU 86e Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:43.660 UTC [policies] Manager -> DEBU 86f Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:43.661 UTC [policies] Manager -> DEBU 870 Manager Channel/Application looking up path [Org1MSP]" +"2019-04-22 06:16:43.661 UTC [policies] Manager -> DEBU 871 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:43.661 UTC [policies] Manager -> DEBU 872 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:43.662 UTC [policies] Manager -> DEBU 873 Manager Channel/Application/Org1MSP looking up path []" +"2019-04-22 06:16:43.676 UTC [policies] Evaluate -> DEBU 877 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:16:43.676 UTC [cauthdsl] func1 -> DEBU 878 0xc000ec93a0 gate 1555913803676674300 evaluation starts" +"2019-04-22 06:16:43.677 UTC [cauthdsl] func2 -> DEBU 879 0xc000ec93a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:43.677 UTC [cauthdsl] func2 -> DEBU 87a 0xc000ec93a0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:43.677 UTC [cauthdsl] func2 -> DEBU 87b 0xc000ec93a0 principal matched by identity 0" +"2019-04-22 06:16:43.677 UTC [msp.identity] Verify -> DEBU 87c Verify: digest = 00000000 d6 49 94 91 b8 a6 6c b3 a9 57 7e f9 27 5b 5a e3 |.I....l..W~.'[Z.| +00000010 52 1c 53 ad 04 db 62 c2 c0 a6 ee 8e 58 ad 10 22 |R.S...b.....X.."|" +"2019-04-22 06:16:43.678 UTC [msp.identity] Verify -> DEBU 87d Verify: sig = 00000000 30 45 02 21 00 b6 e5 83 b1 2b 25 37 b2 dd 37 82 |0E.!.....+%7..7.| +00000010 40 97 d8 59 11 aa 3d 47 e7 b8 07 a1 02 6c 44 3d |@..Y..=G.....lD=| +00000020 29 92 c8 73 f6 02 20 19 98 95 d4 4a ac 07 77 69 |)..s.. ....J..wi| +00000030 64 8c 79 a9 77 84 ee d8 1d 99 b4 5d 73 3e 6a 75 |d.y.w......]s>ju| +00000040 bb a0 cb 16 1c 5f d4 |....._.|" +"2019-04-22 06:16:43.678 UTC [cauthdsl] func2 -> DEBU 87f 0xc000ec93a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:43.679 UTC [cauthdsl] func1 -> DEBU 880 0xc000ec93a0 gate 1555913803676674300 evaluation succeeds" +"2019-04-22 06:16:43.679 UTC [policies] Evaluate -> DEBU 881 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.680 UTC [policies] Evaluate -> DEBU 882 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 87e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.664 UTC [orderer.common.cluster.step] sendMessage -> DEBU 874 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 292.2µs " +"2019-04-22 06:16:43.664 UTC [orderer.common.cluster.step] handleMessage -> DEBU 875 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.664 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 876 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +"2019-04-22 06:16:43.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 884 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +"2019-04-22 06:16:43.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 885 Sending msg of 28 bytes to 2 on channel businesschannel took 52µs" +"2019-04-22 06:16:43.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 886 Sending msg of 28 bytes to 3 on channel businesschannel took 28.3µs" +"2019-04-22 06:16:43.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 887 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.3µs " +"2019-04-22 06:16:43.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 888 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.1µs " +"2019-04-22 06:16:43.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU 889 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +"2019-04-22 06:16:43.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.693 UTC [orderer.common.cluster.step] handleMessage -> DEBU 88b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.680 UTC [common.configtx] verifyDeltaSet -> DEBU 883 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:43.694 UTC [common.configtx] recurseConfigMap -> DEBU 88c Setting policy for key Endorsement to " +"2019-04-22 06:16:43.694 UTC [common.configtx] recurseConfigMap -> DEBU 88d Setting policy for key Readers to " +"2019-04-22 06:16:43.695 UTC [common.configtx] recurseConfigMap -> DEBU 88e Setting policy for key Writers to " +"2019-04-22 06:16:43.695 UTC [common.configtx] recurseConfigMap -> DEBU 88f Setting policy for key Admins to " +"2019-04-22 06:16:43.695 UTC [common.configtx] recurseConfigMap -> DEBU 890 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.696 UTC [common.configtx] recurseConfigMap -> DEBU 891 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.696 UTC [common.configtx] recurseConfigMap -> DEBU 892 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.696 UTC [common.configtx] recurseConfigMap -> DEBU 893 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.697 UTC [common.configtx] recurseConfigMap -> DEBU 894 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.697 UTC [common.configtx] recurseConfigMap -> DEBU 895 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.697 UTC [common.configtx] recurseConfigMap -> DEBU 896 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.698 UTC [common.configtx] recurseConfigMap -> DEBU 897 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.699 UTC [common.configtx] recurseConfigMap -> DEBU 898 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.699 UTC [common.configtx] recurseConfigMap -> DEBU 899 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.699 UTC [common.configtx] recurseConfigMap -> DEBU 89a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.700 UTC [common.configtx] recurseConfigMap -> DEBU 89b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.700 UTC [common.configtx] recurseConfigMap -> DEBU 89c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.700 UTC [common.configtx] recurseConfigMap -> DEBU 89d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 89e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 89f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 8a0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.701 UTC [common.configtx] recurseConfigMap -> DEBU 8a1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.702 UTC [common.configtx] recurseConfigMap -> DEBU 8a2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:43.702 UTC [common.channelconfig] NewStandardValues -> DEBU 8a3 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:43.702 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a4 Processing field: HashingAlgorithm" +"2019-04-22 06:16:43.702 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:43.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a6 Processing field: OrdererAddresses" +"2019-04-22 06:16:43.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a7 Processing field: Consortium" +"2019-04-22 06:16:43.703 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a8 Processing field: Capabilities" +"2019-04-22 06:16:43.703 UTC [common.channelconfig] NewStandardValues -> DEBU 8a9 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:43.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8aa Processing field: ACLs" +"2019-04-22 06:16:43.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ab Processing field: Capabilities" +"2019-04-22 06:16:43.704 UTC [common.channelconfig] NewStandardValues -> DEBU 8ac Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:43.704 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ad Processing field: AnchorPeers" +"2019-04-22 06:16:43.704 UTC [common.channelconfig] NewStandardValues -> DEBU 8ae Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:43.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8af Processing field: MSP" +"2019-04-22 06:16:43.705 UTC [common.channelconfig] Validate -> DEBU 8b0 Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:16:43.705 UTC [common.channelconfig] validateMSP -> DEBU 8b1 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:43.706 UTC [msp] newBccspMsp -> DEBU 8b2 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:43.706 UTC [msp] New -> DEBU 8b3 Creating Cache-MSP instance" +"2019-04-22 06:16:43.706 UTC [msp] Setup -> DEBU 8b4 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:43.707 UTC [msp.identity] newIdentity -> DEBU 8b5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.708 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8b6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:43.708 UTC [msp.identity] newIdentity -> DEBU 8b7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.710 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8b8 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:43.712 UTC [msp] Validate -> DEBU 8b9 MSP Org1MSP validating identity" +"2019-04-22 06:16:43.712 UTC [msp] getCertificationChain -> DEBU 8ba MSP Org1MSP getting certification chain" +"2019-04-22 06:16:43.713 UTC [msp] hasOURole -> DEBU 8bb MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:43.713 UTC [msp] getCertificationChain -> DEBU 8bc MSP Org1MSP getting certification chain" +"2019-04-22 06:16:43.719 UTC [common.channelconfig] NewStandardValues -> DEBU 8bd Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:43.719 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8be Processing field: AnchorPeers" +"2019-04-22 06:16:43.720 UTC [common.channelconfig] NewStandardValues -> DEBU 8bf Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:43.721 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8c0 Processing field: MSP" +"2019-04-22 06:16:43.721 UTC [common.channelconfig] Validate -> DEBU 8c1 Anchor peers for org Org2MSP are " +"2019-04-22 06:16:43.722 UTC [common.channelconfig] validateMSP -> DEBU 8c2 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:43.722 UTC [msp] newBccspMsp -> DEBU 8c3 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:43.723 UTC [msp] New -> DEBU 8c4 Creating Cache-MSP instance" +"2019-04-22 06:16:43.723 UTC [msp] Setup -> DEBU 8c5 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:43.724 UTC [msp.identity] newIdentity -> DEBU 8c6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.724 UTC [msp.identity] newIdentity -> DEBU 8c7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.725 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 8c8 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:43.725 UTC [msp] Validate -> DEBU 8c9 MSP Org2MSP validating identity" +"2019-04-22 06:16:43.726 UTC [msp] getCertificationChain -> DEBU 8ca MSP Org2MSP getting certification chain" +"2019-04-22 06:16:43.726 UTC [msp] hasOURole -> DEBU 8cb MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:43.727 UTC [msp] getCertificationChain -> DEBU 8cc MSP Org2MSP getting certification chain" +"2019-04-22 06:16:43.727 UTC [common.channelconfig] NewStandardValues -> DEBU 8cd Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:43.728 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ce Processing field: ConsensusType" +"2019-04-22 06:16:43.728 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8cf Processing field: BatchSize" +"2019-04-22 06:16:43.728 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d0 Processing field: BatchTimeout" +"2019-04-22 06:16:43.729 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d1 Processing field: KafkaBrokers" +"2019-04-22 06:16:43.729 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d2 Processing field: ChannelRestrictions" +"2019-04-22 06:16:43.730 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d3 Processing field: Capabilities" +"2019-04-22 06:16:43.730 UTC [common.channelconfig] NewStandardValues -> DEBU 8d4 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:43.731 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d5 Processing field: Endpoints" +"2019-04-22 06:16:43.733 UTC [common.channelconfig] NewStandardValues -> DEBU 8d6 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:43.733 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8d7 Processing field: MSP" +"2019-04-22 06:16:43.733 UTC [common.channelconfig] validateMSP -> DEBU 8d8 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:43.734 UTC [msp] newBccspMsp -> DEBU 8d9 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:43.734 UTC [msp] New -> DEBU 8da Creating Cache-MSP instance" +"2019-04-22 06:16:43.735 UTC [msp] Setup -> DEBU 8db Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:43.735 UTC [msp.identity] newIdentity -> DEBU 8dc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.736 UTC [msp.identity] newIdentity -> DEBU 8dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:43.736 UTC [msp] Validate -> DEBU 8de MSP OrdererMSP validating identity" +"2019-04-22 06:16:43.737 UTC [msp] Setup -> DEBU 8df Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:43.737 UTC [msp] Setup -> DEBU 8e0 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:43.737 UTC [policies] NewManagerImpl -> DEBU 8e1 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.738 UTC [policies] NewManagerImpl -> DEBU 8e2 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.738 UTC [policies] NewManagerImpl -> DEBU 8e3 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.738 UTC [policies] NewManagerImpl -> DEBU 8e4 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:43.739 UTC [policies] NewManagerImpl -> DEBU 8e5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.739 UTC [policies] NewManagerImpl -> DEBU 8e6 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.740 UTC [policies] NewManagerImpl -> DEBU 8e7 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.741 UTC [policies] NewManagerImpl -> DEBU 8e8 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:43.741 UTC [policies] NewManagerImpl -> DEBU 8e9 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:43.741 UTC [policies] NewManagerImpl -> DEBU 8ea Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:43.742 UTC [policies] NewManagerImpl -> DEBU 8eb Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:43.742 UTC [policies] NewManagerImpl -> DEBU 8ec Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:43.742 UTC [policies] NewManagerImpl -> DEBU 8ed Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:43.743 UTC [policies] NewManagerImpl -> DEBU 8ee Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.743 UTC [policies] NewManagerImpl -> DEBU 8ef Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.743 UTC [policies] NewManagerImpl -> DEBU 8f0 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f1 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f2 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f3 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:43.744 UTC [policies] NewManagerImpl -> DEBU 8f4 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:43.745 UTC [policies] NewManagerImpl -> DEBU 8f5 Proposed new policy Admins for Channel" +"2019-04-22 06:16:43.745 UTC [policies] NewManagerImpl -> DEBU 8f6 Proposed new policy Readers for Channel" +"2019-04-22 06:16:43.745 UTC [policies] NewManagerImpl -> DEBU 8f7 Proposed new policy Writers for Channel" +"2019-04-22 06:16:43.746 UTC [common.configtx] addToMap -> DEBU 8f8 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:43.746 UTC [common.configtx] addToMap -> DEBU 8f9 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:43.746 UTC [common.configtx] addToMap -> DEBU 8fa Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:43.747 UTC [common.configtx] addToMap -> DEBU 8fb Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:43.747 UTC [common.configtx] addToMap -> DEBU 8fc Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:43.747 UTC [common.configtx] addToMap -> DEBU 8fd Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 8fe Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:43.748 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 90e Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 90f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 910 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 911 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 912 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 913 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 914 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 915 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 916 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 917 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 918 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 919 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91a Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91b Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91c Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:43.749 UTC [common.configtx] addToMap -> DEBU 91d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:43.750 UTC [common.configtx] addToMap -> DEBU 91e Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:43.750 UTC [common.configtx] addToMap -> DEBU 91f Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:43.758 UTC [common.configtx] addToMap -> DEBU 920 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:43.759 UTC [common.configtx] addToMap -> DEBU 921 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:43.759 UTC [common.configtx] addToMap -> DEBU 922 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:43.760 UTC [common.configtx] addToMap -> DEBU 923 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:43.760 UTC [common.configtx] addToMap -> DEBU 924 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:43.761 UTC [common.channelconfig] LogSanityChecks -> DEBU 925 As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:43.761 UTC [common.channelconfig] LogSanityChecks -> DEBU 926 As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:43.762 UTC [policies] Manager -> DEBU 927 Manager Channel looking up path [Application]" +"2019-04-22 06:16:43.762 UTC [policies] Manager -> DEBU 928 Manager Channel has managers Application" +"2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 929 Manager Channel has managers Orderer" +"2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 92a Manager Channel/Application looking up path []" +"2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 92b Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:43.763 UTC [policies] Manager -> DEBU 92c Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:43.764 UTC [common.channelconfig] LogSanityChecks -> DEBU 92d As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:43.764 UTC [common.channelconfig] LogSanityChecks -> DEBU 92e As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:43.764 UTC [common.channelconfig] LogSanityChecks -> DEBU 92f As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:43.764 UTC [policies] Manager -> DEBU 930 Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:43.765 UTC [policies] Manager -> DEBU 931 Manager Channel has managers Application" +"2019-04-22 06:16:43.765 UTC [policies] Manager -> DEBU 932 Manager Channel has managers Orderer" +"2019-04-22 06:16:43.765 UTC [policies] Manager -> DEBU 933 Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:43.766 UTC [policies] Manager -> DEBU 934 Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:43.766 UTC [common.channelconfig] LogSanityChecks -> DEBU 935 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:43.766 UTC [common.capabilities] Supported -> DEBU 936 Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:16:43.766 UTC [common.capabilities] Supported -> DEBU 937 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:43.767 UTC [orderer.common.server] func1 -> DEBU 938 Executing callback to update root CAs" +"2019-04-22 06:16:43.767 UTC [orderer.common.server] updateTrustedRoots -> DEBU 939 updating root CAs for channel [businesschannel]" +"2019-04-22 06:16:43.767 UTC [orderer.common.server] updateTrustedRoots -> DEBU 93a adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:16:43.768 UTC [orderer.common.server] updateTrustedRoots -> DEBU 93b adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:16:43.768 UTC [orderer.common.server] updateTrustedRoots -> DEBU 93c adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:16:43.769 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 93d [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2019-04-22 06:16:43.769 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 93e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2019-04-22 06:16:43.769 UTC [msp.identity] Sign -> DEBU 93f Sign: plaintext: 0A020801120B0A090A03010203100418...116EAD0C7B3DC81FED0053091F1DEFD6 " +"2019-04-22 06:16:43.769 UTC [msp.identity] Sign -> DEBU 940 Sign: digest: B70B324629B568D7C75D6302DB1E99234F5610609561DB53A7F6F23400B5F2B1 " +"2019-04-22 06:16:43.773 UTC [fsblkstorage] indexBlock -> DEBU 941 Indexing block [blockNum=1, blockHash=[]byte{0x5e, 0xd0, 0xe, 0x26, 0x5e, 0x23, 0xd, 0x4c, 0x65, 0x1, 0x57, 0xd2, 0x90, 0x29, 0x46, 0xb0, 0x9d, 0x51, 0xe3, 0x4a, 0x9, 0x69, 0xcc, 0x77, 0xd7, 0x40, 0x5c, 0x1e, 0x19, 0xe8, 0x49, 0xd1} txOffsets= +txId= locPointer=offset=71, bytesLength=22680 +]" +"2019-04-22 06:16:43.777 UTC [fsblkstorage] updateCheckpoint -> DEBU 942 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47627], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-04-22 06:16:43.778 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 943 [channel: businesschannel] Wrote block [1]" +"2019-04-22 06:16:43.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 944 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:43.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 945 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +"2019-04-22 06:16:43.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 946 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.9µs " +"2019-04-22 06:16:44.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 947 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.2µs " +"2019-04-22 06:16:44.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 948 Sending msg of 28 bytes to 3 on channel businesschannel took 172.7µs" +"2019-04-22 06:16:44.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 949 Sending msg of 28 bytes to 2 on channel businesschannel took 817.8µs" +"2019-04-22 06:16:44.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 94a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 776.2µs " +"2019-04-22 06:16:44.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:44.185 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:44.332 UTC [orderer.common.cluster.step] handleMessage -> DEBU 94d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:44.334 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 94e Sending msg of 28 bytes to 3 on channel testchainid took 56.7µs" +"2019-04-22 06:16:44.335 UTC [orderer.common.cluster.step] sendMessage -> DEBU 94f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 228.4µs " +"2019-04-22 06:16:44.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 950 Sending msg of 28 bytes to 2 on channel businesschannel took 40.7µs" +"2019-04-22 06:16:44.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 951 Sending msg of 28 bytes to 3 on channel businesschannel took 155.6µs" +"2019-04-22 06:16:44.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 952 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.3µs " +"2019-04-22 06:16:44.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 953 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1807ms " +"2019-04-22 06:16:44.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 954 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:44.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 955 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:44.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU 956 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:44.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 957 Sending msg of 28 bytes to 3 on channel testchainid took 36.8µs" +"2019-04-22 06:16:44.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 958 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.8µs " +"2019-04-22 06:16:45.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 959 Sending msg of 28 bytes to 2 on channel businesschannel took 53.7µs" +"2019-04-22 06:16:45.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 95a Sending msg of 28 bytes to 3 on channel businesschannel took 41.3µs" +"2019-04-22 06:16:45.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 256.4µs " +"2019-04-22 06:16:45.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU 95c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 271.1µs " +"2019-04-22 06:16:45.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU 95f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:45.332 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 960 Sending msg of 28 bytes to 3 on channel testchainid took 27.3µs" +"2019-04-22 06:16:45.333 UTC [orderer.common.cluster.step] sendMessage -> DEBU 961 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 457.6µs " +"2019-04-22 06:16:45.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 962 Sending msg of 28 bytes to 2 on channel businesschannel took 46µs" +"2019-04-22 06:16:45.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 963 Sending msg of 28 bytes to 3 on channel businesschannel took 30.1µs" +"2019-04-22 06:16:45.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU 964 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.9µs " +"2019-04-22 06:16:45.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU 965 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 445.6µs " +"2019-04-22 06:16:45.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU 966 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 967 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.804 UTC [orderer.common.server] Deliver -> DEBU 968 Starting new Deliver handler" +"2019-04-22 06:16:45.805 UTC [common.deliver] Handle -> DEBU 969 Starting new deliver loop for 192.168.224.9:34524" +"2019-04-22 06:16:45.805 UTC [common.deliver] Handle -> DEBU 96a Attempting to read seek info message from 192.168.224.9:34524" +"2019-04-22 06:16:45.816 UTC [orderer.common.server] Broadcast -> DEBU 96b Starting new Broadcast handler" +"2019-04-22 06:16:45.816 UTC [orderer.common.broadcast] Handle -> DEBU 96c Starting new broadcast loop for 192.168.224.9:34526" +"2019-04-22 06:16:45.817 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 96d [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34526" +"2019-04-22 06:16:45.817 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 96e Processing config update message for channel businesschannel" +"2019-04-22 06:16:45.818 UTC [policies] Evaluate -> DEBU 96f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:45.819 UTC [policies] Evaluate -> DEBU 970 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:45.819 UTC [policies] Evaluate -> DEBU 971 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:45.819 UTC [policies] Evaluate -> DEBU 972 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:45.820 UTC [policies] Evaluate -> DEBU 973 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:16:45.820 UTC [msp] DeserializeIdentity -> DEBU 974 Obtaining identity" +"2019-04-22 06:16:45.821 UTC [msp.identity] newIdentity -> DEBU 975 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.822 UTC [cauthdsl] func1 -> DEBU 976 0xc000ec9d30 gate 1555913805822365700 evaluation starts" +"2019-04-22 06:16:45.822 UTC [cauthdsl] func2 -> DEBU 977 0xc000ec9d30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:45.823 UTC [cauthdsl] func2 -> DEBU 978 0xc000ec9d30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:45.823 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 979 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:16:45.823 UTC [msp] Validate -> DEBU 97a MSP Org2MSP validating identity" +"2019-04-22 06:16:45.824 UTC [msp] getCertificationChain -> DEBU 97b MSP Org2MSP getting certification chain" +"2019-04-22 06:16:45.825 UTC [cauthdsl] func2 -> DEBU 97c 0xc000ec9d30 principal matched by identity 0" +"2019-04-22 06:16:45.826 UTC [msp.identity] Verify -> DEBU 97d Verify: digest = 00000000 f3 e6 0d 39 a9 70 ff ca 1c e8 c2 cf 27 e5 46 4f |...9.p......'.FO| +00000010 22 3a 45 92 2f 9a de 58 80 18 cb ba 84 4b 73 a7 |":E./..X.....Ks.|" +"2019-04-22 06:16:45.826 UTC [msp.identity] Verify -> DEBU 97e Verify: sig = 00000000 30 45 02 21 00 9a 8b 3e da 47 ce 9b ce eb 21 4a |0E.!...>.G....!J| +00000010 39 09 fc d1 57 8a 6a f6 08 71 fc 93 f7 8b 0e a9 |9...W.j..q......| +00000020 08 12 ba f3 dc 02 20 12 e7 dd 91 e8 fe 94 6e 68 |...... .......nh| +00000030 86 f0 a3 31 ba 7b 59 ce c3 0a c3 b0 2e 49 2a 2e |...1.{Y......I*.| +00000040 e4 59 bb e3 a7 d3 4c |.Y....L|" +"2019-04-22 06:16:45.827 UTC [cauthdsl] func2 -> DEBU 97f 0xc000ec9d30 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:45.827 UTC [cauthdsl] func1 -> DEBU 980 0xc000ec9d30 gate 1555913805822365700 evaluation succeeds" +"2019-04-22 06:16:45.829 UTC [policies] Evaluate -> DEBU 981 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.829 UTC [policies] Evaluate -> DEBU 983 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.830 UTC [policies] Evaluate -> DEBU 984 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:16:45.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU 982 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:45.830 UTC [policies] Evaluate -> DEBU 985 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:45.831 UTC [policies] Evaluate -> DEBU 986 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:45.831 UTC [policies] Evaluate -> DEBU 988 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:45.831 UTC [common.configtx] addToMap -> DEBU 989 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:45.832 UTC [common.configtx] addToMap -> DEBU 98b Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:45.832 UTC [common.configtx] addToMap -> DEBU 98c Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.832 UTC [common.configtx] addToMap -> DEBU 98d Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:45.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 336µs " +"2019-04-22 06:16:45.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 987 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +"2019-04-22 06:16:45.833 UTC [common.configtx] addToMap -> DEBU 98e Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:45.833 UTC [common.configtx] addToMap -> DEBU 98f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 990 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 991 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 992 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 993 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:45.834 UTC [common.configtx] addToMap -> DEBU 994 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.835 UTC [common.configtx] addToMap -> DEBU 995 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:45.835 UTC [common.configtx] addToMap -> DEBU 996 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 997 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 998 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 999 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.836 UTC [common.configtx] addToMap -> DEBU 99a Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:45.837 UTC [common.configtx] verifyDeltaSet -> DEBU 99b Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:45.837 UTC [common.configtx] verifyDeltaSet -> DEBU 99c Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.837 UTC [common.configtx] policyForItem -> DEBU 99d Getting policy for item Org2MSP with mod_policy Admins" +"2019-04-22 06:16:45.837 UTC [policies] Manager -> DEBU 99e Manager Channel looking up path [Application]" +"2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 99f Manager Channel has managers Orderer" +"2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a0 Manager Channel has managers Application" +"2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a1 Manager Channel/Application looking up path []" +"2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a2 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:45.838 UTC [policies] Manager -> DEBU 9a3 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:45.839 UTC [policies] Manager -> DEBU 9a4 Manager Channel/Application looking up path [Org2MSP]" +"2019-04-22 06:16:45.839 UTC [policies] Manager -> DEBU 9a5 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:45.839 UTC [policies] Manager -> DEBU 9a6 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:45.840 UTC [policies] Manager -> DEBU 9a7 Manager Channel/Application/Org2MSP looking up path []" +"2019-04-22 06:16:45.840 UTC [policies] Evaluate -> DEBU 9a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-04-22 06:16:45.840 UTC [cauthdsl] func1 -> DEBU 9a9 0xc000d29d70 gate 1555913805840879300 evaluation starts" +"2019-04-22 06:16:45.840 UTC [cauthdsl] func2 -> DEBU 9aa 0xc000d29d70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:45.841 UTC [cauthdsl] func2 -> DEBU 9ab 0xc000d29d70 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:45.841 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ac Checking if identity satisfies ADMIN role for Org2MSP" +"2019-04-22 06:16:45.841 UTC [cauthdsl] func2 -> DEBU 9ad 0xc000d29d70 principal matched by identity 0" +"2019-04-22 06:16:45.841 UTC [msp.identity] Verify -> DEBU 9ae Verify: digest = 00000000 15 3c 35 3e 0a a5 a4 08 d3 8b 10 e1 1e 92 64 23 |.<5>..........d#| +00000010 29 f6 f1 75 85 a5 47 e9 95 bb 52 8b 72 4c f0 0e |)..u..G...R.rL..|" +"2019-04-22 06:16:45.841 UTC [msp.identity] Verify -> DEBU 9af Verify: sig = 00000000 30 45 02 21 00 f7 9d cd da 3e 12 f0 cc 5b cf e1 |0E.!.....>...[..| +00000010 ed 4c 16 68 55 be 70 84 69 dc ae 06 51 0b 9e db |.L.hU.p.i...Q...| +00000020 86 ed f0 44 67 02 20 26 b6 d3 f4 80 93 4a 78 f7 |...Dg. &.....Jx.| +00000030 54 76 38 f1 be 1f df b1 72 b0 7e 2b 81 03 1c 00 |Tv8.....r.~+....| +00000040 c1 10 25 d5 0c eb da |..%....|" +"2019-04-22 06:16:45.842 UTC [cauthdsl] func2 -> DEBU 9b0 0xc000d29d70 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:45.842 UTC [cauthdsl] func1 -> DEBU 9b1 0xc000d29d70 gate 1555913805840879300 evaluation succeeds" +"2019-04-22 06:16:45.842 UTC [policies] Evaluate -> DEBU 9b2 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.842 UTC [policies] Evaluate -> DEBU 9b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.843 UTC [common.configtx] recurseConfigMap -> DEBU 9b4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.843 UTC [common.configtx] recurseConfigMap -> DEBU 9b5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.843 UTC [common.configtx] recurseConfigMap -> DEBU 9b6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9b7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9b8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9ba Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.844 UTC [common.configtx] recurseConfigMap -> DEBU 9bb Setting policy for key Admins to " +"2019-04-22 06:16:45.845 UTC [common.configtx] recurseConfigMap -> DEBU 9bc Setting policy for key Endorsement to " +"2019-04-22 06:16:45.845 UTC [common.configtx] recurseConfigMap -> DEBU 9bd Setting policy for key Readers to " +"2019-04-22 06:16:45.845 UTC [common.configtx] recurseConfigMap -> DEBU 9be Setting policy for key Writers to " +"2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9bf Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9c0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9c1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.846 UTC [common.configtx] recurseConfigMap -> DEBU 9c2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c3 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c7 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.847 UTC [common.configtx] recurseConfigMap -> DEBU 9c8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.848 UTC [common.configtx] recurseConfigMap -> DEBU 9c9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.848 UTC [common.configtx] recurseConfigMap -> DEBU 9ca Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9cb Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9cc Processing field: HashingAlgorithm" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9cd Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9ce Processing field: OrdererAddresses" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9cf Processing field: Consortium" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d0 Processing field: Capabilities" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9d1 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d2 Processing field: ACLs" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d3 Processing field: Capabilities" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9d4 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d5 Processing field: AnchorPeers" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] NewStandardValues -> DEBU 9d6 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9d7 Processing field: MSP" +"2019-04-22 06:16:45.848 UTC [common.channelconfig] Validate -> DEBU 9d8 Anchor peers for org Org2MSP are anchor_peers: " +"2019-04-22 06:16:45.848 UTC [common.channelconfig] validateMSP -> DEBU 9d9 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:45.848 UTC [msp] newBccspMsp -> DEBU 9da Creating BCCSP-based MSP instance" +"2019-04-22 06:16:45.848 UTC [msp] New -> DEBU 9db Creating Cache-MSP instance" +"2019-04-22 06:16:45.848 UTC [msp] Setup -> DEBU 9dc Setting up MSP instance Org2MSP" +"2019-04-22 06:16:45.848 UTC [msp.identity] newIdentity -> DEBU 9dd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.849 UTC [msp.identity] newIdentity -> DEBU 9de Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.849 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9df Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:45.849 UTC [msp] Validate -> DEBU 9e0 MSP Org2MSP validating identity" +"2019-04-22 06:16:45.849 UTC [msp] getCertificationChain -> DEBU 9e1 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:45.849 UTC [msp] hasOURole -> DEBU 9e2 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:45.849 UTC [msp] getCertificationChain -> DEBU 9e3 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:45.849 UTC [common.channelconfig] NewStandardValues -> DEBU 9e4 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:45.850 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e5 Processing field: AnchorPeers" +"2019-04-22 06:16:45.850 UTC [common.channelconfig] NewStandardValues -> DEBU 9e6 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:45.851 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9e7 Processing field: MSP" +"2019-04-22 06:16:45.851 UTC [common.channelconfig] Validate -> DEBU 9e8 Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:16:45.851 UTC [common.channelconfig] validateMSP -> DEBU 9e9 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:45.851 UTC [msp] newBccspMsp -> DEBU 9ea Creating BCCSP-based MSP instance" +"2019-04-22 06:16:45.851 UTC [msp] New -> DEBU 9eb Creating Cache-MSP instance" +"2019-04-22 06:16:45.852 UTC [msp] Setup -> DEBU 9ec Setting up MSP instance Org1MSP" +"2019-04-22 06:16:45.852 UTC [msp.identity] newIdentity -> DEBU 9ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.853 UTC [msp.identity] newIdentity -> DEBU 9ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.854 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ef Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:45.854 UTC [msp] Validate -> DEBU 9f0 MSP Org1MSP validating identity" +"2019-04-22 06:16:45.854 UTC [msp] getCertificationChain -> DEBU 9f1 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:45.855 UTC [msp] hasOURole -> DEBU 9f2 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:45.855 UTC [msp] getCertificationChain -> DEBU 9f3 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:45.855 UTC [common.channelconfig] NewStandardValues -> DEBU 9f4 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:45.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f5 Processing field: ConsensusType" +"2019-04-22 06:16:45.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f6 Processing field: BatchSize" +"2019-04-22 06:16:45.856 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f7 Processing field: BatchTimeout" +"2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f8 Processing field: KafkaBrokers" +"2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9f9 Processing field: ChannelRestrictions" +"2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fa Processing field: Capabilities" +"2019-04-22 06:16:45.857 UTC [common.channelconfig] NewStandardValues -> DEBU 9fb Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:45.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fc Processing field: Endpoints" +"2019-04-22 06:16:45.858 UTC [common.channelconfig] NewStandardValues -> DEBU 9fd Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:45.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 9fe Processing field: MSP" +"2019-04-22 06:16:45.858 UTC [common.channelconfig] validateMSP -> DEBU 9ff Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:45.858 UTC [msp] newBccspMsp -> DEBU a00 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:45.858 UTC [msp] New -> DEBU a01 Creating Cache-MSP instance" +"2019-04-22 06:16:45.858 UTC [msp] Setup -> DEBU a02 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:45.859 UTC [msp.identity] newIdentity -> DEBU a03 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.860 UTC [msp.identity] newIdentity -> DEBU a04 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.860 UTC [msp] Validate -> DEBU a05 MSP OrdererMSP validating identity" +"2019-04-22 06:16:45.861 UTC [msp] Setup -> DEBU a06 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:45.861 UTC [msp] Setup -> DEBU a07 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:45.861 UTC [policies] NewManagerImpl -> DEBU a08 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.861 UTC [policies] NewManagerImpl -> DEBU a09 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.861 UTC [policies] NewManagerImpl -> DEBU a0a Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0b Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0d Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0e Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a0f Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a10 Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:45.862 UTC [policies] NewManagerImpl -> DEBU a11 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a12 Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a13 Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a14 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a15 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.863 UTC [policies] NewManagerImpl -> DEBU a16 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a17 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a18 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a19 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a1a Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:45.864 UTC [policies] NewManagerImpl -> DEBU a1b Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:45.865 UTC [policies] NewManagerImpl -> DEBU a1c Proposed new policy Readers for Channel" +"2019-04-22 06:16:45.865 UTC [policies] NewManagerImpl -> DEBU a1d Proposed new policy Writers for Channel" +"2019-04-22 06:16:45.865 UTC [policies] NewManagerImpl -> DEBU a1e Proposed new policy Admins for Channel" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a1f Adding to config map: [Group] /Channel" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a20 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a21 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a22 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a23 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a24 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a25 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a26 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a27 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a28 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a29 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a2a Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:45.865 UTC [common.configtx] addToMap -> DEBU a2b Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2d Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2e Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a2f Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a30 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a31 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a32 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a33 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:45.866 UTC [common.configtx] addToMap -> DEBU a34 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a35 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a36 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:45.868 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:45.869 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a42 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a43 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a44 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a45 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a46 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:45.870 UTC [common.configtx] addToMap -> DEBU a47 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:45.871 UTC [common.configtx] addToMap -> DEBU a48 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:45.871 UTC [common.configtx] addToMap -> DEBU a49 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:45.872 UTC [common.configtx] addToMap -> DEBU a4a Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:45.872 UTC [common.configtx] addToMap -> DEBU a4b Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:45.872 UTC [common.configtx] addToMap -> DEBU a4c Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:45.872 UTC [common.channelconfig] LogSanityChecks -> DEBU a4d As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:45.872 UTC [common.channelconfig] LogSanityChecks -> DEBU a4e As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a4f Manager Channel looking up path [Application]" +"2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a50 Manager Channel has managers Application" +"2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a51 Manager Channel has managers Orderer" +"2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a52 Manager Channel/Application looking up path []" +"2019-04-22 06:16:45.873 UTC [policies] Manager -> DEBU a53 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a54 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a55 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a56 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a57 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a58 Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a59 Manager Channel has managers Application" +"2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a5a Manager Channel has managers Orderer" +"2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a5b Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:45.874 UTC [policies] Manager -> DEBU a5c Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:45.874 UTC [common.channelconfig] LogSanityChecks -> DEBU a5d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:45.874 UTC [common.capabilities] Supported -> DEBU a5e Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:16:45.874 UTC [common.capabilities] Supported -> DEBU a5f Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:45.874 UTC [msp.identity] Sign -> DEBU a60 Sign: plaintext: 0AD2060A1B08011A0608CDB8F5E50522...CEC30AC3B02E492A2EE459BBE3A7D34C " +"2019-04-22 06:16:45.874 UTC [msp.identity] Sign -> DEBU a61 Sign: digest: 47087EF76E1F59D0D0173F7CFD5E05DDF2F55740ECA6AAD1279805000C2C4535 " +"2019-04-22 06:16:45.874 UTC [policies] Evaluate -> DEBU a62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:45.874 UTC [policies] Evaluate -> DEBU a63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:45.875 UTC [policies] Evaluate -> DEBU a64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:45.875 UTC [policies] Evaluate -> DEBU a65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:45.875 UTC [policies] Evaluate -> DEBU a66 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:16:45.875 UTC [msp] DeserializeIdentity -> DEBU a67 Obtaining identity" +"2019-04-22 06:16:45.876 UTC [msp.identity] newIdentity -> DEBU a68 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.877 UTC [cauthdsl] func1 -> DEBU a69 0xc000fb6350 gate 1555913805877824900 evaluation starts" +"2019-04-22 06:16:45.877 UTC [cauthdsl] func2 -> DEBU a6a 0xc000fb6350 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:45.878 UTC [cauthdsl] func2 -> DEBU a6b 0xc000fb6350 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a6c 0xc000fb6350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a6d 0xc000fb6350 principal evaluation fails" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func1 -> DEBU a6e 0xc000fb6350 gate 1555913805877824900 evaluation fails" +"2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a6f Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a70 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func1 -> DEBU a72 0xc000fb7600 gate 1555913805881658100 evaluation starts" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a73 0xc000fb7600 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a74 0xc000fb7600 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a75 0xc000fb7600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func2 -> DEBU a76 0xc000fb7600 principal evaluation fails" +"2019-04-22 06:16:45.881 UTC [cauthdsl] func1 -> DEBU a77 0xc000fb7600 gate 1555913805881658100 evaluation fails" +"2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:45.881 UTC [policies] Evaluate -> DEBU a79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:45.881 UTC [policies] func1 -> DEBU a7a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7b Signature set did not satisfy policy /Channel/Application/Writers" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a7f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:16:45.882 UTC [cauthdsl] func1 -> DEBU a80 0xc000e2a390 gate 1555913805882203100 evaluation starts" +"2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a81 0xc000e2a390 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a82 0xc000e2a390 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:45.882 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a83 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:16:45.882 UTC [msp] Validate -> DEBU a84 MSP OrdererMSP validating identity" +"2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a85 0xc000e2a390 principal matched by identity 0" +"2019-04-22 06:16:45.882 UTC [msp.identity] Verify -> DEBU a86 Verify: digest = 00000000 47 08 7e f7 6e 1f 59 d0 d0 17 3f 7c fd 5e 05 dd |G.~.n.Y...?|.^..| +00000010 f2 f5 57 40 ec a6 aa d1 27 98 05 00 0c 2c 45 35 |..W@....'....,E5|" +"2019-04-22 06:16:45.882 UTC [msp.identity] Verify -> DEBU a87 Verify: sig = 00000000 30 45 02 21 00 eb 6d 42 07 cb 81 91 61 2a fa 7e |0E.!..mB....a*.~| +00000010 b4 96 01 30 37 c3 33 e4 39 4e ea 62 ae 23 ad cb |...07.3.9N.b.#..| +00000020 38 21 bc 2e b7 02 20 79 11 e0 40 58 9f 99 ae 44 |8!.... y..@X...D| +00000030 12 b3 c7 7d 34 a9 a6 70 4a 75 15 9e 3b ed 3f 7d |...}4..pJu..;.?}| +00000040 6c b3 c4 e8 fb 7f 16 |l......|" +"2019-04-22 06:16:45.882 UTC [cauthdsl] func2 -> DEBU a88 0xc000e2a390 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:45.882 UTC [cauthdsl] func1 -> DEBU a89 0xc000e2a390 gate 1555913805882203100 evaluation succeeds" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a8a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a8b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:45.882 UTC [policies] Evaluate -> DEBU a8c Signature set satisfies policy /Channel/Orderer/Writers" +"2019-04-22 06:16:45.883 UTC [policies] Evaluate -> DEBU a8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-04-22 06:16:45.883 UTC [policies] Evaluate -> DEBU a8e Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:45.883 UTC [policies] Evaluate -> DEBU a8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:45.883 UTC [orderer.consensus.etcdraft] propose -> INFO a90 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:16:45.883 UTC [orderer.consensus.etcdraft] serveRequest -> INFO a91 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-04-22 06:16:45.884 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a92 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34526" +"2019-04-22 06:16:45.884 UTC [orderer.consensus.etcdraft] 2 -> DEBU a93 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:16:45.890 UTC [orderer.common.broadcast] Handle -> WARN a94 Error reading from 192.168.224.9:34526: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:45.891 UTC [orderer.common.server] func1 -> DEBU a95 Closing Broadcast stream" +"2019-04-22 06:16:45.891 UTC [comm.grpc.server] 1 -> INFO a96 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34526 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=74.9321ms +"2019-04-22 06:16:45.891 UTC [grpc] infof -> DEBU a97 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:45.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a98 Sending msg of 22867 bytes to 2 on channel businesschannel took 27.9µs" +"2019-04-22 06:16:45.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a99 Sending msg of 22867 bytes to 3 on channel businesschannel took 19.3µs" +"2019-04-22 06:16:45.892 UTC [orderer.common.cluster.step] sendMessage -> DEBU a9a Send of ConsensusRequest for channel businesschannel with payload of size 22867 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +"2019-04-22 06:16:45.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU a9b Send of ConsensusRequest for channel businesschannel with payload of size 22867 to orderer1.example.com(orderer1.example.com:7050) took 303.9µs " +"2019-04-22 06:16:45.898 UTC [common.deliver] Handle -> WARN a9c Error reading from 192.168.224.9:34524: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:45.901 UTC [orderer.common.server] func1 -> DEBU a9d Closing Deliver stream" +"2019-04-22 06:16:45.901 UTC [comm.grpc.server] 1 -> INFO a9e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34524 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=96.5274ms +"2019-04-22 06:16:45.903 UTC [grpc] infof -> DEBU a9f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:45.903 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.904 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa1 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +"2019-04-22 06:16:45.904 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aa2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +"2019-04-22 06:16:45.904 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa3 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.905 UTC [orderer.consensus.etcdraft] writeBlock -> INFO aa4 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2019-04-22 06:16:45.905 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.8µs " +"2019-04-22 06:16:45.905 UTC [common.configtx] addToMap -> DEBU aa6 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:45.906 UTC [orderer.common.cluster.step] sendMessage -> DEBU aa7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +"2019-04-22 06:16:45.906 UTC [common.configtx] addToMap -> DEBU aa8 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:45.919 UTC [orderer.common.cluster.step] handleMessage -> DEBU aa9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.916 UTC [common.configtx] addToMap -> DEBU aaa Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.921 UTC [orderer.common.cluster.step] handleMessage -> DEBU aab Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:45.921 UTC [common.configtx] addToMap -> DEBU aac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:45.926 UTC [common.configtx] addToMap -> DEBU aad Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:45.926 UTC [common.configtx] addToMap -> DEBU aae Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU aaf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab1 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab2 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab3 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.927 UTC [common.configtx] addToMap -> DEBU ab4 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:45.928 UTC [common.configtx] addToMap -> DEBU ab8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.931 UTC [common.configtx] addToMap -> DEBU ab9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.931 UTC [common.configtx] verifyDeltaSet -> DEBU aba Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:45.932 UTC [common.configtx] verifyDeltaSet -> DEBU abb Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.932 UTC [common.configtx] policyForItem -> DEBU abc Getting policy for item Org2MSP with mod_policy Admins" +"2019-04-22 06:16:45.932 UTC [policies] Manager -> DEBU abd Manager Channel looking up path [Application]" +"2019-04-22 06:16:45.932 UTC [policies] Manager -> DEBU abe Manager Channel has managers Application" +"2019-04-22 06:16:45.933 UTC [policies] Manager -> DEBU abf Manager Channel has managers Orderer" +"2019-04-22 06:16:45.937 UTC [policies] Manager -> DEBU ac0 Manager Channel/Application looking up path []" +"2019-04-22 06:16:45.938 UTC [policies] Manager -> DEBU ac1 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:45.939 UTC [policies] Manager -> DEBU ac2 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:45.939 UTC [policies] Manager -> DEBU ac3 Manager Channel/Application looking up path [Org2MSP]" +"2019-04-22 06:16:45.939 UTC [policies] Manager -> DEBU ac4 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:45.940 UTC [policies] Manager -> DEBU ac5 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:45.940 UTC [policies] Manager -> DEBU ac6 Manager Channel/Application/Org2MSP looking up path []" +"2019-04-22 06:16:45.940 UTC [policies] Evaluate -> DEBU ac7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-04-22 06:16:45.942 UTC [cauthdsl] func1 -> DEBU ac8 0xc000c062a0 gate 1555913805942123600 evaluation starts" +"2019-04-22 06:16:45.942 UTC [cauthdsl] func2 -> DEBU ac9 0xc000c062a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:45.942 UTC [cauthdsl] func2 -> DEBU aca 0xc000c062a0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:45.943 UTC [cauthdsl] func2 -> DEBU acb 0xc000c062a0 principal matched by identity 0" +"2019-04-22 06:16:45.943 UTC [msp.identity] Verify -> DEBU acc Verify: digest = 00000000 15 3c 35 3e 0a a5 a4 08 d3 8b 10 e1 1e 92 64 23 |.<5>..........d#| +00000010 29 f6 f1 75 85 a5 47 e9 95 bb 52 8b 72 4c f0 0e |)..u..G...R.rL..|" +"2019-04-22 06:16:45.943 UTC [msp.identity] Verify -> DEBU acd Verify: sig = 00000000 30 45 02 21 00 f7 9d cd da 3e 12 f0 cc 5b cf e1 |0E.!.....>...[..| +00000010 ed 4c 16 68 55 be 70 84 69 dc ae 06 51 0b 9e db |.L.hU.p.i...Q...| +00000020 86 ed f0 44 67 02 20 26 b6 d3 f4 80 93 4a 78 f7 |...Dg. &.....Jx.| +00000030 54 76 38 f1 be 1f df b1 72 b0 7e 2b 81 03 1c 00 |Tv8.....r.~+....| +00000040 c1 10 25 d5 0c eb da |..%....|" +"2019-04-22 06:16:45.945 UTC [cauthdsl] func2 -> DEBU ace 0xc000c062a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:45.946 UTC [cauthdsl] func1 -> DEBU acf 0xc000c062a0 gate 1555913805942123600 evaluation succeeds" +"2019-04-22 06:16:45.946 UTC [policies] Evaluate -> DEBU ad0 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.946 UTC [policies] Evaluate -> DEBU ad1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.947 UTC [common.configtx] recurseConfigMap -> DEBU ad6 Setting policy for key Admins to " +"2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ad7 Setting policy for key Endorsement to " +"2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ad8 Setting policy for key Readers to " +"2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ad9 Setting policy for key Writers to " +"2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU ada Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.948 UTC [common.configtx] recurseConfigMap -> DEBU adb Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.949 UTC [common.configtx] recurseConfigMap -> DEBU adc Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.950 UTC [common.configtx] recurseConfigMap -> DEBU add Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.950 UTC [common.configtx] recurseConfigMap -> DEBU ade Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU adf Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU ae0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU ae1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.951 UTC [common.configtx] recurseConfigMap -> DEBU ae2 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.952 UTC [common.configtx] recurseConfigMap -> DEBU ae3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae5 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.953 UTC [common.configtx] recurseConfigMap -> DEBU ae7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.954 UTC [common.configtx] recurseConfigMap -> DEBU ae8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:45.954 UTC [common.channelconfig] NewStandardValues -> DEBU ae9 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aea Processing field: HashingAlgorithm" +"2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aeb Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aec Processing field: OrdererAddresses" +"2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aed Processing field: Consortium" +"2019-04-22 06:16:45.954 UTC [common.channelconfig] initializeProtosStruct -> DEBU aee Processing field: Capabilities" +"2019-04-22 06:16:45.955 UTC [common.channelconfig] NewStandardValues -> DEBU aef Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:45.955 UTC [common.channelconfig] initializeProtosStruct -> DEBU af0 Processing field: ACLs" +"2019-04-22 06:16:45.955 UTC [common.channelconfig] initializeProtosStruct -> DEBU af1 Processing field: Capabilities" +"2019-04-22 06:16:45.955 UTC [common.channelconfig] NewStandardValues -> DEBU af2 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:45.955 UTC [common.channelconfig] initializeProtosStruct -> DEBU af3 Processing field: AnchorPeers" +"2019-04-22 06:16:45.956 UTC [common.channelconfig] NewStandardValues -> DEBU af4 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:45.956 UTC [common.channelconfig] initializeProtosStruct -> DEBU af5 Processing field: MSP" +"2019-04-22 06:16:45.956 UTC [common.channelconfig] Validate -> DEBU af6 Anchor peers for org Org2MSP are anchor_peers: " +"2019-04-22 06:16:45.956 UTC [common.channelconfig] validateMSP -> DEBU af7 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:45.957 UTC [msp] newBccspMsp -> DEBU af8 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:45.957 UTC [msp] New -> DEBU af9 Creating Cache-MSP instance" +"2019-04-22 06:16:45.957 UTC [msp] Setup -> DEBU afa Setting up MSP instance Org2MSP" +"2019-04-22 06:16:45.957 UTC [msp.identity] newIdentity -> DEBU afb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.958 UTC [msp.identity] newIdentity -> DEBU afc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.961 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU afd Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:45.962 UTC [msp] Validate -> DEBU afe MSP Org2MSP validating identity" +"2019-04-22 06:16:45.967 UTC [msp] getCertificationChain -> DEBU aff MSP Org2MSP getting certification chain" +"2019-04-22 06:16:45.967 UTC [msp] hasOURole -> DEBU b00 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:45.967 UTC [msp] getCertificationChain -> DEBU b01 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:45.968 UTC [common.channelconfig] NewStandardValues -> DEBU b02 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:45.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU b03 Processing field: AnchorPeers" +"2019-04-22 06:16:45.968 UTC [common.channelconfig] NewStandardValues -> DEBU b04 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:45.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU b05 Processing field: MSP" +"2019-04-22 06:16:45.969 UTC [common.channelconfig] Validate -> DEBU b06 Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:16:45.969 UTC [common.channelconfig] validateMSP -> DEBU b07 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:45.969 UTC [msp] newBccspMsp -> DEBU b08 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:45.969 UTC [msp] New -> DEBU b09 Creating Cache-MSP instance" +"2019-04-22 06:16:45.970 UTC [msp] Setup -> DEBU b0a Setting up MSP instance Org1MSP" +"2019-04-22 06:16:45.970 UTC [msp.identity] newIdentity -> DEBU b0b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.971 UTC [msp.identity] newIdentity -> DEBU b0c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.972 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b0d Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:45.972 UTC [msp] Validate -> DEBU b0e MSP Org1MSP validating identity" +"2019-04-22 06:16:45.973 UTC [msp] getCertificationChain -> DEBU b0f MSP Org1MSP getting certification chain" +"2019-04-22 06:16:45.973 UTC [msp] hasOURole -> DEBU b10 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:45.974 UTC [msp] getCertificationChain -> DEBU b11 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:45.974 UTC [common.channelconfig] NewStandardValues -> DEBU b12 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b13 Processing field: ConsensusType" +"2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b14 Processing field: BatchSize" +"2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b15 Processing field: BatchTimeout" +"2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b16 Processing field: KafkaBrokers" +"2019-04-22 06:16:45.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU b17 Processing field: ChannelRestrictions" +"2019-04-22 06:16:45.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU b18 Processing field: Capabilities" +"2019-04-22 06:16:45.976 UTC [common.channelconfig] NewStandardValues -> DEBU b19 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:45.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1a Processing field: Endpoints" +"2019-04-22 06:16:45.976 UTC [common.channelconfig] NewStandardValues -> DEBU b1b Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:45.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1c Processing field: MSP" +"2019-04-22 06:16:45.976 UTC [common.channelconfig] validateMSP -> DEBU b1d Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:45.976 UTC [msp] newBccspMsp -> DEBU b1e Creating BCCSP-based MSP instance" +"2019-04-22 06:16:45.976 UTC [msp] New -> DEBU b1f Creating Cache-MSP instance" +"2019-04-22 06:16:45.977 UTC [msp] Setup -> DEBU b20 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:45.978 UTC [msp.identity] newIdentity -> DEBU b21 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.979 UTC [msp.identity] newIdentity -> DEBU b22 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:45.980 UTC [msp] Validate -> DEBU b23 MSP OrdererMSP validating identity" +"2019-04-22 06:16:45.980 UTC [msp] Setup -> DEBU b24 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:45.980 UTC [msp] Setup -> DEBU b25 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b26 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b27 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b28 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.980 UTC [policies] NewManagerImpl -> DEBU b29 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2a Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2b Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2c Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2d Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2e Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b2f Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b30 Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b31 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b32 Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:45.981 UTC [policies] NewManagerImpl -> DEBU b33 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.982 UTC [policies] NewManagerImpl -> DEBU b34 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.982 UTC [policies] NewManagerImpl -> DEBU b35 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.982 UTC [policies] NewManagerImpl -> DEBU b36 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:45.983 UTC [policies] NewManagerImpl -> DEBU b37 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:45.983 UTC [policies] NewManagerImpl -> DEBU b38 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b39 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b3a Proposed new policy Admins for Channel" +"2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b3b Proposed new policy Readers for Channel" +"2019-04-22 06:16:45.984 UTC [policies] NewManagerImpl -> DEBU b3c Proposed new policy Writers for Channel" +"2019-04-22 06:16:45.985 UTC [common.configtx] addToMap -> DEBU b3d Adding to config map: [Group] /Channel" +"2019-04-22 06:16:45.985 UTC [common.configtx] addToMap -> DEBU b3e Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:45.985 UTC [common.configtx] addToMap -> DEBU b3f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b40 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b41 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b42 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:45.986 UTC [common.configtx] addToMap -> DEBU b43 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b45 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b46 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:45.987 UTC [common.configtx] addToMap -> DEBU b47 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b48 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b49 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b4a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b4b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:45.988 UTC [common.configtx] addToMap -> DEBU b4c Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b4d Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b4e Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b4f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b50 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:45.989 UTC [common.configtx] addToMap -> DEBU b51 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b52 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b53 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b54 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:45.990 UTC [common.configtx] addToMap -> DEBU b55 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b56 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b57 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b58 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:45.991 UTC [common.configtx] addToMap -> DEBU b59 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:45.992 UTC [common.configtx] addToMap -> DEBU b5e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b5f Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b60 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b61 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:45.993 UTC [common.configtx] addToMap -> DEBU b62 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:45.994 UTC [common.configtx] addToMap -> DEBU b63 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:45.994 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b65 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b66 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b67 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b68 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b69 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:45.995 UTC [common.configtx] addToMap -> DEBU b6a Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:45.995 UTC [common.channelconfig] LogSanityChecks -> DEBU b6b As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:45.995 UTC [common.channelconfig] LogSanityChecks -> DEBU b6c As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b6d Manager Channel looking up path [Application]" +"2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b6e Manager Channel has managers Application" +"2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b6f Manager Channel has managers Orderer" +"2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b70 Manager Channel/Application looking up path []" +"2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b71 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:45.996 UTC [policies] Manager -> DEBU b72 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b73 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b74 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b75 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b76 Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b77 Manager Channel has managers Orderer" +"2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b78 Manager Channel has managers Application" +"2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b79 Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:45.997 UTC [policies] Manager -> DEBU b7a Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:45.997 UTC [common.channelconfig] LogSanityChecks -> DEBU b7b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:45.997 UTC [common.capabilities] Supported -> DEBU b7c Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:16:45.997 UTC [common.capabilities] Supported -> DEBU b7d Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:45.998 UTC [orderer.common.server] func1 -> DEBU b7e Executing callback to update root CAs" +"2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b7f updating root CAs for channel [businesschannel]" +"2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b80 adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b81 adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:16:45.998 UTC [orderer.common.server] updateTrustedRoots -> DEBU b82 adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:16:45.998 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b83 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2019-04-22 06:16:45.998 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU b84 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-04-22 06:16:45.998 UTC [msp.identity] Sign -> DEBU b85 Sign: plaintext: 0A020802120B0A090A03010203100418...888F637BCE14A17492920A32E1B0C350 " +"2019-04-22 06:16:45.998 UTC [msp.identity] Sign -> DEBU b86 Sign: digest: 9172803ED5D480DB989C37A261F97EF8DF9A19BC44871E398C3D696398128B75 " +"2019-04-22 06:16:46.001 UTC [fsblkstorage] indexBlock -> DEBU b87 Indexing block [blockNum=2, blockHash=[]byte{0x6d, 0x11, 0xeb, 0x2e, 0x10, 0x1a, 0x3a, 0x96, 0x4e, 0x56, 0x1f, 0x50, 0xec, 0x8f, 0x61, 0x8, 0xef, 0x5f, 0xdb, 0x7f, 0x99, 0x66, 0x87, 0x9e, 0x99, 0xf2, 0xec, 0x93, 0xf6, 0xb8, 0x20, 0x1c} txOffsets= +txId= locPointer=offset=71, bytesLength=22738 +]" +"2019-04-22 06:16:46.003 UTC [fsblkstorage] updateCheckpoint -> DEBU b88 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71372], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-04-22 06:16:46.003 UTC [orderer.commmon.multichannel] commitBlock -> DEBU b89 [channel: businesschannel] Wrote block [2]" +"2019-04-22 06:16:46.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b8a Sending msg of 28 bytes to 2 on channel businesschannel took 43.1µs" +"2019-04-22 06:16:46.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b8b Sending msg of 28 bytes to 3 on channel businesschannel took 34.4µs" +"2019-04-22 06:16:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU b8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 561.2µs " +"2019-04-22 06:16:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU b8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 990.3µs " +"2019-04-22 06:16:46.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU b8e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:46.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU b8f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:46.329 UTC [orderer.common.cluster.step] handleMessage -> DEBU b90 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:46.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b91 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2019-04-22 06:16:46.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU b92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.9µs " +"2019-04-22 06:16:46.511 UTC [orderer.common.server] Deliver -> DEBU b93 Starting new Deliver handler" +"2019-04-22 06:16:46.511 UTC [common.deliver] Handle -> DEBU b94 Starting new deliver loop for 192.168.224.6:57810" +"2019-04-22 06:16:46.511 UTC [common.deliver] Handle -> DEBU b95 Attempting to read seek info message from 192.168.224.6:57810" +"2019-04-22 06:16:46.514 UTC [policies] Evaluate -> DEBU b96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:16:46.515 UTC [policies] Evaluate -> DEBU b97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.515 UTC [policies] Evaluate -> DEBU b98 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:46.516 UTC [policies] Evaluate -> DEBU b99 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.516 UTC [policies] Evaluate -> DEBU b9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:46.516 UTC [msp] DeserializeIdentity -> DEBU b9b Obtaining identity" +"2019-04-22 06:16:46.517 UTC [msp.identity] newIdentity -> DEBU b9c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.518 UTC [cauthdsl] func1 -> DEBU b9d 0xc000bf6270 gate 1555913806518563200 evaluation starts" +"2019-04-22 06:16:46.518 UTC [cauthdsl] func2 -> DEBU b9e 0xc000bf6270 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.519 UTC [cauthdsl] func2 -> DEBU b9f 0xc000bf6270 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:46.519 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ba0 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:46.519 UTC [msp] Validate -> DEBU ba1 MSP Org1MSP validating identity" +"2019-04-22 06:16:46.520 UTC [msp] getCertificationChain -> DEBU ba2 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:46.521 UTC [cauthdsl] func2 -> DEBU ba3 0xc000bf6270 principal matched by identity 0" +"2019-04-22 06:16:46.521 UTC [msp.identity] Verify -> DEBU ba4 Verify: digest = 00000000 f5 67 6f e9 01 86 e2 3b c8 c3 da b3 68 f5 8e f8 |.go....;....h...| +00000010 97 ff f5 66 85 53 d6 fb 68 48 fc 80 60 00 ca ec |...f.S..hH..`...|" +"2019-04-22 06:16:46.521 UTC [msp.identity] Verify -> DEBU ba5 Verify: sig = 00000000 30 45 02 21 00 ff 48 53 40 33 74 a0 e7 2f cb 63 |0E.!..HS@3t../.c| +00000010 2c c2 18 3c 3a 49 87 98 a3 b5 93 5b c6 a2 3f 1b |,..<:I.....[..?.| +00000020 04 66 be c4 fc 02 20 78 12 cf 92 fa c0 9c 22 db |.f.... x......".| +00000030 33 27 db bc c9 3c f6 4c 29 19 6a 33 00 69 69 94 |3'...<.L).j3.ii.| +00000040 c9 7a e7 f9 61 c4 ba |.z..a..|" +"2019-04-22 06:16:46.522 UTC [cauthdsl] func2 -> DEBU ba6 0xc000bf6270 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.522 UTC [cauthdsl] func1 -> DEBU ba7 0xc000bf6270 gate 1555913806518563200 evaluation succeeds" +"2019-04-22 06:16:46.523 UTC [policies] Evaluate -> DEBU ba8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.523 UTC [policies] Evaluate -> DEBU ba9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.523 UTC [policies] Evaluate -> DEBU baa Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:46.524 UTC [policies] Evaluate -> DEBU bab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:46.524 UTC [policies] Evaluate -> DEBU bac Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:16:46.524 UTC [policies] Evaluate -> DEBU bad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:16:46.525 UTC [common.deliver] deliverBlocks -> DEBU bae [channel: businesschannel] Received seekInfo (0xc000dd6c40) start: > stop: > from 192.168.224.6:57810" +"2019-04-22 06:16:46.525 UTC [fsblkstorage] Next -> DEBU baf Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2019-04-22 06:16:46.525 UTC [fsblkstorage] newBlockfileStream -> DEBU bb0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +"2019-04-22 06:16:46.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb1 Remaining bytes=[47432], Going to peek [8] bytes" +"2019-04-22 06:16:46.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb2 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +"2019-04-22 06:16:46.526 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb3 blockbytes [23684] read from file [0]" +"2019-04-22 06:16:46.527 UTC [common.deliver] deliverBlocks -> DEBU bb4 [channel: businesschannel] Delivering block [1] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:16:46.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb5 Remaining bytes=[23745], Going to peek [8] bytes" +"2019-04-22 06:16:46.530 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb6 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +"2019-04-22 06:16:46.530 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bb7 blockbytes [23742] read from file [0]" +"2019-04-22 06:16:46.531 UTC [common.deliver] deliverBlocks -> DEBU bb8 [channel: businesschannel] Delivering block [2] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:16:46.532 UTC [fsblkstorage] waitForBlock -> DEBU bb9 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-04-22 06:16:46.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bba Sending msg of 28 bytes to 2 on channel businesschannel took 160µs" +"2019-04-22 06:16:46.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bbd Sending msg of 28 bytes to 3 on channel businesschannel took 116.5µs" +"2019-04-22 06:16:46.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 331.4µs " +"2019-04-22 06:16:46.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 252.9µs " +"2019-04-22 06:16:46.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbc Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:46.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:46.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:46.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc1 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +"2019-04-22 06:16:46.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.7µs " +"2019-04-22 06:16:46.984 UTC [orderer.common.server] Deliver -> DEBU bc3 Starting new Deliver handler" +"2019-04-22 06:16:46.984 UTC [common.deliver] Handle -> DEBU bc4 Starting new deliver loop for 192.168.224.8:43620" +"2019-04-22 06:16:46.985 UTC [common.deliver] Handle -> DEBU bc5 Attempting to read seek info message from 192.168.224.8:43620" +"2019-04-22 06:16:46.988 UTC [policies] Evaluate -> DEBU bc6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:16:46.988 UTC [policies] Evaluate -> DEBU bc7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.989 UTC [policies] Evaluate -> DEBU bc8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:46.990 UTC [policies] Evaluate -> DEBU bc9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.991 UTC [policies] Evaluate -> DEBU bca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:46.992 UTC [msp] DeserializeIdentity -> DEBU bcb Obtaining identity" +"2019-04-22 06:16:46.993 UTC [msp.identity] newIdentity -> DEBU bcc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.994 UTC [cauthdsl] func1 -> DEBU bcd 0xc000c06e10 gate 1555913806994777600 evaluation starts" +"2019-04-22 06:16:46.995 UTC [cauthdsl] func2 -> DEBU bce 0xc000c06e10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.996 UTC [cauthdsl] func2 -> DEBU bcf 0xc000c06e10 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:46.996 UTC [cauthdsl] func2 -> DEBU bd0 0xc000c06e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:16:46.996 UTC [cauthdsl] func2 -> DEBU bd1 0xc000c06e10 principal evaluation fails" +"2019-04-22 06:16:46.997 UTC [cauthdsl] func1 -> DEBU bd2 0xc000c06e10 gate 1555913806994777600 evaluation fails" +"2019-04-22 06:16:46.998 UTC [policies] Evaluate -> DEBU bd3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.998 UTC [policies] Evaluate -> DEBU bd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.998 UTC [policies] Evaluate -> DEBU bd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:46.999 UTC [cauthdsl] func1 -> DEBU bd6 0xc000c07fe0 gate 1555913806999168600 evaluation starts" +"2019-04-22 06:16:46.999 UTC [cauthdsl] func2 -> DEBU bd7 0xc000c07fe0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.000 UTC [cauthdsl] func2 -> DEBU bd8 0xc000c07fe0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:47.000 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU bd9 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:16:47.000 UTC [msp] Validate -> DEBU bda MSP Org2MSP validating identity" +"2019-04-22 06:16:47.002 UTC [msp] getCertificationChain -> DEBU bdb MSP Org2MSP getting certification chain" +"2019-04-22 06:16:47.003 UTC [cauthdsl] func2 -> DEBU bdc 0xc000c07fe0 principal matched by identity 0" +"2019-04-22 06:16:47.003 UTC [msp.identity] Verify -> DEBU bdd Verify: digest = 00000000 af 5a b7 0c 05 3e dc 52 32 17 c5 ce ce f1 59 7f |.Z...>.R2.....Y.| +00000010 66 ce f9 49 f2 db ac 98 ac b0 19 02 b5 d4 ea 2c |f..I...........,|" +"2019-04-22 06:16:47.004 UTC [msp.identity] Verify -> DEBU bde Verify: sig = 00000000 30 45 02 21 00 af 56 2b 74 f2 e4 ce 5d 2b 83 c7 |0E.!..V+t...]+..| +00000010 40 f6 33 6f c2 f5 25 75 8d 97 0d 5d 91 92 7e bf |@.3o..%u...]..~.| +00000020 62 d2 37 18 6f 02 20 70 7d 92 3b 3e 04 df 9f df |b.7.o. p}.;>....| +00000030 3f 93 89 c1 34 da 73 ae 2b c7 d1 0a ad 7d ac fb |?...4.s.+....}..| +00000040 af b9 e7 2d 88 a7 ce |...-...|" +"2019-04-22 06:16:47.005 UTC [cauthdsl] func2 -> DEBU bdf 0xc000c07fe0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.005 UTC [cauthdsl] func1 -> DEBU be0 0xc000c07fe0 gate 1555913806999168600 evaluation succeeds" +"2019-04-22 06:16:47.006 UTC [policies] Evaluate -> DEBU be1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be3 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.007 UTC [policies] Evaluate -> DEBU be5 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:16:47.008 UTC [policies] Evaluate -> DEBU be6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:16:47.008 UTC [common.deliver] deliverBlocks -> DEBU be7 [channel: businesschannel] Received seekInfo (0xc000dd7b40) start: > stop: > from 192.168.224.8:43620" +"2019-04-22 06:16:47.009 UTC [fsblkstorage] Next -> DEBU be8 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2019-04-22 06:16:47.009 UTC [fsblkstorage] newBlockfileStream -> DEBU be9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +"2019-04-22 06:16:47.009 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bea Remaining bytes=[47432], Going to peek [8] bytes" +"2019-04-22 06:16:47.010 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU beb Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +"2019-04-22 06:16:47.011 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bec blockbytes [23684] read from file [0]" +"2019-04-22 06:16:47.012 UTC [common.deliver] deliverBlocks -> DEBU bed [channel: businesschannel] Delivering block [1] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:16:47.013 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bee Remaining bytes=[23745], Going to peek [8] bytes" +"2019-04-22 06:16:47.014 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bef Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +"2019-04-22 06:16:47.014 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU bf0 blockbytes [23742] read from file [0]" +"2019-04-22 06:16:47.015 UTC [common.deliver] deliverBlocks -> DEBU bf1 [channel: businesschannel] Delivering block [2] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:16:47.017 UTC [fsblkstorage] waitForBlock -> DEBU bf2 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-04-22 06:16:47.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf3 Sending msg of 28 bytes to 3 on channel businesschannel took 89.2µs" +"2019-04-22 06:16:47.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bf4 Sending msg of 28 bytes to 2 on channel businesschannel took 178.8µs" +"2019-04-22 06:16:47.184 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 233.3µs " +"2019-04-22 06:16:47.187 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 354.9µs " +"2019-04-22 06:16:47.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:47.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:47.330 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:47.330 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfa Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +"2019-04-22 06:16:47.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU bfb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.6µs " +"2019-04-22 06:16:47.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfc Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" +"2019-04-22 06:16:47.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bfd Sending msg of 28 bytes to 3 on channel businesschannel took 48.2µs" +"2019-04-22 06:16:47.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU bfe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 413.4µs " +"2019-04-22 06:16:47.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU bff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5993ms " +"2019-04-22 06:16:47.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU c00 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:47.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU c01 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:47.830 UTC [orderer.common.cluster.step] handleMessage -> DEBU c02 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:47.831 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c03 Sending msg of 28 bytes to 3 on channel testchainid took 38.6µs" +"2019-04-22 06:16:47.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU c04 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.8µs " +"2019-04-22 06:16:48.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c05 Sending msg of 28 bytes to 2 on channel businesschannel took 122.8µs" +"2019-04-22 06:16:48.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c06 Sending msg of 28 bytes to 3 on channel businesschannel took 110.4µs" +"2019-04-22 06:16:48.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.4µs " +"2019-04-22 06:16:48.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.7µs " +"2019-04-22 06:16:48.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU c09 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:48.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:48.336 UTC [orderer.common.cluster.step] handleMessage -> DEBU c0b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:48.356 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 719.3µs " +"2019-04-22 06:16:48.355 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0d Sending msg of 28 bytes to 3 on channel testchainid took 126µs" +"2019-04-22 06:16:48.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c0e Sending msg of 28 bytes to 2 on channel businesschannel took 336.6µs" +"2019-04-22 06:16:48.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU c10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 279.7µs " +"2019-04-22 06:16:48.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c11 Sending msg of 28 bytes to 3 on channel businesschannel took 2.2231ms" +"2019-04-22 06:16:48.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU c0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 301.8µs " +"2019-04-22 06:16:48.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU c12 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:48.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU c13 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:48.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU c14 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:48.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c15 Sending msg of 28 bytes to 3 on channel testchainid took 33.1µs" +"2019-04-22 06:16:48.830 UTC [orderer.common.cluster.step] sendMessage -> DEBU c16 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.2µs " +"2019-04-22 06:16:49.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c17 Sending msg of 28 bytes to 2 on channel businesschannel took 116.3µs" +"2019-04-22 06:16:49.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c18 Sending msg of 28 bytes to 3 on channel businesschannel took 87.5µs" +"2019-04-22 06:16:49.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU c19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1578ms " +"2019-04-22 06:16:49.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 316µs " +"2019-04-22 06:16:49.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:49.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:49.332 UTC [orderer.common.cluster.step] handleMessage -> DEBU c1d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:49.333 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c1e Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +"2019-04-22 06:16:49.333 UTC [orderer.common.cluster.step] sendMessage -> DEBU c1f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.2µs " +"2019-04-22 06:16:49.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c20 Sending msg of 28 bytes to 2 on channel businesschannel took 991.3µs" +"2019-04-22 06:16:49.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c21 Sending msg of 28 bytes to 3 on channel businesschannel took 1.3356ms" +"2019-04-22 06:16:49.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU c22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 416.2µs " +"2019-04-22 06:16:49.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU c23 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:49.683 UTC [orderer.common.cluster.step] sendMessage -> DEBU c24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.5855ms " +"2019-04-22 06:16:49.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU c25 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:49.832 UTC [orderer.common.cluster.step] handleMessage -> DEBU c26 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:49.832 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c27 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +"2019-04-22 06:16:49.833 UTC [orderer.common.cluster.step] sendMessage -> DEBU c28 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.8µs " +"2019-04-22 06:16:50.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c29 Sending msg of 28 bytes to 3 on channel businesschannel took 101.3µs" +"2019-04-22 06:16:50.179 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c2a Sending msg of 28 bytes to 2 on channel businesschannel took 58.4µs" +"2019-04-22 06:16:50.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 408.5µs " +"2019-04-22 06:16:50.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:50.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 371.3µs " +"2019-04-22 06:16:50.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:50.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU c2f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:50.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c30 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2019-04-22 06:16:50.329 UTC [orderer.common.cluster.step] sendMessage -> DEBU c31 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.4µs " +"2019-04-22 06:16:50.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c32 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2019-04-22 06:16:50.673 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c33 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +"2019-04-22 06:16:50.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU c34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +"2019-04-22 06:16:50.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU c35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.3µs " +"2019-04-22 06:16:50.675 UTC [orderer.common.cluster.step] handleMessage -> DEBU c36 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:50.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU c37 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:50.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU c38 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:50.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c39 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2019-04-22 06:16:50.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1122ms " +"2019-04-22 06:16:51.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3b Sending msg of 28 bytes to 3 on channel businesschannel took 500.8µs" +"2019-04-22 06:16:51.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c3c Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2019-04-22 06:16:51.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.6µs " +"2019-04-22 06:16:51.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU c3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.6µs " +"2019-04-22 06:16:51.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c3f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:51.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU c40 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:51.328 UTC [orderer.common.cluster.step] handleMessage -> DEBU c41 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:51.329 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c42 Sending msg of 28 bytes to 3 on channel testchainid took 73.1µs" +"2019-04-22 06:16:51.330 UTC [orderer.common.cluster.step] sendMessage -> DEBU c43 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 587.5µs " +"2019-04-22 06:16:51.675 UTC [orderer.common.cluster.step] sendMessage -> DEBU c44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.8µs " +"2019-04-22 06:16:51.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU c45 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:51.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c46 Sending msg of 28 bytes to 2 on channel businesschannel took 76.5µs" +"2019-04-22 06:16:51.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c47 Sending msg of 28 bytes to 3 on channel businesschannel took 188.8µs" +"2019-04-22 06:16:51.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU c48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.7µs " +"2019-04-22 06:16:51.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU c49 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:51.828 UTC [orderer.common.cluster.step] handleMessage -> DEBU c4a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:51.829 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4b Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +"2019-04-22 06:16:51.829 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.5µs " +"2019-04-22 06:16:52.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4d Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +"2019-04-22 06:16:52.173 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c4e Sending msg of 28 bytes to 3 on channel businesschannel took 23.9µs" +"2019-04-22 06:16:52.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.3µs " +"2019-04-22 06:16:52.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.2µs " +"2019-04-22 06:16:52.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c51 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:52.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c52 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:52.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU c53 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:52.331 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c54 Sending msg of 28 bytes to 3 on channel testchainid took 43.4µs" +"2019-04-22 06:16:52.331 UTC [orderer.common.cluster.step] sendMessage -> DEBU c55 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.4µs " +"2019-04-22 06:16:52.488 UTC [orderer.common.server] Broadcast -> DEBU c56 Starting new Broadcast handler" +"2019-04-22 06:16:52.488 UTC [orderer.common.broadcast] Handle -> DEBU c57 Starting new broadcast loop for 192.168.224.9:34594" +"2019-04-22 06:16:52.550 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c58 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34594 with txid 'e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a' of type ENDORSER_TRANSACTION" +"2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.551 UTC [policies] Evaluate -> DEBU c5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:52.551 UTC [msp] DeserializeIdentity -> DEBU c5e Obtaining identity" +"2019-04-22 06:16:52.551 UTC [msp.identity] newIdentity -> DEBU c5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:52.552 UTC [cauthdsl] func1 -> DEBU c60 0xc0003e69e0 gate 1555913812552173100 evaluation starts" +"2019-04-22 06:16:52.552 UTC [cauthdsl] func2 -> DEBU c61 0xc0003e69e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.552 UTC [cauthdsl] func2 -> DEBU c62 0xc0003e69e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:52.552 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU c63 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:52.552 UTC [msp] Validate -> DEBU c64 MSP Org1MSP validating identity" +"2019-04-22 06:16:52.552 UTC [msp] getCertificationChain -> DEBU c65 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:52.552 UTC [cauthdsl] func2 -> DEBU c66 0xc0003e69e0 principal matched by identity 0" +"2019-04-22 06:16:52.552 UTC [msp.identity] Verify -> DEBU c67 Verify: digest = 00000000 2b 6f 41 49 fb 44 0e 83 27 95 01 46 f8 23 4a 80 |+oAI.D..'..F.#J.| +00000010 a6 4d ee fe e2 53 6d 4f e8 9a 60 16 70 60 e8 25 |.M...SmO..`.p`.%|" +"2019-04-22 06:16:52.553 UTC [msp.identity] Verify -> DEBU c68 Verify: sig = 00000000 30 44 02 20 42 d4 d3 c1 5d bf df 8a 4b 70 63 3e |0D. B...]...Kpc>| +00000010 a3 94 4b db 89 0c 23 b0 a7 72 1b e5 13 ed cc 63 |..K...#..r.....c| +00000020 84 2c b6 46 02 20 25 d9 f3 e5 c2 bb 10 7a ef 12 |.,.F. %......z..| +00000030 99 bc 91 e0 9c bf d6 30 69 bd e9 0f 9c d1 68 c5 |.......0i.....h.| +00000040 49 3c d5 68 e7 b0 |I<.h..|" +"2019-04-22 06:16:52.553 UTC [cauthdsl] func2 -> DEBU c69 0xc0003e69e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.553 UTC [cauthdsl] func1 -> DEBU c6a 0xc0003e69e0 gate 1555913812552173100 evaluation succeeds" +"2019-04-22 06:16:52.553 UTC [policies] Evaluate -> DEBU c6b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6d Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c6f Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:52.554 UTC [policies] Evaluate -> DEBU c70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:52.554 UTC [orderer.common.blockcutter] Ordered -> DEBU c71 Enqueuing message into batch" +"2019-04-22 06:16:52.554 UTC [orderer.common.broadcast] ProcessMessage -> DEBU c72 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34594" +"2019-04-22 06:16:52.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c73 Sending msg of 28 bytes to 3 on channel businesschannel took 53.6µs" +"2019-04-22 06:16:52.674 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c74 Sending msg of 28 bytes to 2 on channel businesschannel took 39.6µs" +"2019-04-22 06:16:52.674 UTC [orderer.common.cluster.step] sendMessage -> DEBU c75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 451.8µs " +"2019-04-22 06:16:52.676 UTC [orderer.common.cluster.step] handleMessage -> DEBU c76 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:52.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU c77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.4µs " +"2019-04-22 06:16:52.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU c78 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:52.829 UTC [orderer.common.cluster.step] handleMessage -> DEBU c79 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:52.830 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7a Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +"2019-04-22 06:16:52.831 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.9µs " +"2019-04-22 06:16:53.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7c Sending msg of 28 bytes to 2 on channel businesschannel took 37.1µs" +"2019-04-22 06:16:53.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7d Sending msg of 28 bytes to 3 on channel businesschannel took 36.7µs" +"2019-04-22 06:16:53.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.9µs " +"2019-04-22 06:16:53.175 UTC [orderer.common.cluster.step] sendMessage -> DEBU c7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 746.1µs " +"2019-04-22 06:16:53.176 UTC [orderer.common.cluster.step] handleMessage -> DEBU c80 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:53.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU c81 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:53.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU c82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:53.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c83 Sending msg of 28 bytes to 3 on channel testchainid took 28.3µs" +"2019-04-22 06:16:53.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU c84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.3µs " +"2019-04-22 06:16:53.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c85 Sending msg of 28 bytes to 2 on channel businesschannel took 36.5µs" +"2019-04-22 06:16:53.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c86 Sending msg of 28 bytes to 3 on channel businesschannel took 30.1µs" +"2019-04-22 06:16:53.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU c87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.1µs " +"2019-04-22 06:16:53.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU c88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.7µs " +"2019-04-22 06:16:53.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU c89 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:53.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:53.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:53.796 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8c Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +"2019-04-22 06:16:53.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.7µs " +"2019-04-22 06:16:54.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8e Sending msg of 28 bytes to 2 on channel businesschannel took 50.1µs" +"2019-04-22 06:16:54.144 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 3 on channel businesschannel took 41.6µs" +"2019-04-22 06:16:54.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4729ms " +"2019-04-22 06:16:54.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU c91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.108ms " +"2019-04-22 06:16:54.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU c92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU c93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU c94 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:54.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c95 Sending msg of 28 bytes to 3 on channel testchainid took 70.8µs" +"2019-04-22 06:16:54.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU c96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.9µs " +"2019-04-22 06:16:54.523 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU c97 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-04-22 06:16:54.523 UTC [orderer.consensus.etcdraft] propose -> INFO c98 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:16:54.523 UTC [orderer.consensus.etcdraft] 2 -> DEBU c99 Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:16:54.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9a Sending msg of 3829 bytes to 2 on channel businesschannel took 32.9µs" +"2019-04-22 06:16:54.527 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c9b Sending msg of 3829 bytes to 3 on channel businesschannel took 24µs" +"2019-04-22 06:16:54.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9c Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer2.example.com(orderer2.example.com:7050) took 114.6µs " +"2019-04-22 06:16:54.528 UTC [orderer.common.cluster.step] sendMessage -> DEBU c9d Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer1.example.com(orderer1.example.com:7050) took 79.6µs " +"2019-04-22 06:16:54.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.533 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca0 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +"2019-04-22 06:16:54.533 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ca1 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +"2019-04-22 06:16:54.533 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.6µs " +"2019-04-22 06:16:54.533 UTC [orderer.common.cluster.step] handleMessage -> DEBU c9f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.533 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ca3 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2019-04-22 06:16:54.533 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ca4 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-04-22 06:16:54.533 UTC [msp.identity] Sign -> DEBU ca5 Sign: plaintext: 0A020802120B0A090A03010203100418...B6E429FD114B22B1C8CAD98BE5FB8B0D " +"2019-04-22 06:16:54.533 UTC [msp.identity] Sign -> DEBU ca6 Sign: digest: 6CD11B2FD01980D1422251EBB6B9BC7659C73CCEB30E8B0B8F907167347704DA " +"2019-04-22 06:16:54.534 UTC [orderer.common.cluster.step] sendMessage -> DEBU ca7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +"2019-04-22 06:16:54.536 UTC [orderer.common.cluster.step] handleMessage -> DEBU ca8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.541 UTC [fsblkstorage] indexBlock -> DEBU ca9 Indexing block [blockNum=3, blockHash=[]byte{0x74, 0x44, 0x89, 0x23, 0x4f, 0x72, 0x94, 0x3a, 0x8a, 0x3a, 0x90, 0x5b, 0x48, 0x2, 0x23, 0x87, 0x42, 0x1b, 0x92, 0x93, 0x84, 0xb, 0xa0, 0x22, 0x97, 0x21, 0x7, 0x5f, 0x9d, 0x35, 0xac, 0x69} txOffsets= +txId=e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a locPointer=offset=70, bytesLength=3703 +]" +"2019-04-22 06:16:54.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU caa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.545 UTC [fsblkstorage] updateCheckpoint -> DEBU cab Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76082], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-04-22 06:16:54.546 UTC [orderer.commmon.multichannel] commitBlock -> DEBU cac [channel: businesschannel] Wrote block [3]" +"2019-04-22 06:16:54.546 UTC [fsblkstorage] waitForBlock -> DEBU cad Came out of wait. maxAvailaBlockNumber=[3]" +"2019-04-22 06:16:54.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cae Remaining bytes=[4710], Going to peek [8] bytes" +"2019-04-22 06:16:54.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU caf Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +"2019-04-22 06:16:54.546 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb0 blockbytes [4708] read from file [0]" +"2019-04-22 06:16:54.547 UTC [common.deliver] deliverBlocks -> DEBU cb1 [channel: businesschannel] Delivering block [3] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:16:54.547 UTC [fsblkstorage] waitForBlock -> DEBU cb2 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-04-22 06:16:54.547 UTC [fsblkstorage] waitForBlock -> DEBU cb3 Came out of wait. maxAvailaBlockNumber=[3]" +"2019-04-22 06:16:54.547 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb4 Remaining bytes=[4710], Going to peek [8] bytes" +"2019-04-22 06:16:54.547 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb5 Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +"2019-04-22 06:16:54.547 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cb6 blockbytes [4708] read from file [0]" +"2019-04-22 06:16:54.547 UTC [common.deliver] deliverBlocks -> DEBU cb7 [channel: businesschannel] Delivering block [3] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:16:54.547 UTC [fsblkstorage] waitForBlock -> DEBU cb8 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-04-22 06:16:54.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cb9 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +"2019-04-22 06:16:54.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cba Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +"2019-04-22 06:16:54.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.3µs " +"2019-04-22 06:16:54.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU cbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.9µs " +"2019-04-22 06:16:54.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU cbe Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:54.680 UTC [orderer.common.broadcast] Handle -> WARN cbf Error reading from 192.168.224.9:34594: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:54.681 UTC [orderer.common.server] func1 -> DEBU cc0 Closing Broadcast stream" +"2019-04-22 06:16:54.682 UTC [comm.grpc.server] 1 -> INFO cc1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34594 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.2262394s +"2019-04-22 06:16:54.683 UTC [grpc] infof -> DEBU cc2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:54.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU cc3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:54.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cc4 Sending msg of 28 bytes to 3 on channel testchainid took 47.4µs" +"2019-04-22 06:16:54.801 UTC [orderer.common.cluster.step] sendMessage -> DEBU cc5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.7µs " +"2019-04-22 06:16:55.085 UTC [orderer.common.server] Broadcast -> DEBU cc6 Starting new Broadcast handler" +"2019-04-22 06:16:55.086 UTC [orderer.common.broadcast] Handle -> DEBU cc7 Starting new broadcast loop for 192.168.224.9:34604" +"2019-04-22 06:16:55.102 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cc8 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34604 with txid '5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91' of type ENDORSER_TRANSACTION" +"2019-04-22 06:16:55.103 UTC [policies] Evaluate -> DEBU cc9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:55.104 UTC [policies] Evaluate -> DEBU cca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:55.104 UTC [policies] Evaluate -> DEBU ccb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:55.105 UTC [policies] Evaluate -> DEBU ccc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:55.105 UTC [policies] Evaluate -> DEBU ccd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:55.106 UTC [msp] DeserializeIdentity -> DEBU cce Obtaining identity" +"2019-04-22 06:16:55.106 UTC [msp.identity] newIdentity -> DEBU ccf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:55.107 UTC [cauthdsl] func1 -> DEBU cd0 0xc00026bd10 gate 1555913815107708500 evaluation starts" +"2019-04-22 06:16:55.108 UTC [cauthdsl] func2 -> DEBU cd1 0xc00026bd10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:55.108 UTC [cauthdsl] func2 -> DEBU cd2 0xc00026bd10 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:55.109 UTC [cauthdsl] func2 -> DEBU cd3 0xc00026bd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:16:55.109 UTC [cauthdsl] func2 -> DEBU cd4 0xc00026bd10 principal evaluation fails" +"2019-04-22 06:16:55.110 UTC [cauthdsl] func1 -> DEBU cd5 0xc00026bd10 gate 1555913815107708500 evaluation fails" +"2019-04-22 06:16:55.110 UTC [policies] Evaluate -> DEBU cd6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:55.111 UTC [policies] Evaluate -> DEBU cd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:55.112 UTC [policies] Evaluate -> DEBU cd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:16:55.112 UTC [cauthdsl] func1 -> DEBU cd9 0xc0003d1000 gate 1555913815112528000 evaluation starts" +"2019-04-22 06:16:55.113 UTC [cauthdsl] func2 -> DEBU cda 0xc0003d1000 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:55.113 UTC [cauthdsl] func2 -> DEBU cdb 0xc0003d1000 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:55.114 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cdc Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:16:55.114 UTC [msp] Validate -> DEBU cdd MSP Org2MSP validating identity" +"2019-04-22 06:16:55.115 UTC [msp] getCertificationChain -> DEBU cde MSP Org2MSP getting certification chain" +"2019-04-22 06:16:55.115 UTC [cauthdsl] func2 -> DEBU cdf 0xc0003d1000 principal matched by identity 0" +"2019-04-22 06:16:55.116 UTC [msp.identity] Verify -> DEBU ce0 Verify: digest = 00000000 9a e4 d0 0f d4 55 79 7d d5 a1 3f 48 f4 6a cd 96 |.....Uy}..?H.j..| +00000010 d4 d3 0b 7e 9e 3a d1 94 33 3d 05 87 b1 87 f6 ce |...~.:..3=......|" +"2019-04-22 06:16:55.116 UTC [msp.identity] Verify -> DEBU ce1 Verify: sig = 00000000 30 44 02 20 26 57 c8 26 3a a7 0a af 07 00 5a 93 |0D. &W.&:.....Z.| +00000010 83 76 3e 2b db a9 a0 07 8b ab e8 66 e5 cf 97 a4 |.v>+.......f....| +00000020 be 1f 68 54 02 20 0e c2 b7 75 b5 33 90 08 33 a7 |..hT. ...u.3..3.| +00000030 e7 a4 cc b5 60 44 4a 87 4b ae b8 87 82 29 c8 94 |....`DJ.K....)..| +00000040 6b 45 2b 9b c0 82 |kE+...|" +"2019-04-22 06:16:55.117 UTC [cauthdsl] func2 -> DEBU ce2 0xc0003d1000 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:55.117 UTC [cauthdsl] func1 -> DEBU ce3 0xc0003d1000 gate 1555913815112528000 evaluation succeeds" +"2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce6 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce8 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:55.118 UTC [policies] Evaluate -> DEBU ce9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:55.119 UTC [orderer.common.broadcast] ProcessMessage -> DEBU cea [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34604" +"2019-04-22 06:16:55.119 UTC [orderer.common.blockcutter] Ordered -> DEBU ceb Enqueuing message into batch" +"2019-04-22 06:16:55.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 2 on channel businesschannel took 58.3µs" +"2019-04-22 06:16:55.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 3 on channel businesschannel took 47µs" +"2019-04-22 06:16:55.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU cee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.2µs " +"2019-04-22 06:16:55.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU cef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.3µs " +"2019-04-22 06:16:55.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:55.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:55.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:55.300 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf3 Sending msg of 28 bytes to 3 on channel testchainid took 49.1µs" +"2019-04-22 06:16:55.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.1µs " +"2019-04-22 06:16:55.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf5 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2019-04-22 06:16:55.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +"2019-04-22 06:16:55.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129µs " +"2019-04-22 06:16:55.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 784.3µs " +"2019-04-22 06:16:55.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:55.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:55.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:55.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfc Sending msg of 28 bytes to 3 on channel testchainid took 55.3µs" +"2019-04-22 06:16:55.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.5µs " +"2019-04-22 06:16:56.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfe Sending msg of 28 bytes to 2 on channel businesschannel took 34.1µs" +"2019-04-22 06:16:56.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cff Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-04-22 06:16:56.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU d00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 207.7µs " +"2019-04-22 06:16:56.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU d01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86.5µs " +"2019-04-22 06:16:56.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU d02 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:56.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU d03 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:56.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU d04 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:56.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d05 Sending msg of 28 bytes to 3 on channel testchainid took 681.8µs" +"2019-04-22 06:16:56.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU d06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.3µs " +"2019-04-22 06:16:56.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d07 Sending msg of 28 bytes to 2 on channel businesschannel took 288.4µs" +"2019-04-22 06:16:56.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d08 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2019-04-22 06:16:56.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU d09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 619.3µs " +"2019-04-22 06:16:56.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 337.1µs " +"2019-04-22 06:16:56.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:56.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:56.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:56.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0e Sending msg of 28 bytes to 3 on channel testchainid took 43.3µs" +"2019-04-22 06:16:56.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.4µs " +"2019-04-22 06:16:57.121 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d10 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-04-22 06:16:57.121 UTC [orderer.consensus.etcdraft] propose -> INFO d11 Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:16:57.122 UTC [orderer.consensus.etcdraft] 2 -> DEBU d12 Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:16:57.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d13 Sending msg of 3829 bytes to 2 on channel businesschannel took 33.3µs" +"2019-04-22 06:16:57.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d14 Sending msg of 3829 bytes to 3 on channel businesschannel took 35.7µs" +"2019-04-22 06:16:57.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer2.example.com(orderer2.example.com:7050) took 114.7µs " +"2019-04-22 06:16:57.127 UTC [orderer.common.cluster.step] sendMessage -> DEBU d16 Send of ConsensusRequest for channel businesschannel with payload of size 3829 to orderer1.example.com(orderer1.example.com:7050) took 209.6µs " +"2019-04-22 06:16:57.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d18 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +"2019-04-22 06:16:57.135 UTC [orderer.common.cluster.step] sendMessage -> DEBU d19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 161.3µs " +"2019-04-22 06:16:57.135 UTC [orderer.consensus.etcdraft] writeBlock -> INFO d1a Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2019-04-22 06:16:57.135 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU d1b [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-04-22 06:16:57.135 UTC [msp.identity] Sign -> DEBU d1c Sign: plaintext: 0A020802120B0A090A03010203100418...D04CF396B45DFFD4EDB78F8FD3011014 " +"2019-04-22 06:16:57.135 UTC [msp.identity] Sign -> DEBU d1d Sign: digest: 7A39D260F2DEC302B60456877223CD5D32ED4B0F64548E9E15B3783D9254EBA5 " +"2019-04-22 06:16:57.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.138 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1f Sending msg of 28 bytes to 3 on channel businesschannel took 25.2µs" +"2019-04-22 06:16:57.138 UTC [orderer.common.cluster.step] sendMessage -> DEBU d20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.3µs " +"2019-04-22 06:16:57.139 UTC [fsblkstorage] indexBlock -> DEBU d21 Indexing block [blockNum=4, blockHash=[]byte{0xf0, 0xcc, 0x1a, 0x99, 0xb6, 0xf2, 0x1c, 0x57, 0xc4, 0x65, 0xdc, 0xe5, 0xfd, 0x17, 0x4c, 0x10, 0xd, 0xda, 0x45, 0x9e, 0x46, 0x7c, 0x52, 0x8f, 0x16, 0x48, 0xbc, 0xa8, 0x52, 0x64, 0x75, 0x8e} txOffsets= +txId=5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91 locPointer=offset=70, bytesLength=3703 +]" +"2019-04-22 06:16:57.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d22 Sending msg of 28 bytes to 2 on channel businesschannel took 41.3µs" +"2019-04-22 06:16:57.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 3 on channel businesschannel took 34.1µs" +"2019-04-22 06:16:57.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU d24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.6µs " +"2019-04-22 06:16:57.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU d25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 230.9µs " +"2019-04-22 06:16:57.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU d26 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.147 UTC [fsblkstorage] updateCheckpoint -> DEBU d27 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80791], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-04-22 06:16:57.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU d28 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.149 UTC [fsblkstorage] waitForBlock -> DEBU d29 Came out of wait. maxAvailaBlockNumber=[4]" +"2019-04-22 06:16:57.149 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d2a Remaining bytes=[4709], Going to peek [8] bytes" +"2019-04-22 06:16:57.149 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d2b Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +"2019-04-22 06:16:57.149 UTC [orderer.commmon.multichannel] commitBlock -> DEBU d2c [channel: businesschannel] Wrote block [4]" +"2019-04-22 06:16:57.149 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d2d blockbytes [4707] read from file [0]" +"2019-04-22 06:16:57.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU d30 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.151 UTC [fsblkstorage] waitForBlock -> DEBU d2e Came out of wait. maxAvailaBlockNumber=[4]" +"2019-04-22 06:16:57.152 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d31 Remaining bytes=[4709], Going to peek [8] bytes" +"2019-04-22 06:16:57.152 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d32 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +"2019-04-22 06:16:57.153 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU d33 blockbytes [4707] read from file [0]" +"2019-04-22 06:16:57.153 UTC [common.deliver] deliverBlocks -> DEBU d34 [channel: businesschannel] Delivering block [4] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:16:57.153 UTC [common.deliver] deliverBlocks -> DEBU d35 [channel: businesschannel] Delivering block [4] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:16:57.153 UTC [fsblkstorage] waitForBlock -> DEBU d36 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-04-22 06:16:57.155 UTC [fsblkstorage] waitForBlock -> DEBU d37 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-04-22 06:16:57.260 UTC [grpc] infof -> DEBU d38 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:57.260 UTC [orderer.common.broadcast] Handle -> WARN d39 Error reading from 192.168.224.9:34604: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:57.260 UTC [orderer.common.server] func1 -> DEBU d3a Closing Broadcast stream" +"2019-04-22 06:16:57.260 UTC [comm.grpc.server] 1 -> INFO d3b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34604 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1750147s +"2019-04-22 06:16:57.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:57.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3d Sending msg of 28 bytes to 3 on channel testchainid took 36.2µs" +"2019-04-22 06:16:57.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.7µs " +"2019-04-22 06:16:57.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel businesschannel took 132.3µs" +"2019-04-22 06:16:57.644 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d40 Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2019-04-22 06:16:57.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU d41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 107.7µs " +"2019-04-22 06:16:57.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU d42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 442.1µs " +"2019-04-22 06:16:57.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU d43 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU d44 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:57.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU d45 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:57.796 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel testchainid took 24µs" +"2019-04-22 06:16:57.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.6µs " +"2019-04-22 06:16:58.084 UTC [orderer.common.server] replicateDisabledChains -> DEBU d48 No inactive chains to try to replicate" +"2019-04-22 06:16:58.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d49 Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +"2019-04-22 06:16:58.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4a Sending msg of 28 bytes to 3 on channel businesschannel took 36.4µs" +"2019-04-22 06:16:58.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.6µs " +"2019-04-22 06:16:58.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 158.1µs " +"2019-04-22 06:16:58.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:58.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:58.299 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:58.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d50 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +"2019-04-22 06:16:58.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230.2µs " +"2019-04-22 06:16:58.608 UTC [orderer.common.server] Broadcast -> DEBU d52 Starting new Broadcast handler" +"2019-04-22 06:16:58.609 UTC [orderer.common.broadcast] Handle -> DEBU d53 Starting new broadcast loop for 192.168.224.9:34634" +"2019-04-22 06:16:58.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d54 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +"2019-04-22 06:16:58.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d55 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2019-04-22 06:16:58.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.4µs " +"2019-04-22 06:16:58.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU d57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.8µs " +"2019-04-22 06:16:58.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU d58 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:58.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU d59 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:58.647 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d5a [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34634 with txid '7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869' of type ENDORSER_TRANSACTION" +"2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:58.648 UTC [policies] Evaluate -> DEBU d5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:58.649 UTC [cauthdsl] func1 -> DEBU d60 0xc000ec8bf0 gate 1555913818649077200 evaluation starts" +"2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d61 0xc000ec8bf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d62 0xc000ec8bf0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d63 0xc000ec8bf0 principal matched by identity 0" +"2019-04-22 06:16:58.649 UTC [msp.identity] Verify -> DEBU d64 Verify: digest = 00000000 40 4c 26 4c fb 34 d1 c3 d2 5f f2 5e 28 85 0a 26 |@L&L.4..._.^(..&| +00000010 54 e4 8b e2 03 db 5d dc ca 5f 9a 06 d2 68 86 b9 |T.....].._...h..|" +"2019-04-22 06:16:58.649 UTC [msp.identity] Verify -> DEBU d65 Verify: sig = 00000000 30 44 02 20 2b 6f d0 55 6c 20 6d a0 ad fd fc 45 |0D. +o.Ul m....E| +00000010 1a 21 7f 2e 86 57 96 c0 73 80 19 3d 4f 01 9f ac |.!...W..s..=O...| +00000020 02 40 0e 2d 02 20 0c 0a a3 dc 20 5d 41 73 23 0c |.@.-. .... ]As#.| +00000030 6a 4f b3 00 27 41 21 da 7e f7 1c cd c0 ca d9 2d |jO..'A!.~......-| +00000040 c8 3d 55 08 7b 14 |.=U.{.|" +"2019-04-22 06:16:58.649 UTC [cauthdsl] func2 -> DEBU d66 0xc000ec8bf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:58.649 UTC [cauthdsl] func1 -> DEBU d67 0xc000ec8bf0 gate 1555913818649077200 evaluation succeeds" +"2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d68 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6a Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6c Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:16:58.649 UTC [policies] Evaluate -> DEBU d6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:16:58.650 UTC [orderer.common.blockcutter] Ordered -> DEBU d6e Enqueuing message into batch" +"2019-04-22 06:16:58.650 UTC [orderer.common.broadcast] ProcessMessage -> DEBU d6f [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34634" +"2019-04-22 06:16:58.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU d70 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:58.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d71 Sending msg of 28 bytes to 3 on channel testchainid took 134.7µs" +"2019-04-22 06:16:58.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU d72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.4µs " +"2019-04-22 06:16:59.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 2 on channel businesschannel took 67.2µs" +"2019-04-22 06:16:59.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel businesschannel took 185µs" +"2019-04-22 06:16:59.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.6µs " +"2019-04-22 06:16:59.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU d76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.3µs " +"2019-04-22 06:16:59.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU d77 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:59.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU d78 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:59.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU d79 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:59.299 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel testchainid took 32.5µs" +"2019-04-22 06:16:59.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.6µs " +"2019-04-22 06:16:59.646 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7c Sending msg of 28 bytes to 2 on channel businesschannel took 81µs" +"2019-04-22 06:16:59.647 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +"2019-04-22 06:16:59.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.8µs " +"2019-04-22 06:16:59.647 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 332.2µs " +"2019-04-22 06:16:59.650 UTC [orderer.common.cluster.step] handleMessage -> DEBU d80 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:59.651 UTC [orderer.common.cluster.step] handleMessage -> DEBU d81 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:16:59.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU d82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:16:59.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel testchainid took 22.6µs" +"2019-04-22 06:16:59.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.9µs " +"2019-04-22 06:17:00.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 2 on channel businesschannel took 39.4µs" +"2019-04-22 06:17:00.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel businesschannel took 40.6µs" +"2019-04-22 06:17:00.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.3µs " +"2019-04-22 06:17:00.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU d88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 212.2µs " +"2019-04-22 06:17:00.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:00.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +"2019-04-22 06:17:00.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +"2019-04-22 06:17:00.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8e Sending msg of 28 bytes to 2 on channel businesschannel took 49.9µs" +"2019-04-22 06:17:00.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +"2019-04-22 06:17:00.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 510.1µs " +"2019-04-22 06:17:00.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU d91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.3323ms " +"2019-04-22 06:17:00.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU d92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU d93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.650 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU d94 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-04-22 06:17:00.651 UTC [orderer.consensus.etcdraft] propose -> INFO d95 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:17:00.652 UTC [orderer.consensus.etcdraft] 2 -> DEBU d96 Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:17:00.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:00.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel testchainid took 152.9µs" +"2019-04-22 06:17:00.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 859.7µs " +"2019-04-22 06:17:00.920 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9a Send of ConsensusRequest for channel businesschannel with payload of size 4833 to orderer1.example.com(orderer1.example.com:7050) took 170.8µs " +"2019-04-22 06:17:00.920 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 4833 bytes to 2 on channel businesschannel took 165.9µs" +"2019-04-22 06:17:00.922 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9c Sending msg of 4833 bytes to 3 on channel businesschannel took 47.9µs" +"2019-04-22 06:17:00.923 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9d Send of ConsensusRequest for channel businesschannel with payload of size 4833 to orderer2.example.com(orderer2.example.com:7050) took 115µs " +"2019-04-22 06:17:00.928 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9f Sending msg of 28 bytes to 3 on channel businesschannel took 27µs" +"2019-04-22 06:17:00.929 UTC [orderer.consensus.etcdraft] writeBlock -> INFO da0 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2019-04-22 06:17:00.929 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-04-22 06:17:00.930 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.4µs " +"2019-04-22 06:17:00.930 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU da3 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-04-22 06:17:00.930 UTC [orderer.common.cluster.step] sendMessage -> DEBU da4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.6µs " +"2019-04-22 06:17:00.931 UTC [msp.identity] Sign -> DEBU da5 Sign: plaintext: 0A020802120B0A090A03010203100418...30564CF1B61162A1884B7944D76AC61E " +"2019-04-22 06:17:00.931 UTC [msp.identity] Sign -> DEBU da6 Sign: digest: 84FDAB8DF26B37C0FD651B79A07F4A24C04A2763663E585AB59A6D1F3AEBD873 " +"2019-04-22 06:17:00.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.934 UTC [orderer.common.cluster.step] handleMessage -> DEBU da8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.935 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:00.941 UTC [fsblkstorage] indexBlock -> DEBU daa Indexing block [blockNum=5, blockHash=[]byte{0xf, 0x5a, 0xbc, 0x96, 0x5a, 0x90, 0x27, 0x82, 0xd2, 0x66, 0x93, 0xf6, 0xa4, 0x7b, 0xd3, 0x45, 0x68, 0xc2, 0x57, 0xa8, 0xb7, 0xa4, 0x2b, 0xc8, 0x69, 0x86, 0x9a, 0xd3, 0xd0, 0x37, 0x56, 0x39} txOffsets= +txId=7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869 locPointer=offset=70, bytesLength=4707 +]" +"2019-04-22 06:17:00.944 UTC [fsblkstorage] updateCheckpoint -> DEBU dab Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86505], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-04-22 06:17:00.944 UTC [fsblkstorage] waitForBlock -> DEBU dac Came out of wait. maxAvailaBlockNumber=[5]" +"2019-04-22 06:17:00.945 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU dae Remaining bytes=[5714], Going to peek [8] bytes" +"2019-04-22 06:17:00.945 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU daf Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +"2019-04-22 06:17:00.945 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db0 blockbytes [5712] read from file [0]" +"2019-04-22 06:17:00.944 UTC [orderer.commmon.multichannel] commitBlock -> DEBU dad [channel: businesschannel] Wrote block [5]" +"2019-04-22 06:17:00.946 UTC [common.deliver] deliverBlocks -> DEBU db1 [channel: businesschannel] Delivering block [5] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:17:00.946 UTC [fsblkstorage] waitForBlock -> DEBU db2 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-04-22 06:17:00.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db4 Remaining bytes=[5714], Going to peek [8] bytes" +"2019-04-22 06:17:00.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db5 Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +"2019-04-22 06:17:00.948 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU db6 blockbytes [5712] read from file [0]" +"2019-04-22 06:17:00.947 UTC [fsblkstorage] waitForBlock -> DEBU db3 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-04-22 06:17:00.949 UTC [common.deliver] deliverBlocks -> DEBU db7 [channel: businesschannel] Delivering block [5] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:17:00.950 UTC [fsblkstorage] waitForBlock -> DEBU db8 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-04-22 06:17:01.072 UTC [orderer.common.broadcast] Handle -> WARN db9 Error reading from 192.168.224.9:34634: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:01.072 UTC [orderer.common.server] func1 -> DEBU dba Closing Broadcast stream" +"2019-04-22 06:17:01.072 UTC [comm.grpc.server] 1 -> INFO dbb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34634 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.4635303s +"2019-04-22 06:17:01.074 UTC [grpc] infof -> DEBU dbc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:01.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbd Sending msg of 28 bytes to 2 on channel businesschannel took 39.9µs" +"2019-04-22 06:17:01.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 3 on channel businesschannel took 38.3µs" +"2019-04-22 06:17:01.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.4µs " +"2019-04-22 06:17:01.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 97.6µs " +"2019-04-22 06:17:01.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:01.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:01.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:01.296 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc4 Sending msg of 28 bytes to 3 on channel testchainid took 31.3µs" +"2019-04-22 06:17:01.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.8µs " +"2019-04-22 06:17:01.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc6 Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +"2019-04-22 06:17:01.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs" +"2019-04-22 06:17:01.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.6µs " +"2019-04-22 06:17:01.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.8µs " +"2019-04-22 06:17:01.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU dca Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:01.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:01.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:01.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcd Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2019-04-22 06:17:01.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU dce Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.6µs " +"2019-04-22 06:17:02.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 2 on channel businesschannel took 40.7µs" +"2019-04-22 06:17:02.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd0 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +"2019-04-22 06:17:02.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106µs " +"2019-04-22 06:17:02.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +"2019-04-22 06:17:02.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:02.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:02.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:02.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd6 Sending msg of 28 bytes to 3 on channel testchainid took 25.4µs" +"2019-04-22 06:17:02.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 921µs " +"2019-04-22 06:17:02.380 UTC [orderer.common.server] Broadcast -> DEBU dd8 Starting new Broadcast handler" +"2019-04-22 06:17:02.381 UTC [orderer.common.broadcast] Handle -> DEBU dd9 Starting new broadcast loop for 192.168.224.9:34648" +"2019-04-22 06:17:02.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 2 on channel businesschannel took 38.8µs" +"2019-04-22 06:17:02.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddb Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" +"2019-04-22 06:17:02.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.5µs " +"2019-04-22 06:17:02.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.8µs " +"2019-04-22 06:17:02.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU dde Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:02.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:02.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:02.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de1 Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2019-04-22 06:17:02.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +"2019-04-22 06:17:03.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 2 on channel businesschannel took 38.9µs" +"2019-04-22 06:17:03.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2019-04-22 06:17:03.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU de5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.6µs " +"2019-04-22 06:17:03.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115.8µs " +"2019-04-22 06:17:03.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:03.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:03.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:03.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dea Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-04-22 06:17:03.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU deb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.8µs " +"2019-04-22 06:17:03.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 2 on channel businesschannel took 35.1µs" +"2019-04-22 06:17:03.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 3 on channel businesschannel took 102.1µs" +"2019-04-22 06:17:03.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU dee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 155.4µs " +"2019-04-22 06:17:03.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +"2019-04-22 06:17:03.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU df0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:03.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:03.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:03.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df3 Sending msg of 28 bytes to 3 on channel testchainid took 23.1µs" +"2019-04-22 06:17:03.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.3µs " +"2019-04-22 06:17:04.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +"2019-04-22 06:17:04.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 3 on channel businesschannel took 25µs" +"2019-04-22 06:17:04.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 190.3µs " +"2019-04-22 06:17:04.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.8µs " +"2019-04-22 06:17:04.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU df9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:04.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:04.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:04.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfc Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-04-22 06:17:04.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.5µs " +"2019-04-22 06:17:04.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +"2019-04-22 06:17:04.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +"2019-04-22 06:17:04.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 145.2µs " +"2019-04-22 06:17:04.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0375ms " +"2019-04-22 06:17:04.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e02 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:04.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:04.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:04.800 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e05 Sending msg of 28 bytes to 3 on channel testchainid took 34.4µs" +"2019-04-22 06:17:04.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU e06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 363.7µs " +"2019-04-22 06:17:05.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 2 on channel businesschannel took 57µs" +"2019-04-22 06:17:05.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e08 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 460.7µs " +"2019-04-22 06:17:05.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e09 Sending msg of 28 bytes to 3 on channel businesschannel took 97.4µs" +"2019-04-22 06:17:05.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:05.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.3µs " +"2019-04-22 06:17:05.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:05.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:05.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2019-04-22 06:17:05.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 898.9µs " +"2019-04-22 06:17:05.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e10 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2019-04-22 06:17:05.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 3 on channel businesschannel took 20.8µs" +"2019-04-22 06:17:05.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU e12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114µs " +"2019-04-22 06:17:05.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 234µs " +"2019-04-22 06:17:05.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e14 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:05.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:05.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:05.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e17 Sending msg of 28 bytes to 3 on channel testchainid took 200.4µs" +"2019-04-22 06:17:05.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.8µs " +"2019-04-22 06:17:06.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 2 on channel businesschannel took 33.2µs" +"2019-04-22 06:17:06.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 3 on channel businesschannel took 194.9µs" +"2019-04-22 06:17:06.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.2µs " +"2019-04-22 06:17:06.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 365.8µs " +"2019-04-22 06:17:06.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:06.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:06.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:06.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e20 Sending msg of 28 bytes to 3 on channel testchainid took 400.1µs" +"2019-04-22 06:17:06.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 939.1µs " +"2019-04-22 06:17:06.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2019-04-22 06:17:06.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 3 on channel businesschannel took 218.3µs" +"2019-04-22 06:17:06.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.3µs " +"2019-04-22 06:17:06.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e25 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:06.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:06.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e27 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +"2019-04-22 06:17:06.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:06.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e29 Sending msg of 28 bytes to 3 on channel testchainid took 109.3µs" +"2019-04-22 06:17:06.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2797ms " +"2019-04-22 06:17:07.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 2 on channel businesschannel took 28.6µs" +"2019-04-22 06:17:07.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +"2019-04-22 06:17:07.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +"2019-04-22 06:17:07.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 91.2µs " +"2019-04-22 06:17:07.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:07.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:07.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:07.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e32 Sending msg of 28 bytes to 3 on channel testchainid took 117.2µs" +"2019-04-22 06:17:07.299 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +"2019-04-22 06:17:07.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 3 on channel businesschannel took 42.1µs" +"2019-04-22 06:17:07.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 2 on channel businesschannel took 134.9µs" +"2019-04-22 06:17:07.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.5µs " +"2019-04-22 06:17:07.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.9µs " +"2019-04-22 06:17:07.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:07.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:07.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:07.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3b Sending msg of 28 bytes to 3 on channel testchainid took 92.6µs" +"2019-04-22 06:17:07.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.9µs " +"2019-04-22 06:17:08.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 2 on channel businesschannel took 86.2µs" +"2019-04-22 06:17:08.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 3 on channel businesschannel took 28.9µs" +"2019-04-22 06:17:08.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 455.1µs " +"2019-04-22 06:17:08.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.4µs " +"2019-04-22 06:17:08.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:08.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:08.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:08.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e44 Sending msg of 28 bytes to 3 on channel testchainid took 58.7µs" +"2019-04-22 06:17:08.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 582.2µs " +"2019-04-22 06:17:08.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 2 on channel businesschannel took 35.1µs" +"2019-04-22 06:17:08.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 201.7µs " +"2019-04-22 06:17:08.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e48 Sending msg of 28 bytes to 3 on channel businesschannel took 915.6µs" +"2019-04-22 06:17:08.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 324.1µs " +"2019-04-22 06:17:08.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:08.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:08.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:08.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4d Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2019-04-22 06:17:08.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.3µs " +"2019-04-22 06:17:09.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 2 on channel businesschannel took 39.9µs" +"2019-04-22 06:17:09.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 35.4µs" +"2019-04-22 06:17:09.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 354.5µs " +"2019-04-22 06:17:09.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:09.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.2µs " +"2019-04-22 06:17:09.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:09.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:09.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.6µs " +"2019-04-22 06:17:09.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e57 Sending msg of 28 bytes to 3 on channel testchainid took 163.8µs" +"2019-04-22 06:17:09.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 2 on channel businesschannel took 45.7µs" +"2019-04-22 06:17:09.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" +"2019-04-22 06:17:09.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.6µs " +"2019-04-22 06:17:09.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.9µs " +"2019-04-22 06:17:09.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:09.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:09.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:09.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5f Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +"2019-04-22 06:17:09.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU e60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 666.2µs " +"2019-04-22 06:17:10.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 2 on channel businesschannel took 47.2µs" +"2019-04-22 06:17:10.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 128.1µs " +"2019-04-22 06:17:10.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.5µs " +"2019-04-22 06:17:10.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel businesschannel took 1.5774ms" +"2019-04-22 06:17:10.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e65 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:10.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:10.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:10.296 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e68 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2019-04-22 06:17:10.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU e69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.5µs " +"2019-04-22 06:17:10.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 3 on channel businesschannel took 31.4µs" +"2019-04-22 06:17:10.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +"2019-04-22 06:17:10.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 232.1µs " +"2019-04-22 06:17:10.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6993ms " +"2019-04-22 06:17:10.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:10.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:10.799 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:10.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e71 Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +"2019-04-22 06:17:10.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU e72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99µs " +"2019-04-22 06:17:11.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 2 on channel businesschannel took 49µs" +"2019-04-22 06:17:11.144 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e75 Sending msg of 28 bytes to 3 on channel businesschannel took 33.3µs" +"2019-04-22 06:17:11.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU e74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.3µs " +"2019-04-22 06:17:11.145 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.1µs " +"2019-04-22 06:17:11.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU e77 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:11.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:11.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:11.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +"2019-04-22 06:17:11.297 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 444.7µs " +"2019-04-22 06:17:11.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2019-04-22 06:17:11.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7d Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2019-04-22 06:17:11.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.9µs " +"2019-04-22 06:17:11.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.5µs " +"2019-04-22 06:17:11.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e80 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:11.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:11.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:11.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e83 Sending msg of 28 bytes to 3 on channel testchainid took 192.1µs" +"2019-04-22 06:17:11.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 643.7µs " +"2019-04-22 06:17:12.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +"2019-04-22 06:17:12.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e87 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +"2019-04-22 06:17:12.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU e88 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:12.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.8µs " +"2019-04-22 06:17:12.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +"2019-04-22 06:17:12.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:12.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:12.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8c Sending msg of 28 bytes to 3 on channel testchainid took 59µs" +"2019-04-22 06:17:12.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.3µs " +"2019-04-22 06:17:12.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8e Sending msg of 28 bytes to 2 on channel businesschannel took 55.6µs" +"2019-04-22 06:17:12.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +"2019-04-22 06:17:12.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.4µs " +"2019-04-22 06:17:12.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.1µs " +"2019-04-22 06:17:12.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU e92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:12.646 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:12.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:12.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2019-04-22 06:17:12.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +"2019-04-22 06:17:13.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-04-22 06:17:13.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU e98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.2µs " +"2019-04-22 06:17:13.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.6µs " +"2019-04-22 06:17:13.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:13.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:13.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9c Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +"2019-04-22 06:17:13.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:13.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9e Sending msg of 28 bytes to 3 on channel testchainid took 29.7µs" +"2019-04-22 06:17:13.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106µs " +"2019-04-22 06:17:13.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 2 on channel businesschannel took 30.2µs" +"2019-04-22 06:17:13.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 257.2µs " +"2019-04-22 06:17:13.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.2µs " +"2019-04-22 06:17:13.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +"2019-04-22 06:17:13.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:13.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:13.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:13.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea7 Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +"2019-04-22 06:17:13.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.7µs " +"2019-04-22 06:17:14.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea9 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +"2019-04-22 06:17:14.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-04-22 06:17:14.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.5µs " +"2019-04-22 06:17:14.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 240µs " +"2019-04-22 06:17:14.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU ead Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:14.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:14.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:14.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb0 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +"2019-04-22 06:17:14.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148µs " +"2019-04-22 06:17:14.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb2 Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +"2019-04-22 06:17:14.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 278.3µs " +"2019-04-22 06:17:14.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb4 Sending msg of 28 bytes to 2 on channel businesschannel took 718.8µs" +"2019-04-22 06:17:14.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:14.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 358µs " +"2019-04-22 06:17:14.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:14.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:14.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb9 Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +"2019-04-22 06:17:14.799 UTC [orderer.common.cluster.step] sendMessage -> DEBU eba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.5µs " +"2019-04-22 06:17:15.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +"2019-04-22 06:17:15.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-04-22 06:17:15.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.6µs " +"2019-04-22 06:17:15.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 447.9µs " +"2019-04-22 06:17:15.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:15.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:15.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:15.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2019-04-22 06:17:15.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.1µs " +"2019-04-22 06:17:15.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +"2019-04-22 06:17:15.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.5µs " +"2019-04-22 06:17:15.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.6µs " +"2019-04-22 06:17:15.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +"2019-04-22 06:17:15.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:15.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:15.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:15.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecb Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +"2019-04-22 06:17:15.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 566.4µs " +"2019-04-22 06:17:16.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +"2019-04-22 06:17:16.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ece Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-04-22 06:17:16.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 297.1µs " +"2019-04-22 06:17:16.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.3µs " +"2019-04-22 06:17:16.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:16.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:16.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:16.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +"2019-04-22 06:17:16.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.9µs " +"2019-04-22 06:17:16.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +"2019-04-22 06:17:16.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed7 Sending msg of 28 bytes to 3 on channel businesschannel took 199.4µs" +"2019-04-22 06:17:16.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 336.5µs " +"2019-04-22 06:17:16.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.6µs " +"2019-04-22 06:17:16.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU eda Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:16.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:16.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:16.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edd Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +"2019-04-22 06:17:16.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +"2019-04-22 06:17:17.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2019-04-22 06:17:17.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.3µs " +"2019-04-22 06:17:17.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:17.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +"2019-04-22 06:17:17.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.4µs " +"2019-04-22 06:17:17.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:17.296 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:17.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.9µs " +"2019-04-22 06:17:17.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee7 Sending msg of 28 bytes to 3 on channel testchainid took 42.2µs" +"2019-04-22 06:17:17.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee8 Sending msg of 28 bytes to 2 on channel businesschannel took 39.4µs" +"2019-04-22 06:17:17.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" +"2019-04-22 06:17:17.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265.1µs " +"2019-04-22 06:17:17.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0976ms " +"2019-04-22 06:17:17.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU eec Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:17.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:17.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:17.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +"2019-04-22 06:17:17.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 779.1µs " +"2019-04-22 06:17:18.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" +"2019-04-22 06:17:18.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef2 Sending msg of 28 bytes to 3 on channel businesschannel took 27.4µs" +"2019-04-22 06:17:18.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 314.2µs " +"2019-04-22 06:17:18.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:18.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.6µs " +"2019-04-22 06:17:18.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:18.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:18.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef8 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2019-04-22 06:17:18.300 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6476ms " +"2019-04-22 06:17:18.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 28 bytes to 2 on channel businesschannel took 34.5µs" +"2019-04-22 06:17:18.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +"2019-04-22 06:17:18.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.8µs " +"2019-04-22 06:17:18.643 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 170.9µs " +"2019-04-22 06:17:18.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:18.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:18.796 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:18.796 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f01 Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" +"2019-04-22 06:17:18.796 UTC [orderer.common.cluster.step] sendMessage -> DEBU f02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +"2019-04-22 06:17:19.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f03 Sending msg of 28 bytes to 2 on channel businesschannel took 75.3µs" +"2019-04-22 06:17:19.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f05 Sending msg of 28 bytes to 3 on channel businesschannel took 47.2µs" +"2019-04-22 06:17:19.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 162.6µs " +"2019-04-22 06:17:19.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU f06 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:19.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 823.9µs " +"2019-04-22 06:17:19.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:19.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:19.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0a Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +"2019-04-22 06:17:19.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 480.2µs " +"2019-04-22 06:17:19.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0c Sending msg of 28 bytes to 2 on channel businesschannel took 37.1µs" +"2019-04-22 06:17:19.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel businesschannel took 90.3µs" +"2019-04-22 06:17:19.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 315.2µs " +"2019-04-22 06:17:19.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.5µs " +"2019-04-22 06:17:19.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f10 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:19.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:19.798 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:19.799 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f13 Sending msg of 28 bytes to 3 on channel testchainid took 46.1µs" +"2019-04-22 06:17:19.800 UTC [orderer.common.cluster.step] sendMessage -> DEBU f14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.7µs " +"2019-04-22 06:17:20.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f15 Sending msg of 28 bytes to 3 on channel businesschannel took 30.9µs" +"2019-04-22 06:17:20.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU f16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.6µs " +"2019-04-22 06:17:20.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f17 Sending msg of 28 bytes to 2 on channel businesschannel took 26.4µs" +"2019-04-22 06:17:20.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.5µs " +"2019-04-22 06:17:20.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f19 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:20.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:20.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:20.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1c Sending msg of 28 bytes to 3 on channel testchainid took 26.8µs" +"2019-04-22 06:17:20.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 313.6µs " +"2019-04-22 06:17:20.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1e Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +"2019-04-22 06:17:20.643 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f20 Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" +"2019-04-22 06:17:20.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f21 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:20.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.8µs " +"2019-04-22 06:17:20.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU f22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 275.5µs " +"2019-04-22 06:17:20.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:20.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:20.797 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f25 Sending msg of 28 bytes to 3 on channel testchainid took 241.2µs" +"2019-04-22 06:17:20.797 UTC [orderer.common.cluster.step] sendMessage -> DEBU f26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 232.8µs " +"2019-04-22 06:17:21.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f27 Sending msg of 28 bytes to 3 on channel businesschannel took 54.3µs" +"2019-04-22 06:17:21.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 2 on channel businesschannel took 33.7µs" +"2019-04-22 06:17:21.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 267µs " +"2019-04-22 06:17:21.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.1596ms " +"2019-04-22 06:17:21.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:21.149 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:21.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:21.298 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2e Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2019-04-22 06:17:21.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.8µs " +"2019-04-22 06:17:21.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f30 Sending msg of 28 bytes to 2 on channel businesschannel took 28.1µs" +"2019-04-22 06:17:21.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-04-22 06:17:21.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 175.9µs " +"2019-04-22 06:17:21.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU f34 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:21.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 547.8µs " +"2019-04-22 06:17:21.645 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:21.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:21.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f37 Sending msg of 28 bytes to 3 on channel testchainid took 27.8µs" +"2019-04-22 06:17:21.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU f38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.4µs " +"2019-04-22 06:17:22.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f39 Sending msg of 28 bytes to 3 on channel businesschannel took 41.7µs" +"2019-04-22 06:17:22.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2019-04-22 06:17:22.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.9µs " +"2019-04-22 06:17:22.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 524.8µs " +"2019-04-22 06:17:22.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:22.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:22.297 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:22.297 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f40 Sending msg of 28 bytes to 3 on channel testchainid took 27.5µs" +"2019-04-22 06:17:22.298 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 314.9µs " +"2019-04-22 06:17:22.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f42 Sending msg of 28 bytes to 2 on channel businesschannel took 30.2µs" +"2019-04-22 06:17:22.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU f43 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 268.6µs " +"2019-04-22 06:17:22.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f44 Sending msg of 28 bytes to 3 on channel businesschannel took 149.5µs" +"2019-04-22 06:17:22.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.2µs " +"2019-04-22 06:17:22.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f46 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:22.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:22.797 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:22.798 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f49 Sending msg of 28 bytes to 3 on channel testchainid took 41.3µs" +"2019-04-22 06:17:22.798 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.5µs " +"2019-04-22 06:17:23.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4b Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +"2019-04-22 06:17:23.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4d Sending msg of 28 bytes to 3 on channel businesschannel took 27.6µs" +"2019-04-22 06:17:23.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 486.6µs " +"2019-04-22 06:17:23.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " +"2019-04-22 06:17:23.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:23.145 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:23.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:23.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel testchainid took 27.7µs" +"2019-04-22 06:17:23.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU f53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188µs " +"2019-04-22 06:17:23.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f54 Sending msg of 28 bytes to 2 on channel businesschannel took 421µs" +"2019-04-22 06:17:23.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +"2019-04-22 06:17:23.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.7µs " +"2019-04-22 06:17:23.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 220.2µs " +"2019-04-22 06:17:23.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:23.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:23.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:23.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.9µs " +"2019-04-22 06:17:23.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5c Sending msg of 28 bytes to 3 on channel testchainid took 444.7µs" +"2019-04-22 06:17:24.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5d Sending msg of 28 bytes to 2 on channel businesschannel took 54.2µs" +"2019-04-22 06:17:24.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel businesschannel took 31µs" +"2019-04-22 06:17:24.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.9µs " +"2019-04-22 06:17:24.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +"2019-04-22 06:17:24.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU f61 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:24.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:24.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:24.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f64 Sending msg of 28 bytes to 3 on channel testchainid took 52.3µs" +"2019-04-22 06:17:24.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU f65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 230µs " +"2019-04-22 06:17:24.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f66 Sending msg of 28 bytes to 2 on channel businesschannel took 42.4µs" +"2019-04-22 06:17:24.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +"2019-04-22 06:17:24.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.5µs " +"2019-04-22 06:17:24.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 853.9µs " +"2019-04-22 06:17:24.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:24.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:24.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:24.765 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6d Sending msg of 28 bytes to 3 on channel testchainid took 345.6µs" +"2019-04-22 06:17:24.767 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.7µs " +"2019-04-22 06:17:25.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6f Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-04-22 06:17:25.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 271.3µs " +"2019-04-22 06:17:25.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-04-22 06:17:25.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.8µs " +"2019-04-22 06:17:25.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU f73 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:25.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:25.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:25.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f76 Sending msg of 28 bytes to 3 on channel testchainid took 34.9µs" +"2019-04-22 06:17:25.263 UTC [orderer.common.cluster.step] sendMessage -> DEBU f77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.5µs " +"2019-04-22 06:17:25.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f78 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" +"2019-04-22 06:17:25.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7a Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +"2019-04-22 06:17:25.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:25.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 154.4µs " +"2019-04-22 06:17:25.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +"2019-04-22 06:17:25.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:25.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:25.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel testchainid took 31.7µs" +"2019-04-22 06:17:25.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.8µs " +"2019-04-22 06:17:26.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f81 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2019-04-22 06:17:26.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f83 Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2019-04-22 06:17:26.111 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.9648ms " +"2019-04-22 06:17:26.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.7µs " +"2019-04-22 06:17:26.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU f85 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:26.114 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:26.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:26.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 3 on channel testchainid took 30.2µs" +"2019-04-22 06:17:26.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 148.5µs " +"2019-04-22 06:17:26.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8a Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +"2019-04-22 06:17:26.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel businesschannel took 49.7µs" +"2019-04-22 06:17:26.610 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.9287ms " +"2019-04-22 06:17:26.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:26.610 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +"2019-04-22 06:17:26.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:26.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU f90 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:26.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f91 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +"2019-04-22 06:17:26.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU f92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161.6µs " +"2019-04-22 06:17:27.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f93 Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +"2019-04-22 06:17:27.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 3 on channel businesschannel took 22.4µs" +"2019-04-22 06:17:27.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.1µs " +"2019-04-22 06:17:27.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU f96 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:27.110 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.9987ms " +"2019-04-22 06:17:27.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU f98 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:27.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:27.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9a Sending msg of 28 bytes to 3 on channel testchainid took 23.7µs" +"2019-04-22 06:17:27.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 612µs " +"2019-04-22 06:17:27.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9c Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +"2019-04-22 06:17:27.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +"2019-04-22 06:17:27.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.3µs " +"2019-04-22 06:17:27.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 87.1µs " +"2019-04-22 06:17:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:27.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:27.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:27.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa3 Sending msg of 28 bytes to 3 on channel testchainid took 31.4µs" +"2019-04-22 06:17:27.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110µs " +"2019-04-22 06:17:28.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa5 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +"2019-04-22 06:17:28.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa6 Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +"2019-04-22 06:17:28.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104µs " +"2019-04-22 06:17:28.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 885.3µs " +"2019-04-22 06:17:28.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:28.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU faa Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:28.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU fab Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:28.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fac Sending msg of 28 bytes to 3 on channel testchainid took 32.9µs" +"2019-04-22 06:17:28.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU fad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.3µs " +"2019-04-22 06:17:28.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fae Sending msg of 28 bytes to 3 on channel businesschannel took 33µs" +"2019-04-22 06:17:28.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faf Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2019-04-22 06:17:28.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.8µs " +"2019-04-22 06:17:28.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.5µs " +"2019-04-22 06:17:28.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb2 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:28.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:28.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:28.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb5 Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +"2019-04-22 06:17:28.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.5µs " +"2019-04-22 06:17:29.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb7 Sending msg of 28 bytes to 2 on channel businesschannel took 31.3µs" +"2019-04-22 06:17:29.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb8 Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs" +"2019-04-22 06:17:29.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105µs " +"2019-04-22 06:17:29.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.1µs " +"2019-04-22 06:17:29.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:29.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:29.267 UTC [orderer.common.cluster.step] handleMessage -> DEBU fbd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:29.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbe Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +"2019-04-22 06:17:29.269 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 379.6µs " +"2019-04-22 06:17:29.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc0 Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +"2019-04-22 06:17:29.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc1 Sending msg of 28 bytes to 3 on channel businesschannel took 31.1µs" +"2019-04-22 06:17:29.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116.7µs " +"2019-04-22 06:17:29.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +"2019-04-22 06:17:29.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:29.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:29.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:29.762 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc7 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2019-04-22 06:17:29.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +"2019-04-22 06:17:30.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc9 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +"2019-04-22 06:17:30.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 3 on channel businesschannel took 38.9µs" +"2019-04-22 06:17:30.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcc Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:30.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180µs " +"2019-04-22 06:17:30.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.9µs " +"2019-04-22 06:17:30.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU fce Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:30.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:30.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd0 Sending msg of 28 bytes to 3 on channel testchainid took 36.2µs" +"2019-04-22 06:17:30.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.2µs " +"2019-04-22 06:17:30.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd2 Sending msg of 28 bytes to 2 on channel businesschannel took 50.2µs" +"2019-04-22 06:17:30.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd3 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +"2019-04-22 06:17:30.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.4µs " +"2019-04-22 06:17:30.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120.3µs " +"2019-04-22 06:17:30.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:30.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:30.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:30.762 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd9 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +"2019-04-22 06:17:30.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU fda Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +"2019-04-22 06:17:31.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdb Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +"2019-04-22 06:17:31.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 396.5µs " +"2019-04-22 06:17:31.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" +"2019-04-22 06:17:31.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 461µs " +"2019-04-22 06:17:31.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:31.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:31.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:31.272 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe2 Sending msg of 28 bytes to 3 on channel testchainid took 74.5µs" +"2019-04-22 06:17:31.272 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190µs " +"2019-04-22 06:17:31.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe4 Sending msg of 28 bytes to 3 on channel businesschannel took 34.1µs" +"2019-04-22 06:17:31.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe5 Sending msg of 28 bytes to 2 on channel businesschannel took 24.5µs" +"2019-04-22 06:17:31.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.5µs " +"2019-04-22 06:17:31.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.5µs " +"2019-04-22 06:17:31.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:31.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:31.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU fea Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:31.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU feb Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +"2019-04-22 06:17:31.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU fec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 438.9µs " +"2019-04-22 06:17:32.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fed Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +"2019-04-22 06:17:32.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fee Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +"2019-04-22 06:17:32.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU fef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 281.2µs " +"2019-04-22 06:17:32.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 476µs " +"2019-04-22 06:17:32.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:32.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:32.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:32.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff4 Sending msg of 28 bytes to 3 on channel testchainid took 50.4µs" +"2019-04-22 06:17:32.263 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.2µs " +"2019-04-22 06:17:32.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff6 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2019-04-22 06:17:32.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff7 Sending msg of 28 bytes to 3 on channel businesschannel took 21.4µs" +"2019-04-22 06:17:32.606 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.9µs " +"2019-04-22 06:17:32.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.6µs " +"2019-04-22 06:17:32.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:32.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:32.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU ffc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:32.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffd Sending msg of 28 bytes to 3 on channel testchainid took 30.5µs" +"2019-04-22 06:17:32.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.6µs " +"2019-04-22 06:17:33.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fff Sending msg of 28 bytes to 2 on channel businesschannel took 24.3µs" +"2019-04-22 06:17:33.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1000 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +"2019-04-22 06:17:33.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1001 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.8µs " +"2019-04-22 06:17:33.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1002 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:33.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1003 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.424ms " +"2019-04-22 06:17:33.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1004 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:33.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1005 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:33.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1006 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +"2019-04-22 06:17:33.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1007 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.3µs " +"2019-04-22 06:17:33.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1008 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2019-04-22 06:17:33.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1009 Sending msg of 28 bytes to 3 on channel businesschannel took 68.8µs" +"2019-04-22 06:17:33.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.1µs " +"2019-04-22 06:17:33.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 381.4µs " +"2019-04-22 06:17:33.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:33.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:33.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:33.762 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100f Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2019-04-22 06:17:33.762 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.4µs " +"2019-04-22 06:17:34.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1011 Sending msg of 28 bytes to 2 on channel businesschannel took 33.2µs" +"2019-04-22 06:17:34.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1012 Sending msg of 28 bytes to 3 on channel businesschannel took 60µs" +"2019-04-22 06:17:34.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1013 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.1µs " +"2019-04-22 06:17:34.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138µs " +"2019-04-22 06:17:34.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1015 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:34.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1016 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:34.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1017 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:34.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1018 Sending msg of 28 bytes to 3 on channel testchainid took 29.4µs" +"2019-04-22 06:17:34.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1019 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.8µs " +"2019-04-22 06:17:34.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101a Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +"2019-04-22 06:17:34.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101b Sending msg of 28 bytes to 3 on channel businesschannel took 25.4µs" +"2019-04-22 06:17:34.606 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.1µs " +"2019-04-22 06:17:34.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 709.5µs " +"2019-04-22 06:17:34.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:34.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:34.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1020 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:34.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1021 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +"2019-04-22 06:17:34.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.7µs " +"2019-04-22 06:17:35.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1023 Sending msg of 28 bytes to 3 on channel businesschannel took 30.7µs" +"2019-04-22 06:17:35.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1024 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-04-22 06:17:35.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1025 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 216.4µs " +"2019-04-22 06:17:35.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1026 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.9µs " +"2019-04-22 06:17:35.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1027 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:35.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1028 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:35.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1029 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:35.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102a Sending msg of 28 bytes to 3 on channel testchainid took 43.2µs" +"2019-04-22 06:17:35.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.5µs " +"2019-04-22 06:17:35.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102c Sending msg of 28 bytes to 3 on channel businesschannel took 93.3µs" +"2019-04-22 06:17:35.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102d Sending msg of 28 bytes to 2 on channel businesschannel took 31µs" +"2019-04-22 06:17:35.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.7µs " +"2019-04-22 06:17:35.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.7µs " +"2019-04-22 06:17:35.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1030 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:35.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1031 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:35.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1032 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:35.766 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1033 Sending msg of 28 bytes to 3 on channel testchainid took 44.4µs" +"2019-04-22 06:17:35.766 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.8µs " +"2019-04-22 06:17:36.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1035 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-04-22 06:17:36.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1036 Sending msg of 28 bytes to 3 on channel businesschannel took 26.2µs" +"2019-04-22 06:17:36.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1037 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.9µs " +"2019-04-22 06:17:36.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.3261ms " +"2019-04-22 06:17:36.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1039 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:36.113 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:36.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:36.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel testchainid took 24.3µs" +"2019-04-22 06:17:36.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +"2019-04-22 06:17:36.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103e Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2019-04-22 06:17:36.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103f Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2019-04-22 06:17:36.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1040 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.4µs " +"2019-04-22 06:17:36.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1041 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 71µs " +"2019-04-22 06:17:36.613 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1042 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:36.613 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1043 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:36.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1044 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:36.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2019-04-22 06:17:36.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.1µs " +"2019-04-22 06:17:37.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1047 Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +"2019-04-22 06:17:37.109 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1048 Sending msg of 28 bytes to 3 on channel businesschannel took 22.3µs" +"2019-04-22 06:17:37.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1049 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +"2019-04-22 06:17:37.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 544.3µs " +"2019-04-22 06:17:37.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:37.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:37.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:37.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2019-04-22 06:17:37.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.7µs " +"2019-04-22 06:17:37.567 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1050 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34648 with txid 'b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead' of type ENDORSER_TRANSACTION" +"2019-04-22 06:17:37.567 UTC [policies] Evaluate -> DEBU 1051 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:17:37.567 UTC [policies] Evaluate -> DEBU 1052 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:37.567 UTC [policies] Evaluate -> DEBU 1053 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:37.568 UTC [policies] Evaluate -> DEBU 1054 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:37.568 UTC [policies] Evaluate -> DEBU 1055 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:37.568 UTC [cauthdsl] func1 -> DEBU 1056 0xc000d5c0c0 gate 1555913857568152500 evaluation starts" +"2019-04-22 06:17:37.568 UTC [cauthdsl] func2 -> DEBU 1057 0xc000d5c0c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:37.568 UTC [cauthdsl] func2 -> DEBU 1058 0xc000d5c0c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:37.568 UTC [cauthdsl] func2 -> DEBU 1059 0xc000d5c0c0 principal matched by identity 0" +"2019-04-22 06:17:37.569 UTC [msp.identity] Verify -> DEBU 105a Verify: digest = 00000000 85 7c a1 d9 67 9c de 88 5d fb 97 8c eb 4a 43 fa |.|..g...]....JC.| +00000010 75 1a d2 7a 6c 28 ae 49 bd f7 17 83 f5 67 5f 12 |u..zl(.I.....g_.|" +"2019-04-22 06:17:37.569 UTC [msp.identity] Verify -> DEBU 105b Verify: sig = 00000000 30 44 02 20 79 64 5c 7c 1e dc 81 c1 b7 3b 78 d7 |0D. yd\|.....;x.| +00000010 64 4c e9 28 a7 bc f9 86 92 37 84 cf 1a 4f 83 25 |dL.(.....7...O.%| +00000020 64 3c 6d 63 02 20 39 67 37 2b 83 57 e7 ca 9b ca |d DEBU 105c 0xc000d5c0c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:37.571 UTC [cauthdsl] func1 -> DEBU 105d 0xc000d5c0c0 gate 1555913857568152500 evaluation succeeds" +"2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 105e Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 105f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 1060 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:37.571 UTC [policies] Evaluate -> DEBU 1061 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:37.572 UTC [policies] Evaluate -> DEBU 1062 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:17:37.572 UTC [policies] Evaluate -> DEBU 1063 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:17:37.573 UTC [orderer.common.blockcutter] Ordered -> DEBU 1064 Enqueuing message into batch" +"2019-04-22 06:17:37.573 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1065 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34648" +"2019-04-22 06:17:37.578 UTC [grpc] warningf -> DEBU 1066 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.4:7050->192.168.224.9:34648: read: connection reset by peer" +"2019-04-22 06:17:37.580 UTC [grpc] infof -> DEBU 1067 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:37.581 UTC [orderer.common.broadcast] Handle -> WARN 1068 Error reading from 192.168.224.9:34648: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:37.581 UTC [orderer.common.server] func1 -> DEBU 1069 Closing Broadcast stream" +"2019-04-22 06:17:37.582 UTC [comm.grpc.server] 1 -> INFO 106a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34648 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.2365565s +"2019-04-22 06:17:37.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106b Sending msg of 28 bytes to 2 on channel businesschannel took 52.5µs" +"2019-04-22 06:17:37.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106c Sending msg of 28 bytes to 3 on channel businesschannel took 50.2µs" +"2019-04-22 06:17:37.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 251.6µs " +"2019-04-22 06:17:37.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:37.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 283µs " +"2019-04-22 06:17:37.614 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1070 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:37.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1071 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:37.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1072 Sending msg of 28 bytes to 3 on channel testchainid took 43.1µs" +"2019-04-22 06:17:37.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1073 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.1µs " +"2019-04-22 06:17:38.051 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1074 No inactive chains to try to replicate" +"2019-04-22 06:17:38.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1075 Sending msg of 28 bytes to 3 on channel businesschannel took 31.3µs" +"2019-04-22 06:17:38.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1076 Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +"2019-04-22 06:17:38.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1077 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 275.5µs " +"2019-04-22 06:17:38.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1078 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.1µs " +"2019-04-22 06:17:38.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1079 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:38.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:38.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:38.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107c Sending msg of 28 bytes to 3 on channel testchainid took 32.3µs" +"2019-04-22 06:17:38.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0536ms " +"2019-04-22 06:17:38.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107e Sending msg of 28 bytes to 2 on channel businesschannel took 34µs" +"2019-04-22 06:17:38.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107f Sending msg of 28 bytes to 3 on channel businesschannel took 22.8µs" +"2019-04-22 06:17:38.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1080 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.3µs " +"2019-04-22 06:17:38.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1081 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2642ms " +"2019-04-22 06:17:38.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1082 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:38.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1083 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:38.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1084 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:38.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1085 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +"2019-04-22 06:17:38.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 389.7µs " +"2019-04-22 06:17:39.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1087 Sending msg of 28 bytes to 2 on channel businesschannel took 33.5µs" +"2019-04-22 06:17:39.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1088 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-04-22 06:17:39.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1089 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +"2019-04-22 06:17:39.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130µs " +"2019-04-22 06:17:39.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 108d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:39.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108e Sending msg of 28 bytes to 3 on channel testchainid took 29µs" +"2019-04-22 06:17:39.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.6µs " +"2019-04-22 06:17:39.576 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1090 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-04-22 06:17:39.576 UTC [orderer.consensus.etcdraft] propose -> INFO 1091 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:17:39.578 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1092 Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:17:39.581 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1093 Sending msg of 3179 bytes to 2 on channel businesschannel took 31.2µs" +"2019-04-22 06:17:39.582 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1094 Sending msg of 3179 bytes to 3 on channel businesschannel took 15.7µs" +"2019-04-22 06:17:39.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1095 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer2.example.com(orderer2.example.com:7050) took 109.4µs " +"2019-04-22 06:17:39.582 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1096 Send of ConsensusRequest for channel businesschannel with payload of size 3179 to orderer1.example.com(orderer1.example.com:7050) took 83.4µs " +"2019-04-22 06:17:39.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1097 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1098 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +"2019-04-22 06:17:39.587 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1099 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-04-22 06:17:39.587 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.8µs " +"2019-04-22 06:17:39.587 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 109b Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2019-04-22 06:17:39.588 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 109d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.6µs " +"2019-04-22 06:17:39.589 UTC [orderer.common.cluster.step] handleMessage -> DEBU 109e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.596 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 109f [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-04-22 06:17:39.597 UTC [msp.identity] Sign -> DEBU 10a1 Sign: plaintext: 0A020802120B0A090A03010203100418...1F70144612D1A38A382DE6C8F8A97DE5 " +"2019-04-22 06:17:39.597 UTC [msp.identity] Sign -> DEBU 10a2 Sign: digest: 5ACE71EDE5F5D2642780F3FAFC9C009018FABF7D5D6B04D4882E59E6B6F22470 " +"2019-04-22 06:17:39.597 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a3 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +"2019-04-22 06:17:39.608 UTC [fsblkstorage] indexBlock -> DEBU 10a5 Indexing block [blockNum=6, blockHash=[]byte{0x89, 0x22, 0x9f, 0x2d, 0xa7, 0x77, 0x8a, 0xc2, 0xd3, 0xc7, 0xbe, 0x3a, 0x97, 0x4d, 0xd2, 0xe2, 0xa9, 0xcf, 0xa6, 0xc0, 0x51, 0xd, 0x23, 0x40, 0x9d, 0x6b, 0xd2, 0xb5, 0x3f, 0x68, 0x94, 0xfe} txOffsets= +txId=b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead locPointer=offset=70, bytesLength=3053 +]" +"2019-04-22 06:17:39.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 484.9µs " +"2019-04-22 06:17:39.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10a6 Sending msg of 28 bytes to 3 on channel businesschannel took 31.4µs" +"2019-04-22 06:17:39.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10a7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 223.8µs " +"2019-04-22 06:17:39.612 UTC [fsblkstorage] updateCheckpoint -> DEBU 10a9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90565], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-04-22 06:17:39.613 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10aa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:39.614 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10ab [channel: businesschannel] Wrote block [6]" +"2019-04-22 06:17:39.614 UTC [fsblkstorage] waitForBlock -> DEBU 10ac Came out of wait. maxAvailaBlockNumber=[6]" +"2019-04-22 06:17:39.615 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ad Remaining bytes=[4060], Going to peek [8] bytes" +"2019-04-22 06:17:39.616 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ae Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +"2019-04-22 06:17:39.616 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10af blockbytes [4058] read from file [0]" +"2019-04-22 06:17:39.617 UTC [common.deliver] deliverBlocks -> DEBU 10b1 [channel: businesschannel] Delivering block [6] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:17:39.616 UTC [fsblkstorage] waitForBlock -> DEBU 10b0 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-04-22 06:17:39.630 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10b2 Remaining bytes=[4060], Going to peek [8] bytes" +"2019-04-22 06:17:39.630 UTC [fsblkstorage] waitForBlock -> DEBU 10b3 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-04-22 06:17:39.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10b4 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +"2019-04-22 06:17:39.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10b5 blockbytes [4058] read from file [0]" +"2019-04-22 06:17:39.649 UTC [common.deliver] deliverBlocks -> DEBU 10b6 [channel: businesschannel] Delivering block [6] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:17:39.675 UTC [fsblkstorage] waitForBlock -> DEBU 10b7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-04-22 06:17:39.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:39.766 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b9 Sending msg of 28 bytes to 3 on channel testchainid took 375.4µs" +"2019-04-22 06:17:39.766 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 234.2µs " +"2019-04-22 06:17:40.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bb Sending msg of 28 bytes to 2 on channel businesschannel took 51.4µs" +"2019-04-22 06:17:40.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bc Sending msg of 28 bytes to 3 on channel businesschannel took 43.8µs" +"2019-04-22 06:17:40.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 265µs " +"2019-04-22 06:17:40.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.2µs " +"2019-04-22 06:17:40.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:40.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:40.265 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:40.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c2 Sending msg of 28 bytes to 3 on channel testchainid took 37.8µs" +"2019-04-22 06:17:40.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 529.8µs " +"2019-04-22 06:17:40.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c4 Sending msg of 28 bytes to 2 on channel businesschannel took 37.9µs" +"2019-04-22 06:17:40.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c5 Sending msg of 28 bytes to 3 on channel businesschannel took 25.4µs" +"2019-04-22 06:17:40.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 283.2µs " +"2019-04-22 06:17:40.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.7µs " +"2019-04-22 06:17:40.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:40.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:40.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ca Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:40.765 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2019-04-22 06:17:40.767 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 350.8µs " +"2019-04-22 06:17:41.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cd Sending msg of 28 bytes to 2 on channel businesschannel took 128.3µs" +"2019-04-22 06:17:41.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ce Sending msg of 28 bytes to 3 on channel businesschannel took 21.9µs" +"2019-04-22 06:17:41.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109µs " +"2019-04-22 06:17:41.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 314.1µs " +"2019-04-22 06:17:41.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:41.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:41.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:41.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d4 Sending msg of 28 bytes to 3 on channel testchainid took 25.6µs" +"2019-04-22 06:17:41.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 676µs " +"2019-04-22 06:17:41.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d6 Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +"2019-04-22 06:17:41.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d7 Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +"2019-04-22 06:17:41.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.2µs " +"2019-04-22 06:17:41.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.7µs " +"2019-04-22 06:17:41.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10da Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:41.612 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10db Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:41.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:41.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10dd Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2019-04-22 06:17:41.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.8µs " +"2019-04-22 06:17:42.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10df Sending msg of 28 bytes to 2 on channel businesschannel took 33.1µs" +"2019-04-22 06:17:42.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e0 Sending msg of 28 bytes to 3 on channel businesschannel took 108.7µs" +"2019-04-22 06:17:42.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.3µs " +"2019-04-22 06:17:42.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 391.6µs " +"2019-04-22 06:17:42.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e3 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:42.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:42.265 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:42.266 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e6 Sending msg of 28 bytes to 3 on channel testchainid took 44.5µs" +"2019-04-22 06:17:42.267 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184µs " +"2019-04-22 06:17:42.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e8 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +"2019-04-22 06:17:42.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e9 Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +"2019-04-22 06:17:42.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.5µs " +"2019-04-22 06:17:42.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 77.5µs " +"2019-04-22 06:17:42.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ec Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:42.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ed Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:42.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ee Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:42.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ef Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +"2019-04-22 06:17:42.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.7µs " +"2019-04-22 06:17:43.043 UTC [orderer.common.server] Broadcast -> DEBU 10f1 Starting new Broadcast handler" +"2019-04-22 06:17:43.044 UTC [orderer.common.broadcast] Handle -> DEBU 10f2 Starting new broadcast loop for 192.168.224.9:34660" +"2019-04-22 06:17:43.069 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10f3 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34660 with txid '1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a' of type ENDORSER_TRANSACTION" +"2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:43.070 UTC [policies] Evaluate -> DEBU 10f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:43.071 UTC [policies] Evaluate -> DEBU 10f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:43.071 UTC [cauthdsl] func1 -> DEBU 10f9 0xc000e746c0 gate 1555913863071506300 evaluation starts" +"2019-04-22 06:17:43.071 UTC [cauthdsl] func2 -> DEBU 10fa 0xc000e746c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:43.072 UTC [cauthdsl] func2 -> DEBU 10fb 0xc000e746c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:43.072 UTC [cauthdsl] func2 -> DEBU 10fc 0xc000e746c0 principal matched by identity 0" +"2019-04-22 06:17:43.072 UTC [msp.identity] Verify -> DEBU 10fd Verify: digest = 00000000 48 8d bd 48 0c 7c ca e2 08 87 5c 32 af 4e e3 c5 |H..H.|....\2.N..| +00000010 bb b1 a5 1f 70 06 8e 72 99 02 e4 10 7c 98 c6 2e |....p..r....|...|" +"2019-04-22 06:17:43.073 UTC [msp.identity] Verify -> DEBU 10fe Verify: sig = 00000000 30 45 02 21 00 90 08 0c 73 59 fc ff da 6e 8f f2 |0E.!....sY...n..| +00000010 40 56 fe 2e 8d 7e 9f 7a ee 87 d3 6c 8e 9d a1 c3 |@V...~.z...l....| +00000020 ca 6c 03 e5 fa 02 20 00 c6 c0 c6 15 55 e1 47 3e |.l.... .....U.G>| +00000030 a7 41 71 4f ae bf 1a cd 91 6d d6 c4 f4 65 06 4f |.AqO.....m...e.O| +00000040 87 e3 04 18 9f 65 ab |.....e.|" +"2019-04-22 06:17:43.073 UTC [cauthdsl] func2 -> DEBU 10ff 0xc000e746c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:43.073 UTC [cauthdsl] func1 -> DEBU 1100 0xc000e746c0 gate 1555913863071506300 evaluation succeeds" +"2019-04-22 06:17:43.074 UTC [policies] Evaluate -> DEBU 1101 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:43.074 UTC [policies] Evaluate -> DEBU 1102 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:43.074 UTC [policies] Evaluate -> DEBU 1103 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:43.075 UTC [policies] Evaluate -> DEBU 1104 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:43.075 UTC [policies] Evaluate -> DEBU 1105 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:17:43.076 UTC [policies] Evaluate -> DEBU 1106 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:17:43.076 UTC [orderer.common.blockcutter] Ordered -> DEBU 1107 Enqueuing message into batch" +"2019-04-22 06:17:43.077 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1108 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34660" +"2019-04-22 06:17:43.082 UTC [orderer.common.broadcast] Handle -> WARN 1109 Error reading from 192.168.224.9:34660: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:43.082 UTC [orderer.common.server] func1 -> DEBU 110a Closing Broadcast stream" +"2019-04-22 06:17:43.082 UTC [comm.grpc.server] 1 -> INFO 110b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34660 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.1587ms +"2019-04-22 06:17:43.083 UTC [grpc] infof -> DEBU 110c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:43.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110d Sending msg of 28 bytes to 2 on channel businesschannel took 44.9µs" +"2019-04-22 06:17:43.113 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 3 on channel businesschannel took 42.7µs" +"2019-04-22 06:17:43.114 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1111 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.7µs " +"2019-04-22 06:17:43.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:43.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 570.5µs " +"2019-04-22 06:17:43.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1112 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:43.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1113 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:43.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1114 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2019-04-22 06:17:43.263 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1115 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.7µs " +"2019-04-22 06:17:43.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1116 Sending msg of 28 bytes to 2 on channel businesschannel took 46.6µs" +"2019-04-22 06:17:43.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +"2019-04-22 06:17:43.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.2µs " +"2019-04-22 06:17:43.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1119 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.8µs " +"2019-04-22 06:17:43.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:43.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:43.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:43.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111d Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" +"2019-04-22 06:17:43.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.2µs " +"2019-04-22 06:17:44.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111f Sending msg of 28 bytes to 2 on channel businesschannel took 63.2µs" +"2019-04-22 06:17:44.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel businesschannel took 43.4µs" +"2019-04-22 06:17:44.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.1µs " +"2019-04-22 06:17:44.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1122 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3821ms " +"2019-04-22 06:17:44.111 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1123 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:44.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1124 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:44.264 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1125 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:44.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1126 Sending msg of 28 bytes to 3 on channel testchainid took 50.6µs" +"2019-04-22 06:17:44.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1127 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.9µs " +"2019-04-22 06:17:44.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1128 Sending msg of 28 bytes to 2 on channel businesschannel took 59.4µs" +"2019-04-22 06:17:44.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1129 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.9µs " +"2019-04-22 06:17:44.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112a Sending msg of 28 bytes to 3 on channel businesschannel took 184.4µs" +"2019-04-22 06:17:44.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.8µs " +"2019-04-22 06:17:44.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:44.611 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:44.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:44.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112f Sending msg of 28 bytes to 3 on channel testchainid took 119.4µs" +"2019-04-22 06:17:44.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1130 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.1µs " +"2019-04-22 06:17:45.077 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 1131 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-04-22 06:17:45.077 UTC [orderer.consensus.etcdraft] propose -> INFO 1132 Created block [7], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:17:45.078 UTC [orderer.consensus.etcdraft] 2 -> DEBU 1133 Proposed block [7] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:17:45.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 3170 bytes to 2 on channel businesschannel took 39µs" +"2019-04-22 06:17:45.081 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 3170 bytes to 3 on channel businesschannel took 19µs" +"2019-04-22 06:17:45.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer1.example.com(orderer1.example.com:7050) took 363.7µs " +"2019-04-22 06:17:45.081 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 3170 to orderer2.example.com(orderer2.example.com:7050) took 134.9µs " +"2019-04-22 06:17:45.085 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.086 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.087 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113a Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +"2019-04-22 06:17:45.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113b Sending msg of 28 bytes to 3 on channel businesschannel took 16.2µs" +"2019-04-22 06:17:45.088 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.4µs " +"2019-04-22 06:17:45.088 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 113d Writing block [7] (Raft index: 11) to ledger" channel=businesschannel node=1 +"2019-04-22 06:17:45.089 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 113e [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-04-22 06:17:45.089 UTC [msp.identity] Sign -> DEBU 113f Sign: plaintext: 0A020802120B0A090A03010203100418...17B6CF0E32EB2DE82B5A6A3B1AB47C40 " +"2019-04-22 06:17:45.089 UTC [msp.identity] Sign -> DEBU 1140 Sign: digest: 348783A2DE32BAE9357CD2C05609E64C96221319D5BB3F963F14FE1316B37446 " +"2019-04-22 06:17:45.092 UTC [fsblkstorage] indexBlock -> DEBU 1141 Indexing block [blockNum=7, blockHash=[]byte{0xd7, 0x34, 0x1e, 0x62, 0x39, 0xbe, 0xee, 0x16, 0x6f, 0xda, 0xea, 0x22, 0xab, 0x75, 0xfa, 0xd, 0x35, 0x82, 0x21, 0x40, 0xe, 0x98, 0xb1, 0x94, 0xf5, 0x18, 0xa4, 0x3, 0xb3, 0x41, 0xea, 0x27} txOffsets= +txId=1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a locPointer=offset=70, bytesLength=3044 +]" +"2019-04-22 06:17:45.093 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1142 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.8µs " +"2019-04-22 06:17:45.102 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1143 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1144 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.104 UTC [fsblkstorage] updateCheckpoint -> DEBU 1145 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94615], isChainEmpty=[false], lastBlockNumber=[7]" +"2019-04-22 06:17:45.104 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1146 [channel: businesschannel] Wrote block [7]" +"2019-04-22 06:17:45.104 UTC [fsblkstorage] waitForBlock -> DEBU 1147 Came out of wait. maxAvailaBlockNumber=[7]" +"2019-04-22 06:17:45.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1148 Remaining bytes=[4050], Going to peek [8] bytes" +"2019-04-22 06:17:45.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1149 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +"2019-04-22 06:17:45.105 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 114a blockbytes [4048] read from file [0]" +"2019-04-22 06:17:45.106 UTC [common.deliver] deliverBlocks -> DEBU 114b [channel: businesschannel] Delivering block [7] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:17:45.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114d Sending msg of 28 bytes to 2 on channel businesschannel took 27.5µs" +"2019-04-22 06:17:45.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114e Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2019-04-22 06:17:45.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 432.7µs " +"2019-04-22 06:17:45.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1150 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 428.9µs " +"2019-04-22 06:17:45.106 UTC [fsblkstorage] waitForBlock -> DEBU 114c Going to wait for newer blocks. maxAvailaBlockNumber=[7], waitForBlockNum=[8]" +"2019-04-22 06:17:45.111 UTC [fsblkstorage] waitForBlock -> DEBU 1151 Came out of wait. maxAvailaBlockNumber=[7]" +"2019-04-22 06:17:45.111 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1152 Remaining bytes=[4050], Going to peek [8] bytes" +"2019-04-22 06:17:45.112 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1153 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +"2019-04-22 06:17:45.112 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1154 blockbytes [4048] read from file [0]" +"2019-04-22 06:17:45.112 UTC [common.deliver] deliverBlocks -> DEBU 1155 [channel: businesschannel] Delivering block [7] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:17:45.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1156 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.112 UTC [fsblkstorage] waitForBlock -> DEBU 1157 Going to wait for newer blocks. maxAvailaBlockNumber=[7], waitForBlockNum=[8]" +"2019-04-22 06:17:45.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1159 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:45.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115a Sending msg of 28 bytes to 3 on channel testchainid took 46.9µs" +"2019-04-22 06:17:45.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 249.4µs " +"2019-04-22 06:17:45.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115c Sending msg of 28 bytes to 2 on channel businesschannel took 96.3µs" +"2019-04-22 06:17:45.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115d Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +"2019-04-22 06:17:45.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 468.1µs " +"2019-04-22 06:17:45.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 342.9µs " +"2019-04-22 06:17:45.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1160 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1161 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:45.730 UTC [orderer.common.server] Broadcast -> DEBU 1162 Starting new Broadcast handler" +"2019-04-22 06:17:45.730 UTC [orderer.common.broadcast] Handle -> DEBU 1163 Starting new broadcast loop for 192.168.224.9:34674" +"2019-04-22 06:17:45.753 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1164 [channel: businesschannel] Broadcast is processing normal message from 192.168.224.9:34674 with txid '8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff' of type ENDORSER_TRANSACTION" +"2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1165 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1166 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1167 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1168 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:45.753 UTC [policies] Evaluate -> DEBU 1169 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:45.754 UTC [cauthdsl] func1 -> DEBU 116a 0xc0010d44e0 gate 1555913865754027900 evaluation starts" +"2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116b 0xc0010d44e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116c 0xc0010d44e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116d 0xc0010d44e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:17:45.754 UTC [cauthdsl] func2 -> DEBU 116e 0xc0010d44e0 principal evaluation fails" +"2019-04-22 06:17:45.754 UTC [cauthdsl] func1 -> DEBU 116f 0xc0010d44e0 gate 1555913865754027900 evaluation fails" +"2019-04-22 06:17:45.755 UTC [policies] Evaluate -> DEBU 1170 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:45.755 UTC [policies] Evaluate -> DEBU 1171 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:45.755 UTC [policies] Evaluate -> DEBU 1172 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:45.755 UTC [cauthdsl] func1 -> DEBU 1173 0xc0010d4d20 gate 1555913865755917900 evaluation starts" +"2019-04-22 06:17:45.756 UTC [cauthdsl] func2 -> DEBU 1174 0xc0010d4d20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.756 UTC [cauthdsl] func2 -> DEBU 1175 0xc0010d4d20 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:45.756 UTC [cauthdsl] func2 -> DEBU 1176 0xc0010d4d20 principal matched by identity 0" +"2019-04-22 06:17:45.757 UTC [msp.identity] Verify -> DEBU 1177 Verify: digest = 00000000 f2 d4 db 3b b3 ca 9f 40 f7 11 6c 72 45 c4 67 85 |...;...@..lrE.g.| +00000010 0b 4a 90 ec e8 56 ba 7e 04 cd 72 b3 ed 52 98 aa |.J...V.~..r..R..|" +"2019-04-22 06:17:45.757 UTC [msp.identity] Verify -> DEBU 1178 Verify: sig = 00000000 30 45 02 21 00 d0 3d 02 05 ea 88 3c 8e 0f 48 f1 |0E.!..=....<..H.| +00000010 1e 84 5c ad 57 64 5d b7 51 d6 68 d5 a7 77 f3 c7 |..\.Wd].Q.h..w..| +00000020 6c 95 c1 fb 3a 02 20 69 6d 41 17 6a c3 75 f0 a8 |l...:. imA.j.u..| +00000030 9a 3a 16 27 b5 75 34 43 2f e8 04 c2 fd 9a 2f c1 |.:.'.u4C/...../.| +00000040 39 6c be 0b 61 f4 aa |9l..a..|" +"2019-04-22 06:17:45.757 UTC [cauthdsl] func2 -> DEBU 1179 0xc0010d4d20 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:45.757 UTC [cauthdsl] func1 -> DEBU 117a 0xc0010d4d20 gate 1555913865755917900 evaluation succeeds" +"2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117b Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117d Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:45.758 UTC [policies] Evaluate -> DEBU 117f Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:17:45.759 UTC [policies] Evaluate -> DEBU 1180 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:17:45.759 UTC [orderer.common.blockcutter] Ordered -> DEBU 1181 Enqueuing message into batch" +"2019-04-22 06:17:45.759 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1182 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 192.168.224.9:34674" +"2019-04-22 06:17:45.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1183 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:45.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1184 Sending msg of 28 bytes to 3 on channel testchainid took 30.9µs" +"2019-04-22 06:17:45.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1185 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.4µs " +"2019-04-22 06:17:45.767 UTC [orderer.common.broadcast] Handle -> WARN 1186 Error reading from 192.168.224.9:34674: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:45.767 UTC [orderer.common.server] func1 -> DEBU 1188 Closing Broadcast stream" +"2019-04-22 06:17:45.767 UTC [comm.grpc.server] 1 -> INFO 1189 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34674 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.0367ms +"2019-04-22 06:17:45.767 UTC [grpc] infof -> DEBU 1187 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:46.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118a Sending msg of 28 bytes to 2 on channel businesschannel took 74.8µs" +"2019-04-22 06:17:46.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 118b Sending msg of 28 bytes to 3 on channel businesschannel took 34.9µs" +"2019-04-22 06:17:46.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.2µs " +"2019-04-22 06:17:46.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 118d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.6µs " +"2019-04-22 06:17:46.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:46.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 118f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:46.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1190 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:46.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1191 Sending msg of 28 bytes to 3 on channel testchainid took 33µs" +"2019-04-22 06:17:46.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1192 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 618.8µs " +"2019-04-22 06:17:46.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1193 Sending msg of 28 bytes to 3 on channel businesschannel took 59.8µs" +"2019-04-22 06:17:46.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1194 Sending msg of 28 bytes to 2 on channel businesschannel took 282.3µs" +"2019-04-22 06:17:46.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1195 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 174.3µs " +"2019-04-22 06:17:46.609 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1196 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.5µs " +"2019-04-22 06:17:46.609 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1197 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:46.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1198 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:46.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1199 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:46.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119a Sending msg of 28 bytes to 3 on channel testchainid took 25.9µs" +"2019-04-22 06:17:46.765 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 626.8µs " +"2019-04-22 06:17:47.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119c Sending msg of 28 bytes to 2 on channel businesschannel took 32.6µs" +"2019-04-22 06:17:47.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 119d Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" +"2019-04-22 06:17:47.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.4µs " +"2019-04-22 06:17:47.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 119f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.8µs " +"2019-04-22 06:17:47.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.265 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:47.265 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a3 Sending msg of 28 bytes to 3 on channel testchainid took 35.5µs" +"2019-04-22 06:17:47.266 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 359.2µs " +"2019-04-22 06:17:47.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a5 Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +"2019-04-22 06:17:47.609 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11a6 Sending msg of 28 bytes to 3 on channel businesschannel took 38.7µs" +"2019-04-22 06:17:47.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 800.3µs " +"2019-04-22 06:17:47.612 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 179.8µs " +"2019-04-22 06:17:47.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11a9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11aa Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.760 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 11ab Batch timer expired, creating block" channel=businesschannel node=1 +"2019-04-22 06:17:47.762 UTC [orderer.consensus.etcdraft] propose -> INFO 11ac Created block [8], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:17:47.763 UTC [orderer.consensus.etcdraft] 2 -> DEBU 11ad Proposed block [8] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:17:47.764 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ae Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:47.764 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11af Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +"2019-04-22 06:17:47.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.4µs " +"2019-04-22 06:17:47.768 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b1 Sending msg of 3171 bytes to 2 on channel businesschannel took 30.5µs" +"2019-04-22 06:17:47.769 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b2 Sending msg of 3171 bytes to 3 on channel businesschannel took 17.8µs" +"2019-04-22 06:17:47.769 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b3 Send of ConsensusRequest for channel businesschannel with payload of size 3171 to orderer1.example.com(orderer1.example.com:7050) took 397.8µs " +"2019-04-22 06:17:47.769 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b4 Send of ConsensusRequest for channel businesschannel with payload of size 3171 to orderer2.example.com(orderer2.example.com:7050) took 81.4µs " +"2019-04-22 06:17:47.773 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11b5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.773 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b6 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +"2019-04-22 06:17:47.773 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11b7 Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +"2019-04-22 06:17:47.773 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.7µs " +"2019-04-22 06:17:47.774 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 11b9 Writing block [8] (Raft index: 12) to ledger" channel=businesschannel node=1 +"2019-04-22 06:17:47.774 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 11ba [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-04-22 06:17:47.774 UTC [msp.identity] Sign -> DEBU 11bb Sign: plaintext: 0A020802120B0A090A03010203100418...A36F0C7C254B197F4377A8DDB3C48DB0 " +"2019-04-22 06:17:47.774 UTC [msp.identity] Sign -> DEBU 11bc Sign: digest: BEEBAFEEEB741A6DD530758BF02839570B84EF8C35096F9919FBC3C69BB3D004 " +"2019-04-22 06:17:47.775 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 595.4µs " +"2019-04-22 06:17:47.778 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11be Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.781 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.780 UTC [fsblkstorage] indexBlock -> DEBU 11bf Indexing block [blockNum=8, blockHash=[]byte{0x87, 0x28, 0x3f, 0xd, 0x8c, 0x94, 0xcd, 0x21, 0x3f, 0x1, 0x49, 0xc1, 0xa, 0x2c, 0x32, 0xd1, 0x8, 0xa0, 0xc4, 0x5, 0x90, 0x89, 0x28, 0x51, 0x8e, 0x5a, 0xbc, 0x5, 0xe0, 0x40, 0x4d, 0xbb} txOffsets= +txId=8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff locPointer=offset=70, bytesLength=3045 +]" +"2019-04-22 06:17:47.780 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c0 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:47.784 UTC [fsblkstorage] updateCheckpoint -> DEBU 11c2 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98666], isChainEmpty=[false], lastBlockNumber=[8]" +"2019-04-22 06:17:47.785 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 11c3 [channel: businesschannel] Wrote block [8]" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] waitForBlock -> DEBU 11c4 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c5 Remaining bytes=[4051], Going to peek [8] bytes" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c6 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11c7 blockbytes [4049] read from file [0]" +"2019-04-22 06:17:47.786 UTC [common.deliver] deliverBlocks -> DEBU 11c8 [channel: businesschannel] Delivering block [8] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] waitForBlock -> DEBU 11c9 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] waitForBlock -> DEBU 11ca Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11cb Remaining bytes=[4051], Going to peek [8] bytes" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11cc Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +"2019-04-22 06:17:47.786 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11cd blockbytes [4049] read from file [0]" +"2019-04-22 06:17:47.787 UTC [common.deliver] deliverBlocks -> DEBU 11ce [channel: businesschannel] Delivering block [8] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:17:47.787 UTC [fsblkstorage] waitForBlock -> DEBU 11cf Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:48.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d0 Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +"2019-04-22 06:17:48.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d1 Sending msg of 28 bytes to 3 on channel businesschannel took 24.9µs" +"2019-04-22 06:17:48.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 436.8µs " +"2019-04-22 06:17:48.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " +"2019-04-22 06:17:48.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:48.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:48.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:48.264 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d7 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +"2019-04-22 06:17:48.265 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155.3µs " +"2019-04-22 06:17:48.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d9 Sending msg of 28 bytes to 3 on channel businesschannel took 115.8µs" +"2019-04-22 06:17:48.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0986ms " +"2019-04-22 06:17:48.608 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11db Sending msg of 28 bytes to 2 on channel businesschannel took 947.3µs" +"2019-04-22 06:17:48.611 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6527ms " +"2019-04-22 06:17:48.615 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11dd Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:48.616 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11de Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:48.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11df Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:48.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e0 Sending msg of 28 bytes to 3 on channel testchainid took 333µs" +"2019-04-22 06:17:48.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 487µs " +"2019-04-22 06:17:50.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e2 Sending msg of 28 bytes to 2 on channel businesschannel took 50.5µs" +"2019-04-22 06:17:50.089 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e3 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2019-04-22 06:17:50.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.4µs " +"2019-04-22 06:17:50.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.2µs " +"2019-04-22 06:17:50.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:50.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:50.096 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e8 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:50.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e9 Sending msg of 28 bytes to 3 on channel testchainid took 30µs" +"2019-04-22 06:17:50.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.2µs " +"2019-04-22 06:17:50.110 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11eb Sending msg of 28 bytes to 2 on channel businesschannel took 37.7µs" +"2019-04-22 06:17:50.110 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ec Sending msg of 28 bytes to 3 on channel businesschannel took 29.4µs" +"2019-04-22 06:17:50.110 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.8µs " +"2019-04-22 06:17:50.110 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 206.6µs " +"2019-04-22 06:17:50.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ef Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:50.112 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:50.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:50.262 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f2 Sending msg of 28 bytes to 3 on channel testchainid took 30.2µs" +"2019-04-22 06:17:50.262 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.3µs " +"2019-04-22 06:17:50.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f4 Sending msg of 28 bytes to 2 on channel businesschannel took 27.8µs" +"2019-04-22 06:17:50.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f6 Sending msg of 28 bytes to 3 on channel businesschannel took 24.3µs" +"2019-04-22 06:17:50.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:50.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 134.8µs " +"2019-04-22 06:17:50.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 899.1µs " +"2019-04-22 06:17:50.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:50.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11fa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:50.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fb Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2019-04-22 06:17:50.763 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 180.3µs " +"2019-04-22 06:17:51.106 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fd Sending msg of 28 bytes to 2 on channel businesschannel took 48.3µs" +"2019-04-22 06:17:51.108 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ff Sending msg of 28 bytes to 3 on channel businesschannel took 30.4µs" +"2019-04-22 06:17:51.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1201 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:51.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1200 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.1µs " +"2019-04-22 06:17:51.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +"2019-04-22 06:17:51.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1202 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:51.267 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1203 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:51.267 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1204 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +"2019-04-22 06:17:51.268 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1205 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 194.8µs " +"2019-04-22 06:17:51.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +"2019-04-22 06:17:51.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +"2019-04-22 06:17:51.606 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1208 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2019-04-22 06:17:51.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1209 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.3µs " +"2019-04-22 06:17:51.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:51.608 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:51.762 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:51.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120d Sending msg of 28 bytes to 3 on channel testchainid took 342.4µs" +"2019-04-22 06:17:51.766 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 905.4µs " +"2019-04-22 06:17:51.798 UTC [orderer.common.server] Deliver -> DEBU 120f Starting new Deliver handler" +"2019-04-22 06:17:51.798 UTC [common.deliver] Handle -> DEBU 1210 Starting new deliver loop for 192.168.224.9:34704" +"2019-04-22 06:17:51.799 UTC [common.deliver] Handle -> DEBU 1211 Attempting to read seek info message from 192.168.224.9:34704" +"2019-04-22 06:17:51.799 UTC [policies] Evaluate -> DEBU 1212 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:51.800 UTC [policies] Evaluate -> DEBU 1213 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:51.800 UTC [policies] Evaluate -> DEBU 1214 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:51.800 UTC [policies] Evaluate -> DEBU 1215 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:51.801 UTC [policies] Evaluate -> DEBU 1216 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:51.801 UTC [msp] DeserializeIdentity -> DEBU 1217 Obtaining identity" +"2019-04-22 06:17:51.802 UTC [msp.identity] newIdentity -> DEBU 1218 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:17:51.803 UTC [cauthdsl] func1 -> DEBU 1219 0xc001345aa0 gate 1555913871803291300 evaluation starts" +"2019-04-22 06:17:51.803 UTC [cauthdsl] func2 -> DEBU 121a 0xc001345aa0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.805 UTC [cauthdsl] func2 -> DEBU 121b 0xc001345aa0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:51.806 UTC [cauthdsl] func2 -> DEBU 121c 0xc001345aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:51.807 UTC [cauthdsl] func2 -> DEBU 121d 0xc001345aa0 principal evaluation fails" +"2019-04-22 06:17:51.807 UTC [cauthdsl] func1 -> DEBU 121e 0xc001345aa0 gate 1555913871803291300 evaluation fails" +"2019-04-22 06:17:51.807 UTC [policies] Evaluate -> DEBU 121f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:51.808 UTC [policies] Evaluate -> DEBU 1220 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:51.808 UTC [policies] Evaluate -> DEBU 1221 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:51.809 UTC [cauthdsl] func1 -> DEBU 1222 0xc00138cbf0 gate 1555913871809012200 evaluation starts" +"2019-04-22 06:17:51.809 UTC [cauthdsl] func2 -> DEBU 1223 0xc00138cbf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.809 UTC [cauthdsl] func2 -> DEBU 1224 0xc00138cbf0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:51.810 UTC [cauthdsl] func2 -> DEBU 1225 0xc00138cbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:51.811 UTC [cauthdsl] func2 -> DEBU 1226 0xc00138cbf0 principal evaluation fails" +"2019-04-22 06:17:51.811 UTC [cauthdsl] func1 -> DEBU 1227 0xc00138cbf0 gate 1555913871809012200 evaluation fails" +"2019-04-22 06:17:51.811 UTC [policies] Evaluate -> DEBU 1228 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.812 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.812 UTC [policies] func1 -> DEBU 122a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:51.812 UTC [policies] Evaluate -> DEBU 122b Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:51.813 UTC [policies] Evaluate -> DEBU 122c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:51.813 UTC [policies] Evaluate -> DEBU 122d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:51.814 UTC [policies] Evaluate -> DEBU 122e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:51.814 UTC [policies] Evaluate -> DEBU 122f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:51.815 UTC [cauthdsl] func1 -> DEBU 1230 0xc00138d900 gate 1555913871814987800 evaluation starts" +"2019-04-22 06:17:51.815 UTC [cauthdsl] func2 -> DEBU 1231 0xc00138d900 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.815 UTC [cauthdsl] func2 -> DEBU 1232 0xc00138d900 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:51.824 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1233 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:17:51.824 UTC [msp] Validate -> DEBU 1234 MSP OrdererMSP validating identity" +"2019-04-22 06:17:51.825 UTC [cauthdsl] func2 -> DEBU 1235 0xc00138d900 principal matched by identity 0" +"2019-04-22 06:17:51.825 UTC [msp.identity] Verify -> DEBU 1236 Verify: digest = 00000000 35 d2 88 0c f7 7a 9d cb 80 7a d6 72 ad a8 7c ee |5....z...z.r..|.| +00000010 94 6a 63 78 79 3c 72 b5 e8 9a 0f 8b 2b 7f ef e4 |.jcxy DEBU 1237 Verify: sig = 00000000 30 44 02 20 51 47 90 2e 92 68 e4 52 c7 34 38 d8 |0D. QG...h.R.48.| +00000010 fe 73 6c 6c 4f d7 f7 47 9a a2 66 8e a6 00 fc d4 |.sllO..G..f.....| +00000020 2c f9 fa 23 02 20 2d 58 cc 37 6a 91 93 f0 0d 0d |,..#. -X.7j.....| +00000030 cb 69 ce 64 64 52 31 a6 14 f6 22 85 70 50 b3 c8 |.i.ddR1...".pP..| +00000040 55 cf 50 d6 3d e9 |U.P.=.|" +"2019-04-22 06:17:51.827 UTC [cauthdsl] func2 -> DEBU 1238 0xc00138d900 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:51.827 UTC [cauthdsl] func1 -> DEBU 1239 0xc00138d900 gate 1555913871814987800 evaluation succeeds" +"2019-04-22 06:17:51.828 UTC [policies] Evaluate -> DEBU 123a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:51.828 UTC [policies] Evaluate -> DEBU 123b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:51.829 UTC [policies] Evaluate -> DEBU 123c Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:51.829 UTC [policies] Evaluate -> DEBU 123d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:51.829 UTC [policies] Evaluate -> DEBU 123e Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:51.830 UTC [policies] Evaluate -> DEBU 123f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:51.830 UTC [common.deliver] deliverBlocks -> DEBU 1240 [channel: businesschannel] Received seekInfo (0xc0012b5c40) start: > stop: > from 192.168.224.9:34704" +"2019-04-22 06:17:51.831 UTC [fsblkstorage] Next -> DEBU 1241 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:51.831 UTC [fsblkstorage] newBlockfileStream -> DEBU 1242 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +"2019-04-22 06:17:51.832 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1243 Remaining bytes=[4051], Going to peek [8] bytes" +"2019-04-22 06:17:51.832 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1244 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +"2019-04-22 06:17:51.832 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1245 blockbytes [4049] read from file [0]" +"2019-04-22 06:17:51.833 UTC [common.deliver] deliverBlocks -> DEBU 1246 [channel: businesschannel] Delivering block [8] for (0xc0012b5c40) for 192.168.224.9:34704" +"2019-04-22 06:17:51.834 UTC [common.deliver] deliverBlocks -> DEBU 1247 [channel: businesschannel] Done delivering to 192.168.224.9:34704 for (0xc0012b5c40)" +"2019-04-22 06:17:51.834 UTC [common.deliver] Handle -> DEBU 1248 Waiting for new SeekInfo from 192.168.224.9:34704" +"2019-04-22 06:17:51.835 UTC [common.deliver] Handle -> DEBU 1249 Attempting to read seek info message from 192.168.224.9:34704" +"2019-04-22 06:17:51.835 UTC [fsblkstorage] waitForBlock -> DEBU 124a Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:51.835 UTC [fsblkstorage] waitForBlock -> DEBU 124b Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:51.836 UTC [fsblkstorage] waitForBlock -> DEBU 124c Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:51.837 UTC [fsblkstorage] waitForBlock -> DEBU 124d Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:51.840 UTC [common.deliver] Handle -> WARN 124e Error reading from 192.168.224.9:34704: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:51.840 UTC [orderer.common.server] func1 -> DEBU 124f Closing Deliver stream" +"2019-04-22 06:17:51.840 UTC [comm.grpc.server] 1 -> INFO 1250 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34704 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.4084ms +"2019-04-22 06:17:51.840 UTC [grpc] infof -> DEBU 1251 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:52.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1252 Sending msg of 28 bytes to 2 on channel businesschannel took 30.9µs" +"2019-04-22 06:17:52.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1253 Sending msg of 28 bytes to 3 on channel businesschannel took 20.6µs" +"2019-04-22 06:17:52.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1254 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.3µs " +"2019-04-22 06:17:52.109 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1255 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.3µs " +"2019-04-22 06:17:52.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1256 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:52.110 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1257 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:52.177 UTC [orderer.common.server] Deliver -> DEBU 1258 Starting new Deliver handler" +"2019-04-22 06:17:52.177 UTC [common.deliver] Handle -> DEBU 1259 Starting new deliver loop for 192.168.224.9:34706" +"2019-04-22 06:17:52.177 UTC [common.deliver] Handle -> DEBU 125a Attempting to read seek info message from 192.168.224.9:34706" +"2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.178 UTC [policies] Evaluate -> DEBU 125f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:52.178 UTC [cauthdsl] func1 -> DEBU 1260 0xc001222720 gate 1555913872178370200 evaluation starts" +"2019-04-22 06:17:52.178 UTC [cauthdsl] func2 -> DEBU 1261 0xc001222720 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.178 UTC [cauthdsl] func2 -> DEBU 1262 0xc001222720 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.178 UTC [cauthdsl] func2 -> DEBU 1263 0xc001222720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:52.179 UTC [cauthdsl] func2 -> DEBU 1264 0xc001222720 principal evaluation fails" +"2019-04-22 06:17:52.179 UTC [cauthdsl] func1 -> DEBU 1265 0xc001222720 gate 1555913872178370200 evaluation fails" +"2019-04-22 06:17:52.179 UTC [policies] Evaluate -> DEBU 1266 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.180 UTC [policies] Evaluate -> DEBU 1267 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.180 UTC [policies] Evaluate -> DEBU 1268 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.180 UTC [cauthdsl] func1 -> DEBU 1269 0xc001222f60 gate 1555913872180512300 evaluation starts" +"2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126a 0xc001222f60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126b 0xc001222f60 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126c 0xc001222f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:52.180 UTC [cauthdsl] func2 -> DEBU 126d 0xc001222f60 principal evaluation fails" +"2019-04-22 06:17:52.180 UTC [cauthdsl] func1 -> DEBU 126e 0xc001222f60 gate 1555913872180512300 evaluation fails" +"2019-04-22 06:17:52.180 UTC [policies] Evaluate -> DEBU 126f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1270 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.181 UTC [policies] func1 -> DEBU 1271 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1272 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1273 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:52.181 UTC [policies] Evaluate -> DEBU 1275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.182 UTC [policies] Evaluate -> DEBU 1276 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:52.182 UTC [cauthdsl] func1 -> DEBU 1277 0xc001223e40 gate 1555913872182336700 evaluation starts" +"2019-04-22 06:17:52.182 UTC [cauthdsl] func2 -> DEBU 1278 0xc001223e40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.182 UTC [cauthdsl] func2 -> DEBU 1279 0xc001223e40 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.182 UTC [cauthdsl] func2 -> DEBU 127a 0xc001223e40 principal matched by identity 0" +"2019-04-22 06:17:52.183 UTC [msp.identity] Verify -> DEBU 127b Verify: digest = 00000000 73 bc 62 1b f9 66 ba 0b 97 51 b4 54 2c 26 2b 0e |s.b..f...Q.T,&+.| +00000010 52 54 01 b3 e2 76 b6 6c 29 68 8c 74 d4 67 0e fb |RT...v.l)h.t.g..|" +"2019-04-22 06:17:52.183 UTC [msp.identity] Verify -> DEBU 127c Verify: sig = 00000000 30 44 02 20 76 c7 fd 6a ee 0c 8a 50 72 63 97 b1 |0D. v..j...Prc..| +00000010 a5 33 c4 26 48 73 01 a4 07 cc ff 39 0b 48 9d 31 |.3.&Hs.....9.H.1| +00000020 9d 60 91 ed 02 20 78 6f 3a 95 24 65 92 fb 99 65 |.`... xo:.$e...e| +00000030 7c 08 e7 ec 9e 5a dd c0 4c 3e 57 f9 a0 42 af f2 ||....Z..L>W..B..| +00000040 3f 3e 6d 47 22 58 |?>mG"X|" +"2019-04-22 06:17:52.183 UTC [cauthdsl] func2 -> DEBU 127d 0xc001223e40 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.183 UTC [cauthdsl] func1 -> DEBU 127e 0xc001223e40 gate 1555913872182336700 evaluation succeeds" +"2019-04-22 06:17:52.184 UTC [policies] Evaluate -> DEBU 127f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.184 UTC [policies] Evaluate -> DEBU 1280 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.184 UTC [policies] Evaluate -> DEBU 1281 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.185 UTC [policies] Evaluate -> DEBU 1282 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.185 UTC [policies] Evaluate -> DEBU 1283 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:52.185 UTC [policies] Evaluate -> DEBU 1284 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:52.185 UTC [common.deliver] deliverBlocks -> DEBU 1285 [channel: businesschannel] Received seekInfo (0xc000dd6700) start: > stop: > from 192.168.224.9:34706" +"2019-04-22 06:17:52.185 UTC [fsblkstorage] Next -> DEBU 1286 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:52.185 UTC [fsblkstorage] newBlockfileStream -> DEBU 1287 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +"2019-04-22 06:17:52.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1288 Remaining bytes=[4051], Going to peek [8] bytes" +"2019-04-22 06:17:52.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1289 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +"2019-04-22 06:17:52.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 128a blockbytes [4049] read from file [0]" +"2019-04-22 06:17:52.186 UTC [common.deliver] deliverBlocks -> DEBU 128b [channel: businesschannel] Delivering block [8] for (0xc000dd6700) for 192.168.224.9:34706" +"2019-04-22 06:17:52.187 UTC [common.deliver] deliverBlocks -> DEBU 128c [channel: businesschannel] Done delivering to 192.168.224.9:34706 for (0xc000dd6700)" +"2019-04-22 06:17:52.187 UTC [common.deliver] Handle -> DEBU 128d Waiting for new SeekInfo from 192.168.224.9:34706" +"2019-04-22 06:17:52.187 UTC [common.deliver] Handle -> DEBU 128e Attempting to read seek info message from 192.168.224.9:34706" +"2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 128f Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 1290 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 1291 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.187 UTC [fsblkstorage] waitForBlock -> DEBU 1292 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1294 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1295 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1296 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 1297 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:52.189 UTC [cauthdsl] func1 -> DEBU 1298 0xc000e7fef0 gate 1555913872189612900 evaluation starts" +"2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 1299 0xc000e7fef0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 129a 0xc000e7fef0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 129b 0xc000e7fef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:52.189 UTC [cauthdsl] func2 -> DEBU 129c 0xc000e7fef0 principal evaluation fails" +"2019-04-22 06:17:52.189 UTC [cauthdsl] func1 -> DEBU 129d 0xc000e7fef0 gate 1555913872189612900 evaluation fails" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 129e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.189 UTC [policies] Evaluate -> DEBU 12a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.189 UTC [cauthdsl] func1 -> DEBU 12a1 0xc000c2e8d0 gate 1555913872189958600 evaluation starts" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a2 0xc000c2e8d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a3 0xc000c2e8d0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a4 0xc000c2e8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12a5 0xc000c2e8d0 principal evaluation fails" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func1 -> DEBU 12a6 0xc000c2e8d0 gate 1555913872189958600 evaluation fails" +"2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12a7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.190 UTC [policies] func1 -> DEBU 12a9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12aa Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.190 UTC [policies] Evaluate -> DEBU 12ae == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func1 -> DEBU 12af 0xc000c2f5c0 gate 1555913872190471500 evaluation starts" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b0 0xc000c2f5c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b1 0xc000c2f5c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b2 0xc000c2f5c0 principal matched by identity 0" +"2019-04-22 06:17:52.190 UTC [msp.identity] Verify -> DEBU 12b3 Verify: digest = 00000000 1d f5 f9 66 ff 1f a1 81 f8 de 62 4b 4f 76 45 e7 |...f......bKOvE.| +00000010 5b f5 b3 31 59 7c 8d e6 7a 83 49 17 90 8f ae 45 |[..1Y|..z.I....E|" +"2019-04-22 06:17:52.190 UTC [msp.identity] Verify -> DEBU 12b4 Verify: sig = 00000000 30 45 02 21 00 e7 01 dd 71 b2 46 9a c2 ab 0e a5 |0E.!....q.F.....| +00000010 f1 c7 00 c1 b5 2d 65 08 94 34 a0 78 d4 85 33 23 |.....-e..4.x..3#| +00000020 c9 52 df 14 36 02 20 0d 08 0d 45 9b 6e db 12 b9 |.R..6. ...E.n...| +00000030 f0 8f 86 38 6a 56 95 d7 0b b9 ba 11 ef 2a 78 02 |...8jV.......*x.| +00000040 57 9b 05 35 31 e8 e1 |W..51..|" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func2 -> DEBU 12b5 0xc000c2f5c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.190 UTC [cauthdsl] func1 -> DEBU 12b6 0xc000c2f5c0 gate 1555913872190471500 evaluation succeeds" +"2019-04-22 06:17:52.191 UTC [policies] Evaluate -> DEBU 12b7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.191 UTC [policies] Evaluate -> DEBU 12b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.192 UTC [policies] Evaluate -> DEBU 12b9 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.192 UTC [policies] Evaluate -> DEBU 12ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.192 UTC [policies] Evaluate -> DEBU 12bb Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:52.193 UTC [policies] Evaluate -> DEBU 12bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:52.193 UTC [common.deliver] deliverBlocks -> DEBU 12bd [channel: businesschannel] Received seekInfo (0xc000a58340) start: > stop: > from 192.168.224.9:34706" +"2019-04-22 06:17:52.194 UTC [fsblkstorage] Next -> DEBU 12be Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:52.194 UTC [fsblkstorage] newBlockfileStream -> DEBU 12bf newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47627]" +"2019-04-22 06:17:52.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c0 Remaining bytes=[51039], Going to peek [8] bytes" +"2019-04-22 06:17:52.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c1 Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +"2019-04-22 06:17:52.196 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12c2 blockbytes [23742] read from file [0]" +"2019-04-22 06:17:52.196 UTC [common.deliver] deliverBlocks -> DEBU 12c3 [channel: businesschannel] Delivering block [2] for (0xc000a58340) for 192.168.224.9:34706" +"2019-04-22 06:17:52.197 UTC [common.deliver] deliverBlocks -> DEBU 12c4 [channel: businesschannel] Done delivering to 192.168.224.9:34706 for (0xc000a58340)" +"2019-04-22 06:17:52.197 UTC [common.deliver] Handle -> DEBU 12c5 Waiting for new SeekInfo from 192.168.224.9:34706" +"2019-04-22 06:17:52.198 UTC [common.deliver] Handle -> DEBU 12c7 Attempting to read seek info message from 192.168.224.9:34706" +"2019-04-22 06:17:52.197 UTC [fsblkstorage] waitForBlock -> DEBU 12c6 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.199 UTC [fsblkstorage] waitForBlock -> DEBU 12c8 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.202 UTC [fsblkstorage] waitForBlock -> DEBU 12c9 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.207 UTC [fsblkstorage] waitForBlock -> DEBU 12ca Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.207 UTC [common.deliver] Handle -> WARN 12cb Error reading from 192.168.224.9:34706: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:52.207 UTC [orderer.common.server] func1 -> DEBU 12cc Closing Deliver stream" +"2019-04-22 06:17:52.208 UTC [comm.grpc.server] 1 -> INFO 12cd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34706 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.8908ms +"2019-04-22 06:17:52.207 UTC [grpc] infof -> DEBU 12ce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:52.262 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12cf Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:52.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12d0 Sending msg of 28 bytes to 3 on channel testchainid took 253.4µs" +"2019-04-22 06:17:52.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12d1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 636.8µs " +"2019-04-22 06:17:52.335 UTC [orderer.common.server] Deliver -> DEBU 12d2 Starting new Deliver handler" +"2019-04-22 06:17:52.336 UTC [common.deliver] Handle -> DEBU 12d3 Starting new deliver loop for 192.168.224.9:34708" +"2019-04-22 06:17:52.336 UTC [common.deliver] Handle -> DEBU 12d4 Attempting to read seek info message from 192.168.224.9:34708" +"2019-04-22 06:17:52.337 UTC [policies] Evaluate -> DEBU 12d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:52.338 UTC [policies] Evaluate -> DEBU 12d6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.338 UTC [policies] Evaluate -> DEBU 12d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.338 UTC [policies] Evaluate -> DEBU 12d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.339 UTC [policies] Evaluate -> DEBU 12d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:52.339 UTC [cauthdsl] func1 -> DEBU 12da 0xc0011f4610 gate 1555913872339395400 evaluation starts" +"2019-04-22 06:17:52.339 UTC [cauthdsl] func2 -> DEBU 12db 0xc0011f4610 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.339 UTC [cauthdsl] func2 -> DEBU 12dc 0xc0011f4610 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.340 UTC [cauthdsl] func2 -> DEBU 12dd 0xc0011f4610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:52.340 UTC [cauthdsl] func2 -> DEBU 12de 0xc0011f4610 principal evaluation fails" +"2019-04-22 06:17:52.340 UTC [cauthdsl] func1 -> DEBU 12df 0xc0011f4610 gate 1555913872339395400 evaluation fails" +"2019-04-22 06:17:52.341 UTC [policies] Evaluate -> DEBU 12e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.341 UTC [policies] Evaluate -> DEBU 12e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.341 UTC [policies] Evaluate -> DEBU 12e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.342 UTC [cauthdsl] func1 -> DEBU 12e3 0xc0011f4f70 gate 1555913872342486100 evaluation starts" +"2019-04-22 06:17:52.342 UTC [cauthdsl] func2 -> DEBU 12e4 0xc0011f4f70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.343 UTC [cauthdsl] func2 -> DEBU 12e5 0xc0011f4f70 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.343 UTC [cauthdsl] func2 -> DEBU 12e6 0xc0011f4f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:52.344 UTC [cauthdsl] func2 -> DEBU 12e7 0xc0011f4f70 principal evaluation fails" +"2019-04-22 06:17:52.344 UTC [cauthdsl] func1 -> DEBU 12e8 0xc0011f4f70 gate 1555913872342486100 evaluation fails" +"2019-04-22 06:17:52.345 UTC [policies] Evaluate -> DEBU 12e9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.345 UTC [policies] Evaluate -> DEBU 12ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.345 UTC [policies] func1 -> DEBU 12eb Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:52.346 UTC [policies] Evaluate -> DEBU 12ec Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:52.346 UTC [policies] Evaluate -> DEBU 12ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.346 UTC [policies] Evaluate -> DEBU 12ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:52.347 UTC [policies] Evaluate -> DEBU 12ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.347 UTC [policies] Evaluate -> DEBU 12f0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:52.347 UTC [cauthdsl] func1 -> DEBU 12f1 0xc0011f5c60 gate 1555913872347464900 evaluation starts" +"2019-04-22 06:17:52.347 UTC [cauthdsl] func2 -> DEBU 12f2 0xc0011f5c60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.348 UTC [cauthdsl] func2 -> DEBU 12f3 0xc0011f5c60 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.348 UTC [cauthdsl] func2 -> DEBU 12f4 0xc0011f5c60 principal matched by identity 0" +"2019-04-22 06:17:52.348 UTC [msp.identity] Verify -> DEBU 12f5 Verify: digest = 00000000 4e 38 d5 a5 0b c5 a2 84 ff 2b 62 71 29 a4 18 58 |N8.......+bq)..X| +00000010 f7 53 7e 2e 8c e9 d6 a6 39 6f b7 a1 4e 87 42 92 |.S~.....9o..N.B.|" +"2019-04-22 06:17:52.349 UTC [msp.identity] Verify -> DEBU 12f6 Verify: sig = 00000000 30 44 02 20 5c d2 f4 4c e2 46 bd 19 a4 5a f5 65 |0D. \..L.F...Z.e| +00000010 33 4b ac 9b f4 75 1a 16 8f 89 b9 1d 35 81 5c 45 |3K...u......5.\E| +00000020 63 84 c3 6e 02 20 7e fb 4c 08 6c ce 40 f1 c3 34 |c..n. ~.L.l.@..4| +00000030 dc 1b 9e bb 47 b9 ec 7d 3b eb 28 e4 56 27 9a 13 |....G..};.(.V'..| +00000040 11 a8 35 fe 97 40 |..5..@|" +"2019-04-22 06:17:52.349 UTC [cauthdsl] func2 -> DEBU 12f7 0xc0011f5c60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.349 UTC [cauthdsl] func1 -> DEBU 12f8 0xc0011f5c60 gate 1555913872347464900 evaluation succeeds" +"2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12f9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12fa == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12fb Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.350 UTC [policies] Evaluate -> DEBU 12fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.351 UTC [policies] Evaluate -> DEBU 12fd Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:52.351 UTC [policies] Evaluate -> DEBU 12fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:52.351 UTC [common.deliver] deliverBlocks -> DEBU 12ff [channel: businesschannel] Received seekInfo (0xc000dd7140) start: > stop: > from 192.168.224.9:34708" +"2019-04-22 06:17:52.352 UTC [fsblkstorage] Next -> DEBU 1300 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:52.352 UTC [fsblkstorage] newBlockfileStream -> DEBU 1301 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-04-22 06:17:52.352 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1302 Remaining bytes=[98666], Going to peek [8] bytes" +"2019-04-22 06:17:52.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1303 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:17:52.353 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1304 blockbytes [23937] read from file [0]" +"2019-04-22 06:17:52.353 UTC [common.deliver] deliverBlocks -> DEBU 1305 [channel: businesschannel] Delivering block [0] for (0xc000dd7140) for 192.168.224.9:34708" +"2019-04-22 06:17:52.354 UTC [common.deliver] deliverBlocks -> DEBU 1306 [channel: businesschannel] Done delivering to 192.168.224.9:34708 for (0xc000dd7140)" +"2019-04-22 06:17:52.354 UTC [fsblkstorage] waitForBlock -> DEBU 1307 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.354 UTC [fsblkstorage] waitForBlock -> DEBU 1308 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.354 UTC [fsblkstorage] waitForBlock -> DEBU 1309 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.355 UTC [fsblkstorage] waitForBlock -> DEBU 130a Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.355 UTC [common.deliver] Handle -> DEBU 130b Waiting for new SeekInfo from 192.168.224.9:34708" +"2019-04-22 06:17:52.355 UTC [common.deliver] Handle -> DEBU 130c Attempting to read seek info message from 192.168.224.9:34708" +"2019-04-22 06:17:52.367 UTC [grpc] infof -> DEBU 130d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:52.368 UTC [common.deliver] Handle -> WARN 130e Error reading from 192.168.224.9:34708: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:52.368 UTC [orderer.common.server] func1 -> DEBU 130f Closing Deliver stream" +"2019-04-22 06:17:52.369 UTC [comm.grpc.server] 1 -> INFO 1310 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34708 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5733ms +"2019-04-22 06:17:52.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1311 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2019-04-22 06:17:52.607 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1312 Sending msg of 28 bytes to 3 on channel businesschannel took 22.5µs" +"2019-04-22 06:17:52.607 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1313 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 508.2µs " +"2019-04-22 06:17:52.608 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1314 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.1322ms " +"2019-04-22 06:17:52.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1315 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:52.610 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1316 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:52.616 UTC [orderer.common.server] Deliver -> DEBU 1317 Starting new Deliver handler" +"2019-04-22 06:17:52.616 UTC [common.deliver] Handle -> DEBU 1318 Starting new deliver loop for 192.168.224.9:34710" +"2019-04-22 06:17:52.616 UTC [common.deliver] Handle -> DEBU 1319 Attempting to read seek info message from 192.168.224.9:34710" +"2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.616 UTC [policies] Evaluate -> DEBU 131d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.617 UTC [policies] Evaluate -> DEBU 131e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:52.617 UTC [cauthdsl] func1 -> DEBU 131f 0xc000dd83e0 gate 1555913872617627700 evaluation starts" +"2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1320 0xc000dd83e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1321 0xc000dd83e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1322 0xc000dd83e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:52.618 UTC [cauthdsl] func2 -> DEBU 1323 0xc000dd83e0 principal evaluation fails" +"2019-04-22 06:17:52.618 UTC [cauthdsl] func1 -> DEBU 1324 0xc000dd83e0 gate 1555913872617627700 evaluation fails" +"2019-04-22 06:17:52.619 UTC [policies] Evaluate -> DEBU 1325 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.619 UTC [policies] Evaluate -> DEBU 1326 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.619 UTC [policies] Evaluate -> DEBU 1327 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.619 UTC [cauthdsl] func1 -> DEBU 1328 0xc000dd8d30 gate 1555913872619849300 evaluation starts" +"2019-04-22 06:17:52.619 UTC [cauthdsl] func2 -> DEBU 1329 0xc000dd8d30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.619 UTC [cauthdsl] func2 -> DEBU 132a 0xc000dd8d30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.619 UTC [cauthdsl] func2 -> DEBU 132b 0xc000dd8d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:52.620 UTC [cauthdsl] func2 -> DEBU 132c 0xc000dd8d30 principal evaluation fails" +"2019-04-22 06:17:52.620 UTC [cauthdsl] func1 -> DEBU 132d 0xc000dd8d30 gate 1555913872619849300 evaluation fails" +"2019-04-22 06:17:52.620 UTC [policies] Evaluate -> DEBU 132e Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.620 UTC [policies] Evaluate -> DEBU 132f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.620 UTC [policies] func1 -> DEBU 1330 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:52.621 UTC [policies] Evaluate -> DEBU 1331 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:52.621 UTC [policies] Evaluate -> DEBU 1332 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.621 UTC [policies] Evaluate -> DEBU 1333 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:52.622 UTC [policies] Evaluate -> DEBU 1334 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.622 UTC [policies] Evaluate -> DEBU 1335 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:52.622 UTC [cauthdsl] func1 -> DEBU 1336 0xc000dd9b10 gate 1555913872622810200 evaluation starts" +"2019-04-22 06:17:52.623 UTC [cauthdsl] func2 -> DEBU 1337 0xc000dd9b10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.623 UTC [cauthdsl] func2 -> DEBU 1338 0xc000dd9b10 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.623 UTC [cauthdsl] func2 -> DEBU 1339 0xc000dd9b10 principal matched by identity 0" +"2019-04-22 06:17:52.623 UTC [msp.identity] Verify -> DEBU 133a Verify: digest = 00000000 f6 98 b2 8b 7d 72 e5 87 20 4a 67 62 3f 31 b2 54 |....}r.. Jgb?1.T| +00000010 1b d3 d8 ea cb 62 a9 cb a8 92 1c 96 65 83 44 7a |.....b......e.Dz|" +"2019-04-22 06:17:52.623 UTC [msp.identity] Verify -> DEBU 133b Verify: sig = 00000000 30 45 02 21 00 89 68 cc 63 a8 42 dc 9c 0c db bc |0E.!..h.c.B.....| +00000010 45 fe ef 28 15 4a 08 34 bd 28 1f 39 83 ec 6b f9 |E..(.J.4.(.9..k.| +00000020 a7 d1 fc 5a ac 02 20 7d 3d 39 e1 4f 02 e7 b3 88 |...Z.. }=9.O....| +00000030 97 f7 12 24 33 c3 49 6b 6b 60 45 a6 1c e1 2a 35 |...$3.Ikk`E...*5| +00000040 87 6d b2 09 be a8 8e |.m.....|" +"2019-04-22 06:17:52.624 UTC [cauthdsl] func2 -> DEBU 133c 0xc000dd9b10 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.624 UTC [cauthdsl] func1 -> DEBU 133d 0xc000dd9b10 gate 1555913872622810200 evaluation succeeds" +"2019-04-22 06:17:52.624 UTC [policies] Evaluate -> DEBU 133e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.624 UTC [policies] Evaluate -> DEBU 133f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.624 UTC [policies] Evaluate -> DEBU 1340 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.625 UTC [policies] Evaluate -> DEBU 1341 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.625 UTC [policies] Evaluate -> DEBU 1342 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:52.625 UTC [policies] Evaluate -> DEBU 1343 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:52.625 UTC [common.deliver] deliverBlocks -> DEBU 1344 [channel: businesschannel] Received seekInfo (0xc0011d82c0) start: > stop: > from 192.168.224.9:34710" +"2019-04-22 06:17:52.626 UTC [fsblkstorage] Next -> DEBU 1345 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:52.626 UTC [fsblkstorage] newBlockfileStream -> DEBU 1346 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +"2019-04-22 06:17:52.626 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1347 Remaining bytes=[74726], Going to peek [8] bytes" +"2019-04-22 06:17:52.627 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1348 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +"2019-04-22 06:17:52.627 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1349 blockbytes [23684] read from file [0]" +"2019-04-22 06:17:52.627 UTC [common.deliver] deliverBlocks -> DEBU 134a [channel: businesschannel] Delivering block [1] for (0xc0011d82c0) for 192.168.224.9:34710" +"2019-04-22 06:17:52.627 UTC [common.deliver] deliverBlocks -> DEBU 134b [channel: businesschannel] Done delivering to 192.168.224.9:34710 for (0xc0011d82c0)" +"2019-04-22 06:17:52.628 UTC [common.deliver] Handle -> DEBU 134c Waiting for new SeekInfo from 192.168.224.9:34710" +"2019-04-22 06:17:52.628 UTC [common.deliver] Handle -> DEBU 134d Attempting to read seek info message from 192.168.224.9:34710" +"2019-04-22 06:17:52.628 UTC [fsblkstorage] waitForBlock -> DEBU 134e Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.630 UTC [fsblkstorage] waitForBlock -> DEBU 134f Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.630 UTC [fsblkstorage] waitForBlock -> DEBU 1350 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.630 UTC [fsblkstorage] waitForBlock -> DEBU 1351 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.636 UTC [common.deliver] Handle -> WARN 1352 Error reading from 192.168.224.9:34710: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:52.636 UTC [orderer.common.server] func1 -> DEBU 1353 Closing Deliver stream" +"2019-04-22 06:17:52.636 UTC [comm.grpc.server] 1 -> INFO 1354 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34710 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.8044ms +"2019-04-22 06:17:52.636 UTC [grpc] infof -> DEBU 1355 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:52.763 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1356 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:52.763 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1357 Sending msg of 28 bytes to 3 on channel testchainid took 26µs" +"2019-04-22 06:17:52.764 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1358 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.3µs " +"2019-04-22 06:17:52.829 UTC [orderer.common.server] Deliver -> DEBU 1359 Starting new Deliver handler" +"2019-04-22 06:17:52.829 UTC [common.deliver] Handle -> DEBU 135a Starting new deliver loop for 192.168.224.9:34712" +"2019-04-22 06:17:52.829 UTC [common.deliver] Handle -> DEBU 135b Attempting to read seek info message from 192.168.224.9:34712" +"2019-04-22 06:17:52.829 UTC [policies] Evaluate -> DEBU 135c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 135d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 135e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 135f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.830 UTC [policies] Evaluate -> DEBU 1360 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:52.830 UTC [cauthdsl] func1 -> DEBU 1361 0xc000ea4930 gate 1555913872830419900 evaluation starts" +"2019-04-22 06:17:52.830 UTC [cauthdsl] func2 -> DEBU 1362 0xc000ea4930 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.830 UTC [cauthdsl] func2 -> DEBU 1363 0xc000ea4930 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.830 UTC [cauthdsl] func2 -> DEBU 1364 0xc000ea4930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:52.831 UTC [cauthdsl] func2 -> DEBU 1365 0xc000ea4930 principal evaluation fails" +"2019-04-22 06:17:52.831 UTC [cauthdsl] func1 -> DEBU 1366 0xc000ea4930 gate 1555913872830419900 evaluation fails" +"2019-04-22 06:17:52.831 UTC [policies] Evaluate -> DEBU 1367 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.831 UTC [policies] Evaluate -> DEBU 1368 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:52.831 UTC [policies] Evaluate -> DEBU 1369 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.832 UTC [cauthdsl] func1 -> DEBU 136a 0xc000ea5230 gate 1555913872831930700 evaluation starts" +"2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136b 0xc000ea5230 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136c 0xc000ea5230 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136d 0xc000ea5230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:52.832 UTC [cauthdsl] func2 -> DEBU 136e 0xc000ea5230 principal evaluation fails" +"2019-04-22 06:17:52.832 UTC [cauthdsl] func1 -> DEBU 136f 0xc000ea5230 gate 1555913872831930700 evaluation fails" +"2019-04-22 06:17:52.832 UTC [policies] Evaluate -> DEBU 1370 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1371 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.833 UTC [policies] func1 -> DEBU 1372 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1373 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1374 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1375 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:52.833 UTC [policies] Evaluate -> DEBU 1376 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.834 UTC [policies] Evaluate -> DEBU 1377 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:52.834 UTC [cauthdsl] func1 -> DEBU 1378 0xc000ea5f20 gate 1555913872834437200 evaluation starts" +"2019-04-22 06:17:52.834 UTC [cauthdsl] func2 -> DEBU 1379 0xc000ea5f20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.834 UTC [cauthdsl] func2 -> DEBU 137a 0xc000ea5f20 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:52.834 UTC [cauthdsl] func2 -> DEBU 137b 0xc000ea5f20 principal matched by identity 0" +"2019-04-22 06:17:52.834 UTC [msp.identity] Verify -> DEBU 137c Verify: digest = 00000000 3c 1e 3c cf d8 96 cb 84 45 19 11 86 22 9b 11 27 |<.<.....E..."..'| +00000010 ef eb 74 d3 30 d3 54 38 2d 01 e2 6b 4e 3b 42 4c |..t.0.T8-..kN;BL|" +"2019-04-22 06:17:52.835 UTC [msp.identity] Verify -> DEBU 137d Verify: sig = 00000000 30 44 02 20 29 89 73 33 cd 99 c8 da e4 ce d5 42 |0D. ).s3.......B| +00000010 ce 2b 2c b6 05 a0 4a 9e e6 73 62 10 6c cd 41 27 |.+,...J..sb.l.A'| +00000020 3b 6d db ef 02 20 2f 0f 07 78 7a 1f 53 6c 80 54 |;m... /..xz.Sl.T| +00000030 5a 7d f3 2c 82 ad 08 ef e2 db 94 3a cb 89 6b a0 |Z}.,.......:..k.| +00000040 90 c5 11 03 a2 69 |.....i|" +"2019-04-22 06:17:52.835 UTC [cauthdsl] func2 -> DEBU 137e 0xc000ea5f20 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.835 UTC [cauthdsl] func1 -> DEBU 137f 0xc000ea5f20 gate 1555913872834437200 evaluation succeeds" +"2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1380 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1381 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1382 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1383 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1384 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:52.835 UTC [policies] Evaluate -> DEBU 1385 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:52.836 UTC [common.deliver] deliverBlocks -> DEBU 1386 [channel: businesschannel] Received seekInfo (0xc0011d8bc0) start: > stop: > from 192.168.224.9:34712" +"2019-04-22 06:17:52.836 UTC [fsblkstorage] Next -> DEBU 1387 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:52.836 UTC [fsblkstorage] newBlockfileStream -> DEBU 1388 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47627]" +"2019-04-22 06:17:52.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1389 Remaining bytes=[51039], Going to peek [8] bytes" +"2019-04-22 06:17:52.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 138a Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +"2019-04-22 06:17:52.836 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 138b blockbytes [23742] read from file [0]" +"2019-04-22 06:17:52.837 UTC [common.deliver] deliverBlocks -> DEBU 138c [channel: businesschannel] Delivering block [2] for (0xc0011d8bc0) for 192.168.224.9:34712" +"2019-04-22 06:17:52.837 UTC [common.deliver] deliverBlocks -> DEBU 138d [channel: businesschannel] Done delivering to 192.168.224.9:34712 for (0xc0011d8bc0)" +"2019-04-22 06:17:52.837 UTC [common.deliver] Handle -> DEBU 138e Waiting for new SeekInfo from 192.168.224.9:34712" +"2019-04-22 06:17:52.837 UTC [common.deliver] Handle -> DEBU 138f Attempting to read seek info message from 192.168.224.9:34712" +"2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1390 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1391 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1392 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:52.837 UTC [fsblkstorage] waitForBlock -> DEBU 1393 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:52.845 UTC [common.deliver] Handle -> WARN 1394 Error reading from 192.168.224.9:34712: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:52.846 UTC [orderer.common.server] func1 -> DEBU 1395 Closing Deliver stream" +"2019-04-22 06:17:52.846 UTC [comm.grpc.server] 1 -> INFO 1396 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34712 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.978ms +"2019-04-22 06:17:52.850 UTC [grpc] infof -> DEBU 1397 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:53.071 UTC [orderer.common.server] Deliver -> DEBU 1398 Starting new Deliver handler" +"2019-04-22 06:17:53.071 UTC [common.deliver] Handle -> DEBU 1399 Starting new deliver loop for 192.168.224.9:34714" +"2019-04-22 06:17:53.071 UTC [common.deliver] Handle -> DEBU 139a Attempting to read seek info message from 192.168.224.9:34714" +"2019-04-22 06:17:53.072 UTC [policies] Evaluate -> DEBU 139b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.073 UTC [policies] Evaluate -> DEBU 139f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:53.074 UTC [cauthdsl] func1 -> DEBU 13a0 0xc000d28aa0 gate 1555913873074356300 evaluation starts" +"2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a1 0xc000d28aa0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a2 0xc000d28aa0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a3 0xc000d28aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:53.074 UTC [cauthdsl] func2 -> DEBU 13a4 0xc000d28aa0 principal evaluation fails" +"2019-04-22 06:17:53.075 UTC [cauthdsl] func1 -> DEBU 13a5 0xc000d28aa0 gate 1555913873074356300 evaluation fails" +"2019-04-22 06:17:53.075 UTC [policies] Evaluate -> DEBU 13a6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.075 UTC [policies] Evaluate -> DEBU 13a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.075 UTC [policies] Evaluate -> DEBU 13a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:53.075 UTC [cauthdsl] func1 -> DEBU 13a9 0xc000d293f0 gate 1555913873075942100 evaluation starts" +"2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13aa 0xc000d293f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13ab 0xc000d293f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13ac 0xc000d293f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:53.076 UTC [cauthdsl] func2 -> DEBU 13ad 0xc000d293f0 principal evaluation fails" +"2019-04-22 06:17:53.076 UTC [cauthdsl] func1 -> DEBU 13ae 0xc000d293f0 gate 1555913873075942100 evaluation fails" +"2019-04-22 06:17:53.076 UTC [policies] Evaluate -> DEBU 13af Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.076 UTC [policies] Evaluate -> DEBU 13b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.076 UTC [policies] func1 -> DEBU 13b1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b2 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:53.077 UTC [policies] Evaluate -> DEBU 13b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.078 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:53.078 UTC [cauthdsl] func1 -> DEBU 13b7 0xc000d101e0 gate 1555913873078214300 evaluation starts" +"2019-04-22 06:17:53.078 UTC [cauthdsl] func2 -> DEBU 13b8 0xc000d101e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.078 UTC [cauthdsl] func2 -> DEBU 13b9 0xc000d101e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.078 UTC [cauthdsl] func2 -> DEBU 13ba 0xc000d101e0 principal matched by identity 0" +"2019-04-22 06:17:53.079 UTC [msp.identity] Verify -> DEBU 13bb Verify: digest = 00000000 60 a8 21 ee 28 63 a5 5b 2e 70 09 9b bb 7a ba a6 |`.!.(c.[.p...z..| +00000010 d3 41 64 80 55 ee 48 1a 82 5c 09 fa e3 44 ef 27 |.Ad.U.H..\...D.'|" +"2019-04-22 06:17:53.079 UTC [msp.identity] Verify -> DEBU 13bc Verify: sig = 00000000 30 45 02 21 00 e7 6a 3a e4 78 e6 2e 33 66 6e ff |0E.!..j:.x..3fn.| +00000010 73 a3 82 8e f1 e7 58 c2 f3 7c 11 43 af 97 e1 2c |s.....X..|.C...,| +00000020 c7 2f 5a 60 d5 02 20 04 e9 47 7c 42 29 cd 14 07 |./Z`.. ..G|B)...| +00000030 dc 26 b6 c1 c4 ae ea d5 50 08 70 69 e9 37 70 b1 |.&......P.pi.7p.| +00000040 17 2f 0f 47 b1 34 da |./.G.4.|" +"2019-04-22 06:17:53.080 UTC [cauthdsl] func2 -> DEBU 13bd 0xc000d101e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:53.080 UTC [cauthdsl] func1 -> DEBU 13be 0xc000d101e0 gate 1555913873078214300 evaluation succeeds" +"2019-04-22 06:17:53.080 UTC [policies] Evaluate -> DEBU 13bf Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.080 UTC [policies] Evaluate -> DEBU 13c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.080 UTC [policies] Evaluate -> DEBU 13c1 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.081 UTC [policies] Evaluate -> DEBU 13c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.081 UTC [policies] Evaluate -> DEBU 13c3 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:53.081 UTC [policies] Evaluate -> DEBU 13c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:53.081 UTC [common.deliver] deliverBlocks -> DEBU 13c5 [channel: businesschannel] Received seekInfo (0xc0011d9b40) start: > stop: > from 192.168.224.9:34714" +"2019-04-22 06:17:53.081 UTC [fsblkstorage] Next -> DEBU 13c6 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:53.082 UTC [fsblkstorage] newBlockfileStream -> DEBU 13c7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71372]" +"2019-04-22 06:17:53.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c8 Remaining bytes=[27294], Going to peek [8] bytes" +"2019-04-22 06:17:53.082 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13c9 Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +"2019-04-22 06:17:53.083 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13ca blockbytes [4708] read from file [0]" +"2019-04-22 06:17:53.083 UTC [common.deliver] deliverBlocks -> DEBU 13cb [channel: businesschannel] Delivering block [3] for (0xc0011d9b40) for 192.168.224.9:34714" +"2019-04-22 06:17:53.084 UTC [common.deliver] deliverBlocks -> DEBU 13cc [channel: businesschannel] Done delivering to 192.168.224.9:34714 for (0xc0011d9b40)" +"2019-04-22 06:17:53.084 UTC [common.deliver] Handle -> DEBU 13cd Waiting for new SeekInfo from 192.168.224.9:34714" +"2019-04-22 06:17:53.084 UTC [common.deliver] Handle -> DEBU 13ce Attempting to read seek info message from 192.168.224.9:34714" +"2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13cf Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13d0 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13d1 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.084 UTC [fsblkstorage] waitForBlock -> DEBU 13d2 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.105 UTC [grpc] infof -> DEBU 13d3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:53.107 UTC [common.deliver] Handle -> WARN 13d4 Error reading from 192.168.224.9:34714: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:53.107 UTC [orderer.common.server] func1 -> DEBU 13d6 Closing Deliver stream" +"2019-04-22 06:17:53.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 399.7µs " +"2019-04-22 06:17:53.107 UTC [comm.grpc.server] 1 -> INFO 13d8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34714 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.4039ms +"2019-04-22 06:17:53.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13d9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:53.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13d5 Sending msg of 28 bytes to 2 on channel businesschannel took 36.8µs" +"2019-04-22 06:17:53.110 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13da Sending msg of 28 bytes to 3 on channel businesschannel took 29.3µs" +"2019-04-22 06:17:53.111 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13db Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 684.1µs " +"2019-04-22 06:17:53.115 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dc Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:53.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13dd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:53.231 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13de Sending msg of 28 bytes to 3 on channel testchainid took 29.1µs" +"2019-04-22 06:17:53.231 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.1µs " +"2019-04-22 06:17:53.263 UTC [orderer.common.server] Deliver -> DEBU 13e0 Starting new Deliver handler" +"2019-04-22 06:17:53.263 UTC [common.deliver] Handle -> DEBU 13e1 Starting new deliver loop for 192.168.224.9:34716" +"2019-04-22 06:17:53.263 UTC [common.deliver] Handle -> DEBU 13e2 Attempting to read seek info message from 192.168.224.9:34716" +"2019-04-22 06:17:53.264 UTC [policies] Evaluate -> DEBU 13e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:53.264 UTC [policies] Evaluate -> DEBU 13e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.265 UTC [policies] Evaluate -> DEBU 13e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:53.265 UTC [policies] Evaluate -> DEBU 13e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.265 UTC [policies] Evaluate -> DEBU 13e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:53.266 UTC [cauthdsl] func1 -> DEBU 13e8 0xc0003d0880 gate 1555913873265990000 evaluation starts" +"2019-04-22 06:17:53.266 UTC [cauthdsl] func2 -> DEBU 13e9 0xc0003d0880 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.266 UTC [cauthdsl] func2 -> DEBU 13ea 0xc0003d0880 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.266 UTC [cauthdsl] func2 -> DEBU 13eb 0xc0003d0880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:53.267 UTC [cauthdsl] func2 -> DEBU 13ec 0xc0003d0880 principal evaluation fails" +"2019-04-22 06:17:53.267 UTC [cauthdsl] func1 -> DEBU 13ed 0xc0003d0880 gate 1555913873265990000 evaluation fails" +"2019-04-22 06:17:53.267 UTC [policies] Evaluate -> DEBU 13ee Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.267 UTC [policies] Evaluate -> DEBU 13ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.267 UTC [policies] Evaluate -> DEBU 13f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:53.268 UTC [cauthdsl] func1 -> DEBU 13f1 0xc0003d10c0 gate 1555913873268205000 evaluation starts" +"2019-04-22 06:17:53.268 UTC [cauthdsl] func2 -> DEBU 13f2 0xc0003d10c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.268 UTC [cauthdsl] func2 -> DEBU 13f3 0xc0003d10c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.269 UTC [cauthdsl] func2 -> DEBU 13f4 0xc0003d10c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:53.269 UTC [cauthdsl] func2 -> DEBU 13f5 0xc0003d10c0 principal evaluation fails" +"2019-04-22 06:17:53.270 UTC [cauthdsl] func1 -> DEBU 13f6 0xc0003d10c0 gate 1555913873268205000 evaluation fails" +"2019-04-22 06:17:53.270 UTC [policies] Evaluate -> DEBU 13f7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.270 UTC [policies] Evaluate -> DEBU 13f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.271 UTC [policies] func1 -> DEBU 13f9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:53.272 UTC [policies] Evaluate -> DEBU 13fa Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:53.272 UTC [policies] Evaluate -> DEBU 13fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:53.272 UTC [policies] Evaluate -> DEBU 13fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:53.273 UTC [policies] Evaluate -> DEBU 13fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.274 UTC [policies] Evaluate -> DEBU 13fe == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:53.274 UTC [cauthdsl] func1 -> DEBU 13ff 0xc0003d1db0 gate 1555913873274838200 evaluation starts" +"2019-04-22 06:17:53.275 UTC [cauthdsl] func2 -> DEBU 1400 0xc0003d1db0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.275 UTC [cauthdsl] func2 -> DEBU 1401 0xc0003d1db0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.275 UTC [cauthdsl] func2 -> DEBU 1402 0xc0003d1db0 principal matched by identity 0" +"2019-04-22 06:17:53.276 UTC [msp.identity] Verify -> DEBU 1403 Verify: digest = 00000000 40 af f7 bd b7 d1 17 93 29 72 55 02 0a dd 14 61 |@.......)rU....a| +00000010 29 88 08 ec 46 1d 1c d6 8c a0 1e 59 ea 13 ba 9f |)...F......Y....|" +"2019-04-22 06:17:53.276 UTC [msp.identity] Verify -> DEBU 1404 Verify: sig = 00000000 30 44 02 20 77 3c f2 d8 ce dc 34 0c ad a6 38 b0 |0D. w<....4...8.| +00000010 7c df d9 72 e4 bb e8 df 50 53 c5 b5 d6 18 45 bb ||..r....PS....E.| +00000020 79 29 4a ff 02 20 1f cc e4 a8 93 a9 da 5a fd 5e |y)J.. .......Z.^| +00000030 9c 85 ed 4a 06 e8 7c d2 cc c7 1c 79 98 ba e2 7e |...J..|....y...~| +00000040 c4 a5 8e 42 5d d9 |...B].|" +"2019-04-22 06:17:53.277 UTC [cauthdsl] func2 -> DEBU 1405 0xc0003d1db0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:53.277 UTC [cauthdsl] func1 -> DEBU 1406 0xc0003d1db0 gate 1555913873274838200 evaluation succeeds" +"2019-04-22 06:17:53.277 UTC [policies] Evaluate -> DEBU 1407 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.277 UTC [policies] Evaluate -> DEBU 1408 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.278 UTC [policies] Evaluate -> DEBU 1409 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.278 UTC [policies] Evaluate -> DEBU 140a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.279 UTC [policies] Evaluate -> DEBU 140b Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:53.279 UTC [policies] Evaluate -> DEBU 140c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:53.279 UTC [common.deliver] deliverBlocks -> DEBU 140d [channel: businesschannel] Received seekInfo (0xc000a58f80) start: > stop: > from 192.168.224.9:34716" +"2019-04-22 06:17:53.280 UTC [fsblkstorage] Next -> DEBU 140e Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:53.280 UTC [fsblkstorage] newBlockfileStream -> DEBU 140f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" +"2019-04-22 06:17:53.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1410 Remaining bytes=[22584], Going to peek [8] bytes" +"2019-04-22 06:17:53.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1411 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +"2019-04-22 06:17:53.281 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1412 blockbytes [4707] read from file [0]" +"2019-04-22 06:17:53.282 UTC [common.deliver] deliverBlocks -> DEBU 1413 [channel: businesschannel] Delivering block [4] for (0xc000a58f80) for 192.168.224.9:34716" +"2019-04-22 06:17:53.282 UTC [common.deliver] deliverBlocks -> DEBU 1414 [channel: businesschannel] Done delivering to 192.168.224.9:34716 for (0xc000a58f80)" +"2019-04-22 06:17:53.283 UTC [fsblkstorage] waitForBlock -> DEBU 1415 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.283 UTC [fsblkstorage] waitForBlock -> DEBU 1416 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.284 UTC [fsblkstorage] waitForBlock -> DEBU 1417 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.284 UTC [fsblkstorage] waitForBlock -> DEBU 1418 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.285 UTC [common.deliver] Handle -> DEBU 1419 Waiting for new SeekInfo from 192.168.224.9:34716" +"2019-04-22 06:17:53.285 UTC [common.deliver] Handle -> DEBU 141a Attempting to read seek info message from 192.168.224.9:34716" +"2019-04-22 06:17:53.300 UTC [common.deliver] Handle -> WARN 141b Error reading from 192.168.224.9:34716: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:53.301 UTC [orderer.common.server] func1 -> DEBU 141c Closing Deliver stream" +"2019-04-22 06:17:53.301 UTC [comm.grpc.server] 1 -> INFO 141d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34716 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.1761ms +"2019-04-22 06:17:53.302 UTC [grpc] infof -> DEBU 141e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:53.475 UTC [orderer.common.server] Deliver -> DEBU 141f Starting new Deliver handler" +"2019-04-22 06:17:53.476 UTC [common.deliver] Handle -> DEBU 1420 Starting new deliver loop for 192.168.224.9:34718" +"2019-04-22 06:17:53.476 UTC [common.deliver] Handle -> DEBU 1421 Attempting to read seek info message from 192.168.224.9:34718" +"2019-04-22 06:17:53.478 UTC [policies] Evaluate -> DEBU 1422 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:53.478 UTC [policies] Evaluate -> DEBU 1423 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.478 UTC [policies] Evaluate -> DEBU 1424 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:53.479 UTC [policies] Evaluate -> DEBU 1425 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.479 UTC [policies] Evaluate -> DEBU 1426 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:53.479 UTC [cauthdsl] func1 -> DEBU 1427 0xc00026b630 gate 1555913873479563700 evaluation starts" +"2019-04-22 06:17:53.479 UTC [cauthdsl] func2 -> DEBU 1428 0xc00026b630 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.480 UTC [cauthdsl] func2 -> DEBU 1429 0xc00026b630 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.480 UTC [cauthdsl] func2 -> DEBU 142a 0xc00026b630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:53.480 UTC [cauthdsl] func2 -> DEBU 142b 0xc00026b630 principal evaluation fails" +"2019-04-22 06:17:53.481 UTC [cauthdsl] func1 -> DEBU 142c 0xc00026b630 gate 1555913873479563700 evaluation fails" +"2019-04-22 06:17:53.481 UTC [policies] Evaluate -> DEBU 142d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.481 UTC [policies] Evaluate -> DEBU 142e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.481 UTC [policies] Evaluate -> DEBU 142f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:53.482 UTC [cauthdsl] func1 -> DEBU 1430 0xc00024e100 gate 1555913873482286000 evaluation starts" +"2019-04-22 06:17:53.482 UTC [cauthdsl] func2 -> DEBU 1431 0xc00024e100 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.482 UTC [cauthdsl] func2 -> DEBU 1432 0xc00024e100 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.483 UTC [cauthdsl] func2 -> DEBU 1433 0xc00024e100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:53.483 UTC [cauthdsl] func2 -> DEBU 1434 0xc00024e100 principal evaluation fails" +"2019-04-22 06:17:53.483 UTC [cauthdsl] func1 -> DEBU 1435 0xc00024e100 gate 1555913873482286000 evaluation fails" +"2019-04-22 06:17:53.484 UTC [policies] Evaluate -> DEBU 1436 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.484 UTC [policies] Evaluate -> DEBU 1437 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.485 UTC [policies] func1 -> DEBU 1438 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:53.485 UTC [policies] Evaluate -> DEBU 1439 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:53.485 UTC [policies] Evaluate -> DEBU 143a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:53.486 UTC [policies] Evaluate -> DEBU 143b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:53.486 UTC [policies] Evaluate -> DEBU 143c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.486 UTC [policies] Evaluate -> DEBU 143d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:53.487 UTC [cauthdsl] func1 -> DEBU 143e 0xc0001f0de0 gate 1555913873487647300 evaluation starts" +"2019-04-22 06:17:53.487 UTC [cauthdsl] func2 -> DEBU 143f 0xc0001f0de0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.488 UTC [cauthdsl] func2 -> DEBU 1440 0xc0001f0de0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.488 UTC [cauthdsl] func2 -> DEBU 1441 0xc0001f0de0 principal matched by identity 0" +"2019-04-22 06:17:53.489 UTC [msp.identity] Verify -> DEBU 1442 Verify: digest = 00000000 db b7 f3 83 29 b0 24 71 76 a3 1d 39 38 6f e9 bb |....).$qv..98o..| +00000010 06 b7 50 0c 9d 95 59 2c f7 36 3c 76 b9 44 2f d8 |..P...Y,.6 DEBU 1443 Verify: sig = 00000000 30 44 02 20 2c 62 78 ea e1 21 c8 f9 e8 e7 97 bf |0D. ,bx..!......| +00000010 d9 fa 8e bb 74 2a 6f ea ce 32 9e ab be c3 c7 e4 |....t*o..2......| +00000020 0b 36 ee af 02 20 43 9f 01 11 aa 77 41 2f 89 2f |.6... C....wA/./| +00000030 e0 c8 f3 48 19 3f 68 e7 4b 1c 9e 37 e7 d7 b7 bc |...H.?h.K..7....| +00000040 7d 07 45 4f 41 4f |}.EOAO|" +"2019-04-22 06:17:53.490 UTC [cauthdsl] func2 -> DEBU 1444 0xc0001f0de0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:53.490 UTC [cauthdsl] func1 -> DEBU 1445 0xc0001f0de0 gate 1555913873487647300 evaluation succeeds" +"2019-04-22 06:17:53.490 UTC [policies] Evaluate -> DEBU 1446 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.491 UTC [policies] Evaluate -> DEBU 1447 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.491 UTC [policies] Evaluate -> DEBU 1448 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.492 UTC [policies] Evaluate -> DEBU 1449 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.492 UTC [policies] Evaluate -> DEBU 144a Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:53.492 UTC [policies] Evaluate -> DEBU 144b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:53.492 UTC [common.deliver] deliverBlocks -> DEBU 144c [channel: businesschannel] Received seekInfo (0xc000a59440) start: > stop: > from 192.168.224.9:34718" +"2019-04-22 06:17:53.493 UTC [fsblkstorage] Next -> DEBU 144d Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:53.493 UTC [fsblkstorage] newBlockfileStream -> DEBU 144e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80791]" +"2019-04-22 06:17:53.494 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 144f Remaining bytes=[17875], Going to peek [8] bytes" +"2019-04-22 06:17:53.494 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1450 Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +"2019-04-22 06:17:53.494 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1451 blockbytes [5712] read from file [0]" +"2019-04-22 06:17:53.495 UTC [common.deliver] deliverBlocks -> DEBU 1452 [channel: businesschannel] Delivering block [5] for (0xc000a59440) for 192.168.224.9:34718" +"2019-04-22 06:17:53.496 UTC [common.deliver] deliverBlocks -> DEBU 1453 [channel: businesschannel] Done delivering to 192.168.224.9:34718 for (0xc000a59440)" +"2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1454 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1455 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1456 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.497 UTC [fsblkstorage] waitForBlock -> DEBU 1457 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.497 UTC [common.deliver] Handle -> DEBU 1458 Waiting for new SeekInfo from 192.168.224.9:34718" +"2019-04-22 06:17:53.499 UTC [common.deliver] Handle -> DEBU 1459 Attempting to read seek info message from 192.168.224.9:34718" +"2019-04-22 06:17:53.503 UTC [common.deliver] Handle -> WARN 145a Error reading from 192.168.224.9:34718: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:53.503 UTC [orderer.common.server] func1 -> DEBU 145b Closing Deliver stream" +"2019-04-22 06:17:53.503 UTC [comm.grpc.server] 1 -> INFO 145c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34718 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.1986ms +"2019-04-22 06:17:53.503 UTC [grpc] infof -> DEBU 145d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:53.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145e Sending msg of 28 bytes to 3 on channel businesschannel took 36.1µs" +"2019-04-22 06:17:53.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145f Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +"2019-04-22 06:17:53.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1460 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 227.1µs " +"2019-04-22 06:17:53.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1461 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.9µs " +"2019-04-22 06:17:53.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1462 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:53.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:53.696 UTC [orderer.common.server] Deliver -> DEBU 1464 Starting new Deliver handler" +"2019-04-22 06:17:53.696 UTC [common.deliver] Handle -> DEBU 1465 Starting new deliver loop for 192.168.224.9:34720" +"2019-04-22 06:17:53.696 UTC [common.deliver] Handle -> DEBU 1466 Attempting to read seek info message from 192.168.224.9:34720" +"2019-04-22 06:17:53.697 UTC [policies] Evaluate -> DEBU 1467 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:53.697 UTC [policies] Evaluate -> DEBU 1468 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.697 UTC [policies] Evaluate -> DEBU 1469 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:53.698 UTC [policies] Evaluate -> DEBU 146a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.698 UTC [policies] Evaluate -> DEBU 146b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:53.699 UTC [cauthdsl] func1 -> DEBU 146c 0xc000405810 gate 1555913873698879300 evaluation starts" +"2019-04-22 06:17:53.699 UTC [cauthdsl] func2 -> DEBU 146d 0xc000405810 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.699 UTC [cauthdsl] func2 -> DEBU 146e 0xc000405810 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.699 UTC [cauthdsl] func2 -> DEBU 146f 0xc000405810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:53.700 UTC [cauthdsl] func2 -> DEBU 1470 0xc000405810 principal evaluation fails" +"2019-04-22 06:17:53.700 UTC [cauthdsl] func1 -> DEBU 1471 0xc000405810 gate 1555913873698879300 evaluation fails" +"2019-04-22 06:17:53.700 UTC [policies] Evaluate -> DEBU 1472 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.701 UTC [policies] Evaluate -> DEBU 1473 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.702 UTC [policies] Evaluate -> DEBU 1474 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:53.702 UTC [cauthdsl] func1 -> DEBU 1475 0xc0003e67d0 gate 1555913873702437400 evaluation starts" +"2019-04-22 06:17:53.702 UTC [cauthdsl] func2 -> DEBU 1476 0xc0003e67d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.703 UTC [cauthdsl] func2 -> DEBU 1477 0xc0003e67d0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.703 UTC [cauthdsl] func2 -> DEBU 1478 0xc0003e67d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:53.703 UTC [cauthdsl] func2 -> DEBU 1479 0xc0003e67d0 principal evaluation fails" +"2019-04-22 06:17:53.704 UTC [cauthdsl] func1 -> DEBU 147a 0xc0003e67d0 gate 1555913873702437400 evaluation fails" +"2019-04-22 06:17:53.704 UTC [policies] Evaluate -> DEBU 147b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.704 UTC [policies] Evaluate -> DEBU 147c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.705 UTC [policies] func1 -> DEBU 147d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:53.705 UTC [policies] Evaluate -> DEBU 147e Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:53.705 UTC [policies] Evaluate -> DEBU 147f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:53.706 UTC [policies] Evaluate -> DEBU 1480 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:53.706 UTC [policies] Evaluate -> DEBU 1481 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.706 UTC [policies] Evaluate -> DEBU 1482 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:53.707 UTC [cauthdsl] func1 -> DEBU 1483 0xc0003e7870 gate 1555913873707322100 evaluation starts" +"2019-04-22 06:17:53.707 UTC [cauthdsl] func2 -> DEBU 1484 0xc0003e7870 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.708 UTC [cauthdsl] func2 -> DEBU 1485 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.708 UTC [cauthdsl] func2 -> DEBU 1486 0xc0003e7870 principal matched by identity 0" +"2019-04-22 06:17:53.708 UTC [msp.identity] Verify -> DEBU 1487 Verify: digest = 00000000 b1 26 48 7b 88 50 dc f6 ca 94 bc 80 4a c2 da e3 |.&H{.P......J...| +00000010 13 96 02 4f 98 2b bf 20 28 a0 37 e5 c7 dd 2a af |...O.+. (.7...*.|" +"2019-04-22 06:17:53.709 UTC [msp.identity] Verify -> DEBU 1488 Verify: sig = 00000000 30 45 02 21 00 dd 31 b4 a5 0d 04 87 ed 9d 03 42 |0E.!..1........B| +00000010 d7 20 c6 d6 ed 5e b9 ea e0 4a c4 99 d6 bf 45 cb |. ...^...J....E.| +00000020 0d 3d 9a 35 a2 02 20 6b e7 c9 71 1f 96 e2 3b e6 |.=.5.. k..q...;.| +00000030 3b 0b 37 35 a9 14 2e ff b5 f5 74 02 5b 8a 03 15 |;.75......t.[...| +00000040 e0 43 fa 4f ea d3 1a |.C.O...|" +"2019-04-22 06:17:53.709 UTC [cauthdsl] func2 -> DEBU 1489 0xc0003e7870 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:53.709 UTC [cauthdsl] func1 -> DEBU 148a 0xc0003e7870 gate 1555913873707322100 evaluation succeeds" +"2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.710 UTC [policies] Evaluate -> DEBU 148e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.711 UTC [policies] Evaluate -> DEBU 148f Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:53.711 UTC [policies] Evaluate -> DEBU 1490 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:53.712 UTC [common.deliver] deliverBlocks -> DEBU 1491 [channel: businesschannel] Received seekInfo (0xc000a59b40) start: > stop: > from 192.168.224.9:34720" +"2019-04-22 06:17:53.712 UTC [fsblkstorage] Next -> DEBU 1492 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:53.712 UTC [fsblkstorage] newBlockfileStream -> DEBU 1493 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86505]" +"2019-04-22 06:17:53.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1494 Remaining bytes=[12161], Going to peek [8] bytes" +"2019-04-22 06:17:53.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1495 Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +"2019-04-22 06:17:53.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1496 blockbytes [4058] read from file [0]" +"2019-04-22 06:17:53.714 UTC [common.deliver] deliverBlocks -> DEBU 1497 [channel: businesschannel] Delivering block [6] for (0xc000a59b40) for 192.168.224.9:34720" +"2019-04-22 06:17:53.714 UTC [common.deliver] deliverBlocks -> DEBU 1498 [channel: businesschannel] Done delivering to 192.168.224.9:34720 for (0xc000a59b40)" +"2019-04-22 06:17:53.714 UTC [common.deliver] Handle -> DEBU 1499 Waiting for new SeekInfo from 192.168.224.9:34720" +"2019-04-22 06:17:53.715 UTC [common.deliver] Handle -> DEBU 149b Attempting to read seek info message from 192.168.224.9:34720" +"2019-04-22 06:17:53.714 UTC [fsblkstorage] waitForBlock -> DEBU 149a Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.715 UTC [fsblkstorage] waitForBlock -> DEBU 149c Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.715 UTC [fsblkstorage] waitForBlock -> DEBU 149d Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.716 UTC [fsblkstorage] waitForBlock -> DEBU 149e Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.725 UTC [grpc] infof -> DEBU 149f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:53.725 UTC [common.deliver] Handle -> WARN 14a0 Error reading from 192.168.224.9:34720: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:53.725 UTC [orderer.common.server] func1 -> DEBU 14a1 Closing Deliver stream" +"2019-04-22 06:17:53.725 UTC [comm.grpc.server] 1 -> INFO 14a2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34720 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.842ms +"2019-04-22 06:17:53.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:53.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a4 Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +"2019-04-22 06:17:53.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.4µs " +"2019-04-22 06:17:53.918 UTC [orderer.common.server] Deliver -> DEBU 14a6 Starting new Deliver handler" +"2019-04-22 06:17:53.919 UTC [common.deliver] Handle -> DEBU 14a7 Starting new deliver loop for 192.168.224.9:34722" +"2019-04-22 06:17:53.919 UTC [common.deliver] Handle -> DEBU 14a8 Attempting to read seek info message from 192.168.224.9:34722" +"2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.921 UTC [policies] Evaluate -> DEBU 14ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:53.921 UTC [cauthdsl] func1 -> DEBU 14ae 0xc0009e65c0 gate 1555913873921939600 evaluation starts" +"2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14af 0xc0009e65c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14b0 0xc0009e65c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14b1 0xc0009e65c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:53.922 UTC [cauthdsl] func2 -> DEBU 14b2 0xc0009e65c0 principal evaluation fails" +"2019-04-22 06:17:53.922 UTC [cauthdsl] func1 -> DEBU 14b3 0xc0009e65c0 gate 1555913873921939600 evaluation fails" +"2019-04-22 06:17:53.923 UTC [policies] Evaluate -> DEBU 14b4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.923 UTC [policies] Evaluate -> DEBU 14b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:53.923 UTC [policies] Evaluate -> DEBU 14b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:53.923 UTC [cauthdsl] func1 -> DEBU 14b7 0xc0009e6e30 gate 1555913873923750000 evaluation starts" +"2019-04-22 06:17:53.923 UTC [cauthdsl] func2 -> DEBU 14b8 0xc0009e6e30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.924 UTC [cauthdsl] func2 -> DEBU 14b9 0xc0009e6e30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.924 UTC [cauthdsl] func2 -> DEBU 14ba 0xc0009e6e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:53.924 UTC [cauthdsl] func2 -> DEBU 14bb 0xc0009e6e30 principal evaluation fails" +"2019-04-22 06:17:53.926 UTC [cauthdsl] func1 -> DEBU 14bc 0xc0009e6e30 gate 1555913873923750000 evaluation fails" +"2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14bd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:53.926 UTC [policies] func1 -> DEBU 14bf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c0 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:53.926 UTC [policies] Evaluate -> DEBU 14c4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:53.927 UTC [cauthdsl] func1 -> DEBU 14c5 0xc0009e7d80 gate 1555913873927397500 evaluation starts" +"2019-04-22 06:17:53.927 UTC [cauthdsl] func2 -> DEBU 14c6 0xc0009e7d80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:53.927 UTC [cauthdsl] func2 -> DEBU 14c7 0xc0009e7d80 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:53.928 UTC [cauthdsl] func2 -> DEBU 14c8 0xc0009e7d80 principal matched by identity 0" +"2019-04-22 06:17:53.928 UTC [msp.identity] Verify -> DEBU 14c9 Verify: digest = 00000000 16 c0 ca e6 17 f2 4f 03 36 f7 d2 d0 0e 9b 71 7c |......O.6.....q|| +00000010 fb d6 c1 fd c7 9f 51 49 e2 87 fe 21 eb 10 fc 6b |......QI...!...k|" +"2019-04-22 06:17:53.928 UTC [msp.identity] Verify -> DEBU 14ca Verify: sig = 00000000 30 44 02 20 6a 54 83 90 4f 22 8c ee c5 65 4b 3e |0D. jT..O"...eK>| +00000010 cc 05 ac d6 c9 67 fa 1c 3b e7 ea 39 ef 75 af 1e |.....g..;..9.u..| +00000020 24 7c 67 f7 02 20 46 97 34 89 02 3a 82 f7 f1 b1 |$|g.. F.4..:....| +00000030 00 2b 27 d1 a5 3e 80 19 37 25 be b9 ac 2a d5 39 |.+'..>..7%...*.9| +00000040 14 1b 6f 1a ba ac |..o...|" +"2019-04-22 06:17:53.929 UTC [cauthdsl] func2 -> DEBU 14cb 0xc0009e7d80 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:53.929 UTC [cauthdsl] func1 -> DEBU 14cc 0xc0009e7d80 gate 1555913873927397500 evaluation succeeds" +"2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14cd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14ce == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14cf Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.929 UTC [policies] Evaluate -> DEBU 14d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:53.930 UTC [policies] Evaluate -> DEBU 14d1 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:53.930 UTC [policies] Evaluate -> DEBU 14d2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:53.931 UTC [common.deliver] deliverBlocks -> DEBU 14d3 [channel: businesschannel] Received seekInfo (0xc000086dc0) start: > stop: > from 192.168.224.9:34722" +"2019-04-22 06:17:53.931 UTC [fsblkstorage] Next -> DEBU 14d4 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:53.931 UTC [fsblkstorage] newBlockfileStream -> DEBU 14d5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90565]" +"2019-04-22 06:17:53.932 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14d6 Remaining bytes=[8101], Going to peek [8] bytes" +"2019-04-22 06:17:53.932 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14d7 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +"2019-04-22 06:17:53.932 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 14d8 blockbytes [4048] read from file [0]" +"2019-04-22 06:17:53.932 UTC [common.deliver] deliverBlocks -> DEBU 14d9 [channel: businesschannel] Delivering block [7] for (0xc000086dc0) for 192.168.224.9:34722" +"2019-04-22 06:17:53.932 UTC [common.deliver] deliverBlocks -> DEBU 14da [channel: businesschannel] Done delivering to 192.168.224.9:34722 for (0xc000086dc0)" +"2019-04-22 06:17:53.933 UTC [fsblkstorage] waitForBlock -> DEBU 14db Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.933 UTC [fsblkstorage] waitForBlock -> DEBU 14dc Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.934 UTC [fsblkstorage] waitForBlock -> DEBU 14dd Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:53.934 UTC [fsblkstorage] waitForBlock -> DEBU 14de Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:53.934 UTC [common.deliver] Handle -> DEBU 14df Waiting for new SeekInfo from 192.168.224.9:34722" +"2019-04-22 06:17:53.936 UTC [common.deliver] Handle -> DEBU 14e0 Attempting to read seek info message from 192.168.224.9:34722" +"2019-04-22 06:17:53.943 UTC [common.deliver] Handle -> WARN 14e1 Error reading from 192.168.224.9:34722: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:53.943 UTC [orderer.common.server] func1 -> DEBU 14e2 Closing Deliver stream" +"2019-04-22 06:17:53.943 UTC [comm.grpc.server] 1 -> INFO 14e3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34722 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1651ms +"2019-04-22 06:17:53.943 UTC [grpc] infof -> DEBU 14e4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:54.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e5 Sending msg of 28 bytes to 2 on channel businesschannel took 38.6µs" +"2019-04-22 06:17:54.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e6 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +"2019-04-22 06:17:54.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.7µs " +"2019-04-22 06:17:54.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 926µs " +"2019-04-22 06:17:54.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e9 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:54.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ea Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:54.166 UTC [orderer.common.server] Deliver -> DEBU 14eb Starting new Deliver handler" +"2019-04-22 06:17:54.166 UTC [common.deliver] Handle -> DEBU 14ec Starting new deliver loop for 192.168.224.9:34724" +"2019-04-22 06:17:54.166 UTC [common.deliver] Handle -> DEBU 14ed Attempting to read seek info message from 192.168.224.9:34724" +"2019-04-22 06:17:54.167 UTC [policies] Evaluate -> DEBU 14ee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:54.167 UTC [policies] Evaluate -> DEBU 14ef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.168 UTC [policies] Evaluate -> DEBU 14f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:54.168 UTC [policies] Evaluate -> DEBU 14f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.168 UTC [policies] Evaluate -> DEBU 14f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:54.169 UTC [cauthdsl] func1 -> DEBU 14f3 0xc000e2abe0 gate 1555913874169592500 evaluation starts" +"2019-04-22 06:17:54.170 UTC [cauthdsl] func2 -> DEBU 14f4 0xc000e2abe0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.171 UTC [cauthdsl] func2 -> DEBU 14f5 0xc000e2abe0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:54.171 UTC [cauthdsl] func2 -> DEBU 14f6 0xc000e2abe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:17:54.172 UTC [cauthdsl] func2 -> DEBU 14f7 0xc000e2abe0 principal evaluation fails" +"2019-04-22 06:17:54.172 UTC [cauthdsl] func1 -> DEBU 14f8 0xc000e2abe0 gate 1555913874169592500 evaluation fails" +"2019-04-22 06:17:54.172 UTC [policies] Evaluate -> DEBU 14f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:54.173 UTC [policies] Evaluate -> DEBU 14fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:54.173 UTC [policies] Evaluate -> DEBU 14fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:54.174 UTC [cauthdsl] func1 -> DEBU 14fc 0xc000e2b450 gate 1555913874174470100 evaluation starts" +"2019-04-22 06:17:54.174 UTC [cauthdsl] func2 -> DEBU 14fd 0xc000e2b450 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.175 UTC [cauthdsl] func2 -> DEBU 14fe 0xc000e2b450 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:54.175 UTC [cauthdsl] func2 -> DEBU 14ff 0xc000e2b450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:17:54.175 UTC [cauthdsl] func2 -> DEBU 1500 0xc000e2b450 principal evaluation fails" +"2019-04-22 06:17:54.176 UTC [cauthdsl] func1 -> DEBU 1501 0xc000e2b450 gate 1555913874174470100 evaluation fails" +"2019-04-22 06:17:54.176 UTC [policies] Evaluate -> DEBU 1502 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:54.176 UTC [policies] Evaluate -> DEBU 1503 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:54.177 UTC [policies] func1 -> DEBU 1504 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:17:54.177 UTC [policies] Evaluate -> DEBU 1505 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:17:54.177 UTC [policies] Evaluate -> DEBU 1506 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:54.178 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:54.178 UTC [policies] Evaluate -> DEBU 1508 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.179 UTC [policies] Evaluate -> DEBU 1509 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:54.179 UTC [cauthdsl] func1 -> DEBU 150a 0xc0009d8400 gate 1555913874179768300 evaluation starts" +"2019-04-22 06:17:54.181 UTC [cauthdsl] func2 -> DEBU 150b 0xc0009d8400 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.182 UTC [cauthdsl] func2 -> DEBU 150c 0xc0009d8400 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:54.182 UTC [cauthdsl] func2 -> DEBU 150d 0xc0009d8400 principal matched by identity 0" +"2019-04-22 06:17:54.183 UTC [msp.identity] Verify -> DEBU 150e Verify: digest = 00000000 4f 70 e5 c2 a6 fa 69 d3 8d 0f 03 f9 a8 67 4c e8 |Op....i......gL.| +00000010 04 35 cd f6 f6 f3 d8 4c 0c 85 b4 bb 65 e6 08 9c |.5.....L....e...|" +"2019-04-22 06:17:54.183 UTC [msp.identity] Verify -> DEBU 150f Verify: sig = 00000000 30 44 02 20 77 a5 7f e7 f5 7b f1 98 b9 f2 b7 a3 |0D. w....{......| +00000010 2e b1 b4 62 48 e1 f4 2c 33 55 8d fc b7 9a 7e 68 |...bH..,3U....~h| +00000020 25 47 2f 25 02 20 57 36 f3 6d 23 6b 91 81 2b d4 |%G/%. W6.m#k..+.| +00000030 48 3e 2e 28 0b d9 bb 86 e0 96 70 bb d8 c2 61 3d |H>.(......p...a=| +00000040 b5 c8 d3 24 cb 3e |...$.>|" +"2019-04-22 06:17:54.184 UTC [cauthdsl] func2 -> DEBU 1510 0xc0009d8400 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:54.185 UTC [cauthdsl] func1 -> DEBU 1511 0xc0009d8400 gate 1555913874179768300 evaluation succeeds" +"2019-04-22 06:17:54.185 UTC [policies] Evaluate -> DEBU 1512 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.185 UTC [policies] Evaluate -> DEBU 1513 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.186 UTC [policies] Evaluate -> DEBU 1514 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.186 UTC [policies] Evaluate -> DEBU 1515 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.187 UTC [policies] Evaluate -> DEBU 1516 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:54.187 UTC [policies] Evaluate -> DEBU 1517 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:54.187 UTC [common.deliver] deliverBlocks -> DEBU 1518 [channel: businesschannel] Received seekInfo (0xc000d12bc0) start: > stop: > from 192.168.224.9:34724" +"2019-04-22 06:17:54.188 UTC [fsblkstorage] Next -> DEBU 1519 Initializing block stream for iterator. itr.maxBlockNumAvailable=8" +"2019-04-22 06:17:54.188 UTC [fsblkstorage] newBlockfileStream -> DEBU 151a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +"2019-04-22 06:17:54.189 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 151b Remaining bytes=[4051], Going to peek [8] bytes" +"2019-04-22 06:17:54.189 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 151c Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +"2019-04-22 06:17:54.190 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 151d blockbytes [4049] read from file [0]" +"2019-04-22 06:17:54.190 UTC [common.deliver] deliverBlocks -> DEBU 151e [channel: businesschannel] Delivering block [8] for (0xc000d12bc0) for 192.168.224.9:34724" +"2019-04-22 06:17:54.190 UTC [common.deliver] deliverBlocks -> DEBU 151f [channel: businesschannel] Done delivering to 192.168.224.9:34724 for (0xc000d12bc0)" +"2019-04-22 06:17:54.193 UTC [fsblkstorage] waitForBlock -> DEBU 1520 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:54.194 UTC [fsblkstorage] waitForBlock -> DEBU 1521 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:54.194 UTC [fsblkstorage] waitForBlock -> DEBU 1522 Came out of wait. maxAvailaBlockNumber=[8]" +"2019-04-22 06:17:54.194 UTC [fsblkstorage] waitForBlock -> DEBU 1523 Going to wait for newer blocks. maxAvailaBlockNumber=[8], waitForBlockNum=[9]" +"2019-04-22 06:17:54.195 UTC [common.deliver] Handle -> DEBU 1524 Waiting for new SeekInfo from 192.168.224.9:34724" +"2019-04-22 06:17:54.197 UTC [common.deliver] Handle -> DEBU 1525 Attempting to read seek info message from 192.168.224.9:34724" +"2019-04-22 06:17:54.201 UTC [grpc] infof -> DEBU 1526 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:54.203 UTC [common.deliver] Handle -> WARN 1527 Error reading from 192.168.224.9:34724: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:54.203 UTC [orderer.common.server] func1 -> DEBU 1528 Closing Deliver stream" +"2019-04-22 06:17:54.203 UTC [comm.grpc.server] 1 -> INFO 1529 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34724 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.6178ms +"2019-04-22 06:17:54.231 UTC [orderer.common.cluster.step] handleMessage -> DEBU 152a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:54.231 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 152b Sending msg of 28 bytes to 3 on channel testchainid took 35.1µs" +"2019-04-22 06:17:54.233 UTC [orderer.common.cluster.step] sendMessage -> DEBU 152c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 315.2µs " +"2019-04-22 06:17:54.489 UTC [orderer.common.server] Deliver -> DEBU 152d Starting new Deliver handler" +"2019-04-22 06:17:54.512 UTC [common.deliver] Handle -> DEBU 152e Starting new deliver loop for 192.168.224.9:34726" +"2019-04-22 06:17:54.553 UTC [common.deliver] Handle -> DEBU 152f Attempting to read seek info message from 192.168.224.9:34726" +"2019-04-22 06:17:54.556 UTC [policies] Evaluate -> DEBU 1530 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:54.556 UTC [policies] Evaluate -> DEBU 1531 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.557 UTC [policies] Evaluate -> DEBU 1532 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:54.557 UTC [policies] Evaluate -> DEBU 1533 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.558 UTC [policies] Evaluate -> DEBU 1534 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:54.558 UTC [msp] DeserializeIdentity -> DEBU 1535 Obtaining identity" +"2019-04-22 06:17:54.558 UTC [msp.identity] newIdentity -> DEBU 1536 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:17:54.559 UTC [cauthdsl] func1 -> DEBU 1537 0xc000bf7160 gate 1555913874559720500 evaluation starts" +"2019-04-22 06:17:54.560 UTC [cauthdsl] func2 -> DEBU 1538 0xc000bf7160 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.560 UTC [cauthdsl] func2 -> DEBU 1539 0xc000bf7160 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:54.561 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 153a Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:17:54.561 UTC [msp] Validate -> DEBU 153b MSP OrdererMSP validating identity" +"2019-04-22 06:17:54.561 UTC [cauthdsl] func2 -> DEBU 153c 0xc000bf7160 principal matched by identity 0" +"2019-04-22 06:17:54.561 UTC [msp.identity] Verify -> DEBU 153d Verify: digest = 00000000 7a 79 5f 82 80 f5 91 16 0d 32 c2 48 cd be 21 f1 |zy_......2.H..!.| +00000010 9b 02 07 26 ca bc d3 42 5d 0b 2b 89 59 74 5f a3 |...&...B].+.Yt_.|" +"2019-04-22 06:17:54.561 UTC [msp.identity] Verify -> DEBU 153e Verify: sig = 00000000 30 45 02 21 00 9f c5 3d 1e 4c c7 48 03 d0 07 7f |0E.!...=.L.H....| +00000010 91 53 80 41 a5 5a 12 2e 14 b7 1d af 46 e4 9c 76 |.S.A.Z......F..v| +00000020 f5 09 74 e0 3e 02 20 36 30 27 66 3c a4 d3 c2 06 |..t.>. 60'f<....| +00000030 66 60 f8 83 d7 33 fb cf b3 fc b8 a6 5b b4 88 f0 |f`...3......[...| +00000040 b8 f0 f2 a0 fa 6c dc |.....l.|" +"2019-04-22 06:17:54.562 UTC [cauthdsl] func2 -> DEBU 153f 0xc000bf7160 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:54.562 UTC [cauthdsl] func1 -> DEBU 1540 0xc000bf7160 gate 1555913874559720500 evaluation succeeds" +"2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1541 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1542 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1543 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1544 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1545 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:54.562 UTC [policies] Evaluate -> DEBU 1546 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:54.562 UTC [common.deliver] deliverBlocks -> DEBU 1547 [channel: testchainid] Received seekInfo (0xc000d13300) start: > stop: > from 192.168.224.9:34726" +"2019-04-22 06:17:54.562 UTC [fsblkstorage] Next -> DEBU 1548 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:17:54.562 UTC [fsblkstorage] newBlockfileStream -> DEBU 1549 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-04-22 06:17:54.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 154a Remaining bytes=[25828], Going to peek [8] bytes" +"2019-04-22 06:17:54.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 154b Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-04-22 06:17:54.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 154c blockbytes [25825] read from file [0]" +"2019-04-22 06:17:54.562 UTC [common.deliver] deliverBlocks -> DEBU 154d [channel: testchainid] Delivering block [1] for (0xc000d13300) for 192.168.224.9:34726" +"2019-04-22 06:17:54.563 UTC [common.deliver] deliverBlocks -> DEBU 154e [channel: testchainid] Done delivering to 192.168.224.9:34726 for (0xc000d13300)" +"2019-04-22 06:17:54.563 UTC [common.deliver] Handle -> DEBU 154f Waiting for new SeekInfo from 192.168.224.9:34726" +"2019-04-22 06:17:54.563 UTC [common.deliver] Handle -> DEBU 1550 Attempting to read seek info message from 192.168.224.9:34726" +"2019-04-22 06:17:54.568 UTC [common.deliver] Handle -> WARN 1551 Error reading from 192.168.224.9:34726: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:54.569 UTC [orderer.common.server] func1 -> DEBU 1553 Closing Deliver stream" +"2019-04-22 06:17:54.569 UTC [comm.grpc.server] 1 -> INFO 1554 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34726 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=80.7047ms +"2019-04-22 06:17:54.569 UTC [grpc] infof -> DEBU 1552 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:54.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1555 Sending msg of 28 bytes to 3 on channel businesschannel took 689.3µs" +"2019-04-22 06:17:54.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1556 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 463.7µs " +"2019-04-22 06:17:54.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1557 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:54.581 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1558 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-04-22 06:17:54.581 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1559 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.1µs " +"2019-04-22 06:17:54.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU 155a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:54.783 UTC [orderer.common.cluster.step] handleMessage -> DEBU 155b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:54.784 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 155c Sending msg of 28 bytes to 3 on channel testchainid took 26.5µs" +"2019-04-22 06:17:54.784 UTC [orderer.common.cluster.step] sendMessage -> DEBU 155d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.4µs " +"2019-04-22 06:17:54.794 UTC [orderer.common.server] Deliver -> DEBU 155e Starting new Deliver handler" +"2019-04-22 06:17:54.794 UTC [common.deliver] Handle -> DEBU 155f Starting new deliver loop for 192.168.224.9:34728" +"2019-04-22 06:17:54.794 UTC [common.deliver] Handle -> DEBU 1560 Attempting to read seek info message from 192.168.224.9:34728" +"2019-04-22 06:17:54.795 UTC [policies] Evaluate -> DEBU 1561 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:54.795 UTC [policies] Evaluate -> DEBU 1562 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.795 UTC [policies] Evaluate -> DEBU 1563 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:54.796 UTC [policies] Evaluate -> DEBU 1564 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.796 UTC [policies] Evaluate -> DEBU 1565 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:54.796 UTC [cauthdsl] func1 -> DEBU 1566 0xc00125c330 gate 1555913874796838100 evaluation starts" +"2019-04-22 06:17:54.797 UTC [cauthdsl] func2 -> DEBU 1567 0xc00125c330 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.797 UTC [cauthdsl] func2 -> DEBU 1568 0xc00125c330 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:54.797 UTC [cauthdsl] func2 -> DEBU 1569 0xc00125c330 principal matched by identity 0" +"2019-04-22 06:17:54.797 UTC [msp.identity] Verify -> DEBU 156a Verify: digest = 00000000 c2 32 90 a5 cc b0 57 d8 e2 83 65 0b 53 1f 85 1e |.2....W...e.S...| +00000010 d5 ea cc 82 89 9c f1 5e 34 af 59 36 26 59 a9 5e |.......^4.Y6&Y.^|" +"2019-04-22 06:17:54.798 UTC [msp.identity] Verify -> DEBU 156b Verify: sig = 00000000 30 45 02 21 00 c4 0a 7c 3f f0 cd 1f 35 16 a7 91 |0E.!...|?...5...| +00000010 a4 eb 5e 37 4e a0 bc 31 9d 0e f4 83 73 f6 11 f5 |..^7N..1....s...| +00000020 cd 9b 9f fa 0e 02 20 27 18 70 d0 16 bd cb 1c 2d |...... '.p.....-| +00000030 44 3c 1b 19 de 2c a6 a2 06 a9 c9 9e 02 15 27 f6 |D<...,........'.| +00000040 7e 8b 2a 53 af 98 77 |~.*S..w|" +"2019-04-22 06:17:54.798 UTC [cauthdsl] func2 -> DEBU 156c 0xc00125c330 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:54.798 UTC [cauthdsl] func1 -> DEBU 156d 0xc00125c330 gate 1555913874796838100 evaluation succeeds" +"2019-04-22 06:17:54.799 UTC [policies] Evaluate -> DEBU 156e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.799 UTC [policies] Evaluate -> DEBU 156f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.799 UTC [policies] Evaluate -> DEBU 1570 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.800 UTC [policies] Evaluate -> DEBU 1571 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.800 UTC [policies] Evaluate -> DEBU 1572 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:54.801 UTC [policies] Evaluate -> DEBU 1573 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:54.801 UTC [common.deliver] deliverBlocks -> DEBU 1574 [channel: testchainid] Received seekInfo (0xc000d13a40) start: > stop: > from 192.168.224.9:34728" +"2019-04-22 06:17:54.801 UTC [fsblkstorage] Next -> DEBU 1575 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:17:54.802 UTC [fsblkstorage] newBlockfileStream -> DEBU 1576 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-04-22 06:17:54.802 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1577 Remaining bytes=[25828], Going to peek [8] bytes" +"2019-04-22 06:17:54.802 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1578 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-04-22 06:17:54.802 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1579 blockbytes [25825] read from file [0]" +"2019-04-22 06:17:54.803 UTC [common.deliver] deliverBlocks -> DEBU 157a [channel: testchainid] Delivering block [1] for (0xc000d13a40) for 192.168.224.9:34728" +"2019-04-22 06:17:54.803 UTC [common.deliver] deliverBlocks -> DEBU 157b [channel: testchainid] Done delivering to 192.168.224.9:34728 for (0xc000d13a40)" +"2019-04-22 06:17:54.804 UTC [common.deliver] Handle -> DEBU 157c Waiting for new SeekInfo from 192.168.224.9:34728" +"2019-04-22 06:17:54.804 UTC [common.deliver] Handle -> DEBU 157d Attempting to read seek info message from 192.168.224.9:34728" +"2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 157e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 157f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 1580 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:54.806 UTC [policies] Evaluate -> DEBU 1581 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.807 UTC [policies] Evaluate -> DEBU 1582 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:54.807 UTC [cauthdsl] func1 -> DEBU 1583 0xc001268370 gate 1555913874807379600 evaluation starts" +"2019-04-22 06:17:54.807 UTC [cauthdsl] func2 -> DEBU 1584 0xc001268370 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.807 UTC [cauthdsl] func2 -> DEBU 1585 0xc001268370 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:54.808 UTC [cauthdsl] func2 -> DEBU 1586 0xc001268370 principal matched by identity 0" +"2019-04-22 06:17:54.808 UTC [msp.identity] Verify -> DEBU 1587 Verify: digest = 00000000 c6 e0 ac d3 04 a7 b6 98 ea bc c2 1b b6 92 cc b5 |................| +00000010 ba fa 43 a5 5d 3b cd 44 b4 02 70 d3 33 39 44 51 |..C.];.D..p.39DQ|" +"2019-04-22 06:17:54.809 UTC [msp.identity] Verify -> DEBU 1588 Verify: sig = 00000000 30 45 02 21 00 b1 24 e8 c4 23 a3 e8 4c 8d 9b 22 |0E.!..$..#..L.."| +00000010 46 6c 33 af 51 5b 1b 11 e1 85 59 4f da ba d8 f0 |Fl3.Q[....YO....| +00000020 95 27 be 74 9a 02 20 6b 6e 91 47 99 87 59 ac d3 |.'.t.. kn.G..Y..| +00000030 0e cf b0 84 13 13 0a 03 70 d8 dc 75 a2 0d a9 78 |........p..u...x| +00000040 d9 3f 4c 69 15 d5 9b |.?Li...|" +"2019-04-22 06:17:54.810 UTC [cauthdsl] func2 -> DEBU 1589 0xc001268370 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:54.810 UTC [cauthdsl] func1 -> DEBU 158a 0xc001268370 gate 1555913874807379600 evaluation succeeds" +"2019-04-22 06:17:54.811 UTC [policies] Evaluate -> DEBU 158b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.811 UTC [policies] Evaluate -> DEBU 158c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:54.812 UTC [policies] Evaluate -> DEBU 158d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.812 UTC [policies] Evaluate -> DEBU 158e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:54.813 UTC [policies] Evaluate -> DEBU 158f Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:54.813 UTC [policies] Evaluate -> DEBU 1590 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:54.814 UTC [common.deliver] deliverBlocks -> DEBU 1591 [channel: testchainid] Received seekInfo (0xc000d13e80) start: > stop: > from 192.168.224.9:34728" +"2019-04-22 06:17:54.814 UTC [fsblkstorage] Next -> DEBU 1592 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:17:54.815 UTC [fsblkstorage] newBlockfileStream -> DEBU 1593 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:17:54.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1594 Remaining bytes=[44243], Going to peek [8] bytes" +"2019-04-22 06:17:54.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1595 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:17:54.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1596 blockbytes [18412] read from file [0]" +"2019-04-22 06:17:54.816 UTC [common.deliver] deliverBlocks -> DEBU 1597 [channel: testchainid] Delivering block [0] for (0xc000d13e80) for 192.168.224.9:34728" +"2019-04-22 06:17:54.817 UTC [common.deliver] deliverBlocks -> DEBU 1598 [channel: testchainid] Done delivering to 192.168.224.9:34728 for (0xc000d13e80)" +"2019-04-22 06:17:54.817 UTC [common.deliver] Handle -> DEBU 1599 Waiting for new SeekInfo from 192.168.224.9:34728" +"2019-04-22 06:17:54.818 UTC [common.deliver] Handle -> DEBU 159a Attempting to read seek info message from 192.168.224.9:34728" +"2019-04-22 06:17:54.829 UTC [common.deliver] Handle -> WARN 159b Error reading from 192.168.224.9:34728: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:54.830 UTC [orderer.common.server] func1 -> DEBU 159c Closing Deliver stream" +"2019-04-22 06:17:54.830 UTC [comm.grpc.server] 1 -> INFO 159d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34728 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.7249ms +"2019-04-22 06:17:54.829 UTC [grpc] infof -> DEBU 159e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:55.040 UTC [orderer.common.server] Deliver -> DEBU 159f Starting new Deliver handler" +"2019-04-22 06:17:55.040 UTC [common.deliver] Handle -> DEBU 15a0 Starting new deliver loop for 192.168.224.9:34730" +"2019-04-22 06:17:55.040 UTC [common.deliver] Handle -> DEBU 15a1 Attempting to read seek info message from 192.168.224.9:34730" +"2019-04-22 06:17:55.041 UTC [policies] Evaluate -> DEBU 15a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:55.042 UTC [policies] Evaluate -> DEBU 15a6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:55.042 UTC [cauthdsl] func1 -> DEBU 15a7 0xc001344840 gate 1555913875042953100 evaluation starts" +"2019-04-22 06:17:55.043 UTC [cauthdsl] func2 -> DEBU 15a8 0xc001344840 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:55.043 UTC [cauthdsl] func2 -> DEBU 15a9 0xc001344840 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:55.043 UTC [cauthdsl] func2 -> DEBU 15aa 0xc001344840 principal matched by identity 0" +"2019-04-22 06:17:55.044 UTC [msp.identity] Verify -> DEBU 15ab Verify: digest = 00000000 7f b6 9a 93 ff 1f ce da e4 eb cd 7c 31 c6 7d a2 |...........|1.}.| +00000010 97 75 34 8a 3b 53 5c 4b 42 85 4b 1a fd e8 a3 26 |.u4.;S\KB.K....&|" +"2019-04-22 06:17:55.044 UTC [msp.identity] Verify -> DEBU 15ac Verify: sig = 00000000 30 45 02 21 00 dd c7 59 b7 48 ea 67 f7 17 e0 ac |0E.!...Y.H.g....| +00000010 37 84 20 53 29 f0 9a d6 89 b2 9e cb 98 a8 df 29 |7. S)..........)| +00000020 f9 13 75 57 04 02 20 51 02 07 0a e3 eb b0 dd a0 |..uW.. Q........| +00000030 8b 14 fb 43 14 0b cb cc e6 2e ff d7 be 6a d3 5a |...C.........j.Z| +00000040 c7 ef 94 e8 50 2c 4e |....P,N|" +"2019-04-22 06:17:55.044 UTC [cauthdsl] func2 -> DEBU 15ad 0xc001344840 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:55.044 UTC [cauthdsl] func1 -> DEBU 15ae 0xc001344840 gate 1555913875042953100 evaluation succeeds" +"2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15af Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15b1 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:55.045 UTC [policies] Evaluate -> DEBU 15b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:55.046 UTC [policies] Evaluate -> DEBU 15b3 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:55.046 UTC [policies] Evaluate -> DEBU 15b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:55.046 UTC [common.deliver] deliverBlocks -> DEBU 15b5 [channel: testchainid] Received seekInfo (0xc000259340) start: > stop: > from 192.168.224.9:34730" +"2019-04-22 06:17:55.046 UTC [fsblkstorage] Next -> DEBU 15b6 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:17:55.047 UTC [fsblkstorage] newBlockfileStream -> DEBU 15b7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:17:55.047 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15b8 Remaining bytes=[44243], Going to peek [8] bytes" +"2019-04-22 06:17:55.047 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15b9 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:17:55.048 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15ba blockbytes [18412] read from file [0]" +"2019-04-22 06:17:55.049 UTC [common.deliver] deliverBlocks -> DEBU 15bb [channel: testchainid] Delivering block [0] for (0xc000259340) for 192.168.224.9:34730" +"2019-04-22 06:17:55.050 UTC [common.deliver] deliverBlocks -> DEBU 15bc [channel: testchainid] Done delivering to 192.168.224.9:34730 for (0xc000259340)" +"2019-04-22 06:17:55.051 UTC [common.deliver] Handle -> DEBU 15bd Waiting for new SeekInfo from 192.168.224.9:34730" +"2019-04-22 06:17:55.052 UTC [common.deliver] Handle -> DEBU 15be Attempting to read seek info message from 192.168.224.9:34730" +"2019-04-22 06:17:55.072 UTC [common.deliver] Handle -> WARN 15bf Error reading from 192.168.224.9:34730: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:55.073 UTC [orderer.common.server] func1 -> DEBU 15c0 Closing Deliver stream" +"2019-04-22 06:17:55.073 UTC [comm.grpc.server] 1 -> INFO 15c1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34730 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.0478ms +"2019-04-22 06:17:55.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15c2 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +"2019-04-22 06:17:55.078 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15c5 Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +"2019-04-22 06:17:55.079 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.7µs " +"2019-04-22 06:17:55.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15c4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:55.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265µs " +"2019-04-22 06:17:55.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15c7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:55.069 UTC [grpc] infof -> DEBU 15c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:55.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15c9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:55.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15ca Sending msg of 28 bytes to 3 on channel testchainid took 35µs" +"2019-04-22 06:17:55.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.3µs " +"2019-04-22 06:17:55.303 UTC [orderer.common.server] Deliver -> DEBU 15cc Starting new Deliver handler" +"2019-04-22 06:17:55.304 UTC [common.deliver] Handle -> DEBU 15cd Starting new deliver loop for 192.168.224.9:34732" +"2019-04-22 06:17:55.304 UTC [common.deliver] Handle -> DEBU 15ce Attempting to read seek info message from 192.168.224.9:34732" +"2019-04-22 06:17:55.305 UTC [policies] Evaluate -> DEBU 15cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:17:55.306 UTC [policies] Evaluate -> DEBU 15d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:55.306 UTC [policies] Evaluate -> DEBU 15d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:17:55.307 UTC [policies] Evaluate -> DEBU 15d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:55.307 UTC [policies] Evaluate -> DEBU 15d3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:17:55.307 UTC [cauthdsl] func1 -> DEBU 15d4 0xc001347400 gate 1555913875307867000 evaluation starts" +"2019-04-22 06:17:55.308 UTC [cauthdsl] func2 -> DEBU 15d5 0xc001347400 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:55.308 UTC [cauthdsl] func2 -> DEBU 15d6 0xc001347400 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:17:55.308 UTC [cauthdsl] func2 -> DEBU 15d7 0xc001347400 principal matched by identity 0" +"2019-04-22 06:17:55.309 UTC [msp.identity] Verify -> DEBU 15d8 Verify: digest = 00000000 a0 27 70 eb c4 dc bc 86 54 02 e2 8b cf 41 2e 3f |.'p.....T....A.?| +00000010 15 4a 1b f6 e0 8c 40 1f 8a c3 6c 47 8a d8 fa 07 |.J....@...lG....|" +"2019-04-22 06:17:55.309 UTC [msp.identity] Verify -> DEBU 15d9 Verify: sig = 00000000 30 45 02 21 00 f9 ff 90 10 1f 22 be 8a d4 18 06 |0E.!......".....| +00000010 84 6d cf 69 89 94 e7 b0 27 65 50 c9 69 48 00 e1 |.m.i....'eP.iH..| +00000020 20 00 e1 60 12 02 20 68 62 95 71 c5 5d 08 37 ea | ..`.. hb.q.].7.| +00000030 7c 22 bd 48 c7 3c 7b 7e 42 1c 84 be 94 03 d8 dd ||".H.<{~B.......| +00000040 f0 dd a5 69 6c 0b c4 |...il..|" +"2019-04-22 06:17:55.309 UTC [cauthdsl] func2 -> DEBU 15da 0xc001347400 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:55.310 UTC [cauthdsl] func1 -> DEBU 15db 0xc001347400 gate 1555913875307867000 evaluation succeeds" +"2019-04-22 06:17:55.310 UTC [policies] Evaluate -> DEBU 15dc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:55.311 UTC [policies] Evaluate -> DEBU 15dd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:17:55.311 UTC [policies] Evaluate -> DEBU 15de Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:17:55.311 UTC [policies] Evaluate -> DEBU 15df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:17:55.312 UTC [policies] Evaluate -> DEBU 15e0 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:17:55.312 UTC [policies] Evaluate -> DEBU 15e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:17:55.312 UTC [common.deliver] deliverBlocks -> DEBU 15e2 [channel: testchainid] Received seekInfo (0xc0004164c0) start: > stop: > from 192.168.224.9:34732" +"2019-04-22 06:17:55.313 UTC [fsblkstorage] Next -> DEBU 15e3 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:17:55.313 UTC [fsblkstorage] newBlockfileStream -> DEBU 15e4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-04-22 06:17:55.313 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15e5 Remaining bytes=[25828], Going to peek [8] bytes" +"2019-04-22 06:17:55.314 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15e6 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-04-22 06:17:55.315 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 15e7 blockbytes [25825] read from file [0]" +"2019-04-22 06:17:55.315 UTC [common.deliver] deliverBlocks -> DEBU 15e8 [channel: testchainid] Delivering block [1] for (0xc0004164c0) for 192.168.224.9:34732" +"2019-04-22 06:17:55.316 UTC [common.deliver] deliverBlocks -> DEBU 15e9 [channel: testchainid] Done delivering to 192.168.224.9:34732 for (0xc0004164c0)" +"2019-04-22 06:17:55.317 UTC [common.deliver] Handle -> DEBU 15ea Waiting for new SeekInfo from 192.168.224.9:34732" +"2019-04-22 06:17:55.317 UTC [common.deliver] Handle -> DEBU 15eb Attempting to read seek info message from 192.168.224.9:34732" +"2019-04-22 06:17:55.325 UTC [common.deliver] Handle -> WARN 15ec Error reading from 192.168.224.9:34732: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:17:55.325 UTC [orderer.common.server] func1 -> DEBU 15ee Closing Deliver stream" +"2019-04-22 06:17:55.326 UTC [comm.grpc.server] 1 -> INFO 15ef streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34732 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.7476ms +"2019-04-22 06:17:55.325 UTC [grpc] infof -> DEBU 15ed transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:55.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f0 Sending msg of 28 bytes to 2 on channel businesschannel took 77.2µs" +"2019-04-22 06:17:55.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f1 Sending msg of 28 bytes to 3 on channel businesschannel took 32.8µs" +"2019-04-22 06:17:55.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.3µs " +"2019-04-22 06:17:55.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.7µs " +"2019-04-22 06:17:55.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:55.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:55.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15f6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:55.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f7 Sending msg of 28 bytes to 3 on channel testchainid took 32.1µs" +"2019-04-22 06:17:55.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 197.4µs " +"2019-04-22 06:17:56.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15f9 Sending msg of 28 bytes to 2 on channel businesschannel took 58.2µs" +"2019-04-22 06:17:56.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 15fb Sending msg of 28 bytes to 3 on channel businesschannel took 42.7µs" +"2019-04-22 06:17:56.073 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.1µs " +"2019-04-22 06:17:56.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 15fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.8µs " +"2019-04-22 06:17:56.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fd Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:56.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15fe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:56.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 15ff Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:56.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1600 Sending msg of 28 bytes to 3 on channel testchainid took 523.5µs" +"2019-04-22 06:17:56.237 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1601 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.7µs " +"2019-04-22 06:17:56.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1602 Sending msg of 28 bytes to 2 on channel businesschannel took 29.5µs" +"2019-04-22 06:17:56.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1604 Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" +"2019-04-22 06:17:56.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1605 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150µs " +"2019-04-22 06:17:56.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1603 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.9µs " +"2019-04-22 06:17:56.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1606 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:56.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1607 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:56.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1608 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:56.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1609 Sending msg of 28 bytes to 3 on channel testchainid took 30.8µs" +"2019-04-22 06:17:56.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.2µs " +"2019-04-22 06:17:57.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160b Sending msg of 28 bytes to 2 on channel businesschannel took 35.9µs" +"2019-04-22 06:17:57.080 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 160d Sending msg of 28 bytes to 3 on channel businesschannel took 956.7µs" +"2019-04-22 06:17:57.082 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 744.9µs " +"2019-04-22 06:17:57.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 160c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 758.6µs " +"2019-04-22 06:17:57.089 UTC [orderer.common.cluster.step] handleMessage -> DEBU 160f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:57.091 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1610 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:57.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1611 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:57.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1612 Sending msg of 28 bytes to 3 on channel testchainid took 29.6µs" +"2019-04-22 06:17:57.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1613 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.4µs " +"2019-04-22 06:17:57.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1614 Sending msg of 28 bytes to 2 on channel businesschannel took 36.2µs" +"2019-04-22 06:17:57.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1616 Sending msg of 28 bytes to 3 on channel businesschannel took 26.1µs" +"2019-04-22 06:17:57.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1617 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.5µs " +"2019-04-22 06:17:57.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1615 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.6µs " +"2019-04-22 06:17:57.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1618 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:57.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1619 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:57.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 161a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:57.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161b Sending msg of 28 bytes to 3 on channel testchainid took 27.7µs" +"2019-04-22 06:17:57.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.5µs " +"2019-04-22 06:17:58.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161d Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +"2019-04-22 06:17:58.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 161e Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +"2019-04-22 06:17:58.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 161f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.1µs " +"2019-04-22 06:17:58.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1620 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +"2019-04-22 06:17:58.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1621 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:58.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1622 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:58.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1623 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:58.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1624 Sending msg of 28 bytes to 3 on channel testchainid took 42.8µs" +"2019-04-22 06:17:58.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1625 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.5µs " +"2019-04-22 06:17:58.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1626 Sending msg of 28 bytes to 2 on channel businesschannel took 53.1µs" +"2019-04-22 06:17:58.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1628 Sending msg of 28 bytes to 3 on channel businesschannel took 49.8µs" +"2019-04-22 06:17:58.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1627 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 456.6µs " +"2019-04-22 06:17:58.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1629 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 326.6µs " +"2019-04-22 06:17:58.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:58.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:58.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 162c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:58.731 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162d Sending msg of 28 bytes to 3 on channel testchainid took 37µs" +"2019-04-22 06:17:58.732 UTC [orderer.common.cluster.step] sendMessage -> DEBU 162e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.9µs " +"2019-04-22 06:17:59.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 162f Sending msg of 28 bytes to 3 on channel businesschannel took 54.9µs" +"2019-04-22 06:17:59.073 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1630 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 577.5µs " +"2019-04-22 06:17:59.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1631 Sending msg of 28 bytes to 2 on channel businesschannel took 52.4µs" +"2019-04-22 06:17:59.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1632 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2641ms " +"2019-04-22 06:17:59.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1633 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:59.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1634 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:59.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1635 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:59.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1636 Sending msg of 28 bytes to 3 on channel testchainid took 24.7µs" +"2019-04-22 06:17:59.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1637 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 191.4µs " +"2019-04-22 06:17:59.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1638 Sending msg of 28 bytes to 3 on channel businesschannel took 39.5µs" +"2019-04-22 06:17:59.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1639 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" +"2019-04-22 06:17:59.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 150.6µs " +"2019-04-22 06:17:59.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 163b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188.3µs " +"2019-04-22 06:17:59.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:59.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:17:59.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 163e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:17:59.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 163f Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +"2019-04-22 06:17:59.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1640 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.7µs " +"2019-04-22 06:18:00.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1641 Sending msg of 28 bytes to 2 on channel businesschannel took 63.4µs" +"2019-04-22 06:18:00.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1642 Sending msg of 28 bytes to 3 on channel businesschannel took 46.9µs" +"2019-04-22 06:18:00.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1643 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4527ms " +"2019-04-22 06:18:00.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1644 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 669.9µs " +"2019-04-22 06:18:00.083 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1645 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:00.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1646 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:00.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1647 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:00.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1648 Sending msg of 28 bytes to 3 on channel testchainid took 79.5µs" +"2019-04-22 06:18:00.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1649 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.7µs " +"2019-04-22 06:18:00.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164a Sending msg of 28 bytes to 2 on channel businesschannel took 30.5µs" +"2019-04-22 06:18:00.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 164b Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +"2019-04-22 06:18:00.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.5µs " +"2019-04-22 06:18:00.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 164d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.1µs " +"2019-04-22 06:18:00.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:00.583 UTC [orderer.common.cluster.step] handleMessage -> DEBU 164f Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:00.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1650 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:00.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1651 Sending msg of 28 bytes to 3 on channel testchainid took 28.8µs" +"2019-04-22 06:18:00.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1652 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +"2019-04-22 06:18:01.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1653 Sending msg of 28 bytes to 2 on channel businesschannel took 55.1µs" +"2019-04-22 06:18:01.076 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1654 Sending msg of 28 bytes to 3 on channel businesschannel took 46.7µs" +"2019-04-22 06:18:01.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1655 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.2µs " +"2019-04-22 06:18:01.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1656 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.3µs " +"2019-04-22 06:18:01.088 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1657 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:01.089 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1658 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:01.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1659 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:01.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165a Sending msg of 28 bytes to 3 on channel testchainid took 32.5µs" +"2019-04-22 06:18:01.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +"2019-04-22 06:18:01.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165c Sending msg of 28 bytes to 2 on channel businesschannel took 160.9µs" +"2019-04-22 06:18:01.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 165d Sending msg of 28 bytes to 3 on channel businesschannel took 159.5µs" +"2019-04-22 06:18:01.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 358.1µs " +"2019-04-22 06:18:01.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 165f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 468.5µs " +"2019-04-22 06:18:01.585 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1660 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:01.586 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1661 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:01.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1662 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:01.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1663 Sending msg of 28 bytes to 3 on channel testchainid took 127.4µs" +"2019-04-22 06:18:01.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1664 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92µs " +"2019-04-22 06:18:02.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1665 Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +"2019-04-22 06:18:02.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1666 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2019-04-22 06:18:02.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1667 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.1µs " +"2019-04-22 06:18:02.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1668 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.3µs " +"2019-04-22 06:18:02.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1669 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:02.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:02.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 166b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:02.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166c Sending msg of 28 bytes to 3 on channel testchainid took 32.8µs" +"2019-04-22 06:18:02.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 166d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.6µs " +"2019-04-22 06:18:02.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166e Sending msg of 28 bytes to 2 on channel businesschannel took 40.1µs" +"2019-04-22 06:18:02.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 166f Sending msg of 28 bytes to 3 on channel businesschannel took 29.2µs" +"2019-04-22 06:18:02.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1670 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 137.9µs " +"2019-04-22 06:18:02.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1671 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.2µs " +"2019-04-22 06:18:02.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1672 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:02.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1673 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:02.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1674 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:02.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1675 Sending msg of 28 bytes to 3 on channel testchainid took 56.2µs" +"2019-04-22 06:18:02.732 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1676 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5273ms " +"2019-04-22 06:18:03.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1677 Sending msg of 28 bytes to 2 on channel businesschannel took 30.1µs" +"2019-04-22 06:18:03.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1678 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 299.4µs " +"2019-04-22 06:18:03.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1679 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 167a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103µs " +"2019-04-22 06:18:03.073 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 167b Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +"2019-04-22 06:18:03.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 167c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.158 UTC [orderer.common.server] Deliver -> DEBU 167d Starting new Deliver handler" +"2019-04-22 06:18:03.159 UTC [common.deliver] Handle -> DEBU 167e Starting new deliver loop for 192.168.224.9:34734" +"2019-04-22 06:18:03.160 UTC [common.deliver] Handle -> DEBU 167f Attempting to read seek info message from 192.168.224.9:34734" +"2019-04-22 06:18:03.173 UTC [orderer.common.server] Broadcast -> DEBU 1680 Starting new Broadcast handler" +"2019-04-22 06:18:03.174 UTC [orderer.common.broadcast] Handle -> DEBU 1681 Starting new broadcast loop for 192.168.224.9:34736" +"2019-04-22 06:18:03.175 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1682 [channel: businesschannel] Broadcast is processing config update message from 192.168.224.9:34736" +"2019-04-22 06:18:03.175 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 1683 Processing config update message for channel businesschannel" +"2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1684 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1685 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1686 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1687 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.175 UTC [policies] Evaluate -> DEBU 1688 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:18:03.175 UTC [cauthdsl] func1 -> DEBU 1689 0xc00105dc00 gate 1555913883175666500 evaluation starts" +"2019-04-22 06:18:03.175 UTC [cauthdsl] func2 -> DEBU 168a 0xc00105dc00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.175 UTC [cauthdsl] func2 -> DEBU 168b 0xc00105dc00 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.175 UTC [cauthdsl] func2 -> DEBU 168c 0xc00105dc00 principal matched by identity 0" +"2019-04-22 06:18:03.175 UTC [msp.identity] Verify -> DEBU 168d Verify: digest = 00000000 fb 29 18 1a 8e b9 2e e7 c2 d4 57 c2 93 71 af d6 |.)........W..q..| +00000010 d2 8f 55 88 f6 f1 7a b5 7c 04 a9 13 83 c9 28 c4 |..U...z.|.....(.|" +"2019-04-22 06:18:03.175 UTC [msp.identity] Verify -> DEBU 168e Verify: sig = 00000000 30 45 02 21 00 95 bc 46 50 b4 2e fd 43 db df 26 |0E.!...FP...C..&| +00000010 2e 76 67 57 8c 12 7d 7e 1a fd db 4c 80 b4 ae 4e |.vgW..}~...L...N| +00000020 0a 67 fd 73 11 02 20 60 24 3d d3 50 10 7e a0 b8 |.g.s.. `$=.P.~..| +00000030 20 10 78 fb 06 f8 be 23 b5 87 b1 26 95 70 e6 05 | .x....#...&.p..| +00000040 41 a6 97 21 24 59 29 |A..!$Y)|" +"2019-04-22 06:18:03.176 UTC [cauthdsl] func2 -> DEBU 168f 0xc00105dc00 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.176 UTC [cauthdsl] func1 -> DEBU 1690 0xc00105dc00 gate 1555913883175666500 evaluation succeeds" +"2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1691 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1692 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1693 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1694 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1695 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:18:03.176 UTC [policies] Evaluate -> DEBU 1696 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 1697 Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 1698 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 1699 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169a Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169b Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169c Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169d Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169e Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.176 UTC [common.configtx] addToMap -> DEBU 169f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a0 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a1 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a2 Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a3 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a6 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a7 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16a9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16aa Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ab Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ac Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ad Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16ae Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16af Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.177 UTC [common.configtx] addToMap -> DEBU 16b0 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.178 UTC [common.configtx] addToMap -> DEBU 16b1 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.178 UTC [common.configtx] addToMap -> DEBU 16b2 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b4 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b5 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.178 UTC [common.configtx] verifyDeltaSet -> DEBU 16b6 Processing change to key: [Group] /Channel/Application" +"2019-04-22 06:18:03.178 UTC [common.configtx] policyForItem -> DEBU 16b7 Getting policy for item Application with mod_policy Admins" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16b8 Manager Channel looking up path []" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16b9 Manager Channel has managers Application" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16ba Manager Channel has managers Orderer" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bb Manager Channel looking up path [Application]" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bc Manager Channel has managers Application" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bd Manager Channel has managers Orderer" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16be Manager Channel/Application looking up path []" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16bf Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:18:03.178 UTC [policies] Manager -> DEBU 16c0 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:18:03.178 UTC [policies] Evaluate -> DEBU 16c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-04-22 06:18:03.178 UTC [policies] Evaluate -> DEBU 16c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.179 UTC [policies] Evaluate -> DEBU 16c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-04-22 06:18:03.179 UTC [cauthdsl] deduplicate -> WARN 16c4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:18:03.179 UTC [cauthdsl] func1 -> DEBU 16c5 0xc001286600 gate 1555913883179522200 evaluation starts" +"2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c6 0xc001286600 signed by 0 principal evaluation starts (used [false false false])" +"2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c7 0xc001286600 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c8 0xc001286600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16c9 0xc001286600 processing identity 1 with bytes of ebaeb0" +"2019-04-22 06:18:03.179 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16ca Checking if identity satisfies ADMIN role for Org2MSP" +"2019-04-22 06:18:03.179 UTC [cauthdsl] func2 -> DEBU 16cb 0xc001286600 principal matched by identity 1" +"2019-04-22 06:18:03.179 UTC [msp.identity] Verify -> DEBU 16cc Verify: digest = 00000000 0c fd 1f e5 b1 9b db 02 57 c4 82 57 bc d0 0c 4b |........W..W...K| +00000010 97 87 a9 3b ca 23 a8 c2 03 3c f3 1a f8 a3 07 57 |...;.#...<.....W|" +"2019-04-22 06:18:03.179 UTC [msp.identity] Verify -> DEBU 16cd Verify: sig = 00000000 30 45 02 21 00 d6 e0 8c 37 df 62 cb 69 f9 ca 73 |0E.!....7.b.i..s| +00000010 04 64 61 bf 99 26 93 ca 3d 45 f6 6f 0f 3d b9 61 |.da..&..=E.o.=.a| +00000020 7a af 77 b9 12 02 20 4a 16 64 bd 85 6e 43 d5 e7 |z.w... J.d..nC..| +00000030 28 07 12 4c 58 19 bf 43 c2 12 88 2a bf 28 75 09 |(..LX..C...*.(u.| +00000040 a5 e6 fa 2b 77 6d e3 |...+wm.|" +"2019-04-22 06:18:03.180 UTC [cauthdsl] func2 -> DEBU 16ce 0xc001286600 principal evaluation succeeds for identity 1" +"2019-04-22 06:18:03.180 UTC [cauthdsl] func1 -> DEBU 16cf 0xc001286600 gate 1555913883179522200 evaluation succeeds" +"2019-04-22 06:18:03.180 UTC [policies] Evaluate -> DEBU 16d0 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.180 UTC [policies] Evaluate -> DEBU 16d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.180 UTC [policies] Evaluate -> DEBU 16d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:18:03.180 UTC [cauthdsl] deduplicate -> WARN 16d3 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:18:03.180 UTC [cauthdsl] func1 -> DEBU 16d4 0xc001286cf0 gate 1555913883180445600 evaluation starts" +"2019-04-22 06:18:03.180 UTC [cauthdsl] func2 -> DEBU 16d5 0xc001286cf0 signed by 0 principal evaluation starts (used [false false false])" +"2019-04-22 06:18:03.180 UTC [cauthdsl] func2 -> DEBU 16d6 0xc001286cf0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.180 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 16d7 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-04-22 06:18:03.181 UTC [cauthdsl] func2 -> DEBU 16d8 0xc001286cf0 principal matched by identity 0" +"2019-04-22 06:18:03.181 UTC [msp.identity] Verify -> DEBU 16d9 Verify: digest = 00000000 8e 73 57 0e b7 c7 1b 71 9b 02 5f bd 37 50 74 25 |.sW....q.._.7Pt%| +00000010 06 6a 52 6c ef f6 86 21 8c 54 e2 73 5f 3d 4d 90 |.jRl...!.T.s_=M.|" +"2019-04-22 06:18:03.181 UTC [msp.identity] Verify -> DEBU 16da Verify: sig = 00000000 30 45 02 21 00 f2 fa 21 f5 b5 4e 2e de a8 55 bd |0E.!...!..N...U.| +00000010 a8 cc 6e 98 b5 33 37 87 be c9 27 42 cf 21 2b 5f |..n..37...'B.!+_| +00000020 54 69 eb ed 1a 02 20 0b 2a d2 c7 e1 11 a3 64 cc |Ti.... .*.....d.| +00000030 0e 42 62 c5 f0 de 23 74 4d 0c 1a 46 43 50 06 27 |.Bb...#tM..FCP.'| +00000040 0b 25 bf 2c 59 22 e1 |.%.,Y".|" +"2019-04-22 06:18:03.181 UTC [cauthdsl] func2 -> DEBU 16db 0xc001286cf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.181 UTC [cauthdsl] func1 -> DEBU 16dc 0xc001286cf0 gate 1555913883180445600 evaluation succeeds" +"2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16dd Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16df Signature set satisfies policy /Channel/Application/Admins" +"2019-04-22 06:18:03.181 UTC [policies] Evaluate -> DEBU 16e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-04-22 06:18:03.181 UTC [common.configtx] verifyDeltaSet -> DEBU 16e1 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.181 UTC [common.configtx] verifyDeltaSet -> DEBU 16e2 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.181 UTC [common.configtx] verifyDeltaSet -> DEBU 16e3 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e7 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e8 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16e9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16ea Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16eb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16ec Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.182 UTC [common.configtx] recurseConfigMap -> DEBU 16ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16ef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f0 Setting policy for key Writers to " +"2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f1 Setting policy for key Admins to " +"2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f2 Setting policy for key Endorsement to " +"2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f3 Setting policy for key LifecycleEndorsement to " +"2019-04-22 06:18:03.183 UTC [common.configtx] recurseConfigMap -> DEBU 16f4 Setting policy for key Readers to " +"2019-04-22 06:18:03.188 UTC [common.configtx] recurseConfigMap -> DEBU 16f5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f7 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f8 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.189 UTC [common.configtx] recurseConfigMap -> DEBU 16f9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.190 UTC [common.configtx] recurseConfigMap -> DEBU 16fa Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.190 UTC [common.configtx] recurseConfigMap -> DEBU 16fb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.190 UTC [common.configtx] recurseConfigMap -> DEBU 16fc Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.191 UTC [common.configtx] recurseConfigMap -> DEBU 16fd Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.191 UTC [common.configtx] recurseConfigMap -> DEBU 16fe Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.191 UTC [common.channelconfig] NewStandardValues -> DEBU 16ff Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:18:03.191 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1700 Processing field: HashingAlgorithm" +"2019-04-22 06:18:03.191 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1701 Processing field: BlockDataHashingStructure" +"2019-04-22 06:18:03.191 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1702 Processing field: OrdererAddresses" +"2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1703 Processing field: Consortium" +"2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1704 Processing field: Capabilities" +"2019-04-22 06:18:03.192 UTC [common.channelconfig] NewStandardValues -> DEBU 1705 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1706 Processing field: ACLs" +"2019-04-22 06:18:03.192 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1707 Processing field: Capabilities" +"2019-04-22 06:18:03.192 UTC [common.channelconfig] NewStandardValues -> DEBU 1708 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.193 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1709 Processing field: AnchorPeers" +"2019-04-22 06:18:03.193 UTC [common.channelconfig] NewStandardValues -> DEBU 170a Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.193 UTC [common.channelconfig] initializeProtosStruct -> DEBU 170b Processing field: MSP" +"2019-04-22 06:18:03.193 UTC [common.channelconfig] Validate -> DEBU 170c Anchor peers for org Org2MSP are anchor_peers: " +"2019-04-22 06:18:03.194 UTC [common.channelconfig] validateMSP -> DEBU 170d Setting up MSP for org Org2MSP" +"2019-04-22 06:18:03.194 UTC [msp] newBccspMsp -> DEBU 170e Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.194 UTC [msp] New -> DEBU 170f Creating Cache-MSP instance" +"2019-04-22 06:18:03.194 UTC [msp] Setup -> DEBU 1710 Setting up MSP instance Org2MSP" +"2019-04-22 06:18:03.195 UTC [msp.identity] newIdentity -> DEBU 1711 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.196 UTC [msp.identity] newIdentity -> DEBU 1712 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.196 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1713 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:18:03.197 UTC [msp] Validate -> DEBU 1714 MSP Org2MSP validating identity" +"2019-04-22 06:18:03.201 UTC [msp] getCertificationChain -> DEBU 1715 MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.202 UTC [msp] hasOURole -> DEBU 1716 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:18:03.202 UTC [msp] getCertificationChain -> DEBU 1717 MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.202 UTC [common.channelconfig] NewStandardValues -> DEBU 1718 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.203 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1719 Processing field: AnchorPeers" +"2019-04-22 06:18:03.203 UTC [common.channelconfig] NewStandardValues -> DEBU 171a Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.204 UTC [common.channelconfig] initializeProtosStruct -> DEBU 171b Processing field: MSP" +"2019-04-22 06:18:03.204 UTC [common.channelconfig] Validate -> DEBU 171c Anchor peers for org Org3MSP are " +"2019-04-22 06:18:03.205 UTC [common.channelconfig] validateMSP -> DEBU 171d Setting up MSP for org Org3MSP" +"2019-04-22 06:18:03.205 UTC [msp] newBccspMsp -> DEBU 171e Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.206 UTC [msp] New -> DEBU 171f Creating Cache-MSP instance" +"2019-04-22 06:18:03.206 UTC [msp] Setup -> DEBU 1720 Setting up MSP instance Org3MSP" +"2019-04-22 06:18:03.207 UTC [msp.identity] newIdentity -> DEBU 1721 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.208 UTC [msp.identity] newIdentity -> DEBU 1722 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.210 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1723 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-04-22 06:18:03.210 UTC [msp] Validate -> DEBU 1724 MSP Org3MSP validating identity" +"2019-04-22 06:18:03.211 UTC [msp] getCertificationChain -> DEBU 1725 MSP Org3MSP getting certification chain" +"2019-04-22 06:18:03.212 UTC [msp] hasOURole -> DEBU 1726 MSP Org3MSP checking if the identity is a client" +"2019-04-22 06:18:03.212 UTC [msp] getCertificationChain -> DEBU 1727 MSP Org3MSP getting certification chain" +"2019-04-22 06:18:03.213 UTC [common.channelconfig] NewStandardValues -> DEBU 1728 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1729 Processing field: AnchorPeers" +"2019-04-22 06:18:03.213 UTC [common.channelconfig] NewStandardValues -> DEBU 172a Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.214 UTC [common.channelconfig] initializeProtosStruct -> DEBU 172b Processing field: MSP" +"2019-04-22 06:18:03.215 UTC [common.channelconfig] Validate -> DEBU 172c Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:18:03.215 UTC [common.channelconfig] validateMSP -> DEBU 172d Setting up MSP for org Org1MSP" +"2019-04-22 06:18:03.216 UTC [msp] newBccspMsp -> DEBU 172e Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.216 UTC [msp] New -> DEBU 172f Creating Cache-MSP instance" +"2019-04-22 06:18:03.216 UTC [msp] Setup -> DEBU 1730 Setting up MSP instance Org1MSP" +"2019-04-22 06:18:03.217 UTC [msp.identity] newIdentity -> DEBU 1731 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.217 UTC [msp.identity] newIdentity -> DEBU 1732 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.219 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1733 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:18:03.219 UTC [msp] Validate -> DEBU 1734 MSP Org1MSP validating identity" +"2019-04-22 06:18:03.220 UTC [msp] getCertificationChain -> DEBU 1735 MSP Org1MSP getting certification chain" +"2019-04-22 06:18:03.220 UTC [msp] hasOURole -> DEBU 1736 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:18:03.221 UTC [msp] getCertificationChain -> DEBU 1737 MSP Org1MSP getting certification chain" +"2019-04-22 06:18:03.221 UTC [common.channelconfig] NewStandardValues -> DEBU 1738 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:18:03.222 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1739 Processing field: ConsensusType" +"2019-04-22 06:18:03.222 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173a Processing field: BatchSize" +"2019-04-22 06:18:03.222 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173b Processing field: BatchTimeout" +"2019-04-22 06:18:03.223 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173c Processing field: KafkaBrokers" +"2019-04-22 06:18:03.223 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173d Processing field: ChannelRestrictions" +"2019-04-22 06:18:03.223 UTC [common.channelconfig] initializeProtosStruct -> DEBU 173e Processing field: Capabilities" +"2019-04-22 06:18:03.223 UTC [common.channelconfig] NewStandardValues -> DEBU 173f Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:18:03.224 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1740 Processing field: Endpoints" +"2019-04-22 06:18:03.224 UTC [common.channelconfig] NewStandardValues -> DEBU 1741 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.225 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1742 Processing field: MSP" +"2019-04-22 06:18:03.225 UTC [common.channelconfig] validateMSP -> DEBU 1743 Setting up MSP for org OrdererOrg" +"2019-04-22 06:18:03.225 UTC [msp] newBccspMsp -> DEBU 1744 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.226 UTC [msp] New -> DEBU 1745 Creating Cache-MSP instance" +"2019-04-22 06:18:03.228 UTC [msp] Setup -> DEBU 1747 Setting up MSP instance OrdererMSP" +"2019-04-22 06:18:03.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1746 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:03.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1748 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2019-04-22 06:18:03.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1749 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.5µs " +"2019-04-22 06:18:03.231 UTC [msp.identity] newIdentity -> DEBU 174a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.232 UTC [msp.identity] newIdentity -> DEBU 174b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.233 UTC [msp] Validate -> DEBU 174c MSP OrdererMSP validating identity" +"2019-04-22 06:18:03.233 UTC [msp] Setup -> DEBU 174d Setting up the MSP manager (4 msps)" +"2019-04-22 06:18:03.234 UTC [msp] Setup -> DEBU 174e MSP manager setup complete, setup 4 msps" +"2019-04-22 06:18:03.234 UTC [policies] NewManagerImpl -> DEBU 174f Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.235 UTC [policies] NewManagerImpl -> DEBU 1750 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.235 UTC [policies] NewManagerImpl -> DEBU 1751 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.235 UTC [policies] NewManagerImpl -> DEBU 1752 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.236 UTC [policies] NewManagerImpl -> DEBU 1753 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.236 UTC [policies] NewManagerImpl -> DEBU 1754 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.237 UTC [policies] NewManagerImpl -> DEBU 1755 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.237 UTC [policies] NewManagerImpl -> DEBU 1756 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.237 UTC [policies] NewManagerImpl -> DEBU 1757 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.238 UTC [policies] NewManagerImpl -> DEBU 1758 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.239 UTC [policies] NewManagerImpl -> DEBU 1759 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.239 UTC [policies] NewManagerImpl -> DEBU 175a Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.239 UTC [policies] NewManagerImpl -> DEBU 175b Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:18:03.240 UTC [policies] NewManagerImpl -> DEBU 175c Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:18:03.240 UTC [policies] NewManagerImpl -> DEBU 175d Proposed new policy Readers for Channel/Application" +"2019-04-22 06:18:03.240 UTC [policies] NewManagerImpl -> DEBU 175e Proposed new policy Writers for Channel/Application" +"2019-04-22 06:18:03.241 UTC [policies] NewManagerImpl -> DEBU 175f Proposed new policy Admins for Channel/Application" +"2019-04-22 06:18:03.241 UTC [policies] NewManagerImpl -> DEBU 1760 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.241 UTC [policies] NewManagerImpl -> DEBU 1761 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.242 UTC [policies] NewManagerImpl -> DEBU 1762 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.242 UTC [policies] NewManagerImpl -> DEBU 1763 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:18:03.242 UTC [policies] NewManagerImpl -> DEBU 1764 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1765 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1766 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1767 Proposed new policy Writers for Channel" +"2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1768 Proposed new policy Admins for Channel" +"2019-04-22 06:18:03.243 UTC [policies] NewManagerImpl -> DEBU 1769 Proposed new policy Readers for Channel" +"2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176a Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176b Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176c Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:18:03.243 UTC [common.configtx] addToMap -> DEBU 176f Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1770 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1771 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1772 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1773 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1774 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1775 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1776 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1777 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1778 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1779 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177a Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177b Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 177f Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1780 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1781 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1782 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1783 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.244 UTC [common.configtx] addToMap -> DEBU 1784 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1785 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1786 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1787 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1788 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 1789 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:18:03.245 UTC [common.configtx] addToMap -> DEBU 178e Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:18:03.246 UTC [common.configtx] addToMap -> DEBU 178f Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:18:03.246 UTC [common.configtx] addToMap -> DEBU 1790 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:18:03.247 UTC [common.configtx] addToMap -> DEBU 1791 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:18:03.247 UTC [common.configtx] addToMap -> DEBU 1792 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:18:03.247 UTC [common.configtx] addToMap -> DEBU 1793 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:18:03.248 UTC [common.configtx] addToMap -> DEBU 1794 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:18:03.248 UTC [common.configtx] addToMap -> DEBU 1795 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:18:03.249 UTC [common.configtx] addToMap -> DEBU 1796 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:18:03.249 UTC [common.configtx] addToMap -> DEBU 1797 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:18:03.250 UTC [common.configtx] addToMap -> DEBU 1798 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:18:03.250 UTC [common.configtx] addToMap -> DEBU 1799 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:18:03.251 UTC [common.configtx] addToMap -> DEBU 179a Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:18:03.251 UTC [common.configtx] addToMap -> DEBU 179b Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:18:03.251 UTC [common.configtx] addToMap -> DEBU 179c Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:18:03.252 UTC [common.configtx] addToMap -> DEBU 179d Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:18:03.252 UTC [common.channelconfig] LogSanityChecks -> DEBU 179e As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:18:03.252 UTC [common.channelconfig] LogSanityChecks -> DEBU 179f As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:18:03.253 UTC [policies] Manager -> DEBU 17a0 Manager Channel looking up path [Application]" +"2019-04-22 06:18:03.253 UTC [policies] Manager -> DEBU 17a1 Manager Channel has managers Application" +"2019-04-22 06:18:03.253 UTC [policies] Manager -> DEBU 17a2 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a3 Manager Channel/Application looking up path []" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a4 Manager Channel/Application has managers Org3MSP" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a5 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17a6 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17a7 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17a8 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17a9 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17aa Manager Channel looking up path [Orderer]" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ab Manager Channel has managers Application" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ac Manager Channel has managers Orderer" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ad Manager Channel/Orderer looking up path []" +"2019-04-22 06:18:03.254 UTC [policies] Manager -> DEBU 17ae Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:18:03.254 UTC [common.channelconfig] LogSanityChecks -> DEBU 17af As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:18:03.254 UTC [common.capabilities] Supported -> DEBU 17b0 Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:18:03.254 UTC [common.capabilities] Supported -> DEBU 17b1 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:18:03.255 UTC [msp.identity] Sign -> DEBU 17b2 Sign: plaintext: 0AD2060A1B08011A06089BB9F5E50522...23B587B1269570E60541A69721245929 " +"2019-04-22 06:18:03.255 UTC [msp.identity] Sign -> DEBU 17b3 Sign: digest: 4727605DEACC667F41E938852730211E20B5E0BD4B22AF9E916EF85470C3753C " +"2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.255 UTC [policies] Evaluate -> DEBU 17b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:18:03.255 UTC [msp] DeserializeIdentity -> DEBU 17b9 Obtaining identity" +"2019-04-22 06:18:03.255 UTC [msp.identity] newIdentity -> DEBU 17ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17bb 0xc000404180 gate 1555913883256007700 evaluation starts" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17bc 0xc000404180 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17bd 0xc000404180 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17be 0xc000404180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17bf 0xc000404180 principal evaluation fails" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17c0 0xc000404180 gate 1555913883256007700 evaluation fails" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17c4 0xc000446a30 gate 1555913883256373000 evaluation starts" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c5 0xc000446a30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c6 0xc000446a30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c7 0xc000446a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17c8 0xc000446a30 principal evaluation fails" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17c9 0xc000446a30 gate 1555913883256373000 evaluation fails" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17ca Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:18:03.256 UTC [policies] func1 -> DEBU 17cc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Writers Org1MSP/Writers ]" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17cd Signature set did not satisfy policy /Channel/Application/Writers" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.256 UTC [policies] Evaluate -> DEBU 17d1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func1 -> DEBU 17d2 0xc0004479b0 gate 1555913883256886700 evaluation starts" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17d3 0xc0004479b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.256 UTC [cauthdsl] func2 -> DEBU 17d4 0xc0004479b0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.257 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 17d5 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:18:03.257 UTC [msp] Validate -> DEBU 17d6 MSP OrdererMSP validating identity" +"2019-04-22 06:18:03.257 UTC [cauthdsl] func2 -> DEBU 17d7 0xc0004479b0 principal matched by identity 0" +"2019-04-22 06:18:03.257 UTC [msp.identity] Verify -> DEBU 17d8 Verify: digest = 00000000 47 27 60 5d ea cc 66 7f 41 e9 38 85 27 30 21 1e |G'`]..f.A.8.'0!.| +00000010 20 b5 e0 bd 4b 22 af 9e 91 6e f8 54 70 c3 75 3c | ...K"...n.Tp.u<|" +"2019-04-22 06:18:03.257 UTC [msp.identity] Verify -> DEBU 17d9 Verify: sig = 00000000 30 44 02 20 31 5b e1 29 5d be 8a 00 a9 b9 6f 8b |0D. 1[.)].....o.| +00000010 06 fd 2d 3d 49 13 e4 86 ff b1 e3 7b bb 11 2f a7 |..-=I......{../.| +00000020 e8 4c 2c 00 02 20 2b 39 58 25 37 44 b6 da 79 71 |.L,.. +9X%7D..yq| +00000030 55 e6 d5 98 ff 2b be b5 48 14 67 53 8a 79 75 1d |U....+..H.gS.yu.| +00000040 aa ab fd c0 f2 f7 |......|" +"2019-04-22 06:18:03.257 UTC [cauthdsl] func2 -> DEBU 17da 0xc0004479b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.258 UTC [cauthdsl] func1 -> DEBU 17db 0xc0004479b0 gate 1555913883256886700 evaluation succeeds" +"2019-04-22 06:18:03.258 UTC [policies] Evaluate -> DEBU 17dc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17dd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17de Signature set satisfies policy /Channel/Orderer/Writers" +"2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17e0 Signature set satisfies policy /Channel/Writers" +"2019-04-22 06:18:03.259 UTC [policies] Evaluate -> DEBU 17e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-04-22 06:18:03.259 UTC [orderer.consensus.etcdraft] propose -> INFO 17e2 Created block [9], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-04-22 06:18:03.259 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 17e3 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-04-22 06:18:03.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e4 Sending msg of 34122 bytes to 3 on channel businesschannel took 99.1µs" +"2019-04-22 06:18:03.263 UTC [orderer.consensus.etcdraft] 2 -> DEBU 17e5 Proposed block [9] to raft consensus" channel=businesschannel node=1 +"2019-04-22 06:18:03.264 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 17e6 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 192.168.224.9:34736" +"2019-04-22 06:18:03.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e7 Send of ConsensusRequest for channel businesschannel with payload of size 34122 to orderer1.example.com(orderer1.example.com:7050) took 374.8µs " +"2019-04-22 06:18:03.264 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17e8 Send of ConsensusRequest for channel businesschannel with payload of size 34122 to orderer2.example.com(orderer2.example.com:7050) took 272µs " +"2019-04-22 06:18:03.263 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17e9 Sending msg of 34122 bytes to 2 on channel businesschannel took 23.1µs" +"2019-04-22 06:18:03.273 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17ea Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.274 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17eb Sending msg of 28 bytes to 2 on channel businesschannel took 188.6µs" +"2019-04-22 06:18:03.274 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 17ec Sending msg of 28 bytes to 3 on channel businesschannel took 22.7µs" +"2019-04-22 06:18:03.274 UTC [orderer.common.cluster.step] sendMessage -> DEBU 17ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.9µs " +"2019-04-22 06:18:03.274 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 17ee Writing block [9] (Raft index: 13) to ledger" channel=businesschannel node=1 +"2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17ef Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17f0 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17f1 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.275 UTC [common.configtx] addToMap -> DEBU 17f2 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f3 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f4 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f5 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f6 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f7 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f8 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17f9 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17fa Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17fb Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.276 UTC [common.configtx] addToMap -> DEBU 17fc Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 17fd Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 17fe Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 17ff Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.277 UTC [common.configtx] addToMap -> DEBU 1800 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.278 UTC [common.configtx] addToMap -> DEBU 1801 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1802 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1803 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1804 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1805 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1806 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.279 UTC [common.configtx] addToMap -> DEBU 1807 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.280 UTC [common.configtx] addToMap -> DEBU 1808 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.280 UTC [common.configtx] addToMap -> DEBU 1809 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.280 UTC [common.configtx] addToMap -> DEBU 180a Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.280 UTC [common.configtx] verifyDeltaSet -> DEBU 180b Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.280 UTC [common.configtx] verifyDeltaSet -> DEBU 180c Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.281 UTC [common.configtx] verifyDeltaSet -> DEBU 180d Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.281 UTC [common.configtx] verifyDeltaSet -> DEBU 180e Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.281 UTC [common.configtx] verifyDeltaSet -> DEBU 180f Processing change to key: [Group] /Channel/Application" +"2019-04-22 06:18:03.281 UTC [common.configtx] policyForItem -> DEBU 1810 Getting policy for item Application with mod_policy Admins" +"2019-04-22 06:18:03.281 UTC [policies] Manager -> DEBU 1811 Manager Channel looking up path []" +"2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1812 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1813 Manager Channel has managers Application" +"2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1814 Manager Channel looking up path [Application]" +"2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1815 Manager Channel has managers Application" +"2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1816 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1817 Manager Channel/Application looking up path []" +"2019-04-22 06:18:03.282 UTC [policies] Manager -> DEBU 1818 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:18:03.283 UTC [policies] Manager -> DEBU 1819 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:18:03.283 UTC [policies] Evaluate -> DEBU 181a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-04-22 06:18:03.283 UTC [policies] Evaluate -> DEBU 181b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.283 UTC [policies] Evaluate -> DEBU 181c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-04-22 06:18:03.285 UTC [orderer.common.cluster.step] handleMessage -> DEBU 181d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.283 UTC [cauthdsl] deduplicate -> WARN 181e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:18:03.285 UTC [cauthdsl] func1 -> DEBU 181f 0xc000421470 gate 1555913883285910900 evaluation starts" +"2019-04-22 06:18:03.286 UTC [cauthdsl] func2 -> DEBU 1820 0xc000421470 signed by 0 principal evaluation starts (used [false false false])" +"2019-04-22 06:18:03.286 UTC [cauthdsl] func2 -> DEBU 1821 0xc000421470 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.286 UTC [cauthdsl] func2 -> DEBU 1822 0xc000421470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1823 0xc000421470 processing identity 1 with bytes of ebaeb0" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1824 0xc000421470 principal matched by identity 1" +"2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1825 Verify: digest = 00000000 0c fd 1f e5 b1 9b db 02 57 c4 82 57 bc d0 0c 4b |........W..W...K| +00000010 97 87 a9 3b ca 23 a8 c2 03 3c f3 1a f8 a3 07 57 |...;.#...<.....W|" +"2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1826 Verify: sig = 00000000 30 45 02 21 00 d6 e0 8c 37 df 62 cb 69 f9 ca 73 |0E.!....7.b.i..s| +00000010 04 64 61 bf 99 26 93 ca 3d 45 f6 6f 0f 3d b9 61 |.da..&..=E.o.=.a| +00000020 7a af 77 b9 12 02 20 4a 16 64 bd 85 6e 43 d5 e7 |z.w... J.d..nC..| +00000030 28 07 12 4c 58 19 bf 43 c2 12 88 2a bf 28 75 09 |(..LX..C...*.(u.| +00000040 a5 e6 fa 2b 77 6d e3 |...+wm.|" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1827 0xc000421470 principal evaluation succeeds for identity 1" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func1 -> DEBU 1828 0xc000421470 gate 1555913883285910900 evaluation succeeds" +"2019-04-22 06:18:03.287 UTC [common.deliver] Handle -> WARN 1829 Error reading from 192.168.224.9:34734: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:03.287 UTC [policies] Evaluate -> DEBU 182a Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.287 UTC [orderer.common.server] func1 -> DEBU 182b Closing Deliver stream" +"2019-04-22 06:18:03.287 UTC [policies] Evaluate -> DEBU 182c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.287 UTC [policies] Evaluate -> DEBU 182e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:18:03.287 UTC [comm.grpc.server] 1 -> INFO 182d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34734 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=129.5927ms +"2019-04-22 06:18:03.287 UTC [cauthdsl] deduplicate -> WARN 182f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func1 -> DEBU 1830 0xc0003ce270 gate 1555913883287592400 evaluation starts" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1831 0xc0003ce270 signed by 0 principal evaluation starts (used [false false false])" +"2019-04-22 06:18:03.287 UTC [grpc] warningf -> DEBU 1832 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.4:7050->192.168.224.9:34736: read: connection reset by peer" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1833 0xc0003ce270 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 1834 0xc0003ce270 principal matched by identity 0" +"2019-04-22 06:18:03.287 UTC [orderer.common.broadcast] Handle -> WARN 1835 Error reading from 192.168.224.9:34736: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1836 Verify: digest = 00000000 8e 73 57 0e b7 c7 1b 71 9b 02 5f bd 37 50 74 25 |.sW....q.._.7Pt%| +00000010 06 6a 52 6c ef f6 86 21 8c 54 e2 73 5f 3d 4d 90 |.jRl...!.T.s_=M.|" +"2019-04-22 06:18:03.287 UTC [orderer.common.server] func1 -> DEBU 1837 Closing Broadcast stream" +"2019-04-22 06:18:03.287 UTC [msp.identity] Verify -> DEBU 1838 Verify: sig = 00000000 30 45 02 21 00 f2 fa 21 f5 b5 4e 2e de a8 55 bd |0E.!...!..N...U.| +00000010 a8 cc 6e 98 b5 33 37 87 be c9 27 42 cf 21 2b 5f |..n..37...'B.!+_| +00000020 54 69 eb ed 1a 02 20 0b 2a d2 c7 e1 11 a3 64 cc |Ti.... .*.....d.| +00000030 0e 42 62 c5 f0 de 23 74 4d 0c 1a 46 43 50 06 27 |.Bb...#tM..FCP.'| +00000040 0b 25 bf 2c 59 22 e1 |.%.,Y".|" +"2019-04-22 06:18:03.287 UTC [comm.grpc.server] 1 -> INFO 1839 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.9:34736 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=114.3443ms +"2019-04-22 06:18:03.287 UTC [cauthdsl] func2 -> DEBU 183a 0xc0003ce270 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.287 UTC [grpc] infof -> DEBU 183b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.287 UTC [cauthdsl] func1 -> DEBU 183c 0xc0003ce270 gate 1555913883287592400 evaluation succeeds" +"2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 183d Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.288 UTC [grpc] infof -> DEBU 183e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 1840 Signature set satisfies policy /Channel/Application/Admins" +"2019-04-22 06:18:03.288 UTC [policies] Evaluate -> DEBU 1841 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-04-22 06:18:03.291 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1842 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.292 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1843 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 291.9µs " +"2019-04-22 06:18:03.298 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1844 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.288 UTC [common.configtx] verifyDeltaSet -> DEBU 1845 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.303 UTC [common.configtx] verifyDeltaSet -> DEBU 1846 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.303 UTC [common.configtx] recurseConfigMap -> DEBU 1847 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.304 UTC [common.configtx] recurseConfigMap -> DEBU 1848 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.304 UTC [common.configtx] recurseConfigMap -> DEBU 1849 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.304 UTC [common.configtx] recurseConfigMap -> DEBU 184a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.310 UTC [common.configtx] recurseConfigMap -> DEBU 184e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.313 UTC [common.configtx] recurseConfigMap -> DEBU 184f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.313 UTC [common.configtx] recurseConfigMap -> DEBU 1850 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.313 UTC [common.configtx] recurseConfigMap -> DEBU 1851 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1852 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1853 Setting policy for key Admins to " +"2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1854 Setting policy for key Endorsement to " +"2019-04-22 06:18:03.314 UTC [common.configtx] recurseConfigMap -> DEBU 1855 Setting policy for key LifecycleEndorsement to " +"2019-04-22 06:18:03.315 UTC [common.configtx] recurseConfigMap -> DEBU 1856 Setting policy for key Readers to " +"2019-04-22 06:18:03.315 UTC [common.configtx] recurseConfigMap -> DEBU 1857 Setting policy for key Writers to " +"2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 1858 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 1859 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.316 UTC [common.configtx] recurseConfigMap -> DEBU 185d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.324 UTC [common.configtx] recurseConfigMap -> DEBU 185e Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.325 UTC [common.configtx] recurseConfigMap -> DEBU 185f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.325 UTC [common.configtx] recurseConfigMap -> DEBU 1860 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.326 UTC [common.configtx] recurseConfigMap -> DEBU 1861 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.327 UTC [common.channelconfig] NewStandardValues -> DEBU 1862 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:18:03.328 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1863 Processing field: HashingAlgorithm" +"2019-04-22 06:18:03.329 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1864 Processing field: BlockDataHashingStructure" +"2019-04-22 06:18:03.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1865 Processing field: OrdererAddresses" +"2019-04-22 06:18:03.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1866 Processing field: Consortium" +"2019-04-22 06:18:03.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1867 Processing field: Capabilities" +"2019-04-22 06:18:03.332 UTC [common.channelconfig] NewStandardValues -> DEBU 1868 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:18:03.336 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1869 Processing field: ACLs" +"2019-04-22 06:18:03.337 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186a Processing field: Capabilities" +"2019-04-22 06:18:03.337 UTC [common.channelconfig] NewStandardValues -> DEBU 186b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.337 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186c Processing field: AnchorPeers" +"2019-04-22 06:18:03.338 UTC [common.channelconfig] NewStandardValues -> DEBU 186d Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.338 UTC [common.channelconfig] initializeProtosStruct -> DEBU 186e Processing field: MSP" +"2019-04-22 06:18:03.338 UTC [common.channelconfig] Validate -> DEBU 186f Anchor peers for org Org2MSP are anchor_peers: " +"2019-04-22 06:18:03.338 UTC [common.channelconfig] validateMSP -> DEBU 1870 Setting up MSP for org Org2MSP" +"2019-04-22 06:18:03.339 UTC [msp] newBccspMsp -> DEBU 1871 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.339 UTC [msp] New -> DEBU 1872 Creating Cache-MSP instance" +"2019-04-22 06:18:03.339 UTC [msp] Setup -> DEBU 1873 Setting up MSP instance Org2MSP" +"2019-04-22 06:18:03.340 UTC [msp.identity] newIdentity -> DEBU 1874 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.340 UTC [msp.identity] newIdentity -> DEBU 1875 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.341 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1876 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:18:03.341 UTC [msp] Validate -> DEBU 1877 MSP Org2MSP validating identity" +"2019-04-22 06:18:03.341 UTC [msp] getCertificationChain -> DEBU 1878 MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.342 UTC [msp] hasOURole -> DEBU 1879 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:18:03.342 UTC [msp] getCertificationChain -> DEBU 187a MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.343 UTC [common.channelconfig] NewStandardValues -> DEBU 187b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.343 UTC [common.channelconfig] initializeProtosStruct -> DEBU 187c Processing field: AnchorPeers" +"2019-04-22 06:18:03.343 UTC [common.channelconfig] NewStandardValues -> DEBU 187d Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.343 UTC [common.channelconfig] initializeProtosStruct -> DEBU 187e Processing field: MSP" +"2019-04-22 06:18:03.344 UTC [common.channelconfig] Validate -> DEBU 187f Anchor peers for org Org3MSP are " +"2019-04-22 06:18:03.344 UTC [common.channelconfig] validateMSP -> DEBU 1880 Setting up MSP for org Org3MSP" +"2019-04-22 06:18:03.344 UTC [msp] newBccspMsp -> DEBU 1881 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.344 UTC [msp] New -> DEBU 1882 Creating Cache-MSP instance" +"2019-04-22 06:18:03.344 UTC [msp] Setup -> DEBU 1883 Setting up MSP instance Org3MSP" +"2019-04-22 06:18:03.345 UTC [msp.identity] newIdentity -> DEBU 1884 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.345 UTC [msp.identity] newIdentity -> DEBU 1885 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.346 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1886 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-04-22 06:18:03.346 UTC [msp] Validate -> DEBU 1887 MSP Org3MSP validating identity" +"2019-04-22 06:18:03.346 UTC [msp] getCertificationChain -> DEBU 1888 MSP Org3MSP getting certification chain" +"2019-04-22 06:18:03.347 UTC [msp] hasOURole -> DEBU 1889 MSP Org3MSP checking if the identity is a client" +"2019-04-22 06:18:03.347 UTC [msp] getCertificationChain -> DEBU 188a MSP Org3MSP getting certification chain" +"2019-04-22 06:18:03.348 UTC [common.channelconfig] NewStandardValues -> DEBU 188b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.348 UTC [common.channelconfig] initializeProtosStruct -> DEBU 188c Processing field: AnchorPeers" +"2019-04-22 06:18:03.348 UTC [common.channelconfig] NewStandardValues -> DEBU 188d Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.349 UTC [common.channelconfig] initializeProtosStruct -> DEBU 188e Processing field: MSP" +"2019-04-22 06:18:03.349 UTC [common.channelconfig] Validate -> DEBU 188f Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:18:03.349 UTC [common.channelconfig] validateMSP -> DEBU 1890 Setting up MSP for org Org1MSP" +"2019-04-22 06:18:03.349 UTC [msp] newBccspMsp -> DEBU 1891 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.349 UTC [msp] New -> DEBU 1892 Creating Cache-MSP instance" +"2019-04-22 06:18:03.350 UTC [msp] Setup -> DEBU 1893 Setting up MSP instance Org1MSP" +"2019-04-22 06:18:03.350 UTC [msp.identity] newIdentity -> DEBU 1894 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.350 UTC [msp.identity] newIdentity -> DEBU 1895 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.351 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1896 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:18:03.351 UTC [msp] Validate -> DEBU 1897 MSP Org1MSP validating identity" +"2019-04-22 06:18:03.352 UTC [msp] getCertificationChain -> DEBU 1898 MSP Org1MSP getting certification chain" +"2019-04-22 06:18:03.352 UTC [msp] hasOURole -> DEBU 1899 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:18:03.352 UTC [msp] getCertificationChain -> DEBU 189a MSP Org1MSP getting certification chain" +"2019-04-22 06:18:03.352 UTC [common.channelconfig] NewStandardValues -> DEBU 189b Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:18:03.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189c Processing field: ConsensusType" +"2019-04-22 06:18:03.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189d Processing field: BatchSize" +"2019-04-22 06:18:03.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189e Processing field: BatchTimeout" +"2019-04-22 06:18:03.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 189f Processing field: KafkaBrokers" +"2019-04-22 06:18:03.354 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a0 Processing field: ChannelRestrictions" +"2019-04-22 06:18:03.355 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a1 Processing field: Capabilities" +"2019-04-22 06:18:03.356 UTC [common.channelconfig] NewStandardValues -> DEBU 18a2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:18:03.356 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a3 Processing field: Endpoints" +"2019-04-22 06:18:03.357 UTC [common.channelconfig] NewStandardValues -> DEBU 18a4 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.357 UTC [common.channelconfig] initializeProtosStruct -> DEBU 18a5 Processing field: MSP" +"2019-04-22 06:18:03.359 UTC [common.channelconfig] validateMSP -> DEBU 18a6 Setting up MSP for org OrdererOrg" +"2019-04-22 06:18:03.360 UTC [msp] newBccspMsp -> DEBU 18a7 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.360 UTC [msp] New -> DEBU 18a8 Creating Cache-MSP instance" +"2019-04-22 06:18:03.361 UTC [msp] Setup -> DEBU 18a9 Setting up MSP instance OrdererMSP" +"2019-04-22 06:18:03.362 UTC [msp.identity] newIdentity -> DEBU 18aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.363 UTC [msp.identity] newIdentity -> DEBU 18ab Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.366 UTC [msp] Validate -> DEBU 18ac MSP OrdererMSP validating identity" +"2019-04-22 06:18:03.367 UTC [msp] Setup -> DEBU 18ad Setting up the MSP manager (4 msps)" +"2019-04-22 06:18:03.367 UTC [msp] Setup -> DEBU 18ae MSP manager setup complete, setup 4 msps" +"2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18af Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18b0 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18b1 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.368 UTC [policies] NewManagerImpl -> DEBU 18b2 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b4 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b5 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.369 UTC [policies] NewManagerImpl -> DEBU 18b6 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18b7 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18b8 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18b9 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18ba Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.370 UTC [policies] NewManagerImpl -> DEBU 18bb Proposed new policy Admins for Channel/Application" +"2019-04-22 06:18:03.371 UTC [policies] NewManagerImpl -> DEBU 18bc Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:18:03.371 UTC [policies] NewManagerImpl -> DEBU 18bd Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:18:03.371 UTC [policies] NewManagerImpl -> DEBU 18be Proposed new policy Readers for Channel/Application" +"2019-04-22 06:18:03.373 UTC [policies] NewManagerImpl -> DEBU 18bf Proposed new policy Writers for Channel/Application" +"2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c0 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c1 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.374 UTC [policies] NewManagerImpl -> DEBU 18c3 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c4 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c5 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c6 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:18:03.375 UTC [policies] NewManagerImpl -> DEBU 18c7 Proposed new policy Admins for Channel" +"2019-04-22 06:18:03.376 UTC [policies] NewManagerImpl -> DEBU 18c8 Proposed new policy Readers for Channel" +"2019-04-22 06:18:03.376 UTC [policies] NewManagerImpl -> DEBU 18c9 Proposed new policy Writers for Channel" +"2019-04-22 06:18:03.376 UTC [common.configtx] addToMap -> DEBU 18ca Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.377 UTC [common.configtx] addToMap -> DEBU 18cb Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.377 UTC [common.configtx] addToMap -> DEBU 18cc Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.379 UTC [common.configtx] addToMap -> DEBU 18cd Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:18:03.380 UTC [common.configtx] addToMap -> DEBU 18ce Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:18:03.381 UTC [common.configtx] addToMap -> DEBU 18cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:18:03.381 UTC [common.configtx] addToMap -> DEBU 18d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.382 UTC [common.configtx] addToMap -> DEBU 18d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:18:03.382 UTC [common.configtx] addToMap -> DEBU 18d2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.383 UTC [common.configtx] addToMap -> DEBU 18d3 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.383 UTC [common.configtx] addToMap -> DEBU 18d4 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.383 UTC [common.configtx] addToMap -> DEBU 18d5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.384 UTC [common.configtx] addToMap -> DEBU 18d6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.384 UTC [common.configtx] addToMap -> DEBU 18d7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.384 UTC [common.configtx] addToMap -> DEBU 18d8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18d9 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18da Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18db Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:18:03.385 UTC [common.configtx] addToMap -> DEBU 18dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:18:03.386 UTC [common.configtx] addToMap -> DEBU 18dd Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.386 UTC [common.configtx] addToMap -> DEBU 18de Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:18:03.386 UTC [common.configtx] addToMap -> DEBU 18df Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.387 UTC [common.configtx] addToMap -> DEBU 18e0 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.387 UTC [common.configtx] addToMap -> DEBU 18e1 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.387 UTC [common.configtx] addToMap -> DEBU 18e2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.388 UTC [common.configtx] addToMap -> DEBU 18e3 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.388 UTC [common.configtx] addToMap -> DEBU 18e4 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.388 UTC [common.configtx] addToMap -> DEBU 18e5 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e6 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e7 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.389 UTC [common.configtx] addToMap -> DEBU 18e9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18ea Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18eb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18ec Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:03.390 UTC [common.configtx] addToMap -> DEBU 18ed Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18ee Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18ef Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18f0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:18:03.391 UTC [common.configtx] addToMap -> DEBU 18f1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f2 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f3 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f4 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:18:03.392 UTC [common.configtx] addToMap -> DEBU 18f5 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f7 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f8 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:18:03.393 UTC [common.configtx] addToMap -> DEBU 18f9 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fa Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fb Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fc Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:18:03.394 UTC [common.configtx] addToMap -> DEBU 18fd Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:18:03.395 UTC [common.channelconfig] LogSanityChecks -> DEBU 18fe As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:18:03.395 UTC [common.channelconfig] LogSanityChecks -> DEBU 18ff As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:18:03.395 UTC [policies] Manager -> DEBU 1900 Manager Channel looking up path [Application]" +"2019-04-22 06:18:03.395 UTC [policies] Manager -> DEBU 1901 Manager Channel has managers Application" +"2019-04-22 06:18:03.395 UTC [policies] Manager -> DEBU 1902 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1903 Manager Channel/Application looking up path []" +"2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1904 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1905 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:18:03.396 UTC [policies] Manager -> DEBU 1906 Manager Channel/Application has managers Org3MSP" +"2019-04-22 06:18:03.396 UTC [common.channelconfig] LogSanityChecks -> DEBU 1907 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:18:03.396 UTC [common.channelconfig] LogSanityChecks -> DEBU 1908 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:18:03.397 UTC [common.channelconfig] LogSanityChecks -> DEBU 1909 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190a Manager Channel looking up path [Orderer]" +"2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190b Manager Channel has managers Orderer" +"2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190c Manager Channel has managers Application" +"2019-04-22 06:18:03.397 UTC [policies] Manager -> DEBU 190d Manager Channel/Orderer looking up path []" +"2019-04-22 06:18:03.398 UTC [policies] Manager -> DEBU 190e Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:18:03.398 UTC [common.channelconfig] LogSanityChecks -> DEBU 190f As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:18:03.399 UTC [common.capabilities] Supported -> DEBU 1910 Orderer capability V2_0 is supported and is enabled" +"2019-04-22 06:18:03.399 UTC [common.capabilities] Supported -> DEBU 1911 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:18:03.399 UTC [orderer.common.server] func1 -> DEBU 1912 Executing callback to update root CAs" +"2019-04-22 06:18:03.399 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1913 updating root CAs for channel [businesschannel]" +"2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1914 adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1915 adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1916 adding app root CAs for MSP [Org3MSP]" +"2019-04-22 06:18:03.400 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1917 adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:18:03.401 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1918 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 9" +"2019-04-22 06:18:03.401 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1919 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 9" +"2019-04-22 06:18:03.402 UTC [msp.identity] Sign -> DEBU 191a Sign: plaintext: 0A020809120B0A090A03010203100418...5FAD23AFCEB1D5B20F0307D9DCE27EF7 " +"2019-04-22 06:18:03.402 UTC [msp.identity] Sign -> DEBU 191b Sign: digest: 70BF915B60505EDC480E067112B3B75FEB2535CBB0E083BD6977DEACAACDD484 " +"2019-04-22 06:18:03.406 UTC [fsblkstorage] indexBlock -> DEBU 191c Indexing block [blockNum=9, blockHash=[]byte{0x78, 0x7a, 0x67, 0xb8, 0x41, 0xd5, 0x69, 0x5a, 0xe5, 0xed, 0xc7, 0x2, 0x28, 0x9c, 0x7e, 0xe2, 0xc1, 0x3a, 0x7, 0xce, 0xc4, 0xf8, 0x4f, 0x8e, 0xe3, 0x8b, 0xa5, 0x79, 0x20, 0x3, 0xac, 0xeb} txOffsets= +txId= locPointer=offset=71, bytesLength=33993 +]" +"2019-04-22 06:18:03.409 UTC [fsblkstorage] updateCheckpoint -> DEBU 191d Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133667], isChainEmpty=[false], lastBlockNumber=[9]" +"2019-04-22 06:18:03.410 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 191e [channel: businesschannel] Wrote block [9]" +"2019-04-22 06:18:03.410 UTC [fsblkstorage] waitForBlock -> DEBU 191f Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:03.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1920 Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:03.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1922 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:03.411 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1923 blockbytes [34998] read from file [0]" +"2019-04-22 06:18:03.411 UTC [fsblkstorage] waitForBlock -> DEBU 1921 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:03.412 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1924 Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:03.412 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1925 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:03.412 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1926 blockbytes [34998] read from file [0]" +"2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 1927 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 1928 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 1929 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 192a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.413 UTC [policies] Evaluate -> DEBU 192b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:03.413 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +"2019-04-22 06:18:03.414 UTC [msp.identity] newIdentity -> DEBU 192d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.414 UTC [cauthdsl] func1 -> DEBU 192e 0xc000e7e2c0 gate 1555913883414314500 evaluation starts" +"2019-04-22 06:18:03.414 UTC [cauthdsl] func2 -> DEBU 192f 0xc000e7e2c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.414 UTC [cauthdsl] func2 -> DEBU 1930 0xc000e7e2c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.414 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1931 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:18:03.414 UTC [msp] Validate -> DEBU 1932 MSP Org1MSP validating identity" +"2019-04-22 06:18:03.414 UTC [msp] getCertificationChain -> DEBU 1933 MSP Org1MSP getting certification chain" +"2019-04-22 06:18:03.414 UTC [policies] Evaluate -> DEBU 1934 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:03.415 UTC [policies] Evaluate -> DEBU 1935 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.415 UTC [policies] Evaluate -> DEBU 1936 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.415 UTC [policies] Evaluate -> DEBU 1938 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.416 UTC [policies] Evaluate -> DEBU 1939 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:03.416 UTC [msp] DeserializeIdentity -> DEBU 193a Obtaining identity" +"2019-04-22 06:18:03.416 UTC [msp.identity] newIdentity -> DEBU 193b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.415 UTC [cauthdsl] func2 -> DEBU 1937 0xc000e7e2c0 principal matched by identity 0" +"2019-04-22 06:18:03.417 UTC [cauthdsl] func1 -> DEBU 193c 0xc001223d20 gate 1555913883417527800 evaluation starts" +"2019-04-22 06:18:03.418 UTC [msp.identity] Verify -> DEBU 193d Verify: digest = 00000000 f5 67 6f e9 01 86 e2 3b c8 c3 da b3 68 f5 8e f8 |.go....;....h...| +00000010 97 ff f5 66 85 53 d6 fb 68 48 fc 80 60 00 ca ec |...f.S..hH..`...|" +"2019-04-22 06:18:03.418 UTC [msp.identity] Verify -> DEBU 193e Verify: sig = 00000000 30 45 02 21 00 ff 48 53 40 33 74 a0 e7 2f cb 63 |0E.!..HS@3t../.c| +00000010 2c c2 18 3c 3a 49 87 98 a3 b5 93 5b c6 a2 3f 1b |,..<:I.....[..?.| +00000020 04 66 be c4 fc 02 20 78 12 cf 92 fa c0 9c 22 db |.f.... x......".| +00000030 33 27 db bc c9 3c f6 4c 29 19 6a 33 00 69 69 94 |3'...<.L).j3.ii.| +00000040 c9 7a e7 f9 61 c4 ba |.z..a..|" +"2019-04-22 06:18:03.418 UTC [cauthdsl] func2 -> DEBU 193f 0xc001223d20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.419 UTC [cauthdsl] func2 -> DEBU 1940 0xc001223d20 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.419 UTC [cauthdsl] func2 -> DEBU 1941 0xc000e7e2c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.419 UTC [cauthdsl] func1 -> DEBU 1942 0xc000e7e2c0 gate 1555913883414314500 evaluation succeeds" +"2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1943 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1946 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1948 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:03.420 UTC [policies] Evaluate -> DEBU 1949 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:03.420 UTC [common.deliver] deliverBlocks -> DEBU 194a [channel: businesschannel] Delivering block [9] for (0xc000dd6c40) for 192.168.224.6:57810" +"2019-04-22 06:18:03.422 UTC [fsblkstorage] waitForBlock -> DEBU 194b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:03.419 UTC [cauthdsl] func2 -> DEBU 1944 0xc001223d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:03.423 UTC [cauthdsl] func2 -> DEBU 194c 0xc001223d20 principal evaluation fails" +"2019-04-22 06:18:03.423 UTC [cauthdsl] func1 -> DEBU 194d 0xc001223d20 gate 1555913883417527800 evaluation fails" +"2019-04-22 06:18:03.423 UTC [policies] Evaluate -> DEBU 194e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.423 UTC [policies] Evaluate -> DEBU 194f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.423 UTC [policies] Evaluate -> DEBU 1950 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.423 UTC [cauthdsl] func1 -> DEBU 1951 0xc000bcf670 gate 1555913883423821600 evaluation starts" +"2019-04-22 06:18:03.424 UTC [cauthdsl] func2 -> DEBU 1952 0xc000bcf670 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.424 UTC [cauthdsl] func2 -> DEBU 1953 0xc000bcf670 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:03.424 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1954 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:18:03.424 UTC [msp] Validate -> DEBU 1955 MSP Org2MSP validating identity" +"2019-04-22 06:18:03.424 UTC [msp] getCertificationChain -> DEBU 1956 MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.425 UTC [cauthdsl] func2 -> DEBU 1957 0xc000bcf670 principal matched by identity 0" +"2019-04-22 06:18:03.425 UTC [msp.identity] Verify -> DEBU 1958 Verify: digest = 00000000 af 5a b7 0c 05 3e dc 52 32 17 c5 ce ce f1 59 7f |.Z...>.R2.....Y.| +00000010 66 ce f9 49 f2 db ac 98 ac b0 19 02 b5 d4 ea 2c |f..I...........,|" +"2019-04-22 06:18:03.425 UTC [msp.identity] Verify -> DEBU 1959 Verify: sig = 00000000 30 45 02 21 00 af 56 2b 74 f2 e4 ce 5d 2b 83 c7 |0E.!..V+t...]+..| +00000010 40 f6 33 6f c2 f5 25 75 8d 97 0d 5d 91 92 7e bf |@.3o..%u...]..~.| +00000020 62 d2 37 18 6f 02 20 70 7d 92 3b 3e 04 df 9f df |b.7.o. p}.;>....| +00000030 3f 93 89 c1 34 da 73 ae 2b c7 d1 0a ad 7d ac fb |?...4.s.+....}..| +00000040 af b9 e7 2d 88 a7 ce |...-...|" +"2019-04-22 06:18:03.426 UTC [cauthdsl] func2 -> DEBU 195a 0xc000bcf670 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.426 UTC [cauthdsl] func1 -> DEBU 195b 0xc000bcf670 gate 1555913883423821600 evaluation succeeds" +"2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 195f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 1960 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:03.426 UTC [policies] Evaluate -> DEBU 1961 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:03.426 UTC [common.deliver] deliverBlocks -> DEBU 1962 [channel: businesschannel] Delivering block [9] for (0xc000dd7b40) for 192.168.224.8:43620" +"2019-04-22 06:18:03.427 UTC [fsblkstorage] waitForBlock -> DEBU 1963 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:03.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1964 Sending msg of 28 bytes to 2 on channel businesschannel took 32.9µs" +"2019-04-22 06:18:03.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1965 Sending msg of 28 bytes to 3 on channel businesschannel took 29.7µs" +"2019-04-22 06:18:03.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1966 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 250.7µs " +"2019-04-22 06:18:03.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1967 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1968 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 4.777ms " +"2019-04-22 06:18:03.584 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1969 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:03.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 196a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:03.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 196b Sending msg of 28 bytes to 3 on channel testchainid took 27.6µs" +"2019-04-22 06:18:03.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 196c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.7µs " +"2019-04-22 06:18:04.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 196d Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +"2019-04-22 06:18:04.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 196e Sending msg of 28 bytes to 2 on channel businesschannel took 34.9µs" +"2019-04-22 06:18:04.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1970 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.6µs " +"2019-04-22 06:18:04.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 196f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.1µs " +"2019-04-22 06:18:04.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1971 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:04.079 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1972 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:04.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1973 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:04.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1974 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +"2019-04-22 06:18:04.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1975 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2345ms " +"2019-04-22 06:18:04.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1976 Sending msg of 28 bytes to 2 on channel businesschannel took 53.8µs" +"2019-04-22 06:18:04.575 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1978 Sending msg of 28 bytes to 3 on channel businesschannel took 28.4µs" +"2019-04-22 06:18:04.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1979 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:04.578 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 882.5µs " +"2019-04-22 06:18:04.574 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1977 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 269.8µs " +"2019-04-22 06:18:04.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:04.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 197c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:04.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197d Sending msg of 28 bytes to 3 on channel testchainid took 163.3µs" +"2019-04-22 06:18:04.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 197e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.4µs " +"2019-04-22 06:18:05.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 197f Sending msg of 28 bytes to 2 on channel businesschannel took 40.7µs" +"2019-04-22 06:18:05.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1981 Sending msg of 28 bytes to 3 on channel businesschannel took 32.2µs" +"2019-04-22 06:18:05.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1982 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.1µs " +"2019-04-22 06:18:05.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1980 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.1µs " +"2019-04-22 06:18:05.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1983 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:05.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1984 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:05.230 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1985 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:05.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1986 Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +"2019-04-22 06:18:05.231 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1987 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +"2019-04-22 06:18:05.519 UTC [orderer.common.server] Deliver -> DEBU 1988 Starting new Deliver handler" +"2019-04-22 06:18:05.519 UTC [common.deliver] Handle -> DEBU 1989 Starting new deliver loop for 192.168.224.9:34764" +"2019-04-22 06:18:05.519 UTC [common.deliver] Handle -> DEBU 198a Attempting to read seek info message from 192.168.224.9:34764" +"2019-04-22 06:18:05.521 UTC [policies] Evaluate -> DEBU 198b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:05.522 UTC [policies] Evaluate -> DEBU 198c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:05.522 UTC [policies] Evaluate -> DEBU 198d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:05.523 UTC [policies] Evaluate -> DEBU 198e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:05.523 UTC [policies] Evaluate -> DEBU 198f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:05.523 UTC [msp] DeserializeIdentity -> DEBU 1990 Obtaining identity" +"2019-04-22 06:18:05.524 UTC [msp.identity] newIdentity -> DEBU 1991 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:05.526 UTC [cauthdsl] func1 -> DEBU 1992 0xc000c3eb70 gate 1555913885526446900 evaluation starts" +"2019-04-22 06:18:05.527 UTC [cauthdsl] func2 -> DEBU 1993 0xc000c3eb70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.527 UTC [cauthdsl] func2 -> DEBU 1994 0xc000c3eb70 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.528 UTC [cauthdsl] func2 -> DEBU 1995 0xc000c3eb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:05.528 UTC [cauthdsl] func2 -> DEBU 1996 0xc000c3eb70 principal evaluation fails" +"2019-04-22 06:18:05.528 UTC [cauthdsl] func1 -> DEBU 1997 0xc000c3eb70 gate 1555913885526446900 evaluation fails" +"2019-04-22 06:18:05.529 UTC [policies] Evaluate -> DEBU 1998 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:05.529 UTC [policies] Evaluate -> DEBU 1999 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:05.530 UTC [policies] Evaluate -> DEBU 199a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:05.530 UTC [cauthdsl] func1 -> DEBU 199b 0xc000c3fef0 gate 1555913885530829900 evaluation starts" +"2019-04-22 06:18:05.531 UTC [cauthdsl] func2 -> DEBU 199c 0xc000c3fef0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.531 UTC [cauthdsl] func2 -> DEBU 199d 0xc000c3fef0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.533 UTC [cauthdsl] func2 -> DEBU 199e 0xc000c3fef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:05.533 UTC [cauthdsl] func2 -> DEBU 199f 0xc000c3fef0 principal evaluation fails" +"2019-04-22 06:18:05.534 UTC [cauthdsl] func1 -> DEBU 19a0 0xc000c3fef0 gate 1555913885530829900 evaluation fails" +"2019-04-22 06:18:05.534 UTC [policies] Evaluate -> DEBU 19a1 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:05.534 UTC [policies] Evaluate -> DEBU 19a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:05.534 UTC [policies] Evaluate -> DEBU 19a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:05.534 UTC [cauthdsl] func1 -> DEBU 19a4 0xc0011f47c0 gate 1555913885534894300 evaluation starts" +"2019-04-22 06:18:05.534 UTC [cauthdsl] func2 -> DEBU 19a5 0xc0011f47c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.534 UTC [cauthdsl] func2 -> DEBU 19a6 0xc0011f47c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19a7 0xc0011f47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19a8 0xc0011f47c0 principal evaluation fails" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19a9 0xc0011f47c0 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19aa 0xc0011f47c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ab 0xc0011f47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ac 0xc0011f47c0 principal evaluation fails" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ad 0xc0011f47c0 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19ae 0xc0011f47c0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19af 0xc0011f47c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func2 -> DEBU 19b0 0xc0011f47c0 principal evaluation fails" +"2019-04-22 06:18:05.535 UTC [cauthdsl] func1 -> DEBU 19b1 0xc0011f47c0 gate 1555913885534894300 evaluation fails" +"2019-04-22 06:18:05.537 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:05.538 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:05.538 UTC [policies] func1 -> DEBU 19b4 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b5 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:05.539 UTC [policies] Evaluate -> DEBU 19b9 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:05.539 UTC [cauthdsl] func1 -> DEBU 19ba 0xc0011f5c60 gate 1555913885539932000 evaluation starts" +"2019-04-22 06:18:05.539 UTC [cauthdsl] func2 -> DEBU 19bb 0xc0011f5c60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.540 UTC [cauthdsl] func2 -> DEBU 19bc 0xc0011f5c60 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.540 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 19bd Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:18:05.540 UTC [msp] Validate -> DEBU 19be MSP OrdererMSP validating identity" +"2019-04-22 06:18:05.540 UTC [cauthdsl] func2 -> DEBU 19bf 0xc0011f5c60 principal matched by identity 0" +"2019-04-22 06:18:05.540 UTC [msp.identity] Verify -> DEBU 19c0 Verify: digest = 00000000 80 a3 df bd 37 5f da f3 54 52 8a 55 f1 6a d6 d6 |....7_..TR.U.j..| +00000010 77 87 ca cc db 83 81 35 ba 49 46 f1 ed 5b d9 9e |w......5.IF..[..|" +"2019-04-22 06:18:05.540 UTC [msp.identity] Verify -> DEBU 19c1 Verify: sig = 00000000 30 44 02 20 00 ff e7 03 f2 81 57 c3 ce ae c1 af |0D. ......W.....| +00000010 92 79 ca f8 94 8f 9b c5 2e 71 2b 00 bd 30 a8 57 |.y.......q+..0.W| +00000020 cc 1d 9e d9 02 20 7c 42 e2 80 2d 65 37 17 a8 6a |..... |B..-e7..j| +00000030 49 63 0e 7f e7 b1 1a bd 57 54 fa d7 24 6e 68 3a |Ic......WT..$nh:| +00000040 31 2c 39 b7 1b 1c |1,9...|" +"2019-04-22 06:18:05.540 UTC [cauthdsl] func2 -> DEBU 19c2 0xc0011f5c60 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:05.540 UTC [cauthdsl] func1 -> DEBU 19c3 0xc0011f5c60 gate 1555913885539932000 evaluation succeeds" +"2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c6 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c8 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:05.540 UTC [policies] Evaluate -> DEBU 19c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:05.541 UTC [common.deliver] deliverBlocks -> DEBU 19ca [channel: businesschannel] Received seekInfo (0xc001068880) start: > stop: > from 192.168.224.9:34764" +"2019-04-22 06:18:05.541 UTC [fsblkstorage] Next -> DEBU 19cb Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:05.541 UTC [fsblkstorage] newBlockfileStream -> DEBU 19cc newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +"2019-04-22 06:18:05.541 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19cd Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:05.541 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19ce Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:05.541 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19cf blockbytes [34998] read from file [0]" +"2019-04-22 06:18:05.541 UTC [common.deliver] deliverBlocks -> DEBU 19d0 [channel: businesschannel] Delivering block [9] for (0xc001068880) for 192.168.224.9:34764" +"2019-04-22 06:18:05.541 UTC [common.deliver] deliverBlocks -> DEBU 19d1 [channel: businesschannel] Done delivering to 192.168.224.9:34764 for (0xc001068880)" +"2019-04-22 06:18:05.541 UTC [common.deliver] Handle -> DEBU 19d2 Waiting for new SeekInfo from 192.168.224.9:34764" +"2019-04-22 06:18:05.541 UTC [common.deliver] Handle -> DEBU 19d3 Attempting to read seek info message from 192.168.224.9:34764" +"2019-04-22 06:18:05.541 UTC [fsblkstorage] waitForBlock -> DEBU 19d4 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:05.542 UTC [fsblkstorage] waitForBlock -> DEBU 19d5 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:05.542 UTC [fsblkstorage] waitForBlock -> DEBU 19d6 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:05.542 UTC [fsblkstorage] waitForBlock -> DEBU 19d7 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:05.547 UTC [common.deliver] Handle -> WARN 19d8 Error reading from 192.168.224.9:34764: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:05.547 UTC [orderer.common.server] func1 -> DEBU 19d9 Closing Deliver stream" +"2019-04-22 06:18:05.547 UTC [comm.grpc.server] 1 -> INFO 19da streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34764 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.0702ms +"2019-04-22 06:18:05.547 UTC [grpc] infof -> DEBU 19db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:05.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19dc Sending msg of 28 bytes to 2 on channel businesschannel took 538.5µs" +"2019-04-22 06:18:05.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19dd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.3µs " +"2019-04-22 06:18:05.588 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254.4µs " +"2019-04-22 06:18:05.589 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19df Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:05.592 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:05.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e1 Sending msg of 28 bytes to 3 on channel businesschannel took 46.5µs" +"2019-04-22 06:18:05.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:05.728 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e3 Sending msg of 28 bytes to 3 on channel testchainid took 63.4µs" +"2019-04-22 06:18:05.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.1µs " +"2019-04-22 06:18:05.745 UTC [orderer.common.server] Deliver -> DEBU 19e5 Starting new Deliver handler" +"2019-04-22 06:18:05.745 UTC [common.deliver] Handle -> DEBU 19e6 Starting new deliver loop for 192.168.224.9:34766" +"2019-04-22 06:18:05.745 UTC [common.deliver] Handle -> DEBU 19e7 Attempting to read seek info message from 192.168.224.9:34766" +"2019-04-22 06:18:05.745 UTC [policies] Evaluate -> DEBU 19e8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:05.746 UTC [policies] Evaluate -> DEBU 19e9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:05.746 UTC [policies] Evaluate -> DEBU 19ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:05.746 UTC [policies] Evaluate -> DEBU 19eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:05.747 UTC [policies] Evaluate -> DEBU 19ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:05.747 UTC [cauthdsl] func1 -> DEBU 19ed 0xc001032f30 gate 1555913885747742500 evaluation starts" +"2019-04-22 06:18:05.747 UTC [cauthdsl] func2 -> DEBU 19ee 0xc001032f30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.747 UTC [cauthdsl] func2 -> DEBU 19ef 0xc001032f30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.748 UTC [cauthdsl] func2 -> DEBU 19f0 0xc001032f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:05.748 UTC [cauthdsl] func2 -> DEBU 19f1 0xc001032f30 principal evaluation fails" +"2019-04-22 06:18:05.748 UTC [cauthdsl] func1 -> DEBU 19f2 0xc001032f30 gate 1555913885747742500 evaluation fails" +"2019-04-22 06:18:05.748 UTC [policies] Evaluate -> DEBU 19f3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:05.748 UTC [policies] Evaluate -> DEBU 19f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:05.748 UTC [policies] Evaluate -> DEBU 19f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:05.749 UTC [cauthdsl] func1 -> DEBU 19f6 0xc001033770 gate 1555913885749280600 evaluation starts" +"2019-04-22 06:18:05.749 UTC [cauthdsl] func2 -> DEBU 19f7 0xc001033770 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.749 UTC [cauthdsl] func2 -> DEBU 19f8 0xc001033770 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.749 UTC [cauthdsl] func2 -> DEBU 19f9 0xc001033770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:05.750 UTC [cauthdsl] func2 -> DEBU 19fa 0xc001033770 principal evaluation fails" +"2019-04-22 06:18:05.750 UTC [cauthdsl] func1 -> DEBU 19fb 0xc001033770 gate 1555913885749280600 evaluation fails" +"2019-04-22 06:18:05.750 UTC [policies] Evaluate -> DEBU 19fc Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:05.750 UTC [policies] Evaluate -> DEBU 19fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:05.751 UTC [policies] Evaluate -> DEBU 19fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:05.751 UTC [cauthdsl] func1 -> DEBU 19ff 0xc001033fe0 gate 1555913885751268400 evaluation starts" +"2019-04-22 06:18:05.751 UTC [cauthdsl] func2 -> DEBU 1a00 0xc001033fe0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.752 UTC [cauthdsl] func2 -> DEBU 1a01 0xc001033fe0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.752 UTC [cauthdsl] func2 -> DEBU 1a02 0xc001033fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:05.752 UTC [cauthdsl] func2 -> DEBU 1a03 0xc001033fe0 principal evaluation fails" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a04 0xc001033fe0 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a05 0xc001033fe0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a06 0xc001033fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a07 0xc001033fe0 principal evaluation fails" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a08 0xc001033fe0 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a09 0xc001033fe0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a0a 0xc001033fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func2 -> DEBU 1a0b 0xc001033fe0 principal evaluation fails" +"2019-04-22 06:18:05.753 UTC [cauthdsl] func1 -> DEBU 1a0c 0xc001033fe0 gate 1555913885751268400 evaluation fails" +"2019-04-22 06:18:05.753 UTC [policies] Evaluate -> DEBU 1a0d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:05.754 UTC [policies] Evaluate -> DEBU 1a0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:05.754 UTC [policies] func1 -> DEBU 1a0f Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a10 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a11 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:05.755 UTC [policies] Evaluate -> DEBU 1a14 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:05.755 UTC [cauthdsl] func1 -> DEBU 1a15 0xc000dd9800 gate 1555913885755754200 evaluation starts" +"2019-04-22 06:18:05.755 UTC [cauthdsl] func2 -> DEBU 1a16 0xc000dd9800 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.756 UTC [cauthdsl] func2 -> DEBU 1a17 0xc000dd9800 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:05.756 UTC [cauthdsl] func2 -> DEBU 1a18 0xc000dd9800 principal matched by identity 0" +"2019-04-22 06:18:05.756 UTC [msp.identity] Verify -> DEBU 1a19 Verify: digest = 00000000 e7 19 2e 39 0b 38 6b 78 3a 9f 70 1f 2d b8 14 78 |...9.8kx:.p.-..x| +00000010 ee 4f dc 79 b2 e1 57 29 9a c3 57 a1 b0 6b f7 44 |.O.y..W)..W..k.D|" +"2019-04-22 06:18:05.756 UTC [msp.identity] Verify -> DEBU 1a1a Verify: sig = 00000000 30 45 02 21 00 d4 16 ab 2a 38 2e cf b2 bf df 56 |0E.!....*8.....V| +00000010 5f c5 18 a8 5e 7a 97 00 b8 b4 b7 fc 87 c4 ef 12 |_...^z..........| +00000020 f2 44 bf 1e 2a 02 20 12 2d a8 17 33 5a 56 21 13 |.D..*. .-..3ZV!.| +00000030 08 d0 1f cd 9e d6 79 e3 43 9f a6 76 4a ea 0b cc |......y.C..vJ...| +00000040 85 11 af 17 0f 15 41 |......A|" +"2019-04-22 06:18:05.756 UTC [cauthdsl] func2 -> DEBU 1a1b 0xc000dd9800 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:05.756 UTC [cauthdsl] func1 -> DEBU 1a1c 0xc000dd9800 gate 1555913885755754200 evaluation succeeds" +"2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a1d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a1e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a1f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a21 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:05.757 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:05.758 UTC [common.deliver] deliverBlocks -> DEBU 1a23 [channel: businesschannel] Received seekInfo (0xc001069680) start: > stop: > from 192.168.224.9:34766" +"2019-04-22 06:18:05.758 UTC [fsblkstorage] Next -> DEBU 1a24 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:05.758 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a25 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +"2019-04-22 06:18:05.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a26 Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:05.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a27 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:05.758 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a28 blockbytes [34998] read from file [0]" +"2019-04-22 06:18:05.758 UTC [common.deliver] deliverBlocks -> DEBU 1a29 [channel: businesschannel] Delivering block [9] for (0xc001069680) for 192.168.224.9:34766" +"2019-04-22 06:18:05.759 UTC [common.deliver] deliverBlocks -> DEBU 1a2a [channel: businesschannel] Done delivering to 192.168.224.9:34766 for (0xc001069680)" +"2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2b Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2c Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2d Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:05.760 UTC [fsblkstorage] waitForBlock -> DEBU 1a2e Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:05.760 UTC [common.deliver] Handle -> DEBU 1a2f Waiting for new SeekInfo from 192.168.224.9:34766" +"2019-04-22 06:18:05.761 UTC [common.deliver] Handle -> DEBU 1a30 Attempting to read seek info message from 192.168.224.9:34766" +"2019-04-22 06:18:05.764 UTC [grpc] infof -> DEBU 1a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:05.764 UTC [common.deliver] Handle -> WARN 1a32 Error reading from 192.168.224.9:34766: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:05.764 UTC [orderer.common.server] func1 -> DEBU 1a33 Closing Deliver stream" +"2019-04-22 06:18:05.765 UTC [comm.grpc.server] 1 -> INFO 1a34 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34766 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.3872ms +"2019-04-22 06:18:06.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a35 Sending msg of 28 bytes to 2 on channel businesschannel took 51.8µs" +"2019-04-22 06:18:06.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a36 Sending msg of 28 bytes to 3 on channel businesschannel took 33.5µs" +"2019-04-22 06:18:06.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.8µs " +"2019-04-22 06:18:06.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.4µs " +"2019-04-22 06:18:06.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a39 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:06.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:06.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a3b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:06.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a3c Sending msg of 28 bytes to 3 on channel testchainid took 78.7µs" +"2019-04-22 06:18:06.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 241.8µs " +"2019-04-22 06:18:06.335 UTC [orderer.common.server] Deliver -> DEBU 1a3e Starting new Deliver handler" +"2019-04-22 06:18:06.335 UTC [common.deliver] Handle -> DEBU 1a3f Starting new deliver loop for 192.168.224.9:34768" +"2019-04-22 06:18:06.335 UTC [common.deliver] Handle -> DEBU 1a40 Attempting to read seek info message from 192.168.224.9:34768" +"2019-04-22 06:18:06.336 UTC [policies] Evaluate -> DEBU 1a41 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:06.337 UTC [policies] Evaluate -> DEBU 1a42 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.337 UTC [policies] Evaluate -> DEBU 1a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:06.337 UTC [policies] Evaluate -> DEBU 1a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.338 UTC [policies] Evaluate -> DEBU 1a45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:06.338 UTC [cauthdsl] func1 -> DEBU 1a46 0xc000ec9800 gate 1555913886338644100 evaluation starts" +"2019-04-22 06:18:06.339 UTC [cauthdsl] func2 -> DEBU 1a47 0xc000ec9800 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.339 UTC [cauthdsl] func2 -> DEBU 1a48 0xc000ec9800 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.340 UTC [cauthdsl] func2 -> DEBU 1a49 0xc000ec9800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:06.340 UTC [cauthdsl] func2 -> DEBU 1a4a 0xc000ec9800 principal evaluation fails" +"2019-04-22 06:18:06.341 UTC [cauthdsl] func1 -> DEBU 1a4b 0xc000ec9800 gate 1555913886338644100 evaluation fails" +"2019-04-22 06:18:06.341 UTC [policies] Evaluate -> DEBU 1a4c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.342 UTC [policies] Evaluate -> DEBU 1a4d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.342 UTC [policies] Evaluate -> DEBU 1a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:06.343 UTC [cauthdsl] func1 -> DEBU 1a4f 0xc000e900f0 gate 1555913886343177500 evaluation starts" +"2019-04-22 06:18:06.343 UTC [cauthdsl] func2 -> DEBU 1a50 0xc000e900f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.344 UTC [cauthdsl] func2 -> DEBU 1a51 0xc000e900f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.344 UTC [cauthdsl] func2 -> DEBU 1a52 0xc000e900f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:06.344 UTC [cauthdsl] func2 -> DEBU 1a53 0xc000e900f0 principal evaluation fails" +"2019-04-22 06:18:06.345 UTC [cauthdsl] func1 -> DEBU 1a54 0xc000e900f0 gate 1555913886343177500 evaluation fails" +"2019-04-22 06:18:06.345 UTC [policies] Evaluate -> DEBU 1a55 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.345 UTC [policies] Evaluate -> DEBU 1a56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.345 UTC [policies] Evaluate -> DEBU 1a57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:06.346 UTC [cauthdsl] func1 -> DEBU 1a58 0xc000e90c50 gate 1555913886346362700 evaluation starts" +"2019-04-22 06:18:06.346 UTC [cauthdsl] func2 -> DEBU 1a59 0xc000e90c50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.346 UTC [cauthdsl] func2 -> DEBU 1a5a 0xc000e90c50 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.346 UTC [cauthdsl] func2 -> DEBU 1a5b 0xc000e90c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.347 UTC [cauthdsl] func2 -> DEBU 1a5c 0xc000e90c50 principal evaluation fails" +"2019-04-22 06:18:06.347 UTC [cauthdsl] func2 -> DEBU 1a5d 0xc000e90c50 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.347 UTC [cauthdsl] func2 -> DEBU 1a5e 0xc000e90c50 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.348 UTC [cauthdsl] func2 -> DEBU 1a5f 0xc000e90c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.348 UTC [cauthdsl] func2 -> DEBU 1a60 0xc000e90c50 principal evaluation fails" +"2019-04-22 06:18:06.349 UTC [cauthdsl] func2 -> DEBU 1a61 0xc000e90c50 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.349 UTC [cauthdsl] func2 -> DEBU 1a62 0xc000e90c50 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.350 UTC [cauthdsl] func2 -> DEBU 1a63 0xc000e90c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.350 UTC [cauthdsl] func2 -> DEBU 1a64 0xc000e90c50 principal evaluation fails" +"2019-04-22 06:18:06.351 UTC [cauthdsl] func1 -> DEBU 1a65 0xc000e90c50 gate 1555913886346362700 evaluation fails" +"2019-04-22 06:18:06.351 UTC [policies] Evaluate -> DEBU 1a66 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.352 UTC [policies] func1 -> DEBU 1a68 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a69 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a6a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:06.352 UTC [policies] Evaluate -> DEBU 1a6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:06.353 UTC [policies] Evaluate -> DEBU 1a6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.353 UTC [policies] Evaluate -> DEBU 1a6d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:06.353 UTC [cauthdsl] func1 -> DEBU 1a6e 0xc000d28040 gate 1555913886353901800 evaluation starts" +"2019-04-22 06:18:06.354 UTC [cauthdsl] func2 -> DEBU 1a6f 0xc000d28040 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.354 UTC [cauthdsl] func2 -> DEBU 1a70 0xc000d28040 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.354 UTC [cauthdsl] func2 -> DEBU 1a71 0xc000d28040 principal matched by identity 0" +"2019-04-22 06:18:06.354 UTC [msp.identity] Verify -> DEBU 1a72 Verify: digest = 00000000 96 7a e4 83 f6 96 73 4c 8d d5 9a 8e e8 9d 0f 3b |.z....sL.......;| +00000010 41 06 bc 80 3a 01 66 20 83 2a ee b4 09 fd 91 7a |A...:.f .*.....z|" +"2019-04-22 06:18:06.355 UTC [msp.identity] Verify -> DEBU 1a73 Verify: sig = 00000000 30 45 02 21 00 b2 ed 2a f3 a6 06 4d 02 a0 1d 63 |0E.!...*...M...c| +00000010 0c eb 89 8e c0 b1 83 4c 4e 64 60 38 93 f8 d6 46 |.......LNd`8...F| +00000020 3d a8 32 7b 11 02 20 26 c5 14 0b bd 60 91 29 42 |=.2{.. &....`.)B| +00000030 d2 6d 69 1f a9 40 82 02 eb bf 2c 80 0d cb 48 36 |.mi..@....,...H6| +00000040 0d 60 3e 18 dd 1d 5a |.`>...Z|" +"2019-04-22 06:18:06.355 UTC [cauthdsl] func2 -> DEBU 1a74 0xc000d28040 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:06.355 UTC [cauthdsl] func1 -> DEBU 1a75 0xc000d28040 gate 1555913886353901800 evaluation succeeds" +"2019-04-22 06:18:06.355 UTC [policies] Evaluate -> DEBU 1a76 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a77 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a78 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a79 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.356 UTC [policies] Evaluate -> DEBU 1a7a Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:06.357 UTC [policies] Evaluate -> DEBU 1a7b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:06.357 UTC [common.deliver] deliverBlocks -> DEBU 1a7c [channel: businesschannel] Received seekInfo (0xc000363b40) start: > stop: > from 192.168.224.9:34768" +"2019-04-22 06:18:06.357 UTC [fsblkstorage] Next -> DEBU 1a7d Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:06.357 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a7e newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +"2019-04-22 06:18:06.358 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a7f Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:06.358 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a80 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:06.358 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a81 blockbytes [34998] read from file [0]" +"2019-04-22 06:18:06.359 UTC [common.deliver] deliverBlocks -> DEBU 1a82 [channel: businesschannel] Delivering block [9] for (0xc000363b40) for 192.168.224.9:34768" +"2019-04-22 06:18:06.362 UTC [common.deliver] deliverBlocks -> DEBU 1a83 [channel: businesschannel] Done delivering to 192.168.224.9:34768 for (0xc000363b40)" +"2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a84 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a86 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a87 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.363 UTC [fsblkstorage] waitForBlock -> DEBU 1a88 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.368 UTC [grpc] infof -> DEBU 1a89 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:06.363 UTC [common.deliver] Handle -> DEBU 1a85 Waiting for new SeekInfo from 192.168.224.9:34768" +"2019-04-22 06:18:06.369 UTC [common.deliver] Handle -> DEBU 1a8a Attempting to read seek info message from 192.168.224.9:34768" +"2019-04-22 06:18:06.369 UTC [common.deliver] Handle -> WARN 1a8b Error reading from 192.168.224.9:34768: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:06.369 UTC [orderer.common.server] func1 -> DEBU 1a8c Closing Deliver stream" +"2019-04-22 06:18:06.370 UTC [comm.grpc.server] 1 -> INFO 1a8d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34768 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.8763ms +"2019-04-22 06:18:06.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8e Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2019-04-22 06:18:06.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a8f Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2019-04-22 06:18:06.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.7µs " +"2019-04-22 06:18:06.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183µs " +"2019-04-22 06:18:06.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a92 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:06.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:06.600 UTC [orderer.common.server] Deliver -> DEBU 1a94 Starting new Deliver handler" +"2019-04-22 06:18:06.601 UTC [common.deliver] Handle -> DEBU 1a95 Starting new deliver loop for 192.168.224.9:34770" +"2019-04-22 06:18:06.607 UTC [common.deliver] Handle -> DEBU 1a96 Attempting to read seek info message from 192.168.224.9:34770" +"2019-04-22 06:18:06.608 UTC [policies] Evaluate -> DEBU 1a97 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:06.609 UTC [policies] Evaluate -> DEBU 1a98 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.611 UTC [policies] Evaluate -> DEBU 1a99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:06.613 UTC [policies] Evaluate -> DEBU 1a9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.613 UTC [policies] Evaluate -> DEBU 1a9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:06.614 UTC [cauthdsl] func1 -> DEBU 1a9c 0xc000d11620 gate 1555913886614388300 evaluation starts" +"2019-04-22 06:18:06.614 UTC [cauthdsl] func2 -> DEBU 1a9d 0xc000d11620 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.615 UTC [cauthdsl] func2 -> DEBU 1a9e 0xc000d11620 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.615 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc000d11620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:06.616 UTC [cauthdsl] func2 -> DEBU 1aa0 0xc000d11620 principal evaluation fails" +"2019-04-22 06:18:06.617 UTC [cauthdsl] func1 -> DEBU 1aa1 0xc000d11620 gate 1555913886614388300 evaluation fails" +"2019-04-22 06:18:06.617 UTC [policies] Evaluate -> DEBU 1aa2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.618 UTC [policies] Evaluate -> DEBU 1aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.618 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:06.619 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc000d11e70 gate 1555913886619232800 evaluation starts" +"2019-04-22 06:18:06.619 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc000d11e70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.620 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc000d11e70 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.621 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc000d11e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:06.622 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc000d11e70 principal evaluation fails" +"2019-04-22 06:18:06.622 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc000d11e70 gate 1555913886619232800 evaluation fails" +"2019-04-22 06:18:06.622 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.623 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.623 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:06.624 UTC [cauthdsl] func1 -> DEBU 1aae 0xc0003d07e0 gate 1555913886624550100 evaluation starts" +"2019-04-22 06:18:06.624 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc0003d07e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.625 UTC [cauthdsl] func2 -> DEBU 1ab0 0xc0003d07e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.625 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0003d07e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.625 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0003d07e0 principal evaluation fails" +"2019-04-22 06:18:06.626 UTC [cauthdsl] func2 -> DEBU 1ab3 0xc0003d07e0 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.626 UTC [cauthdsl] func2 -> DEBU 1ab4 0xc0003d07e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.627 UTC [cauthdsl] func2 -> DEBU 1ab5 0xc0003d07e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.627 UTC [cauthdsl] func2 -> DEBU 1ab6 0xc0003d07e0 principal evaluation fails" +"2019-04-22 06:18:06.627 UTC [cauthdsl] func2 -> DEBU 1ab7 0xc0003d07e0 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.628 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc0003d07e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.628 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc0003d07e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.629 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0003d07e0 principal evaluation fails" +"2019-04-22 06:18:06.629 UTC [cauthdsl] func1 -> DEBU 1abb 0xc0003d07e0 gate 1555913886624550100 evaluation fails" +"2019-04-22 06:18:06.629 UTC [policies] Evaluate -> DEBU 1abc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.630 UTC [policies] Evaluate -> DEBU 1abd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.630 UTC [policies] func1 -> DEBU 1abe Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-04-22 06:18:06.630 UTC [policies] Evaluate -> DEBU 1abf Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:06.630 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:06.631 UTC [policies] Evaluate -> DEBU 1ac1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:06.631 UTC [policies] Evaluate -> DEBU 1ac2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.631 UTC [policies] Evaluate -> DEBU 1ac3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:06.631 UTC [cauthdsl] func1 -> DEBU 1ac4 0xc0003d1c40 gate 1555913886631708800 evaluation starts" +"2019-04-22 06:18:06.631 UTC [cauthdsl] func2 -> DEBU 1ac5 0xc0003d1c40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.632 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0003d1c40 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.632 UTC [cauthdsl] func2 -> DEBU 1ac7 0xc0003d1c40 principal matched by identity 0" +"2019-04-22 06:18:06.632 UTC [msp.identity] Verify -> DEBU 1ac8 Verify: digest = 00000000 bf ab e4 78 12 21 fb 5d e0 8c 96 7d b4 e9 e6 61 |...x.!.]...}...a| +00000010 f1 c3 de bc 2f fa d2 ee 95 2b 80 47 b4 cc 08 e8 |..../....+.G....|" +"2019-04-22 06:18:06.632 UTC [msp.identity] Verify -> DEBU 1ac9 Verify: sig = 00000000 30 44 02 20 72 50 ce 9a 6f d6 3f 5d a6 bf d4 31 |0D. rP..o.?]...1| +00000010 b4 c1 01 4c 99 59 4e 98 71 a1 71 c5 5e f0 da 04 |...L.YN.q.q.^...| +00000020 46 8f f1 18 02 20 54 25 ce 9d d9 b9 ed 87 bd 22 |F.... T%......."| +00000030 ee 3f 04 74 7a 72 77 9d a2 38 21 2c 9a 96 ec 85 |.?.tzrw..8!,....| +00000040 1f e2 cc d7 dd cf |......|" +"2019-04-22 06:18:06.633 UTC [cauthdsl] func2 -> DEBU 1aca 0xc0003d1c40 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:06.633 UTC [cauthdsl] func1 -> DEBU 1acb 0xc0003d1c40 gate 1555913886631708800 evaluation succeeds" +"2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1acc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1acd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1ace Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1acf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.634 UTC [policies] Evaluate -> DEBU 1ad0 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:06.635 UTC [policies] Evaluate -> DEBU 1ad1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:06.635 UTC [common.deliver] deliverBlocks -> DEBU 1ad2 [channel: businesschannel] Received seekInfo (0xc0009ba200) start: > stop: > from 192.168.224.9:34770" +"2019-04-22 06:18:06.635 UTC [fsblkstorage] Next -> DEBU 1ad3 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:06.635 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +"2019-04-22 06:18:06.636 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad5 Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:06.636 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad6 Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:06.636 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad7 blockbytes [34998] read from file [0]" +"2019-04-22 06:18:06.637 UTC [common.deliver] deliverBlocks -> DEBU 1ad8 [channel: businesschannel] Delivering block [9] for (0xc0009ba200) for 192.168.224.9:34770" +"2019-04-22 06:18:06.637 UTC [common.deliver] deliverBlocks -> DEBU 1ad9 [channel: businesschannel] Done delivering to 192.168.224.9:34770 for (0xc0009ba200)" +"2019-04-22 06:18:06.638 UTC [common.deliver] Handle -> DEBU 1ada Waiting for new SeekInfo from 192.168.224.9:34770" +"2019-04-22 06:18:06.638 UTC [common.deliver] Handle -> DEBU 1adb Attempting to read seek info message from 192.168.224.9:34770" +"2019-04-22 06:18:06.638 UTC [fsblkstorage] waitForBlock -> DEBU 1adc Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.639 UTC [fsblkstorage] waitForBlock -> DEBU 1add Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.639 UTC [fsblkstorage] waitForBlock -> DEBU 1ade Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.639 UTC [fsblkstorage] waitForBlock -> DEBU 1adf Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1ae4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:06.640 UTC [cauthdsl] func1 -> DEBU 1ae5 0xc00026b160 gate 1555913886640518800 evaluation starts" +"2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae6 0xc00026b160 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae7 0xc00026b160 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae8 0xc00026b160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:06.640 UTC [cauthdsl] func2 -> DEBU 1ae9 0xc00026b160 principal evaluation fails" +"2019-04-22 06:18:06.640 UTC [cauthdsl] func1 -> DEBU 1aea 0xc00026b160 gate 1555913886640518800 evaluation fails" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1aeb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1aec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.640 UTC [policies] Evaluate -> DEBU 1aed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:06.640 UTC [cauthdsl] func1 -> DEBU 1aee 0xc00026bcf0 gate 1555913886640953200 evaluation starts" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1aef 0xc00026bcf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af0 0xc00026bcf0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af1 0xc00026bcf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af2 0xc00026bcf0 principal evaluation fails" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func1 -> DEBU 1af3 0xc00026bcf0 gate 1555913886640953200 evaluation fails" +"2019-04-22 06:18:06.641 UTC [policies] Evaluate -> DEBU 1af4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.641 UTC [policies] Evaluate -> DEBU 1af5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.641 UTC [policies] Evaluate -> DEBU 1af6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func1 -> DEBU 1af7 0xc00024e730 gate 1555913886641473700 evaluation starts" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af8 0xc00024e730 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1af9 0xc00024e730 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afa 0xc00024e730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afb 0xc00024e730 principal evaluation fails" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afc 0xc00024e730 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afd 0xc00024e730 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1afe 0xc00024e730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1aff 0xc00024e730 principal evaluation fails" +"2019-04-22 06:18:06.641 UTC [cauthdsl] func2 -> DEBU 1b00 0xc00024e730 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b01 0xc00024e730 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b02 0xc00024e730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b03 0xc00024e730 principal evaluation fails" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func1 -> DEBU 1b04 0xc00024e730 gate 1555913886641473700 evaluation fails" +"2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b05 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.642 UTC [policies] func1 -> DEBU 1b07 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b08 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.642 UTC [policies] Evaluate -> DEBU 1b0c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func1 -> DEBU 1b0d 0xc000446190 gate 1555913886642644500 evaluation starts" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b0e 0xc000446190 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc000446190 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.642 UTC [cauthdsl] func2 -> DEBU 1b10 0xc000446190 principal matched by identity 0" +"2019-04-22 06:18:06.643 UTC [msp.identity] Verify -> DEBU 1b11 Verify: digest = 00000000 33 e4 38 79 b8 6b 95 bb 44 85 f8 fa 78 6f 01 82 |3.8y.k..D...xo..| +00000010 0f eb b3 a6 6b c4 d6 fd 9b d2 49 d3 f0 10 ea be |....k.....I.....|" +"2019-04-22 06:18:06.643 UTC [msp.identity] Verify -> DEBU 1b12 Verify: sig = 00000000 30 45 02 21 00 bc 0b ba 68 57 06 9a 16 a2 3c f0 |0E.!....hW....<.| +00000010 f9 12 3e 26 9d aa 68 9e 9e 3c 63 cf 12 2c 8d 9c |..>&..h.. DEBU 1b13 0xc000446190 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:06.643 UTC [cauthdsl] func1 -> DEBU 1b14 0xc000446190 gate 1555913886642644500 evaluation succeeds" +"2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b15 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b16 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b17 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b19 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:06.643 UTC [policies] Evaluate -> DEBU 1b1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:06.643 UTC [common.deliver] deliverBlocks -> DEBU 1b1b [channel: businesschannel] Received seekInfo (0xc0009ba640) start: > stop: > from 192.168.224.9:34770" +"2019-04-22 06:18:06.643 UTC [fsblkstorage] Next -> DEBU 1b1c Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:06.643 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b1d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +"2019-04-22 06:18:06.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b1e Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:06.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b1f Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:06.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b20 blockbytes [34998] read from file [0]" +"2019-04-22 06:18:06.644 UTC [common.deliver] deliverBlocks -> DEBU 1b21 [channel: businesschannel] Delivering block [9] for (0xc0009ba640) for 192.168.224.9:34770" +"2019-04-22 06:18:06.644 UTC [common.deliver] deliverBlocks -> DEBU 1b22 [channel: businesschannel] Done delivering to 192.168.224.9:34770 for (0xc0009ba640)" +"2019-04-22 06:18:06.644 UTC [common.deliver] Handle -> DEBU 1b23 Waiting for new SeekInfo from 192.168.224.9:34770" +"2019-04-22 06:18:06.644 UTC [common.deliver] Handle -> DEBU 1b24 Attempting to read seek info message from 192.168.224.9:34770" +"2019-04-22 06:18:06.644 UTC [fsblkstorage] waitForBlock -> DEBU 1b25 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.644 UTC [fsblkstorage] waitForBlock -> DEBU 1b26 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.645 UTC [fsblkstorage] waitForBlock -> DEBU 1b27 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.645 UTC [fsblkstorage] waitForBlock -> DEBU 1b28 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.653 UTC [common.deliver] Handle -> WARN 1b29 Error reading from 192.168.224.9:34770: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:06.654 UTC [orderer.common.server] func1 -> DEBU 1b2a Closing Deliver stream" +"2019-04-22 06:18:06.654 UTC [comm.grpc.server] 1 -> INFO 1b2b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34770 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=53.7026ms +"2019-04-22 06:18:06.654 UTC [grpc] infof -> DEBU 1b2c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:06.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b2d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:06.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b2e Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2019-04-22 06:18:06.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.1µs " +"2019-04-22 06:18:06.795 UTC [orderer.common.server] Deliver -> DEBU 1b30 Starting new Deliver handler" +"2019-04-22 06:18:06.795 UTC [common.deliver] Handle -> DEBU 1b31 Starting new deliver loop for 192.168.224.9:34772" +"2019-04-22 06:18:06.795 UTC [common.deliver] Handle -> DEBU 1b32 Attempting to read seek info message from 192.168.224.9:34772" +"2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b35 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b36 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.797 UTC [policies] Evaluate -> DEBU 1b37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:06.797 UTC [cauthdsl] func1 -> DEBU 1b38 0xc0003e6410 gate 1555913886797350100 evaluation starts" +"2019-04-22 06:18:06.797 UTC [cauthdsl] func2 -> DEBU 1b39 0xc0003e6410 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.797 UTC [cauthdsl] func2 -> DEBU 1b3a 0xc0003e6410 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.797 UTC [cauthdsl] func2 -> DEBU 1b3b 0xc0003e6410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:06.798 UTC [cauthdsl] func2 -> DEBU 1b3c 0xc0003e6410 principal evaluation fails" +"2019-04-22 06:18:06.798 UTC [cauthdsl] func1 -> DEBU 1b3d 0xc0003e6410 gate 1555913886797350100 evaluation fails" +"2019-04-22 06:18:06.799 UTC [policies] Evaluate -> DEBU 1b3e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.799 UTC [policies] Evaluate -> DEBU 1b3f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.800 UTC [policies] Evaluate -> DEBU 1b40 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:06.801 UTC [cauthdsl] func1 -> DEBU 1b41 0xc0003e6df0 gate 1555913886801164400 evaluation starts" +"2019-04-22 06:18:06.801 UTC [cauthdsl] func2 -> DEBU 1b42 0xc0003e6df0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.801 UTC [cauthdsl] func2 -> DEBU 1b43 0xc0003e6df0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.801 UTC [cauthdsl] func2 -> DEBU 1b44 0xc0003e6df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:06.802 UTC [cauthdsl] func2 -> DEBU 1b45 0xc0003e6df0 principal evaluation fails" +"2019-04-22 06:18:06.802 UTC [cauthdsl] func1 -> DEBU 1b46 0xc0003e6df0 gate 1555913886801164400 evaluation fails" +"2019-04-22 06:18:06.802 UTC [policies] Evaluate -> DEBU 1b47 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.802 UTC [policies] Evaluate -> DEBU 1b48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.803 UTC [policies] Evaluate -> DEBU 1b49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:06.803 UTC [cauthdsl] func1 -> DEBU 1b4a 0xc0003e7870 gate 1555913886803261200 evaluation starts" +"2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4b 0xc0003e7870 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc0003e7870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc0003e7870 principal evaluation fails" +"2019-04-22 06:18:06.803 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc0003e7870 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b50 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b51 0xc0003e7870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b52 0xc0003e7870 principal evaluation fails" +"2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b53 0xc0003e7870 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b54 0xc0003e7870 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.804 UTC [cauthdsl] func2 -> DEBU 1b55 0xc0003e7870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:06.805 UTC [cauthdsl] func2 -> DEBU 1b56 0xc0003e7870 principal evaluation fails" +"2019-04-22 06:18:06.805 UTC [cauthdsl] func1 -> DEBU 1b57 0xc0003e7870 gate 1555913886803261200 evaluation fails" +"2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b58 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b59 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:06.805 UTC [policies] func1 -> DEBU 1b5a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5b Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:06.805 UTC [policies] Evaluate -> DEBU 1b5e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.806 UTC [policies] Evaluate -> DEBU 1b5f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:06.806 UTC [cauthdsl] func1 -> DEBU 1b60 0xc000172f50 gate 1555913886806204600 evaluation starts" +"2019-04-22 06:18:06.806 UTC [cauthdsl] func2 -> DEBU 1b61 0xc000172f50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.806 UTC [cauthdsl] func2 -> DEBU 1b62 0xc000172f50 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:06.807 UTC [cauthdsl] func2 -> DEBU 1b63 0xc000172f50 principal matched by identity 0" +"2019-04-22 06:18:06.807 UTC [msp.identity] Verify -> DEBU 1b64 Verify: digest = 00000000 f7 bc f0 61 f3 fd 95 6d 39 20 36 e4 4f 01 11 76 |...a...m9 6.O..v| +00000010 d1 35 be 6f 85 b0 3d c0 95 55 f8 c0 63 5f cf d7 |.5.o..=..U..c_..|" +"2019-04-22 06:18:06.807 UTC [msp.identity] Verify -> DEBU 1b65 Verify: sig = 00000000 30 44 02 20 39 97 37 33 c6 55 e6 d1 a5 13 dc a7 |0D. 9.73.U......| +00000010 a5 ad 8c 09 cc ac 90 57 fa d2 14 c4 ae b3 cb c6 |.......W........| +00000020 ae 5c be 68 02 20 76 3b e9 57 77 c6 6e 9e d0 35 |.\.h. v;.Ww.n..5| +00000030 e7 70 2b 66 8b 4c 95 16 5a b1 9d ca 8f 98 ab a3 |.p+f.L..Z.......| +00000040 48 d9 95 0e 77 d2 |H...w.|" +"2019-04-22 06:18:06.807 UTC [cauthdsl] func2 -> DEBU 1b66 0xc000172f50 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:06.807 UTC [cauthdsl] func1 -> DEBU 1b67 0xc000172f50 gate 1555913886806204600 evaluation succeeds" +"2019-04-22 06:18:06.807 UTC [policies] Evaluate -> DEBU 1b68 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6a Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6c Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:06.808 UTC [policies] Evaluate -> DEBU 1b6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:06.808 UTC [common.deliver] deliverBlocks -> DEBU 1b6e [channel: businesschannel] Received seekInfo (0xc0009bab00) start: > stop: > from 192.168.224.9:34772" +"2019-04-22 06:18:06.808 UTC [fsblkstorage] Next -> DEBU 1b6f Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:06.808 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b70 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-04-22 06:18:06.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b71 Remaining bytes=[133667], Going to peek [8] bytes" +"2019-04-22 06:18:06.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b72 Returning blockbytes - length=[23937], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:18:06.808 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b73 blockbytes [23937] read from file [0]" +"2019-04-22 06:18:06.808 UTC [common.deliver] deliverBlocks -> DEBU 1b74 [channel: businesschannel] Delivering block [0] for (0xc0009bab00) for 192.168.224.9:34772" +"2019-04-22 06:18:06.809 UTC [common.deliver] deliverBlocks -> DEBU 1b75 [channel: businesschannel] Done delivering to 192.168.224.9:34772 for (0xc0009bab00)" +"2019-04-22 06:18:06.809 UTC [common.deliver] Handle -> DEBU 1b76 Waiting for new SeekInfo from 192.168.224.9:34772" +"2019-04-22 06:18:06.809 UTC [common.deliver] Handle -> DEBU 1b77 Attempting to read seek info message from 192.168.224.9:34772" +"2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b78 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b79 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b7a Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:06.809 UTC [fsblkstorage] waitForBlock -> DEBU 1b7b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:06.817 UTC [common.deliver] Handle -> WARN 1b7c Error reading from 192.168.224.9:34772: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:06.817 UTC [orderer.common.server] func1 -> DEBU 1b7d Closing Deliver stream" +"2019-04-22 06:18:06.817 UTC [comm.grpc.server] 1 -> INFO 1b7f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34772 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.0118ms +"2019-04-22 06:18:06.817 UTC [grpc] infof -> DEBU 1b7e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:07.067 UTC [orderer.common.server] Deliver -> DEBU 1b80 Starting new Deliver handler" +"2019-04-22 06:18:07.067 UTC [common.deliver] Handle -> DEBU 1b81 Starting new deliver loop for 192.168.224.9:34774" +"2019-04-22 06:18:07.067 UTC [common.deliver] Handle -> DEBU 1b82 Attempting to read seek info message from 192.168.224.9:34774" +"2019-04-22 06:18:07.069 UTC [policies] Evaluate -> DEBU 1b83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:07.069 UTC [policies] Evaluate -> DEBU 1b84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.069 UTC [policies] Evaluate -> DEBU 1b85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:07.070 UTC [policies] Evaluate -> DEBU 1b86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.071 UTC [policies] Evaluate -> DEBU 1b87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:07.071 UTC [cauthdsl] func1 -> DEBU 1b89 0xc0009e7cf0 gate 1555913887071564700 evaluation starts" +"2019-04-22 06:18:07.071 UTC [cauthdsl] func2 -> DEBU 1b8b 0xc0009e7cf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.072 UTC [cauthdsl] func2 -> DEBU 1b8c 0xc0009e7cf0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.072 UTC [cauthdsl] func2 -> DEBU 1b8d 0xc0009e7cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:07.073 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc0009e7cf0 principal evaluation fails" +"2019-04-22 06:18:07.073 UTC [cauthdsl] func1 -> DEBU 1b8f 0xc0009e7cf0 gate 1555913887071564700 evaluation fails" +"2019-04-22 06:18:07.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 269.6µs " +"2019-04-22 06:18:07.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b88 Sending msg of 28 bytes to 2 on channel businesschannel took 32µs" +"2019-04-22 06:18:07.073 UTC [policies] Evaluate -> DEBU 1b90 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b91 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:07.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b92 Sending msg of 28 bytes to 3 on channel businesschannel took 105.3µs" +"2019-04-22 06:18:07.075 UTC [policies] Evaluate -> DEBU 1b93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.076 UTC [policies] Evaluate -> DEBU 1b94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:07.076 UTC [cauthdsl] func1 -> DEBU 1b95 0xc0001f1150 gate 1555913887076513600 evaluation starts" +"2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b96 0xc0001f1150 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b97 0xc0001f1150 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b98 0xc0001f1150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:07.076 UTC [cauthdsl] func2 -> DEBU 1b99 0xc0001f1150 principal evaluation fails" +"2019-04-22 06:18:07.076 UTC [cauthdsl] func1 -> DEBU 1b9a 0xc0001f1150 gate 1555913887076513600 evaluation fails" +"2019-04-22 06:18:07.077 UTC [policies] Evaluate -> DEBU 1b9b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.077 UTC [policies] Evaluate -> DEBU 1b9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.077 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:07.077 UTC [cauthdsl] func1 -> DEBU 1b9e 0xc0001f1a30 gate 1555913887077489000 evaluation starts" +"2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc0001f1a30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc0001f1a30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc0001f1a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.077 UTC [cauthdsl] func2 -> DEBU 1ba2 0xc0001f1a30 principal evaluation fails" +"2019-04-22 06:18:07.078 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ba3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.9836ms " +"2019-04-22 06:18:07.078 UTC [cauthdsl] func2 -> DEBU 1ba4 0xc0001f1a30 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.079 UTC [cauthdsl] func2 -> DEBU 1ba5 0xc0001f1a30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba6 0xc0001f1a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba7 0xc0001f1a30 principal evaluation fails" +"2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba8 0xc0001f1a30 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.080 UTC [cauthdsl] func2 -> DEBU 1ba9 0xc0001f1a30 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1baa Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:07.081 UTC [cauthdsl] func2 -> DEBU 1bab 0xc0001f1a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.081 UTC [cauthdsl] func2 -> DEBU 1bac 0xc0001f1a30 principal evaluation fails" +"2019-04-22 06:18:07.081 UTC [cauthdsl] func1 -> DEBU 1bad 0xc0001f1a30 gate 1555913887077489000 evaluation fails" +"2019-04-22 06:18:07.082 UTC [policies] Evaluate -> DEBU 1bae Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.082 UTC [policies] Evaluate -> DEBU 1baf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.082 UTC [policies] func1 -> DEBU 1bb0 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-04-22 06:18:07.082 UTC [policies] Evaluate -> DEBU 1bb1 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.083 UTC [policies] Evaluate -> DEBU 1bb5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:07.083 UTC [cauthdsl] func1 -> DEBU 1bb6 0xc000ee9300 gate 1555913887083856500 evaluation starts" +"2019-04-22 06:18:07.084 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc000ee9300 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.084 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc000ee9300 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.084 UTC [cauthdsl] func2 -> DEBU 1bb9 0xc000ee9300 principal matched by identity 0" +"2019-04-22 06:18:07.084 UTC [msp.identity] Verify -> DEBU 1bba Verify: digest = 00000000 f0 df 63 dc f8 a7 d1 59 84 02 8f db 75 19 42 57 |..c....Y....u.BW| +00000010 67 2d f3 5f a6 7e dd ad dd 84 c9 68 1b fe a5 ac |g-._.~.....h....|" +"2019-04-22 06:18:07.085 UTC [msp.identity] Verify -> DEBU 1bbb Verify: sig = 00000000 30 45 02 21 00 ed c0 eb 32 3c e6 c7 e5 71 90 b4 |0E.!....2<...q..| +00000010 ea 81 2d be df a3 53 71 78 ad 04 24 1c 8e c3 4c |..-...Sqx..$...L| +00000020 4c fd 1b bc 6e 02 20 5e 31 47 57 9e 6e d2 92 93 |L...n. ^1GW.n...| +00000030 fe c9 37 42 79 57 9a 1c 74 0f 3d 3b 2a 03 0c 97 |..7ByW..t.=;*...| +00000040 1d 71 b6 f6 ac 18 7e |.q....~|" +"2019-04-22 06:18:07.085 UTC [cauthdsl] func2 -> DEBU 1bbc 0xc000ee9300 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:07.085 UTC [cauthdsl] func1 -> DEBU 1bbd 0xc000ee9300 gate 1555913887083856500 evaluation succeeds" +"2019-04-22 06:18:07.086 UTC [policies] Evaluate -> DEBU 1bbe Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.086 UTC [policies] Evaluate -> DEBU 1bbf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.087 UTC [policies] Evaluate -> DEBU 1bc0 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.087 UTC [policies] Evaluate -> DEBU 1bc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.088 UTC [policies] Evaluate -> DEBU 1bc2 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:07.088 UTC [policies] Evaluate -> DEBU 1bc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:07.088 UTC [common.deliver] deliverBlocks -> DEBU 1bc4 [channel: businesschannel] Received seekInfo (0xc0009bb180) start: > stop: > from 192.168.224.9:34774" +"2019-04-22 06:18:07.089 UTC [fsblkstorage] Next -> DEBU 1bc5 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:07.090 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bc6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[23940]" +"2019-04-22 06:18:07.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc7 Remaining bytes=[109727], Going to peek [8] bytes" +"2019-04-22 06:18:07.090 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc8 Returning blockbytes - length=[23684], placementInfo={fileNum=[0], startOffset=[23940], bytesOffset=[23943]}" +"2019-04-22 06:18:07.091 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc9 blockbytes [23684] read from file [0]" +"2019-04-22 06:18:07.091 UTC [common.deliver] deliverBlocks -> DEBU 1bca [channel: businesschannel] Delivering block [1] for (0xc0009bb180) for 192.168.224.9:34774" +"2019-04-22 06:18:07.092 UTC [common.deliver] deliverBlocks -> DEBU 1bcb [channel: businesschannel] Done delivering to 192.168.224.9:34774 for (0xc0009bb180)" +"2019-04-22 06:18:07.092 UTC [common.deliver] Handle -> DEBU 1bcc Waiting for new SeekInfo from 192.168.224.9:34774" +"2019-04-22 06:18:07.092 UTC [common.deliver] Handle -> DEBU 1bcd Attempting to read seek info message from 192.168.224.9:34774" +"2019-04-22 06:18:07.093 UTC [fsblkstorage] waitForBlock -> DEBU 1bce Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.093 UTC [fsblkstorage] waitForBlock -> DEBU 1bcf Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.093 UTC [fsblkstorage] waitForBlock -> DEBU 1bd0 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.094 UTC [fsblkstorage] waitForBlock -> DEBU 1bd1 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.105 UTC [common.deliver] Handle -> WARN 1bd2 Error reading from 192.168.224.9:34774: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:07.105 UTC [orderer.common.server] func1 -> DEBU 1bd4 Closing Deliver stream" +"2019-04-22 06:18:07.106 UTC [comm.grpc.server] 1 -> INFO 1bd5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34774 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2754ms +"2019-04-22 06:18:07.105 UTC [grpc] infof -> DEBU 1bd3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:07.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1bd6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:07.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1bd7 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +"2019-04-22 06:18:07.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1bd8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 439.3µs " +"2019-04-22 06:18:07.292 UTC [orderer.common.server] Deliver -> DEBU 1bd9 Starting new Deliver handler" +"2019-04-22 06:18:07.293 UTC [common.deliver] Handle -> DEBU 1bda Starting new deliver loop for 192.168.224.9:34776" +"2019-04-22 06:18:07.293 UTC [common.deliver] Handle -> DEBU 1bdb Attempting to read seek info message from 192.168.224.9:34776" +"2019-04-22 06:18:07.294 UTC [policies] Evaluate -> DEBU 1bdc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:07.294 UTC [policies] Evaluate -> DEBU 1bdd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.295 UTC [policies] Evaluate -> DEBU 1bde == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:07.295 UTC [policies] Evaluate -> DEBU 1bdf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.295 UTC [policies] Evaluate -> DEBU 1be0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:07.296 UTC [cauthdsl] func1 -> DEBU 1be1 0xc000fb7920 gate 1555913887296625200 evaluation starts" +"2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be2 0xc000fb7920 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be3 0xc000fb7920 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be4 0xc000fb7920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:07.297 UTC [cauthdsl] func2 -> DEBU 1be5 0xc000fb7920 principal evaluation fails" +"2019-04-22 06:18:07.297 UTC [cauthdsl] func1 -> DEBU 1be6 0xc000fb7920 gate 1555913887296625200 evaluation fails" +"2019-04-22 06:18:07.297 UTC [policies] Evaluate -> DEBU 1be7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.298 UTC [policies] Evaluate -> DEBU 1be8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.298 UTC [policies] Evaluate -> DEBU 1be9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:07.298 UTC [cauthdsl] func1 -> DEBU 1bea 0xc0009d8160 gate 1555913887298480900 evaluation starts" +"2019-04-22 06:18:07.298 UTC [cauthdsl] func2 -> DEBU 1beb 0xc0009d8160 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.298 UTC [cauthdsl] func2 -> DEBU 1bec 0xc0009d8160 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.299 UTC [cauthdsl] func2 -> DEBU 1bed 0xc0009d8160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:07.299 UTC [cauthdsl] func2 -> DEBU 1bee 0xc0009d8160 principal evaluation fails" +"2019-04-22 06:18:07.299 UTC [cauthdsl] func1 -> DEBU 1bef 0xc0009d8160 gate 1555913887298480900 evaluation fails" +"2019-04-22 06:18:07.300 UTC [policies] Evaluate -> DEBU 1bf0 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.300 UTC [policies] Evaluate -> DEBU 1bf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.300 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:07.300 UTC [cauthdsl] func1 -> DEBU 1bf3 0xc0009d89a0 gate 1555913887300283500 evaluation starts" +"2019-04-22 06:18:07.300 UTC [cauthdsl] func2 -> DEBU 1bf4 0xc0009d89a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.300 UTC [cauthdsl] func2 -> DEBU 1bf5 0xc0009d89a0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc0009d89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc0009d89a0 principal evaluation fails" +"2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc0009d89a0 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bf9 0xc0009d89a0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bfa 0xc0009d89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bfb 0xc0009d89a0 principal evaluation fails" +"2019-04-22 06:18:07.301 UTC [cauthdsl] func2 -> DEBU 1bfc 0xc0009d89a0 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.302 UTC [cauthdsl] func2 -> DEBU 1bfd 0xc0009d89a0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.302 UTC [cauthdsl] func2 -> DEBU 1bfe 0xc0009d89a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.302 UTC [cauthdsl] func2 -> DEBU 1bff 0xc0009d89a0 principal evaluation fails" +"2019-04-22 06:18:07.302 UTC [cauthdsl] func1 -> DEBU 1c00 0xc0009d89a0 gate 1555913887300283500 evaluation fails" +"2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c01 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.302 UTC [policies] func1 -> DEBU 1c03 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c04 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c05 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:07.302 UTC [policies] Evaluate -> DEBU 1c06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:07.303 UTC [policies] Evaluate -> DEBU 1c07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.303 UTC [policies] Evaluate -> DEBU 1c08 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:07.303 UTC [cauthdsl] func1 -> DEBU 1c09 0xc0009d9f00 gate 1555913887303660700 evaluation starts" +"2019-04-22 06:18:07.304 UTC [cauthdsl] func2 -> DEBU 1c0a 0xc0009d9f00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.304 UTC [cauthdsl] func2 -> DEBU 1c0b 0xc0009d9f00 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.304 UTC [cauthdsl] func2 -> DEBU 1c0c 0xc0009d9f00 principal matched by identity 0" +"2019-04-22 06:18:07.304 UTC [msp.identity] Verify -> DEBU 1c0d Verify: digest = 00000000 f4 a0 3f b8 7e 4c 00 0d 9e 94 06 f4 f9 04 bd b3 |..?.~L..........| +00000010 0a 85 53 68 ec b0 8b 7f 0d 13 69 c9 8f 45 6d 54 |..Sh......i..EmT|" +"2019-04-22 06:18:07.304 UTC [msp.identity] Verify -> DEBU 1c0e Verify: sig = 00000000 30 44 02 20 1b 29 81 e3 7c e2 f7 df c6 42 c8 cf |0D. .)..|....B..| +00000010 7d 83 4b 02 9d e2 dd 28 de 5e 4e 62 65 87 5f d2 |}.K....(.^Nbe._.| +00000020 fc 05 35 3c 02 20 2c 4e 67 a8 73 64 66 94 24 74 |..5<. ,Ng.sdf.$t| +00000030 d1 35 41 ec 5a 3f 52 7f ae b8 e7 a1 db 43 de 18 |.5A.Z?R......C..| +00000040 7e b9 ee 77 6e b5 |~..wn.|" +"2019-04-22 06:18:07.305 UTC [cauthdsl] func2 -> DEBU 1c0f 0xc0009d9f00 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:07.305 UTC [cauthdsl] func1 -> DEBU 1c10 0xc0009d9f00 gate 1555913887303660700 evaluation succeeds" +"2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c11 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c12 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c13 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.305 UTC [policies] Evaluate -> DEBU 1c15 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:07.306 UTC [policies] Evaluate -> DEBU 1c16 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:07.307 UTC [common.deliver] deliverBlocks -> DEBU 1c17 [channel: businesschannel] Received seekInfo (0xc000dd6c00) start: > stop: > from 192.168.224.9:34776" +"2019-04-22 06:18:07.307 UTC [fsblkstorage] Next -> DEBU 1c18 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:07.307 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c19 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[47627]" +"2019-04-22 06:18:07.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c1a Remaining bytes=[86040], Going to peek [8] bytes" +"2019-04-22 06:18:07.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c1b Returning blockbytes - length=[23742], placementInfo={fileNum=[0], startOffset=[47627], bytesOffset=[47630]}" +"2019-04-22 06:18:07.307 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c1c blockbytes [23742] read from file [0]" +"2019-04-22 06:18:07.307 UTC [common.deliver] deliverBlocks -> DEBU 1c1d [channel: businesschannel] Delivering block [2] for (0xc000dd6c00) for 192.168.224.9:34776" +"2019-04-22 06:18:07.307 UTC [common.deliver] deliverBlocks -> DEBU 1c1e [channel: businesschannel] Done delivering to 192.168.224.9:34776 for (0xc000dd6c00)" +"2019-04-22 06:18:07.308 UTC [common.deliver] Handle -> DEBU 1c1f Waiting for new SeekInfo from 192.168.224.9:34776" +"2019-04-22 06:18:07.308 UTC [common.deliver] Handle -> DEBU 1c20 Attempting to read seek info message from 192.168.224.9:34776" +"2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c21 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c22 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c23 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.308 UTC [fsblkstorage] waitForBlock -> DEBU 1c24 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.315 UTC [common.deliver] Handle -> WARN 1c25 Error reading from 192.168.224.9:34776: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:07.316 UTC [orderer.common.server] func1 -> DEBU 1c27 Closing Deliver stream" +"2019-04-22 06:18:07.317 UTC [comm.grpc.server] 1 -> INFO 1c28 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34776 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.2501ms +"2019-04-22 06:18:07.316 UTC [grpc] infof -> DEBU 1c26 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:07.552 UTC [orderer.common.server] Deliver -> DEBU 1c29 Starting new Deliver handler" +"2019-04-22 06:18:07.553 UTC [common.deliver] Handle -> DEBU 1c2a Starting new deliver loop for 192.168.224.9:34778" +"2019-04-22 06:18:07.553 UTC [common.deliver] Handle -> DEBU 1c2b Attempting to read seek info message from 192.168.224.9:34778" +"2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.554 UTC [policies] Evaluate -> DEBU 1c30 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:07.555 UTC [cauthdsl] func1 -> DEBU 1c31 0xc000d76330 gate 1555913887555126400 evaluation starts" +"2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c32 0xc000d76330 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c33 0xc000d76330 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c34 0xc000d76330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:07.555 UTC [cauthdsl] func2 -> DEBU 1c35 0xc000d76330 principal evaluation fails" +"2019-04-22 06:18:07.555 UTC [cauthdsl] func1 -> DEBU 1c36 0xc000d76330 gate 1555913887555126400 evaluation fails" +"2019-04-22 06:18:07.555 UTC [policies] Evaluate -> DEBU 1c37 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.555 UTC [policies] Evaluate -> DEBU 1c38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.555 UTC [policies] Evaluate -> DEBU 1c39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:07.556 UTC [cauthdsl] func1 -> DEBU 1c3a 0xc000d76b70 gate 1555913887556185400 evaluation starts" +"2019-04-22 06:18:07.556 UTC [cauthdsl] func2 -> DEBU 1c3b 0xc000d76b70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.556 UTC [cauthdsl] func2 -> DEBU 1c3c 0xc000d76b70 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.557 UTC [cauthdsl] func2 -> DEBU 1c3d 0xc000d76b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:07.557 UTC [cauthdsl] func2 -> DEBU 1c3e 0xc000d76b70 principal evaluation fails" +"2019-04-22 06:18:07.557 UTC [cauthdsl] func1 -> DEBU 1c3f 0xc000d76b70 gate 1555913887556185400 evaluation fails" +"2019-04-22 06:18:07.558 UTC [policies] Evaluate -> DEBU 1c40 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.558 UTC [policies] Evaluate -> DEBU 1c41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.558 UTC [policies] Evaluate -> DEBU 1c42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:07.558 UTC [cauthdsl] func1 -> DEBU 1c43 0xc000d773b0 gate 1555913887558762500 evaluation starts" +"2019-04-22 06:18:07.558 UTC [cauthdsl] func2 -> DEBU 1c44 0xc000d773b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.559 UTC [cauthdsl] func2 -> DEBU 1c45 0xc000d773b0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.559 UTC [cauthdsl] func2 -> DEBU 1c46 0xc000d773b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.559 UTC [cauthdsl] func2 -> DEBU 1c47 0xc000d773b0 principal evaluation fails" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c48 0xc000d773b0 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c49 0xc000d773b0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4a 0xc000d773b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4b 0xc000d773b0 principal evaluation fails" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc000d773b0 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4d 0xc000d773b0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4e 0xc000d773b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func2 -> DEBU 1c4f 0xc000d773b0 principal evaluation fails" +"2019-04-22 06:18:07.560 UTC [cauthdsl] func1 -> DEBU 1c50 0xc000d773b0 gate 1555913887558762500 evaluation fails" +"2019-04-22 06:18:07.560 UTC [policies] Evaluate -> DEBU 1c51 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.560 UTC [policies] Evaluate -> DEBU 1c52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.560 UTC [policies] func1 -> DEBU 1c53 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c54 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.561 UTC [policies] Evaluate -> DEBU 1c58 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:07.561 UTC [cauthdsl] func1 -> DEBU 1c59 0xc000cea7a0 gate 1555913887561505200 evaluation starts" +"2019-04-22 06:18:07.561 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc000cea7a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.561 UTC [cauthdsl] func2 -> DEBU 1c5b 0xc000cea7a0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.561 UTC [cauthdsl] func2 -> DEBU 1c5c 0xc000cea7a0 principal matched by identity 0" +"2019-04-22 06:18:07.562 UTC [msp.identity] Verify -> DEBU 1c5d Verify: digest = 00000000 3f b8 bf 79 07 c8 f7 c7 90 aa 9c f6 d9 79 33 a0 |?..y.........y3.| +00000010 44 0b 68 e8 3e 6d ba 5f 2b ee 9b 47 e3 2c 5a e8 |D.h.>m._+..G.,Z.|" +"2019-04-22 06:18:07.562 UTC [msp.identity] Verify -> DEBU 1c5e Verify: sig = 00000000 30 44 02 20 38 b9 83 a4 81 79 67 4f a8 49 fb df |0D. 8....ygO.I..| +00000010 d8 ac 5f 86 10 70 8f f4 66 4c 48 57 b4 ec df c6 |.._..p..fLHW....| +00000020 da db 8c bd 02 20 10 37 1f 47 29 23 58 1a b8 fd |..... .7.G)#X...| +00000030 0b 62 e9 3b ae bc 95 22 ca 9d 71 70 c9 db 6d c1 |.b.;..."..qp..m.| +00000040 b4 ed 24 16 50 06 |..$.P.|" +"2019-04-22 06:18:07.563 UTC [cauthdsl] func2 -> DEBU 1c5f 0xc000cea7a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:07.563 UTC [cauthdsl] func1 -> DEBU 1c60 0xc000cea7a0 gate 1555913887561505200 evaluation succeeds" +"2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c61 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c62 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c63 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c65 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:07.563 UTC [policies] Evaluate -> DEBU 1c66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:07.564 UTC [common.deliver] deliverBlocks -> DEBU 1c67 [channel: businesschannel] Received seekInfo (0xc000dd7f00) start: > stop: > from 192.168.224.9:34778" +"2019-04-22 06:18:07.564 UTC [fsblkstorage] Next -> DEBU 1c68 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:07.564 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c69 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[71372]" +"2019-04-22 06:18:07.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6a Remaining bytes=[62295], Going to peek [8] bytes" +"2019-04-22 06:18:07.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6b Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[71372], bytesOffset=[71374]}" +"2019-04-22 06:18:07.565 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6c blockbytes [4708] read from file [0]" +"2019-04-22 06:18:07.566 UTC [common.deliver] deliverBlocks -> DEBU 1c6d [channel: businesschannel] Delivering block [3] for (0xc000dd7f00) for 192.168.224.9:34778" +"2019-04-22 06:18:07.566 UTC [common.deliver] deliverBlocks -> DEBU 1c6e [channel: businesschannel] Done delivering to 192.168.224.9:34778 for (0xc000dd7f00)" +"2019-04-22 06:18:07.567 UTC [common.deliver] Handle -> DEBU 1c6f Waiting for new SeekInfo from 192.168.224.9:34778" +"2019-04-22 06:18:07.567 UTC [common.deliver] Handle -> DEBU 1c70 Attempting to read seek info message from 192.168.224.9:34778" +"2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c71 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c72 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c73 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.567 UTC [fsblkstorage] waitForBlock -> DEBU 1c74 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c75 Sending msg of 28 bytes to 2 on channel businesschannel took 28.9µs" +"2019-04-22 06:18:07.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c76 Sending msg of 28 bytes to 3 on channel businesschannel took 48.8µs" +"2019-04-22 06:18:07.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.3µs " +"2019-04-22 06:18:07.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 185.4µs " +"2019-04-22 06:18:07.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c79 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:07.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:07.579 UTC [common.deliver] Handle -> WARN 1c7b Error reading from 192.168.224.9:34778: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:07.579 UTC [orderer.common.server] func1 -> DEBU 1c7c Closing Deliver stream" +"2019-04-22 06:18:07.579 UTC [comm.grpc.server] 1 -> INFO 1c7d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34778 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.501ms +"2019-04-22 06:18:07.579 UTC [grpc] infof -> DEBU 1c7e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:07.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c7f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:07.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c80 Sending msg of 28 bytes to 3 on channel testchainid took 23.5µs" +"2019-04-22 06:18:07.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c81 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 526.5µs " +"2019-04-22 06:18:07.799 UTC [orderer.common.server] Deliver -> DEBU 1c82 Starting new Deliver handler" +"2019-04-22 06:18:07.799 UTC [common.deliver] Handle -> DEBU 1c83 Starting new deliver loop for 192.168.224.9:34780" +"2019-04-22 06:18:07.799 UTC [common.deliver] Handle -> DEBU 1c84 Attempting to read seek info message from 192.168.224.9:34780" +"2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c85 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c86 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c87 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:07.800 UTC [policies] Evaluate -> DEBU 1c88 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.801 UTC [policies] Evaluate -> DEBU 1c89 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:07.801 UTC [cauthdsl] func1 -> DEBU 1c8a 0xc000529570 gate 1555913887801390700 evaluation starts" +"2019-04-22 06:18:07.801 UTC [cauthdsl] func2 -> DEBU 1c8b 0xc000529570 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.801 UTC [cauthdsl] func2 -> DEBU 1c8c 0xc000529570 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.802 UTC [cauthdsl] func2 -> DEBU 1c8d 0xc000529570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:07.802 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc000529570 principal evaluation fails" +"2019-04-22 06:18:07.802 UTC [cauthdsl] func1 -> DEBU 1c8f 0xc000529570 gate 1555913887801390700 evaluation fails" +"2019-04-22 06:18:07.802 UTC [policies] Evaluate -> DEBU 1c90 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.804 UTC [policies] Evaluate -> DEBU 1c91 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.804 UTC [policies] Evaluate -> DEBU 1c92 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:07.804 UTC [cauthdsl] func1 -> DEBU 1c93 0xc000529db0 gate 1555913887804370900 evaluation starts" +"2019-04-22 06:18:07.804 UTC [cauthdsl] func2 -> DEBU 1c94 0xc000529db0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.804 UTC [cauthdsl] func2 -> DEBU 1c95 0xc000529db0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.805 UTC [cauthdsl] func2 -> DEBU 1c96 0xc000529db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:07.805 UTC [cauthdsl] func2 -> DEBU 1c97 0xc000529db0 principal evaluation fails" +"2019-04-22 06:18:07.805 UTC [cauthdsl] func1 -> DEBU 1c98 0xc000529db0 gate 1555913887804370900 evaluation fails" +"2019-04-22 06:18:07.805 UTC [policies] Evaluate -> DEBU 1c99 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.805 UTC [policies] Evaluate -> DEBU 1c9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.805 UTC [policies] Evaluate -> DEBU 1c9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:07.805 UTC [cauthdsl] func1 -> DEBU 1c9c 0xc000ba45f0 gate 1555913887805862100 evaluation starts" +"2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1c9d 0xc000ba45f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1c9e 0xc000ba45f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1c9f 0xc000ba45f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1ca0 0xc000ba45f0 principal evaluation fails" +"2019-04-22 06:18:07.806 UTC [cauthdsl] func2 -> DEBU 1ca1 0xc000ba45f0 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.807 UTC [cauthdsl] func2 -> DEBU 1ca2 0xc000ba45f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.807 UTC [cauthdsl] func2 -> DEBU 1ca3 0xc000ba45f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.807 UTC [cauthdsl] func2 -> DEBU 1ca4 0xc000ba45f0 principal evaluation fails" +"2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca5 0xc000ba45f0 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca6 0xc000ba45f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca7 0xc000ba45f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:07.808 UTC [cauthdsl] func2 -> DEBU 1ca8 0xc000ba45f0 principal evaluation fails" +"2019-04-22 06:18:07.809 UTC [cauthdsl] func1 -> DEBU 1ca9 0xc000ba45f0 gate 1555913887805862100 evaluation fails" +"2019-04-22 06:18:07.809 UTC [policies] Evaluate -> DEBU 1caa Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.809 UTC [policies] Evaluate -> DEBU 1cab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:07.809 UTC [policies] func1 -> DEBU 1cac Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cad Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1caf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cb0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.810 UTC [policies] Evaluate -> DEBU 1cb1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:07.810 UTC [cauthdsl] func1 -> DEBU 1cb2 0xc000ba59e0 gate 1555913887810872400 evaluation starts" +"2019-04-22 06:18:07.811 UTC [cauthdsl] func2 -> DEBU 1cb3 0xc000ba59e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.811 UTC [cauthdsl] func2 -> DEBU 1cb4 0xc000ba59e0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:07.811 UTC [cauthdsl] func2 -> DEBU 1cb5 0xc000ba59e0 principal matched by identity 0" +"2019-04-22 06:18:07.812 UTC [msp.identity] Verify -> DEBU 1cb6 Verify: digest = 00000000 af 20 1a c7 15 c1 8c 65 38 80 f1 53 45 ab a5 54 |. .....e8..SE..T| +00000010 c1 52 a0 2f 21 49 fa fd 4b f0 af 77 03 22 18 39 |.R./!I..K..w.".9|" +"2019-04-22 06:18:07.812 UTC [msp.identity] Verify -> DEBU 1cb7 Verify: sig = 00000000 30 44 02 20 4d ca 68 d3 9e 5a 21 2d cf 4d c1 47 |0D. M.h..Z!-.M.G| +00000010 61 b8 ea f6 6e 9f d8 85 c3 5f 96 22 f1 6f 41 7c |a...n...._.".oA|| +00000020 5f 01 9a 21 02 20 12 c5 0c b9 19 6b 6e aa 39 b7 |_..!. .....kn.9.| +00000030 96 d5 e5 46 f5 17 b4 27 91 fd a0 e4 f3 13 13 14 |...F...'........| +00000040 7f 46 36 1f 2b 2a |.F6.+*|" +"2019-04-22 06:18:07.813 UTC [cauthdsl] func2 -> DEBU 1cb8 0xc000ba59e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:07.813 UTC [cauthdsl] func1 -> DEBU 1cb9 0xc000ba59e0 gate 1555913887810872400 evaluation succeeds" +"2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cba Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cbb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cbc Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.813 UTC [policies] Evaluate -> DEBU 1cbd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:07.814 UTC [policies] Evaluate -> DEBU 1cbe Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:07.814 UTC [policies] Evaluate -> DEBU 1cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:07.815 UTC [common.deliver] deliverBlocks -> DEBU 1cc0 [channel: businesschannel] Received seekInfo (0xc0011d87c0) start: > stop: > from 192.168.224.9:34780" +"2019-04-22 06:18:07.815 UTC [fsblkstorage] Next -> DEBU 1cc1 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:07.815 UTC [fsblkstorage] newBlockfileStream -> DEBU 1cc2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76082]" +"2019-04-22 06:18:07.815 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc3 Remaining bytes=[57585], Going to peek [8] bytes" +"2019-04-22 06:18:07.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc4 Returning blockbytes - length=[4707], placementInfo={fileNum=[0], startOffset=[76082], bytesOffset=[76084]}" +"2019-04-22 06:18:07.816 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc5 blockbytes [4707] read from file [0]" +"2019-04-22 06:18:07.816 UTC [common.deliver] deliverBlocks -> DEBU 1cc6 [channel: businesschannel] Delivering block [4] for (0xc0011d87c0) for 192.168.224.9:34780" +"2019-04-22 06:18:07.816 UTC [common.deliver] deliverBlocks -> DEBU 1cc7 [channel: businesschannel] Done delivering to 192.168.224.9:34780 for (0xc0011d87c0)" +"2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1cc8 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1cc9 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1cca Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:07.817 UTC [fsblkstorage] waitForBlock -> DEBU 1ccb Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:07.817 UTC [common.deliver] Handle -> DEBU 1ccc Waiting for new SeekInfo from 192.168.224.9:34780" +"2019-04-22 06:18:07.818 UTC [common.deliver] Handle -> DEBU 1ccd Attempting to read seek info message from 192.168.224.9:34780" +"2019-04-22 06:18:07.824 UTC [grpc] infof -> DEBU 1cce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:07.824 UTC [common.deliver] Handle -> WARN 1ccf Error reading from 192.168.224.9:34780: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:07.824 UTC [orderer.common.server] func1 -> DEBU 1cd0 Closing Deliver stream" +"2019-04-22 06:18:07.825 UTC [comm.grpc.server] 1 -> INFO 1cd1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34780 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.7018ms +"2019-04-22 06:18:08.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd2 Sending msg of 28 bytes to 2 on channel businesschannel took 32.4µs" +"2019-04-22 06:18:08.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 3 on channel businesschannel took 146.4µs" +"2019-04-22 06:18:08.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.5µs " +"2019-04-22 06:18:08.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92.7µs " +"2019-04-22 06:18:08.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:08.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:08.076 UTC [orderer.common.server] Deliver -> DEBU 1cd8 Starting new Deliver handler" +"2019-04-22 06:18:08.076 UTC [common.deliver] Handle -> DEBU 1cd9 Starting new deliver loop for 192.168.224.9:34782" +"2019-04-22 06:18:08.076 UTC [common.deliver] Handle -> DEBU 1cda Attempting to read seek info message from 192.168.224.9:34782" +"2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cdb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cdc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cdd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.078 UTC [policies] Evaluate -> DEBU 1cde This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.079 UTC [policies] Evaluate -> DEBU 1cdf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.079 UTC [cauthdsl] func1 -> DEBU 1ce0 0xc000b9c680 gate 1555913888079209100 evaluation starts" +"2019-04-22 06:18:08.079 UTC [cauthdsl] func2 -> DEBU 1ce1 0xc000b9c680 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.080 UTC [cauthdsl] func2 -> DEBU 1ce2 0xc000b9c680 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.080 UTC [cauthdsl] func2 -> DEBU 1ce3 0xc000b9c680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:08.080 UTC [cauthdsl] func2 -> DEBU 1ce4 0xc000b9c680 principal evaluation fails" +"2019-04-22 06:18:08.081 UTC [cauthdsl] func1 -> DEBU 1ce5 0xc000b9c680 gate 1555913888079209100 evaluation fails" +"2019-04-22 06:18:08.081 UTC [policies] Evaluate -> DEBU 1ce6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.081 UTC [policies] Evaluate -> DEBU 1ce7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.082 UTC [policies] Evaluate -> DEBU 1ce8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.082 UTC [cauthdsl] func1 -> DEBU 1ce9 0xc000b9cec0 gate 1555913888082494100 evaluation starts" +"2019-04-22 06:18:08.083 UTC [cauthdsl] func2 -> DEBU 1cea 0xc000b9cec0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.083 UTC [cauthdsl] func2 -> DEBU 1ceb 0xc000b9cec0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.083 UTC [cauthdsl] func2 -> DEBU 1cec 0xc000b9cec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:08.084 UTC [cauthdsl] func2 -> DEBU 1ced 0xc000b9cec0 principal evaluation fails" +"2019-04-22 06:18:08.084 UTC [cauthdsl] func1 -> DEBU 1cee 0xc000b9cec0 gate 1555913888082494100 evaluation fails" +"2019-04-22 06:18:08.084 UTC [policies] Evaluate -> DEBU 1cef Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.085 UTC [policies] Evaluate -> DEBU 1cf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.085 UTC [policies] Evaluate -> DEBU 1cf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:08.085 UTC [cauthdsl] func1 -> DEBU 1cf2 0xc000b9d700 gate 1555913888085682200 evaluation starts" +"2019-04-22 06:18:08.086 UTC [cauthdsl] func2 -> DEBU 1cf3 0xc000b9d700 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.086 UTC [cauthdsl] func2 -> DEBU 1cf4 0xc000b9d700 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf5 0xc000b9d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf6 0xc000b9d700 principal evaluation fails" +"2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf7 0xc000b9d700 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.087 UTC [cauthdsl] func2 -> DEBU 1cf8 0xc000b9d700 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.088 UTC [cauthdsl] func2 -> DEBU 1cf9 0xc000b9d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.088 UTC [cauthdsl] func2 -> DEBU 1cfa 0xc000b9d700 principal evaluation fails" +"2019-04-22 06:18:08.088 UTC [cauthdsl] func2 -> DEBU 1cfb 0xc000b9d700 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.089 UTC [cauthdsl] func2 -> DEBU 1cfc 0xc000b9d700 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.089 UTC [cauthdsl] func2 -> DEBU 1cfd 0xc000b9d700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.089 UTC [cauthdsl] func2 -> DEBU 1cfe 0xc000b9d700 principal evaluation fails" +"2019-04-22 06:18:08.090 UTC [cauthdsl] func1 -> DEBU 1cff 0xc000b9d700 gate 1555913888085682200 evaluation fails" +"2019-04-22 06:18:08.090 UTC [policies] Evaluate -> DEBU 1d00 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.090 UTC [policies] Evaluate -> DEBU 1d01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.091 UTC [policies] func1 -> DEBU 1d02 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:08.091 UTC [policies] Evaluate -> DEBU 1d03 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:08.091 UTC [policies] Evaluate -> DEBU 1d04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d05 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d06 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d07 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:08.092 UTC [cauthdsl] func1 -> DEBU 1d08 0xc000e3caf0 gate 1555913888092122600 evaluation starts" +"2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d09 0xc000e3caf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d0a 0xc000e3caf0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d0b 0xc000e3caf0 principal matched by identity 0" +"2019-04-22 06:18:08.092 UTC [msp.identity] Verify -> DEBU 1d0c Verify: digest = 00000000 10 af d8 fd 52 c2 06 67 fa ef bf 64 be 8d de b9 |....R..g...d....| +00000010 11 ec 73 6c 43 31 3f 31 2a 19 52 38 c5 dd ad cd |..slC1?1*.R8....|" +"2019-04-22 06:18:08.092 UTC [msp.identity] Verify -> DEBU 1d0d Verify: sig = 00000000 30 45 02 21 00 f2 5d 01 44 5f a6 20 8f 58 e8 9b |0E.!..].D_. .X..| +00000010 45 f4 a4 0a 1b 3d 68 81 4c 61 fa bd 8f a3 7d e5 |E....=h.La....}.| +00000020 b6 60 6c e0 de 02 20 65 8a 25 e6 e9 27 7a 83 d1 |.`l... e.%..'z..| +00000030 71 01 c5 4f 73 ef 13 39 e4 aa 45 4c 0c 3c bb e4 |q..Os..9..EL.<..| +00000040 52 04 67 a0 b1 1c 3b |R.g...;|" +"2019-04-22 06:18:08.092 UTC [cauthdsl] func2 -> DEBU 1d0e 0xc000e3caf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.092 UTC [cauthdsl] func1 -> DEBU 1d0f 0xc000e3caf0 gate 1555913888092122600 evaluation succeeds" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d10 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d11 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d12 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d13 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d14 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:08.092 UTC [policies] Evaluate -> DEBU 1d15 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:08.092 UTC [common.deliver] deliverBlocks -> DEBU 1d16 [channel: businesschannel] Received seekInfo (0xc0009bbf40) start: > stop: > from 192.168.224.9:34782" +"2019-04-22 06:18:08.094 UTC [fsblkstorage] Next -> DEBU 1d17 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:08.094 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d18 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[80791]" +"2019-04-22 06:18:08.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d19 Remaining bytes=[52876], Going to peek [8] bytes" +"2019-04-22 06:18:08.095 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d1a Returning blockbytes - length=[5712], placementInfo={fileNum=[0], startOffset=[80791], bytesOffset=[80793]}" +"2019-04-22 06:18:08.096 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d1b blockbytes [5712] read from file [0]" +"2019-04-22 06:18:08.096 UTC [common.deliver] deliverBlocks -> DEBU 1d1c [channel: businesschannel] Delivering block [5] for (0xc0009bbf40) for 192.168.224.9:34782" +"2019-04-22 06:18:08.097 UTC [common.deliver] deliverBlocks -> DEBU 1d1d [channel: businesschannel] Done delivering to 192.168.224.9:34782 for (0xc0009bbf40)" +"2019-04-22 06:18:08.098 UTC [fsblkstorage] waitForBlock -> DEBU 1d1e Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.099 UTC [fsblkstorage] waitForBlock -> DEBU 1d1f Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.099 UTC [fsblkstorage] waitForBlock -> DEBU 1d20 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.099 UTC [fsblkstorage] waitForBlock -> DEBU 1d21 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.100 UTC [common.deliver] Handle -> DEBU 1d22 Waiting for new SeekInfo from 192.168.224.9:34782" +"2019-04-22 06:18:08.101 UTC [common.deliver] Handle -> DEBU 1d23 Attempting to read seek info message from 192.168.224.9:34782" +"2019-04-22 06:18:08.112 UTC [common.deliver] Handle -> WARN 1d24 Error reading from 192.168.224.9:34782: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:08.112 UTC [orderer.common.server] func1 -> DEBU 1d25 Closing Deliver stream" +"2019-04-22 06:18:08.113 UTC [comm.grpc.server] 1 -> INFO 1d26 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34782 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.5344ms +"2019-04-22 06:18:08.114 UTC [grpc] infof -> DEBU 1d27 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:08.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d28 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:08.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d29 Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +"2019-04-22 06:18:08.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.4µs " +"2019-04-22 06:18:08.312 UTC [orderer.common.server] Deliver -> DEBU 1d2b Starting new Deliver handler" +"2019-04-22 06:18:08.312 UTC [common.deliver] Handle -> DEBU 1d2c Starting new deliver loop for 192.168.224.9:34784" +"2019-04-22 06:18:08.313 UTC [common.deliver] Handle -> DEBU 1d2d Attempting to read seek info message from 192.168.224.9:34784" +"2019-04-22 06:18:08.314 UTC [policies] Evaluate -> DEBU 1d2e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:08.314 UTC [policies] Evaluate -> DEBU 1d2f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.314 UTC [policies] Evaluate -> DEBU 1d30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.315 UTC [policies] Evaluate -> DEBU 1d31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.315 UTC [policies] Evaluate -> DEBU 1d32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.316 UTC [cauthdsl] func1 -> DEBU 1d33 0xc000c92a70 gate 1555913888316124500 evaluation starts" +"2019-04-22 06:18:08.316 UTC [cauthdsl] func2 -> DEBU 1d34 0xc000c92a70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.316 UTC [cauthdsl] func2 -> DEBU 1d35 0xc000c92a70 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.317 UTC [cauthdsl] func2 -> DEBU 1d36 0xc000c92a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:08.317 UTC [cauthdsl] func2 -> DEBU 1d37 0xc000c92a70 principal evaluation fails" +"2019-04-22 06:18:08.318 UTC [cauthdsl] func1 -> DEBU 1d38 0xc000c92a70 gate 1555913888316124500 evaluation fails" +"2019-04-22 06:18:08.318 UTC [policies] Evaluate -> DEBU 1d39 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.318 UTC [policies] Evaluate -> DEBU 1d3a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.319 UTC [policies] Evaluate -> DEBU 1d3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.319 UTC [cauthdsl] func1 -> DEBU 1d3c 0xc000c932b0 gate 1555913888319774600 evaluation starts" +"2019-04-22 06:18:08.320 UTC [cauthdsl] func2 -> DEBU 1d3d 0xc000c932b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.320 UTC [cauthdsl] func2 -> DEBU 1d3e 0xc000c932b0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.320 UTC [cauthdsl] func2 -> DEBU 1d3f 0xc000c932b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:08.321 UTC [cauthdsl] func2 -> DEBU 1d40 0xc000c932b0 principal evaluation fails" +"2019-04-22 06:18:08.321 UTC [cauthdsl] func1 -> DEBU 1d41 0xc000c932b0 gate 1555913888319774600 evaluation fails" +"2019-04-22 06:18:08.322 UTC [policies] Evaluate -> DEBU 1d42 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.322 UTC [policies] Evaluate -> DEBU 1d43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.322 UTC [policies] Evaluate -> DEBU 1d44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:08.323 UTC [cauthdsl] func1 -> DEBU 1d45 0xc000c93af0 gate 1555913888323106900 evaluation starts" +"2019-04-22 06:18:08.323 UTC [cauthdsl] func2 -> DEBU 1d46 0xc000c93af0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.323 UTC [cauthdsl] func2 -> DEBU 1d47 0xc000c93af0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d48 0xc000c93af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d49 0xc000c93af0 principal evaluation fails" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4a 0xc000c93af0 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4b 0xc000c93af0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4c 0xc000c93af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4d 0xc000c93af0 principal evaluation fails" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4e 0xc000c93af0 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d4f 0xc000c93af0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d50 0xc000c93af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func2 -> DEBU 1d51 0xc000c93af0 principal evaluation fails" +"2019-04-22 06:18:08.324 UTC [cauthdsl] func1 -> DEBU 1d52 0xc000c93af0 gate 1555913888323106900 evaluation fails" +"2019-04-22 06:18:08.324 UTC [policies] Evaluate -> DEBU 1d53 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.324 UTC [policies] Evaluate -> DEBU 1d54 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.324 UTC [policies] func1 -> DEBU 1d55 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:08.325 UTC [policies] Evaluate -> DEBU 1d56 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:08.325 UTC [policies] Evaluate -> DEBU 1d57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.325 UTC [policies] Evaluate -> DEBU 1d58 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:08.326 UTC [policies] Evaluate -> DEBU 1d59 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.326 UTC [policies] Evaluate -> DEBU 1d5a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:08.326 UTC [cauthdsl] func1 -> DEBU 1d5b 0xc000fdeee0 gate 1555913888326691300 evaluation starts" +"2019-04-22 06:18:08.327 UTC [cauthdsl] func2 -> DEBU 1d5c 0xc000fdeee0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.327 UTC [cauthdsl] func2 -> DEBU 1d5d 0xc000fdeee0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.327 UTC [cauthdsl] func2 -> DEBU 1d5e 0xc000fdeee0 principal matched by identity 0" +"2019-04-22 06:18:08.327 UTC [msp.identity] Verify -> DEBU 1d5f Verify: digest = 00000000 06 40 57 42 75 ed 70 67 3c f6 dd ab 80 2b 94 d2 |.@WBu.pg<....+..| +00000010 e9 61 c1 e4 f5 66 29 e6 a9 ec 64 12 1f b4 ae 6f |.a...f)...d....o|" +"2019-04-22 06:18:08.327 UTC [msp.identity] Verify -> DEBU 1d60 Verify: sig = 00000000 30 44 02 20 15 6f 95 3c 74 b7 6c b5 ec 15 f0 31 |0D. .o. DEBU 1d61 0xc000fdeee0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.328 UTC [cauthdsl] func1 -> DEBU 1d62 0xc000fdeee0 gate 1555913888326691300 evaluation succeeds" +"2019-04-22 06:18:08.328 UTC [policies] Evaluate -> DEBU 1d63 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.328 UTC [policies] Evaluate -> DEBU 1d64 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.328 UTC [policies] Evaluate -> DEBU 1d65 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.329 UTC [policies] Evaluate -> DEBU 1d66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.332 UTC [policies] Evaluate -> DEBU 1d67 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:08.332 UTC [policies] Evaluate -> DEBU 1d68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:08.332 UTC [common.deliver] deliverBlocks -> DEBU 1d69 [channel: businesschannel] Received seekInfo (0xc0011d8f80) start: > stop: > from 192.168.224.9:34784" +"2019-04-22 06:18:08.333 UTC [fsblkstorage] Next -> DEBU 1d6a Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:08.333 UTC [fsblkstorage] newBlockfileStream -> DEBU 1d6b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[86505]" +"2019-04-22 06:18:08.334 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d6c Remaining bytes=[47162], Going to peek [8] bytes" +"2019-04-22 06:18:08.334 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d6d Returning blockbytes - length=[4058], placementInfo={fileNum=[0], startOffset=[86505], bytesOffset=[86507]}" +"2019-04-22 06:18:08.335 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1d6e blockbytes [4058] read from file [0]" +"2019-04-22 06:18:08.335 UTC [common.deliver] deliverBlocks -> DEBU 1d6f [channel: businesschannel] Delivering block [6] for (0xc0011d8f80) for 192.168.224.9:34784" +"2019-04-22 06:18:08.336 UTC [common.deliver] deliverBlocks -> DEBU 1d70 [channel: businesschannel] Done delivering to 192.168.224.9:34784 for (0xc0011d8f80)" +"2019-04-22 06:18:08.336 UTC [fsblkstorage] waitForBlock -> DEBU 1d71 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.336 UTC [fsblkstorage] waitForBlock -> DEBU 1d72 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.336 UTC [fsblkstorage] waitForBlock -> DEBU 1d73 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.337 UTC [fsblkstorage] waitForBlock -> DEBU 1d74 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.336 UTC [common.deliver] Handle -> DEBU 1d75 Waiting for new SeekInfo from 192.168.224.9:34784" +"2019-04-22 06:18:08.337 UTC [common.deliver] Handle -> DEBU 1d76 Attempting to read seek info message from 192.168.224.9:34784" +"2019-04-22 06:18:08.345 UTC [common.deliver] Handle -> WARN 1d77 Error reading from 192.168.224.9:34784: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:08.345 UTC [orderer.common.server] func1 -> DEBU 1d78 Closing Deliver stream" +"2019-04-22 06:18:08.345 UTC [comm.grpc.server] 1 -> INFO 1d79 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34784 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.5955ms +"2019-04-22 06:18:08.346 UTC [grpc] infof -> DEBU 1d7a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:08.570 UTC [orderer.common.server] Deliver -> DEBU 1d7b Starting new Deliver handler" +"2019-04-22 06:18:08.570 UTC [common.deliver] Handle -> DEBU 1d7c Starting new deliver loop for 192.168.224.9:34786" +"2019-04-22 06:18:08.571 UTC [common.deliver] Handle -> DEBU 1d7d Attempting to read seek info message from 192.168.224.9:34786" +"2019-04-22 06:18:08.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7e Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +"2019-04-22 06:18:08.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7f Sending msg of 28 bytes to 3 on channel businesschannel took 24.5µs" +"2019-04-22 06:18:08.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.8µs " +"2019-04-22 06:18:08.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.1µs " +"2019-04-22 06:18:08.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d82 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:08.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d83 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:08.576 UTC [policies] Evaluate -> DEBU 1d84 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:08.577 UTC [policies] Evaluate -> DEBU 1d85 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.577 UTC [policies] Evaluate -> DEBU 1d86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.577 UTC [policies] Evaluate -> DEBU 1d87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.578 UTC [policies] Evaluate -> DEBU 1d88 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.578 UTC [cauthdsl] func1 -> DEBU 1d89 0xc0015918f0 gate 1555913888578618100 evaluation starts" +"2019-04-22 06:18:08.579 UTC [cauthdsl] func2 -> DEBU 1d8a 0xc0015918f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.579 UTC [cauthdsl] func2 -> DEBU 1d8b 0xc0015918f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.579 UTC [cauthdsl] func2 -> DEBU 1d8c 0xc0015918f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:08.580 UTC [cauthdsl] func2 -> DEBU 1d8d 0xc0015918f0 principal evaluation fails" +"2019-04-22 06:18:08.580 UTC [cauthdsl] func1 -> DEBU 1d8e 0xc0015918f0 gate 1555913888578618100 evaluation fails" +"2019-04-22 06:18:08.581 UTC [policies] Evaluate -> DEBU 1d8f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.581 UTC [policies] Evaluate -> DEBU 1d90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.581 UTC [policies] Evaluate -> DEBU 1d91 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.582 UTC [cauthdsl] func1 -> DEBU 1d92 0xc000198130 gate 1555913888582057700 evaluation starts" +"2019-04-22 06:18:08.582 UTC [cauthdsl] func2 -> DEBU 1d93 0xc000198130 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.582 UTC [cauthdsl] func2 -> DEBU 1d94 0xc000198130 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.583 UTC [cauthdsl] func2 -> DEBU 1d95 0xc000198130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:08.583 UTC [cauthdsl] func2 -> DEBU 1d96 0xc000198130 principal evaluation fails" +"2019-04-22 06:18:08.583 UTC [cauthdsl] func1 -> DEBU 1d97 0xc000198130 gate 1555913888582057700 evaluation fails" +"2019-04-22 06:18:08.584 UTC [policies] Evaluate -> DEBU 1d98 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.584 UTC [policies] Evaluate -> DEBU 1d99 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.584 UTC [policies] Evaluate -> DEBU 1d9a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:08.584 UTC [cauthdsl] func1 -> DEBU 1d9b 0xc000198970 gate 1555913888584887100 evaluation starts" +"2019-04-22 06:18:08.585 UTC [cauthdsl] func2 -> DEBU 1d9c 0xc000198970 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.585 UTC [cauthdsl] func2 -> DEBU 1d9d 0xc000198970 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.586 UTC [cauthdsl] func2 -> DEBU 1d9e 0xc000198970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.586 UTC [cauthdsl] func2 -> DEBU 1d9f 0xc000198970 principal evaluation fails" +"2019-04-22 06:18:08.587 UTC [cauthdsl] func2 -> DEBU 1da0 0xc000198970 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.588 UTC [cauthdsl] func2 -> DEBU 1da1 0xc000198970 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.589 UTC [cauthdsl] func2 -> DEBU 1da2 0xc000198970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.589 UTC [cauthdsl] func2 -> DEBU 1da3 0xc000198970 principal evaluation fails" +"2019-04-22 06:18:08.589 UTC [cauthdsl] func2 -> DEBU 1da4 0xc000198970 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.590 UTC [cauthdsl] func2 -> DEBU 1da5 0xc000198970 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.590 UTC [cauthdsl] func2 -> DEBU 1da6 0xc000198970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.591 UTC [cauthdsl] func2 -> DEBU 1da7 0xc000198970 principal evaluation fails" +"2019-04-22 06:18:08.591 UTC [cauthdsl] func1 -> DEBU 1da8 0xc000198970 gate 1555913888584887100 evaluation fails" +"2019-04-22 06:18:08.592 UTC [policies] Evaluate -> DEBU 1da9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.592 UTC [policies] Evaluate -> DEBU 1daa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.592 UTC [policies] func1 -> DEBU 1dab Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:08.592 UTC [policies] Evaluate -> DEBU 1dac Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1dad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1dae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1daf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.593 UTC [policies] Evaluate -> DEBU 1db0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:08.594 UTC [cauthdsl] func1 -> DEBU 1db1 0xc000199d60 gate 1555913888594277200 evaluation starts" +"2019-04-22 06:18:08.594 UTC [cauthdsl] func2 -> DEBU 1db2 0xc000199d60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.594 UTC [cauthdsl] func2 -> DEBU 1db3 0xc000199d60 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.595 UTC [cauthdsl] func2 -> DEBU 1db4 0xc000199d60 principal matched by identity 0" +"2019-04-22 06:18:08.595 UTC [msp.identity] Verify -> DEBU 1db5 Verify: digest = 00000000 b1 c9 57 7c 07 54 a0 86 3c 7e 95 5f 69 8a 9b 1b |..W|.T..<~._i...| +00000010 48 59 05 37 15 4b b0 e8 00 eb 06 25 1a 67 5d b8 |HY.7.K.....%.g].|" +"2019-04-22 06:18:08.595 UTC [msp.identity] Verify -> DEBU 1db6 Verify: sig = 00000000 30 45 02 21 00 e5 c4 f2 04 ff af 3a 40 76 d7 26 |0E.!.......:@v.&| +00000010 01 5f aa 1a 70 8a 4c bd 9a ec db 96 8a 01 89 89 |._..p.L.........| +00000020 73 6b 0d 5a af 02 20 1c 1a da 19 12 06 7f 19 a3 |sk.Z.. .........| +00000030 9d 6d e3 c0 eb 8c 03 37 6a 9e 02 b9 70 13 5d d2 |.m.....7j...p.].| +00000040 d2 5c 8c 13 0f 7e fa |.\...~.|" +"2019-04-22 06:18:08.596 UTC [cauthdsl] func2 -> DEBU 1db7 0xc000199d60 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.596 UTC [cauthdsl] func1 -> DEBU 1db8 0xc000199d60 gate 1555913888594277200 evaluation succeeds" +"2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1db9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dba == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbb Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbd Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:08.596 UTC [policies] Evaluate -> DEBU 1dbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:08.596 UTC [common.deliver] deliverBlocks -> DEBU 1dbf [channel: businesschannel] Received seekInfo (0xc0011d9740) start: > stop: > from 192.168.224.9:34786" +"2019-04-22 06:18:08.596 UTC [fsblkstorage] Next -> DEBU 1dc0 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:08.596 UTC [fsblkstorage] newBlockfileStream -> DEBU 1dc1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[90565]" +"2019-04-22 06:18:08.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc2 Remaining bytes=[43102], Going to peek [8] bytes" +"2019-04-22 06:18:08.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc3 Returning blockbytes - length=[4048], placementInfo={fileNum=[0], startOffset=[90565], bytesOffset=[90567]}" +"2019-04-22 06:18:08.596 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1dc4 blockbytes [4048] read from file [0]" +"2019-04-22 06:18:08.596 UTC [common.deliver] deliverBlocks -> DEBU 1dc5 [channel: businesschannel] Delivering block [7] for (0xc0011d9740) for 192.168.224.9:34786" +"2019-04-22 06:18:08.596 UTC [common.deliver] deliverBlocks -> DEBU 1dc6 [channel: businesschannel] Done delivering to 192.168.224.9:34786 for (0xc0011d9740)" +"2019-04-22 06:18:08.596 UTC [common.deliver] Handle -> DEBU 1dc7 Waiting for new SeekInfo from 192.168.224.9:34786" +"2019-04-22 06:18:08.597 UTC [common.deliver] Handle -> DEBU 1dc8 Attempting to read seek info message from 192.168.224.9:34786" +"2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dc9 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dca Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dcb Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.597 UTC [fsblkstorage] waitForBlock -> DEBU 1dcc Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.604 UTC [common.deliver] Handle -> WARN 1dcd Error reading from 192.168.224.9:34786: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:08.604 UTC [orderer.common.server] func1 -> DEBU 1dce Closing Deliver stream" +"2019-04-22 06:18:08.605 UTC [comm.grpc.server] 1 -> INFO 1dcf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34786 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.8386ms +"2019-04-22 06:18:08.604 UTC [grpc] infof -> DEBU 1dd0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:08.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dd1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:08.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dd2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.2µs " +"2019-04-22 06:18:08.730 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dd3 Sending msg of 28 bytes to 3 on channel testchainid took 666.2µs" +"2019-04-22 06:18:08.820 UTC [orderer.common.server] Deliver -> DEBU 1dd4 Starting new Deliver handler" +"2019-04-22 06:18:08.821 UTC [common.deliver] Handle -> DEBU 1dd5 Starting new deliver loop for 192.168.224.9:34788" +"2019-04-22 06:18:08.822 UTC [common.deliver] Handle -> DEBU 1dd6 Attempting to read seek info message from 192.168.224.9:34788" +"2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.823 UTC [policies] Evaluate -> DEBU 1dda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.824 UTC [policies] Evaluate -> DEBU 1ddb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.824 UTC [cauthdsl] func1 -> DEBU 1ddc 0xc0013580f0 gate 1555913888824312900 evaluation starts" +"2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1ddd 0xc0013580f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1dde 0xc0013580f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1ddf 0xc0013580f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:08.824 UTC [cauthdsl] func2 -> DEBU 1de0 0xc0013580f0 principal evaluation fails" +"2019-04-22 06:18:08.825 UTC [cauthdsl] func1 -> DEBU 1de1 0xc0013580f0 gate 1555913888824312900 evaluation fails" +"2019-04-22 06:18:08.825 UTC [policies] Evaluate -> DEBU 1de2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.825 UTC [policies] Evaluate -> DEBU 1de3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.825 UTC [policies] Evaluate -> DEBU 1de4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.825 UTC [cauthdsl] func1 -> DEBU 1de5 0xc001358930 gate 1555913888825729600 evaluation starts" +"2019-04-22 06:18:08.825 UTC [cauthdsl] func2 -> DEBU 1de6 0xc001358930 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.825 UTC [cauthdsl] func2 -> DEBU 1de7 0xc001358930 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.825 UTC [cauthdsl] func2 -> DEBU 1de8 0xc001358930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:08.826 UTC [cauthdsl] func2 -> DEBU 1de9 0xc001358930 principal evaluation fails" +"2019-04-22 06:18:08.826 UTC [cauthdsl] func1 -> DEBU 1dea 0xc001358930 gate 1555913888825729600 evaluation fails" +"2019-04-22 06:18:08.826 UTC [policies] Evaluate -> DEBU 1deb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.826 UTC [policies] Evaluate -> DEBU 1dec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.826 UTC [policies] Evaluate -> DEBU 1ded == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:08.826 UTC [cauthdsl] func1 -> DEBU 1dee 0xc001359170 gate 1555913888826846200 evaluation starts" +"2019-04-22 06:18:08.827 UTC [cauthdsl] func2 -> DEBU 1def 0xc001359170 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.827 UTC [cauthdsl] func2 -> DEBU 1df0 0xc001359170 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df1 0xc001359170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df2 0xc001359170 principal evaluation fails" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df3 0xc001359170 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df4 0xc001359170 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df5 0xc001359170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df6 0xc001359170 principal evaluation fails" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df7 0xc001359170 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df8 0xc001359170 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1df9 0xc001359170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:08.828 UTC [cauthdsl] func2 -> DEBU 1dfa 0xc001359170 principal evaluation fails" +"2019-04-22 06:18:08.829 UTC [cauthdsl] func1 -> DEBU 1dfb 0xc001359170 gate 1555913888826846200 evaluation fails" +"2019-04-22 06:18:08.829 UTC [policies] Evaluate -> DEBU 1dfc Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.829 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:08.830 UTC [policies] func1 -> DEBU 1dfe Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1dff Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e01 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e02 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.830 UTC [policies] Evaluate -> DEBU 1e03 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:08.830 UTC [cauthdsl] func1 -> DEBU 1e04 0xc00136a560 gate 1555913888830463000 evaluation starts" +"2019-04-22 06:18:08.830 UTC [cauthdsl] func2 -> DEBU 1e05 0xc00136a560 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.830 UTC [cauthdsl] func2 -> DEBU 1e06 0xc00136a560 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:08.831 UTC [cauthdsl] func2 -> DEBU 1e07 0xc00136a560 principal matched by identity 0" +"2019-04-22 06:18:08.831 UTC [msp.identity] Verify -> DEBU 1e08 Verify: digest = 00000000 3d 03 75 7d 3b f7 0c f7 ec 04 cf fb 28 b0 88 21 |=.u};.......(..!| +00000010 5d 56 73 4f d7 6c d6 3f ff 1c e1 de 69 5a fe ad |]VsO.l.?....iZ..|" +"2019-04-22 06:18:08.831 UTC [msp.identity] Verify -> DEBU 1e09 Verify: sig = 00000000 30 44 02 20 47 a9 53 ec ab 01 0c 23 8f 5e c8 54 |0D. G.S....#.^.T| +00000010 8f 15 f4 82 c6 f6 b3 84 e0 55 27 ec 4c 5e fe ae |.........U'.L^..| +00000020 e6 00 fd 67 02 20 34 50 b0 41 b3 8c dd 92 ff 8d |...g. 4P.A......| +00000030 d9 56 27 89 e1 1f 15 61 48 e7 32 e6 46 39 1e e0 |.V'....aH.2.F9..| +00000040 a5 c0 1e ce cc e5 |......|" +"2019-04-22 06:18:08.831 UTC [cauthdsl] func2 -> DEBU 1e0a 0xc00136a560 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.831 UTC [cauthdsl] func1 -> DEBU 1e0b 0xc00136a560 gate 1555913888830463000 evaluation succeeds" +"2019-04-22 06:18:08.831 UTC [policies] Evaluate -> DEBU 1e0c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e0d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e0e Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:08.832 UTC [policies] Evaluate -> DEBU 1e10 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:08.833 UTC [policies] Evaluate -> DEBU 1e11 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:08.833 UTC [common.deliver] deliverBlocks -> DEBU 1e12 [channel: businesschannel] Received seekInfo (0xc000d12840) start: > stop: > from 192.168.224.9:34788" +"2019-04-22 06:18:08.833 UTC [fsblkstorage] Next -> DEBU 1e13 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:08.834 UTC [fsblkstorage] newBlockfileStream -> DEBU 1e14 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[94615]" +"2019-04-22 06:18:08.834 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e15 Remaining bytes=[39052], Going to peek [8] bytes" +"2019-04-22 06:18:08.834 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e16 Returning blockbytes - length=[4049], placementInfo={fileNum=[0], startOffset=[94615], bytesOffset=[94617]}" +"2019-04-22 06:18:08.834 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e17 blockbytes [4049] read from file [0]" +"2019-04-22 06:18:08.834 UTC [common.deliver] deliverBlocks -> DEBU 1e18 [channel: businesschannel] Delivering block [8] for (0xc000d12840) for 192.168.224.9:34788" +"2019-04-22 06:18:08.838 UTC [common.deliver] deliverBlocks -> DEBU 1e19 [channel: businesschannel] Done delivering to 192.168.224.9:34788 for (0xc000d12840)" +"2019-04-22 06:18:08.838 UTC [fsblkstorage] waitForBlock -> DEBU 1e1a Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.838 UTC [fsblkstorage] waitForBlock -> DEBU 1e1b Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.839 UTC [fsblkstorage] waitForBlock -> DEBU 1e1c Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:08.839 UTC [fsblkstorage] waitForBlock -> DEBU 1e1d Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:08.839 UTC [common.deliver] Handle -> DEBU 1e1e Waiting for new SeekInfo from 192.168.224.9:34788" +"2019-04-22 06:18:08.839 UTC [common.deliver] Handle -> DEBU 1e1f Attempting to read seek info message from 192.168.224.9:34788" +"2019-04-22 06:18:08.855 UTC [common.deliver] Handle -> WARN 1e21 Error reading from 192.168.224.9:34788: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:08.855 UTC [orderer.common.server] func1 -> DEBU 1e22 Closing Deliver stream" +"2019-04-22 06:18:08.855 UTC [grpc] infof -> DEBU 1e20 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:08.855 UTC [comm.grpc.server] 1 -> INFO 1e23 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34788 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.8575ms +"2019-04-22 06:18:09.072 UTC [orderer.common.server] Deliver -> DEBU 1e24 Starting new Deliver handler" +"2019-04-22 06:18:09.072 UTC [common.deliver] Handle -> DEBU 1e25 Starting new deliver loop for 192.168.224.9:34790" +"2019-04-22 06:18:09.072 UTC [common.deliver] Handle -> DEBU 1e26 Attempting to read seek info message from 192.168.224.9:34790" +"2019-04-22 06:18:09.074 UTC [policies] Evaluate -> DEBU 1e27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:09.075 UTC [policies] Evaluate -> DEBU 1e28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.076 UTC [policies] Evaluate -> DEBU 1e2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:09.076 UTC [policies] Evaluate -> DEBU 1e2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.078 UTC [policies] Evaluate -> DEBU 1e2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:09.078 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e2e Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:09.078 UTC [cauthdsl] func1 -> DEBU 1e2f 0xc0010a2f70 gate 1555913889078574000 evaluation starts" +"2019-04-22 06:18:09.078 UTC [cauthdsl] func2 -> DEBU 1e30 0xc0010a2f70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.075 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e29 Sending msg of 28 bytes to 2 on channel businesschannel took 64.3µs" +"2019-04-22 06:18:09.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e2b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 136.2µs " +"2019-04-22 06:18:09.079 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e31 Sending msg of 28 bytes to 3 on channel businesschannel took 70.7µs" +"2019-04-22 06:18:09.080 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296.1µs " +"2019-04-22 06:18:09.079 UTC [cauthdsl] func2 -> DEBU 1e32 0xc0010a2f70 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.081 UTC [cauthdsl] func2 -> DEBU 1e34 0xc0010a2f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-04-22 06:18:09.081 UTC [cauthdsl] func2 -> DEBU 1e35 0xc0010a2f70 principal evaluation fails" +"2019-04-22 06:18:09.081 UTC [cauthdsl] func1 -> DEBU 1e36 0xc0010a2f70 gate 1555913889078574000 evaluation fails" +"2019-04-22 06:18:09.081 UTC [policies] Evaluate -> DEBU 1e37 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:09.081 UTC [policies] Evaluate -> DEBU 1e38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:09.081 UTC [policies] Evaluate -> DEBU 1e39 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:09.082 UTC [cauthdsl] func1 -> DEBU 1e3a 0xc001084ad0 gate 1555913889082391000 evaluation starts" +"2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3b 0xc001084ad0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3c 0xc001084ad0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3d 0xc001084ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-04-22 06:18:09.083 UTC [cauthdsl] func2 -> DEBU 1e3e 0xc001084ad0 principal evaluation fails" +"2019-04-22 06:18:09.083 UTC [cauthdsl] func1 -> DEBU 1e3f 0xc001084ad0 gate 1555913889082391000 evaluation fails" +"2019-04-22 06:18:09.083 UTC [policies] Evaluate -> DEBU 1e40 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:09.084 UTC [policies] Evaluate -> DEBU 1e41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:09.084 UTC [policies] Evaluate -> DEBU 1e42 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-04-22 06:18:09.084 UTC [cauthdsl] func1 -> DEBU 1e43 0xc001085310 gate 1555913889084723800 evaluation starts" +"2019-04-22 06:18:09.084 UTC [cauthdsl] func2 -> DEBU 1e44 0xc001085310 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e46 0xc001085310 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e47 0xc001085310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e48 0xc001085310 principal evaluation fails" +"2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e49 0xc001085310 signed by 1 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.085 UTC [cauthdsl] func2 -> DEBU 1e4a 0xc001085310 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4b 0xc001085310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4c 0xc001085310 principal evaluation fails" +"2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4d 0xc001085310 signed by 2 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.086 UTC [cauthdsl] func2 -> DEBU 1e4e 0xc001085310 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.087 UTC [cauthdsl] func2 -> DEBU 1e4f 0xc001085310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-04-22 06:18:09.087 UTC [cauthdsl] func2 -> DEBU 1e50 0xc001085310 principal evaluation fails" +"2019-04-22 06:18:09.087 UTC [cauthdsl] func1 -> DEBU 1e51 0xc001085310 gate 1555913889084723800 evaluation fails" +"2019-04-22 06:18:09.087 UTC [policies] Evaluate -> DEBU 1e52 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:09.088 UTC [policies] Evaluate -> DEBU 1e53 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:09.088 UTC [policies] func1 -> DEBU 1e54 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-04-22 06:18:09.088 UTC [policies] Evaluate -> DEBU 1e55 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.089 UTC [policies] Evaluate -> DEBU 1e59 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:09.090 UTC [cauthdsl] func1 -> DEBU 1e5a 0xc00053c700 gate 1555913889090241500 evaluation starts" +"2019-04-22 06:18:09.090 UTC [cauthdsl] func2 -> DEBU 1e5b 0xc00053c700 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.090 UTC [cauthdsl] func2 -> DEBU 1e5c 0xc00053c700 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.091 UTC [cauthdsl] func2 -> DEBU 1e5d 0xc00053c700 principal matched by identity 0" +"2019-04-22 06:18:09.091 UTC [msp.identity] Verify -> DEBU 1e5e Verify: digest = 00000000 48 b8 ed 70 62 58 be ba 1d 31 43 3b 9b e1 eb 91 |H..pbX...1C;....| +00000010 28 a1 74 b7 a4 c6 20 74 5f 9e e4 00 34 78 53 52 |(.t... t_...4xSR|" +"2019-04-22 06:18:09.092 UTC [msp.identity] Verify -> DEBU 1e5f Verify: sig = 00000000 30 44 02 20 4b ff 1d da 4e 23 15 7a 06 41 98 5a |0D. K...N#.z.A.Z| +00000010 01 e7 9d 83 3a e5 f9 f0 a0 51 f7 03 69 4d 6e e4 |....:....Q..iMn.| +00000020 c0 86 73 3e 02 20 28 57 17 0a 0c df d8 a7 91 59 |..s>. (W.......Y| +00000030 47 b3 76 60 9e 00 f5 28 3f c7 10 cf 0e 4b 4d e7 |G.v`...(?....KM.| +00000040 88 d9 04 c0 ba e4 |......|" +"2019-04-22 06:18:09.092 UTC [cauthdsl] func2 -> DEBU 1e60 0xc00053c700 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:09.092 UTC [cauthdsl] func1 -> DEBU 1e61 0xc00053c700 gate 1555913889090241500 evaluation succeeds" +"2019-04-22 06:18:09.092 UTC [policies] Evaluate -> DEBU 1e62 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.092 UTC [policies] Evaluate -> DEBU 1e63 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e45 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:09.093 UTC [policies] Evaluate -> DEBU 1e64 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.093 UTC [policies] Evaluate -> DEBU 1e65 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.094 UTC [policies] Evaluate -> DEBU 1e66 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:09.094 UTC [policies] Evaluate -> DEBU 1e67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:09.095 UTC [common.deliver] deliverBlocks -> DEBU 1e68 [channel: businesschannel] Received seekInfo (0xc0011d9f40) start: > stop: > from 192.168.224.9:34790" +"2019-04-22 06:18:09.095 UTC [fsblkstorage] Next -> DEBU 1e69 Initializing block stream for iterator. itr.maxBlockNumAvailable=9" +"2019-04-22 06:18:09.096 UTC [fsblkstorage] newBlockfileStream -> DEBU 1e6a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[98666]" +"2019-04-22 06:18:09.096 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e6b Remaining bytes=[35001], Going to peek [8] bytes" +"2019-04-22 06:18:09.096 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e6c Returning blockbytes - length=[34998], placementInfo={fileNum=[0], startOffset=[98666], bytesOffset=[98669]}" +"2019-04-22 06:18:09.097 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e6d blockbytes [34998] read from file [0]" +"2019-04-22 06:18:09.097 UTC [common.deliver] deliverBlocks -> DEBU 1e6e [channel: businesschannel] Delivering block [9] for (0xc0011d9f40) for 192.168.224.9:34790" +"2019-04-22 06:18:09.098 UTC [common.deliver] deliverBlocks -> DEBU 1e6f [channel: businesschannel] Done delivering to 192.168.224.9:34790 for (0xc0011d9f40)" +"2019-04-22 06:18:09.098 UTC [common.deliver] Handle -> DEBU 1e70 Waiting for new SeekInfo from 192.168.224.9:34790" +"2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e71 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e72 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e73 Came out of wait. maxAvailaBlockNumber=[9]" +"2019-04-22 06:18:09.099 UTC [fsblkstorage] waitForBlock -> DEBU 1e74 Going to wait for newer blocks. maxAvailaBlockNumber=[9], waitForBlockNum=[10]" +"2019-04-22 06:18:09.099 UTC [common.deliver] Handle -> DEBU 1e75 Attempting to read seek info message from 192.168.224.9:34790" +"2019-04-22 06:18:09.107 UTC [common.deliver] Handle -> WARN 1e76 Error reading from 192.168.224.9:34790: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:09.107 UTC [orderer.common.server] func1 -> DEBU 1e77 Closing Deliver stream" +"2019-04-22 06:18:09.107 UTC [comm.grpc.server] 1 -> INFO 1e78 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34790 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.3352ms +"2019-04-22 06:18:09.107 UTC [grpc] infof -> DEBU 1e79 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:09.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1e7a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:09.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1e7b Sending msg of 28 bytes to 3 on channel testchainid took 24.8µs" +"2019-04-22 06:18:09.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1e7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +"2019-04-22 06:18:09.284 UTC [orderer.common.server] Deliver -> DEBU 1e7d Starting new Deliver handler" +"2019-04-22 06:18:09.284 UTC [common.deliver] Handle -> DEBU 1e7e Starting new deliver loop for 192.168.224.9:34792" +"2019-04-22 06:18:09.284 UTC [common.deliver] Handle -> DEBU 1e7f Attempting to read seek info message from 192.168.224.9:34792" +"2019-04-22 06:18:09.284 UTC [policies] Evaluate -> DEBU 1e80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e84 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:09.285 UTC [cauthdsl] func1 -> DEBU 1e85 0xc000557070 gate 1555913889285217600 evaluation starts" +"2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e86 0xc000557070 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e87 0xc000557070 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e88 0xc000557070 principal matched by identity 0" +"2019-04-22 06:18:09.285 UTC [msp.identity] Verify -> DEBU 1e89 Verify: digest = 00000000 51 a9 9f 97 79 10 5b 52 c9 07 9d d4 a3 f6 d0 67 |Q...y.[R.......g| +00000010 27 2e 94 d3 a8 f5 a5 b9 fe 63 ea 09 29 1f 6c 16 |'........c..).l.|" +"2019-04-22 06:18:09.285 UTC [msp.identity] Verify -> DEBU 1e8a Verify: sig = 00000000 30 45 02 21 00 90 79 ae f1 94 6b 17 a2 38 26 c7 |0E.!..y...k..8&.| +00000010 3e 82 c6 b7 9f df 97 f6 66 31 89 50 1d d3 b9 17 |>.......f1.P....| +00000020 c8 c3 72 da c4 02 20 1d c0 70 45 01 b1 d6 57 5b |..r... ..pE...W[| +00000030 b0 a2 1f 89 4b 2f a5 52 eb 0b 74 38 e0 1c c7 1d |....K/.R..t8....| +00000040 59 a7 a9 cd 8a fc f5 |Y......|" +"2019-04-22 06:18:09.285 UTC [cauthdsl] func2 -> DEBU 1e8b 0xc000557070 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:09.285 UTC [cauthdsl] func1 -> DEBU 1e8c 0xc000557070 gate 1555913889285217600 evaluation succeeds" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e8d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e8e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e8f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e91 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:09.285 UTC [policies] Evaluate -> DEBU 1e92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:09.285 UTC [common.deliver] deliverBlocks -> DEBU 1e93 [channel: testchainid] Received seekInfo (0xc000087240) start: > stop: > from 192.168.224.9:34792" +"2019-04-22 06:18:09.285 UTC [fsblkstorage] Next -> DEBU 1e94 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:18:09.286 UTC [fsblkstorage] newBlockfileStream -> DEBU 1e95 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-04-22 06:18:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e96 Remaining bytes=[25828], Going to peek [8] bytes" +"2019-04-22 06:18:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e97 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-04-22 06:18:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1e98 blockbytes [25825] read from file [0]" +"2019-04-22 06:18:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1e99 [channel: testchainid] Delivering block [1] for (0xc000087240) for 192.168.224.9:34792" +"2019-04-22 06:18:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1e9a [channel: testchainid] Done delivering to 192.168.224.9:34792 for (0xc000087240)" +"2019-04-22 06:18:09.286 UTC [common.deliver] Handle -> DEBU 1e9b Waiting for new SeekInfo from 192.168.224.9:34792" +"2019-04-22 06:18:09.286 UTC [common.deliver] Handle -> DEBU 1e9c Attempting to read seek info message from 192.168.224.9:34792" +"2019-04-22 06:18:09.292 UTC [common.deliver] Handle -> WARN 1e9d Error reading from 192.168.224.9:34792: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:09.292 UTC [orderer.common.server] func1 -> DEBU 1e9e Closing Deliver stream" +"2019-04-22 06:18:09.292 UTC [comm.grpc.server] 1 -> INFO 1e9f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34792 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3487ms +"2019-04-22 06:18:09.292 UTC [grpc] infof -> DEBU 1ea0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:09.478 UTC [orderer.common.server] Deliver -> DEBU 1ea1 Starting new Deliver handler" +"2019-04-22 06:18:09.478 UTC [common.deliver] Handle -> DEBU 1ea2 Starting new deliver loop for 192.168.224.9:34794" +"2019-04-22 06:18:09.478 UTC [common.deliver] Handle -> DEBU 1ea3 Attempting to read seek info message from 192.168.224.9:34794" +"2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.479 UTC [policies] Evaluate -> DEBU 1ea8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:09.480 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc00126e700 gate 1555913889479985800 evaluation starts" +"2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eaa 0xc00126e700 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eab 0xc00126e700 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eac 0xc00126e700 principal matched by identity 0" +"2019-04-22 06:18:09.480 UTC [msp.identity] Verify -> DEBU 1ead Verify: digest = 00000000 00 54 37 2f 46 5f bd 11 1e 31 46 cb 90 b2 77 8c |.T7/F_...1F...w.| +00000010 7c 66 14 8c 9b e3 f3 1e c6 61 8e 3b b2 a9 e0 81 ||f.......a.;....|" +"2019-04-22 06:18:09.480 UTC [msp.identity] Verify -> DEBU 1eae Verify: sig = 00000000 30 45 02 21 00 97 5e 94 87 00 8b cc 1b 1e 51 db |0E.!..^.......Q.| +00000010 da 60 4a 1f 04 7c 70 d2 0f ce bf 23 a4 d6 89 49 |.`J..|p....#...I| +00000020 c8 29 b4 d9 40 02 20 67 4f b6 9f b9 66 f1 5a b1 |.)..@. gO...f.Z.| +00000030 85 9d 2d 36 b9 73 1b e2 13 91 1e f0 76 f9 2d 7e |..-6.s......v.-~| +00000040 7d f6 91 93 04 fa 32 |}.....2|" +"2019-04-22 06:18:09.480 UTC [cauthdsl] func2 -> DEBU 1eaf 0xc00126e700 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:09.480 UTC [cauthdsl] func1 -> DEBU 1eb0 0xc00126e700 gate 1555913889479985800 evaluation succeeds" +"2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb3 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb5 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:09.480 UTC [policies] Evaluate -> DEBU 1eb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:09.480 UTC [common.deliver] deliverBlocks -> DEBU 1eb7 [channel: testchainid] Received seekInfo (0xc000d131c0) start: > stop: > from 192.168.224.9:34794" +"2019-04-22 06:18:09.480 UTC [fsblkstorage] Next -> DEBU 1eb8 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:18:09.480 UTC [fsblkstorage] newBlockfileStream -> DEBU 1eb9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-04-22 06:18:09.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1eba Remaining bytes=[25828], Going to peek [8] bytes" +"2019-04-22 06:18:09.480 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ebb Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-04-22 06:18:09.481 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ebc blockbytes [25825] read from file [0]" +"2019-04-22 06:18:09.481 UTC [common.deliver] deliverBlocks -> DEBU 1ebd [channel: testchainid] Delivering block [1] for (0xc000d131c0) for 192.168.224.9:34794" +"2019-04-22 06:18:09.481 UTC [common.deliver] deliverBlocks -> DEBU 1ebe [channel: testchainid] Done delivering to 192.168.224.9:34794 for (0xc000d131c0)" +"2019-04-22 06:18:09.481 UTC [common.deliver] Handle -> DEBU 1ebf Waiting for new SeekInfo from 192.168.224.9:34794" +"2019-04-22 06:18:09.481 UTC [common.deliver] Handle -> DEBU 1ec0 Attempting to read seek info message from 192.168.224.9:34794" +"2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.484 UTC [policies] Evaluate -> DEBU 1ec5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:09.484 UTC [cauthdsl] func1 -> DEBU 1ec6 0xc000e595f0 gate 1555913889484727500 evaluation starts" +"2019-04-22 06:18:09.484 UTC [cauthdsl] func2 -> DEBU 1ec7 0xc000e595f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.484 UTC [cauthdsl] func2 -> DEBU 1ec8 0xc000e595f0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.484 UTC [cauthdsl] func2 -> DEBU 1ec9 0xc000e595f0 principal matched by identity 0" +"2019-04-22 06:18:09.484 UTC [msp.identity] Verify -> DEBU 1eca Verify: digest = 00000000 fc f0 44 39 54 a9 06 f2 a7 d1 e7 e8 37 0e 41 00 |..D9T.......7.A.| +00000010 c2 3a 22 1e 95 d5 e6 5b ff f5 0f fb f5 f6 1e 20 |.:"....[....... |" +"2019-04-22 06:18:09.484 UTC [msp.identity] Verify -> DEBU 1ecb Verify: sig = 00000000 30 45 02 21 00 db cb fd 8c 44 ee 76 b0 64 eb a0 |0E.!.....D.v.d..| +00000010 20 d7 61 c2 5a bc b6 7d 12 48 41 48 e4 ec 27 19 | .a.Z..}.HAH..'.| +00000020 73 cd 19 c7 a0 02 20 06 90 76 1a 92 04 8a 6d b3 |s..... ..v....m.| +00000030 f7 4e 88 d1 22 58 0e 68 e4 7c 44 3a bc e2 d3 4c |.N.."X.h.|D:...L| +00000040 27 d6 4d da 90 27 e4 |'.M..'.|" +"2019-04-22 06:18:09.485 UTC [cauthdsl] func2 -> DEBU 1ecc 0xc000e595f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:09.485 UTC [cauthdsl] func1 -> DEBU 1ecd 0xc000e595f0 gate 1555913889484727500 evaluation succeeds" +"2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ece Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ecf == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed0 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed2 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:09.485 UTC [policies] Evaluate -> DEBU 1ed3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:09.485 UTC [common.deliver] deliverBlocks -> DEBU 1ed4 [channel: testchainid] Received seekInfo (0xc000087b40) start: > stop: > from 192.168.224.9:34794" +"2019-04-22 06:18:09.485 UTC [fsblkstorage] Next -> DEBU 1ed5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:18:09.485 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ed6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:18:09.485 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ed7 Remaining bytes=[44243], Going to peek [8] bytes" +"2019-04-22 06:18:09.485 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ed8 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:18:09.485 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ed9 blockbytes [18412] read from file [0]" +"2019-04-22 06:18:09.485 UTC [common.deliver] deliverBlocks -> DEBU 1eda [channel: testchainid] Delivering block [0] for (0xc000087b40) for 192.168.224.9:34794" +"2019-04-22 06:18:09.485 UTC [common.deliver] deliverBlocks -> DEBU 1edb [channel: testchainid] Done delivering to 192.168.224.9:34794 for (0xc000087b40)" +"2019-04-22 06:18:09.485 UTC [common.deliver] Handle -> DEBU 1edc Waiting for new SeekInfo from 192.168.224.9:34794" +"2019-04-22 06:18:09.486 UTC [common.deliver] Handle -> DEBU 1edd Attempting to read seek info message from 192.168.224.9:34794" +"2019-04-22 06:18:09.494 UTC [common.deliver] Handle -> WARN 1ede Error reading from 192.168.224.9:34794: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:09.494 UTC [orderer.common.server] func1 -> DEBU 1edf Closing Deliver stream" +"2019-04-22 06:18:09.494 UTC [comm.grpc.server] 1 -> INFO 1ee0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34794 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.2383ms +"2019-04-22 06:18:09.494 UTC [grpc] infof -> DEBU 1ee1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:09.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +"2019-04-22 06:18:09.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ee3 Sending msg of 28 bytes to 2 on channel businesschannel took 15.8µs" +"2019-04-22 06:18:09.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ee4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 112.7µs " +"2019-04-22 06:18:09.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ee5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +"2019-04-22 06:18:09.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ee6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:09.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ee7 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:09.650 UTC [orderer.common.server] Deliver -> DEBU 1ee8 Starting new Deliver handler" +"2019-04-22 06:18:09.650 UTC [common.deliver] Handle -> DEBU 1ee9 Starting new deliver loop for 192.168.224.9:34796" +"2019-04-22 06:18:09.650 UTC [common.deliver] Handle -> DEBU 1eea Attempting to read seek info message from 192.168.224.9:34796" +"2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eeb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.650 UTC [policies] Evaluate -> DEBU 1eef == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:09.650 UTC [cauthdsl] func1 -> DEBU 1ef0 0xc001399ae0 gate 1555913889650766200 evaluation starts" +"2019-04-22 06:18:09.650 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc001399ae0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.650 UTC [cauthdsl] func2 -> DEBU 1ef2 0xc001399ae0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.650 UTC [cauthdsl] func2 -> DEBU 1ef3 0xc001399ae0 principal matched by identity 0" +"2019-04-22 06:18:09.651 UTC [msp.identity] Verify -> DEBU 1ef4 Verify: digest = 00000000 e7 ec 70 b9 d2 ae c1 3f 25 26 14 28 27 fd db bc |..p....?%&.('...| +00000010 36 cd 8f 04 94 63 64 52 b2 1e ff 09 dd 6a 29 00 |6....cdR.....j).|" +"2019-04-22 06:18:09.651 UTC [msp.identity] Verify -> DEBU 1ef5 Verify: sig = 00000000 30 45 02 21 00 ab 29 2a 27 2a 26 bb e9 74 44 f5 |0E.!..)*'*&..tD.| +00000010 d9 4b 3f a1 8b bd cb 22 a5 10 18 a5 a2 8a c6 51 |.K?....".......Q| +00000020 b9 0e fd 65 7b 02 20 6f ef 54 be 1a b6 be 41 34 |...e{. o.T....A4| +00000030 c3 17 7a 16 d4 75 ca 13 de 48 c6 3b fc 60 20 8d |..z..u...H.;.` .| +00000040 09 5a 06 a4 b9 62 f6 |.Z...b.|" +"2019-04-22 06:18:09.651 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc001399ae0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:09.651 UTC [cauthdsl] func1 -> DEBU 1ef7 0xc001399ae0 gate 1555913889650766200 evaluation succeeds" +"2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1ef8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1ef9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efa Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efc Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:09.651 UTC [policies] Evaluate -> DEBU 1efd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:09.651 UTC [common.deliver] deliverBlocks -> DEBU 1efe [channel: testchainid] Received seekInfo (0xc0004164c0) start: > stop: > from 192.168.224.9:34796" +"2019-04-22 06:18:09.651 UTC [fsblkstorage] Next -> DEBU 1eff Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:18:09.651 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f00 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-04-22 06:18:09.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f01 Remaining bytes=[44243], Going to peek [8] bytes" +"2019-04-22 06:18:09.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f02 Returning blockbytes - length=[18412], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-04-22 06:18:09.651 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f03 blockbytes [18412] read from file [0]" +"2019-04-22 06:18:09.651 UTC [common.deliver] deliverBlocks -> DEBU 1f04 [channel: testchainid] Delivering block [0] for (0xc0004164c0) for 192.168.224.9:34796" +"2019-04-22 06:18:09.652 UTC [common.deliver] deliverBlocks -> DEBU 1f05 [channel: testchainid] Done delivering to 192.168.224.9:34796 for (0xc0004164c0)" +"2019-04-22 06:18:09.652 UTC [common.deliver] Handle -> DEBU 1f06 Waiting for new SeekInfo from 192.168.224.9:34796" +"2019-04-22 06:18:09.652 UTC [common.deliver] Handle -> DEBU 1f07 Attempting to read seek info message from 192.168.224.9:34796" +"2019-04-22 06:18:09.660 UTC [grpc] infof -> DEBU 1f08 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:09.660 UTC [common.deliver] Handle -> WARN 1f09 Error reading from 192.168.224.9:34796: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:09.660 UTC [orderer.common.server] func1 -> DEBU 1f0a Closing Deliver stream" +"2019-04-22 06:18:09.660 UTC [comm.grpc.server] 1 -> INFO 1f0b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34796 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0027ms +"2019-04-22 06:18:09.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f0c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:09.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f0d Sending msg of 28 bytes to 3 on channel testchainid took 58µs" +"2019-04-22 06:18:09.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f0e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 229.4µs " +"2019-04-22 06:18:09.844 UTC [orderer.common.server] Deliver -> DEBU 1f0f Starting new Deliver handler" +"2019-04-22 06:18:09.845 UTC [common.deliver] Handle -> DEBU 1f10 Starting new deliver loop for 192.168.224.9:34798" +"2019-04-22 06:18:09.845 UTC [common.deliver] Handle -> DEBU 1f11 Attempting to read seek info message from 192.168.224.9:34798" +"2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:09.845 UTC [policies] Evaluate -> DEBU 1f16 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-04-22 06:18:09.845 UTC [cauthdsl] func1 -> DEBU 1f17 0xc0013bcdb0 gate 1555913889845850700 evaluation starts" +"2019-04-22 06:18:09.845 UTC [cauthdsl] func2 -> DEBU 1f18 0xc0013bcdb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:09.846 UTC [cauthdsl] func2 -> DEBU 1f19 0xc0013bcdb0 processing identity 0 with bytes of ebaeb0" +"2019-04-22 06:18:09.846 UTC [cauthdsl] func2 -> DEBU 1f1a 0xc0013bcdb0 principal matched by identity 0" +"2019-04-22 06:18:09.846 UTC [msp.identity] Verify -> DEBU 1f1b Verify: digest = 00000000 24 d2 b3 46 68 4c 66 6e f9 ee 13 79 9f f7 eb dc |$..FhLfn...y....| +00000010 61 2e 11 34 02 08 d6 95 c7 fb 20 06 a4 de 39 ae |a..4...... ...9.|" +"2019-04-22 06:18:09.846 UTC [msp.identity] Verify -> DEBU 1f1c Verify: sig = 00000000 30 44 02 20 2d e6 4b 34 a9 d8 c0 54 de 05 4d 63 |0D. -.K4...T..Mc| +00000010 f7 09 43 42 43 b9 7f dc 63 d8 49 53 d2 72 ec 3a |..CBC...c.IS.r.:| +00000020 55 4c b9 a2 02 20 48 c6 50 c6 aa c9 b4 d2 64 c1 |UL... H.P.....d.| +00000030 39 7a 72 c0 b5 fe ab ec 7e 22 3c ac 6b 1c 25 e7 |9zr.....~"<.k.%.| +00000040 79 8e ab c3 f0 9c |y.....|" +"2019-04-22 06:18:09.846 UTC [cauthdsl] func2 -> DEBU 1f1d 0xc0013bcdb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:09.846 UTC [cauthdsl] func1 -> DEBU 1f1e 0xc0013bcdb0 gate 1555913889845850700 evaluation succeeds" +"2019-04-22 06:18:09.846 UTC [policies] Evaluate -> DEBU 1f1f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.846 UTC [policies] Evaluate -> DEBU 1f20 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:09.846 UTC [policies] Evaluate -> DEBU 1f21 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.847 UTC [policies] Evaluate -> DEBU 1f22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-04-22 06:18:09.847 UTC [policies] Evaluate -> DEBU 1f23 Signature set satisfies policy /Channel/Readers" +"2019-04-22 06:18:09.847 UTC [policies] Evaluate -> DEBU 1f24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-04-22 06:18:09.847 UTC [common.deliver] deliverBlocks -> DEBU 1f25 [channel: testchainid] Received seekInfo (0xc000416540) start: > stop: > from 192.168.224.9:34798" +"2019-04-22 06:18:09.847 UTC [fsblkstorage] Next -> DEBU 1f26 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-04-22 06:18:09.847 UTC [fsblkstorage] newBlockfileStream -> DEBU 1f27 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[18415]" +"2019-04-22 06:18:09.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f28 Remaining bytes=[25828], Going to peek [8] bytes" +"2019-04-22 06:18:09.848 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f29 Returning blockbytes - length=[25825], placementInfo={fileNum=[0], startOffset=[18415], bytesOffset=[18418]}" +"2019-04-22 06:18:09.848 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1f2a blockbytes [25825] read from file [0]" +"2019-04-22 06:18:09.848 UTC [common.deliver] deliverBlocks -> DEBU 1f2b [channel: testchainid] Delivering block [1] for (0xc000416540) for 192.168.224.9:34798" +"2019-04-22 06:18:09.849 UTC [common.deliver] deliverBlocks -> DEBU 1f2c [channel: testchainid] Done delivering to 192.168.224.9:34798 for (0xc000416540)" +"2019-04-22 06:18:09.849 UTC [common.deliver] Handle -> DEBU 1f2d Waiting for new SeekInfo from 192.168.224.9:34798" +"2019-04-22 06:18:09.849 UTC [common.deliver] Handle -> DEBU 1f2e Attempting to read seek info message from 192.168.224.9:34798" +"2019-04-22 06:18:09.858 UTC [common.deliver] Handle -> WARN 1f2f Error reading from 192.168.224.9:34798: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:09.859 UTC [orderer.common.server] func1 -> DEBU 1f30 Closing Deliver stream" +"2019-04-22 06:18:09.859 UTC [comm.grpc.server] 1 -> INFO 1f31 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.9:34798 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.0248ms +"2019-04-22 06:18:09.859 UTC [grpc] infof -> DEBU 1f32 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:10.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f33 Sending msg of 28 bytes to 3 on channel businesschannel took 45.2µs" +"2019-04-22 06:18:10.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f34 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +"2019-04-22 06:18:10.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.4µs " +"2019-04-22 06:18:10.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.3µs " +"2019-04-22 06:18:10.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f37 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:10.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f38 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:10.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f39 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:10.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f3a Sending msg of 28 bytes to 3 on channel testchainid took 35.8µs" +"2019-04-22 06:18:10.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.5µs " +"2019-04-22 06:18:10.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f3c Sending msg of 28 bytes to 3 on channel businesschannel took 34.8µs" +"2019-04-22 06:18:10.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f3d Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2019-04-22 06:18:10.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95µs " +"2019-04-22 06:18:10.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.1µs " +"2019-04-22 06:18:10.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f40 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:10.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f41 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:10.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f42 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:10.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f43 Sending msg of 28 bytes to 3 on channel testchainid took 34.2µs" +"2019-04-22 06:18:10.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.4µs " +"2019-04-22 06:18:11.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f45 Sending msg of 28 bytes to 2 on channel businesschannel took 30.7µs" +"2019-04-22 06:18:11.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f46 Sending msg of 28 bytes to 3 on channel businesschannel took 21.6µs" +"2019-04-22 06:18:11.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.1µs " +"2019-04-22 06:18:11.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.4µs " +"2019-04-22 06:18:11.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f49 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:11.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f4a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:11.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f4b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:11.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f4c Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +"2019-04-22 06:18:11.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.5µs " +"2019-04-22 06:18:11.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f4e Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +"2019-04-22 06:18:11.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f4f Sending msg of 28 bytes to 3 on channel businesschannel took 84.6µs" +"2019-04-22 06:18:11.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 139.3µs " +"2019-04-22 06:18:11.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f52 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:11.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 233.5µs " +"2019-04-22 06:18:11.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f53 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:11.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f54 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:11.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f55 Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +"2019-04-22 06:18:11.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.6µs " +"2019-04-22 06:18:12.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f57 Sending msg of 28 bytes to 2 on channel businesschannel took 188.2µs" +"2019-04-22 06:18:12.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 197.6µs " +"2019-04-22 06:18:12.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f59 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:12.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f5a Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" +"2019-04-22 06:18:12.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 296µs " +"2019-04-22 06:18:12.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f5c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:12.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f5d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:12.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f5e Sending msg of 28 bytes to 3 on channel testchainid took 28.1µs" +"2019-04-22 06:18:12.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 134.9µs " +"2019-04-22 06:18:12.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f60 Sending msg of 28 bytes to 2 on channel businesschannel took 45.2µs" +"2019-04-22 06:18:12.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f62 Sending msg of 28 bytes to 3 on channel businesschannel took 43.6µs" +"2019-04-22 06:18:12.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 632.2µs " +"2019-04-22 06:18:12.574 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.4µs " +"2019-04-22 06:18:12.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f64 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:12.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f65 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:12.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f66 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:12.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f67 Sending msg of 28 bytes to 3 on channel testchainid took 44.6µs" +"2019-04-22 06:18:12.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 557µs " +"2019-04-22 06:18:13.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f69 Sending msg of 28 bytes to 2 on channel businesschannel took 32.5µs" +"2019-04-22 06:18:13.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f6a Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +"2019-04-22 06:18:13.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 124.1µs " +"2019-04-22 06:18:13.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177µs " +"2019-04-22 06:18:13.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f6d Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:13.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f6e Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:13.228 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f6f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:13.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f70 Sending msg of 28 bytes to 3 on channel testchainid took 47.2µs" +"2019-04-22 06:18:13.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.7µs " +"2019-04-22 06:18:13.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f72 Sending msg of 28 bytes to 3 on channel businesschannel took 28.7µs" +"2019-04-22 06:18:13.576 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f73 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2019-04-22 06:18:13.576 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f74 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.3µs " +"2019-04-22 06:18:13.577 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.4µs " +"2019-04-22 06:18:13.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f76 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:13.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f77 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:14.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f78 Sending msg of 28 bytes to 2 on channel businesschannel took 43.6µs" +"2019-04-22 06:18:14.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f79 Sending msg of 28 bytes to 3 on channel businesschannel took 32.8µs" +"2019-04-22 06:18:14.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.4µs " +"2019-04-22 06:18:14.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.7µs " +"2019-04-22 06:18:14.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f7c Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:14.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f7d Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:14.717 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f7e Sending msg of 28 bytes to 3 on channel testchainid took 33.3µs" +"2019-04-22 06:18:14.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f7f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.8µs " +"2019-04-22 06:18:14.718 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f80 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:14.742 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f81 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:14.742 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f82 Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +"2019-04-22 06:18:14.743 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f83 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.7µs " +"2019-04-22 06:18:15.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f84 Sending msg of 28 bytes to 2 on channel businesschannel took 70.4µs" +"2019-04-22 06:18:15.082 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f85 Sending msg of 28 bytes to 3 on channel businesschannel took 37.9µs" +"2019-04-22 06:18:15.082 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f86 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153.8µs " +"2019-04-22 06:18:15.082 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.1µs " +"2019-04-22 06:18:15.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f88 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:15.084 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f89 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:15.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f8a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:15.228 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f8b Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-04-22 06:18:15.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f8c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216µs " +"2019-04-22 06:18:15.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f8d Sending msg of 28 bytes to 2 on channel businesschannel took 29.7µs" +"2019-04-22 06:18:15.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f8e Sending msg of 28 bytes to 3 on channel businesschannel took 137.2µs" +"2019-04-22 06:18:15.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f8f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.2µs " +"2019-04-22 06:18:15.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.6µs " +"2019-04-22 06:18:15.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f91 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:15.580 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f92 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:15.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f93 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:15.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f94 Sending msg of 28 bytes to 3 on channel testchainid took 29.7µs" +"2019-04-22 06:18:15.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f95 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.2µs " +"2019-04-22 06:18:16.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f96 Sending msg of 28 bytes to 2 on channel businesschannel took 63µs" +"2019-04-22 06:18:16.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f97 Sending msg of 28 bytes to 3 on channel businesschannel took 31.1µs" +"2019-04-22 06:18:16.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f98 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.8µs " +"2019-04-22 06:18:16.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4074ms " +"2019-04-22 06:18:16.077 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f9a Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:16.080 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f9b Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:16.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1f9c Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:16.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f9d Sending msg of 28 bytes to 3 on channel testchainid took 21.2µs" +"2019-04-22 06:18:16.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1f9e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.5µs " +"2019-04-22 06:18:16.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fa0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.1µs " +"2019-04-22 06:18:16.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fa1 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:16.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1f9f Sending msg of 28 bytes to 3 on channel businesschannel took 91.3µs" +"2019-04-22 06:18:16.574 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa2 Sending msg of 28 bytes to 2 on channel businesschannel took 71.3µs" +"2019-04-22 06:18:16.575 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 300.1µs " +"2019-04-22 06:18:16.576 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fa4 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:16.761 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fa5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:16.761 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa6 Sending msg of 28 bytes to 3 on channel testchainid took 34.8µs" +"2019-04-22 06:18:16.761 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fa7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.3µs " +"2019-04-22 06:18:17.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa8 Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +"2019-04-22 06:18:17.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fa9 Sending msg of 28 bytes to 3 on channel businesschannel took 28.6µs" +"2019-04-22 06:18:17.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1faa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.7µs " +"2019-04-22 06:18:17.072 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fab Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:17.074 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.4591ms " +"2019-04-22 06:18:17.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fad Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:17.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fae Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:17.229 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.5µs " +"2019-04-22 06:18:17.229 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1faf Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +"2019-04-22 06:18:17.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fb1 Sending msg of 28 bytes to 2 on channel businesschannel took 33.1µs" +"2019-04-22 06:18:17.572 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fb2 Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-04-22 06:18:17.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +"2019-04-22 06:18:17.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120µs " +"2019-04-22 06:18:17.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fb5 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:17.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fb6 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:17.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fb7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:17.731 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fb8 Sending msg of 28 bytes to 3 on channel testchainid took 35.7µs" +"2019-04-22 06:18:17.733 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.6µs " +"2019-04-22 06:18:18.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fba Sending msg of 28 bytes to 3 on channel businesschannel took 59µs" +"2019-04-22 06:18:18.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fbb Sending msg of 28 bytes to 2 on channel businesschannel took 41.5µs" +"2019-04-22 06:18:18.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 163.4µs " +"2019-04-22 06:18:18.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.2µs " +"2019-04-22 06:18:18.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fbe Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:18.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fbf Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:18.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:18.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc1 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +"2019-04-22 06:18:18.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.8µs " +"2019-04-22 06:18:18.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc3 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +"2019-04-22 06:18:18.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fc4 Sending msg of 28 bytes to 3 on channel businesschannel took 19.3µs" +"2019-04-22 06:18:18.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96µs " +"2019-04-22 06:18:18.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.1µs " +"2019-04-22 06:18:18.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc7 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:18.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc8 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:18.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fc9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:18.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fca Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +"2019-04-22 06:18:18.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fcb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +"2019-04-22 06:18:19.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fcc Sending msg of 28 bytes to 2 on channel businesschannel took 40.6µs" +"2019-04-22 06:18:19.071 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.8µs " +"2019-04-22 06:18:19.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.9µs " +"2019-04-22 06:18:19.074 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fcf Sending msg of 28 bytes to 3 on channel businesschannel took 2.3235ms" +"2019-04-22 06:18:19.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd0 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:19.075 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd1 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:19.231 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd2 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:19.232 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fd3 Sending msg of 28 bytes to 3 on channel testchainid took 31.9µs" +"2019-04-22 06:18:19.232 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fd4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +"2019-04-22 06:18:19.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fd5 Sending msg of 28 bytes to 2 on channel businesschannel took 82.9µs" +"2019-04-22 06:18:19.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fd6 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +"2019-04-22 06:18:19.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.8µs " +"2019-04-22 06:18:19.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.1µs " +"2019-04-22 06:18:19.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fd9 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:19.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fda Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:19.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fdb Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:19.728 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fdc Sending msg of 28 bytes to 3 on channel testchainid took 34.7µs" +"2019-04-22 06:18:19.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fdd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.2µs " +"2019-04-22 06:18:20.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fde Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2019-04-22 06:18:20.072 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fdf Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2019-04-22 06:18:20.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.5µs " +"2019-04-22 06:18:20.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 116.5µs " +"2019-04-22 06:18:20.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fe2 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:20.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fe3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:20.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fe4 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:20.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fe5 Sending msg of 28 bytes to 3 on channel testchainid took 27.6µs" +"2019-04-22 06:18:20.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.9µs " +"2019-04-22 06:18:20.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fe7 Sending msg of 28 bytes to 2 on channel businesschannel took 41.4µs" +"2019-04-22 06:18:20.573 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fe8 Sending msg of 28 bytes to 3 on channel businesschannel took 32.3µs" +"2019-04-22 06:18:20.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fe9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.4µs " +"2019-04-22 06:18:20.573 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 108.4µs " +"2019-04-22 06:18:20.578 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1feb Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:20.579 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fec Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:20.727 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fed Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:20.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1fee Sending msg of 28 bytes to 3 on channel testchainid took 35.8µs" +"2019-04-22 06:18:20.730 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1fef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 167.3µs " +"2019-04-22 06:18:21.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff0 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +"2019-04-22 06:18:21.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff1 Sending msg of 28 bytes to 3 on channel businesschannel took 125.1µs" +"2019-04-22 06:18:21.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ff2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.2µs " +"2019-04-22 06:18:21.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ff3 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:21.075 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2303ms " +"2019-04-22 06:18:21.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ff5 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:21.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ff6 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:21.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff7 Sending msg of 28 bytes to 3 on channel testchainid took 27.1µs" +"2019-04-22 06:18:21.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ff8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.8µs " +"2019-04-22 06:18:21.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ff9 Sending msg of 28 bytes to 2 on channel businesschannel took 58.1µs" +"2019-04-22 06:18:21.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ffa Sending msg of 28 bytes to 3 on channel businesschannel took 32.5µs" +"2019-04-22 06:18:21.571 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ffb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.7µs " +"2019-04-22 06:18:21.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ffc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.6µs " +"2019-04-22 06:18:21.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ffd Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:21.575 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ffe Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:21.728 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1fff Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:21.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2000 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.2µs " +"2019-04-22 06:18:21.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2001 Sending msg of 28 bytes to 3 on channel testchainid took 156.5µs" +"2019-04-22 06:18:22.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2002 Sending msg of 28 bytes to 2 on channel businesschannel took 52.1µs" +"2019-04-22 06:18:22.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2003 Sending msg of 28 bytes to 3 on channel businesschannel took 47.5µs" +"2019-04-22 06:18:22.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2004 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.8µs " +"2019-04-22 06:18:22.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2005 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.3µs " +"2019-04-22 06:18:22.074 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2006 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:22.076 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2007 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:22.227 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2008 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:22.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2009 Sending msg of 28 bytes to 3 on channel testchainid took 27µs" +"2019-04-22 06:18:22.228 UTC [orderer.common.cluster.step] sendMessage -> DEBU 200a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.8µs " +"2019-04-22 06:18:22.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 200b Sending msg of 28 bytes to 3 on channel businesschannel took 44.9µs" +"2019-04-22 06:18:22.571 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 200c Sending msg of 28 bytes to 2 on channel businesschannel took 30.6µs" +"2019-04-22 06:18:22.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 200d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.3µs " +"2019-04-22 06:18:22.572 UTC [orderer.common.cluster.step] sendMessage -> DEBU 200e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.3µs " +"2019-04-22 06:18:22.573 UTC [orderer.common.cluster.step] handleMessage -> DEBU 200f Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:22.574 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2010 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:22.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2011 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:22.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2012 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2019-04-22 06:18:22.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2013 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 444.1µs " +"2019-04-22 06:18:23.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2014 Sending msg of 28 bytes to 2 on channel businesschannel took 39.3µs" +"2019-04-22 06:18:23.071 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2015 Sending msg of 28 bytes to 3 on channel businesschannel took 82.6µs" +"2019-04-22 06:18:23.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2016 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +"2019-04-22 06:18:23.072 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 105.3µs " +"2019-04-22 06:18:23.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2018 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:23.073 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2019 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:23.209 UTC [orderer.common.cluster.step] handleMessage -> DEBU 201a Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:23.209 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 201b Sending msg of 28 bytes to 3 on channel testchainid took 32.3µs" +"2019-04-22 06:18:23.209 UTC [orderer.common.cluster.step] sendMessage -> DEBU 201c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.5µs " +"2019-04-22 06:18:23.538 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 201d Sending msg of 28 bytes to 2 on channel businesschannel took 34.7µs" +"2019-04-22 06:18:23.538 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 201e Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-04-22 06:18:23.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 201f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.4µs " +"2019-04-22 06:18:23.538 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2020 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.8µs " +"2019-04-22 06:18:23.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2021 Received message from orderer1.example.com(192.168.224.3:45624): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:23.541 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2022 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-04-22 06:18:23.718 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2023 Received message from orderer2.example.com(192.168.224.2:57130): ConsensusRequest for channel testchainid with payload of size 28" +"2019-04-22 06:18:23.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2024 Sending msg of 28 bytes to 3 on channel testchainid took 136.2µs" +"2019-04-22 06:18:23.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2025 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 179.6µs " diff --git a/hyperledger_fabric/latest/raft/logs/dev_peer0.log b/hyperledger_fabric/latest/raft/logs/dev_peer0.log index 2a1fa9e7..bd504519 100644 --- a/hyperledger_fabric/latest/raft/logs/dev_peer0.log +++ b/hyperledger_fabric/latest/raft/logs/dev_peer0.log @@ -1,178 +1,26162 @@ -[001 02-28 03:15:36.99 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: - Version: 1.4.0 +"2019-04-22 06:16:30.436 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +"2019-04-22 06:16:30.436 UTC [viperutil] getKeysRecursively -> DEBU 002 Found map[string]interface{} value for peer.BCCSP.SW" +"2019-04-22 06:16:30.436 UTC [viperutil] unmarshalJSON -> DEBU 003 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-04-22 06:16:30.436 UTC [viperutil] getKeysRecursively -> DEBU 004 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +"2019-04-22 06:16:30.436 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: 256" +"2019-04-22 06:16:30.437 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Security setting to int 256" +"2019-04-22 06:16:30.437 UTC [viperutil] getKeysRecursively -> DEBU 007 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +"2019-04-22 06:16:30.439 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +"2019-04-22 06:16:30.439 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +"2019-04-22 06:16:30.439 UTC [viperutil] getKeysRecursively -> DEBU 00a Found map[string]interface{} value for peer.BCCSP.PKCS11" +"2019-04-22 06:16:30.439 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.440 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for peer.BCCSP.PKCS11.Label setting to " +"2019-04-22 06:16:30.440 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.440 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Pin setting to " +"2019-04-22 06:16:30.441 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.441 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Hash setting to " +"2019-04-22 06:16:30.441 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.442 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Security setting to " +"2019-04-22 06:16:30.442 UTC [viperutil] getKeysRecursively -> DEBU 013 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +"2019-04-22 06:16:30.442 UTC [viperutil] unmarshalJSON -> DEBU 014 Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.442 UTC [viperutil] getKeysRecursively -> DEBU 015 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +"2019-04-22 06:16:30.444 UTC [viperutil] unmarshalJSON -> DEBU 016 Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.444 UTC [viperutil] getKeysRecursively -> DEBU 017 Found real value for peer.BCCSP.PKCS11.Library setting to " +"2019-04-22 06:16:30.445 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-04-22 06:16:30.445 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.Default setting to string SW" +"2019-04-22 06:16:30.445 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[SW:map[Hash:SHA2 Security:256 FileKeyStore:map[KeyStore:]] PKCS11:map[FileKeyStore:map[KeyStore:] Library: Label: Pin: Hash: Security:] Default:SW]]" +"2019-04-22 06:16:30.449 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +"2019-04-22 06:16:30.449 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +"2019-04-22 06:16:30.449 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +"2019-04-22 06:16:30.456 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +"2019-04-22 06:16:30.461 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +"2019-04-22 06:16:30.466 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +"2019-04-22 06:16:30.468 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +"2019-04-22 06:16:30.476 UTC [msp] getPemMaterialFromDir -> DEBU 022 Inspecting file /etc/hyperledger/fabric/msp/admincerts/Admin@org1.example.com-cert.pem" +"2019-04-22 06:16:30.489 UTC [msp] getPemMaterialFromDir -> DEBU 023 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +"2019-04-22 06:16:30.490 UTC [msp] getMspConfig -> DEBU 024 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +"2019-04-22 06:16:30.490 UTC [msp] getPemMaterialFromDir -> DEBU 025 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +"2019-04-22 06:16:30.496 UTC [msp] getPemMaterialFromDir -> DEBU 026 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +"2019-04-22 06:16:30.499 UTC [msp] getPemMaterialFromDir -> DEBU 027 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +"2019-04-22 06:16:30.500 UTC [msp] getMspConfig -> DEBU 028 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +"2019-04-22 06:16:30.500 UTC [msp] getPemMaterialFromDir -> DEBU 029 Reading directory /etc/hyperledger/fabric/msp/crls" +"2019-04-22 06:16:30.501 UTC [msp] getMspConfig -> DEBU 02a crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +"2019-04-22 06:16:30.505 UTC [msp] getMspConfig -> DEBU 02b Loading NodeOUs" +"2019-04-22 06:16:30.516 UTC [msp] newBccspMsp -> DEBU 02c Creating BCCSP-based MSP instance" +"2019-04-22 06:16:30.516 UTC [msp] New -> DEBU 02d Creating Cache-MSP instance" +"2019-04-22 06:16:30.517 UTC [msp] loadLocaMSP -> DEBU 02e Created new local MSP" +"2019-04-22 06:16:30.517 UTC [msp] Setup -> DEBU 02f Setting up MSP instance Org1MSP" +"2019-04-22 06:16:30.517 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:30.517 UTC [msp.identity] newIdentity -> DEBU 031 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:30.518 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-04-22 06:16:30.531 UTC [bccsp_sw] loadPrivateKey -> DEBU 033 Loading private key [0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175] at [/etc/hyperledger/fabric/msp/keystore/0c3831d39922a4933f04e85fee7a4ee081a55a888d6d5336cc92e473669fe175_sk]..." +"2019-04-22 06:16:30.535 UTC [msp.identity] newIdentity -> DEBU 034 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-04-22 06:16:30.535 UTC [msp] setupSigningIdentity -> DEBU 035 Signing identity expires at 2029-03-29 08:14:00 +0000 UTC" +"2019-04-22 06:16:30.545 UTC [msp] Validate -> DEBU 036 MSP Org1MSP validating identity" +"2019-04-22 06:16:30.546 UTC [nodeCmd] serve -> INFO 037 Starting peer: + Version: 2.0.0 Commit SHA: development build Go version: go1.11.5 OS/Arch: linux/amd64 Chaincode: Base Docker Namespace: hyperledger Base Docker Label: org.hyperledger.fabric - Docker Namespace: hyperledger -[002 02-28 03:15:36.99 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -[003 02-28 03:15:36.99 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -[004 02-28 03:15:37.22 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -[005 02-28 03:15:37.36 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -[006 02-28 03:15:37.37 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.13:7051 -[007 02-28 03:15:37.37 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -[008 02-28 03:15:37.38 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.28.0.13:7051 -[009 02-28 03:15:37.38 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -[00a 02-28 03:15:37.40 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -[00b 02-28 03:15:37.42 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com -[00c 02-28 03:15:37.42 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 -[00d 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -[00e 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -[00f 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -[010 02-28 03:15:37.46 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -[011 02-28 03:15:37.48 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] -[012 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9, Metadata: -[013 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started -[014 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -[015 02-28 03:15:37.50 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -[016 02-28 03:15:37.51 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -[017 02-28 03:15:37.51 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -[018 02-28 03:15:37.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -[019 02-28 03:15:37.52 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -[01a 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -[01b 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -[01c 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -[01d 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -[01e 02-28 03:15:37.53 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -[01f 02-28 03:15:37.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:15:39.543Z grpc.peer_address=172.28.0.15:41242 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.8µs -[020 02-28 03:15:37.58 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:15:47.558Z grpc.peer_address=172.28.0.15:41242 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.0998ms -[021 02-28 03:15:37.60 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:15:39.596Z grpc.peer_address=172.28.0.15:41244 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.8279ms -[022 02-28 03:16:12.58 UTC] [%{longpkg}] %{callpath} -> INFO [][8e124410] Entry chaincode: name:"cscc" -[023 02-28 03:16:12.59 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -[024 02-28 03:16:12.60 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -[025 02-28 03:16:12.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 23ms (state_validation=2ms block_commit=9ms state_commit=9ms) -[026 02-28 03:16:12.63 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -[027 02-28 03:16:12.64 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -[028 02-28 03:16:12.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -[029 02-28 03:16:12.65 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -[02a 02-28 03:16:12.67 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -[02b 02-28 03:16:12.67 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -[02c 02-28 03:16:12.67 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -[02d 02-28 03:16:12.68 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -[02e 02-28 03:16:12.68 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -[02f 02-28 03:16:12.68 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -[030 02-28 03:16:12.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -[031 02-28 03:16:12.69 UTC] [%{longpkg}] %{callpath} -> INFO [][8e124410] Exit chaincode: name:"cscc" (106ms) -[032 02-28 03:16:12.69 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45236 grpc.code=OK grpc.call_duration=115.3254ms -[033 02-28 03:16:14.28 UTC] [%{longpkg}] %{callpath} -> INFO [][c165adbc] Entry chaincode: name:"cscc" -[034 02-28 03:16:14.28 UTC] [%{longpkg}] %{callpath} -> INFO [][c165adbc] Exit chaincode: name:"cscc" (1ms) -[035 02-28 03:16:14.28 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45244 grpc.code=OK grpc.call_duration=2.1875ms -[036 02-28 03:16:15.34 UTC] [%{longpkg}] %{callpath} -> INFO [][3f29bc9d] Entry chaincode: name:"qscc" -[037 02-28 03:16:15.34 UTC] [%{longpkg}] %{callpath} -> INFO [][3f29bc9d] Exit chaincode: name:"qscc" (2ms) -[038 02-28 03:16:15.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45252 grpc.code=OK grpc.call_duration=3.434ms -[039 02-28 03:16:17.64 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] -[03a 02-28 03:16:18.67 UTC] [%{longpkg}] %{callpath} -> INFO c9c5adf89df1ba87cbcda5671ba3be9f0e2de4d6e153f1b9a1aa09d076a204a9 : Becoming a leader -[03b 02-28 03:16:18.68 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel -[03c 02-28 03:16:18.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -[03d 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -[03e 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -[03f 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -[040 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -[041 02-28 03:16:18.73 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 70ms -[042 02-28 03:16:18.76 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:20.766Z grpc.peer_address=172.28.0.15:41640 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=174.2µs -[043 02-28 03:16:18.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 29ms (state_validation=2ms block_commit=17ms state_commit=5ms) -[044 02-28 03:16:18.78 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:28.77Z grpc.peer_address=172.28.0.15:41640 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.078ms -[045 02-28 03:16:18.78 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.15:41244 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=41.2371078s -[046 02-28 03:16:18.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -[047 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -[048 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -[049 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -[04a 02-28 03:16:18.98 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -[04b 02-28 03:16:19.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 140ms -[04c 02-28 03:16:19.11 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.117Z grpc.peer_address=172.28.0.15:41654 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=183.5µs -[04d 02-28 03:16:19.16 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.123Z grpc.peer_address=172.28.0.15:41654 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.063ms -[04e 02-28 03:16:19.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 80ms (state_validation=0ms block_commit=38ms state_commit=6ms) -[04f 02-28 03:16:19.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.333Z grpc.peer_address=172.28.0.12:50100 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=330.3µs -[050 02-28 03:16:19.35 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.338Z grpc.peer_address=172.28.0.12:50100 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.1912ms -[051 02-28 03:16:19.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.358Z grpc.peer_address=172.28.0.12:50102 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144µs -[052 02-28 03:16:19.52 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.521Z grpc.peer_address=172.28.0.12:50104 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.1µs -[053 02-28 03:16:19.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.12:50102 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=164.6591ms -[054 02-28 03:16:19.52 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.522Z grpc.peer_address=172.28.0.12:50104 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.4234ms -[055 02-28 03:16:19.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.742Z grpc.peer_address=172.28.0.14:41150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=234.4µs -[056 02-28 03:16:19.77 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.746Z grpc.peer_address=172.28.0.14:41150 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.3935ms -[057 02-28 03:16:19.77 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.775Z grpc.peer_address=172.28.0.14:41152 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=393.1µs -[058 02-28 03:16:19.81 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:16:21.814Z grpc.peer_address=172.28.0.14:41154 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=179.4µs -[059 02-28 03:16:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:16:29.817Z grpc.peer_address=172.28.0.14:41154 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.5329ms -[05a 02-28 03:16:19.82 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.28.0.14:41152 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=39.2071ms -[05b 02-28 03:16:22.61 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] -[05c 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO [][6971e8f4] Entry chaincode: name:"lscc" -[05d 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -[05e 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO [][6971e8f4] Exit chaincode: name:"lscc" (2ms) -[05f 02-28 03:16:24.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45310 grpc.code=OK grpc.call_duration=3.4367ms -[060 02-28 03:16:28.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][342b45c0] Entry chaincode: name:"lscc" -[061 02-28 03:16:28.38 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' -[062 02-28 03:17:11.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][342b45c0] Exit chaincode: name:"lscc" (43468ms) -[063 02-28 03:17:11.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45328 grpc.code=OK grpc.call_duration=43.4807321s -[064 02-28 03:17:13.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -[065 02-28 03:17:13.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 14ms -[066 02-28 03:17:13.90 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] -[067 02-28 03:17:13.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 34ms (state_validation=12ms block_commit=15ms state_commit=2ms) -[068 02-28 03:17:55.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3670e2a5] Entry chaincode: name:"exp02" -[069 02-28 03:17:55.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3670e2a5] Exit chaincode: name:"exp02" (16ms) -[06a 02-28 03:17:55.53 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45346 grpc.code=OK grpc.call_duration=20.1875ms -[06b 02-28 03:17:57.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -[06c 02-28 03:17:57.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 16ms -[06d 02-28 03:17:57.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 31ms (state_validation=2ms block_commit=17ms state_commit=3ms) -[06e 02-28 03:17:58.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f545d011] Entry chaincode: name:"exp02" -[06f 02-28 03:17:58.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f545d011] Exit chaincode: name:"exp02" (3ms) -[070 02-28 03:17:58.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45366 grpc.code=OK grpc.call_duration=5.3192ms -[071 02-28 03:18:00.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -[072 02-28 03:18:00.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 2ms -[073 02-28 03:18:00.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=24ms state_commit=6ms) -[074 02-28 03:18:00.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4b5c9548] Entry chaincode: name:"exp02" -[075 02-28 03:18:00.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4b5c9548] Exit chaincode: name:"exp02" (3ms) -[076 02-28 03:18:00.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45370 grpc.code=OK grpc.call_duration=5.7713ms -[077 02-28 03:18:01.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7ca4bbf1] Entry chaincode: name:"lscc" -[078 02-28 03:18:01.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7ca4bbf1] Exit chaincode: name:"lscc" (2ms) -[079 02-28 03:18:01.38 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45374 grpc.code=OK grpc.call_duration=4.7474ms -[07a 02-28 03:18:01.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][eeb0d664] Entry chaincode: name:"lscc" -[07b 02-28 03:18:01.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][eeb0d664] Exit chaincode: name:"lscc" (2ms) -[07c 02-28 03:18:01.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45378 grpc.code=OK grpc.call_duration=3.6408ms -[07d 02-28 03:18:01.85 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][20d685f7] Entry chaincode: name:"lscc" -[07e 02-28 03:18:01.85 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][20d685f7] Exit chaincode: name:"lscc" (1ms) -[07f 02-28 03:18:01.85 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45382 grpc.code=OK grpc.call_duration=2.2009ms -[080 02-28 03:18:02.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7c75ddde] Entry chaincode: name:"lscc" -[081 02-28 03:18:02.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7c75ddde] Exit chaincode: name:"lscc" (1ms) -[082 02-28 03:18:02.04 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45386 grpc.code=OK grpc.call_duration=3.1674ms -[083 02-28 03:18:02.24 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8b9a3b89] Entry chaincode: name:"lscc" -[084 02-28 03:18:02.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8b9a3b89] Exit chaincode: name:"lscc" (15ms) -[085 02-28 03:18:02.26 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45390 grpc.code=OK grpc.call_duration=18.6256ms -[086 02-28 03:18:02.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ce799050] Entry chaincode: name:"qscc" -[087 02-28 03:18:02.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ce799050] Exit chaincode: name:"qscc" (2ms) -[088 02-28 03:18:02.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45394 grpc.code=OK grpc.call_duration=6.1555ms -[089 02-28 03:18:03.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][811da089] Entry chaincode: name:"qscc" -[08a 02-28 03:18:03.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][811da089] Exit chaincode: name:"qscc" (6ms) -[08b 02-28 03:18:03.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45398 grpc.code=OK grpc.call_duration=8.6717ms -[08c 02-28 03:18:03.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5fc046c1] Entry chaincode: name:"cscc" -[08d 02-28 03:18:03.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5fc046c1] Exit chaincode: name:"cscc" (2ms) -[08e 02-28 03:18:03.62 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45402 grpc.code=OK grpc.call_duration=4.6617ms -[08f 02-28 03:18:03.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bb51d33] Entry chaincode: name:"cscc" -[090 02-28 03:18:03.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bb51d33] Exit chaincode: name:"cscc" (1ms) -[091 02-28 03:18:03.90 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45406 grpc.code=OK grpc.call_duration=2.7253ms -[092 02-28 03:18:04.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c065ada1] Entry chaincode: name:"cscc" -[093 02-28 03:18:04.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c065ada1] Exit chaincode: name:"cscc" (2ms) -[094 02-28 03:18:04.14 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45410 grpc.code=OK grpc.call_duration=6.2881ms -[095 02-28 03:18:19.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -[096 02-28 03:18:19.89 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -[097 02-28 03:18:19.89 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSP57bc58e35af7f98e5c999a4dc02b50d567ed50514c1fd7131f9d0a54de794a60] at index 2 in signature set -[098 02-28 03:18:19.99 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -[099 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -[09a 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -[09b 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -[09c 02-28 03:18:20.00 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -[09d 02-28 03:18:20.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 126ms -[09e 02-28 03:18:20.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.017Z grpc.peer_address=172.28.0.12:50260 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=196.6µs -[09f 02-28 03:18:20.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.024Z grpc.peer_address=172.28.0.15:41824 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.7556ms -[0a0 02-28 03:18:20.03 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-02-28T03:18:22.031Z grpc.peer_address=172.28.0.14:41300 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.7728ms -[0a1 02-28 03:18:20.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 50ms (state_validation=29ms block_commit=11ms state_commit=7ms) -[0a2 02-28 03:18:20.08 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.052Z grpc.peer_address=172.28.0.14:41300 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=32.86ms -[0a3 02-28 03:18:20.08 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.036Z grpc.peer_address=172.28.0.15:41824 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.6249ms -[0a4 02-28 03:18:20.10 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-02-28T03:18:30.053Z grpc.peer_address=172.28.0.12:50260 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.4603ms -[0a5 02-28 03:18:37.16 UTC] [%{longpkg}] %{callpath} -> INFO [][db559b66] Entry chaincode: name:"cscc" -[0a6 02-28 03:18:37.16 UTC] [%{longpkg}] %{callpath} -> INFO [][db559b66] Exit chaincode: name:"cscc" (1ms) -[0a7 02-28 03:18:37.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45494 grpc.code=OK grpc.call_duration=3.3891ms -[0a8 02-28 03:18:38.28 UTC] [%{longpkg}] %{callpath} -> INFO [][20b1bcac] Entry chaincode: name:"qscc" -[0a9 02-28 03:18:38.28 UTC] [%{longpkg}] %{callpath} -> INFO [][20b1bcac] Exit chaincode: name:"qscc" (2ms) -[0aa 02-28 03:18:38.28 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.28.0.6:45502 grpc.code=OK grpc.call_duration=5.2134ms + Docker Namespace: hyperledger" +"2019-04-22 06:16:30.560 UTC [peer] getLocalAddress -> INFO 038 Auto-detected peer address: 192.168.224.6:7051" +"2019-04-22 06:16:30.561 UTC [peer] getLocalAddress -> INFO 039 Returning peer0.org1.example.com:7051" +"2019-04-22 06:16:30.563 UTC [msp] GetDefaultSigningIdentity -> DEBU 03a Obtaining default signing identity" +"2019-04-22 06:16:30.563 UTC [msp.identity] Sign -> DEBU 03b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-04-22 06:16:30.563 UTC [msp.identity] Sign -> DEBU 03c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-04-22 06:16:30.564 UTC [ledgermgmt] initialize -> INFO 03d Initializing ledger mgmt" +"2019-04-22 06:16:30.564 UTC [kvledger] NewProvider -> INFO 03e Initializing ledger provider" +"2019-04-22 06:16:30.564 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03f CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +"2019-04-22 06:16:30.564 UTC [kvledger.util] logDirStatus -> DEBU 040 Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +"2019-04-22 06:16:30.564 UTC [kvledger.util] logDirStatus -> DEBU 041 After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +"2019-04-22 06:16:30.611 UTC [kvledger.util] CreateDirIfMissing -> DEBU 042 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +"2019-04-22 06:16:30.611 UTC [kvledger.util] logDirStatus -> DEBU 043 Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +"2019-04-22 06:16:30.611 UTC [kvledger.util] logDirStatus -> DEBU 044 After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +"2019-04-22 06:16:30.629 UTC [kvledger.util] CreateDirIfMissing -> DEBU 045 CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +"2019-04-22 06:16:30.629 UTC [kvledger.util] logDirStatus -> DEBU 046 Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +"2019-04-22 06:16:30.629 UTC [kvledger.util] logDirStatus -> DEBU 047 After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +"2019-04-22 06:16:30.644 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 048 constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +"2019-04-22 06:16:30.644 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +"2019-04-22 06:16:30.644 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +"2019-04-22 06:16:30.644 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +"2019-04-22 06:16:30.669 UTC [kvledger] NewProvider -> INFO 04c ledger provider Initialized" +"2019-04-22 06:16:30.669 UTC [confighistory] newDBProvider -> DEBU 04d Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +"2019-04-22 06:16:30.670 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04e CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +"2019-04-22 06:16:30.670 UTC [kvledger.util] logDirStatus -> DEBU 04f Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +"2019-04-22 06:16:30.670 UTC [kvledger.util] logDirStatus -> DEBU 050 After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +"2019-04-22 06:16:30.686 UTC [kvledger.util] CreateDirIfMissing -> DEBU 051 CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +"2019-04-22 06:16:30.686 UTC [kvledger.util] logDirStatus -> DEBU 052 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +"2019-04-22 06:16:30.686 UTC [kvledger.util] logDirStatus -> DEBU 053 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +"2019-04-22 06:16:30.696 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 054 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +"2019-04-22 06:16:30.696 UTC [kvledger.util] CreateDirIfMissing -> DEBU 055 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +"2019-04-22 06:16:30.696 UTC [kvledger.util] logDirStatus -> DEBU 056 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +"2019-04-22 06:16:30.696 UTC [kvledger.util] logDirStatus -> DEBU 057 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +"2019-04-22 06:16:30.723 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 058 Recovering under construction ledger" +"2019-04-22 06:16:30.723 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 059 No under construction ledger found. Quitting recovery" +"2019-04-22 06:16:30.723 UTC [ledgermgmt] initialize -> INFO 05a ledger mgmt initialized" +"2019-04-22 06:16:30.723 UTC [lifecycle] InitializeLocalChaincodes -> INFO 05b Initialized lifecycle cache with 0 already installed chaincodes" +"2019-04-22 06:16:30.736 UTC [nodeCmd] serve -> INFO 05c Starting peer with TLS enabled" +"2019-04-22 06:16:30.753 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05d Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-04-22 06:16:30.753 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05e Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-04-22 06:16:30.785 UTC [inproccontroller] Register -> DEBU 05f Registering chaincode instance: lscc:2.0.0" +"2019-04-22 06:16:30.785 UTC [sccapi] registerSysCC -> INFO 060 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-04-22 06:16:30.786 UTC [inproccontroller] Register -> DEBU 061 Registering chaincode instance: cscc:2.0.0" +"2019-04-22 06:16:30.786 UTC [sccapi] registerSysCC -> INFO 062 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-04-22 06:16:30.786 UTC [inproccontroller] Register -> DEBU 063 Registering chaincode instance: qscc:2.0.0" +"2019-04-22 06:16:30.787 UTC [sccapi] registerSysCC -> INFO 064 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-04-22 06:16:30.789 UTC [inproccontroller] Register -> DEBU 065 Registering chaincode instance: _lifecycle:2.0.0" +"2019-04-22 06:16:30.789 UTC [sccapi] registerSysCC -> INFO 066 system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +"2019-04-22 06:16:30.790 UTC [nodeCmd] serve -> DEBU 067 Running peer" +"2019-04-22 06:16:30.792 UTC [msp] GetDefaultSigningIdentity -> DEBU 068 Obtaining default signing identity" +"2019-04-22 06:16:30.793 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers" +"2019-04-22 06:16:30.793 UTC [viperutil] getKeysRecursively -> DEBU 06a Found map[string]interface{} value for peer.handlers.endorsers" +"2019-04-22 06:16:30.794 UTC [viperutil] getKeysRecursively -> DEBU 06b Found map[string]interface{} value for peer.handlers.endorsers.escc" +"2019-04-22 06:16:30.795 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-04-22 06:16:30.795 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +"2019-04-22 06:16:30.796 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.799 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.endorsers.escc.library setting to " +"2019-04-22 06:16:30.811 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[string]interface{} value for peer.handlers.validators" +"2019-04-22 06:16:30.814 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[string]interface{} value for peer.handlers.validators.vscc" +"2019-04-22 06:16:30.814 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-04-22 06:16:30.814 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +"2019-04-22 06:16:30.815 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value is not a string: " +"2019-04-22 06:16:30.822 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.validators.vscc.library setting to " +"2019-04-22 06:16:30.825 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-04-22 06:16:30.826 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-04-22 06:16:30.827 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +"2019-04-22 06:16:30.827 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +"2019-04-22 06:16:30.827 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07a map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[name:DefaultEndorsement library:]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +"2019-04-22 06:16:30.867 UTC [gossip.service] func1 -> INFO 07b Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-04-22 06:16:30.870 UTC [msp] DeserializeIdentity -> DEBU 07c Obtaining identity" +"2019-04-22 06:16:30.871 UTC [msp.identity] newIdentity -> DEBU 07d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-04-22 06:16:30.871 UTC [msp] Validate -> DEBU 07e MSP Org1MSP validating identity" +"2019-04-22 06:16:30.872 UTC [gossip.discovery] periodicalSendAlive -> DEBU 07f Sleeping 5s" +"2019-04-22 06:16:30.872 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 080 Sleeping 25s" +"2019-04-22 06:16:30.872 UTC [gossip.gossip] NewGossipService -> INFO 081 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-04-22 06:16:30.872 UTC [msp.identity] Sign -> DEBU 082 Sign: plaintext: 1801AA01D7060A20C4503D5F6D3B9C8C...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:30.872 UTC [msp.identity] Sign -> DEBU 083 Sign: digest: 0C982246B27A3C475AF344C1406B71B4BCEBC37DFD940A14046BBC4B7F4E810B " +"2019-04-22 06:16:30.873 UTC [gossip.pull] Add -> DEBU 084 Added �P=_m;���_v~���uJk8)���6h�56�-, total items: 1" +"2019-04-22 06:16:30.873 UTC [gossip.gossip] start -> INFO 085 Gossip instance peer0.org1.example.com:7051 started" +"2019-04-22 06:16:30.873 UTC [gossip.gossip] syncDiscovery -> DEBU 086 Entering discovery sync with interval 4s" +"2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 087 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 088 Sign: digest: 1A11CDCB4785838BC3DD0E5875016BC377B1D2012911363660C288733420D79F " +"2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 089 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:30.873 UTC [msp.identity] Sign -> DEBU 08a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:30.873 UTC [chaincode] LaunchConfig -> DEBU 08b launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-04-22 06:16:30.873 UTC [chaincode] Start -> DEBU 08c start container: lscc:2.0.0" +"2019-04-22 06:16:30.873 UTC [chaincode] Start -> DEBU 08d start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-04-22 06:16:30.873 UTC [gossip.discovery] Connect -> DEBU 08e Skipping connecting to myself" +"2019-04-22 06:16:30.873 UTC [chaincode] Start -> DEBU 08f start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=lscc:2.0.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-04-22 06:16:30.873 UTC [container] lockContainer -> DEBU 090 waiting for container(lscc:2.0.0) lock" +"2019-04-22 06:16:30.873 UTC [container] lockContainer -> DEBU 091 got container (lscc:2.0.0) lock" +"2019-04-22 06:16:30.873 UTC [inproccontroller] getInstance -> DEBU 092 chaincode instance created for lscc:2.0.0" +"2019-04-22 06:16:30.873 UTC [container] unlockContainer -> DEBU 093 container lock deleted(lscc:2.0.0)" +"2019-04-22 06:16:30.873 UTC [container] lockContainer -> DEBU 094 waiting for container(lscc:2.0.0) lock" +"2019-04-22 06:16:30.874 UTC [container] lockContainer -> DEBU 095 got container (lscc:2.0.0) lock" +"2019-04-22 06:16:30.874 UTC [container] unlockContainer -> DEBU 096 container lock deleted(lscc:2.0.0)" +"2019-04-22 06:16:30.874 UTC [inproccontroller] func2 -> DEBU 097 chaincode-support started for lscc:2.0.0" +"2019-04-22 06:16:30.874 UTC [inproccontroller] func1 -> DEBU 098 chaincode started for lscc:2.0.0" +"2019-04-22 06:16:30.874 UTC [chaincode] handleMessage -> DEBU 099 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-04-22 06:16:30.874 UTC [chaincode] HandleRegister -> DEBU 09a Received REGISTER in state created" +"2019-04-22 06:16:30.874 UTC [chaincode] Register -> DEBU 09b registered handler complete for chaincode lscc:2.0.0" +"2019-04-22 06:16:30.874 UTC [chaincode] HandleRegister -> DEBU 09c Got REGISTER for chaincodeID = name:"lscc:2.0.0" , sending back REGISTERED" +"2019-04-22 06:16:30.874 UTC [chaincode] HandleRegister -> DEBU 09d Changed state to established for name:"lscc:2.0.0" " +"2019-04-22 06:16:30.874 UTC [chaincode] sendReady -> DEBU 09e sending READY for chaincode name:"lscc:2.0.0" " +"2019-04-22 06:16:30.874 UTC [chaincode] sendReady -> DEBU 09f Changed to state ready for chaincode name:"lscc:2.0.0" " +"2019-04-22 06:16:30.874 UTC [chaincode] Launch -> DEBU 0a0 launch complete" +"2019-04-22 06:16:30.874 UTC [chaincode] Execute -> DEBU 0a1 Entry" +"2019-04-22 06:16:30.874 UTC [chaincode] handleMessage -> DEBU 0a2 [2e7adbbd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:30.874 UTC [chaincode] Notify -> DEBU 0a3 [2e7adbbd] notifying Txid:2e7adbbd-25ff-4682-81a8-bdc2d4b946ca, channelID:" +"2019-04-22 06:16:30.874 UTC [chaincode] Execute -> DEBU 0a4 Exit" +"2019-04-22 06:16:30.874 UTC [sccapi] deploySysCC -> INFO 0a5 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:16:30.875 UTC [chaincode] LaunchConfig -> DEBU 0a6 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-04-22 06:16:30.875 UTC [chaincode] Start -> DEBU 0a7 start container: cscc:2.0.0" +"2019-04-22 06:16:30.875 UTC [chaincode] Start -> DEBU 0a8 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-04-22 06:16:30.876 UTC [chaincode] Start -> DEBU 0a9 start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=cscc:2.0.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-04-22 06:16:30.877 UTC [container] lockContainer -> DEBU 0aa waiting for container(cscc:2.0.0) lock" +"2019-04-22 06:16:30.878 UTC [container] lockContainer -> DEBU 0ab got container (cscc:2.0.0) lock" +"2019-04-22 06:16:30.878 UTC [inproccontroller] getInstance -> DEBU 0ac chaincode instance created for cscc:2.0.0" +"2019-04-22 06:16:30.879 UTC [inproccontroller] func2 -> DEBU 0ad chaincode-support started for cscc:2.0.0" +"2019-04-22 06:16:30.879 UTC [inproccontroller] func1 -> DEBU 0ae chaincode started for cscc:2.0.0" +"2019-04-22 06:16:30.879 UTC [chaincode] handleMessage -> DEBU 0af [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-04-22 06:16:30.880 UTC [chaincode] HandleRegister -> DEBU 0b0 Received REGISTER in state created" +"2019-04-22 06:16:30.880 UTC [chaincode] Register -> DEBU 0b1 registered handler complete for chaincode cscc:2.0.0" +"2019-04-22 06:16:30.880 UTC [chaincode] HandleRegister -> DEBU 0b2 Got REGISTER for chaincodeID = name:"cscc:2.0.0" , sending back REGISTERED" +"2019-04-22 06:16:30.880 UTC [chaincode] HandleRegister -> DEBU 0b3 Changed state to established for name:"cscc:2.0.0" " +"2019-04-22 06:16:30.880 UTC [chaincode] sendReady -> DEBU 0b4 sending READY for chaincode name:"cscc:2.0.0" " +"2019-04-22 06:16:30.880 UTC [chaincode] sendReady -> DEBU 0b5 Changed to state ready for chaincode name:"cscc:2.0.0" " +"2019-04-22 06:16:30.880 UTC [container] unlockContainer -> DEBU 0b6 container lock deleted(cscc:2.0.0)" +"2019-04-22 06:16:30.880 UTC [container] lockContainer -> DEBU 0b7 waiting for container(cscc:2.0.0) lock" +"2019-04-22 06:16:30.880 UTC [chaincode] Launch -> DEBU 0b8 launch complete" +"2019-04-22 06:16:30.880 UTC [container] lockContainer -> DEBU 0b9 got container (cscc:2.0.0) lock" +"2019-04-22 06:16:30.880 UTC [chaincode] Execute -> DEBU 0ba Entry" +"2019-04-22 06:16:30.880 UTC [container] unlockContainer -> DEBU 0bb container lock deleted(cscc:2.0.0)" +"2019-04-22 06:16:30.880 UTC [cscc] Init -> INFO 0bc Init CSCC" +"2019-04-22 06:16:30.880 UTC [chaincode] handleMessage -> DEBU 0bd [057053e6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:30.880 UTC [chaincode] Notify -> DEBU 0be [057053e6] notifying Txid:057053e6-a5e0-486a-a9a7-46ba4e2d3563, channelID:" +"2019-04-22 06:16:30.880 UTC [chaincode] Execute -> DEBU 0bf Exit" +"2019-04-22 06:16:30.881 UTC [sccapi] deploySysCC -> INFO 0c0 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:16:30.881 UTC [chaincode] LaunchConfig -> DEBU 0c1 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-04-22 06:16:30.881 UTC [chaincode] Start -> DEBU 0c2 start container: qscc:2.0.0" +"2019-04-22 06:16:30.881 UTC [chaincode] Start -> DEBU 0c3 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-04-22 06:16:30.882 UTC [chaincode] Start -> DEBU 0c4 start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=qscc:2.0.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0c5 waiting for container(qscc:2.0.0) lock" +"2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0c6 got container (qscc:2.0.0) lock" +"2019-04-22 06:16:30.882 UTC [inproccontroller] getInstance -> DEBU 0c7 chaincode instance created for qscc:2.0.0" +"2019-04-22 06:16:30.882 UTC [container] unlockContainer -> DEBU 0c8 container lock deleted(qscc:2.0.0)" +"2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0c9 waiting for container(qscc:2.0.0) lock" +"2019-04-22 06:16:30.882 UTC [container] lockContainer -> DEBU 0ca got container (qscc:2.0.0) lock" +"2019-04-22 06:16:30.882 UTC [container] unlockContainer -> DEBU 0cb container lock deleted(qscc:2.0.0)" +"2019-04-22 06:16:30.882 UTC [inproccontroller] func2 -> DEBU 0cc chaincode-support started for qscc:2.0.0" +"2019-04-22 06:16:30.882 UTC [inproccontroller] func1 -> DEBU 0cd chaincode started for qscc:2.0.0" +"2019-04-22 06:16:30.882 UTC [chaincode] handleMessage -> DEBU 0ce [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-04-22 06:16:30.882 UTC [chaincode] HandleRegister -> DEBU 0cf Received REGISTER in state created" +"2019-04-22 06:16:30.883 UTC [chaincode] Register -> DEBU 0d0 registered handler complete for chaincode qscc:2.0.0" +"2019-04-22 06:16:30.883 UTC [chaincode] HandleRegister -> DEBU 0d1 Got REGISTER for chaincodeID = name:"qscc:2.0.0" , sending back REGISTERED" +"2019-04-22 06:16:30.883 UTC [chaincode] HandleRegister -> DEBU 0d2 Changed state to established for name:"qscc:2.0.0" " +"2019-04-22 06:16:30.883 UTC [chaincode] sendReady -> DEBU 0d3 sending READY for chaincode name:"qscc:2.0.0" " +"2019-04-22 06:16:30.883 UTC [chaincode] sendReady -> DEBU 0d4 Changed to state ready for chaincode name:"qscc:2.0.0" " +"2019-04-22 06:16:30.883 UTC [chaincode] Launch -> DEBU 0d5 launch complete" +"2019-04-22 06:16:30.883 UTC [chaincode] Execute -> DEBU 0d6 Entry" +"2019-04-22 06:16:30.883 UTC [qscc] Init -> INFO 0d7 Init QSCC" +"2019-04-22 06:16:30.883 UTC [chaincode] handleMessage -> DEBU 0d8 [b8b0f262] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:30.883 UTC [chaincode] Notify -> DEBU 0d9 [b8b0f262] notifying Txid:b8b0f262-ef7b-4fd6-b248-c8015484877f, channelID:" +"2019-04-22 06:16:30.883 UTC [chaincode] Execute -> DEBU 0da Exit" +"2019-04-22 06:16:30.883 UTC [sccapi] deploySysCC -> INFO 0db system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:16:30.892 UTC [chaincode] LaunchConfig -> DEBU 0dc launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-04-22 06:16:30.892 UTC [chaincode] Start -> DEBU 0dd start container: _lifecycle:2.0.0" +"2019-04-22 06:16:30.892 UTC [chaincode] Start -> DEBU 0de start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-04-22 06:16:30.893 UTC [chaincode] Start -> DEBU 0df start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=_lifecycle:2.0.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e0 waiting for container(_lifecycle:2.0.0) lock" +"2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e1 got container (_lifecycle:2.0.0) lock" +"2019-04-22 06:16:30.893 UTC [inproccontroller] getInstance -> DEBU 0e2 chaincode instance created for _lifecycle:2.0.0" +"2019-04-22 06:16:30.893 UTC [container] unlockContainer -> DEBU 0e3 container lock deleted(_lifecycle:2.0.0)" +"2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e4 waiting for container(_lifecycle:2.0.0) lock" +"2019-04-22 06:16:30.893 UTC [container] lockContainer -> DEBU 0e5 got container (_lifecycle:2.0.0) lock" +"2019-04-22 06:16:30.893 UTC [container] unlockContainer -> DEBU 0e6 container lock deleted(_lifecycle:2.0.0)" +"2019-04-22 06:16:30.893 UTC [inproccontroller] func1 -> DEBU 0e7 chaincode started for _lifecycle:2.0.0" +"2019-04-22 06:16:30.893 UTC [inproccontroller] func2 -> DEBU 0e8 chaincode-support started for _lifecycle:2.0.0" +"2019-04-22 06:16:30.893 UTC [chaincode] handleMessage -> DEBU 0e9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-04-22 06:16:30.893 UTC [chaincode] HandleRegister -> DEBU 0ea Received REGISTER in state created" +"2019-04-22 06:16:30.893 UTC [chaincode] Register -> DEBU 0eb registered handler complete for chaincode _lifecycle:2.0.0" +"2019-04-22 06:16:30.893 UTC [chaincode] HandleRegister -> DEBU 0ec Got REGISTER for chaincodeID = name:"_lifecycle:2.0.0" , sending back REGISTERED" +"2019-04-22 06:16:30.894 UTC [chaincode] HandleRegister -> DEBU 0ed Changed state to established for name:"_lifecycle:2.0.0" " +"2019-04-22 06:16:30.894 UTC [chaincode] sendReady -> DEBU 0ee sending READY for chaincode name:"_lifecycle:2.0.0" " +"2019-04-22 06:16:30.894 UTC [chaincode] sendReady -> DEBU 0ef Changed to state ready for chaincode name:"_lifecycle:2.0.0" " +"2019-04-22 06:16:30.894 UTC [chaincode] Launch -> DEBU 0f0 launch complete" +"2019-04-22 06:16:30.894 UTC [chaincode] Execute -> DEBU 0f1 Entry" +"2019-04-22 06:16:30.894 UTC [chaincode] handleMessage -> DEBU 0f2 [1f077576] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:30.894 UTC [chaincode] Notify -> DEBU 0f3 [1f077576] notifying Txid:1f077576-5156-4e3d-aa81-e2e48235ba73, channelID:" +"2019-04-22 06:16:30.894 UTC [chaincode] Execute -> DEBU 0f4 Exit" +"2019-04-22 06:16:30.894 UTC [sccapi] deploySysCC -> INFO 0f5 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:16:30.894 UTC [nodeCmd] serve -> INFO 0f6 Deployed system chaincodes" +"2019-04-22 06:16:30.894 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0f7 Returning []" +"2019-04-22 06:16:30.895 UTC [discovery] NewService -> INFO 0f8 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-04-22 06:16:30.895 UTC [nodeCmd] registerDiscoveryService -> INFO 0f9 Discovery service activated" +"2019-04-22 06:16:30.895 UTC [nodeCmd] serve -> INFO 0fa Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:16:30.895 UTC [nodeCmd] serve -> INFO 0fb Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:16:31.175 UTC [comm.grpc.server] 1 -> INFO 0fc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:33.173Z grpc.peer_address=192.168.224.5:47442 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=473µs +"2019-04-22 06:16:31.185 UTC [msp.identity] Sign -> DEBU 0fd Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:31.185 UTC [msp.identity] Sign -> DEBU 0fe Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:31.185 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0ff Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:47442" +"2019-04-22 06:16:31.186 UTC [gossip.comm] authenticateRemotePeer -> DEBU 100 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47442" +"2019-04-22 06:16:31.186 UTC [msp] DeserializeIdentity -> DEBU 101 Obtaining identity" +"2019-04-22 06:16:31.186 UTC [msp.identity] newIdentity -> DEBU 102 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-04-22 06:16:31.187 UTC [msp] Validate -> DEBU 103 MSP Org1MSP validating identity" +"2019-04-22 06:16:31.187 UTC [msp.identity] Verify -> DEBU 104 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:16:31.188 UTC [msp.identity] Verify -> DEBU 105 Verify: sig = 00000000 30 45 02 21 00 a0 3d 56 68 f2 10 ea bc 70 8c c8 |0E.!..=Vh....p..| +00000010 d1 5d e2 9e 21 9f ce aa 4c fe 63 d8 5c 7a 79 cf |.]..!...L.c.\zy.| +00000020 d8 fc 98 b7 b2 02 20 4b 5a 20 bb b8 f2 fb 2b a2 |...... KZ ....+.| +00000030 0c 0a 9f 50 33 4c 32 f9 7d 50 16 12 9e 46 54 3f |...P3L2.}P...FT?| +00000040 5c c1 0b d4 5f b3 bc |\..._..|" +"2019-04-22 06:16:31.188 UTC [gossip.comm] authenticateRemotePeer -> DEBU 106 Authenticated 192.168.224.5:47442" +"2019-04-22 06:16:31.188 UTC [gossip.comm] GossipStream -> DEBU 107 Servicing 192.168.224.5:47442" +"2019-04-22 06:16:31.205 UTC [gossip.comm] readFromStream -> DEBU 108 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:31.205 UTC [gossip.comm] func2 -> DEBU 109 Client 192.168.224.5:47442 disconnected" +"2019-04-22 06:16:31.205 UTC [comm.grpc.server] 1 -> INFO 10a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:41.184Z grpc.peer_address=192.168.224.5:47442 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.2921ms +"2019-04-22 06:16:31.206 UTC [grpc] infof -> DEBU 10b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:31.206 UTC [gossip.comm] writeToStream -> DEBU 10c Closing writing to stream" +"2019-04-22 06:16:31.251 UTC [comm.grpc.server] 1 -> INFO 10d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:33.24Z grpc.peer_address=192.168.224.5:47444 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.9734ms +"2019-04-22 06:16:31.255 UTC [msp.identity] Sign -> DEBU 10e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:31.255 UTC [msp.identity] Sign -> DEBU 10f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:31.256 UTC [gossip.comm] authenticateRemotePeer -> DEBU 110 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:47444" +"2019-04-22 06:16:31.256 UTC [gossip.comm] authenticateRemotePeer -> DEBU 111 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47444" +"2019-04-22 06:16:31.257 UTC [msp.identity] Verify -> DEBU 112 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:16:31.257 UTC [msp.identity] Verify -> DEBU 113 Verify: sig = 00000000 30 45 02 21 00 e2 52 b4 f1 ab 2f 62 6c 0e f5 1b |0E.!..R.../bl...| +00000010 4a c7 1d f7 b1 f8 ac a7 91 d4 6d 17 14 e7 55 bc |J.........m...U.| +00000020 91 2a 2d d2 77 02 20 20 8a dc eb 22 81 3d fa 46 |.*-.w. ...".=.F| +00000030 e2 62 c2 fd 03 f8 bd e0 5e 93 cd 0e 16 6c 83 b1 |.b......^....l..| +00000040 ea 5f 79 ae 29 01 ab |._y.)..|" +"2019-04-22 06:16:31.257 UTC [gossip.comm] authenticateRemotePeer -> DEBU 114 Authenticated 192.168.224.5:47444" +"2019-04-22 06:16:31.257 UTC [gossip.comm] GossipStream -> DEBU 115 Servicing 192.168.224.5:47444" +"2019-04-22 06:16:31.272 UTC [gossip.gossip] handleMessage -> DEBU 116 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1108 bytes, Signature: 0 bytes" +"2019-04-22 06:16:31.272 UTC [gossip.gossip] handleMessage -> DEBU 117 Exiting" +"2019-04-22 06:16:31.272 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118 Got message: GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1108 bytes, Signature: 0 bytes" +"2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 119 Verify: digest = 00000000 65 b1 bf b8 a0 94 b3 f4 d4 fc 5d bf 77 7a 45 12 |e.........].wzE.| +00000010 01 5f c3 5f 89 52 a9 f9 8b 59 3d 13 62 a9 52 33 |._._.R...Y=.b.R3|" +"2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 11a Verify: sig = 00000000 30 44 02 20 00 d8 46 a5 07 ad e7 02 01 9b df bd |0D. ..F.........| +00000010 fe b7 dc af 16 f5 2a bb 60 94 26 05 4c b5 14 a5 |......*.`.&.L...| +00000020 4e e6 2a 57 02 20 56 b0 15 5e 2d 71 43 58 9a c3 |N.*W. V..^-qCX..| +00000030 34 8e 4f ca 97 06 eb ee bc c0 4f 20 dc e8 1d 69 |4.O.......O ...i| +00000040 e4 29 84 0b ed 23 |.)...#|" +"2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 11b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:31.273 UTC [msp.identity] Verify -> DEBU 11c Verify: sig = 00000000 30 45 02 21 00 c3 11 0b ca cc 6f 5e e6 34 dc ff |0E.!......o^.4..| +00000010 63 71 a4 93 aa 82 c2 32 ac 8d 25 c4 90 68 9f a3 |cq.....2..%..h..| +00000020 e4 cf bb 6e ab 02 20 74 99 92 b3 28 b4 6c 78 66 |...n.. t...(.lxf| +00000030 2d 15 f1 df 08 e7 e2 04 3c 75 eb b1 38 e0 8e f3 |-....... DEBU 11d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:31.273 UTC [gossip.discovery] learnNewMembers -> DEBU 11e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]}" +"2019-04-22 06:16:31.273 UTC [gossip.discovery] learnNewMembers -> DEBU 11f Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:31.273 UTC [gossip.discovery] learnNewMembers -> DEBU 120 Exiting" +"2019-04-22 06:16:31.273 UTC [gossip.discovery] handleAliveMessage -> DEBU 121 Exiting" +"2019-04-22 06:16:31.273 UTC [gossip.discovery] handleMsgFromComm -> DEBU 122 Exiting" +"2019-04-22 06:16:31.273 UTC [gossip.discovery] sendMemResponse -> DEBU 123 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:31.273 UTC [msp.identity] Sign -> DEBU 124 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:31.274 UTC [msp.identity] Sign -> DEBU 125 Sign: digest: 00B7D2034AA89AFEF9224FA845145AAE6FABB7614D2365D24B3E63EF424741A5 " +"2019-04-22 06:16:31.274 UTC [msp.identity] Sign -> DEBU 126 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:31.274 UTC [msp.identity] Sign -> DEBU 127 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:31.274 UTC [gossip.comm] Send -> DEBU 128 Entering, sending GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:31.274 UTC [gossip.discovery] sendMemResponse -> DEBU 129 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:31.274 UTC [gossip.comm] sendToEndpoint -> DEBU 12a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7471647991781758685, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2197 bytes, Signature: 0 bytes" +"2019-04-22 06:16:31.274 UTC [gossip.comm] sendToEndpoint -> DEBU 12b Exiting" +"2019-04-22 06:16:34.874 UTC [gossip.pull] Hello -> DEBU 12c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:34.874 UTC [msp.identity] Sign -> DEBU 12d Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:34.875 UTC [msp.identity] Sign -> DEBU 12f Sign: digest: 940083C1871AA2ABBBCE580D185EFCB20D00AB2B1E549B331393AF321FF40B4E " +"2019-04-22 06:16:34.875 UTC [msp.identity] Sign -> DEBU 130 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:34.875 UTC [msp.identity] Sign -> DEBU 131 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:34.875 UTC [gossip.comm] Send -> DEBU 12e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:34.876 UTC [gossip.comm] Send -> DEBU 132 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:34.877 UTC [gossip.comm] sendToEndpoint -> DEBU 133 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes" +"2019-04-22 06:16:34.877 UTC [gossip.comm] sendToEndpoint -> DEBU 134 Exiting" +"2019-04-22 06:16:34.879 UTC [gossip.comm] sendToEndpoint -> DEBU 135 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:34.879 UTC [gossip.comm] sendToEndpoint -> DEBU 136 Exiting" +"2019-04-22 06:16:34.881 UTC [gossip.gossip] handleMessage -> DEBU 137 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:16:34.882 UTC [gossip.pull] HandleMessage -> DEBU 138 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:16:34.883 UTC [gossip.gossip] handleMessage -> DEBU 139 Exiting" +"2019-04-22 06:16:34.884 UTC [gossip.gossip] handleMessage -> DEBU 13a Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-04-22 06:16:34.885 UTC [gossip.gossip] handleMessage -> DEBU 13b Exiting" +"2019-04-22 06:16:34.885 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-04-22 06:16:34.886 UTC [msp.identity] Verify -> DEBU 13d Verify: digest = 00000000 94 00 83 c1 87 1a a2 ab bb ce 58 0d 18 5e fc b2 |..........X..^..| +00000010 0d 00 ab 2b 1e 54 9b 33 13 93 af 32 1f f4 0b 4e |...+.T.3...2...N|" +"2019-04-22 06:16:34.886 UTC [msp.identity] Verify -> DEBU 13e Verify: sig = 00000000 30 44 02 20 61 46 3a 3c cd 77 46 80 0f ba 66 a8 |0D. aF:<.wF...f.| +00000010 2d fd 2d 5e ab 3c 48 a3 db c1 fc b9 73 80 79 e1 |-.-^. DEBU 13f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:16:34.887 UTC [msp.identity] Verify -> DEBU 140 Verify: sig = 00000000 30 45 02 21 00 bb ed 20 94 b7 2a b1 74 77 bd 93 |0E.!... ..*.tw..| +00000010 d5 41 35 f4 87 40 c2 f4 ec 0c 5c 69 ce f1 df 08 |.A5..@....\i....| +00000020 01 63 58 b4 86 02 20 49 20 1d d2 ab 83 93 11 f0 |.cX... I .......| +00000030 70 ec a6 8b b4 0e fd 95 2e 58 cd 3a 23 b7 3d f4 |p........X.:#.=.| +00000040 74 54 25 23 97 95 82 |tT%#...|" +"2019-04-22 06:16:34.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 141 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:34.888 UTC [gossip.discovery] isSentByMe -> DEBU 142 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:4 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:34.889 UTC [gossip.discovery] handleAliveMessage -> DEBU 143 Exiting" +"2019-04-22 06:16:34.889 UTC [msp.identity] Verify -> DEBU 144 Verify: digest = 00000000 26 fd 4a ea 2f 28 61 3d 6c b1 33 8b 77 44 d5 df |&.J./(a=l.3.wD..| +00000010 85 dc 77 57 a7 34 8a 8a 0e 24 b7 08 55 19 b6 f9 |..wW.4...$..U...|" +"2019-04-22 06:16:34.890 UTC [msp.identity] Verify -> DEBU 145 Verify: sig = 00000000 30 44 02 20 0f 70 ba c9 78 7e c7 1f b1 76 f9 75 |0D. .p..x~...v.u| +00000010 6d b4 88 80 2b 3a d6 6e e3 ec 50 25 9d 5f 1b 52 |m...+:.n..P%._.R| +00000020 cc 19 f9 92 02 20 53 c3 33 2d 3d 5c 59 52 0f 64 |..... S.3-=\YR.d| +00000030 b5 aa 7f 2d cf 47 c9 37 ff db fb e4 2e 91 02 e6 |...-.G.7........| +00000040 3e 9a 68 b6 60 14 |>.h.`.|" +"2019-04-22 06:16:34.891 UTC [msp.identity] Verify -> DEBU 146 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:34.891 UTC [msp.identity] Verify -> DEBU 147 Verify: sig = 00000000 30 45 02 21 00 b2 54 c3 44 dd e8 45 ed be ee 01 |0E.!..T.D..E....| +00000010 dc dc 70 2e 8b d4 58 fd 4e 71 af 93 38 95 47 be |..p...X.Nq..8.G.| +00000020 21 fc fb 3b 22 02 20 48 a2 32 c4 11 ee 47 17 98 |!..;". H.2...G..| +00000030 6a 3e 3f 52 b2 58 07 f8 00 4e 21 db 93 7c 36 ad |j>?R.X...N!..|6.| +00000040 46 a9 2b b7 9d 67 82 |F.+..g.|" +"2019-04-22 06:16:34.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 148 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:34.892 UTC [gossip.discovery] learnExistingMembers -> DEBU 149 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:16:34.892 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:4 " +"2019-04-22 06:16:34.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 14b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:4 " +"2019-04-22 06:16:34.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 14c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:3 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:34.893 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d Exiting" +"2019-04-22 06:16:34.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 14e Exiting" +"2019-04-22 06:16:34.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f Exiting" +"2019-04-22 06:16:35.161 UTC [gossip.gossip] handleMessage -> DEBU 150 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.161 UTC [gossip.pull] HandleMessage -> DEBU 151 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.161 UTC [gossip.pull] SendDigest -> DEBU 152 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:35.161 UTC [gossip.gossip] handleMessage -> DEBU 153 Exiting" +"2019-04-22 06:16:35.163 UTC [gossip.gossip] handleMessage -> DEBU 154 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.163 UTC [gossip.gossip] handleMessage -> DEBU 155 Exiting" +"2019-04-22 06:16:35.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 156 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.164 UTC [msp.identity] Verify -> DEBU 157 Verify: digest = 00000000 57 13 9d 51 33 a6 8f 60 9e ec 63 85 c3 8f 10 8d |W..Q3..`..c.....| +00000010 d1 f7 d6 59 52 d1 3f 9c 68 e8 5e f6 e0 67 01 50 |...YR.?.h.^..g.P|" +"2019-04-22 06:16:35.165 UTC [msp.identity] Verify -> DEBU 158 Verify: sig = 00000000 30 45 02 21 00 e0 ce 3c 7b d2 57 79 5b ba 1f 05 |0E.!...<{.Wy[...| +00000010 b0 86 74 38 84 69 4d 74 54 80 bc 1b af dc 6e 85 |..t8.iMtT.....n.| +00000020 ee bf 7b 56 1b 02 20 51 79 a1 37 0d 13 b4 2f 0a |..{V.. Qy.7.../.| +00000030 f0 e5 b0 87 ad c7 53 d8 33 6c 43 14 b3 04 03 5f |......S.3lC...._| +00000040 73 b3 34 8d 5d 22 00 |s.4.]".|" +"2019-04-22 06:16:35.165 UTC [msp.identity] Verify -> DEBU 159 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:35.165 UTC [msp.identity] Verify -> DEBU 15a Verify: sig = 00000000 30 45 02 21 00 c4 3d 9d b6 82 7f c9 f1 29 93 c1 |0E.!..=......)..| +00000010 32 73 cc 4a 54 4d 88 c1 cc 2f dd 14 78 8a 05 a2 |2s.JTM.../..x...| +00000020 a4 46 7e 2c eb 02 20 3f 8b c8 cd a1 db 1f 5a d0 |.F~,.. ?......Z.| +00000030 9d f7 3d 5e 1c f6 57 62 ac e3 13 20 55 79 b2 91 |..=^..Wb... Uy..| +00000040 73 5d c5 85 fb 0d 00 |s].....|" +"2019-04-22 06:16:35.166 UTC [gossip.discovery] handleAliveMessage -> DEBU 15b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:5 " +"2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:5 " +"2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 15f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:4 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:35.166 UTC [gossip.discovery] learnExistingMembers -> DEBU 160 Exiting" +"2019-04-22 06:16:35.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 161 Exiting" +"2019-04-22 06:16:35.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 162 Exiting" +"2019-04-22 06:16:35.167 UTC [gossip.discovery] sendMemResponse -> DEBU 163 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:35.167 UTC [msp.identity] Sign -> DEBU 164 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:35.168 UTC [msp.identity] Sign -> DEBU 165 Sign: digest: 0A96F1CF9A1C0A0D7723555E949F34BDC12E44015C0D2B075B3CB91C7C56EEFA " +"2019-04-22 06:16:35.168 UTC [msp.identity] Sign -> DEBU 166 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:35.168 UTC [msp.identity] Sign -> DEBU 167 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:35.169 UTC [gossip.comm] Send -> DEBU 168 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:35.169 UTC [gossip.discovery] sendMemResponse -> DEBU 169 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:35.169 UTC [gossip.comm] sendToEndpoint -> DEBU 16a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.170 UTC [gossip.comm] sendToEndpoint -> DEBU 16b Exiting" +"2019-04-22 06:16:35.873 UTC [msp.identity] Sign -> DEBU 16c Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:35.873 UTC [msp.identity] Sign -> DEBU 16d Sign: digest: B3E5358C5DA99987D73A6B5229C2B882198C231B31F68504B490FDA0342E5E43 " +"2019-04-22 06:16:35.874 UTC [msp.identity] Sign -> DEBU 16e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:35.874 UTC [msp.identity] Sign -> DEBU 16f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:35.874 UTC [gossip.discovery] periodicalSendAlive -> DEBU 170 Sleeping 5s" +"2019-04-22 06:16:35.878 UTC [gossip.pull] SendReq -> DEBU 171 Sending [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to peer1.org1.example.com:7051" +"2019-04-22 06:16:35.878 UTC [gossip.comm] Send -> DEBU 172 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU 173 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 12867739519671063510 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU 174 Exiting" +"2019-04-22 06:16:35.879 UTC [gossip.gossip] handleMessage -> DEBU 175 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12867739519671063510, Envelope: 962 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.880 UTC [msp.identity] Verify -> DEBU 176 Verify: digest = 00000000 05 9f 22 b7 2e 6a 17 d1 67 50 e3 d0 c5 5a 6c ec |.."..j..gP...Zl.| +00000010 0a 70 a8 ed 06 ef 38 d2 e8 4d ff 29 f2 55 b0 d7 |.p....8..M.).U..|" +"2019-04-22 06:16:35.880 UTC [msp.identity] Verify -> DEBU 177 Verify: sig = 00000000 30 45 02 21 00 f3 bb aa 56 ef 7c 31 50 14 66 e9 |0E.!....V.|1P.f.| +00000010 fa d0 7d 21 a5 1e 04 b9 92 a1 60 be 61 c5 70 79 |..}!......`.a.py| +00000020 36 1e 70 0e 05 02 20 44 f7 06 e7 70 7b de a8 d3 |6.p... D...p{...| +00000030 e0 ad e4 7f 38 8b a8 6a 1f 6d a0 88 ac d3 bc 9f |....8..j.m......| +00000040 c8 62 3e c9 5f 13 79 |.b>._.y|" +"2019-04-22 06:16:35.880 UTC [gossip.pull] HandleMessage -> DEBU 178 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12867739519671063510, Envelope: 962 bytes, Signature: 0 bytes" +"2019-04-22 06:16:35.881 UTC [gossip.gossip] func2 -> DEBU 179 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 89 100 67 55 116 84 65 121 89 122 49 67 116 116 56 47 79 49 84 76 104 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 85 82 116 100 49 83 113 75 104 88 75 73 10 70 51 71 109 120 111 73 101 65 52 75 51 109 104 85 88 75 87 54 51 120 57 68 75 118 109 71 65 122 68 53 104 70 78 99 103 97 111 121 118 77 55 100 71 54 118 100 72 84 73 78 113 82 70 117 52 106 77 43 66 75 109 87 88 10 76 108 103 77 78 82 77 82 49 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 97 101 112 121 99 115 111 106 102 75 118 103 80 69 77 82 49 90 85 77 47 71 50 99 112 71 43 69 49 82 106 104 66 75 54 82 73 99 103 57 72 111 65 105 66 90 104 53 100 117 10 78 109 77 112 55 89 70 56 108 106 120 74 76 115 54 111 122 66 119 110 69 77 83 72 65 81 79 122 78 51 73 106 47 50 71 121 67 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-04-22 06:16:35.881 UTC [gossip.pull] HandleMessage -> DEBU 17a Added �����l�J�m[|���>}���Adӊz�Q2b� to the in memory item map, total items: 2" +"2019-04-22 06:16:35.881 UTC [gossip.gossip] handleMessage -> DEBU 17b Exiting" +"2019-04-22 06:16:35.882 UTC [gossip.comm] Send -> DEBU 17c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:35.883 UTC [gossip.comm] sendToEndpoint -> DEBU 17d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:6 , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:35.884 UTC [gossip.comm] sendToEndpoint -> DEBU 17e Exiting" +"2019-04-22 06:16:36.161 UTC [gossip.gossip] handleMessage -> DEBU 17f Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13393075672769567094 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:16:36.161 UTC [gossip.pull] HandleMessage -> DEBU 180 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 13393075672769567094 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:16:36.162 UTC [gossip.pull] SendRes -> DEBU 181 Sending 1 IDENTITY_MSG items to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:36.163 UTC [gossip.gossip] handleMessage -> DEBU 182 Exiting" +"2019-04-22 06:16:36.169 UTC [gossip.gossip] handleMessage -> DEBU 183 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:36.169 UTC [gossip.gossip] handleMessage -> DEBU 184 Exiting" +"2019-04-22 06:16:36.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 185 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:36.171 UTC [msp.identity] Verify -> DEBU 186 Verify: digest = 00000000 40 f9 73 32 8a 43 2c 8a fe a6 26 12 b2 bb 21 e5 |@.s2.C,...&...!.| +00000010 be 98 7b 3b d2 ba 0c 9e 7f b5 26 56 2b 1e a6 55 |..{;......&V+..U|" +"2019-04-22 06:16:36.171 UTC [msp.identity] Verify -> DEBU 187 Verify: sig = 00000000 30 44 02 20 4c 6f 2c 1d 91 bb f0 5e 8a f1 d3 7d |0D. Lo,....^...}| +00000010 3b 3a bb c2 7b 00 fa 07 d1 37 19 59 a6 be 74 d9 |;:..{....7.Y..t.| +00000020 d3 b1 1f d0 02 20 42 2e b9 72 6c 19 aa f4 79 be |..... B..rl...y.| +00000030 ad 37 c0 9f 73 4f 72 b6 f0 2f db f4 5f ff eb 1f |.7..sOr../.._...| +00000040 77 5b b9 8c 9c 1d |w[....|" +"2019-04-22 06:16:36.172 UTC [msp.identity] Verify -> DEBU 188 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:36.172 UTC [msp.identity] Verify -> DEBU 189 Verify: sig = 00000000 30 45 02 21 00 80 81 e2 ab 97 3e a2 0c 3e 19 e2 |0E.!......>..>..| +00000010 7a 7f 2b d5 ff ec ee ea 6e d9 f3 ea 44 ae 02 1d |z.+.....n...D...| +00000020 9a ed 69 63 9d 02 20 63 cc b7 e6 b8 c4 22 65 e6 |..ic.. c....."e.| +00000030 c0 92 7c c1 9e b6 01 7a 17 80 67 f6 08 91 1a 10 |..|....z..g.....| +00000040 98 bf c2 7f a6 9e 2a |......*|" +"2019-04-22 06:16:36.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 18a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:36.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 18b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:16:36.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 18c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:6 " +"2019-04-22 06:16:36.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:6 " +"2019-04-22 06:16:36.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:5 , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:36.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 18f Exiting" +"2019-04-22 06:16:36.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 190 Exiting" +"2019-04-22 06:16:36.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191 Exiting" +"2019-04-22 06:16:38.878 UTC [msp.identity] Sign -> DEBU 192 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:38.879 UTC [gossip.pull] Hello -> DEBU 193 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:38.879 UTC [gossip.comm] Send -> DEBU 194 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:38.879 UTC [msp.identity] Sign -> DEBU 195 Sign: digest: 07F3D2560299FCCF8E7D2B2924768D47E4E4972FAA2C014FA5A13023406A21CC " +"2019-04-22 06:16:38.880 UTC [msp.identity] Sign -> DEBU 196 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU 197 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:38.881 UTC [msp.identity] Sign -> DEBU 198 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:38.882 UTC [gossip.comm] Send -> DEBU 199 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 19a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1094 bytes, Signature: 0 bytes" +"2019-04-22 06:16:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 19b Exiting" +"2019-04-22 06:16:38.881 UTC [gossip.comm] sendToEndpoint -> DEBU 19c Exiting" +"2019-04-22 06:16:38.885 UTC [gossip.gossip] handleMessage -> DEBU 19d Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17348528674567313950 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:38.885 UTC [gossip.pull] HandleMessage -> DEBU 19e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17348528674567313950 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:38.886 UTC [gossip.gossip] handleMessage -> DEBU 19f Exiting" +"2019-04-22 06:16:38.886 UTC [gossip.gossip] handleMessage -> DEBU 1a0 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-04-22 06:16:38.886 UTC [gossip.gossip] handleMessage -> DEBU 1a1 Exiting" +"2019-04-22 06:16:38.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-04-22 06:16:38.888 UTC [msp.identity] Verify -> DEBU 1a3 Verify: digest = 00000000 07 f3 d2 56 02 99 fc cf 8e 7d 2b 29 24 76 8d 47 |...V.....}+)$v.G| +00000010 e4 e4 97 2f aa 2c 01 4f a5 a1 30 23 40 6a 21 cc |.../.,.O..0#@j!.|" +"2019-04-22 06:16:38.888 UTC [msp.identity] Verify -> DEBU 1a4 Verify: sig = 00000000 30 44 02 20 6f 61 fc 31 41 1c 30 c6 39 11 fb 66 |0D. oa.1A.0.9..f| +00000010 e5 e9 69 9d 92 f6 52 17 ab 4b 4a 40 85 33 4f f4 |..i...R..KJ@.3O.| +00000020 a8 e3 48 78 02 20 09 c3 86 16 06 c2 a8 7f e3 f6 |..Hx. ..........| +00000030 07 da 7f 9d 23 37 2b f5 3b 35 23 3b d2 e8 51 10 |....#7+.;5#;..Q.| +00000040 65 ad 49 2e bc 60 |e.I..`|" +"2019-04-22 06:16:38.889 UTC [msp.identity] Verify -> DEBU 1a5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:16:38.889 UTC [msp.identity] Verify -> DEBU 1a6 Verify: sig = 00000000 30 45 02 21 00 d7 5a e9 ce bb a9 44 38 91 bf 4a |0E.!..Z....D8..J| +00000010 45 f6 c1 bd 42 aa 02 21 44 bc 37 df 42 f0 6c 21 |E...B..!D.7.B.l!| +00000020 c6 f3 3d a2 13 02 20 3b fe 8f 25 7b e3 a4 35 5a |..=... ;..%{..5Z| +00000030 70 52 7c da ce 75 22 1b f2 91 cb a0 01 61 06 76 |pR|..u"......a.v| +00000040 e5 b5 60 75 78 33 5d |..`ux3]|" +"2019-04-22 06:16:38.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:38.891 UTC [gossip.discovery] isSentByMe -> DEBU 1a8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Org1MSP-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE----- +Timestamp:inc_num:1555913790871982800 seq_num:7 , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:38.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a9 Exiting" +"2019-04-22 06:16:38.892 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aa Exiting" +"2019-04-22 06:16:39.162 UTC [gossip.gossip] handleMessage -> DEBU 1ab Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:39.162 UTC [gossip.pull] HandleMessage -> DEBU 1ac GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:39.162 UTC [gossip.pull] SendDigest -> DEBU 1ad Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:39.162 UTC [gossip.gossip] handleMessage -> DEBU 1ae Exiting" +"2019-04-22 06:16:39.164 UTC [gossip.gossip] handleMessage -> DEBU 1af Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-04-22 06:16:39.165 UTC [gossip.gossip] handleMessage -> DEBU 1b0 Exiting" +"2019-04-22 06:16:39.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-04-22 06:16:39.166 UTC [msp.identity] Verify -> DEBU 1b2 Verify: digest = 00000000 f3 ec 0a c8 99 f8 4e a2 53 de 2e 7d e8 2d c9 bc |......N.S..}.-..| +00000010 12 f3 5e 8b 4c a5 7e 16 7c 4b ad c3 93 10 a8 7b |..^.L.~.|K.....{|" +"2019-04-22 06:16:39.166 UTC [msp.identity] Verify -> DEBU 1b3 Verify: sig = 00000000 30 44 02 20 1c 5b 6f b6 c7 bd 36 d4 ba dc ab 38 |0D. .[o...6....8| +00000010 9e 9c 56 49 04 58 1b 94 6b 61 cf b5 66 5d f5 78 |..VI.X..ka..f].x| +00000020 be 77 a6 8f 02 20 1f 02 a7 d4 5b f3 db cf c9 4c |.w... ....[....L| +00000030 9a 25 98 22 f8 5b e7 c5 65 96 d2 fe 36 a9 19 7b |.%.".[..e...6..{| +00000040 c2 d1 5a 0c 99 2c |..Z..,|" +"2019-04-22 06:16:39.166 UTC [msp.identity] Verify -> DEBU 1b4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:39.167 UTC [msp.identity] Verify -> DEBU 1b5 Verify: sig = 00000000 30 45 02 21 00 e3 d5 39 bd 6a 32 a9 f7 0e 6e 30 |0E.!...9.j2...n0| +00000010 f3 35 c8 73 f0 eb 86 aa f5 9e b7 ac dc b3 58 8f |.5.s..........X.| +00000020 eb 65 0d bf 93 02 20 70 92 da 57 a2 8b ea fa 50 |.e.... p..W....P| +00000030 27 58 ba ee e8 2f 16 d4 f4 e1 cd 4e 0f 9a cd 55 |'X.../.....N...U| +00000040 6f 2f 6c bc 7d 47 42 |o/l.}GB|" +"2019-04-22 06:16:39.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:16:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:7 " +"2019-04-22 06:16:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:7 " +"2019-04-22 06:16:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ba Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:6 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bb Exiting" +"2019-04-22 06:16:39.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc Exiting" +"2019-04-22 06:16:39.168 UTC [gossip.discovery] sendMemResponse -> DEBU 1be Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:39.168 UTC [gossip.comm] Send -> DEBU 1bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:39.169 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:39.169 UTC [gossip.comm] sendToEndpoint -> DEBU 1c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-04-22 06:16:39.169 UTC [gossip.comm] sendToEndpoint -> DEBU 1c2 Exiting" +"2019-04-22 06:16:39.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd Exiting" +"2019-04-22 06:16:40.335 UTC [endorser] ProcessProposal -> DEBU 1c3 Entering: request from 192.168.224.9:49140" +"2019-04-22 06:16:40.336 UTC [protoutils] ValidateProposalMessage -> DEBU 1c4 ValidateProposalMessage starts for signed proposal 0xc002490910" +"2019-04-22 06:16:40.336 UTC [protoutils] validateChannelHeader -> DEBU 1c5 validateChannelHeader info: header type 1" +"2019-04-22 06:16:40.336 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c6 begin" +"2019-04-22 06:16:40.337 UTC [msp] DeserializeIdentity -> DEBU 1c7 Obtaining identity" +"2019-04-22 06:16:40.337 UTC [msp.identity] newIdentity -> DEBU 1c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.338 UTC [protoutils] checkSignatureFromCreator -> DEBU 1c9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:40.339 UTC [msp] Validate -> DEBU 1ca MSP Org1MSP validating identity" +"2019-04-22 06:16:40.339 UTC [protoutils] checkSignatureFromCreator -> DEBU 1cb creator is valid" +"2019-04-22 06:16:40.340 UTC [msp.identity] Verify -> DEBU 1cc Verify: digest = 00000000 ef a8 bc 98 15 03 b5 ab aa a1 c1 d5 99 2a 71 74 |.............*qt| +00000010 93 9a b6 08 a6 72 52 cd 6c 47 5b 8b 77 49 b7 48 |.....rR.lG[.wI.H|" +"2019-04-22 06:16:40.340 UTC [msp.identity] Verify -> DEBU 1cd Verify: sig = 00000000 30 44 02 20 03 ef 61 c5 c4 35 8c 8b c3 83 b0 4c |0D. ..a..5.....L| +00000010 1f de da a6 ca 5e 49 18 00 d1 65 e7 f9 0b 55 78 |.....^I...e...Ux| +00000020 ad b3 0f 83 02 20 5e b3 cd cd d4 c3 e9 a9 be 83 |..... ^.........| +00000030 17 2b b0 04 39 9b ea a5 21 22 75 36 93 32 01 c7 |.+..9...!"u6.2..| +00000040 7b e2 62 86 8e 9a |{.b...|" +"2019-04-22 06:16:40.340 UTC [protoutils] checkSignatureFromCreator -> DEBU 1ce exits successfully" +"2019-04-22 06:16:40.341 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1cf validateChaincodeProposalMessage starts for proposal 0xc002485030, header 0xc002491220" +"2019-04-22 06:16:40.341 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1d0 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-04-22 06:16:40.341 UTC [endorser] preProcess -> DEBU 1d1 [][66b0a642] processing txid: 66b0a642a88a1551bdc484ed5f11b636cd6bcd5291a0137cb0e2db12aa125509" +"2019-04-22 06:16:40.342 UTC [endorser] SimulateProposal -> DEBU 1d2 [][66b0a642] Entry chaincode: name:"cscc" " +"2019-04-22 06:16:40.342 UTC [endorser] callChaincode -> INFO 1d3 [][66b0a642] Entry chaincode: name:"cscc" " +"2019-04-22 06:16:40.342 UTC [chaincode] Execute -> DEBU 1d4 Entry" +"2019-04-22 06:16:40.343 UTC [cscc] Invoke -> DEBU 1d5 Invoke function: JoinChain" +"2019-04-22 06:16:40.344 UTC [common.channelconfig] NewStandardValues -> DEBU 1d6 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:40.344 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7 Processing field: HashingAlgorithm" +"2019-04-22 06:16:40.344 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d8 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:40.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: OrdererAddresses" +"2019-04-22 06:16:40.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: Consortium" +"2019-04-22 06:16:40.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: Capabilities" +"2019-04-22 06:16:40.346 UTC [common.channelconfig] NewStandardValues -> DEBU 1dc Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:40.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ConsensusType" +"2019-04-22 06:16:40.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1de Processing field: BatchSize" +"2019-04-22 06:16:40.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1df Processing field: BatchTimeout" +"2019-04-22 06:16:40.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: KafkaBrokers" +"2019-04-22 06:16:40.347 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e1 Processing field: ChannelRestrictions" +"2019-04-22 06:16:40.348 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: Capabilities" +"2019-04-22 06:16:40.348 UTC [common.channelconfig] NewStandardValues -> DEBU 1e3 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:40.348 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: Endpoints" +"2019-04-22 06:16:40.349 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:40.349 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: MSP" +"2019-04-22 06:16:40.349 UTC [common.channelconfig] validateMSP -> DEBU 1e7 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:40.349 UTC [msp] newBccspMsp -> DEBU 1e8 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:40.349 UTC [msp] New -> DEBU 1e9 Creating Cache-MSP instance" +"2019-04-22 06:16:40.349 UTC [msp] Setup -> DEBU 1ea Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:40.349 UTC [msp.identity] newIdentity -> DEBU 1eb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.350 UTC [msp.identity] newIdentity -> DEBU 1ec Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.350 UTC [msp] Validate -> DEBU 1ed MSP OrdererMSP validating identity" +"2019-04-22 06:16:40.350 UTC [common.channelconfig] NewStandardValues -> DEBU 1ee Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:40.350 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ef Processing field: ACLs" +"2019-04-22 06:16:40.350 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f0 Processing field: Capabilities" +"2019-04-22 06:16:40.352 UTC [common.channelconfig] NewStandardValues -> DEBU 1f1 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:40.352 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f2 Processing field: AnchorPeers" +"2019-04-22 06:16:40.352 UTC [common.channelconfig] NewStandardValues -> DEBU 1f3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:40.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1f4 Processing field: MSP" +"2019-04-22 06:16:40.354 UTC [common.channelconfig] Validate -> DEBU 1f5 Anchor peers for org Org2MSP are " +"2019-04-22 06:16:40.354 UTC [common.channelconfig] validateMSP -> DEBU 1f6 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:40.355 UTC [msp] newBccspMsp -> DEBU 1f7 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:40.355 UTC [msp] New -> DEBU 1f8 Creating Cache-MSP instance" +"2019-04-22 06:16:40.356 UTC [msp] Setup -> DEBU 1f9 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:40.356 UTC [msp.identity] newIdentity -> DEBU 1fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.357 UTC [msp.identity] newIdentity -> DEBU 1fb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.358 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1fc Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:40.358 UTC [msp] Validate -> DEBU 1fd MSP Org2MSP validating identity" +"2019-04-22 06:16:40.359 UTC [msp] getCertificationChain -> DEBU 1fe MSP Org2MSP getting certification chain" +"2019-04-22 06:16:40.360 UTC [msp] hasOURole -> DEBU 1ff MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:40.360 UTC [msp] getCertificationChain -> DEBU 200 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:40.361 UTC [common.channelconfig] NewStandardValues -> DEBU 201 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:40.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 202 Processing field: AnchorPeers" +"2019-04-22 06:16:40.362 UTC [common.channelconfig] NewStandardValues -> DEBU 203 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:40.363 UTC [common.channelconfig] initializeProtosStruct -> DEBU 204 Processing field: MSP" +"2019-04-22 06:16:40.363 UTC [common.channelconfig] Validate -> DEBU 205 Anchor peers for org Org1MSP are " +"2019-04-22 06:16:40.364 UTC [common.channelconfig] validateMSP -> DEBU 206 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:40.364 UTC [msp] newBccspMsp -> DEBU 207 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:40.365 UTC [msp] New -> DEBU 208 Creating Cache-MSP instance" +"2019-04-22 06:16:40.366 UTC [msp] Setup -> DEBU 209 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:40.366 UTC [msp.identity] newIdentity -> DEBU 20a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.367 UTC [msp.identity] newIdentity -> DEBU 20b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.368 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 20c Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:40.369 UTC [msp] Validate -> DEBU 20d MSP Org1MSP validating identity" +"2019-04-22 06:16:40.369 UTC [msp] getCertificationChain -> DEBU 20e MSP Org1MSP getting certification chain" +"2019-04-22 06:16:40.369 UTC [msp] hasOURole -> DEBU 20f MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:40.370 UTC [msp] getCertificationChain -> DEBU 210 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:40.370 UTC [msp] Setup -> DEBU 211 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:40.371 UTC [msp] Setup -> DEBU 212 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:40.371 UTC [common.capabilities] Supported -> DEBU 213 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:40.371 UTC [common.capabilities] Supported -> DEBU 214 Application capability V2_0 is supported and is enabled" +"2019-04-22 06:16:40.372 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 215 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-04-22 06:16:40.372 UTC [msp.identity] Verify -> DEBU 216 Verify: digest = 00000000 ef a8 bc 98 15 03 b5 ab aa a1 c1 d5 99 2a 71 74 |.............*qt| +00000010 93 9a b6 08 a6 72 52 cd 6c 47 5b 8b 77 49 b7 48 |.....rR.lG[.wI.H|" +"2019-04-22 06:16:40.373 UTC [msp.identity] Verify -> DEBU 217 Verify: sig = 00000000 30 44 02 20 03 ef 61 c5 c4 35 8c 8b c3 83 b0 4c |0D. ..a..5.....L| +00000010 1f de da a6 ca 5e 49 18 00 d1 65 e7 f9 0b 55 78 |.....^I...e...Ux| +00000020 ad b3 0f 83 02 20 5e b3 cd cd d4 c3 e9 a9 be 83 |..... ^.........| +00000030 17 2b b0 04 39 9b ea a5 21 22 75 36 93 32 01 c7 |.+..9...!"u6.2..| +00000040 7b e2 62 86 8e 9a |{.b...|" +"2019-04-22 06:16:40.374 UTC [ledgermgmt] CreateLedger -> INFO 218 Creating ledger [businesschannel] with genesis block" +"2019-04-22 06:16:40.377 UTC [fsblkstorage] newBlockfileMgr -> DEBU 219 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-04-22 06:16:40.377 UTC [kvledger.util] CreateDirIfMissing -> DEBU 21a CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +"2019-04-22 06:16:40.378 UTC [kvledger.util] logDirStatus -> DEBU 21b Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +"2019-04-22 06:16:40.378 UTC [kvledger.util] logDirStatus -> DEBU 21c After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +"2019-04-22 06:16:40.379 UTC [fsblkstorage] newBlockfileMgr -> INFO 21d Getting block information from block storage" +"2019-04-22 06:16:40.379 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 21e Retrieving checkpoint info from block files" +"2019-04-22 06:16:40.379 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 21f retrieveLastFileSuffix()" +"2019-04-22 06:16:40.379 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 220 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-04-22 06:16:40.380 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 221 Last file number found = -1" +"2019-04-22 06:16:40.380 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 222 No block file found" +"2019-04-22 06:16:40.381 UTC [fsblkstorage] newBlockfileMgr -> DEBU 223 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002654c00)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-04-22 06:16:40.384 UTC [fsblkstorage] newBlockIndex -> DEBU 224 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +"2019-04-22 06:16:40.385 UTC [pvtdatastorage] processCollElgEvents -> DEBU 225 Starting to process collection eligibility events" +"2019-04-22 06:16:40.386 UTC [leveldbhelper] GetIterator -> DEBU 226 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +"2019-04-22 06:16:40.386 UTC [pvtdatastorage] processCollElgEvents -> DEBU 227 Converted [0] inelligible mising data entries to elligible" +"2019-04-22 06:16:40.386 UTC [pvtdatastorage] func1 -> DEBU 228 Waiting for collection eligibility event" +"2019-04-22 06:16:40.385 UTC [pvtdatastorage] OpenStore -> DEBU 229 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +"2019-04-22 06:16:40.387 UTC [leveldbhelper] GetIterator -> DEBU 22a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +"2019-04-22 06:16:40.387 UTC [kvledger] newKVLedger -> DEBU 22b Creating KVLedger ledgerID=businesschannel: " +"2019-04-22 06:16:40.387 UTC [kvledger] newKVLedger -> DEBU 22c Register state db for chaincode lifecycle events: false" +"2019-04-22 06:16:40.388 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 22d constructing new query executor txid = []" +"2019-04-22 06:16:40.388 UTC [leveldbhelper] GetIterator -> DEBU 22e Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x7f}]" +"2019-04-22 06:16:40.389 UTC [lockbasedtxmgr] Done -> DEBU 22f Done with transaction simulation / query execution []" +"2019-04-22 06:16:40.389 UTC [kvledger] recoverDBs -> DEBU 230 Entering recoverDB()" +"2019-04-22 06:16:40.389 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 231 Block storage is empty." +"2019-04-22 06:16:40.389 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 232 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:16:40.389 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 233 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +"2019-04-22 06:16:40.390 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 234 Constructing unique pvtData by removing duplicate entries" +"2019-04-22 06:16:40.392 UTC [kvledger] CommitWithPvtData -> DEBU 235 [businesschannel] Validating state for block [0]" +"2019-04-22 06:16:40.392 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 236 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 237 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 238 Validating new block with num trans = [1]" +"2019-04-22 06:16:40.393 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 239 ValidateAndPrepareBatch() for block number = [0]" +"2019-04-22 06:16:40.393 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 23a preprocessing ProtoBlock..." +"2019-04-22 06:16:40.393 UTC [valimpl] preprocessProtoBlock -> DEBU 23b txType=CONFIG" +"2019-04-22 06:16:40.393 UTC [valimpl] processNonEndorserTx -> DEBU 23c Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-04-22 06:16:40.393 UTC [valimpl] processNonEndorserTx -> DEBU 23d Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 23e constructing new tx simulator" +"2019-04-22 06:16:40.393 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 23f constructing new tx simulator txid = []" +"2019-04-22 06:16:40.393 UTC [peer] GenerateSimulationResults -> DEBU 240 Processing CONFIG" +"2019-04-22 06:16:40.394 UTC [peer] processChannelConfigTx -> DEBU 241 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-04-22 06:16:40.394 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 242 Simulation completed, getting simulation results" +"2019-04-22 06:16:40.395 UTC [lockbasedtxmgr] Done -> DEBU 243 Done with transaction simulation / query execution []" +"2019-04-22 06:16:40.396 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 244 Block [0] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-04-22 06:16:40.396 UTC [valinternal] ApplyWriteSet -> DEBU 245 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0026cc0c0)}" +"2019-04-22 06:16:40.397 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 246 validating rwset..." +"2019-04-22 06:16:40.397 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 247 postprocessing ProtoBlock..." +"2019-04-22 06:16:40.397 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 248 ValidateAndPrepareBatch() complete" +"2019-04-22 06:16:40.398 UTC [kvledger] CommitWithPvtData -> DEBU 249 [businesschannel] Committing block [0] to storage" +"2019-04-22 06:16:40.398 UTC [ledgerstorage] CommitWithPvtData -> DEBU 24a Writing block [0] to pvt block store" +"2019-04-22 06:16:40.405 UTC [pvtdatastorage] Prepare -> DEBU 24b Saved 0 private data write sets for block [0]" +"2019-04-22 06:16:40.409 UTC [fsblkstorage] indexBlock -> DEBU 24c Indexing block [blockNum=0, blockHash=[]byte{0xf6, 0x29, 0x3f, 0xa6, 0x1, 0x5a, 0xaa, 0xb2, 0x22, 0x71, 0xbf, 0x53, 0xb7, 0xa0, 0x31, 0x1f, 0xef, 0xf7, 0x76, 0xb6, 0xf7, 0x7c, 0x76, 0x93, 0xe4, 0xd4, 0x23, 0x7, 0xcb, 0xf9, 0x42, 0x5c} txOffsets= +txId= locPointer=offset=39, bytesLength=23896 +]" +"2019-04-22 06:16:40.409 UTC [fsblkstorage] indexBlock -> DEBU 24d Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx ID: [] to txid-index" +"2019-04-22 06:16:40.410 UTC [fsblkstorage] indexBlock -> DEBU 24e Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=23896] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-04-22 06:16:40.412 UTC [fsblkstorage] updateCheckpoint -> DEBU 24f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[23941], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-04-22 06:16:40.412 UTC [pvtdatastorage] Commit -> DEBU 250 Committing private data for block [0]" +"2019-04-22 06:16:40.414 UTC [pvtdatastorage] Commit -> DEBU 251 Committed private data for block [0]" +"2019-04-22 06:16:40.415 UTC [pvtdatastorage] func1 -> DEBU 252 Purger started: Purging expired private data till block number [0]" +"2019-04-22 06:16:40.415 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 253 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +"2019-04-22 06:16:40.416 UTC [leveldbhelper] GetIterator -> DEBU 254 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +"2019-04-22 06:16:40.416 UTC [pvtdatastorage] func1 -> DEBU 255 Purger finished" +"2019-04-22 06:16:40.415 UTC [kvledger] CommitWithPvtData -> DEBU 256 [businesschannel] Committing block [0] transactions to state database" +"2019-04-22 06:16:40.417 UTC [lockbasedtxmgr] Commit -> DEBU 257 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:16:40.418 UTC [lockbasedtxmgr] Commit -> DEBU 258 Committing updates to state database" +"2019-04-22 06:16:40.418 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 259 Preparing potential purge list working-set for expiringAtBlk [0]" +"2019-04-22 06:16:40.418 UTC [leveldbhelper] GetIterator -> DEBU 25a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +"2019-04-22 06:16:40.418 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 25b No expiry entry found for expiringAtBlk [0]" +"2019-04-22 06:16:40.419 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 25c Building the expiry schedules based on the update batch" +"2019-04-22 06:16:40.419 UTC [lockbasedtxmgr] Commit -> DEBU 25d Write lock acquired for committing updates to state database" +"2019-04-22 06:16:40.419 UTC [stateleveldb] ApplyUpdates -> DEBU 25e Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-04-22 06:16:40.422 UTC [lockbasedtxmgr] Commit -> DEBU 25f Updates committed to state database and the write lock is released" +"2019-04-22 06:16:40.422 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 260 Preparing potential purge list working-set for expiringAtBlk [1]" +"2019-04-22 06:16:40.423 UTC [leveldbhelper] GetIterator -> DEBU 261 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +"2019-04-22 06:16:40.423 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 262 No expiry entry found for expiringAtBlk [1]" +"2019-04-22 06:16:40.423 UTC [lockbasedtxmgr] func1 -> DEBU 263 launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:16:40.424 UTC [kvledger] CommitWithPvtData -> DEBU 264 [businesschannel] Committing block [0] transactions to history database" +"2019-04-22 06:16:40.424 UTC [historyleveldb] Commit -> DEBU 265 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +"2019-04-22 06:16:40.424 UTC [historyleveldb] Commit -> DEBU 266 Skipping transaction [0] since it is not an endorsement transaction" +"2019-04-22 06:16:40.427 UTC [historyleveldb] Commit -> DEBU 267 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +"2019-04-22 06:16:40.427 UTC [kvledger] CommitWithPvtData -> INFO 268 [businesschannel] Committed block [0] with 1 transaction(s) in 34ms (state_validation=5ms block_commit=17ms state_commit=8ms)" +"2019-04-22 06:16:40.430 UTC [ledgermgmt] CreateLedger -> INFO 269 Created ledger [businesschannel] with genesis block" +"2019-04-22 06:16:40.431 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 26a constructing new query executor txid = [74456df6-9998-4725-b2ef-944b80341c2b]" +"2019-04-22 06:16:40.431 UTC [stateleveldb] GetState -> DEBU 26b GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +"2019-04-22 06:16:40.431 UTC [lockbasedtxmgr] Done -> DEBU 26c Done with transaction simulation / query execution [74456df6-9998-4725-b2ef-944b80341c2b]" +"2019-04-22 06:16:40.432 UTC [common.channelconfig] NewStandardValues -> DEBU 26d Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:40.432 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26e Processing field: HashingAlgorithm" +"2019-04-22 06:16:40.432 UTC [common.channelconfig] initializeProtosStruct -> DEBU 26f Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 270 Processing field: OrdererAddresses" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 271 Processing field: Consortium" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 272 Processing field: Capabilities" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] NewStandardValues -> DEBU 273 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 274 Processing field: ACLs" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 275 Processing field: Capabilities" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] NewStandardValues -> DEBU 276 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 277 Processing field: AnchorPeers" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] NewStandardValues -> DEBU 278 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 279 Processing field: MSP" +"2019-04-22 06:16:40.433 UTC [common.channelconfig] Validate -> DEBU 27a Anchor peers for org Org1MSP are " +"2019-04-22 06:16:40.433 UTC [common.channelconfig] validateMSP -> DEBU 27b Setting up MSP for org Org1MSP" +"2019-04-22 06:16:40.433 UTC [msp] newBccspMsp -> DEBU 27c Creating BCCSP-based MSP instance" +"2019-04-22 06:16:40.433 UTC [msp] New -> DEBU 27d Creating Cache-MSP instance" +"2019-04-22 06:16:40.433 UTC [msp] Setup -> DEBU 27e Setting up MSP instance Org1MSP" +"2019-04-22 06:16:40.434 UTC [msp.identity] newIdentity -> DEBU 27f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.434 UTC [msp.identity] newIdentity -> DEBU 280 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.434 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 281 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:40.434 UTC [msp] Validate -> DEBU 282 MSP Org1MSP validating identity" +"2019-04-22 06:16:40.434 UTC [msp] getCertificationChain -> DEBU 283 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:40.435 UTC [msp] hasOURole -> DEBU 284 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:40.435 UTC [msp] getCertificationChain -> DEBU 285 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:40.435 UTC [common.channelconfig] NewStandardValues -> DEBU 286 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:40.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 287 Processing field: AnchorPeers" +"2019-04-22 06:16:40.436 UTC [common.channelconfig] NewStandardValues -> DEBU 288 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:40.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 289 Processing field: MSP" +"2019-04-22 06:16:40.437 UTC [common.channelconfig] Validate -> DEBU 28a Anchor peers for org Org2MSP are " +"2019-04-22 06:16:40.437 UTC [common.channelconfig] validateMSP -> DEBU 28b Setting up MSP for org Org2MSP" +"2019-04-22 06:16:40.438 UTC [msp] newBccspMsp -> DEBU 28c Creating BCCSP-based MSP instance" +"2019-04-22 06:16:40.438 UTC [msp] New -> DEBU 28d Creating Cache-MSP instance" +"2019-04-22 06:16:40.439 UTC [msp] Setup -> DEBU 28e Setting up MSP instance Org2MSP" +"2019-04-22 06:16:40.439 UTC [msp.identity] newIdentity -> DEBU 28f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.440 UTC [msp.identity] newIdentity -> DEBU 290 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.441 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 291 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:40.442 UTC [msp] Validate -> DEBU 292 MSP Org2MSP validating identity" +"2019-04-22 06:16:40.442 UTC [msp] getCertificationChain -> DEBU 293 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:40.443 UTC [msp] hasOURole -> DEBU 294 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:40.443 UTC [msp] getCertificationChain -> DEBU 295 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] NewStandardValues -> DEBU 296 Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 297 Processing field: ConsensusType" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 298 Processing field: BatchSize" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 299 Processing field: BatchTimeout" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29a Processing field: KafkaBrokers" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29b Processing field: ChannelRestrictions" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29c Processing field: Capabilities" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] NewStandardValues -> DEBU 29d Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 29e Processing field: Endpoints" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] NewStandardValues -> DEBU 29f Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a0 Processing field: MSP" +"2019-04-22 06:16:40.444 UTC [common.channelconfig] validateMSP -> DEBU 2a1 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:40.444 UTC [msp] newBccspMsp -> DEBU 2a2 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:40.444 UTC [msp] New -> DEBU 2a3 Creating Cache-MSP instance" +"2019-04-22 06:16:40.444 UTC [msp] Setup -> DEBU 2a4 Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:40.444 UTC [msp.identity] newIdentity -> DEBU 2a5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.444 UTC [msp.identity] newIdentity -> DEBU 2a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:40.445 UTC [msp] Validate -> DEBU 2a7 MSP OrdererMSP validating identity" +"2019-04-22 06:16:40.445 UTC [msp] Setup -> DEBU 2a8 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:40.445 UTC [msp] Setup -> DEBU 2a9 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2aa Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ab Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ac Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ad Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2ae Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2af Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b0 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b1 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b2 Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b3 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b4 Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b5 Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b6 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:40.445 UTC [policies] NewManagerImpl -> DEBU 2b8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:40.446 UTC [policies] NewManagerImpl -> DEBU 2b9 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:40.446 UTC [policies] NewManagerImpl -> DEBU 2ba Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:40.446 UTC [policies] NewManagerImpl -> DEBU 2bb Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:40.449 UTC [policies] NewManagerImpl -> DEBU 2bc Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:40.449 UTC [policies] NewManagerImpl -> DEBU 2bd Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:40.450 UTC [policies] NewManagerImpl -> DEBU 2be Proposed new policy Writers for Channel" +"2019-04-22 06:16:40.450 UTC [policies] NewManagerImpl -> DEBU 2bf Proposed new policy Admins for Channel" +"2019-04-22 06:16:40.450 UTC [policies] NewManagerImpl -> DEBU 2c0 Proposed new policy Readers for Channel" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c1 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c2 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c3 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c4 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:40.451 UTC [common.configtx] addToMap -> DEBU 2c8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2c9 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2ca Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2cf Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d0 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d1 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d2 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d3 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d4 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d5 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d6 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d7 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d8 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:40.452 UTC [common.configtx] addToMap -> DEBU 2d9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2da Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2db Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2dc Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2dd Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2de Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2df Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e2 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e3 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e4 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e5 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e6 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e7 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e8 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2e9 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:40.453 UTC [common.configtx] addToMap -> DEBU 2ea Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:40.454 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:40.454 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:40.454 UTC [common.capabilities] Supported -> DEBU 2ed Application capability V2_0 is supported and is enabled" +"2019-04-22 06:16:40.454 UTC [common.capabilities] Supported -> DEBU 2ee Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ef As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f0 As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f1 Manager Channel looking up path [Application]" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f2 Manager Channel has managers Application" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f3 Manager Channel has managers Orderer" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f4 Manager Channel/Application looking up path []" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f5 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2f6 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f7 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f8 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2f9 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fa Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fb Manager Channel has managers Orderer" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fc Manager Channel has managers Application" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fd Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:40.454 UTC [policies] Manager -> DEBU 2fe Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:40.454 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ff As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:40.454 UTC [gossip.service] ProcessConfigUpdate -> DEBU 300 Processing new config for channel businesschannel" +"2019-04-22 06:16:40.454 UTC [gossip.service] ProcessConfigUpdate -> DEBU 301 Calling out because config was updated for channel businesschannel" +"2019-04-22 06:16:40.454 UTC [gossip.service] updateAnchors -> DEBU 302 Org1MSP anchor peers: []" +"2019-04-22 06:16:40.454 UTC [gossip.service] updateAnchors -> DEBU 303 Org2MSP anchor peers: []" +"2019-04-22 06:16:40.455 UTC [gossip.service] updateAnchors -> DEBU 304 Creating state provider for chainID businesschannel" +"2019-04-22 06:16:40.457 UTC [gossip.gossip] JoinChan -> INFO 305 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:16:40.458 UTC [gossip.gossip] learnAnchorPeers -> INFO 306 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-04-22 06:16:40.458 UTC [gossip.gossip] learnAnchorPeers -> INFO 307 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:16:40.459 UTC [peer] updateTrustedRoots -> DEBU 308 Updating trusted root authorities for channel businesschannel" +"2019-04-22 06:16:40.471 UTC [peer] buildTrustedRootsForChain -> DEBU 309 updating root CAs for channel [businesschannel]" +"2019-04-22 06:16:40.472 UTC [peer] buildTrustedRootsForChain -> DEBU 30a adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:16:40.472 UTC [peer] buildTrustedRootsForChain -> DEBU 30b adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:16:40.473 UTC [peer] buildTrustedRootsForChain -> DEBU 30c adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:16:40.473 UTC [kvledger.util] CreateDirIfMissing -> DEBU 30d CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +"2019-04-22 06:16:40.474 UTC [kvledger.util] logDirStatus -> DEBU 30e Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +"2019-04-22 06:16:40.474 UTC [kvledger.util] logDirStatus -> DEBU 30f After creating dir - [/var/hyperledger/production/transientStore/] exists" +"2019-04-22 06:16:40.484 UTC [gossip.service] InitializeChannel -> DEBU 310 Creating state provider for chainID businesschannel" +"2019-04-22 06:16:40.486 UTC [msp.identity] Sign -> DEBU 311 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-04-22 06:16:40.486 UTC [msp.identity] Sign -> DEBU 312 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-04-22 06:16:40.487 UTC [gossip.privdata] NewReconciler -> DEBU 313 Private data reconciliation is enabled" +"2019-04-22 06:16:40.489 UTC [gossip.state] NewGossipStateProvider -> INFO 314 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-04-22 06:16:40.490 UTC [gossip.state] NewGossipStateProvider -> DEBU 315 Updating gossip ledger height to 1" +"2019-04-22 06:16:40.491 UTC [msp.identity] Sign -> DEBU 316 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020801 " +"2019-04-22 06:16:40.491 UTC [msp.identity] Sign -> DEBU 317 Sign: digest: CEBC9A85F1B440F7D0EE8D5396F3D9025CBAA12ABA78DEAD4D81BA810DC3333D " +"2019-04-22 06:16:40.492 UTC [gossip.service] InitializeChannel -> DEBU 318 Delivery uses dynamic leader election mechanism, channel businesschannel" +"2019-04-22 06:16:40.493 UTC [peer] InitChain -> DEBU 319 Initializing channel businesschannel" +"2019-04-22 06:16:40.494 UTC [nodeCmd] func6 -> DEBU 31c Deploying system CC, for channel " +"2019-04-22 06:16:40.493 UTC [gossip.election] waitForMembershipStabilization -> DEBU 31a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:40.493 UTC [gossip.election] handleMessages -> DEBU 31b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:40.495 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 31d constructing new tx simulator" +"2019-04-22 06:16:40.495 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 31e constructing new tx simulator txid = [14523f86-a699-407a-8092-22569d162a45]" +"2019-04-22 06:16:40.495 UTC [chaincode] Execute -> DEBU 31f Entry" +"2019-04-22 06:16:40.496 UTC [chaincode] handleMessage -> DEBU 320 [14523f86] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:40.496 UTC [chaincode] Notify -> DEBU 321 [14523f86] notifying Txid:14523f86-a699-407a-8092-22569d162a45, channelID:businesschannel" +"2019-04-22 06:16:40.497 UTC [chaincode] Execute -> DEBU 322 Exit" +"2019-04-22 06:16:40.497 UTC [sccapi] deploySysCC -> INFO 323 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:16:40.498 UTC [lockbasedtxmgr] Done -> DEBU 324 Done with transaction simulation / query execution [14523f86-a699-407a-8092-22569d162a45]" +"2019-04-22 06:16:40.498 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 325 constructing new tx simulator" +"2019-04-22 06:16:40.498 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 326 constructing new tx simulator txid = [1f239df4-b9e0-4604-a3d4-868d395f6646]" +"2019-04-22 06:16:40.499 UTC [chaincode] Execute -> DEBU 327 Entry" +"2019-04-22 06:16:40.499 UTC [cscc] Init -> INFO 328 Init CSCC" +"2019-04-22 06:16:40.500 UTC [chaincode] handleMessage -> DEBU 329 [1f239df4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:40.500 UTC [chaincode] Notify -> DEBU 32a [1f239df4] notifying Txid:1f239df4-b9e0-4604-a3d4-868d395f6646, channelID:businesschannel" +"2019-04-22 06:16:40.501 UTC [chaincode] Execute -> DEBU 32b Exit" +"2019-04-22 06:16:40.501 UTC [sccapi] deploySysCC -> INFO 32c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:16:40.502 UTC [lockbasedtxmgr] Done -> DEBU 32d Done with transaction simulation / query execution [1f239df4-b9e0-4604-a3d4-868d395f6646]" +"2019-04-22 06:16:40.502 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 32e constructing new tx simulator" +"2019-04-22 06:16:40.503 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 32f constructing new tx simulator txid = [79401bf3-063c-4725-bb9b-eab61d32c1fc]" +"2019-04-22 06:16:40.503 UTC [chaincode] Execute -> DEBU 330 Entry" +"2019-04-22 06:16:40.503 UTC [qscc] Init -> INFO 331 Init QSCC" +"2019-04-22 06:16:40.504 UTC [chaincode] handleMessage -> DEBU 332 [79401bf3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:40.504 UTC [chaincode] Notify -> DEBU 333 [79401bf3] notifying Txid:79401bf3-063c-4725-bb9b-eab61d32c1fc, channelID:businesschannel" +"2019-04-22 06:16:40.504 UTC [chaincode] Execute -> DEBU 334 Exit" +"2019-04-22 06:16:40.505 UTC [sccapi] deploySysCC -> INFO 335 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:16:40.505 UTC [lockbasedtxmgr] Done -> DEBU 336 Done with transaction simulation / query execution [79401bf3-063c-4725-bb9b-eab61d32c1fc]" +"2019-04-22 06:16:40.506 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 337 constructing new tx simulator" +"2019-04-22 06:16:40.506 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 338 constructing new tx simulator txid = [cedbfce1-0f29-4f09-885b-609ad444c518]" +"2019-04-22 06:16:40.506 UTC [chaincode] Execute -> DEBU 339 Entry" +"2019-04-22 06:16:40.506 UTC [chaincode] handleMessage -> DEBU 33a [cedbfce1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:40.507 UTC [chaincode] Notify -> DEBU 33b [cedbfce1] notifying Txid:cedbfce1-0f29-4f09-885b-609ad444c518, channelID:businesschannel" +"2019-04-22 06:16:40.507 UTC [chaincode] Execute -> DEBU 33c Exit" +"2019-04-22 06:16:40.507 UTC [sccapi] deploySysCC -> INFO 33d system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:16:40.507 UTC [lockbasedtxmgr] Done -> DEBU 33e Done with transaction simulation / query execution [cedbfce1-0f29-4f09-885b-609ad444c518]" +"2019-04-22 06:16:40.507 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 33f constructing new query executor txid = [a2d86ae6-f0b9-4a59-b21f-e51784d029de]" +"2019-04-22 06:16:40.507 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 340 Returning []" +"2019-04-22 06:16:40.507 UTC [lockbasedtxmgr] Done -> DEBU 341 Done with transaction simulation / query execution [a2d86ae6-f0b9-4a59-b21f-e51784d029de]" +"2019-04-22 06:16:40.507 UTC [msp.identity] Sign -> DEBU 342 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020801 " +"2019-04-22 06:16:40.507 UTC [msp.identity] Sign -> DEBU 343 Sign: digest: 21170F5343D60F5E741704EC35A6FCE299660F5FC9B29A8D4BCFC4684B0157C2 " +"2019-04-22 06:16:40.507 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 344 Listeners for channel businesschannel invoked" +"2019-04-22 06:16:40.507 UTC [chaincode] handleMessage -> DEBU 345 [66b0a642] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:40.507 UTC [chaincode] Notify -> DEBU 346 [66b0a642] notifying Txid:66b0a642a88a1551bdc484ed5f11b636cd6bcd5291a0137cb0e2db12aa125509, channelID:" +"2019-04-22 06:16:40.507 UTC [chaincode] Execute -> DEBU 347 Exit" +"2019-04-22 06:16:40.507 UTC [endorser] callChaincode -> INFO 348 [][66b0a642] Exit chaincode: name:"cscc" (165ms)" +"2019-04-22 06:16:40.507 UTC [endorser] SimulateProposal -> DEBU 349 [][66b0a642] Exit" +"2019-04-22 06:16:40.508 UTC [endorser] func1 -> DEBU 34a Exit: request from 192.168.224.9:49140" +"2019-04-22 06:16:40.508 UTC [comm.grpc.server] 1 -> INFO 34b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49140 grpc.code=OK grpc.call_duration=172.711ms +"2019-04-22 06:16:40.513 UTC [grpc] infof -> DEBU 34c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 34d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151008 " +"2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 34e Sign: digest: 7DDF291C903FC22DF4A5F2FF5428EFF69BED034945DEA6A4AF284A3E55C58FC5 " +"2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 34f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:40.875 UTC [msp.identity] Sign -> DEBU 350 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:40.876 UTC [gossip.discovery] periodicalSendAlive -> DEBU 351 Sleeping 5s" +"2019-04-22 06:16:40.876 UTC [gossip.comm] Send -> DEBU 352 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:40.877 UTC [gossip.comm] sendToEndpoint -> DEBU 353 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:40.877 UTC [gossip.comm] sendToEndpoint -> DEBU 354 Exiting" +"2019-04-22 06:16:41.168 UTC [gossip.gossip] handleMessage -> DEBU 355 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:41.168 UTC [gossip.gossip] handleMessage -> DEBU 356 Exiting" +"2019-04-22 06:16:41.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 357 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:41.168 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:41.169 UTC [msp.identity] Verify -> DEBU 359 Verify: digest = 00000000 c5 c7 ab 5d 84 38 cd a6 03 ef 8b 01 2a f4 d7 d5 |...].8......*...| +00000010 42 90 cf e1 25 c1 3c 21 7f c3 1d a2 87 ca 96 96 |B...%. DEBU 35a Verify: sig = 00000000 30 45 02 21 00 eb cb e4 21 7b 81 4c c9 8a 8c 04 |0E.!....!{.L....| +00000010 0c 95 50 ca d2 ab 56 a7 c3 1e 8a 44 f6 e8 0c 91 |..P...V....D....| +00000020 88 94 0f a3 9f 02 20 7c 79 4d a1 df 3f c9 c3 3b |...... |yM..?..;| +00000030 fa 48 de 99 3e ba 53 21 6e c7 72 35 30 71 c9 7b |.H..>.S!n.r50q.{| +00000040 c2 26 4e 26 22 0f 2d |.&N&".-|" +"2019-04-22 06:16:41.169 UTC [msp.identity] Verify -> DEBU 35b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:41.169 UTC [msp.identity] Verify -> DEBU 35c Verify: sig = 00000000 30 44 02 20 0e 9c 80 b7 57 ae dc 01 c8 fc dc 60 |0D. ....W......`| +00000010 1b 32 8e 50 23 a1 a2 57 10 ed 42 62 8c d0 7f 18 |.2.P#..W..Bb....| +00000020 53 ed d0 10 02 20 11 e3 23 d4 f3 ba ba f8 47 82 |S.... ..#.....G.| +00000030 b8 d4 19 73 49 a4 5d 10 0d a0 4e 06 f9 5d cf 48 |...sI.]...N..].H| +00000040 ca ec aa 4a 96 9a |...J..|" +"2019-04-22 06:16:41.170 UTC [gossip.discovery] handleAliveMessage -> DEBU 35d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:41.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 35e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:16:41.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 35f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 " +"2019-04-22 06:16:41.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 360 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 " +"2019-04-22 06:16:41.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 361 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Org1MSP-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE----- +Timestamp:inc_num:1555913791157951100 seq_num:7 , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:41.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 362 Exiting" +"2019-04-22 06:16:41.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 363 Exiting" +"2019-04-22 06:16:41.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 364 Exiting" +"2019-04-22 06:16:41.495 UTC [gossip.election] waitForMembershipStabilization -> DEBU 365 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting, peers found 1" +"2019-04-22 06:16:41.495 UTC [gossip.election] leaderElection -> DEBU 366 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:41.495 UTC [gossip.election] propose -> DEBU 367 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:41.495 UTC [gossip.election] propose -> DEBU 368 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:16:41.495 UTC [msp.identity] Sign -> DEBU 369 Sign: plaintext: 120F627573696E6573736368616E6E65...D32D120C089889839CBAEBEDCB151001 " +"2019-04-22 06:16:41.495 UTC [msp.identity] Sign -> DEBU 36a Sign: digest: 75CE81932E61578E886A738A783830FC9728F18CB4C94CC128FC495DF715C9F5 " +"2019-04-22 06:16:41.495 UTC [gossip.election] waitForInterrupt -> DEBU 36b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:41.605 UTC [endorser] ProcessProposal -> DEBU 36c Entering: request from 192.168.224.9:49148" +"2019-04-22 06:16:41.606 UTC [protoutils] ValidateProposalMessage -> DEBU 36d ValidateProposalMessage starts for signed proposal 0xc002ed7c20" +"2019-04-22 06:16:41.606 UTC [protoutils] validateChannelHeader -> DEBU 36e validateChannelHeader info: header type 3" +"2019-04-22 06:16:41.606 UTC [protoutils] checkSignatureFromCreator -> DEBU 36f begin" +"2019-04-22 06:16:41.607 UTC [protoutils] checkSignatureFromCreator -> DEBU 370 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:41.607 UTC [protoutils] checkSignatureFromCreator -> DEBU 371 creator is valid" +"2019-04-22 06:16:41.607 UTC [msp.identity] Verify -> DEBU 372 Verify: digest = 00000000 f9 2c e9 be d5 b9 51 1e 30 71 74 66 89 f4 43 20 |.,....Q.0qtf..C | +00000010 27 e5 f5 16 91 fb 07 62 e8 d0 73 d7 37 84 36 86 |'......b..s.7.6.|" +"2019-04-22 06:16:41.608 UTC [msp.identity] Verify -> DEBU 373 Verify: sig = 00000000 30 45 02 21 00 a8 27 f3 65 15 b2 cb df 7e d5 75 |0E.!..'.e....~.u| +00000010 71 e2 08 e4 0e bf 44 0d 55 d0 f2 00 9c cf 8f 5a |q.....D.U......Z| +00000020 47 99 d4 d1 c2 02 20 70 32 82 f8 f2 64 87 4d ce |G..... p2...d.M.| +00000030 43 d6 45 64 a5 8b 46 fd 91 a5 cb 4d f7 0d c2 c9 |C.Ed..F....M....| +00000040 ce e6 d3 0d a1 ea 3b |......;|" +"2019-04-22 06:16:41.608 UTC [protoutils] checkSignatureFromCreator -> DEBU 374 exits successfully" +"2019-04-22 06:16:41.608 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 375 validateChaincodeProposalMessage starts for proposal 0xc0029add50, header 0xc002f3e050" +"2019-04-22 06:16:41.609 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 376 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-04-22 06:16:41.609 UTC [endorser] preProcess -> DEBU 377 [][f20bbfb5] processing txid: f20bbfb5cf9c96a3739fdf9727989735b1bfd6021bb0bcbeb74025218f16baab" +"2019-04-22 06:16:41.609 UTC [endorser] SimulateProposal -> DEBU 378 [][f20bbfb5] Entry chaincode: name:"cscc" " +"2019-04-22 06:16:41.610 UTC [endorser] callChaincode -> INFO 379 [][f20bbfb5] Entry chaincode: name:"cscc" " +"2019-04-22 06:16:41.611 UTC [chaincode] Execute -> DEBU 37a Entry" +"2019-04-22 06:16:41.611 UTC [cscc] Invoke -> DEBU 37b Invoke function: GetChannels" +"2019-04-22 06:16:41.612 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 37c Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:41.612 UTC [msp] Validate -> DEBU 37d MSP Org1MSP validating identity" +"2019-04-22 06:16:41.613 UTC [msp.identity] Verify -> DEBU 37e Verify: digest = 00000000 f9 2c e9 be d5 b9 51 1e 30 71 74 66 89 f4 43 20 |.,....Q.0qtf..C | +00000010 27 e5 f5 16 91 fb 07 62 e8 d0 73 d7 37 84 36 86 |'......b..s.7.6.|" +"2019-04-22 06:16:41.613 UTC [msp.identity] Verify -> DEBU 37f Verify: sig = 00000000 30 45 02 21 00 a8 27 f3 65 15 b2 cb df 7e d5 75 |0E.!..'.e....~.u| +00000010 71 e2 08 e4 0e bf 44 0d 55 d0 f2 00 9c cf 8f 5a |q.....D.U......Z| +00000020 47 99 d4 d1 c2 02 20 70 32 82 f8 f2 64 87 4d ce |G..... p2...d.M.| +00000030 43 d6 45 64 a5 8b 46 fd 91 a5 cb 4d f7 0d c2 c9 |C.Ed..F....M....| +00000040 ce e6 d3 0d a1 ea 3b |......;|" +"2019-04-22 06:16:41.614 UTC [chaincode] handleMessage -> DEBU 380 [f20bbfb5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:41.614 UTC [chaincode] Notify -> DEBU 381 [f20bbfb5] notifying Txid:f20bbfb5cf9c96a3739fdf9727989735b1bfd6021bb0bcbeb74025218f16baab, channelID:" +"2019-04-22 06:16:41.614 UTC [chaincode] Execute -> DEBU 382 Exit" +"2019-04-22 06:16:41.615 UTC [endorser] callChaincode -> INFO 383 [][f20bbfb5] Exit chaincode: name:"cscc" (4ms)" +"2019-04-22 06:16:41.615 UTC [endorser] SimulateProposal -> DEBU 384 [][f20bbfb5] Exit" +"2019-04-22 06:16:41.615 UTC [endorser] func1 -> DEBU 385 Exit: request from 192.168.224.9:49148" +"2019-04-22 06:16:41.615 UTC [comm.grpc.server] 1 -> INFO 386 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49148 grpc.code=OK grpc.call_duration=10.6011ms +"2019-04-22 06:16:41.619 UTC [grpc] infof -> DEBU 387 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:42.473 UTC [endorser] ProcessProposal -> DEBU 388 Entering: request from 192.168.224.9:49156" +"2019-04-22 06:16:42.474 UTC [protoutils] ValidateProposalMessage -> DEBU 389 ValidateProposalMessage starts for signed proposal 0xc0024cb180" +"2019-04-22 06:16:42.474 UTC [protoutils] validateChannelHeader -> DEBU 38a validateChannelHeader info: header type 3" +"2019-04-22 06:16:42.474 UTC [protoutils] checkSignatureFromCreator -> DEBU 38b begin" +"2019-04-22 06:16:42.475 UTC [protoutils] checkSignatureFromCreator -> DEBU 38c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:42.475 UTC [protoutils] checkSignatureFromCreator -> DEBU 38d creator is valid" +"2019-04-22 06:16:42.475 UTC [msp.identity] Verify -> DEBU 38e Verify: digest = 00000000 45 3e 83 84 03 cd 0e e0 1f 04 54 f3 3c 24 14 66 |E>........T.<$.f| +00000010 40 3e d7 71 02 32 10 01 b0 fb 56 1c f5 4a ec 6a |@>.q.2....V..J.j|" +"2019-04-22 06:16:42.476 UTC [msp.identity] Verify -> DEBU 38f Verify: sig = 00000000 30 44 02 20 44 2b ae 8c cf f2 31 7f c5 de 6d 50 |0D. D+....1...mP| +00000010 8b 18 cb 36 b6 dd e6 37 0a ee 33 11 8e a4 65 20 |...6...7..3...e | +00000020 d1 26 5c 2b 02 20 33 c9 86 04 c9 4d 28 31 e9 94 |.&\+. 3....M(1..| +00000030 2a fa 57 a6 0e a8 81 2b 1d b3 1a 51 a3 b9 7b f1 |*.W....+...Q..{.| +00000040 83 12 e0 34 74 96 |...4t.|" +"2019-04-22 06:16:42.476 UTC [protoutils] checkSignatureFromCreator -> DEBU 390 exits successfully" +"2019-04-22 06:16:42.477 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 391 validateChaincodeProposalMessage starts for proposal 0xc0024416c0, header 0xc0024cb590" +"2019-04-22 06:16:42.477 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 392 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-04-22 06:16:42.478 UTC [endorser] preProcess -> DEBU 393 [][650b8298] processing txid: 650b8298ebb38e79aa442a08a8a93df5b404824c0de582684db6de14258be890" +"2019-04-22 06:16:42.478 UTC [endorser] SimulateProposal -> DEBU 394 [][650b8298] Entry chaincode: name:"qscc" " +"2019-04-22 06:16:42.479 UTC [endorser] callChaincode -> INFO 395 [][650b8298] Entry chaincode: name:"qscc" " +"2019-04-22 06:16:42.479 UTC [chaincode] Execute -> DEBU 396 Entry" +"2019-04-22 06:16:42.480 UTC [qscc] Invoke -> DEBU 397 Invoke function: GetChainInfo on chain: businesschannel" +"2019-04-22 06:16:42.480 UTC [aclmgmt] CheckACL -> DEBU 398 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-04-22 06:16:42.481 UTC [aclmgmt] CheckACL -> DEBU 399 acl check(/Channel/Application/Readers)" +"2019-04-22 06:16:42.481 UTC [policies] Evaluate -> DEBU 39a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:42.481 UTC [policies] Evaluate -> DEBU 39b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:42.482 UTC [policies] Evaluate -> DEBU 39c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:42.482 UTC [msp] DeserializeIdentity -> DEBU 39d Obtaining identity" +"2019-04-22 06:16:42.483 UTC [msp.identity] newIdentity -> DEBU 39e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:42.483 UTC [cauthdsl] func1 -> DEBU 39f 0xc002f83610 gate 1555913802483778600 evaluation starts" +"2019-04-22 06:16:42.484 UTC [cauthdsl] func2 -> DEBU 3a0 0xc002f83610 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:42.484 UTC [cauthdsl] func2 -> DEBU 3a1 0xc002f83610 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:42.484 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3a2 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:42.485 UTC [msp] Validate -> DEBU 3a3 MSP Org1MSP validating identity" +"2019-04-22 06:16:42.485 UTC [msp] getCertificationChain -> DEBU 3a4 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:42.485 UTC [cauthdsl] func2 -> DEBU 3a5 0xc002f83610 principal matched by identity 0" +"2019-04-22 06:16:42.486 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 45 3e 83 84 03 cd 0e e0 1f 04 54 f3 3c 24 14 66 |E>........T.<$.f| +00000010 40 3e d7 71 02 32 10 01 b0 fb 56 1c f5 4a ec 6a |@>.q.2....V..J.j|" +"2019-04-22 06:16:42.486 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 44 02 20 44 2b ae 8c cf f2 31 7f c5 de 6d 50 |0D. D+....1...mP| +00000010 8b 18 cb 36 b6 dd e6 37 0a ee 33 11 8e a4 65 20 |...6...7..3...e | +00000020 d1 26 5c 2b 02 20 33 c9 86 04 c9 4d 28 31 e9 94 |.&\+. 3....M(1..| +00000030 2a fa 57 a6 0e a8 81 2b 1d b3 1a 51 a3 b9 7b f1 |*.W....+...Q..{.| +00000040 83 12 e0 34 74 96 |...4t.|" +"2019-04-22 06:16:42.486 UTC [cauthdsl] func2 -> DEBU 3a8 0xc002f83610 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:42.487 UTC [cauthdsl] func1 -> DEBU 3a9 0xc002f83610 gate 1555913802483778600 evaluation succeeds" +"2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3aa Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3ac Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:42.487 UTC [policies] Evaluate -> DEBU 3ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:42.487 UTC [chaincode] handleMessage -> DEBU 3ae [650b8298] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:42.487 UTC [chaincode] Notify -> DEBU 3af [650b8298] notifying Txid:650b8298ebb38e79aa442a08a8a93df5b404824c0de582684db6de14258be890, channelID:" +"2019-04-22 06:16:42.487 UTC [chaincode] Execute -> DEBU 3b0 Exit" +"2019-04-22 06:16:42.487 UTC [endorser] callChaincode -> INFO 3b1 [][650b8298] Exit chaincode: name:"qscc" (8ms)" +"2019-04-22 06:16:42.487 UTC [endorser] SimulateProposal -> DEBU 3b2 [][650b8298] Exit" +"2019-04-22 06:16:42.487 UTC [endorser] func1 -> DEBU 3b3 Exit: request from 192.168.224.9:49156" +"2019-04-22 06:16:42.488 UTC [comm.grpc.server] 1 -> INFO 3b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49156 grpc.code=OK grpc.call_duration=14.695ms +"2019-04-22 06:16:42.492 UTC [grpc] infof -> DEBU 3b5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151009 " +"2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b7 Sign: digest: F6B0B01C9FCB2EBC3F3444282F0FEF04DF2DA7BDF45AB7E29C4AF132B69F0264 " +"2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:42.908 UTC [msp.identity] Sign -> DEBU 3b9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:42.909 UTC [gossip.pull] Hello -> DEBU 3ba Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:42.910 UTC [gossip.comm] Send -> DEBU 3bc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:42.909 UTC [gossip.comm] Send -> DEBU 3bb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:42.911 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:42.911 UTC [gossip.comm] sendToEndpoint -> DEBU 3be Exiting" +"2019-04-22 06:16:42.910 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:42.911 UTC [gossip.comm] sendToEndpoint -> DEBU 3c0 Exiting" +"2019-04-22 06:16:42.913 UTC [gossip.gossip] handleMessage -> DEBU 3c1 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10001977445049725770 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:42.913 UTC [gossip.pull] HandleMessage -> DEBU 3c2 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10001977445049725770 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:42.914 UTC [gossip.gossip] handleMessage -> DEBU 3c3 Exiting" +"2019-04-22 06:16:42.914 UTC [gossip.gossip] handleMessage -> DEBU 3c4 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:42.915 UTC [gossip.gossip] handleMessage -> DEBU 3c5 Exiting" +"2019-04-22 06:16:42.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:42.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c7 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:42.916 UTC [msp.identity] Verify -> DEBU 3c8 Verify: digest = 00000000 f6 b0 b0 1c 9f cb 2e bc 3f 34 44 28 2f 0f ef 04 |........?4D(/...| +00000010 df 2d a7 bd f4 5a b7 e2 9c 4a f1 32 b6 9f 02 64 |.-...Z...J.2...d|" +"2019-04-22 06:16:42.917 UTC [msp.identity] Verify -> DEBU 3c9 Verify: sig = 00000000 30 44 02 20 44 8e 4e ff b8 e6 7f c6 2d 3b 6c 54 |0D. D.N.....-;lT| +00000010 0d e5 ce d0 b1 3a 97 2e 10 77 2a 23 77 c2 7a 68 |.....:...w*#w.zh| +00000020 1a 01 ec f7 02 20 22 27 6a 19 51 13 79 c8 5f f3 |..... "'j.Q.y._.| +00000030 26 8e b5 b3 8f da 74 9c d6 a4 83 52 f6 12 a4 50 |&.....t....R...P| +00000040 bb d3 23 f6 7b 4e |..#.{N|" +"2019-04-22 06:16:42.918 UTC [msp.identity] Verify -> DEBU 3ca Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:16:42.918 UTC [msp.identity] Verify -> DEBU 3cb Verify: sig = 00000000 30 45 02 21 00 d3 08 8e 5d 23 66 e0 8d c3 81 6f |0E.!....]#f....o| +00000010 74 56 94 38 ec 8f c1 00 82 84 a2 a6 61 b5 a1 35 |tV.8........a..5| +00000020 92 b5 83 b4 a7 02 20 70 dd 5f ad fb 9b 9a 55 99 |...... p._....U.| +00000030 f3 b9 16 61 81 47 95 37 a5 f8 33 99 fd 2d 0b 74 |...a.G.7..3..-.t| +00000040 a2 67 9d 71 24 70 c1 |.g.q$p.|" +"2019-04-22 06:16:42.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 3cc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:42.919 UTC [gossip.discovery] isSentByMe -> DEBU 3cd Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:42.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ce Exiting" +"2019-04-22 06:16:42.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cf Exiting" +"2019-04-22 06:16:43.179 UTC [gossip.gossip] handleMessage -> DEBU 3d0 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:43.179 UTC [gossip.pull] HandleMessage -> DEBU 3d1 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:43.179 UTC [gossip.pull] SendDigest -> DEBU 3d2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:43.179 UTC [gossip.gossip] handleMessage -> DEBU 3d3 Exiting" +"2019-04-22 06:16:43.185 UTC [gossip.gossip] handleMessage -> DEBU 3d4 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:16:43.185 UTC [gossip.gossip] handleMessage -> DEBU 3d5 Exiting" +"2019-04-22 06:16:43.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:16:43.185 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:43.186 UTC [msp.identity] Verify -> DEBU 3d8 Verify: digest = 00000000 e4 b2 1a 11 35 93 ee 1b 40 c5 71 12 d3 75 35 49 |....5...@.q..u5I| +00000010 10 fd 6d 9f 98 90 14 34 c7 2f 60 15 57 30 e2 8f |..m....4./`.W0..|" +"2019-04-22 06:16:43.186 UTC [msp.identity] Verify -> DEBU 3d9 Verify: sig = 00000000 30 44 02 20 7c d9 03 c7 0b 95 ff b4 8c 28 3f ac |0D. |........(?.| +00000010 48 f8 53 6a ea 3e 40 d3 60 31 cc a8 4d e0 94 7e |H.Sj.>@.`1..M..~| +00000020 6f 31 fa 82 02 20 3f 8c 08 d7 32 2c 9d 49 d7 36 |o1... ?...2,.I.6| +00000030 ee 8f d5 df 26 9b 4b 86 28 0a 57 73 8f 52 e4 bb |....&.K.(.Ws.R..| +00000040 6e 22 b5 6f 6b ed |n".ok.|" +"2019-04-22 06:16:43.187 UTC [msp.identity] Verify -> DEBU 3da Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:43.187 UTC [msp.identity] Verify -> DEBU 3db Verify: sig = 00000000 30 44 02 20 0b 0b d4 27 4d 73 2e de 93 5e e7 d0 |0D. ...'Ms...^..| +00000010 d6 76 80 5d f5 d9 af 49 af 57 8b d5 1c 58 fe b5 |.v.]...I.W...X..| +00000020 3c b8 ef 44 02 20 35 8f b6 a4 16 2c ce 73 6c e4 |<..D. 5....,.sl.| +00000030 f7 81 a7 d6 fb 4a 7b cc fe 39 ec fb eb 58 fc d3 |.....J{..9...X..| +00000040 f1 ac 5f 13 11 a3 |.._...|" +"2019-04-22 06:16:43.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3de updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 " +"2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 " +"2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:43.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e1 Exiting" +"2019-04-22 06:16:43.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e2 Exiting" +"2019-04-22 06:16:43.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e3 Exiting" +"2019-04-22 06:16:43.188 UTC [gossip.discovery] sendMemResponse -> DEBU 3e4 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:43.189 UTC [gossip.comm] Send -> DEBU 3e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:43.189 UTC [gossip.discovery] sendMemResponse -> DEBU 3e6 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:43.189 UTC [gossip.comm] sendToEndpoint -> DEBU 3e7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:16:43.189 UTC [gossip.comm] sendToEndpoint -> DEBU 3e8 Exiting" +"2019-04-22 06:16:44.456 UTC [gossip.comm] Send -> DEBU 3e9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:44.456 UTC [gossip.comm] sendToEndpoint -> DEBU 3ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:44.457 UTC [gossip.comm] sendToEndpoint -> DEBU 3eb Exiting" +"2019-04-22 06:16:44.458 UTC [gossip.gossip] handleMessage -> DEBU 3ec Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-04-22 06:16:44.459 UTC [msp.identity] Verify -> DEBU 3ed Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +"2019-04-22 06:16:44.459 UTC [msp.identity] Verify -> DEBU 3ee Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +"2019-04-22 06:16:44.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ef Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:44.460 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:44.461 UTC [policies] Evaluate -> DEBU 3f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:44.461 UTC [policies] Evaluate -> DEBU 3f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:44.461 UTC [policies] Evaluate -> DEBU 3f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:44.461 UTC [msp] DeserializeIdentity -> DEBU 3f4 Obtaining identity" +"2019-04-22 06:16:44.462 UTC [msp.identity] newIdentity -> DEBU 3f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-04-22 06:16:44.463 UTC [cauthdsl] func1 -> DEBU 3f6 0xc002ff0fd0 gate 1555913804463336700 evaluation starts" +"2019-04-22 06:16:44.463 UTC [cauthdsl] func2 -> DEBU 3f7 0xc002ff0fd0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:44.463 UTC [cauthdsl] func2 -> DEBU 3f8 0xc002ff0fd0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:44.464 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f9 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:44.464 UTC [msp] Validate -> DEBU 3fa MSP Org1MSP validating identity" +"2019-04-22 06:16:44.465 UTC [msp] getCertificationChain -> DEBU 3fb MSP Org1MSP getting certification chain" +"2019-04-22 06:16:44.466 UTC [cauthdsl] func2 -> DEBU 3fc 0xc002ff0fd0 principal matched by identity 0" +"2019-04-22 06:16:44.466 UTC [msp.identity] Verify -> DEBU 3fd Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +"2019-04-22 06:16:44.466 UTC [msp.identity] Verify -> DEBU 3fe Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +"2019-04-22 06:16:44.467 UTC [cauthdsl] func2 -> DEBU 3ff 0xc002ff0fd0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:44.467 UTC [cauthdsl] func1 -> DEBU 400 0xc002ff0fd0 gate 1555913804463336700 evaluation succeeds" +"2019-04-22 06:16:44.467 UTC [policies] Evaluate -> DEBU 401 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:44.467 UTC [policies] Evaluate -> DEBU 402 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:44.468 UTC [policies] Evaluate -> DEBU 403 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:44.468 UTC [policies] Evaluate -> DEBU 404 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:44.469 UTC [gossip.gossip] handleMessage -> DEBU 405 Exiting" +"2019-04-22 06:16:44.469 UTC [gossip.comm] Send -> DEBU 406 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913800507418700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:44.470 UTC [gossip.comm] sendToEndpoint -> DEBU 407 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913800507418700 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:44.470 UTC [gossip.comm] sendToEndpoint -> DEBU 408 Exiting" +"2019-04-22 06:16:44.714 UTC [gossip.gossip] handleMessage -> DEBU 409 Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:44.715 UTC [gossip.gossip] handleMessage -> DEBU 40a Exiting" +"2019-04-22 06:16:44.716 UTC [gossip.gossip] handleMessage -> DEBU 40b Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:44.717 UTC [gossip.pull] HandleMessage -> DEBU 40c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:44.717 UTC [gossip.gossip] handleMessage -> DEBU 40d Exiting" +"2019-04-22 06:16:44.725 UTC [gossip.gossip] handleMessage -> DEBU 40e Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913800742965600 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:1 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:44.726 UTC [msp.identity] Verify -> DEBU 40f Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +"2019-04-22 06:16:44.726 UTC [msp.identity] Verify -> DEBU 410 Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +"2019-04-22 06:16:44.726 UTC [gossip.gossip] handleMessage -> DEBU 411 Exiting" +"2019-04-22 06:16:45.458 UTC [gossip.channel] reportMembershipChanges -> INFO 412 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-04-22 06:16:45.876 UTC [msp.identity] Sign -> DEBU 413 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15100A " +"2019-04-22 06:16:45.877 UTC [msp.identity] Sign -> DEBU 414 Sign: digest: BBE6F5D957F00E94C27496D79DE5E9922E6648C091215F8578FBC691289E1B2D " +"2019-04-22 06:16:45.877 UTC [msp.identity] Sign -> DEBU 415 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:45.877 UTC [msp.identity] Sign -> DEBU 416 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:45.877 UTC [gossip.discovery] periodicalSendAlive -> DEBU 417 Sleeping 5s" +"2019-04-22 06:16:45.878 UTC [gossip.comm] Send -> DEBU 418 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:45.878 UTC [gossip.comm] sendToEndpoint -> DEBU 419 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:10 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:45.879 UTC [gossip.comm] sendToEndpoint -> DEBU 41a Exiting" +"2019-04-22 06:16:46.166 UTC [gossip.gossip] handleMessage -> DEBU 41b Entering, 192.168.224.5:47444 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:46.166 UTC [gossip.gossip] handleMessage -> DEBU 41c Exiting" +"2019-04-22 06:16:46.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:46.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:46.167 UTC [msp.identity] Verify -> DEBU 41f Verify: digest = 00000000 1b bc 36 cc 07 29 ee 70 72 b1 48 4f 67 4c c0 d1 |..6..).pr.HOgL..| +00000010 6e 99 5a 09 86 c0 fb 9f 37 28 19 72 62 a3 72 e1 |n.Z.....7(.rb.r.|" +"2019-04-22 06:16:46.167 UTC [msp.identity] Verify -> DEBU 420 Verify: sig = 00000000 30 45 02 21 00 d3 4a f2 9e ef f2 ad ed db e3 68 |0E.!..J........h| +00000010 60 d0 e8 66 db a3 2c f9 c7 68 59 43 1d 60 9b 57 |`..f..,..hYC.`.W| +00000020 3b c6 a2 2d be 02 20 3c ba 53 3c 28 2d 2a e8 1f |;..-.. <.S<(-*..| +00000030 9f b9 01 e3 1c 45 77 fe 1f a5 79 ab 9c 80 3c 92 |.....Ew...y...<.| +00000040 e4 92 a6 7f 54 0a 25 |....T.%|" +"2019-04-22 06:16:46.168 UTC [msp.identity] Verify -> DEBU 421 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:46.168 UTC [msp.identity] Verify -> DEBU 422 Verify: sig = 00000000 30 45 02 21 00 90 e3 f5 50 3f 6a 6c 75 38 ef b2 |0E.!....P?jlu8..| +00000010 1d f4 e7 fe 40 fb 5b 1e e7 02 f5 91 c2 3f 9c de |....@.[......?..| +00000020 99 d9 24 d4 c8 02 20 0b 30 85 df f2 22 11 29 59 |..$... .0...".)Y| +00000030 98 c7 33 95 d0 7c 54 4c c1 1a 1c d9 94 65 85 7b |..3..|TL.....e.{| +00000040 a7 2f 29 f3 ad 01 c0 |./)....|" +"2019-04-22 06:16:46.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 423 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:46.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 424 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:16:46.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 425 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 " +"2019-04-22 06:16:46.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 426 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 " +"2019-04-22 06:16:46.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 427 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:9 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:46.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 428 Exiting" +"2019-04-22 06:16:46.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 429 Exiting" +"2019-04-22 06:16:46.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 42a Exiting" +"2019-04-22 06:16:46.496 UTC [gossip.election] waitForInterrupt -> DEBU 42b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:16:46.496 UTC [gossip.election] beLeader -> INFO 42c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-04-22 06:16:46.496 UTC [gossip.service] func1 -> INFO 42d Elected as a leader, starting delivery service for channel businesschannel" +"2019-04-22 06:16:46.498 UTC [deliveryClient] StartDeliverForChannel -> DEBU 42e This peer will pass blocks from orderer service to other peers for channel businesschannel" +"2019-04-22 06:16:46.498 UTC [gossip.election] leaderElection -> DEBU 42f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:16:46.498 UTC [gossip.election] IsLeader -> DEBU 430 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:16:46.498 UTC [msp.identity] Sign -> DEBU 431 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510021801 " +"2019-04-22 06:16:46.498 UTC [msp.identity] Sign -> DEBU 432 Sign: digest: B563D945DE15E18946F204D2BAF8D35EF856DFDEA99F19488378DF4A4E806123 " +"2019-04-22 06:16:46.499 UTC [gossip.election] waitForInterrupt -> DEBU 433 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:46.498 UTC [ConnProducer] NewConnection -> DEBU 434 Creating a new connection" +"2019-04-22 06:16:46.500 UTC [grpc] DialContext -> DEBU 435 parsed scheme: """ +"2019-04-22 06:16:46.500 UTC [grpc] DialContext -> DEBU 436 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:46.501 UTC [grpc] NewAddress -> DEBU 437 ccResolverWrapper: sending new addresses to cc: [{orderer0.example.com:7050 0 }]" +"2019-04-22 06:16:46.501 UTC [grpc] switchBalancer -> DEBU 438 ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:46.501 UTC [grpc] HandleSubConnStateChange -> DEBU 439 pickfirstBalancer: HandleSubConnStateChange: 0xc003074c90, CONNECTING" +"2019-04-22 06:16:46.508 UTC [grpc] HandleSubConnStateChange -> DEBU 43a pickfirstBalancer: HandleSubConnStateChange: 0xc003074c90, READY" +"2019-04-22 06:16:46.508 UTC [ConnProducer] NewConnection -> DEBU 43c Connected to orderer0.example.com:7050" +"2019-04-22 06:16:46.508 UTC [gossip.comm] Send -> DEBU 43b Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:46.508 UTC [deliveryClient] connect -> DEBU 43d Connected to orderer0.example.com:7050" +"2019-04-22 06:16:46.508 UTC [deliveryClient] connect -> DEBU 43f Establishing gRPC stream with orderer0.example.com:7050 ..." +"2019-04-22 06:16:46.508 UTC [gossip.comm] sendToEndpoint -> DEBU 43e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:2 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:16:46.509 UTC [gossip.comm] sendToEndpoint -> DEBU 440 Exiting" +"2019-04-22 06:16:46.509 UTC [deliveryClient] afterConnect -> DEBU 441 Entering" +"2019-04-22 06:16:46.512 UTC [deliveryClient] RequestBlocks -> DEBU 442 Starting deliver with block [1] for channel businesschannel" +"2019-04-22 06:16:46.512 UTC [msp.identity] Sign -> DEBU 443 Sign: plaintext: 0A91070A3D08051A0608CEB8F5E50522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +"2019-04-22 06:16:46.513 UTC [msp.identity] Sign -> DEBU 444 Sign: digest: F5676FE90186E23BC8C3DAB368F58EF897FFF5668553D6FB6848FC806000CAEC " +"2019-04-22 06:16:46.513 UTC [deliveryClient] afterConnect -> DEBU 445 Exiting" +"2019-04-22 06:16:46.529 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 446 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.529 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 447 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.530 UTC [policies] Evaluate -> DEBU 448 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:16:46.531 UTC [policies] Evaluate -> DEBU 449 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.531 UTC [policies] Evaluate -> DEBU 44a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:16:46.533 UTC [msp] DeserializeIdentity -> DEBU 44b Obtaining identity" +"2019-04-22 06:16:46.534 UTC [msp.identity] newIdentity -> DEBU 44c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.535 UTC [cauthdsl] func1 -> DEBU 44d 0xc0030b48f0 gate 1555913806535261400 evaluation starts" +"2019-04-22 06:16:46.535 UTC [cauthdsl] func2 -> DEBU 44e 0xc0030b48f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.535 UTC [cauthdsl] func2 -> DEBU 44f 0xc0030b48f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.535 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 450 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:16:46.536 UTC [msp] Validate -> DEBU 451 MSP OrdererMSP validating identity" +"2019-04-22 06:16:46.536 UTC [cauthdsl] func2 -> DEBU 452 0xc0030b48f0 principal matched by identity 0" +"2019-04-22 06:16:46.536 UTC [msp.identity] Verify -> DEBU 453 Verify: digest = 00000000 b7 0b 32 46 29 b5 68 d7 c7 5d 63 02 db 1e 99 23 |..2F).h..]c....#| +00000010 4f 56 10 60 95 61 db 53 a7 f6 f2 34 00 b5 f2 b1 |OV.`.a.S...4....|" +"2019-04-22 06:16:46.537 UTC [msp.identity] Verify -> DEBU 454 Verify: sig = 00000000 30 44 02 20 68 c4 2f b4 e0 61 f2 06 29 0d aa 93 |0D. h./..a..)...| +00000010 47 23 1f 79 b2 a1 8b aa 39 6e 08 09 dd 7d 6f da |G#.y....9n...}o.| +00000020 a3 f2 6c 10 02 20 2a 72 7c 5e 28 85 c0 50 e9 92 |..l.. *r|^(..P..| +00000030 92 51 91 fc ab 0c 71 88 d7 44 77 6e 89 92 1e 40 |.Q....q..Dwn...@| +00000040 f7 c8 71 c0 5a 55 |..q.ZU|" +"2019-04-22 06:16:46.538 UTC [cauthdsl] func2 -> DEBU 455 0xc0030b48f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.538 UTC [cauthdsl] func1 -> DEBU 456 0xc0030b48f0 gate 1555913806535261400 evaluation succeeds" +"2019-04-22 06:16:46.538 UTC [policies] Evaluate -> DEBU 457 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:46.538 UTC [policies] Evaluate -> DEBU 458 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:46.539 UTC [policies] Evaluate -> DEBU 459 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:46.539 UTC [policies] Evaluate -> DEBU 45a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:46.539 UTC [blocksProvider] DeliverBlocks -> DEBU 45b [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-04-22 06:16:46.540 UTC [gossip.state] addPayload -> DEBU 45c [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-04-22 06:16:46.540 UTC [gossip.state] deliverPayloads -> DEBU 45d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +"2019-04-22 06:16:46.541 UTC [gossip.state] addPayload -> DEBU 45e Blocks payloads buffer size for channel [businesschannel] is 0 blocks" +"2019-04-22 06:16:46.541 UTC [blocksProvider] DeliverBlocks -> DEBU 45f [businesschannel] Gossiping block [1], peers number [1]" +"2019-04-22 06:16:46.541 UTC [gossip.state] deliverPayloads -> DEBU 460 [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +"2019-04-22 06:16:46.541 UTC [gossip.privdata] StoreBlock -> INFO 461 [businesschannel] Received block [1] from buffer" +"2019-04-22 06:16:46.541 UTC [gossip.privdata] StoreBlock -> DEBU 462 [businesschannel] Validating block [1]" +"2019-04-22 06:16:46.541 UTC [committer.txvalidator] Validate -> DEBU 463 [businesschannel] START Block Validation for block [1]" +"2019-04-22 06:16:46.541 UTC [committer.txvalidator] Validate -> DEBU 464 expecting 1 block validation responses" +"2019-04-22 06:16:46.541 UTC [committer.txvalidator] validateTx -> DEBU 465 [businesschannel] validateTx starts for block 0xc002fe4600 env 0xc003020c80 txn 0" +"2019-04-22 06:16:46.542 UTC [protoutils] ValidateTransaction -> DEBU 466 ValidateTransactionEnvelope starts for envelope 0xc003020c80" +"2019-04-22 06:16:46.542 UTC [protoutils] ValidateTransaction -> DEBU 467 Header is channel_header:"\010\001\032\006\010\313\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\335\364\310\305\2670\211&i\241\0270d\010\3431KA\005{\230\372}\356" " +"2019-04-22 06:16:46.542 UTC [protoutils] validateChannelHeader -> DEBU 468 validateChannelHeader info: header type 1" +"2019-04-22 06:16:46.542 UTC [protoutils] checkSignatureFromCreator -> DEBU 469 begin" +"2019-04-22 06:16:46.542 UTC [msp] GetManagerForChain -> DEBU 46a Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:46.542 UTC [protoutils] checkSignatureFromCreator -> DEBU 46b creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-04-22 06:16:46.542 UTC [msp] Validate -> DEBU 46c MSP OrdererMSP validating identity" +"2019-04-22 06:16:46.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 46d creator is valid" +"2019-04-22 06:16:46.543 UTC [msp.identity] Verify -> DEBU 46e Verify: digest = 00000000 8c fb 29 f2 97 74 25 6e cb 51 c7 a3 6a 77 ad 93 |..)..t%n.Q..jw..| +00000010 02 76 4f 05 73 12 55 54 81 be 8f dd 1d e1 ec 03 |.vO.s.UT........|" +"2019-04-22 06:16:46.543 UTC [msp.identity] Verify -> DEBU 46f Verify: sig = 00000000 30 45 02 21 00 bd 75 92 bd 1d 96 bc be ea dc 3d |0E.!..u........=| +00000010 fb 98 91 b2 a3 02 76 bf 4a 0c 33 b5 75 a1 50 7a |......v.J.3.u.Pz| +00000020 6b f0 2a bc 99 02 20 1d ee 1f fb 71 ef 20 49 e2 |k.*... ....q. I.| +00000030 d6 f3 f6 58 29 c2 2a 6c 4c 9a 95 cf 6e da c5 3c |...X).*lL...n..<| +00000040 e2 3e 85 6c 50 84 6f |.>.lP.o|" +"2019-04-22 06:16:46.543 UTC [protoutils] checkSignatureFromCreator -> DEBU 470 exits successfully" +"2019-04-22 06:16:46.544 UTC [protoutils] validateConfigTransaction -> DEBU 471 validateConfigTransaction starts for data 0xc0001ed500, header channel_header:"\010\001\032\006\010\313\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----\nMIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG\nCCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN\n4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH\ngDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U\n4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6\nN+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh\nQQ==\n-----END CERTIFICATE-----\n\022\030\335\364\310\305\2670\211&i\241\0270d\010\3431KA\005{\230\372}\356" " +"2019-04-22 06:16:46.544 UTC [committer.txvalidator] validateTx -> DEBU 472 Transaction is for channel businesschannel" +"2019-04-22 06:16:46.543 UTC [gossip.channel] AddToMsgStore -> DEBU 473 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23699 bytes, seq: 1}, Envelope: 23732 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:16:46.544 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:46.544 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:46.544 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 478 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 47a Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 47b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.545 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:46.544 UTC [gossip.pull] Add -> DEBU 474 Added 1, total items: 1" +"2019-04-22 06:16:46.546 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Group] /Channel" +"2019-04-22 06:16:46.546 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:46.546 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 47f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.546 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 480 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.546 UTC [policies] Evaluate -> DEBU 481 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:16:46.546 UTC [policies] Evaluate -> DEBU 483 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.546 UTC [policies] Evaluate -> DEBU 484 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:16:46.546 UTC [cauthdsl] func1 -> DEBU 485 0xc00311cad0 gate 1555913806546517700 evaluation starts" +"2019-04-22 06:16:46.546 UTC [cauthdsl] func2 -> DEBU 486 0xc00311cad0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.546 UTC [cauthdsl] func2 -> DEBU 487 0xc00311cad0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.546 UTC [cauthdsl] func2 -> DEBU 488 0xc00311cad0 principal matched by identity 0" +"2019-04-22 06:16:46.546 UTC [msp.identity] Verify -> DEBU 489 Verify: digest = 00000000 91 72 80 3e d5 d4 80 db 98 9c 37 a2 61 f9 7e f8 |.r.>......7.a.~.| +00000010 df 9a 19 bc 44 87 1e 39 8c 3d 69 63 98 12 8b 75 |....D..9.=ic...u|" +"2019-04-22 06:16:46.546 UTC [gossip.comm] Send -> DEBU 48a Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23699 bytes, seq: 1}, Envelope: 23732 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:46.547 UTC [gossip.comm] sendToEndpoint -> DEBU 48c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23699 bytes, seq: 1}, Envelope: 23732 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.547 UTC [gossip.comm] sendToEndpoint -> DEBU 48d Exiting" +"2019-04-22 06:16:46.546 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 48e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 48f Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 490 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:46.549 UTC [common.configtx] addToMap -> DEBU 491 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:46.550 UTC [common.configtx] addToMap -> DEBU 492 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.550 UTC [common.configtx] addToMap -> DEBU 493 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:46.551 UTC [common.configtx] verifyDeltaSet -> DEBU 494 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:46.551 UTC [common.configtx] policyForItem -> DEBU 495 Getting policy for item Org1MSP with mod_policy Admins" +"2019-04-22 06:16:46.552 UTC [policies] Manager -> DEBU 496 Manager Channel looking up path [Application]" +"2019-04-22 06:16:46.552 UTC [policies] Manager -> DEBU 497 Manager Channel has managers Application" +"2019-04-22 06:16:46.552 UTC [policies] Manager -> DEBU 498 Manager Channel has managers Orderer" +"2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 499 Manager Channel/Application looking up path []" +"2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49a Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49b Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49c Manager Channel/Application looking up path [Org1MSP]" +"2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49d Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:46.553 UTC [policies] Manager -> DEBU 49e Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:46.554 UTC [policies] Manager -> DEBU 49f Manager Channel/Application/Org1MSP looking up path []" +"2019-04-22 06:16:46.554 UTC [policies] Evaluate -> DEBU 4a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:16:46.555 UTC [cauthdsl] func1 -> DEBU 4a1 0xc003252360 gate 1555913806554948200 evaluation starts" +"2019-04-22 06:16:46.555 UTC [cauthdsl] func2 -> DEBU 4a2 0xc003252360 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.555 UTC [cauthdsl] func2 -> DEBU 4a3 0xc003252360 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.546 UTC [msp.identity] Verify -> DEBU 48b Verify: sig = 00000000 30 44 02 20 45 83 be c4 bb c8 dc 92 36 07 2f 28 |0D. E.......6./(| +00000010 37 52 b0 3e 3e de 04 51 eb 4b e7 44 d4 b2 c6 c1 |7R.>>..Q.K.D....| +00000020 d1 ba 6f 68 02 20 64 dc 7e 45 a1 86 b1 4e 48 69 |..oh. d.~E...NHi| +00000030 1b 38 90 53 28 5d 55 83 8e df 39 6b 81 98 e3 8d |.8.S(]U...9k....| +00000040 59 ac c9 06 f9 11 |Y.....|" +"2019-04-22 06:16:46.555 UTC [cauthdsl] func2 -> DEBU 4a4 0xc00311cad0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.557 UTC [cauthdsl] func1 -> DEBU 4a6 0xc00311cad0 gate 1555913806546517700 evaluation succeeds" +"2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4a7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4a9 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:46.558 UTC [policies] Evaluate -> DEBU 4aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:46.558 UTC [blocksProvider] DeliverBlocks -> DEBU 4ab [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-04-22 06:16:46.558 UTC [gossip.state] addPayload -> DEBU 4ac [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-04-22 06:16:46.558 UTC [gossip.state] addPayload -> DEBU 4ad Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:16:46.558 UTC [blocksProvider] DeliverBlocks -> DEBU 4ae [businesschannel] Gossiping block [2], peers number [1]" +"2019-04-22 06:16:46.559 UTC [gossip.channel] AddToMsgStore -> DEBU 4af Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:16:46.559 UTC [gossip.pull] Add -> DEBU 4b0 Added 2, total items: 2" +"2019-04-22 06:16:46.556 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4a5 Checking if identity satisfies ADMIN role for Org1MSP" +"2019-04-22 06:16:46.559 UTC [cauthdsl] func2 -> DEBU 4b1 0xc003252360 principal matched by identity 0" +"2019-04-22 06:16:46.559 UTC [msp.identity] Verify -> DEBU 4b2 Verify: digest = 00000000 d6 49 94 91 b8 a6 6c b3 a9 57 7e f9 27 5b 5a e3 |.I....l..W~.'[Z.| +00000010 52 1c 53 ad 04 db 62 c2 c0 a6 ee 8e 58 ad 10 22 |R.S...b.....X.."|" +"2019-04-22 06:16:46.560 UTC [gossip.comm] Send -> DEBU 4b3 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:46.563 UTC [gossip.comm] sendToEndpoint -> DEBU 4b4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 23757 bytes, seq: 2}, Envelope: 23790 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.563 UTC [gossip.comm] sendToEndpoint -> DEBU 4b5 Exiting" +"2019-04-22 06:16:46.563 UTC [msp.identity] Verify -> DEBU 4b6 Verify: sig = 00000000 30 45 02 21 00 b6 e5 83 b1 2b 25 37 b2 dd 37 82 |0E.!.....+%7..7.| +00000010 40 97 d8 59 11 aa 3d 47 e7 b8 07 a1 02 6c 44 3d |@..Y..=G.....lD=| +00000020 29 92 c8 73 f6 02 20 19 98 95 d4 4a ac 07 77 69 |)..s.. ....J..wi| +00000030 64 8c 79 a9 77 84 ee d8 1d 99 b4 5d 73 3e 6a 75 |d.y.w......]s>ju| +00000040 bb a0 cb 16 1c 5f d4 |....._.|" +"2019-04-22 06:16:46.564 UTC [cauthdsl] func2 -> DEBU 4b7 0xc003252360 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.564 UTC [cauthdsl] func1 -> DEBU 4b8 0xc003252360 gate 1555913806554948200 evaluation succeeds" +"2019-04-22 06:16:46.564 UTC [policies] Evaluate -> DEBU 4b9 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:46.564 UTC [policies] Evaluate -> DEBU 4ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:46.564 UTC [common.configtx] verifyDeltaSet -> DEBU 4bb Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4bc Setting policy for key Endorsement to " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4bd Setting policy for key Readers to " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4be Setting policy for key Writers to " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4bf Setting policy for key Admins to " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.565 UTC [common.configtx] recurseConfigMap -> DEBU 4c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c5 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c6 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4c9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4ca Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.566 UTC [common.configtx] recurseConfigMap -> DEBU 4cb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.567 UTC [common.configtx] recurseConfigMap -> DEBU 4cc Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4cd Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4ce Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4cf Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4d0 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.568 UTC [common.configtx] recurseConfigMap -> DEBU 4d1 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.570 UTC [common.configtx] recurseConfigMap -> DEBU 4d2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.570 UTC [common.channelconfig] NewStandardValues -> DEBU 4d3 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d4 Processing field: HashingAlgorithm" +"2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d5 Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: OrdererAddresses" +"2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d7 Processing field: Consortium" +"2019-04-22 06:16:46.570 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: Capabilities" +"2019-04-22 06:16:46.571 UTC [common.channelconfig] NewStandardValues -> DEBU 4d9 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:46.571 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4da Processing field: ACLs" +"2019-04-22 06:16:46.575 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4db Processing field: Capabilities" +"2019-04-22 06:16:46.575 UTC [common.channelconfig] NewStandardValues -> DEBU 4dc Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:46.575 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dd Processing field: AnchorPeers" +"2019-04-22 06:16:46.575 UTC [common.channelconfig] NewStandardValues -> DEBU 4de Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:46.575 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4df Processing field: MSP" +"2019-04-22 06:16:46.575 UTC [common.channelconfig] Validate -> DEBU 4e0 Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:16:46.575 UTC [common.channelconfig] validateMSP -> DEBU 4e1 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:46.575 UTC [msp] newBccspMsp -> DEBU 4e2 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:46.576 UTC [msp] New -> DEBU 4e3 Creating Cache-MSP instance" +"2019-04-22 06:16:46.576 UTC [msp] Setup -> DEBU 4e4 Setting up MSP instance Org1MSP" +"2019-04-22 06:16:46.576 UTC [msp.identity] newIdentity -> DEBU 4e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.576 UTC [msp.identity] newIdentity -> DEBU 4e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.577 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4e7 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:46.577 UTC [msp] Validate -> DEBU 4e8 MSP Org1MSP validating identity" +"2019-04-22 06:16:46.577 UTC [msp] getCertificationChain -> DEBU 4e9 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:46.579 UTC [msp] hasOURole -> DEBU 4ea MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:46.579 UTC [msp] getCertificationChain -> DEBU 4eb MSP Org1MSP getting certification chain" +"2019-04-22 06:16:46.579 UTC [common.channelconfig] NewStandardValues -> DEBU 4ec Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:46.579 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ed Processing field: AnchorPeers" +"2019-04-22 06:16:46.579 UTC [common.channelconfig] NewStandardValues -> DEBU 4ee Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:46.580 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ef Processing field: MSP" +"2019-04-22 06:16:46.580 UTC [common.channelconfig] Validate -> DEBU 4f0 Anchor peers for org Org2MSP are " +"2019-04-22 06:16:46.581 UTC [common.channelconfig] validateMSP -> DEBU 4f1 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:46.581 UTC [msp] newBccspMsp -> DEBU 4f2 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:46.581 UTC [msp] New -> DEBU 4f3 Creating Cache-MSP instance" +"2019-04-22 06:16:46.582 UTC [msp] Setup -> DEBU 4f4 Setting up MSP instance Org2MSP" +"2019-04-22 06:16:46.582 UTC [msp.identity] newIdentity -> DEBU 4f5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.582 UTC [msp.identity] newIdentity -> DEBU 4f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.583 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4f7 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:46.583 UTC [msp] Validate -> DEBU 4f8 MSP Org2MSP validating identity" +"2019-04-22 06:16:46.583 UTC [msp] getCertificationChain -> DEBU 4f9 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.583 UTC [msp] hasOURole -> DEBU 4fa MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:46.583 UTC [msp] getCertificationChain -> DEBU 4fb MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.583 UTC [common.channelconfig] NewStandardValues -> DEBU 4fc Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fd Processing field: ConsensusType" +"2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4fe Processing field: BatchSize" +"2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ff Processing field: BatchTimeout" +"2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 500 Processing field: KafkaBrokers" +"2019-04-22 06:16:46.584 UTC [common.channelconfig] initializeProtosStruct -> DEBU 501 Processing field: ChannelRestrictions" +"2019-04-22 06:16:46.585 UTC [common.channelconfig] initializeProtosStruct -> DEBU 502 Processing field: Capabilities" +"2019-04-22 06:16:46.585 UTC [common.channelconfig] NewStandardValues -> DEBU 503 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:46.585 UTC [common.channelconfig] initializeProtosStruct -> DEBU 504 Processing field: Endpoints" +"2019-04-22 06:16:46.585 UTC [common.channelconfig] NewStandardValues -> DEBU 505 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:46.586 UTC [common.channelconfig] initializeProtosStruct -> DEBU 506 Processing field: MSP" +"2019-04-22 06:16:46.586 UTC [common.channelconfig] validateMSP -> DEBU 507 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:46.586 UTC [msp] newBccspMsp -> DEBU 508 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:46.586 UTC [msp] New -> DEBU 509 Creating Cache-MSP instance" +"2019-04-22 06:16:46.587 UTC [msp] Setup -> DEBU 50a Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:46.589 UTC [msp.identity] newIdentity -> DEBU 50b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.589 UTC [msp.identity] newIdentity -> DEBU 50c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.590 UTC [msp] Validate -> DEBU 50d MSP OrdererMSP validating identity" +"2019-04-22 06:16:46.593 UTC [comm.grpc.server] 1 -> INFO 50e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.592Z grpc.peer_address=192.168.224.5:47496 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.0805ms +"2019-04-22 06:16:46.592 UTC [msp] Setup -> DEBU 50f Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:46.594 UTC [msp] Setup -> DEBU 510 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.595 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.596 UTC [msp.identity] Sign -> DEBU 516 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:46.599 UTC [msp.identity] Sign -> DEBU 518 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:46.597 UTC [policies] NewManagerImpl -> DEBU 517 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.599 UTC [gossip.comm] authenticateRemotePeer -> DEBU 519 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:47496" +"2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51a Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51b Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51c Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51d Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:46.599 UTC [policies] NewManagerImpl -> DEBU 51e Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 51f Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:46.600 UTC [gossip.comm] authenticateRemotePeer -> DEBU 520 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47496" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 521 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 522 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 523 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 524 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 525 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 526 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 527 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 528 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:46.600 UTC [msp.identity] Verify -> DEBU 529 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 52a Proposed new policy Readers for Channel" +"2019-04-22 06:16:46.600 UTC [msp.identity] Verify -> DEBU 52b Verify: sig = 00000000 30 45 02 21 00 8b ad 1e 20 ea 86 f9 6a 34 22 b2 |0E.!.... ...j4".| +00000010 cf 02 6e 2d 6d 62 9c db 36 5d 6b a7 ad c9 e3 24 |..n-mb..6]k....$| +00000020 4d f4 7c 74 2a 02 20 27 e8 f4 bf 45 85 07 b0 ef |M.|t*. '...E....| +00000030 b1 3b 8e 62 0e 01 93 6e d1 a1 f4 5c 5f 67 3a 49 |.;.b...n...\_g:I| +00000040 3d 75 2c 4d 33 f0 a7 |=u,M3..|" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 52c Proposed new policy Writers for Channel" +"2019-04-22 06:16:46.600 UTC [policies] NewManagerImpl -> DEBU 52d Proposed new policy Admins for Channel" +"2019-04-22 06:16:46.600 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Group] /Channel" +"2019-04-22 06:16:46.600 UTC [gossip.comm] authenticateRemotePeer -> DEBU 52f Authenticated 192.168.224.5:47496" +"2019-04-22 06:16:46.601 UTC [gossip.comm] GossipStream -> DEBU 530 Servicing 192.168.224.5:47496" +"2019-04-22 06:16:46.601 UTC [gossip.comm] serviceConnection -> DEBU 531 Closing reading from stream" +"2019-04-22 06:16:46.606 UTC [gossip.comm] func2 -> DEBU 537 Client 192.168.224.5:47444 disconnected" +"2019-04-22 06:16:46.603 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:46.605 UTC [gossip.comm] readFromStream -> DEBU 533 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-04-22 06:16:46.605 UTC [grpc] infof -> DEBU 534 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:46.605 UTC [gossip.comm] readFromStream -> DEBU 535 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:46.605 UTC [gossip.comm] func2 -> DEBU 536 Client 192.168.224.5:47496 disconnected" +"2019-04-22 06:16:46.606 UTC [gossip.comm] writeToStream -> DEBU 538 Closing writing to stream" +"2019-04-22 06:16:46.606 UTC [comm.grpc.server] 1 -> INFO 539 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:47444 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=15.3516056s +"2019-04-22 06:16:46.606 UTC [gossip.comm] writeToStream -> DEBU 53a Closing writing to stream" +"2019-04-22 06:16:46.607 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:46.608 UTC [comm.grpc.server] 1 -> INFO 53c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:56.595Z grpc.peer_address=192.168.224.5:47496 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.9234ms +"2019-04-22 06:16:46.609 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:46.611 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:46.613 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:46.614 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:46.615 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:46.616 UTC [common.configtx] addToMap -> DEBU 542 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.617 UTC [common.configtx] addToMap -> DEBU 543 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:46.618 UTC [common.configtx] addToMap -> DEBU 544 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:46.621 UTC [common.configtx] addToMap -> DEBU 545 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:46.622 UTC [common.configtx] addToMap -> DEBU 546 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.622 UTC [common.configtx] addToMap -> DEBU 547 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:46.623 UTC [common.configtx] addToMap -> DEBU 548 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:46.623 UTC [common.configtx] addToMap -> DEBU 549 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:46.630 UTC [common.configtx] addToMap -> DEBU 54a Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:46.630 UTC [common.configtx] addToMap -> DEBU 54b Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:46.631 UTC [common.configtx] addToMap -> DEBU 54c Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:46.631 UTC [common.configtx] addToMap -> DEBU 54d Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:46.631 UTC [common.configtx] addToMap -> DEBU 54e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 54f Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 550 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 551 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.632 UTC [common.configtx] addToMap -> DEBU 552 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 553 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 554 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 555 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:46.633 UTC [common.configtx] addToMap -> DEBU 556 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:46.634 UTC [common.configtx] addToMap -> DEBU 557 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:46.635 UTC [common.configtx] addToMap -> DEBU 558 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:46.635 UTC [common.configtx] addToMap -> DEBU 559 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:46.636 UTC [common.configtx] addToMap -> DEBU 55a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:46.636 UTC [common.configtx] addToMap -> DEBU 55b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:46.637 UTC [common.configtx] addToMap -> DEBU 55c Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:46.637 UTC [common.configtx] addToMap -> DEBU 55d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:46.637 UTC [common.configtx] addToMap -> DEBU 55e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:46.638 UTC [common.configtx] addToMap -> DEBU 55f Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 560 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 561 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 562 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:46.639 UTC [common.configtx] addToMap -> DEBU 563 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:46.640 UTC [common.configtx] addToMap -> DEBU 564 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:46.640 UTC [common.configtx] addToMap -> DEBU 565 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:46.641 UTC [common.configtx] addToMap -> DEBU 566 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:46.641 UTC [common.channelconfig] LogSanityChecks -> DEBU 567 As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:46.641 UTC [common.channelconfig] LogSanityChecks -> DEBU 568 As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:46.641 UTC [policies] Manager -> DEBU 569 Manager Channel looking up path [Application]" +"2019-04-22 06:16:46.641 UTC [policies] Manager -> DEBU 56a Manager Channel has managers Orderer" +"2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56b Manager Channel has managers Application" +"2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56c Manager Channel/Application looking up path []" +"2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56d Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:46.642 UTC [policies] Manager -> DEBU 56e Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:46.643 UTC [common.channelconfig] LogSanityChecks -> DEBU 56f As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:46.643 UTC [common.channelconfig] LogSanityChecks -> DEBU 570 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:46.643 UTC [common.channelconfig] LogSanityChecks -> DEBU 571 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 572 Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 573 Manager Channel has managers Application" +"2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 574 Manager Channel has managers Orderer" +"2019-04-22 06:16:46.644 UTC [policies] Manager -> DEBU 575 Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:46.645 UTC [policies] Manager -> DEBU 576 Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:46.645 UTC [common.channelconfig] LogSanityChecks -> DEBU 577 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:46.646 UTC [common.capabilities] Supported -> DEBU 578 Application capability V2_0 is supported and is enabled" +"2019-04-22 06:16:46.646 UTC [common.capabilities] Supported -> DEBU 579 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:46.646 UTC [gossip.service] ProcessConfigUpdate -> DEBU 57a Processing new config for channel businesschannel" +"2019-04-22 06:16:46.647 UTC [gossip.service] ProcessConfigUpdate -> DEBU 57b Calling out because config was updated for channel businesschannel" +"2019-04-22 06:16:46.647 UTC [gossip.service] updateAnchors -> DEBU 57c Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-04-22 06:16:46.647 UTC [gossip.service] updateAnchors -> DEBU 57d Org2MSP anchor peers: []" +"2019-04-22 06:16:46.653 UTC [gossip.service] updateAnchors -> DEBU 57e Creating state provider for chainID businesschannel" +"2019-04-22 06:16:46.654 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 57f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.655 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 580 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.655 UTC [policies] Evaluate -> DEBU 581 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:46.655 UTC [policies] Evaluate -> DEBU 582 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.658 UTC [policies] Evaluate -> DEBU 583 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:46.659 UTC [cauthdsl] func1 -> DEBU 584 0xc00354a8d0 gate 1555913806659200200 evaluation starts" +"2019-04-22 06:16:46.659 UTC [cauthdsl] func2 -> DEBU 585 0xc00354a8d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.659 UTC [cauthdsl] func2 -> DEBU 586 0xc00354a8d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.659 UTC [cauthdsl] func2 -> DEBU 587 0xc00354a8d0 principal matched by identity 0" +"2019-04-22 06:16:46.660 UTC [msp.identity] Verify -> DEBU 588 Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +"2019-04-22 06:16:46.660 UTC [msp.identity] Verify -> DEBU 589 Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +"2019-04-22 06:16:46.661 UTC [cauthdsl] func2 -> DEBU 58a 0xc00354a8d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.661 UTC [cauthdsl] func1 -> DEBU 58b 0xc00354a8d0 gate 1555913806659200200 evaluation succeeds" +"2019-04-22 06:16:46.661 UTC [policies] Evaluate -> DEBU 58c Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.662 UTC [policies] Evaluate -> DEBU 58d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.662 UTC [policies] Evaluate -> DEBU 58e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:46.662 UTC [policies] Evaluate -> DEBU 58f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:46.663 UTC [gossip.gossip] JoinChan -> INFO 590 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:16:46.663 UTC [gossip.gossip] learnAnchorPeers -> INFO 591 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:16:46.664 UTC [gossip.gossip] learnAnchorPeers -> INFO 592 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:16:46.664 UTC [gossip.gossip] learnAnchorPeers -> INFO 593 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:16:46.664 UTC [gossip.service] updateEndpoints -> DEBU 594 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-04-22 06:16:46.666 UTC [peer] updateTrustedRoots -> DEBU 595 Updating trusted root authorities for channel businesschannel" +"2019-04-22 06:16:46.693 UTC [peer] buildTrustedRootsForChain -> DEBU 596 updating root CAs for channel [businesschannel]" +"2019-04-22 06:16:46.693 UTC [peer] buildTrustedRootsForChain -> DEBU 597 adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:16:46.694 UTC [peer] buildTrustedRootsForChain -> DEBU 598 adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:16:46.694 UTC [peer] buildTrustedRootsForChain -> DEBU 599 adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:16:46.696 UTC [committer.txvalidator] validateTx -> DEBU 59a config transaction received for chain businesschannel" +"2019-04-22 06:16:46.696 UTC [committer.txvalidator] validateTx -> DEBU 59b [businesschannel] validateTx completes for block 0xc002fe4600 env 0xc003020c80 txn 0" +"2019-04-22 06:16:46.696 UTC [committer.txvalidator] Validate -> DEBU 59c got result for idx 0, code 0" +"2019-04-22 06:16:46.696 UTC [committer.txvalidator] Validate -> INFO 59d [businesschannel] Validated block [1] in 155ms" +"2019-04-22 06:16:46.696 UTC [gossip.privdata] listMissingPrivateData -> DEBU 59e Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:16:46.697 UTC [gossip.privdata] StoreBlock -> DEBU 59f [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:16:46.699 UTC [committer] preCommit -> DEBU 5a0 Received configuration update, calling CSCC ConfigUpdate" +"2019-04-22 06:16:46.699 UTC [kvledger] CommitWithPvtData -> DEBU 5a1 [businesschannel] Validating state for block [1]" +"2019-04-22 06:16:46.699 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5a2 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:16:46.699 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5a3 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:16:46.700 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 5a4 Validating new block with num trans = [1]" +"2019-04-22 06:16:46.701 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a5 ValidateAndPrepareBatch() for block number = [1]" +"2019-04-22 06:16:46.701 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5a6 preprocessing ProtoBlock..." +"2019-04-22 06:16:46.701 UTC [valimpl] preprocessProtoBlock -> DEBU 5a7 txType=CONFIG" +"2019-04-22 06:16:46.701 UTC [valimpl] processNonEndorserTx -> DEBU 5a8 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-04-22 06:16:46.701 UTC [valimpl] processNonEndorserTx -> DEBU 5a9 Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-04-22 06:16:46.701 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 5aa constructing new tx simulator" +"2019-04-22 06:16:46.701 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 5ab constructing new tx simulator txid = []" +"2019-04-22 06:16:46.701 UTC [peer] GenerateSimulationResults -> DEBU 5ac Processing CONFIG" +"2019-04-22 06:16:46.703 UTC [peer] processChannelConfigTx -> DEBU 5ad channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-04-22 06:16:46.703 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 5ae Simulation completed, getting simulation results" +"2019-04-22 06:16:46.705 UTC [lockbasedtxmgr] Done -> DEBU 5af Done with transaction simulation / query execution []" +"2019-04-22 06:16:46.705 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 5b0 Block [1] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-04-22 06:16:46.705 UTC [valinternal] ApplyWriteSet -> DEBU 5b1 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00335fd00)}" +"2019-04-22 06:16:46.705 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5b2 validating rwset..." +"2019-04-22 06:16:46.706 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5b3 postprocessing ProtoBlock..." +"2019-04-22 06:16:46.707 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 5b4 ValidateAndPrepareBatch() complete" +"2019-04-22 06:16:46.707 UTC [kvledger] CommitWithPvtData -> DEBU 5b5 [businesschannel] Committing block [1] to storage" +"2019-04-22 06:16:46.708 UTC [ledgerstorage] CommitWithPvtData -> DEBU 5b6 Writing block [1] to pvt block store" +"2019-04-22 06:16:46.711 UTC [comm.grpc.server] 1 -> INFO 5b7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:48.709Z grpc.peer_address=192.168.224.5:47498 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=559.2µs +"2019-04-22 06:16:46.713 UTC [pvtdatastorage] Prepare -> DEBU 5b8 Saved 0 private data write sets for block [1]" +"2019-04-22 06:16:46.715 UTC [msp.identity] Sign -> DEBU 5b9 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:46.715 UTC [msp.identity] Sign -> DEBU 5ba Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:46.716 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5bb Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:47498" +"2019-04-22 06:16:46.716 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5bc Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47498" +"2019-04-22 06:16:46.717 UTC [msp.identity] Verify -> DEBU 5bd Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:16:46.718 UTC [msp.identity] Verify -> DEBU 5be Verify: sig = 00000000 30 44 02 20 6c 7e 42 49 b8 0a cd db a0 e7 bd 4f |0D. l~BI.......O| +00000010 00 1e 14 db fd aa f8 4d 0d 99 d2 6e 93 fd 01 46 |.......M...n...F| +00000020 97 e3 2e 9b 02 20 15 b9 3f 07 bb 23 70 82 41 99 |..... ..?..#p.A.| +00000030 1a 69 49 2a d6 51 2e b0 44 d2 4e a8 d9 66 bd c9 |.iI*.Q..D.N..f..| +00000040 e0 cc 6a 0f 68 c8 |..j.h.|" +"2019-04-22 06:16:46.718 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5bf Authenticated 192.168.224.5:47498" +"2019-04-22 06:16:46.719 UTC [gossip.comm] GossipStream -> DEBU 5c1 Servicing 192.168.224.5:47498" +"2019-04-22 06:16:46.718 UTC [fsblkstorage] indexBlock -> DEBU 5c0 Indexing block [blockNum=1, blockHash=[]byte{0x5e, 0xd0, 0xe, 0x26, 0x5e, 0x23, 0xd, 0x4c, 0x65, 0x1, 0x57, 0xd2, 0x90, 0x29, 0x46, 0xb0, 0x9d, 0x51, 0xe3, 0x4a, 0x9, 0x69, 0xcc, 0x77, 0xd7, 0x40, 0x5c, 0x1e, 0x19, 0xe8, 0x49, 0xd1} txOffsets= +txId= locPointer=offset=71, bytesLength=22680 +]" +"2019-04-22 06:16:46.719 UTC [fsblkstorage] indexBlock -> DEBU 5c2 txid [] is a duplicate of a previous tx. Not indexing in txid-index" +"2019-04-22 06:16:46.719 UTC [fsblkstorage] indexBlock -> DEBU 5c3 Adding txLoc [fileSuffixNum=0, offset=24012, bytesLength=22680] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-04-22 06:16:46.722 UTC [grpc] infof -> DEBU 5c4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:46.723 UTC [gossip.comm] readFromStream -> DEBU 5c5 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:46.723 UTC [gossip.comm] func2 -> DEBU 5c6 Client 192.168.224.5:47498 disconnected" +"2019-04-22 06:16:46.723 UTC [comm.grpc.server] 1 -> INFO 5c7 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:56.714Z grpc.peer_address=192.168.224.5:47498 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.4159ms +"2019-04-22 06:16:46.724 UTC [gossip.comm] writeToStream -> DEBU 5c8 Closing writing to stream" +"2019-04-22 06:16:46.726 UTC [grpc] infof -> DEBU 5c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:46.726 UTC [fsblkstorage] updateCheckpoint -> DEBU 5ca Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47629], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-04-22 06:16:46.726 UTC [pvtdatastorage] Commit -> DEBU 5cb Committing private data for block [1]" +"2019-04-22 06:16:46.728 UTC [pvtdatastorage] Commit -> DEBU 5cc Committed private data for block [1]" +"2019-04-22 06:16:46.728 UTC [kvledger] CommitWithPvtData -> DEBU 5cd [businesschannel] Committing block [1] transactions to state database" +"2019-04-22 06:16:46.728 UTC [lockbasedtxmgr] Commit -> DEBU 5ce lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:16:46.729 UTC [lockbasedtxmgr] Commit -> DEBU 5cf Committing updates to state database" +"2019-04-22 06:16:46.729 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 5d0 Building the expiry schedules based on the update batch" +"2019-04-22 06:16:46.730 UTC [lockbasedtxmgr] Commit -> DEBU 5d1 Write lock acquired for committing updates to state database" +"2019-04-22 06:16:46.730 UTC [stateleveldb] ApplyUpdates -> DEBU 5d2 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-04-22 06:16:46.734 UTC [lockbasedtxmgr] Commit -> DEBU 5d3 Updates committed to state database and the write lock is released" +"2019-04-22 06:16:46.735 UTC [lockbasedtxmgr] func1 -> DEBU 5d5 launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:16:46.735 UTC [kvledger] CommitWithPvtData -> DEBU 5d6 [businesschannel] Committing block [1] transactions to history database" +"2019-04-22 06:16:46.735 UTC [historyleveldb] Commit -> DEBU 5d7 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +"2019-04-22 06:16:46.736 UTC [historyleveldb] Commit -> DEBU 5d8 Skipping transaction [0] since it is not an endorsement transaction" +"2019-04-22 06:16:46.734 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5d4 Preparing potential purge list working-set for expiringAtBlk [2]" +"2019-04-22 06:16:46.736 UTC [leveldbhelper] GetIterator -> DEBU 5d9 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +"2019-04-22 06:16:46.737 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 5da No expiry entry found for expiringAtBlk [2]" +"2019-04-22 06:16:46.738 UTC [historyleveldb] Commit -> DEBU 5db Channel [businesschannel]: Updates committed to history database for blockNo [1]" +"2019-04-22 06:16:46.739 UTC [kvledger] CommitWithPvtData -> INFO 5dc [businesschannel] Committed block [1] with 1 transaction(s) in 39ms (state_validation=8ms block_commit=20ms state_commit=6ms)" +"2019-04-22 06:16:46.740 UTC [msp.identity] Sign -> DEBU 5dd Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020802 " +"2019-04-22 06:16:46.740 UTC [msp.identity] Sign -> DEBU 5de Sign: digest: 73CAA67B75A74144E39C5F4AAFF3BA1461215A7CE81E70C046E60C9CAF3E7604 " +"2019-04-22 06:16:46.741 UTC [gossip.state] commitBlock -> DEBU 5df [businesschannel] Committed block [1] with 1 transaction(s)" +"2019-04-22 06:16:46.742 UTC [gossip.state] deliverPayloads -> DEBU 5e0 [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +"2019-04-22 06:16:46.742 UTC [gossip.privdata] StoreBlock -> INFO 5e1 [businesschannel] Received block [2] from buffer" +"2019-04-22 06:16:46.742 UTC [gossip.privdata] StoreBlock -> DEBU 5e2 [businesschannel] Validating block [2]" +"2019-04-22 06:16:46.743 UTC [committer.txvalidator] Validate -> DEBU 5e3 [businesschannel] START Block Validation for block [2]" +"2019-04-22 06:16:46.744 UTC [committer.txvalidator] validateTx -> DEBU 5e4 [businesschannel] validateTx starts for block 0xc0033e7e00 env 0xc003357cc0 txn 0" +"2019-04-22 06:16:46.744 UTC [protoutils] ValidateTransaction -> DEBU 5e5 ValidateTransactionEnvelope starts for envelope 0xc003357cc0" +"2019-04-22 06:16:46.744 UTC [protoutils] ValidateTransaction -> DEBU 5e6 Header is channel_header:"\010\001\032\006\010\315\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030$qq\027BU\026\330eW\270\365\324\270\016N2\310\005\347\343\375\317\277" " +"2019-04-22 06:16:46.745 UTC [protoutils] validateChannelHeader -> DEBU 5e7 validateChannelHeader info: header type 1" +"2019-04-22 06:16:46.745 UTC [protoutils] checkSignatureFromCreator -> DEBU 5e8 begin" +"2019-04-22 06:16:46.745 UTC [msp] GetManagerForChain -> DEBU 5e9 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:46.745 UTC [msp] DeserializeIdentity -> DEBU 5ea Obtaining identity" +"2019-04-22 06:16:46.746 UTC [msp.identity] newIdentity -> DEBU 5eb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.743 UTC [committer.txvalidator] Validate -> DEBU 5ec expecting 1 block validation responses" +"2019-04-22 06:16:46.747 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ed creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-04-22 06:16:46.750 UTC [msp] Validate -> DEBU 5ee MSP OrdererMSP validating identity" +"2019-04-22 06:16:46.750 UTC [protoutils] checkSignatureFromCreator -> DEBU 5ef creator is valid" +"2019-04-22 06:16:46.751 UTC [msp.identity] Verify -> DEBU 5f0 Verify: digest = 00000000 47 08 7e f7 6e 1f 59 d0 d0 17 3f 7c fd 5e 05 dd |G.~.n.Y...?|.^..| +00000010 f2 f5 57 40 ec a6 aa d1 27 98 05 00 0c 2c 45 35 |..W@....'....,E5|" +"2019-04-22 06:16:46.751 UTC [msp.identity] Verify -> DEBU 5f1 Verify: sig = 00000000 30 45 02 21 00 eb 6d 42 07 cb 81 91 61 2a fa 7e |0E.!..mB....a*.~| +00000010 b4 96 01 30 37 c3 33 e4 39 4e ea 62 ae 23 ad cb |...07.3.9N.b.#..| +00000020 38 21 bc 2e b7 02 20 79 11 e0 40 58 9f 99 ae 44 |8!.... y..@X...D| +00000030 12 b3 c7 7d 34 a9 a6 70 4a 75 15 9e 3b ed 3f 7d |...}4..pJu..;.?}| +00000040 6c b3 c4 e8 fb 7f 16 |l......|" +"2019-04-22 06:16:46.752 UTC [protoutils] checkSignatureFromCreator -> DEBU 5f2 exits successfully" +"2019-04-22 06:16:46.755 UTC [protoutils] validateConfigTransaction -> DEBU 5f3 validateConfigTransaction starts for data 0xc00369c000, header channel_header:"\010\001\032\006\010\315\270\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030$qq\027BU\026\330eW\270\365\324\270\016N2\310\005\347\343\375\317\277" " +"2019-04-22 06:16:46.755 UTC [committer.txvalidator] validateTx -> DEBU 5f4 Transaction is for channel businesschannel" +"2019-04-22 06:16:46.756 UTC [common.configtx] addToMap -> DEBU 5f5 Adding to config map: [Group] /Channel" +"2019-04-22 06:16:46.756 UTC [common.configtx] addToMap -> DEBU 5f6 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:46.756 UTC [common.configtx] addToMap -> DEBU 5f7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:46.757 UTC [common.configtx] addToMap -> DEBU 5f8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:46.757 UTC [common.configtx] addToMap -> DEBU 5f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:46.757 UTC [common.configtx] addToMap -> DEBU 5fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.758 UTC [common.configtx] addToMap -> DEBU 5fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:46.758 UTC [common.configtx] addToMap -> DEBU 5fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:46.759 UTC [common.configtx] addToMap -> DEBU 5fd Adding to config map: [Group] /Channel" +"2019-04-22 06:16:46.759 UTC [common.configtx] addToMap -> DEBU 5fe Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:46.759 UTC [common.configtx] addToMap -> DEBU 5ff Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:46.760 UTC [common.configtx] addToMap -> DEBU 600 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:46.761 UTC [common.configtx] addToMap -> DEBU 601 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:46.761 UTC [common.configtx] addToMap -> DEBU 602 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:46.762 UTC [common.configtx] addToMap -> DEBU 603 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.762 UTC [common.configtx] addToMap -> DEBU 604 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:46.764 UTC [common.configtx] addToMap -> DEBU 605 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:46.764 UTC [common.configtx] verifyDeltaSet -> DEBU 606 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:46.766 UTC [common.configtx] verifyDeltaSet -> DEBU 607 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:46.767 UTC [common.configtx] policyForItem -> DEBU 608 Getting policy for item Org2MSP with mod_policy Admins" +"2019-04-22 06:16:46.767 UTC [policies] Manager -> DEBU 609 Manager Channel looking up path [Application]" +"2019-04-22 06:16:46.768 UTC [policies] Manager -> DEBU 60a Manager Channel has managers Application" +"2019-04-22 06:16:46.769 UTC [policies] Manager -> DEBU 60b Manager Channel has managers Orderer" +"2019-04-22 06:16:46.769 UTC [policies] Manager -> DEBU 60c Manager Channel/Application looking up path []" +"2019-04-22 06:16:46.769 UTC [policies] Manager -> DEBU 60d Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:46.770 UTC [policies] Manager -> DEBU 60e Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:46.770 UTC [policies] Manager -> DEBU 60f Manager Channel/Application looking up path [Org2MSP]" +"2019-04-22 06:16:46.770 UTC [policies] Manager -> DEBU 610 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:46.771 UTC [policies] Manager -> DEBU 611 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:46.771 UTC [policies] Manager -> DEBU 612 Manager Channel/Application/Org2MSP looking up path []" +"2019-04-22 06:16:46.771 UTC [policies] Evaluate -> DEBU 613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-04-22 06:16:46.771 UTC [msp] DeserializeIdentity -> DEBU 614 Obtaining identity" +"2019-04-22 06:16:46.778 UTC [msp.identity] newIdentity -> DEBU 615 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.778 UTC [cauthdsl] func1 -> DEBU 616 0xc003692910 gate 1555913806778901700 evaluation starts" +"2019-04-22 06:16:46.778 UTC [cauthdsl] func2 -> DEBU 617 0xc003692910 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.779 UTC [cauthdsl] func2 -> DEBU 618 0xc003692910 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.779 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 619 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-04-22 06:16:46.779 UTC [cauthdsl] func2 -> DEBU 61a 0xc003692910 principal matched by identity 0" +"2019-04-22 06:16:46.779 UTC [msp.identity] Verify -> DEBU 61b Verify: digest = 00000000 15 3c 35 3e 0a a5 a4 08 d3 8b 10 e1 1e 92 64 23 |.<5>..........d#| +00000010 29 f6 f1 75 85 a5 47 e9 95 bb 52 8b 72 4c f0 0e |)..u..G...R.rL..|" +"2019-04-22 06:16:46.781 UTC [msp.identity] Verify -> DEBU 61c Verify: sig = 00000000 30 45 02 21 00 f7 9d cd da 3e 12 f0 cc 5b cf e1 |0E.!.....>...[..| +00000010 ed 4c 16 68 55 be 70 84 69 dc ae 06 51 0b 9e db |.L.hU.p.i...Q...| +00000020 86 ed f0 44 67 02 20 26 b6 d3 f4 80 93 4a 78 f7 |...Dg. &.....Jx.| +00000030 54 76 38 f1 be 1f df b1 72 b0 7e 2b 81 03 1c 00 |Tv8.....r.~+....| +00000040 c1 10 25 d5 0c eb da |..%....|" +"2019-04-22 06:16:46.782 UTC [cauthdsl] func2 -> DEBU 61d 0xc003692910 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.782 UTC [cauthdsl] func1 -> DEBU 61e 0xc003692910 gate 1555913806778901700 evaluation succeeds" +"2019-04-22 06:16:46.782 UTC [policies] Evaluate -> DEBU 61f Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:46.782 UTC [policies] Evaluate -> DEBU 620 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:46.783 UTC [common.configtx] recurseConfigMap -> DEBU 621 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.783 UTC [common.configtx] recurseConfigMap -> DEBU 622 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.783 UTC [common.configtx] recurseConfigMap -> DEBU 623 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.784 UTC [common.configtx] recurseConfigMap -> DEBU 624 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.784 UTC [common.configtx] recurseConfigMap -> DEBU 625 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.785 UTC [common.configtx] recurseConfigMap -> DEBU 626 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.785 UTC [common.configtx] recurseConfigMap -> DEBU 627 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 628 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 629 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 62a Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.786 UTC [common.configtx] recurseConfigMap -> DEBU 62b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62c Setting policy for key Endorsement to " +"2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62d Setting policy for key Readers to " +"2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62e Setting policy for key Writers to " +"2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 62f Setting policy for key Admins to " +"2019-04-22 06:16:46.787 UTC [common.configtx] recurseConfigMap -> DEBU 630 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.788 UTC [common.configtx] recurseConfigMap -> DEBU 631 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 632 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 633 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 634 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 635 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 636 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.789 UTC [common.configtx] recurseConfigMap -> DEBU 637 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:16:46.790 UTC [common.channelconfig] NewStandardValues -> DEBU 638 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:16:46.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 639 Processing field: HashingAlgorithm" +"2019-04-22 06:16:46.790 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63a Processing field: BlockDataHashingStructure" +"2019-04-22 06:16:46.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63b Processing field: OrdererAddresses" +"2019-04-22 06:16:46.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63c Processing field: Consortium" +"2019-04-22 06:16:46.791 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63d Processing field: Capabilities" +"2019-04-22 06:16:46.791 UTC [common.channelconfig] NewStandardValues -> DEBU 63e Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 63f Processing field: ConsensusType" +"2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 640 Processing field: BatchSize" +"2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 641 Processing field: BatchTimeout" +"2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 642 Processing field: KafkaBrokers" +"2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 643 Processing field: ChannelRestrictions" +"2019-04-22 06:16:46.792 UTC [common.channelconfig] initializeProtosStruct -> DEBU 644 Processing field: Capabilities" +"2019-04-22 06:16:46.793 UTC [common.channelconfig] NewStandardValues -> DEBU 645 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:16:46.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 646 Processing field: Endpoints" +"2019-04-22 06:16:46.793 UTC [common.channelconfig] NewStandardValues -> DEBU 647 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:46.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 648 Processing field: MSP" +"2019-04-22 06:16:46.794 UTC [common.channelconfig] validateMSP -> DEBU 649 Setting up MSP for org OrdererOrg" +"2019-04-22 06:16:46.794 UTC [msp] newBccspMsp -> DEBU 64a Creating BCCSP-based MSP instance" +"2019-04-22 06:16:46.794 UTC [msp] New -> DEBU 64b Creating Cache-MSP instance" +"2019-04-22 06:16:46.794 UTC [msp] Setup -> DEBU 64c Setting up MSP instance OrdererMSP" +"2019-04-22 06:16:46.795 UTC [msp.identity] newIdentity -> DEBU 64d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.796 UTC [msp.identity] newIdentity -> DEBU 64e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.796 UTC [msp] Validate -> DEBU 64f MSP OrdererMSP validating identity" +"2019-04-22 06:16:46.797 UTC [common.channelconfig] NewStandardValues -> DEBU 650 Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:16:46.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 651 Processing field: ACLs" +"2019-04-22 06:16:46.797 UTC [common.channelconfig] initializeProtosStruct -> DEBU 652 Processing field: Capabilities" +"2019-04-22 06:16:46.797 UTC [common.channelconfig] NewStandardValues -> DEBU 653 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:46.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 654 Processing field: AnchorPeers" +"2019-04-22 06:16:46.798 UTC [common.channelconfig] NewStandardValues -> DEBU 655 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:46.798 UTC [common.channelconfig] initializeProtosStruct -> DEBU 656 Processing field: MSP" +"2019-04-22 06:16:46.798 UTC [common.channelconfig] Validate -> DEBU 657 Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:16:46.798 UTC [common.channelconfig] validateMSP -> DEBU 658 Setting up MSP for org Org1MSP" +"2019-04-22 06:16:46.799 UTC [msp] newBccspMsp -> DEBU 659 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:46.799 UTC [msp] New -> DEBU 65a Creating Cache-MSP instance" +"2019-04-22 06:16:46.799 UTC [msp] Setup -> DEBU 65b Setting up MSP instance Org1MSP" +"2019-04-22 06:16:46.800 UTC [msp.identity] newIdentity -> DEBU 65c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.801 UTC [msp.identity] newIdentity -> DEBU 65d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.801 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 65e Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:16:46.802 UTC [msp] Validate -> DEBU 65f MSP Org1MSP validating identity" +"2019-04-22 06:16:46.802 UTC [msp] getCertificationChain -> DEBU 660 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:46.803 UTC [msp] hasOURole -> DEBU 661 MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:16:46.803 UTC [msp] getCertificationChain -> DEBU 662 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:46.803 UTC [common.channelconfig] NewStandardValues -> DEBU 663 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:16:46.803 UTC [common.channelconfig] initializeProtosStruct -> DEBU 664 Processing field: AnchorPeers" +"2019-04-22 06:16:46.803 UTC [common.channelconfig] NewStandardValues -> DEBU 665 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:16:46.804 UTC [common.channelconfig] initializeProtosStruct -> DEBU 666 Processing field: MSP" +"2019-04-22 06:16:46.804 UTC [common.channelconfig] Validate -> DEBU 667 Anchor peers for org Org2MSP are anchor_peers: " +"2019-04-22 06:16:46.804 UTC [common.channelconfig] validateMSP -> DEBU 668 Setting up MSP for org Org2MSP" +"2019-04-22 06:16:46.805 UTC [msp] newBccspMsp -> DEBU 669 Creating BCCSP-based MSP instance" +"2019-04-22 06:16:46.805 UTC [msp] New -> DEBU 66a Creating Cache-MSP instance" +"2019-04-22 06:16:46.805 UTC [msp] Setup -> DEBU 66b Setting up MSP instance Org2MSP" +"2019-04-22 06:16:46.805 UTC [msp.identity] newIdentity -> DEBU 66c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.806 UTC [msp.identity] newIdentity -> DEBU 66d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.807 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 66e Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:16:46.807 UTC [msp] Validate -> DEBU 66f MSP Org2MSP validating identity" +"2019-04-22 06:16:46.808 UTC [msp] getCertificationChain -> DEBU 670 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.808 UTC [msp] hasOURole -> DEBU 671 MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:16:46.808 UTC [msp] getCertificationChain -> DEBU 672 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.809 UTC [msp] Setup -> DEBU 673 Setting up the MSP manager (3 msps)" +"2019-04-22 06:16:46.809 UTC [msp] Setup -> DEBU 674 MSP manager setup complete, setup 3 msps" +"2019-04-22 06:16:46.809 UTC [policies] NewManagerImpl -> DEBU 675 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.809 UTC [policies] NewManagerImpl -> DEBU 676 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.809 UTC [policies] NewManagerImpl -> DEBU 677 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.810 UTC [policies] NewManagerImpl -> DEBU 678 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:16:46.810 UTC [policies] NewManagerImpl -> DEBU 679 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.810 UTC [policies] NewManagerImpl -> DEBU 67a Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67b Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67c Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67d Proposed new policy Admins for Channel/Application" +"2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67e Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 67f Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:16:46.811 UTC [policies] NewManagerImpl -> DEBU 680 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:16:46.812 UTC [policies] NewManagerImpl -> DEBU 681 Proposed new policy Writers for Channel/Application" +"2019-04-22 06:16:46.812 UTC [policies] NewManagerImpl -> DEBU 682 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 683 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 684 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 685 Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:16:46.813 UTC [policies] NewManagerImpl -> DEBU 686 Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 687 Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 688 Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 689 Proposed new policy Admins for Channel" +"2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 68a Proposed new policy Readers for Channel" +"2019-04-22 06:16:46.814 UTC [policies] NewManagerImpl -> DEBU 68b Proposed new policy Writers for Channel" +"2019-04-22 06:16:46.815 UTC [common.configtx] addToMap -> DEBU 68c Adding to config map: [Group] /Channel" +"2019-04-22 06:16:46.815 UTC [common.configtx] addToMap -> DEBU 68d Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:16:46.815 UTC [common.configtx] addToMap -> DEBU 68e Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:16:46.816 UTC [common.configtx] addToMap -> DEBU 68f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:16:46.816 UTC [common.configtx] addToMap -> DEBU 690 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 691 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 692 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 693 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:46.817 UTC [common.configtx] addToMap -> DEBU 694 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:16:46.818 UTC [common.configtx] addToMap -> DEBU 695 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:16:46.818 UTC [common.configtx] addToMap -> DEBU 696 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:16:46.819 UTC [common.configtx] addToMap -> DEBU 697 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:16:46.819 UTC [common.configtx] addToMap -> DEBU 698 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 699 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 69a Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 69b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:46.820 UTC [common.configtx] addToMap -> DEBU 69c Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:16:46.821 UTC [common.configtx] addToMap -> DEBU 69d Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:16:46.821 UTC [common.configtx] addToMap -> DEBU 69e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:16:46.821 UTC [common.configtx] addToMap -> DEBU 69f Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a0 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a1 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:16:46.822 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:16:46.823 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:16:46.824 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:16:46.824 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:16:46.824 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:16:46.825 UTC [common.configtx] addToMap -> DEBU 6b1 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b2 Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b3 Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:16:46.826 UTC [common.configtx] addToMap -> DEBU 6b6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:16:46.827 UTC [common.configtx] addToMap -> DEBU 6b7 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:16:46.827 UTC [common.configtx] addToMap -> DEBU 6b8 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:16:46.827 UTC [common.configtx] addToMap -> DEBU 6b9 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:16:46.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 6ba As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:16:46.827 UTC [common.channelconfig] LogSanityChecks -> DEBU 6bb As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6bc Manager Channel looking up path [Application]" +"2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6bd Manager Channel has managers Application" +"2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6be Manager Channel has managers Orderer" +"2019-04-22 06:16:46.831 UTC [policies] Manager -> DEBU 6bf Manager Channel/Application looking up path []" +"2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c0 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c1 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:16:46.832 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c2 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:16:46.832 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c3 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:16:46.832 UTC [common.channelconfig] LogSanityChecks -> DEBU 6c4 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c5 Manager Channel looking up path [Orderer]" +"2019-04-22 06:16:46.832 UTC [policies] Manager -> DEBU 6c6 Manager Channel has managers Application" +"2019-04-22 06:16:46.833 UTC [policies] Manager -> DEBU 6c7 Manager Channel has managers Orderer" +"2019-04-22 06:16:46.833 UTC [policies] Manager -> DEBU 6c8 Manager Channel/Orderer looking up path []" +"2019-04-22 06:16:46.834 UTC [policies] Manager -> DEBU 6c9 Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:16:46.834 UTC [common.channelconfig] LogSanityChecks -> DEBU 6ca As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:16:46.834 UTC [common.capabilities] Supported -> DEBU 6cb Application capability V2_0 is supported and is enabled" +"2019-04-22 06:16:46.834 UTC [common.capabilities] Supported -> DEBU 6cc Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:16:46.834 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6cd Processing new config for channel businesschannel" +"2019-04-22 06:16:46.835 UTC [gossip.service] ProcessConfigUpdate -> DEBU 6ce Calling out because config was updated for channel businesschannel" +"2019-04-22 06:16:46.835 UTC [gossip.service] updateAnchors -> DEBU 6cf Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-04-22 06:16:46.835 UTC [gossip.service] updateAnchors -> DEBU 6d0 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-04-22 06:16:46.836 UTC [gossip.service] updateAnchors -> DEBU 6d1 Creating state provider for chainID businesschannel" +"2019-04-22 06:16:46.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.836 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 6d3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.836 UTC [policies] Evaluate -> DEBU 6d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:46.837 UTC [policies] Evaluate -> DEBU 6d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.837 UTC [policies] Evaluate -> DEBU 6d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:46.837 UTC [msp] DeserializeIdentity -> DEBU 6d7 Obtaining identity" +"2019-04-22 06:16:46.837 UTC [msp.identity] newIdentity -> DEBU 6d8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.838 UTC [cauthdsl] func1 -> DEBU 6d9 0xc00049fa90 gate 1555913806838715000 evaluation starts" +"2019-04-22 06:16:46.838 UTC [cauthdsl] func2 -> DEBU 6da 0xc00049fa90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.838 UTC [cauthdsl] func2 -> DEBU 6db 0xc00049fa90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.839 UTC [cauthdsl] func2 -> DEBU 6dc 0xc00049fa90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:46.839 UTC [cauthdsl] func2 -> DEBU 6dd 0xc00049fa90 principal evaluation fails" +"2019-04-22 06:16:46.839 UTC [cauthdsl] func1 -> DEBU 6de 0xc00049fa90 gate 1555913806838715000 evaluation fails" +"2019-04-22 06:16:46.839 UTC [policies] Evaluate -> DEBU 6df Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.839 UTC [policies] Evaluate -> DEBU 6e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.840 UTC [policies] Evaluate -> DEBU 6e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:46.840 UTC [cauthdsl] func1 -> DEBU 6e2 0xc00021ec80 gate 1555913806840148900 evaluation starts" +"2019-04-22 06:16:46.840 UTC [cauthdsl] func2 -> DEBU 6e3 0xc00021ec80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.840 UTC [cauthdsl] func2 -> DEBU 6e4 0xc00021ec80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.840 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 6e5 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:46.841 UTC [msp] Validate -> DEBU 6e6 MSP Org1MSP validating identity" +"2019-04-22 06:16:46.841 UTC [msp] getCertificationChain -> DEBU 6e7 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:46.842 UTC [cauthdsl] func2 -> DEBU 6e8 0xc00021ec80 principal matched by identity 0" +"2019-04-22 06:16:46.842 UTC [msp.identity] Verify -> DEBU 6e9 Verify: digest = 00000000 01 f6 56 8f 75 d1 99 35 9b 24 a2 eb 11 06 57 0a |..V.u..5.$....W.| +00000010 f8 7c 1a a4 92 8d b6 c9 54 b8 b0 a2 14 44 c5 93 |.|......T....D..|" +"2019-04-22 06:16:46.842 UTC [msp.identity] Verify -> DEBU 6ea Verify: sig = 00000000 30 45 02 21 00 99 50 cf fe a1 f2 a9 87 a2 1f 2b |0E.!..P........+| +00000010 83 60 42 87 bc 72 fc d2 58 a7 80 5e 27 1e 0f 5b |.`B..r..X..^'..[| +00000020 0c d8 39 9a 0c 02 20 6e 32 53 c7 0d fb 85 1f 9b |..9... n2S......| +00000030 23 eb 74 a9 c8 12 a4 de 90 65 34 0e 28 73 23 35 |#.t......e4.(s#5| +00000040 09 7e 96 92 a8 5b a8 |.~...[.|" +"2019-04-22 06:16:46.842 UTC [cauthdsl] func2 -> DEBU 6eb 0xc00021ec80 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.842 UTC [cauthdsl] func1 -> DEBU 6ec 0xc00021ec80 gate 1555913806840148900 evaluation succeeds" +"2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6ed Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6ef Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:46.843 UTC [policies] Evaluate -> DEBU 6f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:46.844 UTC [gossip.gossip] JoinChan -> INFO 6f1 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:16:46.844 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f2 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:16:46.845 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f3 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:16:46.845 UTC [gossip.gossip] learnAnchorPeers -> INFO 6f4 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:16:46.845 UTC [gossip.discovery] Connect -> DEBU 6f5 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-04-22 06:16:46.845 UTC [gossip.discovery] Connect -> DEBU 6f6 Exiting" +"2019-04-22 06:16:46.845 UTC [gossip.service] updateEndpoints -> DEBU 6f7 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-04-22 06:16:46.846 UTC [peer] updateTrustedRoots -> DEBU 6f8 Updating trusted root authorities for channel businesschannel" +"2019-04-22 06:16:46.846 UTC [grpc] DialContext -> DEBU 6f9 parsed scheme: """ +"2019-04-22 06:16:46.846 UTC [grpc] DialContext -> DEBU 6fa scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:46.846 UTC [grpc] NewAddress -> DEBU 6fb ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-04-22 06:16:46.846 UTC [grpc] switchBalancer -> DEBU 6fc ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:46.846 UTC [grpc] HandleSubConnStateChange -> DEBU 6fd pickfirstBalancer: HandleSubConnStateChange: 0xc000317c00, CONNECTING" +"2019-04-22 06:16:46.851 UTC [grpc] HandleSubConnStateChange -> DEBU 6fe pickfirstBalancer: HandleSubConnStateChange: 0xc000317c00, READY" +"2019-04-22 06:16:46.854 UTC [msp.identity] Sign -> DEBU 6ff Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:46.854 UTC [msp.identity] Sign -> DEBU 700 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:46.855 UTC [gossip.comm] authenticateRemotePeer -> DEBU 701 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +"2019-04-22 06:16:46.859 UTC [gossip.comm] authenticateRemotePeer -> DEBU 702 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +"2019-04-22 06:16:46.859 UTC [msp] DeserializeIdentity -> DEBU 703 Obtaining identity" +"2019-04-22 06:16:46.859 UTC [msp] DeserializeIdentity -> DEBU 704 Obtaining identity" +"2019-04-22 06:16:46.860 UTC [msp.identity] newIdentity -> DEBU 705 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.861 UTC [msp] Validate -> DEBU 706 MSP Org2MSP validating identity" +"2019-04-22 06:16:46.862 UTC [msp] getCertificationChain -> DEBU 707 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.862 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 708 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:46.863 UTC [msp] DeserializeIdentity -> DEBU 709 Obtaining identity" +"2019-04-22 06:16:46.864 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:46.864 UTC [msp] DeserializeIdentity -> DEBU 70b Obtaining identity" +"2019-04-22 06:16:46.866 UTC [msp] DeserializeIdentity -> DEBU 70c Obtaining identity" +"2019-04-22 06:16:46.866 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 70d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:46.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.866 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 70f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.867 UTC [policies] Evaluate -> DEBU 710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:46.867 UTC [policies] Evaluate -> DEBU 711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.867 UTC [peer] buildTrustedRootsForChain -> DEBU 712 updating root CAs for channel [businesschannel]" +"2019-04-22 06:16:46.867 UTC [peer] buildTrustedRootsForChain -> DEBU 714 adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:16:46.867 UTC [peer] buildTrustedRootsForChain -> DEBU 715 adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:16:46.868 UTC [peer] buildTrustedRootsForChain -> DEBU 716 adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:16:46.867 UTC [policies] Evaluate -> DEBU 713 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:46.869 UTC [cauthdsl] func1 -> DEBU 717 0xc000329660 gate 1555913806868997300 evaluation starts" +"2019-04-22 06:16:46.869 UTC [cauthdsl] func2 -> DEBU 718 0xc000329660 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.869 UTC [cauthdsl] func2 -> DEBU 719 0xc000329660 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.869 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 71a Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:16:46.869 UTC [committer.txvalidator] validateTx -> DEBU 71b config transaction received for chain businesschannel" +"2019-04-22 06:16:46.870 UTC [committer.txvalidator] validateTx -> DEBU 71c [businesschannel] validateTx completes for block 0xc0033e7e00 env 0xc003357cc0 txn 0" +"2019-04-22 06:16:46.870 UTC [committer.txvalidator] Validate -> DEBU 71e got result for idx 0, code 0" +"2019-04-22 06:16:46.870 UTC [committer.txvalidator] Validate -> INFO 71f [businesschannel] Validated block [2] in 126ms" +"2019-04-22 06:16:46.870 UTC [gossip.privdata] listMissingPrivateData -> DEBU 720 Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:16:46.869 UTC [msp] Validate -> DEBU 71d MSP Org2MSP validating identity" +"2019-04-22 06:16:46.871 UTC [msp] getCertificationChain -> DEBU 721 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.871 UTC [cauthdsl] func2 -> DEBU 722 0xc000329660 principal matched by identity 0" +"2019-04-22 06:16:46.871 UTC [msp.identity] Verify -> DEBU 723 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:16:46.871 UTC [msp.identity] Verify -> DEBU 724 Verify: sig = 00000000 30 45 02 21 00 90 8d 0f 76 e1 0e 19 5a 2a a5 a8 |0E.!....v...Z*..| +00000010 2a 75 32 8c 96 d2 be 28 cd 64 94 8f 31 30 b0 df |*u2....(.d..10..| +00000020 2a 54 8f 33 7e 02 20 6f 09 78 39 2b 7d 25 75 1e |*T.3~. o.x9+}%u.| +00000030 97 7f 27 47 d7 18 90 ae c6 e1 b9 d4 03 95 8d 99 |..'G............| +00000040 d3 a8 a0 b1 49 f2 d7 |....I..|" +"2019-04-22 06:16:46.872 UTC [cauthdsl] func2 -> DEBU 725 0xc000329660 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.872 UTC [cauthdsl] func1 -> DEBU 726 0xc000329660 gate 1555913806868997300 evaluation succeeds" +"2019-04-22 06:16:46.872 UTC [policies] Evaluate -> DEBU 727 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.872 UTC [policies] Evaluate -> DEBU 728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.872 UTC [policies] Evaluate -> DEBU 729 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:46.873 UTC [policies] Evaluate -> DEBU 72a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:46.873 UTC [gossip.comm] authenticateRemotePeer -> DEBU 72b Authenticated 192.168.224.8:7051" +"2019-04-22 06:16:46.873 UTC [msp] DeserializeIdentity -> DEBU 72c Obtaining identity" +"2019-04-22 06:16:46.873 UTC [msp] DeserializeIdentity -> DEBU 72d Obtaining identity" +"2019-04-22 06:16:46.873 UTC [msp.identity] newIdentity -> DEBU 72e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-04-22 06:16:46.874 UTC [msp.identity] Sign -> DEBU 72f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151010 " +"2019-04-22 06:16:46.874 UTC [msp.identity] Sign -> DEBU 730 Sign: digest: 1250EC7C87C9970775A80227639D533F13572B72A5C341719C13F9369B5EF15E " +"2019-04-22 06:16:46.875 UTC [msp.identity] Sign -> DEBU 731 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:46.875 UTC [msp.identity] Sign -> DEBU 732 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:46.876 UTC [msp] DeserializeIdentity -> DEBU 733 Obtaining identity" +"2019-04-22 06:16:46.876 UTC [gossip.comm] Send -> DEBU 734 Entering, sending GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:46.876 UTC [gossip.comm] sendToEndpoint -> DEBU 735 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.876 UTC [gossip.comm] createConnection -> DEBU 736 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:46.877 UTC [grpc] DialContext -> DEBU 737 parsed scheme: """ +"2019-04-22 06:16:46.880 UTC [grpc] DialContext -> DEBU 73a scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:46.880 UTC [grpc] NewAddress -> DEBU 73b ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-04-22 06:16:46.880 UTC [grpc] switchBalancer -> DEBU 73c ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:46.880 UTC [grpc] HandleSubConnStateChange -> DEBU 73d pickfirstBalancer: HandleSubConnStateChange: 0xc002259470, CONNECTING" +"2019-04-22 06:16:46.870 UTC [gossip.privdata] StoreBlock -> DEBU 738 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:16:46.880 UTC [committer] preCommit -> DEBU 73e Received configuration update, calling CSCC ConfigUpdate" +"2019-04-22 06:16:46.881 UTC [kvledger] CommitWithPvtData -> DEBU 73f [businesschannel] Validating state for block [2]" +"2019-04-22 06:16:46.881 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 740 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:16:46.881 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 741 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:16:46.881 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 742 Validating new block with num trans = [1]" +"2019-04-22 06:16:46.881 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 743 ValidateAndPrepareBatch() for block number = [2]" +"2019-04-22 06:16:46.881 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 744 preprocessing ProtoBlock..." +"2019-04-22 06:16:46.881 UTC [valimpl] preprocessProtoBlock -> DEBU 745 txType=CONFIG" +"2019-04-22 06:16:46.881 UTC [valimpl] processNonEndorserTx -> DEBU 746 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-04-22 06:16:46.881 UTC [valimpl] processNonEndorserTx -> DEBU 747 Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-04-22 06:16:46.879 UTC [grpc] infof -> DEBU 739 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:46.882 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 748 constructing new tx simulator" +"2019-04-22 06:16:46.882 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 749 constructing new tx simulator txid = []" +"2019-04-22 06:16:46.883 UTC [peer] GenerateSimulationResults -> DEBU 74a Processing CONFIG" +"2019-04-22 06:16:46.884 UTC [peer] processChannelConfigTx -> DEBU 74b channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-04-22 06:16:46.884 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 74c Simulation completed, getting simulation results" +"2019-04-22 06:16:46.884 UTC [lockbasedtxmgr] Done -> DEBU 74d Done with transaction simulation / query execution []" +"2019-04-22 06:16:46.885 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 74e Block [2] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-04-22 06:16:46.886 UTC [valinternal] ApplyWriteSet -> DEBU 74f txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00254abc0)}" +"2019-04-22 06:16:46.886 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 750 validating rwset..." +"2019-04-22 06:16:46.886 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 751 postprocessing ProtoBlock..." +"2019-04-22 06:16:46.886 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 752 ValidateAndPrepareBatch() complete" +"2019-04-22 06:16:46.886 UTC [kvledger] CommitWithPvtData -> DEBU 753 [businesschannel] Committing block [2] to storage" +"2019-04-22 06:16:46.887 UTC [ledgerstorage] CommitWithPvtData -> DEBU 754 Writing block [2] to pvt block store" +"2019-04-22 06:16:46.888 UTC [grpc] HandleSubConnStateChange -> DEBU 755 pickfirstBalancer: HandleSubConnStateChange: 0xc002259470, READY" +"2019-04-22 06:16:46.891 UTC [msp.identity] Sign -> DEBU 756 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:46.891 UTC [msp.identity] Sign -> DEBU 757 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:46.891 UTC [pvtdatastorage] Prepare -> DEBU 758 Saved 0 private data write sets for block [2]" +"2019-04-22 06:16:46.891 UTC [gossip.comm] authenticateRemotePeer -> DEBU 759 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +"2019-04-22 06:16:46.896 UTC [gossip.comm] authenticateRemotePeer -> DEBU 75a Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +"2019-04-22 06:16:46.896 UTC [msp] DeserializeIdentity -> DEBU 75b Obtaining identity" +"2019-04-22 06:16:46.896 UTC [msp] Validate -> DEBU 75c MSP Org2MSP validating identity" +"2019-04-22 06:16:46.897 UTC [fsblkstorage] indexBlock -> DEBU 75d Indexing block [blockNum=2, blockHash=[]byte{0x6d, 0x11, 0xeb, 0x2e, 0x10, 0x1a, 0x3a, 0x96, 0x4e, 0x56, 0x1f, 0x50, 0xec, 0x8f, 0x61, 0x8, 0xef, 0x5f, 0xdb, 0x7f, 0x99, 0x66, 0x87, 0x9e, 0x99, 0xf2, 0xec, 0x93, 0xf6, 0xb8, 0x20, 0x1c} txOffsets= +txId= locPointer=offset=71, bytesLength=22738 +]" +"2019-04-22 06:16:46.897 UTC [fsblkstorage] indexBlock -> DEBU 75e txid [] is a duplicate of a previous tx. Not indexing in txid-index" +"2019-04-22 06:16:46.897 UTC [fsblkstorage] indexBlock -> DEBU 75f Adding txLoc [fileSuffixNum=0, offset=47700, bytesLength=22738] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-04-22 06:16:46.898 UTC [msp] getCertificationChain -> DEBU 760 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.898 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 761 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:46.899 UTC [msp] DeserializeIdentity -> DEBU 762 Obtaining identity" +"2019-04-22 06:16:46.899 UTC [fsblkstorage] updateCheckpoint -> DEBU 763 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[71375], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-04-22 06:16:46.899 UTC [pvtdatastorage] Commit -> DEBU 764 Committing private data for block [2]" +"2019-04-22 06:16:46.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 765 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:46.900 UTC [msp] DeserializeIdentity -> DEBU 766 Obtaining identity" +"2019-04-22 06:16:46.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 767 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:46.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 768 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.901 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 769 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.901 UTC [policies] Evaluate -> DEBU 76a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:46.901 UTC [policies] Evaluate -> DEBU 76b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.901 UTC [policies] Evaluate -> DEBU 76c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:46.901 UTC [cauthdsl] func1 -> DEBU 76d 0xc0022d9750 gate 1555913806901899800 evaluation starts" +"2019-04-22 06:16:46.901 UTC [cauthdsl] func2 -> DEBU 76e 0xc0022d9750 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.901 UTC [cauthdsl] func2 -> DEBU 76f 0xc0022d9750 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.902 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 770 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:16:46.902 UTC [msp] Validate -> DEBU 771 MSP Org2MSP validating identity" +"2019-04-22 06:16:46.902 UTC [msp] getCertificationChain -> DEBU 772 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:46.903 UTC [cauthdsl] func2 -> DEBU 773 0xc0022d9750 principal matched by identity 0" +"2019-04-22 06:16:46.903 UTC [pvtdatastorage] Commit -> DEBU 774 Committed private data for block [2]" +"2019-04-22 06:16:46.903 UTC [msp.identity] Verify -> DEBU 775 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:16:46.904 UTC [kvledger] CommitWithPvtData -> DEBU 776 [businesschannel] Committing block [2] transactions to state database" +"2019-04-22 06:16:46.904 UTC [lockbasedtxmgr] Commit -> DEBU 777 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:16:46.904 UTC [lockbasedtxmgr] Commit -> DEBU 778 Committing updates to state database" +"2019-04-22 06:16:46.904 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 779 Building the expiry schedules based on the update batch" +"2019-04-22 06:16:46.905 UTC [lockbasedtxmgr] Commit -> DEBU 77b Write lock acquired for committing updates to state database" +"2019-04-22 06:16:46.905 UTC [stateleveldb] ApplyUpdates -> DEBU 77c Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-04-22 06:16:46.904 UTC [msp.identity] Verify -> DEBU 77a Verify: sig = 00000000 30 44 02 20 62 54 e2 cc a1 34 15 76 ea 67 e9 66 |0D. bT...4.v.g.f| +00000010 ab 67 e1 a0 ee 00 ef 67 70 6d 7e 89 10 47 84 de |.g.....gpm~..G..| +00000020 b6 d3 86 12 02 20 01 0a a9 b4 30 1b 25 30 de 95 |..... ....0.%0..| +00000030 c8 63 a2 66 c8 46 0e 05 1e 7f f3 c0 06 b5 7e ca |.c.f.F........~.| +00000040 00 c5 16 44 a4 e0 |...D..|" +"2019-04-22 06:16:46.906 UTC [cauthdsl] func2 -> DEBU 77d 0xc0022d9750 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.906 UTC [cauthdsl] func1 -> DEBU 77e 0xc0022d9750 gate 1555913806901899800 evaluation succeeds" +"2019-04-22 06:16:46.906 UTC [policies] Evaluate -> DEBU 77f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.907 UTC [policies] Evaluate -> DEBU 780 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.907 UTC [policies] Evaluate -> DEBU 781 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:46.907 UTC [policies] Evaluate -> DEBU 782 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:46.907 UTC [gossip.comm] authenticateRemotePeer -> DEBU 783 Authenticated 192.168.224.8:7051" +"2019-04-22 06:16:46.908 UTC [gossip.comm] createConnection -> DEBU 784 Exiting" +"2019-04-22 06:16:46.908 UTC [gossip.comm] sendToEndpoint -> DEBU 785 Exiting" +"2019-04-22 06:16:46.909 UTC [lockbasedtxmgr] Commit -> DEBU 786 Updates committed to state database and the write lock is released" +"2019-04-22 06:16:46.909 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 787 Preparing potential purge list working-set for expiringAtBlk [3]" +"2019-04-22 06:16:46.909 UTC [leveldbhelper] GetIterator -> DEBU 788 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +"2019-04-22 06:16:46.909 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 789 No expiry entry found for expiringAtBlk [3]" +"2019-04-22 06:16:46.910 UTC [lockbasedtxmgr] func1 -> DEBU 78a launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:16:46.910 UTC [kvledger] CommitWithPvtData -> DEBU 78b [businesschannel] Committing block [2] transactions to history database" +"2019-04-22 06:16:46.910 UTC [historyleveldb] Commit -> DEBU 78c Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +"2019-04-22 06:16:46.911 UTC [historyleveldb] Commit -> DEBU 78d Skipping transaction [0] since it is not an endorsement transaction" +"2019-04-22 06:16:46.912 UTC [gossip.pull] Hello -> DEBU 78e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:46.912 UTC [gossip.comm] Send -> DEBU 78f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 790 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.913 UTC [gossip.comm] createConnection -> DEBU 791 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:46.914 UTC [grpc] DialContext -> DEBU 792 parsed scheme: """ +"2019-04-22 06:16:46.915 UTC [grpc] DialContext -> DEBU 793 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:46.915 UTC [historyleveldb] Commit -> DEBU 794 Channel [businesschannel]: Updates committed to history database for blockNo [2]" +"2019-04-22 06:16:46.915 UTC [kvledger] CommitWithPvtData -> INFO 795 [businesschannel] Committed block [2] with 1 transaction(s) in 34ms (state_validation=5ms block_commit=17ms state_commit=6ms)" +"2019-04-22 06:16:46.915 UTC [grpc] NewAddress -> DEBU 796 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-04-22 06:16:46.916 UTC [grpc] switchBalancer -> DEBU 799 ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:46.916 UTC [msp.identity] Sign -> DEBU 79a Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020803 " +"2019-04-22 06:16:46.917 UTC [msp.identity] Sign -> DEBU 79b Sign: digest: 6059121B8483FCD27325D7BF52C7DD1AB6157EFA82B30E9F7AB971FF972DA4F4 " +"2019-04-22 06:16:46.917 UTC [gossip.state] commitBlock -> DEBU 79c [businesschannel] Committed block [2] with 1 transaction(s)" +"2019-04-22 06:16:46.915 UTC [msp.identity] Sign -> DEBU 797 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151011 " +"2019-04-22 06:16:46.917 UTC [msp.identity] Sign -> DEBU 79d Sign: digest: 22A1A57694F45418A97B3FE640CECD9F8DF7F7C8D689224317FF420B3F987371 " +"2019-04-22 06:16:46.918 UTC [msp.identity] Sign -> DEBU 79e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:46.918 UTC [msp.identity] Sign -> DEBU 79f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:46.918 UTC [grpc] HandleSubConnStateChange -> DEBU 7a0 pickfirstBalancer: HandleSubConnStateChange: 0xc002486840, CONNECTING" +"2019-04-22 06:16:46.918 UTC [gossip.comm] Send -> DEBU 7a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:46.918 UTC [gossip.comm] sendToEndpoint -> DEBU 7a2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.916 UTC [gossip.comm] func1 -> DEBU 798 Got message: GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.919 UTC [gossip.gossip] handleMessage -> DEBU 7a3 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.919 UTC [gossip.gossip] handleMessage -> DEBU 7a4 Exiting" +"2019-04-22 06:16:46.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7a5 Got message: GossipMessage: Channel: , nonce: 2812421211200578158, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.919 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7a6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:46.919 UTC [msp.identity] Verify -> DEBU 7a7 Verify: digest = 00000000 12 50 ec 7c 87 c9 97 07 75 a8 02 27 63 9d 53 3f |.P.|....u..'c.S?| +00000010 13 57 2b 72 a5 c3 41 71 9c 13 f9 36 9b 5e f1 5e |.W+r..Aq...6.^.^|" +"2019-04-22 06:16:46.920 UTC [msp.identity] Verify -> DEBU 7a8 Verify: sig = 00000000 30 45 02 21 00 dd bb d7 ca 17 47 2c c0 d2 30 3c |0E.!......G,..0<| +00000010 cb 9d f7 aa f9 3f 8a 24 3c 6d 4b 08 aa 4c bd 83 |.....?.$]L..S.,.| +00000030 08 c2 e2 6a ce c7 b3 d7 86 f9 36 f5 9f df 0a 4f |...j......6....O| +00000040 00 9b 68 96 ad fc 93 |..h....|" +"2019-04-22 06:16:46.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 7a9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:46.920 UTC [gossip.discovery] isSentByMe -> DEBU 7aa Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:16 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:46.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ab Exiting" +"2019-04-22 06:16:46.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7ac Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:46.921 UTC [msp.identity] Verify -> DEBU 7ad Verify: digest = 00000000 8d 76 57 8c b6 3c 1f dd a3 67 4f 3c 84 05 cb 50 |.vW..<...gO<...P| +00000010 76 ed b4 dc 66 16 c4 a5 57 b9 95 f2 43 58 5a 3c |v...f...W...CXZ<|" +"2019-04-22 06:16:46.921 UTC [msp.identity] Verify -> DEBU 7ae Verify: sig = 00000000 30 45 02 21 00 a0 65 4c 71 a3 4f 30 3b ed 35 bc |0E.!..eLq.O0;.5.| +00000010 a0 36 7c 07 3b 09 64 99 56 53 b7 92 e4 dc d2 26 |.6|.;.d.VS.....&| +00000020 12 60 18 a9 00 02 20 60 18 2d a6 39 06 33 ab ba |.`.... `.-.9.3..| +00000030 a7 f0 a1 96 7a 58 eb 6a 4a eb 92 65 48 3d 9c 03 |....zX.jJ..eH=..| +00000040 e6 c5 5f 4a c9 1d 1c |.._J...|" +"2019-04-22 06:16:46.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 7af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:46.921 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b1 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 " +"2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 " +"2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:10 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:46.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 7b4 Exiting" +"2019-04-22 06:16:46.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 7b5 Exiting" +"2019-04-22 06:16:46.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7b6 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:46.922 UTC [msp] DeserializeIdentity -> DEBU 7b7 Obtaining identity" +"2019-04-22 06:16:46.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:46.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7b9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7ba Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:46.923 UTC [policies] Evaluate -> DEBU 7bb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:46.923 UTC [policies] Evaluate -> DEBU 7bc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:46.924 UTC [policies] Evaluate -> DEBU 7bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:46.924 UTC [cauthdsl] func1 -> DEBU 7be 0xc002536940 gate 1555913806924412300 evaluation starts" +"2019-04-22 06:16:46.924 UTC [cauthdsl] func2 -> DEBU 7bf 0xc002536940 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:46.925 UTC [cauthdsl] func2 -> DEBU 7c0 0xc002536940 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:46.925 UTC [cauthdsl] func2 -> DEBU 7c1 0xc002536940 principal matched by identity 0" +"2019-04-22 06:16:46.925 UTC [msp.identity] Verify -> DEBU 7c2 Verify: digest = 00000000 7a 86 ad 70 ec 83 fd 7f 78 60 fb 6c c4 be 15 97 |z..p....x`.l....| +00000010 51 9a 14 86 97 84 3f a8 ac 45 26 61 60 c3 8f e1 |Q.....?..E&a`...|" +"2019-04-22 06:16:46.925 UTC [msp.identity] Verify -> DEBU 7c3 Verify: sig = 00000000 30 44 02 20 5f 3c 13 52 f5 3f 17 83 c0 83 ac 05 |0D. _<.R.?......| +00000010 ba 61 01 94 34 6b cb f9 6e 5f d2 a2 62 de 19 44 |.a..4k..n_..b..D| +00000020 af c6 2c a6 02 20 15 59 63 a5 51 fc 69 27 e9 4b |..,.. .Yc.Q.i'.K| +00000030 26 c5 0e 04 49 7f e5 3e 1b 57 ae 67 b1 53 f1 82 |&...I..>.W.g.S..| +00000040 cc a6 15 1c d9 c9 |......|" +"2019-04-22 06:16:46.926 UTC [cauthdsl] func2 -> DEBU 7c4 0xc002536940 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:46.926 UTC [cauthdsl] func1 -> DEBU 7c5 0xc002536940 gate 1555913806924412300 evaluation succeeds" +"2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c8 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:46.927 UTC [policies] Evaluate -> DEBU 7c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:46.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ca Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:46.928 UTC [gossip.discovery] learnNewMembers -> DEBU 7cb Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +"2019-04-22 06:16:46.928 UTC [gossip.discovery] learnNewMembers -> DEBU 7cc Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:46.928 UTC [gossip.discovery] learnNewMembers -> DEBU 7cd Exiting" +"2019-04-22 06:16:46.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 7ce Exiting" +"2019-04-22 06:16:46.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7cf Exiting" +"2019-04-22 06:16:46.931 UTC [grpc] HandleSubConnStateChange -> DEBU 7d0 pickfirstBalancer: HandleSubConnStateChange: 0xc002486840, READY" +"2019-04-22 06:16:46.933 UTC [msp.identity] Sign -> DEBU 7d1 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:46.933 UTC [msp.identity] Sign -> DEBU 7d2 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:46.933 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d3 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:7051" +"2019-04-22 06:16:46.934 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d4 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:7051" +"2019-04-22 06:16:46.937 UTC [msp.identity] Verify -> DEBU 7d5 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:16:46.937 UTC [msp.identity] Verify -> DEBU 7d6 Verify: sig = 00000000 30 45 02 21 00 de 07 f7 58 8f 6e be 26 43 85 81 |0E.!....X.n.&C..| +00000010 94 87 aa b3 b7 f1 38 54 98 16 8b 83 56 ea 42 77 |......8T....V.Bw| +00000020 6c 4d ef 10 96 02 20 67 54 66 04 83 18 8c fa 2e |lM.... gTf......| +00000030 c7 1c 9d 4c 35 22 86 ad e4 49 6a a2 75 5e 11 f8 |...L5"...Ij.u^..| +00000040 ff 03 29 1f ac f7 b2 |..)....|" +"2019-04-22 06:16:46.937 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7d7 Authenticated 192.168.224.5:7051" +"2019-04-22 06:16:46.938 UTC [gossip.comm] createConnection -> DEBU 7d8 Exiting" +"2019-04-22 06:16:46.939 UTC [gossip.comm] sendToEndpoint -> DEBU 7d9 Exiting" +"2019-04-22 06:16:46.939 UTC [gossip.comm] sendToEndpoint -> DEBU 7da Exiting" +"2019-04-22 06:16:46.942 UTC [gossip.comm] func1 -> DEBU 7db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9139101219121245228 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.943 UTC [gossip.gossip] handleMessage -> DEBU 7dc Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9139101219121245228 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.944 UTC [gossip.pull] HandleMessage -> DEBU 7dd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9139101219121245228 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 84 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.944 UTC [gossip.gossip] handleMessage -> DEBU 7de Exiting" +"2019-04-22 06:16:46.945 UTC [gossip.comm] func1 -> DEBU 7df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.946 UTC [gossip.gossip] handleMessage -> DEBU 7e0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:46.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 7e2 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:46.947 UTC [msp.identity] Verify -> DEBU 7e3 Verify: digest = 00000000 22 a1 a5 76 94 f4 54 18 a9 7b 3f e6 40 ce cd 9f |"..v..T..{?.@...| +00000010 8d f7 f7 c8 d6 89 22 43 17 ff 42 0b 3f 98 73 71 |......"C..B.?.sq|" +"2019-04-22 06:16:46.948 UTC [msp.identity] Verify -> DEBU 7e4 Verify: sig = 00000000 30 44 02 20 25 c4 ad c3 45 f8 cb 65 8d 71 66 1a |0D. %...E..e.qf.| +00000010 9c ee 83 9a 64 fa 59 42 ef 5d 1c 2c 96 cd 2a 9b |....d.YB.].,..*.| +00000020 a6 29 d3 4f 02 20 5f 7e f7 31 dd fb 3b 77 2d 57 |.).O. _~.1..;w-W| +00000030 72 25 da 10 60 24 5d 1d 7b fb 8a 03 24 a1 3b 90 |r%..`$].{...$.;.| +00000040 7e 1d b9 51 17 0d |~..Q..|" +"2019-04-22 06:16:46.948 UTC [msp.identity] Verify -> DEBU 7e5 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:16:46.948 UTC [msp.identity] Verify -> DEBU 7e6 Verify: sig = 00000000 30 44 02 20 4c 39 15 01 c9 ac c7 09 b6 c9 bb 40 |0D. L9.........@| +00000010 9d 9a 91 fc d5 3b 14 70 f1 36 0e 10 8a 09 ff d1 |.....;.p.6......| +00000020 e2 c0 95 49 02 20 53 02 11 c7 b1 3c 72 a2 b9 af |...I. S.... DEBU 7e7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:46.949 UTC [gossip.discovery] isSentByMe -> DEBU 7e8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:46.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 7e9 Exiting" +"2019-04-22 06:16:46.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7ea Exiting" +"2019-04-22 06:16:46.947 UTC [gossip.gossip] handleMessage -> DEBU 7eb Exiting" +"2019-04-22 06:16:47.053 UTC [comm.grpc.server] 1 -> INFO 7ec unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.053Z grpc.peer_address=192.168.224.8:55136 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144.4µs +"2019-04-22 06:16:47.056 UTC [msp.identity] Sign -> DEBU 7ed Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:47.056 UTC [msp.identity] Sign -> DEBU 7ee Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:47.057 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.8:55136" +"2019-04-22 06:16:47.058 UTC [gossip.comm] authenticateRemotePeer -> DEBU 7f0 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55136" +"2019-04-22 06:16:47.058 UTC [msp] DeserializeIdentity -> DEBU 7f1 Obtaining identity" +"2019-04-22 06:16:47.058 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.058 UTC [msp] DeserializeIdentity -> DEBU 7f3 Obtaining identity" +"2019-04-22 06:16:47.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.059 UTC [msp] DeserializeIdentity -> DEBU 7f5 Obtaining identity" +"2019-04-22 06:16:47.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 7f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7f7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 7f8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.060 UTC [policies] Evaluate -> DEBU 7f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.060 UTC [policies] Evaluate -> DEBU 7fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.060 UTC [policies] Evaluate -> DEBU 7fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.061 UTC [cauthdsl] func1 -> DEBU 7fc 0xc0026655e0 gate 1555913807061199500 evaluation starts" +"2019-04-22 06:16:47.061 UTC [cauthdsl] func2 -> DEBU 7fd 0xc0026655e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.061 UTC [cauthdsl] func2 -> DEBU 7fe 0xc0026655e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.061 UTC [cauthdsl] func2 -> DEBU 7ff 0xc0026655e0 principal matched by identity 0" +"2019-04-22 06:16:47.061 UTC [msp.identity] Verify -> DEBU 800 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:16:47.062 UTC [msp.identity] Verify -> DEBU 801 Verify: sig = 00000000 30 44 02 20 6d 50 50 d4 f6 38 1c aa 8a d8 c8 fa |0D. mPP..8......| +00000010 c6 5c 2c d2 96 ec e2 f7 e1 3a 6f 7e cd 78 d7 b3 |.\,......:o~.x..| +00000020 10 43 1d 54 02 20 3d 60 46 e4 7e d2 e2 6e f8 34 |.C.T. =`F.~..n.4| +00000030 06 3b a2 55 d4 d8 1c 88 93 a1 a1 5a 66 f7 d0 8a |.;.U.......Zf...| +00000040 dc e7 7b a1 2a bd |..{.*.|" +"2019-04-22 06:16:47.064 UTC [cauthdsl] func2 -> DEBU 802 0xc0026655e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.065 UTC [cauthdsl] func1 -> DEBU 803 0xc0026655e0 gate 1555913807061199500 evaluation succeeds" +"2019-04-22 06:16:47.065 UTC [policies] Evaluate -> DEBU 804 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.065 UTC [policies] Evaluate -> DEBU 805 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.066 UTC [policies] Evaluate -> DEBU 806 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.066 UTC [policies] Evaluate -> DEBU 807 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.066 UTC [gossip.comm] authenticateRemotePeer -> DEBU 808 Authenticated 192.168.224.8:55136" +"2019-04-22 06:16:47.066 UTC [gossip.comm] GossipStream -> DEBU 809 Servicing 192.168.224.8:55136" +"2019-04-22 06:16:47.066 UTC [gossip.comm] writeToStream -> DEBU 80a Closing writing to stream" +"2019-04-22 06:16:47.066 UTC [gossip.comm] serviceConnection -> DEBU 80b Closing reading from stream" +"2019-04-22 06:16:47.067 UTC [grpc] infof -> DEBU 80c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:47.067 UTC [gossip.comm] readFromStream -> DEBU 80d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-04-22 06:16:47.069 UTC [gossip.comm] readFromStream -> DEBU 80e Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:47.070 UTC [gossip.comm] func2 -> DEBU 80f Client 192.168.224.8:55136 disconnected" +"2019-04-22 06:16:47.070 UTC [comm.grpc.server] 1 -> INFO 810 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.055Z grpc.peer_address=192.168.224.8:55136 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.5207ms +"2019-04-22 06:16:47.071 UTC [gossip.comm] writeToStream -> DEBU 811 Closing writing to stream" +"2019-04-22 06:16:47.073 UTC [grpc] infof -> DEBU 812 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:47.084 UTC [gossip.comm] func1 -> DEBU 813 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:47.084 UTC [gossip.gossip] handleMessage -> DEBU 814 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:47.085 UTC [gossip.gossip] handleMessage -> DEBU 815 Exiting" +"2019-04-22 06:16:47.085 UTC [gossip.discovery] handleMsgFromComm -> DEBU 816 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:47.085 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 817 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:47.085 UTC [msp] DeserializeIdentity -> DEBU 818 Obtaining identity" +"2019-04-22 06:16:47.085 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 819 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 81a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.086 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 81b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.086 UTC [policies] Evaluate -> DEBU 81c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.086 UTC [policies] Evaluate -> DEBU 81d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.087 UTC [policies] Evaluate -> DEBU 81e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.087 UTC [cauthdsl] func1 -> DEBU 81f 0xc0026dd620 gate 1555913807087485700 evaluation starts" +"2019-04-22 06:16:47.087 UTC [cauthdsl] func2 -> DEBU 820 0xc0026dd620 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.088 UTC [cauthdsl] func2 -> DEBU 821 0xc0026dd620 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.088 UTC [cauthdsl] func2 -> DEBU 822 0xc0026dd620 principal matched by identity 0" +"2019-04-22 06:16:47.089 UTC [msp.identity] Verify -> DEBU 823 Verify: digest = 00000000 35 74 0b 48 82 25 af 63 b9 20 bb c3 a8 dd 5a 6f |5t.H.%.c. ....Zo| +00000010 7b e0 07 ba 8e 10 85 ed ee d6 a6 70 e8 64 d2 5c |{..........p.d.\|" +"2019-04-22 06:16:47.089 UTC [msp.identity] Verify -> DEBU 824 Verify: sig = 00000000 30 45 02 21 00 df 37 94 e9 e6 01 7d ae 11 d4 18 |0E.!..7....}....| +00000010 04 b0 fb af 91 0b 68 51 74 18 a6 a9 74 22 97 d6 |......hQt...t"..| +00000020 e5 9a 47 31 d8 02 20 42 04 5b b5 23 fd 2b 16 7f |..G1.. B.[.#.+..| +00000030 cc 38 30 c1 b5 86 ab 5c 51 ea 65 da 5b 98 86 de |.80....\Q.e.[...| +00000040 23 58 f0 1e 35 be d3 |#X..5..|" +"2019-04-22 06:16:47.089 UTC [cauthdsl] func2 -> DEBU 825 0xc0026dd620 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.090 UTC [cauthdsl] func1 -> DEBU 826 0xc0026dd620 gate 1555913807087485700 evaluation succeeds" +"2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 827 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 828 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 829 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.090 UTC [policies] Evaluate -> DEBU 82a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.091 UTC [gossip.discovery] handleAliveMessage -> DEBU 82b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 82c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:16:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 82d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 " +"2019-04-22 06:16:47.091 UTC [gossip.discovery] learnExistingMembers -> DEBU 82e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 " +"2019-04-22 06:16:47.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 82f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:6 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:47.092 UTC [gossip.discovery] learnExistingMembers -> DEBU 830 Exiting" +"2019-04-22 06:16:47.092 UTC [gossip.discovery] handleAliveMessage -> DEBU 831 Exiting" +"2019-04-22 06:16:47.092 UTC [gossip.discovery] handleMsgFromComm -> DEBU 832 Exiting" +"2019-04-22 06:16:47.096 UTC [msp] DeserializeIdentity -> DEBU 833 Obtaining identity" +"2019-04-22 06:16:47.097 UTC [msp] DeserializeIdentity -> DEBU 834 Obtaining identity" +"2019-04-22 06:16:47.097 UTC [msp] DeserializeIdentity -> DEBU 835 Obtaining identity" +"2019-04-22 06:16:47.097 UTC [msp] DeserializeIdentity -> DEBU 836 Obtaining identity" +"2019-04-22 06:16:47.098 UTC [msp] DeserializeIdentity -> DEBU 837 Obtaining identity" +"2019-04-22 06:16:47.098 UTC [gossip.comm] Send -> DEBU 838 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:47.099 UTC [gossip.comm] sendToEndpoint -> DEBU 839 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:47.099 UTC [gossip.comm] createConnection -> DEBU 83a Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:47.102 UTC [comm.grpc.server] 1 -> INFO 83b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.101Z grpc.peer_address=192.168.224.8:55138 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=155.3µs +"2019-04-22 06:16:47.105 UTC [msp.identity] Sign -> DEBU 83c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:47.105 UTC [msp.identity] Sign -> DEBU 83d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:47.106 UTC [gossip.comm] authenticateRemotePeer -> DEBU 83f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:55138" +"2019-04-22 06:16:47.106 UTC [grpc] DialContext -> DEBU 83e parsed scheme: """ +"2019-04-22 06:16:47.106 UTC [grpc] DialContext -> DEBU 840 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:47.106 UTC [grpc] NewAddress -> DEBU 841 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-04-22 06:16:47.109 UTC [grpc] switchBalancer -> DEBU 843 ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:47.110 UTC [grpc] HandleSubConnStateChange -> DEBU 844 pickfirstBalancer: HandleSubConnStateChange: 0xc002769ae0, CONNECTING" +"2019-04-22 06:16:47.107 UTC [gossip.comm] authenticateRemotePeer -> DEBU 842 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55138" +"2019-04-22 06:16:47.111 UTC [msp] DeserializeIdentity -> DEBU 845 Obtaining identity" +"2019-04-22 06:16:47.112 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 846 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.112 UTC [msp] DeserializeIdentity -> DEBU 847 Obtaining identity" +"2019-04-22 06:16:47.113 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 848 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.113 UTC [msp] DeserializeIdentity -> DEBU 849 Obtaining identity" +"2019-04-22 06:16:47.114 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 84a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 84b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.115 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 84c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.115 UTC [policies] Evaluate -> DEBU 84d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.115 UTC [policies] Evaluate -> DEBU 84e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.116 UTC [policies] Evaluate -> DEBU 84f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.116 UTC [cauthdsl] func1 -> DEBU 850 0xc002e79530 gate 1555913807116817600 evaluation starts" +"2019-04-22 06:16:47.118 UTC [cauthdsl] func2 -> DEBU 851 0xc002e79530 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.119 UTC [cauthdsl] func2 -> DEBU 852 0xc002e79530 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.120 UTC [cauthdsl] func2 -> DEBU 853 0xc002e79530 principal matched by identity 0" +"2019-04-22 06:16:47.120 UTC [msp.identity] Verify -> DEBU 854 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:16:47.121 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 45 02 21 00 89 21 4f aa b5 52 53 fc 27 fe 94 |0E.!..!O..RS.'..| +00000010 de 23 09 f0 3f 82 71 68 43 cc 2a 14 6d d0 9e b2 |.#..?.qhC.*.m...| +00000020 9d 27 2f a1 3b 02 20 0d f1 45 2e cb 65 ba 3a cd |.'/.;. ..E..e.:.| +00000030 44 6f e2 cd 4b d9 9a 7c df 5e 44 6e cd 57 61 af |Do..K..|.^Dn.Wa.| +00000040 4e 35 c4 5a 58 52 2f |N5.ZXR/|" +"2019-04-22 06:16:47.123 UTC [cauthdsl] func2 -> DEBU 856 0xc002e79530 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.123 UTC [cauthdsl] func1 -> DEBU 857 0xc002e79530 gate 1555913807116817600 evaluation succeeds" +"2019-04-22 06:16:47.123 UTC [policies] Evaluate -> DEBU 858 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.123 UTC [policies] Evaluate -> DEBU 859 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.124 UTC [grpc] HandleSubConnStateChange -> DEBU 85a pickfirstBalancer: HandleSubConnStateChange: 0xc002769ae0, READY" +"2019-04-22 06:16:47.124 UTC [policies] Evaluate -> DEBU 85b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.125 UTC [policies] Evaluate -> DEBU 85c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.126 UTC [gossip.comm] authenticateRemotePeer -> DEBU 85d Authenticated 192.168.224.8:55138" +"2019-04-22 06:16:47.126 UTC [gossip.comm] GossipStream -> DEBU 85e Servicing 192.168.224.8:55138" +"2019-04-22 06:16:47.127 UTC [gossip.gossip] handleMessage -> DEBU 85f Entering, 192.168.224.8:55138 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:47.127 UTC [gossip.gossip] handleMessage -> DEBU 860 Exiting" +"2019-04-22 06:16:47.128 UTC [msp.identity] Sign -> DEBU 861 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:47.128 UTC [msp.identity] Sign -> DEBU 862 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:47.129 UTC [gossip.comm] authenticateRemotePeer -> DEBU 863 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +"2019-04-22 06:16:47.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU 864 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:47.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU 865 Exiting" +"2019-04-22 06:16:47.133 UTC [gossip.comm] authenticateRemotePeer -> DEBU 866 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +"2019-04-22 06:16:47.133 UTC [gossip.comm] readFromStream -> DEBU 867 Got error, aborting: EOF" +"2019-04-22 06:16:47.134 UTC [gossip.comm] func2 -> DEBU 868 Client 192.168.224.8:55138 disconnected" +"2019-04-22 06:16:47.134 UTC [comm.grpc.server] 1 -> INFO 869 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.8:55138 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=29.2265ms +"2019-04-22 06:16:47.133 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" +"2019-04-22 06:16:47.135 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.135 UTC [msp] DeserializeIdentity -> DEBU 86c Obtaining identity" +"2019-04-22 06:16:47.136 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 86e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.136 UTC [msp] DeserializeIdentity -> DEBU 86f Obtaining identity" +"2019-04-22 06:16:47.137 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 870 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 871 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.137 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 872 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.137 UTC [policies] Evaluate -> DEBU 873 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.138 UTC [policies] Evaluate -> DEBU 874 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.138 UTC [policies] Evaluate -> DEBU 875 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.138 UTC [cauthdsl] func1 -> DEBU 876 0xc002ee5900 gate 1555913807138546100 evaluation starts" +"2019-04-22 06:16:47.138 UTC [cauthdsl] func2 -> DEBU 877 0xc002ee5900 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.138 UTC [cauthdsl] func2 -> DEBU 878 0xc002ee5900 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.139 UTC [cauthdsl] func2 -> DEBU 879 0xc002ee5900 principal matched by identity 0" +"2019-04-22 06:16:47.139 UTC [msp.identity] Verify -> DEBU 87a Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:16:47.139 UTC [msp.identity] Verify -> DEBU 87b Verify: sig = 00000000 30 45 02 21 00 97 0b 8e 45 78 4a a7 b0 bf 2a 17 |0E.!....ExJ...*.| +00000010 1d 83 b1 4e 03 33 2f 6c 07 8f 7a 78 3d a8 63 b3 |...N.3/l..zx=.c.| +00000020 21 10 2b 9b b0 02 20 25 40 37 4b 27 07 62 1a 1f |!.+... %@7K'.b..| +00000030 9e 84 c2 e4 95 fb 56 7d 14 aa 2a 5b 72 c9 19 7c |......V}..*[r..|| +00000040 a8 19 e1 c1 e8 a8 57 |......W|" +"2019-04-22 06:16:47.139 UTC [cauthdsl] func2 -> DEBU 87c 0xc002ee5900 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.140 UTC [cauthdsl] func1 -> DEBU 87d 0xc002ee5900 gate 1555913807138546100 evaluation succeeds" +"2019-04-22 06:16:47.136 UTC [gossip.comm] writeToStream -> DEBU 86d Closing writing to stream" +"2019-04-22 06:16:47.141 UTC [grpc] infof -> DEBU 87e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:47.146 UTC [policies] Evaluate -> DEBU 87f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.146 UTC [policies] Evaluate -> DEBU 880 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.147 UTC [policies] Evaluate -> DEBU 881 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.147 UTC [policies] Evaluate -> DEBU 882 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.147 UTC [gossip.comm] authenticateRemotePeer -> DEBU 883 Authenticated 192.168.224.8:7051" +"2019-04-22 06:16:47.147 UTC [gossip.comm] createConnection -> DEBU 884 Exiting" +"2019-04-22 06:16:47.148 UTC [gossip.comm] sendToEndpoint -> DEBU 885 Exiting" +"2019-04-22 06:16:47.165 UTC [comm.grpc.server] 1 -> INFO 886 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.165Z grpc.peer_address=192.168.224.8:55142 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.8µs +"2019-04-22 06:16:47.169 UTC [msp.identity] Sign -> DEBU 887 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:47.175 UTC [msp.identity] Sign -> DEBU 888 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:47.201 UTC [gossip.comm] func1 -> DEBU 889 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.203 UTC [gossip.comm] authenticateRemotePeer -> DEBU 88b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.8:55142" +"2019-04-22 06:16:47.201 UTC [gossip.gossip] handleMessage -> DEBU 88a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.205 UTC [gossip.pull] HandleMessage -> DEBU 88d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.205 UTC [gossip.pull] SendDigest -> DEBU 88e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:47.206 UTC [gossip.gossip] handleMessage -> DEBU 88f Exiting" +"2019-04-22 06:16:47.204 UTC [gossip.comm] func1 -> DEBU 88c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.208 UTC [gossip.gossip] handleMessage -> DEBU 890 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.208 UTC [gossip.gossip] handleMessage -> DEBU 891 Exiting" +"2019-04-22 06:16:47.208 UTC [gossip.discovery] handleMsgFromComm -> DEBU 892 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.209 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 893 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:47.209 UTC [msp.identity] Verify -> DEBU 894 Verify: digest = 00000000 be 3f 6a d6 63 4b e0 6e 21 99 e8 e4 90 68 d0 57 |.?j.cK.n!....h.W| +00000010 62 b4 27 3a 63 f3 30 22 e6 23 e4 e8 cd e7 42 8f |b.':c.0".#....B.|" +"2019-04-22 06:16:47.209 UTC [msp.identity] Verify -> DEBU 895 Verify: sig = 00000000 30 45 02 21 00 ba 03 da 46 30 5c f6 f0 2d c0 57 |0E.!....F0\..-.W| +00000010 00 bb 4c fd 58 7e a2 eb b7 08 d3 b9 09 cb 4e 1a |..L.X~........N.| +00000020 99 d0 5d a1 e6 02 20 30 f2 78 e9 56 2d 13 2f 59 |..]... 0.x.V-./Y| +00000030 6c b0 cb bb 50 8f 25 76 b1 1f 8c 0b 71 f5 93 30 |l...P.%v....q..0| +00000040 c4 b6 54 2c fa d6 e6 |..T,...|" +"2019-04-22 06:16:47.211 UTC [msp.identity] Verify -> DEBU 896 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:47.211 UTC [msp.identity] Verify -> DEBU 897 Verify: sig = 00000000 30 44 02 20 44 67 0e 45 74 cc a4 f4 26 bf e0 cd |0D. Dg.Et...&...| +00000010 d7 16 3f 7f 72 fa e2 71 39 ec 85 63 9f 9e 77 47 |..?.r..q9..c..wG| +00000020 26 45 d5 8b 02 20 52 17 90 00 81 2f ea 15 62 f6 |&E... R..../..b.| +00000030 41 e2 e0 93 e5 a1 4a 4c f8 ed c5 3f 66 32 0d e5 |A.....JL...?f2..| +00000040 11 17 53 e0 a2 9f |..S...|" +"2019-04-22 06:16:47.211 UTC [gossip.discovery] handleAliveMessage -> DEBU 898 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:47.211 UTC [gossip.discovery] learnExistingMembers -> DEBU 899 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:16:47.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 89a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 " +"2019-04-22 06:16:47.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 89b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 " +"2019-04-22 06:16:47.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 89c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:20 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:47.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 89d Exiting" +"2019-04-22 06:16:47.213 UTC [gossip.discovery] handleAliveMessage -> DEBU 89e Exiting" +"2019-04-22 06:16:47.213 UTC [gossip.discovery] handleMsgFromComm -> DEBU 89f Exiting" +"2019-04-22 06:16:47.213 UTC [gossip.discovery] sendMemResponse -> DEBU 8a0 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:47.213 UTC [msp] DeserializeIdentity -> DEBU 8a1 Obtaining identity" +"2019-04-22 06:16:47.215 UTC [gossip.comm] Send -> DEBU 8a2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:47.217 UTC [gossip.discovery] sendMemResponse -> DEBU 8a3 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:47.218 UTC [gossip.comm] sendToEndpoint -> DEBU 8a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.218 UTC [gossip.comm] sendToEndpoint -> DEBU 8a5 Exiting" +"2019-04-22 06:16:47.229 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8a6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55142" +"2019-04-22 06:16:47.230 UTC [msp] DeserializeIdentity -> DEBU 8a7 Obtaining identity" +"2019-04-22 06:16:47.231 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.231 UTC [msp] DeserializeIdentity -> DEBU 8a9 Obtaining identity" +"2019-04-22 06:16:47.235 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8aa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.236 UTC [msp] DeserializeIdentity -> DEBU 8ab Obtaining identity" +"2019-04-22 06:16:47.236 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8ac Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.236 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8ad Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.237 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8ae Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.237 UTC [policies] Evaluate -> DEBU 8af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.237 UTC [policies] Evaluate -> DEBU 8b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.237 UTC [policies] Evaluate -> DEBU 8b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.238 UTC [cauthdsl] func1 -> DEBU 8b2 0xc002fb0720 gate 1555913807238033200 evaluation starts" +"2019-04-22 06:16:47.238 UTC [cauthdsl] func2 -> DEBU 8b3 0xc002fb0720 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.238 UTC [cauthdsl] func2 -> DEBU 8b4 0xc002fb0720 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.238 UTC [cauthdsl] func2 -> DEBU 8b5 0xc002fb0720 principal matched by identity 0" +"2019-04-22 06:16:47.241 UTC [grpc] infof -> DEBU 8b6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:47.243 UTC [gossip.comm] func1 -> DEBU 8b7 Got message: GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.244 UTC [gossip.gossip] handleMessage -> DEBU 8b8 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.244 UTC [gossip.gossip] handleMessage -> DEBU 8b9 Exiting" +"2019-04-22 06:16:47.245 UTC [gossip.discovery] handleMsgFromComm -> DEBU 8ba Got message: GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.245 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 8bb Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:47.246 UTC [msp] DeserializeIdentity -> DEBU 8bc Obtaining identity" +"2019-04-22 06:16:47.247 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8bd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8be Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 8bf Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.247 UTC [policies] Evaluate -> DEBU 8c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.247 UTC [policies] Evaluate -> DEBU 8c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.248 UTC [policies] Evaluate -> DEBU 8c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.248 UTC [cauthdsl] func1 -> DEBU 8c3 0xc002f454b0 gate 1555913807248438400 evaluation starts" +"2019-04-22 06:16:47.248 UTC [cauthdsl] func2 -> DEBU 8c4 0xc002f454b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.248 UTC [cauthdsl] func2 -> DEBU 8c5 0xc002f454b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.248 UTC [cauthdsl] func2 -> DEBU 8c6 0xc002f454b0 principal matched by identity 0" +"2019-04-22 06:16:47.249 UTC [msp.identity] Verify -> DEBU 8c7 Verify: digest = 00000000 7f 58 8e c5 64 5d 0a 09 f4 20 27 06 2d cd 9a 10 |.X..d]... '.-...| +00000010 2c 8f 13 7a 70 7d 9b bb b6 32 6c e7 62 bc a2 de |,..zp}...2l.b...|" +"2019-04-22 06:16:47.249 UTC [msp.identity] Verify -> DEBU 8c8 Verify: sig = 00000000 30 44 02 20 15 ff c7 29 a2 2b bc af 47 fd 45 60 |0D. ...).+..G.E`| +00000010 2b 0b db bf da 4f e3 ef 38 ad 76 c6 1c 29 15 cd |+....O..8.v..)..| +00000020 d6 cb e2 5d 02 20 46 c0 0d 40 c3 4e 97 59 e2 61 |...]. F..@.N.Y.a| +00000030 b3 8e 40 13 02 26 b6 25 99 65 41 34 3c 8a de d4 |..@..&.%.eA4<...| +00000040 d8 5a b4 7a 17 fc |.Z.z..|" +"2019-04-22 06:16:47.249 UTC [cauthdsl] func2 -> DEBU 8c9 0xc002f454b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.249 UTC [cauthdsl] func1 -> DEBU 8ca 0xc002f454b0 gate 1555913807248438400 evaluation succeeds" +"2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8cd Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.249 UTC [policies] Evaluate -> DEBU 8ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.250 UTC [gossip.discovery] handleAliveMessage -> DEBU 8cf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d1 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 " +"2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d2 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 " +"2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:12 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:47.250 UTC [gossip.discovery] learnExistingMembers -> DEBU 8d4 Exiting" +"2019-04-22 06:16:47.251 UTC [gossip.discovery] handleAliveMessage -> DEBU 8d5 Exiting" +"2019-04-22 06:16:47.251 UTC [gossip.discovery] handleMsgFromComm -> DEBU 8d6 Exiting" +"2019-04-22 06:16:47.251 UTC [gossip.discovery] sendMemResponse -> DEBU 8d7 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:47.251 UTC [msp] DeserializeIdentity -> DEBU 8d8 Obtaining identity" +"2019-04-22 06:16:47.251 UTC [msp] DeserializeIdentity -> DEBU 8d9 Obtaining identity" +"2019-04-22 06:16:47.251 UTC [gossip.comm] Send -> DEBU 8da Entering, sending GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:47.251 UTC [gossip.discovery] sendMemResponse -> DEBU 8db Exiting, replying with MembershipResponse with Alive: 3, Dead: 0" +"2019-04-22 06:16:47.252 UTC [gossip.comm] sendToEndpoint -> DEBU 8dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1744620901252524847, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 496 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.252 UTC [gossip.comm] sendToEndpoint -> DEBU 8dd Exiting" +"2019-04-22 06:16:47.238 UTC [msp.identity] Verify -> DEBU 8de Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:16:47.252 UTC [msp.identity] Verify -> DEBU 8df Verify: sig = 00000000 30 44 02 20 61 91 59 62 ae d7 f0 15 64 27 e2 19 |0D. a.Yb....d'..| +00000010 a7 9a e6 8c 87 b5 22 88 2d 81 07 71 57 03 f8 51 |......".-..qW..Q| +00000020 7b 93 c7 08 02 20 4c 21 7c b9 e5 a0 7e 27 83 ef |{.... L!|...~'..| +00000030 75 89 69 9a ad b2 90 b5 e5 6a 0a 50 82 da b0 c3 |u.i......j.P....| +00000040 b4 19 69 7f e8 dc |..i...|" +"2019-04-22 06:16:47.252 UTC [cauthdsl] func2 -> DEBU 8e0 0xc002fb0720 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.252 UTC [cauthdsl] func1 -> DEBU 8e1 0xc002fb0720 gate 1555913807238033200 evaluation succeeds" +"2019-04-22 06:16:47.252 UTC [policies] Evaluate -> DEBU 8e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.253 UTC [policies] Evaluate -> DEBU 8e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.253 UTC [policies] Evaluate -> DEBU 8e4 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.253 UTC [policies] Evaluate -> DEBU 8e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.253 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8e6 Authenticated 192.168.224.8:55142" +"2019-04-22 06:16:47.253 UTC [gossip.comm] GossipStream -> DEBU 8e7 Servicing 192.168.224.8:55142" +"2019-04-22 06:16:47.253 UTC [gossip.comm] serviceConnection -> DEBU 8e8 Closing reading from stream" +"2019-04-22 06:16:47.253 UTC [gossip.comm] writeToStream -> DEBU 8e9 Closing writing to stream" +"2019-04-22 06:16:47.254 UTC [gossip.comm] readFromStream -> DEBU 8ea 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-04-22 06:16:47.254 UTC [gossip.comm] readFromStream -> DEBU 8eb Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:47.254 UTC [gossip.comm] func2 -> DEBU 8ec Client 192.168.224.8:55142 disconnected" +"2019-04-22 06:16:47.254 UTC [comm.grpc.server] 1 -> INFO 8ed streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.168Z grpc.peer_address=192.168.224.8:55142 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.7894ms +"2019-04-22 06:16:47.254 UTC [gossip.comm] writeToStream -> DEBU 8ee Closing writing to stream" +"2019-04-22 06:16:47.257 UTC [grpc] infof -> DEBU 8ef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:47.273 UTC [comm.grpc.server] 1 -> INFO 8f0 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.271Z grpc.peer_address=192.168.224.7:48242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=722.5µs +"2019-04-22 06:16:47.276 UTC [msp.identity] Sign -> DEBU 8f1 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:47.276 UTC [msp.identity] Sign -> DEBU 8f2 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:47.276 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f3 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.7:48242" +"2019-04-22 06:16:47.277 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8f4 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48242" +"2019-04-22 06:16:47.278 UTC [msp] DeserializeIdentity -> DEBU 8f5 Obtaining identity" +"2019-04-22 06:16:47.278 UTC [msp] DeserializeIdentity -> DEBU 8f6 Obtaining identity" +"2019-04-22 06:16:47.279 UTC [msp.identity] newIdentity -> DEBU 8f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +-----END CERTIFICATE-----" +"2019-04-22 06:16:47.279 UTC [msp] Validate -> DEBU 8f8 MSP Org2MSP validating identity" +"2019-04-22 06:16:47.280 UTC [msp] getCertificationChain -> DEBU 8f9 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:47.282 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.282 UTC [msp] DeserializeIdentity -> DEBU 8fb Obtaining identity" +"2019-04-22 06:16:47.283 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.284 UTC [msp] DeserializeIdentity -> DEBU 8fd Obtaining identity" +"2019-04-22 06:16:47.285 UTC [grpc] infof -> DEBU 8ff transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:47.284 UTC [msp] DeserializeIdentity -> DEBU 8fe Obtaining identity" +"2019-04-22 06:16:47.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 900 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 901 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 902 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.289 UTC [policies] Evaluate -> DEBU 903 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.289 UTC [policies] Evaluate -> DEBU 904 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.290 UTC [policies] Evaluate -> DEBU 905 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.290 UTC [cauthdsl] func1 -> DEBU 906 0xc003022510 gate 1555913807290863000 evaluation starts" +"2019-04-22 06:16:47.290 UTC [cauthdsl] func2 -> DEBU 907 0xc003022510 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.291 UTC [cauthdsl] func2 -> DEBU 908 0xc003022510 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.291 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 909 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:16:47.291 UTC [msp] Validate -> DEBU 90a MSP Org2MSP validating identity" +"2019-04-22 06:16:47.291 UTC [msp] getCertificationChain -> DEBU 90b MSP Org2MSP getting certification chain" +"2019-04-22 06:16:47.291 UTC [cauthdsl] func2 -> DEBU 90c 0xc003022510 principal matched by identity 0" +"2019-04-22 06:16:47.292 UTC [msp.identity] Verify -> DEBU 90d Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-04-22 06:16:47.292 UTC [msp.identity] Verify -> DEBU 90e Verify: sig = 00000000 30 45 02 21 00 fe 3f d8 0e 56 b4 cf 78 91 02 cf |0E.!..?..V..x...| +00000010 c0 e0 a3 b4 c6 8f 6c 92 5b bd 04 81 7d 61 dc 65 |......l.[...}a.e| +00000020 67 8d 64 7f c0 02 20 2c 77 f1 d9 dd 4d e7 a4 74 |g.d... ,w...M..t| +00000030 71 19 67 37 82 9b bb ee 07 2d 7d a8 9b 7e 7c b7 |q.g7.....-}..~|.| +00000040 29 14 82 cd bf 2e 71 |).....q|" +"2019-04-22 06:16:47.292 UTC [cauthdsl] func2 -> DEBU 90f 0xc003022510 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.292 UTC [cauthdsl] func1 -> DEBU 910 0xc003022510 gate 1555913807290863000 evaluation succeeds" +"2019-04-22 06:16:47.292 UTC [policies] Evaluate -> DEBU 911 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.292 UTC [policies] Evaluate -> DEBU 912 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.293 UTC [policies] Evaluate -> DEBU 913 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.293 UTC [policies] Evaluate -> DEBU 914 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.293 UTC [gossip.comm] authenticateRemotePeer -> DEBU 915 Authenticated 192.168.224.7:48242" +"2019-04-22 06:16:47.294 UTC [gossip.comm] GossipStream -> DEBU 916 Servicing 192.168.224.7:48242" +"2019-04-22 06:16:47.294 UTC [gossip.comm] readFromStream -> DEBU 917 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:47.294 UTC [gossip.comm] func2 -> DEBU 918 Client 192.168.224.7:48242 disconnected" +"2019-04-22 06:16:47.295 UTC [comm.grpc.server] 1 -> INFO 919 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.275Z grpc.peer_address=192.168.224.7:48242 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.2103ms +"2019-04-22 06:16:47.295 UTC [gossip.comm] writeToStream -> DEBU 91a Closing writing to stream" +"2019-04-22 06:16:47.296 UTC [comm.grpc.server] 1 -> INFO 91b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.295Z grpc.peer_address=192.168.224.7:48244 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=125.1µs +"2019-04-22 06:16:47.299 UTC [msp.identity] Sign -> DEBU 91c Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:47.299 UTC [msp.identity] Sign -> DEBU 91d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:47.299 UTC [gossip.comm] authenticateRemotePeer -> DEBU 91e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.7:48244" +"2019-04-22 06:16:47.300 UTC [gossip.comm] authenticateRemotePeer -> DEBU 91f Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48244" +"2019-04-22 06:16:47.300 UTC [msp] DeserializeIdentity -> DEBU 920 Obtaining identity" +"2019-04-22 06:16:47.303 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 921 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.304 UTC [msp] DeserializeIdentity -> DEBU 922 Obtaining identity" +"2019-04-22 06:16:47.304 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 923 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.304 UTC [msp] DeserializeIdentity -> DEBU 924 Obtaining identity" +"2019-04-22 06:16:47.305 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 925 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.305 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 926 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.305 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 927 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.305 UTC [policies] Evaluate -> DEBU 928 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.305 UTC [policies] Evaluate -> DEBU 929 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.305 UTC [policies] Evaluate -> DEBU 92a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.305 UTC [cauthdsl] func1 -> DEBU 92b 0xc00305f860 gate 1555913807305738200 evaluation starts" +"2019-04-22 06:16:47.305 UTC [cauthdsl] func2 -> DEBU 92c 0xc00305f860 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.305 UTC [cauthdsl] func2 -> DEBU 92d 0xc00305f860 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.305 UTC [cauthdsl] func2 -> DEBU 92e 0xc00305f860 principal matched by identity 0" +"2019-04-22 06:16:47.306 UTC [msp.identity] Verify -> DEBU 92f Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-04-22 06:16:47.306 UTC [msp.identity] Verify -> DEBU 930 Verify: sig = 00000000 30 44 02 20 25 ed b0 d7 25 4e a6 48 e2 6b a1 0f |0D. %...%N.H.k..| +00000010 79 f4 dc 26 65 f0 59 74 6b ff 57 89 95 87 69 cb |y..&e.Ytk.W...i.| +00000020 4d 5d 0e d9 02 20 7d e5 9e 8f 65 f0 05 08 f0 1e |M]... }...e.....| +00000030 b7 91 86 94 39 db 40 ef f4 16 c4 96 89 c8 75 a9 |....9.@.......u.| +00000040 93 54 52 dd 2d 17 |.TR.-.|" +"2019-04-22 06:16:47.306 UTC [cauthdsl] func2 -> DEBU 931 0xc00305f860 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.307 UTC [cauthdsl] func1 -> DEBU 932 0xc00305f860 gate 1555913807305738200 evaluation succeeds" +"2019-04-22 06:16:47.307 UTC [policies] Evaluate -> DEBU 933 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.309 UTC [policies] Evaluate -> DEBU 934 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.309 UTC [policies] Evaluate -> DEBU 935 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.310 UTC [policies] Evaluate -> DEBU 936 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.310 UTC [gossip.comm] authenticateRemotePeer -> DEBU 937 Authenticated 192.168.224.7:48244" +"2019-04-22 06:16:47.310 UTC [gossip.comm] GossipStream -> DEBU 938 Servicing 192.168.224.7:48244" +"2019-04-22 06:16:47.311 UTC [gossip.gossip] handleMessage -> DEBU 939 Entering, 192.168.224.7:48244 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.311 UTC [gossip.gossip] handleMessage -> DEBU 93a Exiting" +"2019-04-22 06:16:47.311 UTC [gossip.discovery] handleMsgFromComm -> DEBU 93b Got message: GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.311 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 93c Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:47.312 UTC [msp] DeserializeIdentity -> DEBU 93d Obtaining identity" +"2019-04-22 06:16:47.313 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 93e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 93f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.313 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 940 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.313 UTC [policies] Evaluate -> DEBU 941 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.313 UTC [policies] Evaluate -> DEBU 942 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.313 UTC [policies] Evaluate -> DEBU 943 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.314 UTC [cauthdsl] func1 -> DEBU 944 0xc003069830 gate 1555913807314521200 evaluation starts" +"2019-04-22 06:16:47.314 UTC [cauthdsl] func2 -> DEBU 945 0xc003069830 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.314 UTC [cauthdsl] func2 -> DEBU 946 0xc003069830 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.314 UTC [cauthdsl] func2 -> DEBU 947 0xc003069830 principal matched by identity 0" +"2019-04-22 06:16:47.315 UTC [msp.identity] Verify -> DEBU 948 Verify: digest = 00000000 b4 40 48 cb 6b e8 46 35 30 d0 2d cd b2 48 ce c8 |.@H.k.F50.-..H..| +00000010 de df 06 8a 98 d0 33 3a fa c0 e1 92 fd c5 f7 dd |......3:........|" +"2019-04-22 06:16:47.315 UTC [msp.identity] Verify -> DEBU 949 Verify: sig = 00000000 30 44 02 20 30 f3 92 7d f1 9b c2 bd 42 46 26 7d |0D. 0..}....BF&}| +00000010 96 ed da 18 f4 38 9c 54 5a 5e 53 b7 e2 55 b5 77 |.....8.TZ^S..U.w| +00000020 51 50 3b 9d 02 20 6c 58 c0 18 fa 0b bb ad 69 6f |QP;.. lX......io| +00000030 1c 53 4d 98 f4 44 25 15 d9 99 e2 5e fe 85 4d 3d |.SM..D%....^..M=| +00000040 15 0b 83 95 98 8a |......|" +"2019-04-22 06:16:47.315 UTC [cauthdsl] func2 -> DEBU 94a 0xc003069830 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.315 UTC [cauthdsl] func1 -> DEBU 94b 0xc003069830 gate 1555913807314521200 evaluation succeeds" +"2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.316 UTC [policies] Evaluate -> DEBU 94f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.317 UTC [gossip.discovery] handleAliveMessage -> DEBU 950 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:47.317 UTC [gossip.discovery] learnNewMembers -> DEBU 951 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +"2019-04-22 06:16:47.318 UTC [gossip.discovery] learnNewMembers -> DEBU 952 Learned about a new alive member: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:47.318 UTC [gossip.discovery] learnNewMembers -> DEBU 953 Exiting" +"2019-04-22 06:16:47.318 UTC [gossip.discovery] handleAliveMessage -> DEBU 954 Exiting" +"2019-04-22 06:16:47.320 UTC [gossip.discovery] sendMemResponse -> DEBU 955 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:47.320 UTC [msp] DeserializeIdentity -> DEBU 956 Obtaining identity" +"2019-04-22 06:16:47.320 UTC [msp] DeserializeIdentity -> DEBU 957 Obtaining identity" +"2019-04-22 06:16:47.321 UTC [msp] DeserializeIdentity -> DEBU 958 Obtaining identity" +"2019-04-22 06:16:47.321 UTC [gossip.comm] Send -> DEBU 95a Entering, sending GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:47.321 UTC [gossip.discovery] sendMemResponse -> DEBU 95b Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:16:47.321 UTC [gossip.comm] sendToEndpoint -> DEBU 95c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1036131518869660940, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-04-22 06:16:47.321 UTC [gossip.comm] sendToEndpoint -> DEBU 95d Exiting" +"2019-04-22 06:16:47.320 UTC [gossip.discovery] handleMsgFromComm -> DEBU 959 Exiting" +"2019-04-22 06:16:47.388 UTC [comm.grpc.server] 1 -> INFO 95e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:49.388Z grpc.peer_address=192.168.224.7:48248 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.7µs +"2019-04-22 06:16:47.392 UTC [msp.identity] Sign -> DEBU 95f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:47.392 UTC [msp.identity] Sign -> DEBU 960 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:47.393 UTC [gossip.comm] authenticateRemotePeer -> DEBU 961 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.7:48248" +"2019-04-22 06:16:47.394 UTC [gossip.comm] authenticateRemotePeer -> DEBU 962 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c\npf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv\nWnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48248" +"2019-04-22 06:16:47.394 UTC [msp] DeserializeIdentity -> DEBU 963 Obtaining identity" +"2019-04-22 06:16:47.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 964 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.394 UTC [msp] DeserializeIdentity -> DEBU 965 Obtaining identity" +"2019-04-22 06:16:47.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 966 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.395 UTC [msp] DeserializeIdentity -> DEBU 967 Obtaining identity" +"2019-04-22 06:16:47.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 968 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:47.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 969 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 96a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:47.396 UTC [policies] Evaluate -> DEBU 96b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:47.397 UTC [policies] Evaluate -> DEBU 96c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:47.397 UTC [policies] Evaluate -> DEBU 96d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:47.397 UTC [cauthdsl] func1 -> DEBU 96e 0xc0030b5060 gate 1555913807397427500 evaluation starts" +"2019-04-22 06:16:47.397 UTC [cauthdsl] func2 -> DEBU 96f 0xc0030b5060 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:47.397 UTC [cauthdsl] func2 -> DEBU 970 0xc0030b5060 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:47.398 UTC [cauthdsl] func2 -> DEBU 971 0xc0030b5060 principal matched by identity 0" +"2019-04-22 06:16:47.398 UTC [msp.identity] Verify -> DEBU 972 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-04-22 06:16:47.398 UTC [msp.identity] Verify -> DEBU 973 Verify: sig = 00000000 30 45 02 21 00 92 01 18 07 3f bb 46 9b 88 94 3a |0E.!.....?.F...:| +00000010 7f 38 9f fd 0f fa 83 7c b1 f5 73 d7 5b 81 61 d5 |.8.....|..s.[.a.| +00000020 25 d2 7f b4 61 02 20 64 14 cc 67 f5 07 dc b9 30 |%...a. d..g....0| +00000030 ee e7 88 97 6f 88 19 56 f3 fa d3 09 6e 82 7b d1 |....o..V....n.{.| +00000040 c7 04 5e 67 bf 3b e6 |..^g.;.|" +"2019-04-22 06:16:47.400 UTC [cauthdsl] func2 -> DEBU 974 0xc0030b5060 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:47.401 UTC [cauthdsl] func1 -> DEBU 975 0xc0030b5060 gate 1555913807397427500 evaluation succeeds" +"2019-04-22 06:16:47.403 UTC [policies] Evaluate -> DEBU 976 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.403 UTC [policies] Evaluate -> DEBU 977 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:47.403 UTC [policies] Evaluate -> DEBU 978 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:47.404 UTC [policies] Evaluate -> DEBU 979 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:47.405 UTC [gossip.comm] authenticateRemotePeer -> DEBU 97a Authenticated 192.168.224.7:48248" +"2019-04-22 06:16:47.406 UTC [gossip.comm] GossipStream -> DEBU 97b Servicing 192.168.224.7:48248" +"2019-04-22 06:16:47.410 UTC [gossip.comm] readFromStream -> DEBU 97c 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-04-22 06:16:47.406 UTC [gossip.comm] serviceConnection -> DEBU 97d Closing reading from stream" +"2019-04-22 06:16:47.413 UTC [gossip.comm] func2 -> DEBU 981 Client 192.168.224.7:48244 disconnected" +"2019-04-22 06:16:47.411 UTC [grpc] infof -> DEBU 97e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:47.411 UTC [gossip.comm] readFromStream -> DEBU 97f Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:16:47.411 UTC [gossip.comm] func2 -> DEBU 980 Client 192.168.224.7:48248 disconnected" +"2019-04-22 06:16:47.413 UTC [gossip.comm] writeToStream -> DEBU 982 Closing writing to stream" +"2019-04-22 06:16:47.415 UTC [comm.grpc.server] 1 -> INFO 984 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:16:57.392Z grpc.peer_address=192.168.224.7:48248 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.5186ms +"2019-04-22 06:16:47.413 UTC [comm.grpc.server] 1 -> INFO 983 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:48244 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=115.3997ms +"2019-04-22 06:16:47.415 UTC [gossip.comm] writeToStream -> DEBU 985 Closing writing to stream" +"2019-04-22 06:16:47.649 UTC [grpc] infof -> DEBU 986 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:48.089 UTC [comm.grpc.server] 1 -> INFO 987 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:16:50.089Z grpc.peer_address=192.168.224.8:55156 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=196.1µs +"2019-04-22 06:16:48.092 UTC [msp.identity] Sign -> DEBU 988 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:48.092 UTC [msp.identity] Sign -> DEBU 989 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:48.092 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98a Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:55156" +"2019-04-22 06:16:48.102 UTC [gossip.comm] authenticateRemotePeer -> DEBU 98b Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55156" +"2019-04-22 06:16:48.102 UTC [msp] DeserializeIdentity -> DEBU 98c Obtaining identity" +"2019-04-22 06:16:48.102 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 98d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.102 UTC [msp] DeserializeIdentity -> DEBU 98e Obtaining identity" +"2019-04-22 06:16:48.103 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 98f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.103 UTC [msp] DeserializeIdentity -> DEBU 990 Obtaining identity" +"2019-04-22 06:16:48.104 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 991 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.105 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 992 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.105 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 993 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.106 UTC [policies] Evaluate -> DEBU 994 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.106 UTC [policies] Evaluate -> DEBU 995 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.106 UTC [policies] Evaluate -> DEBU 996 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.106 UTC [cauthdsl] func1 -> DEBU 997 0xc003172790 gate 1555913808106629600 evaluation starts" +"2019-04-22 06:16:48.106 UTC [cauthdsl] func2 -> DEBU 998 0xc003172790 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.106 UTC [cauthdsl] func2 -> DEBU 999 0xc003172790 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.106 UTC [cauthdsl] func2 -> DEBU 99a 0xc003172790 principal matched by identity 0" +"2019-04-22 06:16:48.106 UTC [msp.identity] Verify -> DEBU 99b Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:16:48.106 UTC [msp.identity] Verify -> DEBU 99c Verify: sig = 00000000 30 44 02 20 45 aa ca 19 a2 af 31 f7 4d b7 bc 18 |0D. E.....1.M...| +00000010 24 48 9b 5e 74 9f 6f 43 e8 4b c0 a0 a8 68 a9 7a |$H.^t.oC.K...h.z| +00000020 03 a0 83 41 02 20 01 72 df 8e 14 a4 68 86 4d 9a |...A. .r....h.M.| +00000030 c1 39 c8 9d 7f c8 57 a1 6e ae 6e 47 49 be 84 63 |.9....W.n.nGI..c| +00000040 9f b2 d9 90 8e 22 |....."|" +"2019-04-22 06:16:48.107 UTC [cauthdsl] func2 -> DEBU 99d 0xc003172790 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.107 UTC [cauthdsl] func1 -> DEBU 99e 0xc003172790 gate 1555913808106629600 evaluation succeeds" +"2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 99f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 9a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 9a1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.107 UTC [policies] Evaluate -> DEBU 9a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.107 UTC [gossip.comm] authenticateRemotePeer -> DEBU 9a3 Authenticated 192.168.224.8:55156" +"2019-04-22 06:16:48.107 UTC [gossip.comm] GossipStream -> DEBU 9a4 Servicing 192.168.224.8:55156" +"2019-04-22 06:16:48.122 UTC [gossip.gossip] handleMessage -> DEBU 9a5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.122 UTC [gossip.pull] HandleMessage -> DEBU 9a6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.122 UTC [msp] DeserializeIdentity -> DEBU 9a7 Obtaining identity" +"2019-04-22 06:16:48.122 UTC [msp] DeserializeIdentity -> DEBU 9a8 Obtaining identity" +"2019-04-22 06:16:48.122 UTC [gossip.pull] SendDigest -> DEBU 9a9 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:48.122 UTC [gossip.gossip] handleMessage -> DEBU 9aa Exiting" +"2019-04-22 06:16:48.123 UTC [gossip.gossip] handleMessage -> DEBU 9ab Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.123 UTC [gossip.gossip] handleMessage -> DEBU 9ac Exiting" +"2019-04-22 06:16:48.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.124 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9ae Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:48.124 UTC [msp] DeserializeIdentity -> DEBU 9af Obtaining identity" +"2019-04-22 06:16:48.124 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.124 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.132 UTC [policies] Evaluate -> DEBU 9b3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.133 UTC [policies] Evaluate -> DEBU 9b4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.133 UTC [policies] Evaluate -> DEBU 9b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.133 UTC [cauthdsl] func1 -> DEBU 9b6 0xc0032a7720 gate 1555913808133564400 evaluation starts" +"2019-04-22 06:16:48.133 UTC [cauthdsl] func2 -> DEBU 9b7 0xc0032a7720 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.133 UTC [cauthdsl] func2 -> DEBU 9b8 0xc0032a7720 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.136 UTC [cauthdsl] func2 -> DEBU 9b9 0xc0032a7720 principal matched by identity 0" +"2019-04-22 06:16:48.136 UTC [msp.identity] Verify -> DEBU 9ba Verify: digest = 00000000 73 fa a8 c1 ef 4c f5 0d 41 2e c9 1c ae 94 73 f8 |s....L..A.....s.| +00000010 4e 51 20 10 a6 ff 84 7f 5e 17 74 29 fb 5f dc 1d |NQ .....^.t)._..|" +"2019-04-22 06:16:48.136 UTC [msp.identity] Verify -> DEBU 9bb Verify: sig = 00000000 30 44 02 20 29 3f 19 bc 29 69 4a 8a 85 54 a9 c9 |0D. )?..)iJ..T..| +00000010 82 6a 72 fb 95 68 d8 cf 15 7e 5b 6b 95 41 7d 89 |.jr..h...~[k.A}.| +00000020 19 82 83 c5 02 20 70 a9 ca bb 80 2f ba 95 6e d6 |..... p..../..n.| +00000030 45 da ca c5 3b 92 19 45 64 93 d0 bb cb 80 34 09 |E...;..Ed.....4.| +00000040 0e 62 ee af 91 5a |.b...Z|" +"2019-04-22 06:16:48.137 UTC [cauthdsl] func2 -> DEBU 9bc 0xc0032a7720 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.137 UTC [cauthdsl] func1 -> DEBU 9bd 0xc0032a7720 gate 1555913808133564400 evaluation succeeds" +"2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9c0 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.137 UTC [policies] Evaluate -> DEBU 9c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.137 UTC [gossip.discovery] handleAliveMessage -> DEBU 9c2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c4 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 " +"2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 " +"2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:17 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:48.137 UTC [gossip.discovery] learnExistingMembers -> DEBU 9c7 Exiting" +"2019-04-22 06:16:48.137 UTC [gossip.discovery] handleAliveMessage -> DEBU 9c8 Exiting" +"2019-04-22 06:16:48.137 UTC [gossip.discovery] sendMemResponse -> DEBU 9c9 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:48.138 UTC [msp] DeserializeIdentity -> DEBU 9ca Obtaining identity" +"2019-04-22 06:16:48.138 UTC [msp] DeserializeIdentity -> DEBU 9cb Obtaining identity" +"2019-04-22 06:16:48.138 UTC [msp] DeserializeIdentity -> DEBU 9cc Obtaining identity" +"2019-04-22 06:16:48.138 UTC [gossip.comm] Send -> DEBU 9cd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:48.138 UTC [gossip.discovery] sendMemResponse -> DEBU 9ce Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:16:48.138 UTC [gossip.comm] sendToEndpoint -> DEBU 9cf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.138 UTC [gossip.comm] sendToEndpoint -> DEBU 9d0 Exiting" +"2019-04-22 06:16:48.137 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9d1 Exiting" +"2019-04-22 06:16:48.455 UTC [msp] DeserializeIdentity -> DEBU 9d2 Obtaining identity" +"2019-04-22 06:16:48.456 UTC [msp] DeserializeIdentity -> DEBU 9d3 Obtaining identity" +"2019-04-22 06:16:48.456 UTC [gossip.comm] Send -> DEBU 9d4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:16:48.457 UTC [gossip.comm] sendToEndpoint -> DEBU 9d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.457 UTC [gossip.comm] createConnection -> DEBU 9d6 Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:48.462 UTC [grpc] DialContext -> DEBU 9d7 parsed scheme: """ +"2019-04-22 06:16:48.463 UTC [grpc] DialContext -> DEBU 9d8 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:16:48.463 UTC [grpc] NewAddress -> DEBU 9d9 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-04-22 06:16:48.463 UTC [grpc] switchBalancer -> DEBU 9da ClientConn switching balancer to "pick_first"" +"2019-04-22 06:16:48.463 UTC [gossip.comm] sendToEndpoint -> DEBU 9db Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.464 UTC [gossip.comm] sendToEndpoint -> DEBU 9dc Exiting" +"2019-04-22 06:16:48.465 UTC [grpc] HandleSubConnStateChange -> DEBU 9dd pickfirstBalancer: HandleSubConnStateChange: 0xc00337f1e0, CONNECTING" +"2019-04-22 06:16:48.466 UTC [gossip.pull] Hello -> DEBU 9de Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:48.473 UTC [gossip.comm] Send -> DEBU 9e1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:48.476 UTC [gossip.comm] sendToEndpoint -> DEBU 9e2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.483 UTC [msp] DeserializeIdentity -> DEBU 9e3 Obtaining identity" +"2019-04-22 06:16:48.483 UTC [msp] DeserializeIdentity -> DEBU 9e4 Obtaining identity" +"2019-04-22 06:16:48.485 UTC [gossip.comm] Send -> DEBU 9e5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-04-22 06:16:48.485 UTC [msp] DeserializeIdentity -> DEBU 9e6 Obtaining identity" +"2019-04-22 06:16:48.486 UTC [msp] DeserializeIdentity -> DEBU 9e7 Obtaining identity" +"2019-04-22 06:16:48.487 UTC [gossip.comm] sendToEndpoint -> DEBU 9e8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:48.487 UTC [gossip.comm] sendToEndpoint -> DEBU 9e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:48.487 UTC [gossip.comm] sendToEndpoint -> DEBU 9ea Exiting" +"2019-04-22 06:16:48.488 UTC [gossip.comm] sendToEndpoint -> DEBU 9eb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:48.489 UTC [gossip.comm] sendToEndpoint -> DEBU 9ec Exiting" +"2019-04-22 06:16:48.468 UTC [gossip.comm] func1 -> DEBU 9df Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.496 UTC [gossip.gossip] handleMessage -> DEBU 9ed Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.497 UTC [msp.identity] Verify -> DEBU 9ee Verify: digest = 00000000 21 17 0f 53 43 d6 0f 5e 74 17 04 ec 35 a6 fc e2 |!..SC..^t...5...| +00000010 99 66 0f 5f c9 b2 9a 8d 4b cf c4 68 4b 01 57 c2 |.f._....K..hK.W.|" +"2019-04-22 06:16:48.498 UTC [msp.identity] Verify -> DEBU 9ef Verify: sig = 00000000 30 44 02 20 1d ce d6 ae 46 64 65 f1 c0 fc 5c f1 |0D. ....Fde...\.| +00000010 cd 99 a0 64 0b c7 98 49 a5 08 b1 e0 f9 f1 05 b3 |...d...I........| +00000020 ef 40 44 98 02 20 6d 17 a3 9f 68 71 e1 dd 77 5b |.@D.. m...hq..w[| +00000030 ec 02 39 77 97 28 8b 6d 66 da 72 c9 3f 90 7e f0 |..9w.(.mf.r.?.~.| +00000040 da 6e 11 1d 2f 45 |.n../E|" +"2019-04-22 06:16:48.499 UTC [msp.identity] Verify -> DEBU 9f0 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:48.499 UTC [msp.identity] Verify -> DEBU 9f1 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:48.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9f2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9f3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.501 UTC [policies] Evaluate -> DEBU 9f4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.501 UTC [policies] Evaluate -> DEBU 9f5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.502 UTC [policies] Evaluate -> DEBU 9f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.502 UTC [msp] DeserializeIdentity -> DEBU 9f7 Obtaining identity" +"2019-04-22 06:16:48.503 UTC [msp.identity] newIdentity -> DEBU 9f8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-04-22 06:16:48.504 UTC [cauthdsl] func1 -> DEBU 9f9 0xc00354a590 gate 1555913808504098600 evaluation starts" +"2019-04-22 06:16:48.504 UTC [cauthdsl] func2 -> DEBU 9fa 0xc00354a590 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.506 UTC [cauthdsl] func2 -> DEBU 9fc 0xc00354a590 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.506 UTC [cauthdsl] func2 -> DEBU 9fd 0xc00354a590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:48.476 UTC [gossip.comm] sendToEndpoint -> DEBU 9fe Exiting" +"2019-04-22 06:16:48.506 UTC [cauthdsl] func2 -> DEBU 9ff 0xc00354a590 principal evaluation fails" +"2019-04-22 06:16:48.507 UTC [cauthdsl] func1 -> DEBU a00 0xc00354a590 gate 1555913808504098600 evaluation fails" +"2019-04-22 06:16:48.468 UTC [gossip.comm] sendToEndpoint -> DEBU 9e0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.509 UTC [gossip.comm] sendToEndpoint -> DEBU a01 Exiting" +"2019-04-22 06:16:48.508 UTC [policies] Evaluate -> DEBU a02 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.505 UTC [gossip.comm] func1 -> DEBU 9fb Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:48.515 UTC [policies] Evaluate -> DEBU a04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.516 UTC [policies] Evaluate -> DEBU a05 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:48.516 UTC [cauthdsl] func1 -> DEBU a06 0xc0035aa9a0 gate 1555913808516182900 evaluation starts" +"2019-04-22 06:16:48.516 UTC [cauthdsl] func2 -> DEBU a07 0xc0035aa9a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.516 UTC [cauthdsl] func2 -> DEBU a08 0xc0035aa9a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.516 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a09 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:48.516 UTC [msp] Validate -> DEBU a0a MSP Org1MSP validating identity" +"2019-04-22 06:16:48.515 UTC [grpc] HandleSubConnStateChange -> DEBU a03 pickfirstBalancer: HandleSubConnStateChange: 0xc00337f1e0, READY" +"2019-04-22 06:16:48.515 UTC [gossip.comm] func1 -> DEBU a0c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12155449189822060432 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.517 UTC [msp] getCertificationChain -> DEBU a0b MSP Org1MSP getting certification chain" +"2019-04-22 06:16:48.519 UTC [cauthdsl] func2 -> DEBU a0d 0xc0035aa9a0 principal matched by identity 0" +"2019-04-22 06:16:48.519 UTC [msp.identity] Verify -> DEBU a0e Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:48.520 UTC [msp.identity] Verify -> DEBU a0f Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:48.520 UTC [msp.identity] Sign -> DEBU a10 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:16:48.521 UTC [msp.identity] Sign -> DEBU a11 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:16:48.521 UTC [gossip.comm] authenticateRemotePeer -> DEBU a12 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.7:7051" +"2019-04-22 06:16:48.523 UTC [gossip.comm] authenticateRemotePeer -> DEBU a13 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:7051" +"2019-04-22 06:16:48.524 UTC [msp] DeserializeIdentity -> DEBU a14 Obtaining identity" +"2019-04-22 06:16:48.525 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.525 UTC [msp] DeserializeIdentity -> DEBU a16 Obtaining identity" +"2019-04-22 06:16:48.524 UTC [cauthdsl] func2 -> DEBU a17 0xc0035aa9a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.525 UTC [cauthdsl] func1 -> DEBU a18 0xc0035aa9a0 gate 1555913808516182900 evaluation succeeds" +"2019-04-22 06:16:48.526 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a19 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.526 UTC [policies] Evaluate -> DEBU a1a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:48.526 UTC [policies] Evaluate -> DEBU a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:48.526 UTC [msp] DeserializeIdentity -> DEBU a1c Obtaining identity" +"2019-04-22 06:16:48.527 UTC [policies] Evaluate -> DEBU a1d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.528 UTC [policies] Evaluate -> DEBU a1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.528 UTC [gossip.gossip] handleMessage -> DEBU a1f Exiting" +"2019-04-22 06:16:48.529 UTC [gossip.gossip] handleMessage -> DEBU a20 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.529 UTC [msp] DeserializeIdentity -> DEBU a21 Obtaining identity" +"2019-04-22 06:16:48.530 UTC [msp] DeserializeIdentity -> DEBU a22 Obtaining identity" +"2019-04-22 06:16:48.530 UTC [msp] DeserializeIdentity -> DEBU a23 Obtaining identity" +"2019-04-22 06:16:48.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a25 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.531 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a26 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.531 UTC [policies] Evaluate -> DEBU a27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.531 UTC [policies] Evaluate -> DEBU a28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.532 UTC [policies] Evaluate -> DEBU a29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.532 UTC [cauthdsl] func1 -> DEBU a2a 0xc003658a40 gate 1555913808532462700 evaluation starts" +"2019-04-22 06:16:48.532 UTC [cauthdsl] func2 -> DEBU a2b 0xc003658a40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.532 UTC [cauthdsl] func2 -> DEBU a2c 0xc003658a40 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.533 UTC [cauthdsl] func2 -> DEBU a2d 0xc003658a40 principal matched by identity 0" +"2019-04-22 06:16:48.533 UTC [msp.identity] Verify -> DEBU a2e Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:48.533 UTC [msp.identity] Verify -> DEBU a2f Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:48.535 UTC [cauthdsl] func2 -> DEBU a30 0xc003658a40 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.535 UTC [cauthdsl] func1 -> DEBU a31 0xc003658a40 gate 1555913808532462700 evaluation succeeds" +"2019-04-22 06:16:48.535 UTC [policies] Evaluate -> DEBU a32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.536 UTC [policies] Evaluate -> DEBU a33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.536 UTC [policies] Evaluate -> DEBU a34 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.537 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a35 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.537 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a36 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.538 UTC [policies] Evaluate -> DEBU a37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.539 UTC [msp] DeserializeIdentity -> DEBU a38 Obtaining identity" +"2019-04-22 06:16:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a39 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a3a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.539 UTC [policies] Evaluate -> DEBU a3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.540 UTC [policies] Evaluate -> DEBU a3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.540 UTC [policies] Evaluate -> DEBU a3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.540 UTC [cauthdsl] func1 -> DEBU a3e 0xc003659be0 gate 1555913808540297200 evaluation starts" +"2019-04-22 06:16:48.540 UTC [cauthdsl] func2 -> DEBU a3f 0xc003659be0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.540 UTC [cauthdsl] func2 -> DEBU a40 0xc003659be0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.540 UTC [cauthdsl] func2 -> DEBU a41 0xc003659be0 principal matched by identity 0" +"2019-04-22 06:16:48.541 UTC [msp.identity] Verify -> DEBU a42 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:48.541 UTC [msp.identity] Verify -> DEBU a43 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:48.541 UTC [cauthdsl] func2 -> DEBU a44 0xc003659be0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.541 UTC [cauthdsl] func1 -> DEBU a45 0xc003659be0 gate 1555913808540297200 evaluation succeeds" +"2019-04-22 06:16:48.541 UTC [policies] Evaluate -> DEBU a46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.542 UTC [policies] Evaluate -> DEBU a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.542 UTC [policies] Evaluate -> DEBU a48 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.542 UTC [policies] Evaluate -> DEBU a49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.539 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a4a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.543 UTC [policies] Evaluate -> DEBU a4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.543 UTC [msp.identity] Verify -> DEBU a4c Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:48.544 UTC [msp.identity] Verify -> DEBU a4e Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:48.545 UTC [gossip.gossip] handleMessage -> DEBU a4f Exiting" +"2019-04-22 06:16:48.543 UTC [policies] Evaluate -> DEBU a4d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.550 UTC [gossip.gossip] handleMessage -> DEBU a50 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913806916849300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:48.551 UTC [msp.identity] Verify -> DEBU a52 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:48.551 UTC [msp.identity] Verify -> DEBU a53 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:48.551 UTC [gossip.gossip] handleMessage -> DEBU a54 Exiting" +"2019-04-22 06:16:48.552 UTC [gossip.gossip] handleMessage -> DEBU a55 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12155449189822060432 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.552 UTC [gossip.pull] HandleMessage -> DEBU a56 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 12155449189822060432 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 40 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.552 UTC [gossip.gossip] handleMessage -> DEBU a57 Exiting" +"2019-04-22 06:16:48.550 UTC [policies] Evaluate -> DEBU a51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.553 UTC [cauthdsl] func1 -> DEBU a58 0xc0036a5d00 gate 1555913808553082900 evaluation starts" +"2019-04-22 06:16:48.553 UTC [cauthdsl] func2 -> DEBU a59 0xc0036a5d00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.553 UTC [cauthdsl] func2 -> DEBU a5a 0xc0036a5d00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.553 UTC [cauthdsl] func2 -> DEBU a5b 0xc0036a5d00 principal matched by identity 0" +"2019-04-22 06:16:48.553 UTC [msp.identity] Verify -> DEBU a5c Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-04-22 06:16:48.554 UTC [msp.identity] Verify -> DEBU a5d Verify: sig = 00000000 30 44 02 20 6c 8d 0f c9 4b e2 4b b2 77 b8 94 14 |0D. l...K.K.w...| +00000010 8a 2f 05 75 70 a1 26 a6 9a 15 af 95 c1 87 b1 d8 |./.up.&.........| +00000020 f6 ff 33 b3 02 20 2b 9f 4f a8 68 2b 59 c4 11 b9 |..3.. +.O.h+Y...| +00000030 cb b5 d4 9e b0 97 01 b9 15 90 d6 ec ad ce 59 ef |..............Y.| +00000040 00 20 3e 1c 43 ce |. >.C.|" +"2019-04-22 06:16:48.555 UTC [cauthdsl] func2 -> DEBU a5e 0xc0036a5d00 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.555 UTC [cauthdsl] func1 -> DEBU a5f 0xc0036a5d00 gate 1555913808553082900 evaluation succeeds" +"2019-04-22 06:16:48.556 UTC [policies] Evaluate -> DEBU a60 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.556 UTC [policies] Evaluate -> DEBU a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.556 UTC [policies] Evaluate -> DEBU a62 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.557 UTC [policies] Evaluate -> DEBU a63 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.557 UTC [gossip.comm] authenticateRemotePeer -> DEBU a64 Authenticated 192.168.224.7:7051" +"2019-04-22 06:16:48.557 UTC [gossip.comm] createConnection -> DEBU a65 Exiting" +"2019-04-22 06:16:48.558 UTC [gossip.comm] sendToEndpoint -> DEBU a66 Exiting" +"2019-04-22 06:16:48.558 UTC [gossip.comm] sendToEndpoint -> DEBU a67 Exiting" +"2019-04-22 06:16:48.561 UTC [gossip.comm] func1 -> DEBU a68 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.561 UTC [gossip.gossip] handleMessage -> DEBU a69 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.561 UTC [msp] DeserializeIdentity -> DEBU a6a Obtaining identity" +"2019-04-22 06:16:48.562 UTC [msp] DeserializeIdentity -> DEBU a6b Obtaining identity" +"2019-04-22 06:16:48.562 UTC [msp] DeserializeIdentity -> DEBU a6c Obtaining identity" +"2019-04-22 06:16:48.563 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a6d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.563 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.563 UTC [policies] Evaluate -> DEBU a70 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.563 UTC [policies] Evaluate -> DEBU a71 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.564 UTC [policies] Evaluate -> DEBU a72 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.564 UTC [cauthdsl] func1 -> DEBU a73 0xc003604780 gate 1555913808564285600 evaluation starts" +"2019-04-22 06:16:48.564 UTC [cauthdsl] func2 -> DEBU a74 0xc003604780 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.564 UTC [cauthdsl] func2 -> DEBU a75 0xc003604780 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.565 UTC [cauthdsl] func2 -> DEBU a76 0xc003604780 principal matched by identity 0" +"2019-04-22 06:16:48.565 UTC [msp.identity] Verify -> DEBU a77 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +"2019-04-22 06:16:48.566 UTC [msp.identity] Verify -> DEBU a78 Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +00000040 4b b6 4c fc 03 1a |K.L...|" +"2019-04-22 06:16:48.567 UTC [cauthdsl] func2 -> DEBU a79 0xc003604780 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.567 UTC [cauthdsl] func1 -> DEBU a7a 0xc003604780 gate 1555913808564285600 evaluation succeeds" +"2019-04-22 06:16:48.567 UTC [policies] Evaluate -> DEBU a7b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.568 UTC [policies] Evaluate -> DEBU a7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.568 UTC [policies] Evaluate -> DEBU a7d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.568 UTC [policies] Evaluate -> DEBU a7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.570 UTC [msp] DeserializeIdentity -> DEBU a7f Obtaining identity" +"2019-04-22 06:16:48.570 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a80 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a81 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.571 UTC [policies] Evaluate -> DEBU a82 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.572 UTC [policies] Evaluate -> DEBU a83 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.572 UTC [policies] Evaluate -> DEBU a84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.572 UTC [cauthdsl] func1 -> DEBU a85 0xc003605860 gate 1555913808572587700 evaluation starts" +"2019-04-22 06:16:48.573 UTC [cauthdsl] func2 -> DEBU a86 0xc003605860 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.573 UTC [cauthdsl] func2 -> DEBU a87 0xc003605860 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.573 UTC [cauthdsl] func2 -> DEBU a88 0xc003605860 principal matched by identity 0" +"2019-04-22 06:16:48.573 UTC [msp.identity] Verify -> DEBU a89 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +"2019-04-22 06:16:48.574 UTC [msp.identity] Verify -> DEBU a8a Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +00000040 4b b6 4c fc 03 1a |K.L...|" +"2019-04-22 06:16:48.575 UTC [cauthdsl] func2 -> DEBU a8b 0xc003605860 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.575 UTC [cauthdsl] func1 -> DEBU a8c 0xc003605860 gate 1555913808572587700 evaluation succeeds" +"2019-04-22 06:16:48.575 UTC [policies] Evaluate -> DEBU a8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.576 UTC [policies] Evaluate -> DEBU a8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.576 UTC [policies] Evaluate -> DEBU a8f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.576 UTC [policies] Evaluate -> DEBU a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.577 UTC [msp.identity] Verify -> DEBU a91 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:48.577 UTC [msp.identity] Verify -> DEBU a92 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:48.578 UTC [gossip.gossip] handleMessage -> DEBU a93 Exiting" +"2019-04-22 06:16:48.713 UTC [gossip.comm] func1 -> DEBU a94 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.713 UTC [gossip.gossip] handleMessage -> DEBU a95 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.715 UTC [msp] DeserializeIdentity -> DEBU a96 Obtaining identity" +"2019-04-22 06:16:48.715 UTC [msp] DeserializeIdentity -> DEBU a97 Obtaining identity" +"2019-04-22 06:16:48.715 UTC [gossip.gossip] handleMessage -> DEBU a98 Exiting" +"2019-04-22 06:16:48.718 UTC [gossip.comm] func1 -> DEBU a99 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.719 UTC [gossip.comm] func1 -> DEBU a9a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:48.719 UTC [gossip.gossip] handleMessage -> DEBU a9b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.720 UTC [gossip.pull] HandleMessage -> DEBU a9c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.720 UTC [gossip.pull] SendDigest -> DEBU a9d Sending BLOCK_MSG digest: [1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:48.721 UTC [gossip.gossip] handleMessage -> DEBU a9e Exiting" +"2019-04-22 06:16:48.721 UTC [gossip.gossip] handleMessage -> DEBU a9f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:48.721 UTC [msp.identity] Verify -> DEBU aa0 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:48.722 UTC [msp.identity] Verify -> DEBU aa1 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:48.724 UTC [gossip.gossip] handleMessage -> DEBU aa2 Exiting" +"2019-04-22 06:16:48.725 UTC [gossip.gossip] handleMessage -> DEBU aa3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913806713568300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:48.727 UTC [msp.identity] Verify -> DEBU aa4 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:48.727 UTC [msp.identity] Verify -> DEBU aa5 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:48.727 UTC [msp] DeserializeIdentity -> DEBU aa6 Obtaining identity" +"2019-04-22 06:16:48.727 UTC [gossip.gossip] handleMessage -> DEBU aa7 Exiting" +"2019-04-22 06:16:48.938 UTC [gossip.gossip] handleMessage -> DEBU aa8 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:48.938 UTC [msp] DeserializeIdentity -> DEBU aa9 Obtaining identity" +"2019-04-22 06:16:48.939 UTC [msp] DeserializeIdentity -> DEBU aaa Obtaining identity" +"2019-04-22 06:16:48.940 UTC [msp] DeserializeIdentity -> DEBU aab Obtaining identity" +"2019-04-22 06:16:48.940 UTC [gossip.gossip] handleMessage -> DEBU aac Exiting" +"2019-04-22 06:16:48.945 UTC [gossip.gossip] handleMessage -> DEBU aad Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913807246287600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:48.945 UTC [msp] DeserializeIdentity -> DEBU aae Obtaining identity" +"2019-04-22 06:16:48.947 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU aaf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:48.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:48.948 UTC [policies] Evaluate -> DEBU ab2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:48.948 UTC [policies] Evaluate -> DEBU ab3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:48.948 UTC [policies] Evaluate -> DEBU ab4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:48.949 UTC [cauthdsl] func1 -> DEBU ab5 0xc002445370 gate 1555913808949732900 evaluation starts" +"2019-04-22 06:16:48.949 UTC [cauthdsl] func2 -> DEBU ab6 0xc002445370 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:48.949 UTC [cauthdsl] func2 -> DEBU ab7 0xc002445370 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:48.950 UTC [cauthdsl] func2 -> DEBU ab8 0xc002445370 principal matched by identity 0" +"2019-04-22 06:16:48.951 UTC [msp.identity] Verify -> DEBU ab9 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:48.951 UTC [msp.identity] Verify -> DEBU aba Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:48.952 UTC [cauthdsl] func2 -> DEBU abb 0xc002445370 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:48.952 UTC [cauthdsl] func1 -> DEBU abc 0xc002445370 gate 1555913808949732900 evaluation succeeds" +"2019-04-22 06:16:48.953 UTC [policies] Evaluate -> DEBU abd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.953 UTC [policies] Evaluate -> DEBU abe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:48.954 UTC [policies] Evaluate -> DEBU abf Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:48.954 UTC [policies] Evaluate -> DEBU ac0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:48.954 UTC [msp] DeserializeIdentity -> DEBU ac1 Obtaining identity" +"2019-04-22 06:16:48.954 UTC [gossip.gossip] handleMessage -> DEBU ac2 Exiting" +"2019-04-22 06:16:49.063 UTC [gossip.gossip] handleMessage -> DEBU ac3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 5040783096894389777 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +"2019-04-22 06:16:49.063 UTC [gossip.pull] HandleMessage -> DEBU ac4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 5040783096894389777 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 50 bytes, Signature: 0 bytes" +"2019-04-22 06:16:49.063 UTC [msp] DeserializeIdentity -> DEBU ac5 Obtaining identity" +"2019-04-22 06:16:49.064 UTC [gossip.gossip] handleMessage -> DEBU ac6 Exiting" +"2019-04-22 06:16:49.064 UTC [gossip.pull] SendRes -> DEBU ac7 Sending 1 IDENTITY_MSG items to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:49.277 UTC [endorser] ProcessProposal -> DEBU ac8 Entering: request from 192.168.224.9:49214" +"2019-04-22 06:16:49.277 UTC [protoutils] ValidateProposalMessage -> DEBU ac9 ValidateProposalMessage starts for signed proposal 0xc003020c80" +"2019-04-22 06:16:49.278 UTC [protoutils] validateChannelHeader -> DEBU aca validateChannelHeader info: header type 3" +"2019-04-22 06:16:49.278 UTC [protoutils] checkSignatureFromCreator -> DEBU acb begin" +"2019-04-22 06:16:49.278 UTC [protoutils] checkSignatureFromCreator -> DEBU acc creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:49.278 UTC [protoutils] checkSignatureFromCreator -> DEBU acd creator is valid" +"2019-04-22 06:16:49.278 UTC [msp.identity] Verify -> DEBU ace Verify: digest = 00000000 1d de 59 1e 8b f3 57 3c 4f 1f 2f 85 09 30 3f 66 |..Y...W DEBU acf Verify: sig = 00000000 30 45 02 21 00 a4 cf 88 22 7e 8e 1a 34 3e e7 02 |0E.!...."~..4>..| +00000010 44 1b df 91 9f 04 ba 8e 30 b6 4b 62 fd 33 ad 3b |D.......0.Kb.3.;| +00000020 8a a0 09 08 dd 02 20 29 dc d7 11 92 03 c5 a4 64 |...... ).......d| +00000030 89 86 9b e4 54 f5 cc d3 36 22 67 02 29 70 37 78 |....T...6"g.)p7x| +00000040 b0 ab cc eb 6e cd 2a |....n.*|" +"2019-04-22 06:16:49.279 UTC [protoutils] checkSignatureFromCreator -> DEBU ad0 exits successfully" +"2019-04-22 06:16:49.279 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ad1 validateChaincodeProposalMessage starts for proposal 0xc002330a80, header 0xc003021770" +"2019-04-22 06:16:49.279 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ad2 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-04-22 06:16:49.280 UTC [endorser] preProcess -> DEBU ad3 [][3c7619ea] processing txid: 3c7619ea8d385e9772cee298e107f1d82a2430604cfe889905f47f4f1107942c" +"2019-04-22 06:16:49.280 UTC [endorser] SimulateProposal -> DEBU ad4 [][3c7619ea] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:49.280 UTC [endorser] callChaincode -> INFO ad5 [][3c7619ea] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:49.280 UTC [chaincode] Execute -> DEBU ad6 Entry" +"2019-04-22 06:16:49.281 UTC [msp.identity] Verify -> DEBU ad7 Verify: digest = 00000000 1d de 59 1e 8b f3 57 3c 4f 1f 2f 85 09 30 3f 66 |..Y...W DEBU ad8 Verify: sig = 00000000 30 45 02 21 00 a4 cf 88 22 7e 8e 1a 34 3e e7 02 |0E.!...."~..4>..| +00000010 44 1b df 91 9f 04 ba 8e 30 b6 4b 62 fd 33 ad 3b |D.......0.Kb.3.;| +00000020 8a a0 09 08 dd 02 20 29 dc d7 11 92 03 c5 a4 64 |...... ).......d| +00000030 89 86 9b e4 54 f5 cc d3 36 22 67 02 29 70 37 78 |....T...6"g.)p7x| +00000040 b0 ab cc eb 6e cd 2a |....n.*|" +"2019-04-22 06:16:49.282 UTC [lifecycle] InstallChaincode -> DEBU ad9 received invocation of InstallChaincode for install package 1f8b08000000000000ffecd66750d3d9fa07f08044a58a59a40882040129920412a46b..." +"2019-04-22 06:16:49.283 UTC [chaincode] handleMessage -> DEBU ada [3c7619ea] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:49.283 UTC [chaincode] Notify -> DEBU adb [3c7619ea] notifying Txid:3c7619ea8d385e9772cee298e107f1d82a2430604cfe889905f47f4f1107942c, channelID:" +"2019-04-22 06:16:49.283 UTC [chaincode] Execute -> DEBU adc Exit" +"2019-04-22 06:16:49.284 UTC [endorser] callChaincode -> INFO add [][3c7619ea] Exit chaincode: name:"_lifecycle" (3ms)" +"2019-04-22 06:16:49.284 UTC [endorser] SimulateProposal -> DEBU ade [][3c7619ea] Exit" +"2019-04-22 06:16:49.284 UTC [endorser] func1 -> DEBU adf Exit: request from 192.168.224.9:49214" +"2019-04-22 06:16:49.284 UTC [comm.grpc.server] 1 -> INFO ae0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49214 grpc.code=OK grpc.call_duration=8.1725ms +"2019-04-22 06:16:49.293 UTC [grpc] infof -> DEBU ae1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:49.293 UTC [grpc] infof -> DEBU ae2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:50.458 UTC [gossip.channel] reportMembershipChanges -> INFO ae3 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +"2019-04-22 06:16:50.878 UTC [msp.identity] Sign -> DEBU ae4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151012 " +"2019-04-22 06:16:50.878 UTC [msp.identity] Sign -> DEBU ae5 Sign: digest: F4D5FD7233C00BA5DAE807A6787F501AC11FC01EB207B2FD2BB2F8808A627E29 " +"2019-04-22 06:16:50.879 UTC [msp.identity] Sign -> DEBU ae6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:50.879 UTC [msp.identity] Sign -> DEBU ae7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:50.879 UTC [gossip.discovery] periodicalSendAlive -> DEBU ae8 Sleeping 5s" +"2019-04-22 06:16:50.884 UTC [msp] DeserializeIdentity -> DEBU ae9 Obtaining identity" +"2019-04-22 06:16:50.885 UTC [msp] DeserializeIdentity -> DEBU aea Obtaining identity" +"2019-04-22 06:16:50.885 UTC [msp] DeserializeIdentity -> DEBU aeb Obtaining identity" +"2019-04-22 06:16:50.885 UTC [gossip.comm] Send -> DEBU aec Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:50.886 UTC [msp] DeserializeIdentity -> DEBU aed Obtaining identity" +"2019-04-22 06:16:50.886 UTC [gossip.comm] Send -> DEBU aee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:50.886 UTC [gossip.comm] Send -> DEBU aef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:50.886 UTC [gossip.comm] sendToEndpoint -> DEBU af0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:50.886 UTC [gossip.comm] sendToEndpoint -> DEBU af1 Exiting" +"2019-04-22 06:16:50.886 UTC [gossip.comm] sendToEndpoint -> DEBU af2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:50.887 UTC [gossip.comm] sendToEndpoint -> DEBU af3 Exiting" +"2019-04-22 06:16:50.887 UTC [gossip.comm] sendToEndpoint -> DEBU af4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:50.887 UTC [gossip.comm] sendToEndpoint -> DEBU af5 Exiting" +"2019-04-22 06:16:50.913 UTC [gossip.pull] Hello -> DEBU af6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:16:50.913 UTC [gossip.comm] Send -> DEBU af7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:50.914 UTC [gossip.pull] Hello -> DEBU af8 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:50.914 UTC [gossip.comm] sendToEndpoint -> DEBU af9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.914 UTC [gossip.comm] sendToEndpoint -> DEBU afa Exiting" +"2019-04-22 06:16:50.915 UTC [gossip.comm] Send -> DEBU afb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:50.915 UTC [gossip.pull] Hello -> DEBU afc Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:16:50.916 UTC [gossip.comm] Send -> DEBU afd Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:50.916 UTC [gossip.comm] sendToEndpoint -> DEBU afe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.916 UTC [gossip.comm] sendToEndpoint -> DEBU aff Exiting" +"2019-04-22 06:16:50.916 UTC [gossip.comm] func1 -> DEBU b00 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9745119100338543403 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.916 UTC [gossip.gossip] handleMessage -> DEBU b02 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9745119100338543403 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.916 UTC [gossip.pull] HandleMessage -> DEBU b03 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9745119100338543403 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.916 UTC [gossip.gossip] handleMessage -> DEBU b04 Exiting" +"2019-04-22 06:16:50.916 UTC [gossip.comm] sendToEndpoint -> DEBU b01 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.917 UTC [gossip.comm] sendToEndpoint -> DEBU b05 Exiting" +"2019-04-22 06:16:50.918 UTC [gossip.comm] func1 -> DEBU b06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7713117138295123738 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.918 UTC [gossip.gossip] handleMessage -> DEBU b07 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.918 UTC [gossip.pull] HandleMessage -> DEBU b08 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.919 UTC [gossip.gossip] handleMessage -> DEBU b09 Exiting" +"2019-04-22 06:16:50.919 UTC [gossip.gossip] handleMessage -> DEBU b0a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7713117138295123738 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.919 UTC [gossip.pull] HandleMessage -> DEBU b0b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7713117138295123738 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 118 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.919 UTC [gossip.gossip] handleMessage -> DEBU b0c Exiting" +"2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b0d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151013 " +"2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b0e Sign: digest: 6CD5289E4348F681393A2ABD412D096823F7D6FD03D7A59D0669C55A85F3B032 " +"2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b0f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:50.920 UTC [msp.identity] Sign -> DEBU b10 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:50.921 UTC [gossip.comm] Send -> DEBU b11 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:50.921 UTC [msp] DeserializeIdentity -> DEBU b12 Obtaining identity" +"2019-04-22 06:16:50.921 UTC [gossip.comm] Send -> DEBU b13 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:50.921 UTC [msp] DeserializeIdentity -> DEBU b14 Obtaining identity" +"2019-04-22 06:16:50.922 UTC [gossip.comm] Send -> DEBU b15 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:50.922 UTC [gossip.comm] sendToEndpoint -> DEBU b16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.923 UTC [gossip.comm] sendToEndpoint -> DEBU b17 Exiting" +"2019-04-22 06:16:50.923 UTC [gossip.comm] sendToEndpoint -> DEBU b18 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.924 UTC [gossip.comm] sendToEndpoint -> DEBU b19 Exiting" +"2019-04-22 06:16:50.923 UTC [gossip.comm] sendToEndpoint -> DEBU b1a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.924 UTC [gossip.comm] sendToEndpoint -> DEBU b1b Exiting" +"2019-04-22 06:16:50.933 UTC [gossip.comm] func1 -> DEBU b1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.934 UTC [gossip.comm] func1 -> DEBU b1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.934 UTC [gossip.gossip] handleMessage -> DEBU b1e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.935 UTC [gossip.gossip] handleMessage -> DEBU b1f Exiting" +"2019-04-22 06:16:50.935 UTC [gossip.gossip] handleMessage -> DEBU b20 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU b21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b22 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:50.935 UTC [msp] DeserializeIdentity -> DEBU b23 Obtaining identity" +"2019-04-22 06:16:50.936 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:50.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b25 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:50.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b26 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:50.937 UTC [policies] Evaluate -> DEBU b27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:50.938 UTC [policies] Evaluate -> DEBU b28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:50.939 UTC [policies] Evaluate -> DEBU b29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:50.940 UTC [cauthdsl] func1 -> DEBU b2a 0xc003747d90 gate 1555913810940061400 evaluation starts" +"2019-04-22 06:16:50.940 UTC [cauthdsl] func2 -> DEBU b2b 0xc003747d90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:50.940 UTC [cauthdsl] func2 -> DEBU b2c 0xc003747d90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:50.940 UTC [cauthdsl] func2 -> DEBU b2d 0xc003747d90 principal matched by identity 0" +"2019-04-22 06:16:50.941 UTC [msp.identity] Verify -> DEBU b2e Verify: digest = 00000000 6f 41 f9 21 12 e5 f4 fd 30 03 8f 7a 63 96 b3 c1 |oA.!....0..zc...| +00000010 54 c6 af 52 34 a5 e2 ad b7 55 46 6d 8c 0e fb b7 |T..R4....UFm....|" +"2019-04-22 06:16:50.941 UTC [msp.identity] Verify -> DEBU b2f Verify: sig = 00000000 30 44 02 20 77 50 47 54 f5 4f e5 ae c3 18 f5 a1 |0D. wPGT.O......| +00000010 8e 6c d5 6f 45 96 7a 20 d3 1c 20 03 b8 9e 53 dd |.l.oE.z .. ...S.| +00000020 36 5a 29 5d 02 20 4b 11 13 cf a4 cf e5 71 ee 07 |6Z)]. K......q..| +00000030 f1 a4 f1 e8 3b d1 a1 cb 2f 60 0f d3 67 d1 3d 34 |....;.../`..g.=4| +00000040 82 99 fb 40 d4 80 |...@..|" +"2019-04-22 06:16:50.942 UTC [cauthdsl] func2 -> DEBU b30 0xc003747d90 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:50.943 UTC [cauthdsl] func1 -> DEBU b31 0xc003747d90 gate 1555913810940061400 evaluation succeeds" +"2019-04-22 06:16:50.944 UTC [policies] Evaluate -> DEBU b32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:50.944 UTC [policies] Evaluate -> DEBU b33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:50.944 UTC [policies] Evaluate -> DEBU b34 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:50.945 UTC [policies] Evaluate -> DEBU b35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:50.945 UTC [gossip.discovery] handleAliveMessage -> DEBU b36 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:50.945 UTC [gossip.discovery] learnExistingMembers -> DEBU b37 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b38 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 " +"2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b39 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 " +"2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b3a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:12 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:50.946 UTC [gossip.discovery] learnExistingMembers -> DEBU b3b Exiting" +"2019-04-22 06:16:50.946 UTC [gossip.discovery] handleAliveMessage -> DEBU b3c Exiting" +"2019-04-22 06:16:50.946 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b3d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:50.946 UTC [msp.identity] Verify -> DEBU b3e Verify: digest = 00000000 be 3f 6a d6 63 4b e0 6e 21 99 e8 e4 90 68 d0 57 |.?j.cK.n!....h.W| +00000010 62 b4 27 3a 63 f3 30 22 e6 23 e4 e8 cd e7 42 8f |b.':c.0".#....B.|" +"2019-04-22 06:16:50.946 UTC [msp.identity] Verify -> DEBU b3f Verify: sig = 00000000 30 45 02 21 00 ba 03 da 46 30 5c f6 f0 2d c0 57 |0E.!....F0\..-.W| +00000010 00 bb 4c fd 58 7e a2 eb b7 08 d3 b9 09 cb 4e 1a |..L.X~........N.| +00000020 99 d0 5d a1 e6 02 20 30 f2 78 e9 56 2d 13 2f 59 |..]... 0.x.V-./Y| +00000030 6c b0 cb bb 50 8f 25 76 b1 1f 8c 0b 71 f5 93 30 |l...P.%v....q..0| +00000040 c4 b6 54 2c fa d6 e6 |..T,...|" +"2019-04-22 06:16:50.947 UTC [gossip.discovery] handleAliveMessage -> DEBU b40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:50.947 UTC [gossip.discovery] handleAliveMessage -> DEBU b41 Exiting" +"2019-04-22 06:16:50.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b42 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:50.947 UTC [msp.identity] Verify -> DEBU b43 Verify: digest = 00000000 6c d5 28 9e 43 48 f6 81 39 3a 2a bd 41 2d 09 68 |l.(.CH..9:*.A-.h| +00000010 23 f7 d6 fd 03 d7 a5 9d 06 69 c5 5a 85 f3 b0 32 |#........i.Z...2|" +"2019-04-22 06:16:50.947 UTC [msp.identity] Verify -> DEBU b44 Verify: sig = 00000000 30 45 02 21 00 92 fc 3f d4 b2 d3 b1 5e 4d 17 40 |0E.!...?....^M.@| +00000010 37 62 52 70 40 27 aa ef c3 48 0d 87 f8 68 68 e9 |7bRp@'...H...hh.| +00000020 1c 9d 32 2e a9 02 20 3a e0 22 47 d8 56 33 46 fe |..2... :."G.V3F.| +00000030 45 13 7d 74 22 06 4f 9f ed 8d 64 54 b8 7f 1f 3e |E.}t".O...dT...>| +00000040 f0 dc 78 51 15 50 9d |..xQ.P.|" +"2019-04-22 06:16:50.948 UTC [gossip.discovery] handleAliveMessage -> DEBU b45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:50.948 UTC [gossip.discovery] isSentByMe -> DEBU b46 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:50.948 UTC [gossip.discovery] handleAliveMessage -> DEBU b47 Exiting" +"2019-04-22 06:16:50.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU b48 Exiting" +"2019-04-22 06:16:50.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU b49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b4a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:50.950 UTC [gossip.gossip] handleMessage -> DEBU b4b Exiting" +"2019-04-22 06:16:50.950 UTC [gossip.gossip] handleMessage -> DEBU b4c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.951 UTC [msp.identity] Verify -> DEBU b4d Verify: digest = 00000000 6c d5 28 9e 43 48 f6 81 39 3a 2a bd 41 2d 09 68 |l.(.CH..9:*.A-.h| +00000010 23 f7 d6 fd 03 d7 a5 9d 06 69 c5 5a 85 f3 b0 32 |#........i.Z...2|" +"2019-04-22 06:16:50.951 UTC [msp.identity] Verify -> DEBU b4e Verify: sig = 00000000 30 45 02 21 00 92 fc 3f d4 b2 d3 b1 5e 4d 17 40 |0E.!...?....^M.@| +00000010 37 62 52 70 40 27 aa ef c3 48 0d 87 f8 68 68 e9 |7bRp@'...H...hh.| +00000020 1c 9d 32 2e a9 02 20 3a e0 22 47 d8 56 33 46 fe |..2... :."G.V3F.| +00000030 45 13 7d 74 22 06 4f 9f ed 8d 64 54 b8 7f 1f 3e |E.}t".O...dT...>| +00000040 f0 dc 78 51 15 50 9d |..xQ.P.|" +"2019-04-22 06:16:50.952 UTC [msp.identity] Verify -> DEBU b4f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:16:50.952 UTC [msp.identity] Verify -> DEBU b50 Verify: sig = 00000000 30 45 02 21 00 92 9d ae 4e 1d fc 53 13 97 88 15 |0E.!....N..S....| +00000010 3b 18 38 4a 50 f1 ff bf 3e 7e 99 94 39 28 a5 27 |;.8JP...>~..9(.'| +00000020 74 5b 0c 4c 3b 02 20 55 31 d2 4a 06 a8 22 c2 fb |t[.L;. U1.J.."..| +00000030 f9 85 7f 33 a5 e2 c4 f5 b5 50 5b de 7b ad f0 f4 |...3.....P[.{...| +00000040 c0 c1 cb f0 5c ac ae |....\..|" +"2019-04-22 06:16:50.952 UTC [gossip.discovery] handleAliveMessage -> DEBU b51 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:50.952 UTC [gossip.discovery] isSentByMe -> DEBU b52 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:50.952 UTC [gossip.discovery] handleAliveMessage -> DEBU b53 Exiting" +"2019-04-22 06:16:50.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU b54 Exiting" +"2019-04-22 06:16:50.953 UTC [gossip.gossip] handleMessage -> DEBU b55 Exiting" +"2019-04-22 06:16:50.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU b56 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes" +"2019-04-22 06:16:50.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b57 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:50.954 UTC [msp.identity] Verify -> DEBU b58 Verify: digest = 00000000 6c d5 28 9e 43 48 f6 81 39 3a 2a bd 41 2d 09 68 |l.(.CH..9:*.A-.h| +00000010 23 f7 d6 fd 03 d7 a5 9d 06 69 c5 5a 85 f3 b0 32 |#........i.Z...2|" +"2019-04-22 06:16:50.954 UTC [msp.identity] Verify -> DEBU b59 Verify: sig = 00000000 30 45 02 21 00 92 fc 3f d4 b2 d3 b1 5e 4d 17 40 |0E.!...?....^M.@| +00000010 37 62 52 70 40 27 aa ef c3 48 0d 87 f8 68 68 e9 |7bRp@'...H...hh.| +00000020 1c 9d 32 2e a9 02 20 3a e0 22 47 d8 56 33 46 fe |..2... :."G.V3F.| +00000030 45 13 7d 74 22 06 4f 9f ed 8d 64 54 b8 7f 1f 3e |E.}t".O...dT...>| +00000040 f0 dc 78 51 15 50 9d |..xQ.P.|" +"2019-04-22 06:16:50.955 UTC [gossip.discovery] handleAliveMessage -> DEBU b5a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:50.955 UTC [gossip.discovery] isSentByMe -> DEBU b5b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:50.956 UTC [gossip.discovery] handleAliveMessage -> DEBU b5c Exiting" +"2019-04-22 06:16:50.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b5d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:50.956 UTC [msp] DeserializeIdentity -> DEBU b5e Obtaining identity" +"2019-04-22 06:16:50.957 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b5f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b60 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b61 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:50.957 UTC [policies] Evaluate -> DEBU b62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:50.957 UTC [policies] Evaluate -> DEBU b63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:50.957 UTC [policies] Evaluate -> DEBU b64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:50.958 UTC [cauthdsl] func1 -> DEBU b65 0xc00275d060 gate 1555913810958139800 evaluation starts" +"2019-04-22 06:16:50.958 UTC [cauthdsl] func2 -> DEBU b66 0xc00275d060 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:50.959 UTC [cauthdsl] func2 -> DEBU b67 0xc00275d060 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:50.959 UTC [cauthdsl] func2 -> DEBU b68 0xc00275d060 principal matched by identity 0" +"2019-04-22 06:16:50.959 UTC [msp.identity] Verify -> DEBU b69 Verify: digest = 00000000 73 fa a8 c1 ef 4c f5 0d 41 2e c9 1c ae 94 73 f8 |s....L..A.....s.| +00000010 4e 51 20 10 a6 ff 84 7f 5e 17 74 29 fb 5f dc 1d |NQ .....^.t)._..|" +"2019-04-22 06:16:50.960 UTC [msp.identity] Verify -> DEBU b6a Verify: sig = 00000000 30 44 02 20 29 3f 19 bc 29 69 4a 8a 85 54 a9 c9 |0D. )?..)iJ..T..| +00000010 82 6a 72 fb 95 68 d8 cf 15 7e 5b 6b 95 41 7d 89 |.jr..h...~[k.A}.| +00000020 19 82 83 c5 02 20 70 a9 ca bb 80 2f ba 95 6e d6 |..... p..../..n.| +00000030 45 da ca c5 3b 92 19 45 64 93 d0 bb cb 80 34 09 |E...;..Ed.....4.| +00000040 0e 62 ee af 91 5a |.b...Z|" +"2019-04-22 06:16:50.960 UTC [cauthdsl] func2 -> DEBU b6b 0xc00275d060 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:50.961 UTC [cauthdsl] func1 -> DEBU b6c 0xc00275d060 gate 1555913810958139800 evaluation succeeds" +"2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b6f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:50.961 UTC [policies] Evaluate -> DEBU b70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:50.962 UTC [gossip.discovery] handleAliveMessage -> DEBU b71 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:50.962 UTC [gossip.discovery] handleAliveMessage -> DEBU b72 Exiting" +"2019-04-22 06:16:50.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b73 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:50.963 UTC [msp] DeserializeIdentity -> DEBU b74 Obtaining identity" +"2019-04-22 06:16:50.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:50.964 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b76 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:50.964 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b77 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:50.964 UTC [policies] Evaluate -> DEBU b78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:50.964 UTC [policies] Evaluate -> DEBU b79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:50.964 UTC [policies] Evaluate -> DEBU b7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:50.965 UTC [cauthdsl] func1 -> DEBU b7b 0xc002586a90 gate 1555913810965547400 evaluation starts" +"2019-04-22 06:16:50.966 UTC [cauthdsl] func2 -> DEBU b7c 0xc002586a90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:50.966 UTC [cauthdsl] func2 -> DEBU b7d 0xc002586a90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:50.966 UTC [cauthdsl] func2 -> DEBU b7e 0xc002586a90 principal matched by identity 0" +"2019-04-22 06:16:50.966 UTC [msp.identity] Verify -> DEBU b7f Verify: digest = 00000000 f6 12 b9 e1 b1 a2 37 e7 c7 95 62 f5 48 17 a1 de |......7...b.H...| +00000010 79 a5 86 cc 74 ab a0 7b 23 b6 fd fc 36 2f 49 ac |y...t..{#...6/I.|" +"2019-04-22 06:16:50.967 UTC [msp.identity] Verify -> DEBU b80 Verify: sig = 00000000 30 45 02 21 00 fe 36 ef bd 62 d9 e1 16 77 59 aa |0E.!..6..b...wY.| +00000010 d5 8c 35 cc c1 ee a7 4e 42 10 e9 f7 5e 44 a5 06 |..5....NB...^D..| +00000020 12 64 4f 2c 8b 02 20 21 e6 a4 c8 d1 e8 c6 ae a2 |.dO,.. !........| +00000030 1e 99 af aa 55 8d 51 e1 a2 35 4f 93 3b 90 90 d2 |....U.Q..5O.;...| +00000040 16 34 cd 10 7d 2f 7a |.4..}/z|" +"2019-04-22 06:16:50.968 UTC [cauthdsl] func2 -> DEBU b81 0xc002586a90 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:50.968 UTC [cauthdsl] func1 -> DEBU b82 0xc002586a90 gate 1555913810965547400 evaluation succeeds" +"2019-04-22 06:16:50.968 UTC [policies] Evaluate -> DEBU b83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:50.970 UTC [policies] Evaluate -> DEBU b84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:50.971 UTC [policies] Evaluate -> DEBU b85 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:50.971 UTC [policies] Evaluate -> DEBU b86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:50.973 UTC [gossip.discovery] handleAliveMessage -> DEBU b87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:8 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:50.978 UTC [gossip.discovery] handleAliveMessage -> DEBU b88 got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1555913791637475800, 20 but got ts: inc_num:1555913791637475800 seq_num:8 " +"2019-04-22 06:16:50.979 UTC [gossip.discovery] handleAliveMessage -> DEBU b89 Exiting" +"2019-04-22 06:16:50.980 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8a Exiting" +"2019-04-22 06:16:51.165 UTC [gossip.comm] func1 -> DEBU b8b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:51.165 UTC [gossip.gossip] handleMessage -> DEBU b8c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:51.166 UTC [gossip.gossip] handleMessage -> DEBU b8d Exiting" +"2019-04-22 06:16:51.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:51.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b8f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:51.168 UTC [msp.identity] Verify -> DEBU b90 Verify: digest = 00000000 88 f1 f3 5c 66 e9 95 45 89 58 af 48 7d 8f 66 4d |...\f..E.X.H}.fM| +00000010 fb 9d ed 2f 35 b1 15 d3 4b 69 f1 28 ba af 66 fe |.../5...Ki.(..f.|" +"2019-04-22 06:16:51.168 UTC [msp.identity] Verify -> DEBU b91 Verify: sig = 00000000 30 44 02 20 3d 6f e6 2f d6 5f d7 64 0d 9d 84 b7 |0D. =o./._.d....| +00000010 66 0a 55 60 02 e0 ef b5 26 a4 82 4c 4f ff 1c d6 |f.U`....&..LO...| +00000020 be 60 9b 2a 02 20 54 06 07 de 46 b5 43 0f ac d1 |.`.*. T...F.C...| +00000030 5e f5 55 6c 48 32 44 b0 8e 7c 73 84 06 cf 9e ac |^.UlH2D..|s.....| +00000040 5b 12 eb de bb b8 |[.....|" +"2019-04-22 06:16:51.169 UTC [msp.identity] Verify -> DEBU b92 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:51.169 UTC [msp.identity] Verify -> DEBU b93 Verify: sig = 00000000 30 45 02 21 00 d9 a6 a5 af 0a b3 d4 d0 b6 a8 9e |0E.!............| +00000010 17 a4 8e fe 84 29 0e 4c a4 cc 8e c0 70 be 58 ef |.....).L....p.X.| +00000020 c6 ff e2 2b 66 02 20 27 cd 92 9d 47 24 16 c0 3b |...+f. '...G$..;| +00000030 7e 9e 7a a7 64 ff 34 0c 01 26 c9 e5 db f0 57 b0 |~.z.d.4..&....W.| +00000040 1a 0e af 7f 44 4f 0c |....DO.|" +"2019-04-22 06:16:51.169 UTC [gossip.discovery] handleAliveMessage -> DEBU b94 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:51.169 UTC [gossip.discovery] learnExistingMembers -> DEBU b95 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:16:51.170 UTC [gossip.discovery] learnExistingMembers -> DEBU b96 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 " +"2019-04-22 06:16:51.170 UTC [gossip.discovery] learnExistingMembers -> DEBU b97 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 " +"2019-04-22 06:16:51.170 UTC [gossip.discovery] learnExistingMembers -> DEBU b98 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:51.171 UTC [gossip.discovery] learnExistingMembers -> DEBU b99 Exiting" +"2019-04-22 06:16:51.171 UTC [gossip.discovery] handleAliveMessage -> DEBU b9a Exiting" +"2019-04-22 06:16:51.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU b9b Exiting" +"2019-04-22 06:16:51.172 UTC [msp] DeserializeIdentity -> DEBU b9c Obtaining identity" +"2019-04-22 06:16:51.178 UTC [msp] DeserializeIdentity -> DEBU b9d Obtaining identity" +"2019-04-22 06:16:51.180 UTC [msp] DeserializeIdentity -> DEBU b9e Obtaining identity" +"2019-04-22 06:16:51.182 UTC [gossip.comm] Send -> DEBU b9f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:51.183 UTC [gossip.gossip] handleMessage -> DEBU ba0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:51.183 UTC [gossip.gossip] handleMessage -> DEBU ba1 Exiting" +"2019-04-22 06:16:51.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:51.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU ba3 Exiting" +"2019-04-22 06:16:51.186 UTC [gossip.comm] sendToEndpoint -> DEBU ba5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:51.187 UTC [gossip.comm] sendToEndpoint -> DEBU ba6 Exiting" +"2019-04-22 06:16:51.182 UTC [msp] DeserializeIdentity -> DEBU ba4 Obtaining identity" +"2019-04-22 06:16:51.187 UTC [gossip.comm] func1 -> DEBU ba7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.188 UTC [gossip.gossip] handleMessage -> DEBU ba9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.187 UTC [gossip.comm] Send -> DEBU ba8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:51.189 UTC [gossip.comm] sendToEndpoint -> DEBU bab Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:51.188 UTC [gossip.pull] HandleMessage -> DEBU baa GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.189 UTC [gossip.pull] SendDigest -> DEBU bac Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:51.190 UTC [gossip.gossip] handleMessage -> DEBU bad Exiting" +"2019-04-22 06:16:51.189 UTC [gossip.comm] sendToEndpoint -> DEBU bae Exiting" +"2019-04-22 06:16:51.201 UTC [gossip.comm] func1 -> DEBU baf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.201 UTC [gossip.gossip] handleMessage -> DEBU bb0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.201 UTC [gossip.gossip] handleMessage -> DEBU bb1 Exiting" +"2019-04-22 06:16:51.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU bb2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.202 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bb3 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:51.202 UTC [msp.identity] Verify -> DEBU bb4 Verify: digest = 00000000 f3 34 6d d5 c4 64 e7 73 33 68 bd 6a f8 96 23 91 |.4m..d.s3h.j..#.| +00000010 c7 d7 3e a2 ef 90 8c 38 c0 cd 38 4f 68 8a f0 e0 |..>....8..8Oh...|" +"2019-04-22 06:16:51.203 UTC [msp.identity] Verify -> DEBU bb5 Verify: sig = 00000000 30 44 02 20 02 c2 2f 91 8b 46 af 18 a8 23 cb 0a |0D. ../..F...#..| +00000010 46 7f 40 25 6e 85 2f e8 4a ff 39 f3 d7 db f5 04 |F.@%n./.J.9.....| +00000020 4f fb 5a 45 02 20 27 b9 9b c8 e0 9e fe 33 f3 ed |O.ZE. '......3..| +00000030 9a 13 16 ad 51 7c 87 0e 02 66 b5 49 ac 5d fc 3b |....Q|...f.I.].;| +00000040 04 88 5c 78 0b 7d |..\x.}|" +"2019-04-22 06:16:51.204 UTC [msp.identity] Verify -> DEBU bb6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:51.204 UTC [msp.identity] Verify -> DEBU bb7 Verify: sig = 00000000 30 44 02 20 0f 69 7c 64 bf cf 51 0c ca 9f e6 b5 |0D. .i|d..Q.....| +00000010 3a ed 36 ed 7c 1b 84 05 41 69 96 6e 46 d2 de c2 |:.6.|...Ai.nF...| +00000020 0d 3c df d6 02 20 43 d5 c1 c3 59 a5 51 fc fa 2d |.<... C...Y.Q..-| +00000030 6d 0b d9 a9 ac 28 b0 f9 b5 6b 7f 49 5f c3 c7 a3 |m....(...k.I_...| +00000040 84 41 fc 76 4f fa |.A.vO.|" +"2019-04-22 06:16:51.204 UTC [gossip.discovery] handleAliveMessage -> DEBU bb8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:51.204 UTC [gossip.discovery] learnExistingMembers -> DEBU bb9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bba updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 " +"2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bbb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 " +"2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bbc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:51.205 UTC [gossip.discovery] learnExistingMembers -> DEBU bbd Exiting" +"2019-04-22 06:16:51.205 UTC [gossip.discovery] handleAliveMessage -> DEBU bbe Exiting" +"2019-04-22 06:16:51.206 UTC [gossip.discovery] sendMemResponse -> DEBU bbf Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:51.206 UTC [msp] DeserializeIdentity -> DEBU bc0 Obtaining identity" +"2019-04-22 06:16:51.206 UTC [msp] DeserializeIdentity -> DEBU bc1 Obtaining identity" +"2019-04-22 06:16:51.207 UTC [gossip.comm] Send -> DEBU bc2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:51.207 UTC [gossip.discovery] sendMemResponse -> DEBU bc3 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:51.207 UTC [gossip.comm] sendToEndpoint -> DEBU bc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.207 UTC [gossip.comm] sendToEndpoint -> DEBU bc5 Exiting" +"2019-04-22 06:16:51.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU bc6 Exiting" +"2019-04-22 06:16:51.499 UTC [gossip.election] waitForInterrupt -> DEBU bc7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:16:51.500 UTC [gossip.election] IsLeader -> DEBU bc8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:16:51.500 UTC [msp.identity] Sign -> DEBU bc9 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510031801 " +"2019-04-22 06:16:51.500 UTC [msp.identity] Sign -> DEBU bca Sign: digest: E539525C8BD91B0F9E1DCCB57E4EF9F216608FF7F83D8AA1E01A1AB038825860 " +"2019-04-22 06:16:51.501 UTC [gossip.election] waitForInterrupt -> DEBU bcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:51.506 UTC [msp] DeserializeIdentity -> DEBU bcc Obtaining identity" +"2019-04-22 06:16:51.506 UTC [msp] DeserializeIdentity -> DEBU bcd Obtaining identity" +"2019-04-22 06:16:51.507 UTC [msp] DeserializeIdentity -> DEBU bce Obtaining identity" +"2019-04-22 06:16:51.507 UTC [msp] DeserializeIdentity -> DEBU bcf Obtaining identity" +"2019-04-22 06:16:51.507 UTC [gossip.comm] Send -> DEBU bd0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:51.508 UTC [msp] DeserializeIdentity -> DEBU bd1 Obtaining identity" +"2019-04-22 06:16:51.508 UTC [msp] DeserializeIdentity -> DEBU bd2 Obtaining identity" +"2019-04-22 06:16:51.508 UTC [gossip.comm] sendToEndpoint -> DEBU bd3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:3 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:16:51.508 UTC [gossip.comm] sendToEndpoint -> DEBU bd4 Exiting" +"2019-04-22 06:16:51.649 UTC [gossip.comm] func1 -> DEBU bd5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.649 UTC [gossip.gossip] handleMessage -> DEBU bd6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.649 UTC [gossip.pull] HandleMessage -> DEBU bd7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.649 UTC [msp] DeserializeIdentity -> DEBU bd8 Obtaining identity" +"2019-04-22 06:16:51.650 UTC [msp] DeserializeIdentity -> DEBU bd9 Obtaining identity" +"2019-04-22 06:16:51.650 UTC [gossip.pull] SendDigest -> DEBU bda Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:51.651 UTC [gossip.gossip] handleMessage -> DEBU bdb Exiting" +"2019-04-22 06:16:51.657 UTC [gossip.comm] func1 -> DEBU bdc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.657 UTC [gossip.gossip] handleMessage -> DEBU bdd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.657 UTC [gossip.gossip] handleMessage -> DEBU bde Exiting" +"2019-04-22 06:16:51.658 UTC [gossip.discovery] handleMsgFromComm -> DEBU bdf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.658 UTC [gossip.gossip] ValidateAliveMsg -> DEBU be0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:51.658 UTC [msp] DeserializeIdentity -> DEBU be1 Obtaining identity" +"2019-04-22 06:16:51.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU be2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU be3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU be4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.658 UTC [policies] Evaluate -> DEBU be5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:51.658 UTC [policies] Evaluate -> DEBU be6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:51.658 UTC [policies] Evaluate -> DEBU be7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:51.658 UTC [cauthdsl] func1 -> DEBU be8 0xc0027b9140 gate 1555913811658575200 evaluation starts" +"2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU be9 0xc0027b9140 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU bea 0xc0027b9140 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU beb 0xc0027b9140 principal matched by identity 0" +"2019-04-22 06:16:51.658 UTC [msp.identity] Verify -> DEBU bec Verify: digest = 00000000 f1 2f 14 2c 1c 0f e1 93 7d 8a d3 71 31 a5 7a 74 |./.,....}..q1.zt| +00000010 57 f6 e7 3b 09 ed 15 5c 76 00 f0 39 3a 9a a5 c6 |W..;...\v..9:...|" +"2019-04-22 06:16:51.658 UTC [msp.identity] Verify -> DEBU bed Verify: sig = 00000000 30 44 02 20 45 24 ce b0 1a aa 23 99 23 b2 30 9b |0D. E$....#.#.0.| +00000010 33 ea d7 8d 98 ee ee 6e b5 15 95 51 92 ad 6e a4 |3......n...Q..n.| +00000020 39 f1 f2 dd 02 20 43 53 d1 af 0a 30 40 09 fd 5a |9.... CS...0@..Z| +00000030 e5 48 d5 bb e3 35 f2 20 fe b7 74 d3 ae 1a 58 89 |.H...5. ..t...X.| +00000040 8e d2 df b6 c7 5f |....._|" +"2019-04-22 06:16:51.658 UTC [cauthdsl] func2 -> DEBU bee 0xc0027b9140 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:51.658 UTC [cauthdsl] func1 -> DEBU bef 0xc0027b9140 gate 1555913811658575200 evaluation succeeds" +"2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:51.659 UTC [policies] Evaluate -> DEBU bf3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:51.659 UTC [gossip.discovery] handleAliveMessage -> DEBU bf4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf6 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 " +"2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 " +"2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:51.659 UTC [gossip.discovery] learnExistingMembers -> DEBU bf9 Exiting" +"2019-04-22 06:16:51.659 UTC [gossip.discovery] handleAliveMessage -> DEBU bfa Exiting" +"2019-04-22 06:16:51.659 UTC [gossip.discovery] handleMsgFromComm -> DEBU bfb Exiting" +"2019-04-22 06:16:51.659 UTC [gossip.discovery] sendMemResponse -> DEBU bfc Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:51.659 UTC [msp] DeserializeIdentity -> DEBU bfd Obtaining identity" +"2019-04-22 06:16:51.659 UTC [msp] DeserializeIdentity -> DEBU bfe Obtaining identity" +"2019-04-22 06:16:51.659 UTC [msp] DeserializeIdentity -> DEBU bff Obtaining identity" +"2019-04-22 06:16:51.663 UTC [gossip.comm] Send -> DEBU c00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:51.663 UTC [gossip.comm] sendToEndpoint -> DEBU c01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.663 UTC [gossip.comm] sendToEndpoint -> DEBU c02 Exiting" +"2019-04-22 06:16:51.663 UTC [gossip.discovery] sendMemResponse -> DEBU c03 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:16:51.686 UTC [gossip.comm] func1 -> DEBU c04 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.686 UTC [gossip.gossip] handleMessage -> DEBU c05 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.687 UTC [gossip.gossip] handleMessage -> DEBU c06 Exiting" +"2019-04-22 06:16:51.687 UTC [gossip.discovery] handleMsgFromComm -> DEBU c07 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.688 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c08 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:51.688 UTC [msp] DeserializeIdentity -> DEBU c09 Obtaining identity" +"2019-04-22 06:16:51.689 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.689 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.689 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c0c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.689 UTC [policies] Evaluate -> DEBU c0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:51.689 UTC [policies] Evaluate -> DEBU c0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:51.689 UTC [policies] Evaluate -> DEBU c0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:51.689 UTC [cauthdsl] func1 -> DEBU c10 0xc0031b92b0 gate 1555913811689941400 evaluation starts" +"2019-04-22 06:16:51.690 UTC [cauthdsl] func2 -> DEBU c11 0xc0031b92b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:51.690 UTC [cauthdsl] func2 -> DEBU c12 0xc0031b92b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:51.690 UTC [cauthdsl] func2 -> DEBU c13 0xc0031b92b0 principal matched by identity 0" +"2019-04-22 06:16:51.691 UTC [msp.identity] Verify -> DEBU c14 Verify: digest = 00000000 c7 37 28 b4 c7 8a d3 fe 47 f3 12 2a 1c 73 88 a5 |.7(.....G..*.s..| +00000010 75 94 72 fc 39 57 e4 81 09 65 71 6f b1 42 96 c1 |u.r.9W...eqo.B..|" +"2019-04-22 06:16:51.691 UTC [msp.identity] Verify -> DEBU c15 Verify: sig = 00000000 30 45 02 21 00 d8 67 de d8 3e 95 fe 7e 92 bc b3 |0E.!..g..>..~...| +00000010 69 27 10 89 b9 62 38 78 83 b4 2a 53 c0 55 ae 49 |i'...b8x..*S.U.I| +00000020 92 39 4d 89 aa 02 20 05 10 3f ff 50 70 fd e5 c9 |.9M... ..?.Pp...| +00000030 29 17 28 a7 12 8d 5e e8 ce 8f ba 11 78 1b ce 77 |).(...^.....x..w| +00000040 cd ff fc 61 f0 b7 f8 |...a...|" +"2019-04-22 06:16:51.691 UTC [cauthdsl] func2 -> DEBU c16 0xc0031b92b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:51.691 UTC [cauthdsl] func1 -> DEBU c17 0xc0031b92b0 gate 1555913811689941400 evaluation succeeds" +"2019-04-22 06:16:51.691 UTC [policies] Evaluate -> DEBU c18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.694 UTC [policies] Evaluate -> DEBU c19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.697 UTC [policies] Evaluate -> DEBU c1a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:51.697 UTC [policies] Evaluate -> DEBU c1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:51.697 UTC [gossip.discovery] handleAliveMessage -> DEBU c1c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.698 UTC [gossip.discovery] handleAliveMessage -> DEBU c1d got old alive message about alive peer Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd lastAliveTS: 1555913791637475800, 22 but got ts: inc_num:1555913791637475800 seq_num:21 " +"2019-04-22 06:16:51.698 UTC [gossip.discovery] handleAliveMessage -> DEBU c1e Exiting" +"2019-04-22 06:16:51.698 UTC [gossip.discovery] handleMsgFromComm -> DEBU c1f Exiting" +"2019-04-22 06:16:51.707 UTC [msp] DeserializeIdentity -> DEBU c20 Obtaining identity" +"2019-04-22 06:16:51.708 UTC [msp] DeserializeIdentity -> DEBU c21 Obtaining identity" +"2019-04-22 06:16:51.708 UTC [msp] DeserializeIdentity -> DEBU c22 Obtaining identity" +"2019-04-22 06:16:51.709 UTC [msp] DeserializeIdentity -> DEBU c23 Obtaining identity" +"2019-04-22 06:16:51.709 UTC [msp] DeserializeIdentity -> DEBU c24 Obtaining identity" +"2019-04-22 06:16:51.710 UTC [msp] DeserializeIdentity -> DEBU c25 Obtaining identity" +"2019-04-22 06:16:51.710 UTC [msp] DeserializeIdentity -> DEBU c26 Obtaining identity" +"2019-04-22 06:16:51.711 UTC [gossip.comm] Send -> DEBU c27 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:51.711 UTC [msp] DeserializeIdentity -> DEBU c28 Obtaining identity" +"2019-04-22 06:16:51.712 UTC [gossip.comm] Send -> DEBU c29 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU c2a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.712 UTC [gossip.comm] sendToEndpoint -> DEBU c2b Exiting" +"2019-04-22 06:16:51.713 UTC [gossip.comm] sendToEndpoint -> DEBU c2c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.713 UTC [gossip.comm] sendToEndpoint -> DEBU c2d Exiting" +"2019-04-22 06:16:51.718 UTC [gossip.gossip] handleMessage -> DEBU c2e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.718 UTC [gossip.gossip] handleMessage -> DEBU c2f Exiting" +"2019-04-22 06:16:51.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU c30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:51.719 UTC [gossip.discovery] handleMsgFromComm -> DEBU c31 Exiting" +"2019-04-22 06:16:51.916 UTC [gossip.pull] SendReq -> DEBU c32 Sending [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to peer0.org2.example.com:7051" +"2019-04-22 06:16:51.916 UTC [gossip.comm] Send -> DEBU c33 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:51.917 UTC [gossip.comm] sendToEndpoint -> DEBU c34 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY data request: nonce: 10465502825874617774 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 85 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.917 UTC [gossip.comm] sendToEndpoint -> DEBU c35 Exiting" +"2019-04-22 06:16:51.918 UTC [gossip.gossip] handleMessage -> DEBU c36 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 10465502825874617774, Envelope: 1896 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.919 UTC [msp] DeserializeIdentity -> DEBU c37 Obtaining identity" +"2019-04-22 06:16:51.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c39 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.919 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c3a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.919 UTC [policies] Evaluate -> DEBU c3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:51.919 UTC [policies] Evaluate -> DEBU c3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:51.919 UTC [policies] Evaluate -> DEBU c3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:51.919 UTC [cauthdsl] func1 -> DEBU c3e 0xc00315e470 gate 1555913811919599000 evaluation starts" +"2019-04-22 06:16:51.919 UTC [cauthdsl] func2 -> DEBU c3f 0xc00315e470 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:51.919 UTC [cauthdsl] func2 -> DEBU c40 0xc00315e470 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:51.919 UTC [cauthdsl] func2 -> DEBU c41 0xc00315e470 principal matched by identity 0" +"2019-04-22 06:16:51.919 UTC [msp.identity] Verify -> DEBU c42 Verify: digest = 00000000 46 c6 c4 4c b7 22 99 e3 22 d5 e6 87 89 b1 fd d5 |F..L."..".......| +00000010 9a 0f d4 fd 3e de f2 e7 60 27 9c c3 a3 1f 37 5e |....>...`'....7^|" +"2019-04-22 06:16:51.919 UTC [msp.identity] Verify -> DEBU c43 Verify: sig = 00000000 30 44 02 20 72 c5 da 43 9a ec 68 e4 96 ad 11 51 |0D. r..C..h....Q| +00000010 3c 53 2e da f0 a1 3b b2 2a 76 45 12 46 01 3f c3 | DEBU c44 0xc00315e470 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:51.920 UTC [cauthdsl] func1 -> DEBU c45 0xc00315e470 gate 1555913811919599000 evaluation succeeds" +"2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c46 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c48 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:51.920 UTC [policies] Evaluate -> DEBU c49 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:51.920 UTC [msp] DeserializeIdentity -> DEBU c4a Obtaining identity" +"2019-04-22 06:16:51.920 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c4b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.920 UTC [msp] DeserializeIdentity -> DEBU c4c Obtaining identity" +"2019-04-22 06:16:51.920 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c4e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c4f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:51.921 UTC [cauthdsl] func1 -> DEBU c53 0xc003452210 gate 1555913811921223600 evaluation starts" +"2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c54 0xc003452210 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c55 0xc003452210 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c56 0xc003452210 principal matched by identity 0" +"2019-04-22 06:16:51.921 UTC [msp.identity] Verify -> DEBU c57 Verify: digest = 00000000 22 e8 9b 06 cf 55 2d 7b 96 da 78 12 27 61 0d 21 |"....U-{..x.'a.!| +00000010 6d ab 1c 40 b6 9d 36 f8 b3 55 a0 21 bd 59 bf cb |m..@..6..U.!.Y..|" +"2019-04-22 06:16:51.921 UTC [msp.identity] Verify -> DEBU c58 Verify: sig = 00000000 30 44 02 20 3c 3e a5 63 cd 12 b9 1f 58 f8 d5 6e |0D. <>.c....X..n| +00000010 71 b3 61 70 11 36 7d 9a c9 4c b5 fd 3e e5 f3 df |q.ap.6}..L..>...| +00000020 4e fc 73 9d 02 20 5e e4 45 54 4a 82 04 83 a4 eb |N.s.. ^.ETJ.....| +00000030 30 3b 3e 6d 87 7f 6e eb d2 db 08 59 05 24 0b e8 |0;>m..n....Y.$..| +00000040 82 11 4b 08 cc 41 |..K..A|" +"2019-04-22 06:16:51.921 UTC [cauthdsl] func2 -> DEBU c59 0xc003452210 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:51.921 UTC [cauthdsl] func1 -> DEBU c5a 0xc003452210 gate 1555913811921223600 evaluation succeeds" +"2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:51.921 UTC [policies] Evaluate -> DEBU c5d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:51.922 UTC [policies] Evaluate -> DEBU c5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:51.922 UTC [msp] DeserializeIdentity -> DEBU c5f Obtaining identity" +"2019-04-22 06:16:51.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c60 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.922 UTC [gossip.pull] HandleMessage -> DEBU c61 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 10465502825874617774, Envelope: 1896 bytes, Signature: 0 bytes" +"2019-04-22 06:16:51.922 UTC [msp] DeserializeIdentity -> DEBU c62 Obtaining identity" +"2019-04-22 06:16:51.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c63 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.922 UTC [msp] DeserializeIdentity -> DEBU c64 Obtaining identity" +"2019-04-22 06:16:51.922 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c65 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.922 UTC [gossip.gossip] func2 -> DEBU c66 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 83 108 121 106 114 100 47 106 72 83 81 98 80 103 66 74 56 80 118 79 43 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 79 71 80 69 80 81 102 80 47 111 56 99 10 112 102 52 55 48 49 67 108 49 68 118 71 107 50 113 81 43 85 48 77 85 106 81 66 111 73 97 79 66 75 81 84 75 68 79 120 53 43 103 80 111 90 66 81 87 99 80 79 120 89 74 72 121 51 87 115 75 104 56 84 82 108 100 118 10 87 110 75 68 79 120 90 111 71 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 77 51 98 72 112 88 119 49 78 69 109 102 70 119 55 68 78 82 99 113 43 122 68 47 90 84 56 99 120 83 53 122 80 82 113 101 87 115 103 122 74 120 103 67 73 71 99 50 48 97 77 114 10 75 75 73 52 86 56 104 53 108 71 67 85 72 122 49 72 114 117 50 53 50 112 52 68 78 48 104 113 119 66 68 55 111 87 113 81 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-04-22 06:16:51.922 UTC [gossip.pull] HandleMessage -> DEBU c67 Added �?Y;.�ZW�m�~����m֩�ܮ@S�^u� to the in memory item map, total items: 3" +"2019-04-22 06:16:51.923 UTC [msp] DeserializeIdentity -> DEBU c68 Obtaining identity" +"2019-04-22 06:16:51.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c69 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.923 UTC [msp] DeserializeIdentity -> DEBU c6a Obtaining identity" +"2019-04-22 06:16:51.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:51.923 UTC [gossip.gossip] func2 -> DEBU c6c Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 99 51 85 122 111 57 73 88 52 107 111 97 50 78 74 43 105 65 54 80 122 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 117 100 100 52 43 105 71 56 48 122 111 101 10 119 116 120 89 83 74 122 115 66 103 68 117 48 84 122 88 108 75 98 87 55 98 104 54 65 72 49 111 79 90 106 69 67 88 47 90 111 50 99 103 52 110 101 121 111 74 102 55 77 100 66 81 113 74 103 108 107 80 114 102 109 84 50 99 10 85 70 51 109 82 100 70 72 50 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 102 66 110 75 99 70 97 68 69 47 110 98 76 75 70 105 100 108 102 89 103 67 78 77 101 89 120 83 122 52 72 47 72 52 68 89 105 109 97 113 52 101 65 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 83 97 73 108 48 115 51 108 48 76 51 49 108 66 69 112 83 88 67 97 77 79 121 54 103 68 122 119 88 50 97 101 79 104 88 84 48 55 103 52 104 74 103 67 73 69 113 75 47 103 88 73 10 55 115 73 56 43 110 89 113 55 50 108 116 76 110 66 111 102 87 82 82 56 53 52 116 106 76 79 86 112 77 84 66 90 51 107 76 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-04-22 06:16:51.923 UTC [gossip.pull] HandleMessage -> DEBU c6d Added ̣P��S��WtK̺����M6a�s)��� 0 to the in memory item map, total items: 4" +"2019-04-22 06:16:51.923 UTC [gossip.gossip] handleMessage -> DEBU c6e Exiting" +"2019-04-22 06:16:52.063 UTC [gossip.gossip] handleMessage -> DEBU c6f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.063 UTC [gossip.pull] HandleMessage -> DEBU c70 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c71 Obtaining identity" +"2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c72 Obtaining identity" +"2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c73 Obtaining identity" +"2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c74 Obtaining identity" +"2019-04-22 06:16:52.063 UTC [msp] DeserializeIdentity -> DEBU c75 Obtaining identity" +"2019-04-22 06:16:52.064 UTC [msp] DeserializeIdentity -> DEBU c76 Obtaining identity" +"2019-04-22 06:16:52.064 UTC [gossip.pull] SendDigest -> DEBU c77 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:52.064 UTC [gossip.gossip] handleMessage -> DEBU c78 Exiting" +"2019-04-22 06:16:52.078 UTC [gossip.gossip] handleMessage -> DEBU c79 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.078 UTC [gossip.gossip] handleMessage -> DEBU c7a Exiting" +"2019-04-22 06:16:52.078 UTC [gossip.discovery] handleMsgFromComm -> DEBU c7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.079 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c7c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:52.079 UTC [msp] DeserializeIdentity -> DEBU c7d Obtaining identity" +"2019-04-22 06:16:52.081 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:52.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c7f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.081 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c80 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.081 UTC [policies] Evaluate -> DEBU c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.081 UTC [policies] Evaluate -> DEBU c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.082 UTC [policies] Evaluate -> DEBU c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.082 UTC [cauthdsl] func1 -> DEBU c84 0xc00359a650 gate 1555913812082284200 evaluation starts" +"2019-04-22 06:16:52.091 UTC [cauthdsl] func2 -> DEBU c85 0xc00359a650 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.091 UTC [cauthdsl] func2 -> DEBU c86 0xc00359a650 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.092 UTC [cauthdsl] func2 -> DEBU c87 0xc00359a650 principal matched by identity 0" +"2019-04-22 06:16:52.092 UTC [msp.identity] Verify -> DEBU c88 Verify: digest = 00000000 2f 21 46 38 56 f6 f4 ed 06 c9 49 2e 0a 36 d2 d1 |/!F8V.....I..6..| +00000010 b4 67 a1 32 02 ef c2 cc 17 ff 37 0a 6f 1f 1b 42 |.g.2......7.o..B|" +"2019-04-22 06:16:52.095 UTC [msp.identity] Verify -> DEBU c89 Verify: sig = 00000000 30 45 02 21 00 a3 25 64 63 f1 d5 6f fb 5d 61 9b |0E.!..%dc..o.]a.| +00000010 ae 55 35 d0 49 b8 af 5b 50 18 15 d9 30 55 b0 fd |.U5.I..[P...0U..| +00000020 3c 4c 10 34 7a 02 20 15 15 c2 ed 8c f7 0a 16 98 | DEBU c8a 0xc00359a650 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.095 UTC [cauthdsl] func1 -> DEBU c8b 0xc00359a650 gate 1555913812082284200 evaluation succeeds" +"2019-04-22 06:16:52.095 UTC [policies] Evaluate -> DEBU c8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.098 UTC [policies] Evaluate -> DEBU c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.098 UTC [policies] Evaluate -> DEBU c8e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.099 UTC [policies] Evaluate -> DEBU c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.099 UTC [gossip.discovery] handleAliveMessage -> DEBU c90 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.099 UTC [gossip.discovery] learnExistingMembers -> DEBU c91 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:16:52.100 UTC [gossip.discovery] learnExistingMembers -> DEBU c92 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 " +"2019-04-22 06:16:52.100 UTC [gossip.discovery] learnExistingMembers -> DEBU c93 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 " +"2019-04-22 06:16:52.100 UTC [gossip.discovery] learnExistingMembers -> DEBU c94 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:18 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:52.101 UTC [gossip.discovery] learnExistingMembers -> DEBU c95 Exiting" +"2019-04-22 06:16:52.101 UTC [gossip.discovery] handleAliveMessage -> DEBU c96 Exiting" +"2019-04-22 06:16:52.103 UTC [gossip.discovery] handleMsgFromComm -> DEBU c97 Exiting" +"2019-04-22 06:16:52.103 UTC [gossip.gossip] handleMessage -> DEBU c98 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.104 UTC [gossip.gossip] handleMessage -> DEBU c99 Exiting" +"2019-04-22 06:16:52.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU c9a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU c9b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:52.105 UTC [msp] DeserializeIdentity -> DEBU c9c Obtaining identity" +"2019-04-22 06:16:52.106 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:52.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.106 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c9f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.107 UTC [policies] Evaluate -> DEBU ca0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.107 UTC [policies] Evaluate -> DEBU ca1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.107 UTC [msp] DeserializeIdentity -> DEBU ca2 Obtaining identity" +"2019-04-22 06:16:52.108 UTC [msp] DeserializeIdentity -> DEBU ca3 Obtaining identity" +"2019-04-22 06:16:52.108 UTC [msp] DeserializeIdentity -> DEBU ca4 Obtaining identity" +"2019-04-22 06:16:52.109 UTC [msp] DeserializeIdentity -> DEBU ca5 Obtaining identity" +"2019-04-22 06:16:52.109 UTC [msp] DeserializeIdentity -> DEBU ca6 Obtaining identity" +"2019-04-22 06:16:52.110 UTC [msp] DeserializeIdentity -> DEBU ca7 Obtaining identity" +"2019-04-22 06:16:52.110 UTC [msp] DeserializeIdentity -> DEBU ca8 Obtaining identity" +"2019-04-22 06:16:52.111 UTC [gossip.comm] Send -> DEBU ca9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:52.111 UTC [msp] DeserializeIdentity -> DEBU caa Obtaining identity" +"2019-04-22 06:16:52.111 UTC [gossip.comm] Send -> DEBU cab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU cac Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU cad Exiting" +"2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU cae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.112 UTC [gossip.comm] sendToEndpoint -> DEBU caf Exiting" +"2019-04-22 06:16:52.113 UTC [gossip.comm] func1 -> DEBU cb0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.113 UTC [gossip.gossip] handleMessage -> DEBU cb1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.107 UTC [policies] Evaluate -> DEBU cb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.114 UTC [cauthdsl] func1 -> DEBU cb3 0xc00371ac50 gate 1555913812114584700 evaluation starts" +"2019-04-22 06:16:52.114 UTC [cauthdsl] func2 -> DEBU cb4 0xc00371ac50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.114 UTC [gossip.comm] func1 -> DEBU cb5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.115 UTC [cauthdsl] func2 -> DEBU cb6 0xc00371ac50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.117 UTC [cauthdsl] func2 -> DEBU cb7 0xc00371ac50 principal matched by identity 0" +"2019-04-22 06:16:52.117 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 bd 0b e1 d2 5c d0 f2 c1 1c 08 8f 57 9e 5c 24 2d |....\......W.\$-| +00000010 04 90 bc d8 18 36 70 e0 ce 55 c7 e6 d1 3d 70 2c |.....6p..U...=p,|" +"2019-04-22 06:16:52.117 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 44 02 20 23 e4 b9 a0 c6 cb 10 14 e9 31 93 22 |0D. #........1."| +00000010 0f 0c 58 07 14 fe 60 db 59 bf 92 71 c9 15 4a 63 |..X...`.Y..q..Jc| +00000020 02 81 3a b9 02 20 0a e0 80 ef bb e5 ab e7 29 64 |..:.. ........)d| +00000030 7f 72 eb 85 5b 19 17 fe 20 41 dd 9e 8a 38 85 f4 |.r..[... A...8..| +00000040 fe 9a 6c 7f a4 f6 |..l...|" +"2019-04-22 06:16:52.118 UTC [cauthdsl] func2 -> DEBU cba 0xc00371ac50 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.118 UTC [cauthdsl] func1 -> DEBU cbb 0xc00371ac50 gate 1555913812114584700 evaluation succeeds" +"2019-04-22 06:16:52.118 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.119 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.119 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.119 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.119 UTC [gossip.discovery] handleAliveMessage -> DEBU cc0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:52.119 UTC [gossip.discovery] learnExistingMembers -> DEBU cc1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:52.120 UTC [gossip.discovery] learnExistingMembers -> DEBU cc2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 " +"2019-04-22 06:16:52.120 UTC [gossip.discovery] learnExistingMembers -> DEBU cc3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 " +"2019-04-22 06:16:52.120 UTC [gossip.discovery] learnExistingMembers -> DEBU cc4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:52.121 UTC [gossip.discovery] learnExistingMembers -> DEBU cc5 Exiting" +"2019-04-22 06:16:52.121 UTC [gossip.discovery] handleAliveMessage -> DEBU cc6 Exiting" +"2019-04-22 06:16:52.122 UTC [gossip.discovery] sendMemResponse -> DEBU cc7 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:52.123 UTC [msp] DeserializeIdentity -> DEBU cc8 Obtaining identity" +"2019-04-22 06:16:52.123 UTC [msp] DeserializeIdentity -> DEBU cc9 Obtaining identity" +"2019-04-22 06:16:52.124 UTC [msp] DeserializeIdentity -> DEBU cca Obtaining identity" +"2019-04-22 06:16:52.124 UTC [gossip.comm] Send -> DEBU ccb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:52.125 UTC [gossip.discovery] sendMemResponse -> DEBU ccc Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:16:52.126 UTC [gossip.comm] sendToEndpoint -> DEBU ccd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.127 UTC [gossip.comm] sendToEndpoint -> DEBU cce Exiting" +"2019-04-22 06:16:52.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU ccf Exiting" +"2019-04-22 06:16:52.128 UTC [gossip.gossip] handleMessage -> DEBU cd0 Exiting" +"2019-04-22 06:16:52.129 UTC [gossip.gossip] handleMessage -> DEBU cd1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.130 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd3 Exiting" +"2019-04-22 06:16:52.131 UTC [gossip.gossip] handleMessage -> DEBU cd4 Exiting" +"2019-04-22 06:16:52.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:52.133 UTC [gossip.discovery] handleMsgFromComm -> DEBU cd6 Exiting" +"2019-04-22 06:16:52.259 UTC [endorser] ProcessProposal -> DEBU cd7 Entering: request from 192.168.224.9:49230" +"2019-04-22 06:16:52.260 UTC [protoutils] ValidateProposalMessage -> DEBU cd8 ValidateProposalMessage starts for signed proposal 0xc003357a40" +"2019-04-22 06:16:52.260 UTC [protoutils] validateChannelHeader -> DEBU cd9 validateChannelHeader info: header type 3" +"2019-04-22 06:16:52.260 UTC [protoutils] checkSignatureFromCreator -> DEBU cda begin" +"2019-04-22 06:16:52.261 UTC [protoutils] checkSignatureFromCreator -> DEBU cdb creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:52.261 UTC [protoutils] checkSignatureFromCreator -> DEBU cdc creator is valid" +"2019-04-22 06:16:52.261 UTC [msp.identity] Verify -> DEBU cdd Verify: digest = 00000000 ac 51 ee 5e 3a d8 3a 5b ad 83 05 73 e6 be 85 ec |.Q.^:.:[...s....| +00000010 9d 03 8c 50 b3 6e 9e 67 a8 58 f5 f5 87 fe 09 5f |...P.n.g.X....._|" +"2019-04-22 06:16:52.262 UTC [msp.identity] Verify -> DEBU cde Verify: sig = 00000000 30 45 02 21 00 85 c5 b2 97 10 be 03 ff c4 8e 5d |0E.!...........]| +00000010 e0 ee a0 b2 b2 48 59 33 3e c1 00 b7 ce 84 79 8b |.....HY3>.....y.| +00000020 ee 13 49 a9 5b 02 20 5c e3 51 df fd c6 ba d6 5e |..I.[. \.Q.....^| +00000030 d9 f7 c7 15 3a b2 b3 45 6f 55 c4 fa 12 da 28 d1 |....:..EoU....(.| +00000040 92 1f 39 29 00 a3 54 |..9)..T|" +"2019-04-22 06:16:52.262 UTC [protoutils] checkSignatureFromCreator -> DEBU cdf exits successfully" +"2019-04-22 06:16:52.262 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ce0 validateChaincodeProposalMessage starts for proposal 0xc002441880, header 0xc003357ea0" +"2019-04-22 06:16:52.263 UTC [protoutils] validateChaincodeProposalMessage -> DEBU ce1 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-04-22 06:16:52.263 UTC [endorser] preProcess -> DEBU ce2 [][e792347c] processing txid: e792347c429d95340d4ba3ad563c714ff7fa8ff4d989749dc66519df6c51c532" +"2019-04-22 06:16:52.263 UTC [endorser] SimulateProposal -> DEBU ce3 [][e792347c] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:52.264 UTC [endorser] callChaincode -> INFO ce4 [][e792347c] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:52.264 UTC [chaincode] Execute -> DEBU ce5 Entry" +"2019-04-22 06:16:52.264 UTC [msp.identity] Verify -> DEBU ce6 Verify: digest = 00000000 ac 51 ee 5e 3a d8 3a 5b ad 83 05 73 e6 be 85 ec |.Q.^:.:[...s....| +00000010 9d 03 8c 50 b3 6e 9e 67 a8 58 f5 f5 87 fe 09 5f |...P.n.g.X....._|" +"2019-04-22 06:16:52.264 UTC [msp.identity] Verify -> DEBU ce7 Verify: sig = 00000000 30 45 02 21 00 85 c5 b2 97 10 be 03 ff c4 8e 5d |0E.!...........]| +00000010 e0 ee a0 b2 b2 48 59 33 3e c1 00 b7 ce 84 79 8b |.....HY3>.....y.| +00000020 ee 13 49 a9 5b 02 20 5c e3 51 df fd c6 ba d6 5e |..I.[. \.Q.....^| +00000030 d9 f7 c7 15 3a b2 b3 45 6f 55 c4 fa 12 da 28 d1 |....:..EoU....(.| +00000040 92 1f 39 29 00 a3 54 |..9)..T|" +"2019-04-22 06:16:52.265 UTC [lifecycle] QueryInstalledChaincodes -> DEBU ce8 received invocation of QueryInstalledChaincodes" +"2019-04-22 06:16:52.266 UTC [chaincode] handleMessage -> DEBU ce9 [e792347c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:52.266 UTC [chaincode] Notify -> DEBU cea [e792347c] notifying Txid:e792347c429d95340d4ba3ad563c714ff7fa8ff4d989749dc66519df6c51c532, channelID:" +"2019-04-22 06:16:52.266 UTC [chaincode] Execute -> DEBU ceb Exit" +"2019-04-22 06:16:52.266 UTC [endorser] callChaincode -> INFO cec [][e792347c] Exit chaincode: name:"_lifecycle" (3ms)" +"2019-04-22 06:16:52.267 UTC [endorser] SimulateProposal -> DEBU ced [][e792347c] Exit" +"2019-04-22 06:16:52.267 UTC [endorser] func1 -> DEBU cee Exit: request from 192.168.224.9:49230" +"2019-04-22 06:16:52.267 UTC [comm.grpc.server] 1 -> INFO cef unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49230 grpc.code=OK grpc.call_duration=7.9442ms +"2019-04-22 06:16:52.271 UTC [grpc] infof -> DEBU cf0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:52.272 UTC [grpc] infof -> DEBU cf1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:52.421 UTC [endorser] ProcessProposal -> DEBU cf2 Entering: request from 192.168.224.9:49234" +"2019-04-22 06:16:52.421 UTC [protoutils] ValidateProposalMessage -> DEBU cf3 ValidateProposalMessage starts for signed proposal 0xc003240a50" +"2019-04-22 06:16:52.422 UTC [protoutils] validateChannelHeader -> DEBU cf4 validateChannelHeader info: header type 1" +"2019-04-22 06:16:52.422 UTC [protoutils] checkSignatureFromCreator -> DEBU cf5 begin" +"2019-04-22 06:16:52.422 UTC [protoutils] checkSignatureFromCreator -> DEBU cf6 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:52.423 UTC [protoutils] checkSignatureFromCreator -> DEBU cf7 creator is valid" +"2019-04-22 06:16:52.423 UTC [msp.identity] Verify -> DEBU cf8 Verify: digest = 00000000 66 ef 7b c6 04 88 fa 46 b9 f0 fd 0c fd 11 ce 08 |f.{....F........| +00000010 2f 89 ea 0d 36 db fd 3d d8 95 b0 a6 b2 04 fb 70 |/...6..=.......p|" +"2019-04-22 06:16:52.423 UTC [msp.identity] Verify -> DEBU cf9 Verify: sig = 00000000 30 44 02 20 49 bd c4 2c e1 c9 fe 78 3a 45 2d f1 |0D. I..,...x:E-.| +00000010 87 f3 bb 0e bd fe be be ce f2 bc 51 af fd 0d d0 |...........Q....| +00000020 01 ab 7d 5b 02 20 2c 5e 7f d7 6a 3e 19 03 7f 9e |..}[. ,^..j>....| +00000030 d0 0e 92 a9 83 6c 94 82 7c 69 09 7e 85 1d 45 53 |.....l..|i.~..ES| +00000040 c5 d2 bd 9f 63 5c |....c\|" +"2019-04-22 06:16:52.424 UTC [protoutils] checkSignatureFromCreator -> DEBU cfa exits successfully" +"2019-04-22 06:16:52.424 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfb validateChaincodeProposalMessage starts for proposal 0xc002608620, header 0xc003240e60" +"2019-04-22 06:16:52.424 UTC [protoutils] validateChaincodeProposalMessage -> DEBU cfc validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-04-22 06:16:52.424 UTC [endorser] preProcess -> DEBU cfd [][a217c702] processing txid: a217c702ad3a7b912c47d54f7e2dcf75896e45a71d4bd010d86666ceca6bde36" +"2019-04-22 06:16:52.424 UTC [endorser] SimulateProposal -> DEBU cfe [][a217c702] Entry chaincode: name:"cscc" " +"2019-04-22 06:16:52.425 UTC [endorser] callChaincode -> INFO cff [][a217c702] Entry chaincode: name:"cscc" " +"2019-04-22 06:16:52.425 UTC [chaincode] Execute -> DEBU d00 Entry" +"2019-04-22 06:16:52.426 UTC [cscc] Invoke -> DEBU d01 Invoke function: GetConfigBlock" +"2019-04-22 06:16:52.426 UTC [aclmgmt] CheckACL -> DEBU d02 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +"2019-04-22 06:16:52.426 UTC [aclmgmt] CheckACL -> DEBU d03 acl check(/Channel/Application/Readers)" +"2019-04-22 06:16:52.426 UTC [policies] Evaluate -> DEBU d04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.426 UTC [policies] Evaluate -> DEBU d05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.426 UTC [policies] Evaluate -> DEBU d06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.427 UTC [msp] DeserializeIdentity -> DEBU d07 Obtaining identity" +"2019-04-22 06:16:52.427 UTC [msp.identity] newIdentity -> DEBU d08 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:52.428 UTC [cauthdsl] func1 -> DEBU d09 0xc00299d630 gate 1555913812428324500 evaluation starts" +"2019-04-22 06:16:52.428 UTC [cauthdsl] func2 -> DEBU d0a 0xc00299d630 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.428 UTC [cauthdsl] func2 -> DEBU d0b 0xc00299d630 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.429 UTC [cauthdsl] func2 -> DEBU d0c 0xc00299d630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:52.429 UTC [cauthdsl] func2 -> DEBU d0d 0xc00299d630 principal evaluation fails" +"2019-04-22 06:16:52.429 UTC [cauthdsl] func1 -> DEBU d0e 0xc00299d630 gate 1555913812428324500 evaluation fails" +"2019-04-22 06:16:52.429 UTC [policies] Evaluate -> DEBU d0f Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.429 UTC [policies] Evaluate -> DEBU d10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.430 UTC [policies] Evaluate -> DEBU d11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:52.430 UTC [cauthdsl] func1 -> DEBU d12 0xc0005147b0 gate 1555913812430838500 evaluation starts" +"2019-04-22 06:16:52.431 UTC [cauthdsl] func2 -> DEBU d13 0xc0005147b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.431 UTC [cauthdsl] func2 -> DEBU d14 0xc0005147b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.431 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU d15 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:52.431 UTC [msp] Validate -> DEBU d16 MSP Org1MSP validating identity" +"2019-04-22 06:16:52.432 UTC [msp] getCertificationChain -> DEBU d17 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:52.433 UTC [cauthdsl] func2 -> DEBU d18 0xc0005147b0 principal matched by identity 0" +"2019-04-22 06:16:52.433 UTC [msp.identity] Verify -> DEBU d19 Verify: digest = 00000000 66 ef 7b c6 04 88 fa 46 b9 f0 fd 0c fd 11 ce 08 |f.{....F........| +00000010 2f 89 ea 0d 36 db fd 3d d8 95 b0 a6 b2 04 fb 70 |/...6..=.......p|" +"2019-04-22 06:16:52.433 UTC [msp.identity] Verify -> DEBU d1a Verify: sig = 00000000 30 44 02 20 49 bd c4 2c e1 c9 fe 78 3a 45 2d f1 |0D. I..,...x:E-.| +00000010 87 f3 bb 0e bd fe be be ce f2 bc 51 af fd 0d d0 |...........Q....| +00000020 01 ab 7d 5b 02 20 2c 5e 7f d7 6a 3e 19 03 7f 9e |..}[. ,^..j>....| +00000030 d0 0e 92 a9 83 6c 94 82 7c 69 09 7e 85 1d 45 53 |.....l..|i.~..ES| +00000040 c5 d2 bd 9f 63 5c |....c\|" +"2019-04-22 06:16:52.434 UTC [cauthdsl] func2 -> DEBU d1b 0xc0005147b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.434 UTC [cauthdsl] func1 -> DEBU d1c 0xc0005147b0 gate 1555913812430838500 evaluation succeeds" +"2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d1d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d1f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.434 UTC [policies] Evaluate -> DEBU d20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.435 UTC [chaincode] handleMessage -> DEBU d21 [a217c702] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:52.435 UTC [chaincode] Notify -> DEBU d22 [a217c702] notifying Txid:a217c702ad3a7b912c47d54f7e2dcf75896e45a71d4bd010d86666ceca6bde36, channelID:" +"2019-04-22 06:16:52.435 UTC [chaincode] Execute -> DEBU d23 Exit" +"2019-04-22 06:16:52.436 UTC [endorser] callChaincode -> INFO d24 [][a217c702] Exit chaincode: name:"cscc" (11ms)" +"2019-04-22 06:16:52.436 UTC [endorser] SimulateProposal -> DEBU d25 [][a217c702] Exit" +"2019-04-22 06:16:52.437 UTC [endorser] func1 -> DEBU d26 Exit: request from 192.168.224.9:49234" +"2019-04-22 06:16:52.437 UTC [comm.grpc.server] 1 -> INFO d27 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49234 grpc.code=OK grpc.call_duration=15.7761ms +"2019-04-22 06:16:52.455 UTC [msp] DeserializeIdentity -> DEBU d28 Obtaining identity" +"2019-04-22 06:16:52.457 UTC [msp] DeserializeIdentity -> DEBU d29 Obtaining identity" +"2019-04-22 06:16:52.457 UTC [gossip.comm] Send -> DEBU d2a Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:16:52.457 UTC [gossip.comm] sendToEndpoint -> DEBU d2b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.458 UTC [gossip.comm] sendToEndpoint -> DEBU d2c Exiting" +"2019-04-22 06:16:52.458 UTC [gossip.comm] sendToEndpoint -> DEBU d2d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.459 UTC [gossip.comm] sendToEndpoint -> DEBU d2e Exiting" +"2019-04-22 06:16:52.459 UTC [gossip.comm] sendToEndpoint -> DEBU d2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.459 UTC [gossip.comm] sendToEndpoint -> DEBU d30 Exiting" +"2019-04-22 06:16:52.462 UTC [gossip.comm] func1 -> DEBU d31 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.462 UTC [gossip.gossip] handleMessage -> DEBU d32 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.463 UTC [msp.identity] Verify -> DEBU d33 Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:52.463 UTC [msp.identity] Verify -> DEBU d34 Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:52.463 UTC [msp.identity] Verify -> DEBU d35 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:52.464 UTC [msp.identity] Verify -> DEBU d36 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:52.465 UTC [msp] DeserializeIdentity -> DEBU d37 Obtaining identity" +"2019-04-22 06:16:52.465 UTC [msp] DeserializeIdentity -> DEBU d38 Obtaining identity" +"2019-04-22 06:16:52.466 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:52.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d3a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d3b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.467 UTC [policies] Evaluate -> DEBU d3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.467 UTC [policies] Evaluate -> DEBU d3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.467 UTC [policies] Evaluate -> DEBU d3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.468 UTC [cauthdsl] func1 -> DEBU d3f 0xc000246ec0 gate 1555913812468919500 evaluation starts" +"2019-04-22 06:16:52.469 UTC [cauthdsl] func2 -> DEBU d40 0xc000246ec0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.469 UTC [cauthdsl] func2 -> DEBU d41 0xc000246ec0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.469 UTC [cauthdsl] func2 -> DEBU d42 0xc000246ec0 principal matched by identity 0" +"2019-04-22 06:16:52.470 UTC [msp.identity] Verify -> DEBU d43 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:52.471 UTC [msp.identity] Verify -> DEBU d44 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:52.472 UTC [cauthdsl] func2 -> DEBU d45 0xc000246ec0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.472 UTC [cauthdsl] func1 -> DEBU d46 0xc000246ec0 gate 1555913812468919500 evaluation succeeds" +"2019-04-22 06:16:52.472 UTC [policies] Evaluate -> DEBU d47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.472 UTC [policies] Evaluate -> DEBU d48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.473 UTC [policies] Evaluate -> DEBU d49 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.473 UTC [policies] Evaluate -> DEBU d4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.474 UTC [gossip.gossip] handleMessage -> DEBU d4b Exiting" +"2019-04-22 06:16:52.475 UTC [gossip.gossip] handleMessage -> DEBU d4c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.475 UTC [msp] DeserializeIdentity -> DEBU d4d Obtaining identity" +"2019-04-22 06:16:52.477 UTC [msp] DeserializeIdentity -> DEBU d4e Obtaining identity" +"2019-04-22 06:16:52.478 UTC [msp] DeserializeIdentity -> DEBU d4f Obtaining identity" +"2019-04-22 06:16:52.480 UTC [gossip.pull] Hello -> DEBU d51 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:52.481 UTC [msp] DeserializeIdentity -> DEBU d52 Obtaining identity" +"2019-04-22 06:16:52.481 UTC [msp] DeserializeIdentity -> DEBU d53 Obtaining identity" +"2019-04-22 06:16:52.481 UTC [gossip.comm] Send -> DEBU d54 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:52.482 UTC [gossip.comm] sendToEndpoint -> DEBU d55 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.482 UTC [gossip.comm] sendToEndpoint -> DEBU d56 Exiting" +"2019-04-22 06:16:52.479 UTC [gossip.comm] func1 -> DEBU d50 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.484 UTC [msp] DeserializeIdentity -> DEBU d57 Obtaining identity" +"2019-04-22 06:16:52.484 UTC [gossip.comm] func1 -> DEBU d58 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3323425233133937166 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.485 UTC [msp] DeserializeIdentity -> DEBU d59 Obtaining identity" +"2019-04-22 06:16:52.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d5a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:52.487 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d5b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d5c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.488 UTC [policies] Evaluate -> DEBU d5d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.490 UTC [endorser] ProcessProposal -> DEBU d5e Entering: request from 192.168.224.9:49234" +"2019-04-22 06:16:52.490 UTC [protoutils] ValidateProposalMessage -> DEBU d5f ValidateProposalMessage starts for signed proposal 0xc000244c30" +"2019-04-22 06:16:52.490 UTC [protoutils] validateChannelHeader -> DEBU d60 validateChannelHeader info: header type 3" +"2019-04-22 06:16:52.491 UTC [protoutils] checkSignatureFromCreator -> DEBU d61 begin" +"2019-04-22 06:16:52.491 UTC [msp] GetManagerForChain -> DEBU d62 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:52.491 UTC [protoutils] checkSignatureFromCreator -> DEBU d63 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:52.492 UTC [msp] Validate -> DEBU d64 MSP Org1MSP validating identity" +"2019-04-22 06:16:52.493 UTC [msp] getCertificationChain -> DEBU d65 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:52.493 UTC [protoutils] checkSignatureFromCreator -> DEBU d66 creator is valid" +"2019-04-22 06:16:52.493 UTC [msp.identity] Verify -> DEBU d67 Verify: digest = 00000000 15 d1 14 43 8a c4 6e c4 55 09 03 11 c9 04 c4 51 |...C..n.U......Q| +00000010 e3 2c 87 d4 44 37 cd c2 89 ce a0 a4 61 29 31 e6 |.,..D7......a)1.|" +"2019-04-22 06:16:52.493 UTC [msp.identity] Verify -> DEBU d68 Verify: sig = 00000000 30 45 02 21 00 b7 88 e6 08 2c 1f fb 28 c8 79 37 |0E.!.....,..(.y7| +00000010 8d 06 77 b2 10 fa 24 d5 12 75 ff fa de ef fe 15 |..w...$..u......| +00000020 80 5f c7 12 57 02 20 16 48 a9 79 b7 3e 90 f1 c8 |._..W. .H.y.>...| +00000030 02 e6 bf e7 85 8f b2 2a 32 6f 6c ef 42 89 7f 7e |.......*2ol.B..~| +00000040 6e 26 01 d4 3b 3b 3f |n&..;;?|" +"2019-04-22 06:16:52.489 UTC [policies] Evaluate -> DEBU d69 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.494 UTC [policies] Evaluate -> DEBU d6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.494 UTC [cauthdsl] func1 -> DEBU d6b 0xc0023a9900 gate 1555913812494576600 evaluation starts" +"2019-04-22 06:16:52.495 UTC [cauthdsl] func2 -> DEBU d6c 0xc0023a9900 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.495 UTC [cauthdsl] func2 -> DEBU d6d 0xc0023a9900 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.496 UTC [cauthdsl] func2 -> DEBU d6e 0xc0023a9900 principal matched by identity 0" +"2019-04-22 06:16:52.497 UTC [msp.identity] Verify -> DEBU d6f Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:52.497 UTC [msp.identity] Verify -> DEBU d70 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:52.496 UTC [protoutils] checkSignatureFromCreator -> DEBU d71 exits successfully" +"2019-04-22 06:16:52.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d72 validateChaincodeProposalMessage starts for proposal 0xc0025a8e00, header 0xc000245040" +"2019-04-22 06:16:52.498 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d73 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-04-22 06:16:52.498 UTC [endorser] preProcess -> DEBU d75 [businesschannel][e31d3c96] processing txid: e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a" +"2019-04-22 06:16:52.499 UTC [fsblkstorage] retrieveTransactionByID -> DEBU d76 retrieveTransactionByID() - txId = [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +"2019-04-22 06:16:52.498 UTC [cauthdsl] func2 -> DEBU d74 0xc0023a9900 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.499 UTC [cauthdsl] func1 -> DEBU d77 0xc0023a9900 gate 1555913812494576600 evaluation succeeds" +"2019-04-22 06:16:52.499 UTC [policies] Evaluate -> DEBU d78 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.499 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU d79 constructing new tx simulator" +"2019-04-22 06:16:52.499 UTC [policies] Evaluate -> DEBU d7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.500 UTC [policies] Evaluate -> DEBU d7c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.500 UTC [policies] Evaluate -> DEBU d7d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.500 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU d7b constructing new tx simulator txid = [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +"2019-04-22 06:16:52.501 UTC [endorser] SimulateProposal -> DEBU d7e [businesschannel][e31d3c96] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:52.501 UTC [endorser] callChaincode -> INFO d7f [businesschannel][e31d3c96] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:52.501 UTC [chaincode] Execute -> DEBU d80 Entry" +"2019-04-22 06:16:52.502 UTC [msp.identity] Verify -> DEBU d81 Verify: digest = 00000000 15 d1 14 43 8a c4 6e c4 55 09 03 11 c9 04 c4 51 |...C..n.U......Q| +00000010 e3 2c 87 d4 44 37 cd c2 89 ce a0 a4 61 29 31 e6 |.,..D7......a)1.|" +"2019-04-22 06:16:52.502 UTC [msp.identity] Verify -> DEBU d82 Verify: sig = 00000000 30 45 02 21 00 b7 88 e6 08 2c 1f fb 28 c8 79 37 |0E.!.....,..(.y7| +00000010 8d 06 77 b2 10 fa 24 d5 12 75 ff fa de ef fe 15 |..w...$..u......| +00000020 80 5f c7 12 57 02 20 16 48 a9 79 b7 3e 90 f1 c8 |._..W. .H.y.>...| +00000030 02 e6 bf e7 85 8f b2 2a 32 6f 6c ef 42 89 7f 7e |.......*2ol.B..~| +00000040 6e 26 01 d4 3b 3b 3f |n&..;;?|" +"2019-04-22 06:16:52.503 UTC [lifecycle] ApproveChaincodeDefinitionForMyOrg -> DEBU d83 received invocation of ApproveChaincodeDefinitionForMyOrg on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +"2019-04-22 06:16:52.503 UTC [chaincode] handleMessage -> DEBU d84 [e31d3c96] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:16:52.503 UTC [chaincode] HandleTransaction -> DEBU d85 [e31d3c96] handling GET_STATE from chaincode" +"2019-04-22 06:16:52.503 UTC [chaincode] HandleGetState -> DEBU d86 [e31d3c96] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-04-22 06:16:52.504 UTC [stateleveldb] GetState -> DEBU d87 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:16:52.504 UTC [chaincode] HandleGetState -> DEBU d88 [e31d3c96] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +"2019-04-22 06:16:52.504 UTC [chaincode] HandleTransaction -> DEBU d89 [e31d3c96] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.505 UTC [chaincode] handleMessage -> DEBU d8a [e31d3c96] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:16:52.505 UTC [chaincode] HandleTransaction -> DEBU d8b [e31d3c96] handling GET_STATE from chaincode" +"2019-04-22 06:16:52.505 UTC [chaincode] HandleGetState -> DEBU d8c [e31d3c96] getting state for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-04-22 06:16:52.506 UTC [msp] GetManagerForChain -> DEBU d8d Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:52.506 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d8e retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:52.507 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU d8f retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:52.507 UTC [stateleveldb] GetState -> DEBU d90 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=namespaces/metadata/exp02#1" +"2019-04-22 06:16:52.507 UTC [stateleveldb] GetState -> DEBU d91 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:16:52.507 UTC [chaincode] HandleGetState -> DEBU d92 [e31d3c96] No state associated with key: namespaces/metadata/exp02#1. Sending RESPONSE with an empty payload" +"2019-04-22 06:16:52.507 UTC [chaincode] HandleTransaction -> DEBU d93 [e31d3c96] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.508 UTC [chaincode] handleMessage -> DEBU d94 [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:52.508 UTC [chaincode] HandleTransaction -> DEBU d95 [e31d3c96] handling PUT_STATE from chaincode" +"2019-04-22 06:16:52.508 UTC [chaincode] HandleTransaction -> DEBU d96 [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.509 UTC [chaincode] handleMessage -> DEBU d97 [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:52.510 UTC [chaincode] HandleTransaction -> DEBU d98 [e31d3c96] handling PUT_STATE from chaincode" +"2019-04-22 06:16:52.510 UTC [chaincode] HandleTransaction -> DEBU d99 [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.511 UTC [chaincode] handleMessage -> DEBU d9a [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:52.511 UTC [chaincode] HandleTransaction -> DEBU d9b [e31d3c96] handling PUT_STATE from chaincode" +"2019-04-22 06:16:52.511 UTC [chaincode] HandleTransaction -> DEBU d9c [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.511 UTC [chaincode] handleMessage -> DEBU d9d [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:52.512 UTC [chaincode] HandleTransaction -> DEBU d9e [e31d3c96] handling PUT_STATE from chaincode" +"2019-04-22 06:16:52.512 UTC [chaincode] HandleTransaction -> DEBU d9f [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.513 UTC [chaincode] handleMessage -> DEBU da0 [e31d3c96] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:16:52.513 UTC [chaincode] HandleTransaction -> DEBU da1 [e31d3c96] handling GET_STATE from chaincode" +"2019-04-22 06:16:52.513 UTC [chaincode] HandleGetState -> DEBU da2 [e31d3c96] getting state for chaincode _lifecycle, key chaincode-sources/metadata/exp02#1, channel businesschannel" +"2019-04-22 06:16:52.513 UTC [stateleveldb] GetState -> DEBU da3 GetState(). ns=_lifecycle$$p_implicit_org_Org1MSP, key=chaincode-sources/metadata/exp02#1" +"2019-04-22 06:16:52.514 UTC [stateleveldb] GetState -> DEBU da4 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-04-22 06:16:52.514 UTC [chaincode] HandleGetState -> DEBU da5 [e31d3c96] No state associated with key: chaincode-sources/metadata/exp02#1. Sending RESPONSE with an empty payload" +"2019-04-22 06:16:52.515 UTC [msp.identity] Verify -> DEBU da7 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:52.515 UTC [msp.identity] Verify -> DEBU da8 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:52.514 UTC [chaincode] HandleTransaction -> DEBU da6 [e31d3c96] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.515 UTC [chaincode] handleMessage -> DEBU da9 [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:52.515 UTC [chaincode] HandleTransaction -> DEBU daa [e31d3c96] handling PUT_STATE from chaincode" +"2019-04-22 06:16:52.516 UTC [msp.identity] Verify -> DEBU dab Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:52.516 UTC [msp.identity] Verify -> DEBU dac Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:52.517 UTC [chaincode] HandleTransaction -> DEBU dad [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.517 UTC [chaincode] handleMessage -> DEBU dae [e31d3c96] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:52.518 UTC [msp] DeserializeIdentity -> DEBU daf Obtaining identity" +"2019-04-22 06:16:52.518 UTC [msp] DeserializeIdentity -> DEBU db0 Obtaining identity" +"2019-04-22 06:16:52.517 UTC [chaincode] HandleTransaction -> DEBU db1 [e31d3c96] handling PUT_STATE from chaincode" +"2019-04-22 06:16:52.518 UTC [chaincode] HandleTransaction -> DEBU db2 [e31d3c96] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:52.519 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU db3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:52.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.519 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO db5 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:16:52.520 UTC [chaincode] handleMessage -> DEBU db6 [e31d3c96] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:52.520 UTC [chaincode] Notify -> DEBU db7 [e31d3c96] notifying Txid:e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, channelID:businesschannel" +"2019-04-22 06:16:52.520 UTC [chaincode] Execute -> DEBU db8 Exit" +"2019-04-22 06:16:52.519 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.520 UTC [policies] Evaluate -> DEBU dba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.521 UTC [policies] Evaluate -> DEBU dbb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.521 UTC [policies] Evaluate -> DEBU dbc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.521 UTC [cauthdsl] func1 -> DEBU dbd 0xc00266d100 gate 1555913812521506000 evaluation starts" +"2019-04-22 06:16:52.521 UTC [cauthdsl] func2 -> DEBU dbe 0xc00266d100 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.521 UTC [cauthdsl] func2 -> DEBU dbf 0xc00266d100 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.520 UTC [endorser] callChaincode -> INFO dc0 [businesschannel][e31d3c96] Exit chaincode: name:"_lifecycle" (19ms)" +"2019-04-22 06:16:52.522 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU dc1 Simulation completed, getting simulation results" +"2019-04-22 06:16:52.521 UTC [cauthdsl] func2 -> DEBU dc2 0xc00266d100 principal matched by identity 0" +"2019-04-22 06:16:52.522 UTC [msp.identity] Verify -> DEBU dc3 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +"2019-04-22 06:16:52.523 UTC [lockbasedtxmgr] Done -> DEBU dc4 Done with transaction simulation / query execution [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +"2019-04-22 06:16:52.523 UTC [msp] GetManagerForChain -> DEBU dc5 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:52.522 UTC [msp.identity] Verify -> DEBU dc6 Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +00000040 4b b6 4c fc 03 1a |K.L...|" +"2019-04-22 06:16:52.524 UTC [cauthdsl] func2 -> DEBU dc7 0xc00266d100 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.525 UTC [cauthdsl] func1 -> DEBU dc8 0xc002673150 gate 1555913812525124500 evaluation starts" +"2019-04-22 06:16:52.525 UTC [cauthdsl] func2 -> DEBU dc9 0xc002673150 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.525 UTC [cauthdsl] func2 -> DEBU dca 0xc002673150 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.525 UTC [cauthdsl] func1 -> DEBU dcb 0xc00266d100 gate 1555913812521506000 evaluation succeeds" +"2019-04-22 06:16:52.525 UTC [policies] Evaluate -> DEBU dcc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.525 UTC [policies] Evaluate -> DEBU dcd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.526 UTC [policies] Evaluate -> DEBU dce Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.526 UTC [policies] Evaluate -> DEBU dcf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.526 UTC [gossip.gossip] handleMessage -> DEBU dd0 Exiting" +"2019-04-22 06:16:52.526 UTC [gossip.gossip] handleMessage -> DEBU dd1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 549 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.526 UTC [msp] DeserializeIdentity -> DEBU dd2 Obtaining identity" +"2019-04-22 06:16:52.527 UTC [msp] DeserializeIdentity -> DEBU dd3 Obtaining identity" +"2019-04-22 06:16:52.527 UTC [msp] DeserializeIdentity -> DEBU dd4 Obtaining identity" +"2019-04-22 06:16:52.528 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU dd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:52.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dd6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.528 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU dd7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.528 UTC [policies] Evaluate -> DEBU dd8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.529 UTC [policies] Evaluate -> DEBU dd9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.529 UTC [policies] Evaluate -> DEBU dda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.529 UTC [cauthdsl] func1 -> DEBU ddb 0xc002690c10 gate 1555913812529557000 evaluation starts" +"2019-04-22 06:16:52.529 UTC [cauthdsl] func2 -> DEBU ddc 0xc002690c10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.529 UTC [cauthdsl] func2 -> DEBU ddd 0xc002690c10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.529 UTC [cauthdsl] func2 -> DEBU dde 0xc002690c10 principal matched by identity 0" +"2019-04-22 06:16:52.530 UTC [cauthdsl] func2 -> DEBU ddf 0xc002673150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:16:52.530 UTC [cauthdsl] func2 -> DEBU de0 0xc002673150 principal evaluation fails" +"2019-04-22 06:16:52.531 UTC [cauthdsl] func1 -> DEBU de1 0xc002673150 gate 1555913812525124500 evaluation fails" +"2019-04-22 06:16:52.530 UTC [msp.identity] Verify -> DEBU de2 Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +"2019-04-22 06:16:52.531 UTC [msp.identity] Verify -> DEBU de4 Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +00000040 4b b6 4c fc 03 1a |K.L...|" +"2019-04-22 06:16:52.531 UTC [cauthdsl] func2 -> DEBU de5 0xc002690c10 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.531 UTC [cauthdsl] func1 -> DEBU de6 0xc002690c10 gate 1555913812529557000 evaluation succeeds" +"2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU de7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU de8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU de9 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.532 UTC [policies] Evaluate -> DEBU dea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.532 UTC [msp.identity] Verify -> DEBU deb Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:52.533 UTC [msp.identity] Verify -> DEBU dec Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:52.533 UTC [msp] DeserializeIdentity -> DEBU ded Obtaining identity" +"2019-04-22 06:16:52.533 UTC [msp] DeserializeIdentity -> DEBU dee Obtaining identity" +"2019-04-22 06:16:52.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU def Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:52.533 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU df1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:52.534 UTC [policies] Evaluate -> DEBU df2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.534 UTC [policies] Evaluate -> DEBU df3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.534 UTC [policies] Evaluate -> DEBU df4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.534 UTC [cauthdsl] func1 -> DEBU df5 0xc0033c8b00 gate 1555913812534596700 evaluation starts" +"2019-04-22 06:16:52.534 UTC [cauthdsl] func2 -> DEBU df6 0xc0033c8b00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.534 UTC [cauthdsl] func2 -> DEBU df7 0xc0033c8b00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.535 UTC [cauthdsl] func2 -> DEBU df8 0xc0033c8b00 principal matched by identity 0" +"2019-04-22 06:16:52.535 UTC [msp.identity] Verify -> DEBU df9 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:52.535 UTC [msp.identity] Verify -> DEBU dfa Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:52.535 UTC [cauthdsl] func2 -> DEBU dfb 0xc0033c8b00 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.536 UTC [cauthdsl] func1 -> DEBU dfc 0xc0033c8b00 gate 1555913812534596700 evaluation succeeds" +"2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU dfd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU dfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU dff Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.536 UTC [policies] Evaluate -> DEBU e00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.536 UTC [gossip.gossip] handleMessage -> DEBU e01 Exiting" +"2019-04-22 06:16:52.537 UTC [gossip.gossip] handleMessage -> DEBU e02 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3323425233133937166 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.537 UTC [gossip.pull] HandleMessage -> DEBU e03 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3323425233133937166 , Msg_type: BLOCK_MSG, digests: [1 2], Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.537 UTC [gossip.gossip] handleMessage -> DEBU e04 Exiting" +"2019-04-22 06:16:52.531 UTC [cauthdsl] func1 -> DEBU de3 0xc0026736e0 gate 1555913812531395800 evaluation starts" +"2019-04-22 06:16:52.537 UTC [cauthdsl] func2 -> DEBU e05 0xc0026736e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.538 UTC [cauthdsl] func2 -> DEBU e06 0xc0026736e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.538 UTC [cauthdsl] func2 -> DEBU e07 0xc0026736e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:16:52.538 UTC [cauthdsl] func2 -> DEBU e08 0xc0026736e0 principal evaluation fails" +"2019-04-22 06:16:52.538 UTC [cauthdsl] func1 -> DEBU e09 0xc0026736e0 gate 1555913812531395800 evaluation fails" +"2019-04-22 06:16:52.539 UTC [cauthdsl] func1 -> DEBU e0a 0xc002673c70 gate 1555913812539012400 evaluation starts" +"2019-04-22 06:16:52.539 UTC [cauthdsl] func2 -> DEBU e0b 0xc002673c70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.539 UTC [cauthdsl] func2 -> DEBU e0c 0xc002673c70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.539 UTC [cauthdsl] func2 -> DEBU e0d 0xc002673c70 principal matched by identity 0" +"2019-04-22 06:16:52.539 UTC [msp.identity] Verify -> DEBU e0e Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:52.539 UTC [msp.identity] Verify -> DEBU e0f Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:52.540 UTC [cauthdsl] func2 -> DEBU e10 0xc002673c70 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.540 UTC [cauthdsl] func1 -> DEBU e11 0xc002673c70 gate 1555913812539012400 evaluation succeeds" +"2019-04-22 06:16:52.540 UTC [transientstore] PersistWithConfig -> DEBU e12 Persisting private data to transient store for txid [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] at block height [3]" +"2019-04-22 06:16:52.545 UTC [lockbasedtxmgr] Done -> DEBU e13 Done with transaction simulation / query execution [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +"2019-04-22 06:16:52.545 UTC [endorser] SimulateProposal -> DEBU e14 [businesschannel][e31d3c96] Exit" +"2019-04-22 06:16:52.546 UTC [endorser] endorseProposal -> DEBU e15 [businesschannel][e31d3c96] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:52.546 UTC [endorser] endorseProposal -> DEBU e16 [businesschannel][e31d3c96] escc for chaincode name:"_lifecycle" is escc" +"2019-04-22 06:16:52.546 UTC [endorser] EndorseWithPlugin -> DEBU e17 Entering endorsement for {plugin: escc, channel: businesschannel, tx: e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, chaincode: _lifecycle}" +"2019-04-22 06:16:52.546 UTC [msp.identity] Sign -> DEBU e18 Sign: plaintext: 0A206124F5BA4D8EAFF570BFC1D5132A...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:52.546 UTC [msp.identity] Sign -> DEBU e19 Sign: digest: 8E382B464FE6257D9D449B24CB2E75ED9BFB5779F6002D9A363498D60C09020B " +"2019-04-22 06:16:52.547 UTC [endorser] EndorseWithPlugin -> DEBU e1a Exiting {plugin: escc, channel: businesschannel, tx: e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, chaincode: _lifecycle}" +"2019-04-22 06:16:52.547 UTC [endorser] endorseProposal -> DEBU e1b [businesschannel][e31d3c96] Exit" +"2019-04-22 06:16:52.547 UTC [lockbasedtxmgr] Done -> DEBU e1c Done with transaction simulation / query execution [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +"2019-04-22 06:16:52.547 UTC [endorser] func1 -> DEBU e1d Exit: request from 192.168.224.9:49234" +"2019-04-22 06:16:52.547 UTC [comm.grpc.server] 1 -> INFO e1e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49234 grpc.code=OK grpc.call_duration=57.7918ms +"2019-04-22 06:16:52.556 UTC [common.deliverevents] DeliverFiltered -> DEBU e1f Starting new DeliverFiltered handler" +"2019-04-22 06:16:52.556 UTC [common.deliver] Handle -> DEBU e20 Starting new deliver loop for 192.168.224.9:49236" +"2019-04-22 06:16:52.556 UTC [common.deliver] Handle -> DEBU e21 Attempting to read seek info message from 192.168.224.9:49236" +"2019-04-22 06:16:52.557 UTC [aclmgmt] CheckACL -> DEBU e22 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +"2019-04-22 06:16:52.557 UTC [aclmgmt] CheckACL -> DEBU e23 acl check(/Channel/Application/Readers)" +"2019-04-22 06:16:52.557 UTC [policies] Evaluate -> DEBU e24 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:52.557 UTC [policies] Evaluate -> DEBU e25 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:52.557 UTC [policies] Evaluate -> DEBU e26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:52.557 UTC [cauthdsl] func1 -> DEBU e27 0xc00370ca00 gate 1555913812557917100 evaluation starts" +"2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e28 0xc00370ca00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e29 0xc00370ca00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e2a 0xc00370ca00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:52.558 UTC [cauthdsl] func2 -> DEBU e2b 0xc00370ca00 principal evaluation fails" +"2019-04-22 06:16:52.559 UTC [cauthdsl] func1 -> DEBU e2c 0xc00370ca00 gate 1555913812557917100 evaluation fails" +"2019-04-22 06:16:52.559 UTC [policies] Evaluate -> DEBU e2d Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.559 UTC [policies] Evaluate -> DEBU e2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:52.559 UTC [policies] Evaluate -> DEBU e2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:52.559 UTC [cauthdsl] func1 -> DEBU e30 0xc00370d240 gate 1555913812559595200 evaluation starts" +"2019-04-22 06:16:52.559 UTC [cauthdsl] func2 -> DEBU e31 0xc00370d240 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:52.559 UTC [cauthdsl] func2 -> DEBU e32 0xc00370d240 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:52.560 UTC [cauthdsl] func2 -> DEBU e33 0xc00370d240 principal matched by identity 0" +"2019-04-22 06:16:52.560 UTC [msp.identity] Verify -> DEBU e34 Verify: digest = 00000000 e7 4f 7f 5f 46 f9 b8 e1 2c 5e 30 42 f8 4e cd 1e |.O._F...,^0B.N..| +00000010 1f 58 06 ab 17 4b 1e 75 6f 23 5e fb 88 68 fe a4 |.X...K.uo#^..h..|" +"2019-04-22 06:16:52.560 UTC [msp.identity] Verify -> DEBU e35 Verify: sig = 00000000 30 44 02 20 53 d2 60 bd 3c 31 53 81 08 db 64 46 |0D. S.`.<1S...dF| +00000010 6c 32 ed e4 b8 50 43 a3 96 48 96 3b 45 bb 3e 5b |l2...PC..H.;E.>[| +00000020 87 93 16 49 02 20 39 f4 4e 1a fa ba ec 10 45 13 |...I. 9.N.....E.| +00000030 2d 39 6e ad 57 f2 91 6a 50 84 d6 a7 09 2f 15 bb |-9n.W..jP..../..| +00000040 76 f3 a3 d5 8d a1 |v.....|" +"2019-04-22 06:16:52.560 UTC [cauthdsl] func2 -> DEBU e36 0xc00370d240 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:52.560 UTC [cauthdsl] func1 -> DEBU e37 0xc00370d240 gate 1555913812559595200 evaluation succeeds" +"2019-04-22 06:16:52.560 UTC [policies] Evaluate -> DEBU e38 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:52.560 UTC [policies] Evaluate -> DEBU e39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:52.560 UTC [policies] Evaluate -> DEBU e3a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:52.561 UTC [policies] Evaluate -> DEBU e3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:52.561 UTC [common.deliver] deliverBlocks -> DEBU e3c [channel: businesschannel] Received seekInfo (0xc0036aba80) start: > stop: > from 192.168.224.9:49236" +"2019-04-22 06:16:52.561 UTC [fsblkstorage] Next -> DEBU e3d Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2019-04-22 06:16:52.561 UTC [fsblkstorage] newBlockfileStream -> DEBU e3e newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47629]" +"2019-04-22 06:16:52.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e3f Remaining bytes=[23746], Going to peek [8] bytes" +"2019-04-22 06:16:52.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e40 Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47629], bytesOffset=[47632]}" +"2019-04-22 06:16:52.562 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU e41 blockbytes [23743] read from file [0]" +"2019-04-22 06:16:52.563 UTC [common.deliver] deliverBlocks -> DEBU e42 [channel: businesschannel] Delivering block [2] for (0xc0036aba80) for 192.168.224.9:49236" +"2019-04-22 06:16:52.563 UTC [fsblkstorage] waitForBlock -> DEBU e43 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-04-22 06:16:52.714 UTC [gossip.comm] func1 -> DEBU e44 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.714 UTC [gossip.gossip] handleMessage -> DEBU e45 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.714 UTC [msp] DeserializeIdentity -> DEBU e46 Obtaining identity" +"2019-04-22 06:16:52.714 UTC [msp] DeserializeIdentity -> DEBU e47 Obtaining identity" +"2019-04-22 06:16:52.715 UTC [gossip.gossip] handleMessage -> DEBU e48 Exiting" +"2019-04-22 06:16:52.716 UTC [gossip.comm] func1 -> DEBU e49 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.716 UTC [gossip.gossip] handleMessage -> DEBU e4a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.716 UTC [gossip.pull] HandleMessage -> DEBU e4b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.716 UTC [gossip.pull] SendDigest -> DEBU e4c Sending BLOCK_MSG digest: [2 1] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:52.716 UTC [gossip.gossip] handleMessage -> DEBU e4d Exiting" +"2019-04-22 06:16:52.938 UTC [gossip.gossip] handleMessage -> DEBU e4e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:52.939 UTC [msp] DeserializeIdentity -> DEBU e4f Obtaining identity" +"2019-04-22 06:16:52.941 UTC [msp] DeserializeIdentity -> DEBU e50 Obtaining identity" +"2019-04-22 06:16:52.941 UTC [msp] DeserializeIdentity -> DEBU e51 Obtaining identity" +"2019-04-22 06:16:52.941 UTC [gossip.gossip] handleMessage -> DEBU e52 Exiting" +"2019-04-22 06:16:53.153 UTC [gossip.comm] func1 -> DEBU e53 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:53.153 UTC [gossip.gossip] handleMessage -> DEBU e54 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:53.155 UTC [msp] DeserializeIdentity -> DEBU e55 Obtaining identity" +"2019-04-22 06:16:53.156 UTC [msp] DeserializeIdentity -> DEBU e56 Obtaining identity" +"2019-04-22 06:16:53.156 UTC [msp] DeserializeIdentity -> DEBU e57 Obtaining identity" +"2019-04-22 06:16:53.157 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" +"2019-04-22 06:16:54.549 UTC [peer.gossip.mcs] VerifyBlock -> DEBU e59 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:54.550 UTC [peer.gossip.mcs] VerifyBlock -> DEBU e5a Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:54.550 UTC [policies] Evaluate -> DEBU e5b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:16:54.552 UTC [policies] Evaluate -> DEBU e5c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:54.552 UTC [policies] Evaluate -> DEBU e5d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:16:54.552 UTC [msp] DeserializeIdentity -> DEBU e5e Obtaining identity" +"2019-04-22 06:16:54.553 UTC [msp.identity] newIdentity -> DEBU e5f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbSgAwIBAgIRAJBFFRDLz6Un7/0wLUkJdxMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABIBMiKxn0LWoVlLv8XxbX1D46eVL6a8rpVTcdgPecq8cDptN +4OgsaJNjp90jKFOpCPO85WKKKBvohOo+CBoZ8pGjTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIMd63S9RvNuy2Xvt6EcYo8ukXj2U +4W+4FrVCJC/cgnmOMAoGCCqGSM49BAMCA0cAMEQCIAsGyGJ+dE4F56q8YUe0WLK6 +N+vsXRHDlRscMCB7yxXaAiAsyJGd0rtXmae9b3PV/evJNYegRQRcPwx+XxjQDBxh +QQ== +-----END CERTIFICATE-----" +"2019-04-22 06:16:54.554 UTC [cauthdsl] func1 -> DEBU e60 0xc0031997b0 gate 1555913814553992900 evaluation starts" +"2019-04-22 06:16:54.554 UTC [cauthdsl] func2 -> DEBU e61 0xc0031997b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:54.554 UTC [cauthdsl] func2 -> DEBU e62 0xc0031997b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:54.554 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU e63 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-04-22 06:16:54.554 UTC [msp] Validate -> DEBU e64 MSP OrdererMSP validating identity" +"2019-04-22 06:16:54.555 UTC [cauthdsl] func2 -> DEBU e65 0xc0031997b0 principal matched by identity 0" +"2019-04-22 06:16:54.555 UTC [msp.identity] Verify -> DEBU e66 Verify: digest = 00000000 6c d1 1b 2f d0 19 80 d1 42 22 51 eb b6 b9 bc 76 |l../....B"Q....v| +00000010 59 c7 3c ce b3 0e 8b 0b 8f 90 71 67 34 77 04 da |Y.<.......qg4w..|" +"2019-04-22 06:16:54.555 UTC [msp.identity] Verify -> DEBU e67 Verify: sig = 00000000 30 45 02 21 00 dd cb 43 f2 ab 9a 91 48 e5 d8 1f |0E.!...C....H...| +00000010 10 f4 be a2 b5 e0 b7 84 3c 14 73 07 aa fe 9c 8c |........<.s.....| +00000020 89 9e 14 26 79 02 20 7e 1b f6 93 95 bc 40 1d 31 |...&y. ~.....@.1| +00000030 49 2c 5f 36 67 0f 3f 38 88 d8 c2 7e e9 4e 44 e7 |I,_6g.?8...~.ND.| +00000040 5f ec 76 9f 19 42 d4 |_.v..B.|" +"2019-04-22 06:16:54.556 UTC [cauthdsl] func2 -> DEBU e68 0xc0031997b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:54.556 UTC [cauthdsl] func1 -> DEBU e69 0xc0031997b0 gate 1555913814553992900 evaluation succeeds" +"2019-04-22 06:16:54.556 UTC [policies] Evaluate -> DEBU e6a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:54.557 UTC [policies] Evaluate -> DEBU e6b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:54.557 UTC [policies] Evaluate -> DEBU e6c Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:54.557 UTC [policies] Evaluate -> DEBU e6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:54.557 UTC [blocksProvider] DeliverBlocks -> DEBU e6e [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-04-22 06:16:54.558 UTC [gossip.state] addPayload -> DEBU e6f [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-04-22 06:16:54.558 UTC [gossip.state] addPayload -> DEBU e70 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:16:54.558 UTC [blocksProvider] DeliverBlocks -> DEBU e71 [businesschannel] Gossiping block [3], peers number [3]" +"2019-04-22 06:16:54.559 UTC [gossip.channel] AddToMsgStore -> DEBU e73 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 3}, Envelope: 4752 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:16:54.559 UTC [gossip.pull] Add -> DEBU e74 Added 3, total items: 3" +"2019-04-22 06:16:54.558 UTC [gossip.state] deliverPayloads -> DEBU e72 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +"2019-04-22 06:16:54.559 UTC [gossip.state] deliverPayloads -> DEBU e75 [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +"2019-04-22 06:16:54.560 UTC [gossip.privdata] StoreBlock -> INFO e76 [businesschannel] Received block [3] from buffer" +"2019-04-22 06:16:54.560 UTC [gossip.privdata] StoreBlock -> DEBU e77 [businesschannel] Validating block [3]" +"2019-04-22 06:16:54.560 UTC [committer.txvalidator] Validate -> DEBU e78 [businesschannel] START Block Validation for block [3]" +"2019-04-22 06:16:54.561 UTC [committer.txvalidator] Validate -> DEBU e79 expecting 1 block validation responses" +"2019-04-22 06:16:54.561 UTC [committer.txvalidator] validateTx -> DEBU e7a [businesschannel] validateTx starts for block 0xc002502480 env 0xc0024f0be0 txn 0" +"2019-04-22 06:16:54.561 UTC [protoutils] ValidateTransaction -> DEBU e7b ValidateTransactionEnvelope starts for envelope 0xc0024f0be0" +"2019-04-22 06:16:54.561 UTC [protoutils] ValidateTransaction -> DEBU e7c Header is channel_header:"\010\003\032\014\010\324\270\365\345\005\020\204\230\214\351\001\"\017businesschannel*@e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\236k\347-2\t\327DH-)s4\227T\201\240\234\344\263\270\003\346" " +"2019-04-22 06:16:54.562 UTC [protoutils] validateChannelHeader -> DEBU e7d validateChannelHeader info: header type 3" +"2019-04-22 06:16:54.562 UTC [protoutils] checkSignatureFromCreator -> DEBU e7e begin" +"2019-04-22 06:16:54.562 UTC [msp] GetManagerForChain -> DEBU e7f Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:54.562 UTC [protoutils] checkSignatureFromCreator -> DEBU e80 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:54.563 UTC [protoutils] checkSignatureFromCreator -> DEBU e81 creator is valid" +"2019-04-22 06:16:54.563 UTC [msp.identity] Verify -> DEBU e82 Verify: digest = 00000000 2b 6f 41 49 fb 44 0e 83 27 95 01 46 f8 23 4a 80 |+oAI.D..'..F.#J.| +00000010 a6 4d ee fe e2 53 6d 4f e8 9a 60 16 70 60 e8 25 |.M...SmO..`.p`.%|" +"2019-04-22 06:16:54.563 UTC [msp.identity] Verify -> DEBU e83 Verify: sig = 00000000 30 44 02 20 42 d4 d3 c1 5d bf df 8a 4b 70 63 3e |0D. B...]...Kpc>| +00000010 a3 94 4b db 89 0c 23 b0 a7 72 1b e5 13 ed cc 63 |..K...#..r.....c| +00000020 84 2c b6 46 02 20 25 d9 f3 e5 c2 bb 10 7a ef 12 |.,.F. %......z..| +00000030 99 bc 91 e0 9c bf d6 30 69 bd e9 0f 9c d1 68 c5 |.......0i.....h.| +00000040 49 3c d5 68 e7 b0 |I<.h..|" +"2019-04-22 06:16:54.564 UTC [protoutils] checkSignatureFromCreator -> DEBU e84 exits successfully" +"2019-04-22 06:16:54.564 UTC [msp] DeserializeIdentity -> DEBU e85 Obtaining identity" +"2019-04-22 06:16:54.564 UTC [msp] DeserializeIdentity -> DEBU e87 Obtaining identity" +"2019-04-22 06:16:54.564 UTC [protoutils] validateEndorserTransaction -> DEBU e86 validateEndorserTransaction starts for data 0xc003212000, header channel_header:"\010\003\032\014\010\324\270\365\345\005\020\204\230\214\351\001\"\017businesschannel*@e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\276\236k\347-2\t\327DH-)s4\227T\201\240\234\344\263\270\003\346" " +"2019-04-22 06:16:54.565 UTC [protoutils] validateEndorserTransaction -> DEBU e88 validateEndorserTransaction info: there are 1 actions" +"2019-04-22 06:16:54.565 UTC [protoutils] validateEndorserTransaction -> DEBU e89 validateEndorserTransaction info: signature header is valid" +"2019-04-22 06:16:54.565 UTC [msp] DeserializeIdentity -> DEBU e8a Obtaining identity" +"2019-04-22 06:16:54.566 UTC [msp] DeserializeIdentity -> DEBU e8b Obtaining identity" +"2019-04-22 06:16:54.566 UTC [protoutils] ValidateTransaction -> DEBU e8c ValidateTransactionEnvelope returns err %!s()" +"2019-04-22 06:16:54.566 UTC [gossip.comm] Send -> DEBU e8d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 3}, Envelope: 4752 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:54.566 UTC [msp] DeserializeIdentity -> DEBU e8f Obtaining identity" +"2019-04-22 06:16:54.566 UTC [committer.txvalidator] validateTx -> DEBU e8e Transaction is for channel businesschannel" +"2019-04-22 06:16:54.567 UTC [fsblkstorage] retrieveTransactionByID -> DEBU e90 retrieveTransactionByID() - txId = [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a]" +"2019-04-22 06:16:54.567 UTC [msp] DeserializeIdentity -> DEBU e91 Obtaining identity" +"2019-04-22 06:16:54.567 UTC [committer.txvalidator] validateTx -> DEBU e92 Validating transaction with plugins" +"2019-04-22 06:16:54.567 UTC [committer.txvalidator] Dispatch -> DEBU e93 [businesschannel] Dispatch starts for bytes 0xc00320a000" +"2019-04-22 06:16:54.568 UTC [gossip.comm] sendToEndpoint -> DEBU e94 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4722 bytes, seq: 3}, Envelope: 4752 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.568 UTC [gossip.comm] sendToEndpoint -> DEBU e96 Exiting" +"2019-04-22 06:16:54.568 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU e95 constructing new query executor txid = [41f89b8b-afb8-44ec-be1f-251e9ee679b9]" +"2019-04-22 06:16:54.569 UTC [lockbasedtxmgr] Done -> DEBU e97 Done with transaction simulation / query execution [41f89b8b-afb8-44ec-be1f-251e9ee679b9]" +"2019-04-22 06:16:54.569 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU e98 Validating Tx e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +"2019-04-22 06:16:54.570 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU e99 constructing new query executor txid = [97ccd8a2-ea8c-4363-aa46-bf573bc413a0]" +"2019-04-22 06:16:54.570 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU e9a retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:54.571 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU e9b retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:54.571 UTC [lockbasedtxmgr] Done -> DEBU e9c Done with transaction simulation / query execution [97ccd8a2-ea8c-4363-aa46-bf573bc413a0]" +"2019-04-22 06:16:54.572 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU e9d constructing new query executor txid = [3df653a5-ef12-4e24-9822-bbe6d5d74472]" +"2019-04-22 06:16:54.573 UTC [lockbasedtxmgr] Done -> DEBU e9e Done with transaction simulation / query execution [3df653a5-ef12-4e24-9822-bbe6d5d74472]" +"2019-04-22 06:16:54.574 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +"2019-04-22 06:16:54.574 UTC [msp] DeserializeIdentity -> DEBU ea0 Obtaining identity" +"2019-04-22 06:16:54.575 UTC [msp.identity] newIdentity -> DEBU ea1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQN53JbeFT+xJqhDduM9jnWjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnRjdotxRR6ns +FrI6AdyNlNEVw0o13tAAcvDCZbET5UUHAxqmEpHwsnQox8Xb8Hn7pjGLukOuhPB6 +5m3LiNQ/mqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDRwAwRAIgNtSnaFxIj52DZBo1XRQ6Chxhi3ynEQ/VidpCEbV9xTgCIAy6mx3f +whAvojvLIiksfO8RfNy+EJ+gwR7oj2lb56ig +-----END CERTIFICATE-----" +"2019-04-22 06:16:54.576 UTC [cauthdsl] func1 -> DEBU ea2 0xc0032195f0 gate 1555913814576680100 evaluation starts" +"2019-04-22 06:16:54.577 UTC [cauthdsl] func2 -> DEBU ea3 0xc0032195f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:54.577 UTC [cauthdsl] func2 -> DEBU ea4 0xc0032195f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:54.578 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU ea5 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:16:54.578 UTC [msp] Validate -> DEBU ea6 MSP Org1MSP validating identity" +"2019-04-22 06:16:54.579 UTC [msp] getCertificationChain -> DEBU ea7 MSP Org1MSP getting certification chain" +"2019-04-22 06:16:54.579 UTC [cauthdsl] func2 -> DEBU ea8 0xc0032195f0 principal matched by identity 0" +"2019-04-22 06:16:54.580 UTC [msp.identity] Verify -> DEBU ea9 Verify: digest = 00000000 8e 38 2b 46 4f e6 25 7d 9d 44 9b 24 cb 2e 75 ed |.8+FO.%}.D.$..u.| +00000010 9b fb 57 79 f6 00 2d 9a 36 34 98 d6 0c 09 02 0b |..Wy..-.64......|" +"2019-04-22 06:16:54.580 UTC [msp.identity] Verify -> DEBU eaa Verify: sig = 00000000 30 44 02 20 4b fe 23 71 85 c3 99 22 fe 25 72 4c |0D. K.#q...".%rL| +00000010 8d 82 b6 99 d1 f4 3a 62 ec 23 66 2f fb 6d cb 6f |......:b.#f/.m.o| +00000020 ac e2 68 93 02 20 13 70 06 e8 d3 cc 5b 7b af a0 |..h.. .p....[{..| +00000030 2a 11 a3 f2 63 a1 b4 eb 1c 31 b4 85 0f 25 f3 09 |*...c....1...%..| +00000040 a0 3f 4a f9 95 e7 |.?J...|" +"2019-04-22 06:16:54.581 UTC [cauthdsl] func2 -> DEBU eab 0xc0032195f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:54.581 UTC [cauthdsl] func1 -> DEBU eac 0xc0032195f0 gate 1555913814576680100 evaluation succeeds" +"2019-04-22 06:16:54.581 UTC [policies] Evaluate -> DEBU ead Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:54.582 UTC [policies] Evaluate -> DEBU eae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:16:54.582 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU eaf constructing new query executor txid = [cf90f1c5-88fa-4e56-964f-592619d82c11]" +"2019-04-22 06:16:54.582 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU eb0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:54.583 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU eb1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:54.583 UTC [lockbasedtxmgr] Done -> DEBU eb2 Done with transaction simulation / query execution [cf90f1c5-88fa-4e56-964f-592619d82c11]" +"2019-04-22 06:16:54.583 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU eb3 constructing new query executor txid = [8c5bbe6b-4f35-44bf-9e63-f104b09f25b8]" +"2019-04-22 06:16:54.584 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU eb4 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:54.588 UTC [gossip.comm] func1 -> DEBU eb5 Got message: GossipMessage: nonce:1987853991020680669 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 137 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.588 UTC [gossip.privdata] handleRequest -> DEBU eb6 Got GossipMessage: nonce:1987853991020680669 channel:"businesschannel" tag:CHAN_ONLY privateReq: > , Envelope: 137 bytes, Signature: 0 bytes from 192.168.224.5:7051" +"2019-04-22 06:16:54.588 UTC [gossip.privdata] CollectionRWSet -> DEBU eb7 Current ledger height 3 is below requested block sequence number 3 retrieving private data from transient store" +"2019-04-22 06:16:54.588 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU eb8 Getting private data from transient store for transaction e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a" +"2019-04-22 06:16:54.589 UTC [leveldbhelper] GetIterator -> DEBU eb9 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0xff}]" +"2019-04-22 06:16:54.589 UTC [gossip.privdata] filterNotEligible -> DEBU eba Found 1 for TxID e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a , collection _implicit_org_Org1MSP for 192.168.224.5:7051" +"2019-04-22 06:16:54.589 UTC [msp] GetManagerForChain -> DEBU ebb Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:54.590 UTC [cauthdsl] func1 -> DEBU ebc 0xc003209310 gate 1555913814590135100 evaluation starts" +"2019-04-22 06:16:54.590 UTC [cauthdsl] func2 -> DEBU ebd 0xc003209310 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:54.590 UTC [cauthdsl] func2 -> DEBU ebe 0xc003209310 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:54.591 UTC [cauthdsl] func2 -> DEBU ebf 0xc003209310 principal matched by identity 0" +"2019-04-22 06:16:54.591 UTC [msp.identity] Verify -> DEBU ec0 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:16:54.591 UTC [msp.identity] Verify -> DEBU ec1 Verify: sig = 00000000 30 45 02 21 00 de 07 f7 58 8f 6e be 26 43 85 81 |0E.!....X.n.&C..| +00000010 94 87 aa b3 b7 f1 38 54 98 16 8b 83 56 ea 42 77 |......8T....V.Bw| +00000020 6c 4d ef 10 96 02 20 67 54 66 04 83 18 8c fa 2e |lM.... gTf......| +00000030 c7 1c 9d 4c 35 22 86 ad e4 49 6a a2 75 5e 11 f8 |...L5"...Ij.u^..| +00000040 ff 03 29 1f ac f7 b2 |..)....|" +"2019-04-22 06:16:54.592 UTC [cauthdsl] func2 -> DEBU ec2 0xc003209310 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:54.592 UTC [cauthdsl] func1 -> DEBU ec3 0xc003209310 gate 1555913814590135100 evaluation succeeds" +"2019-04-22 06:16:54.592 UTC [gossip.privdata] func1 -> DEBU ec4 Returning 192.168.224.5:7051 1 elements" +"2019-04-22 06:16:54.600 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ec5 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:54.602 UTC [lockbasedtxmgr] Done -> DEBU ec6 Done with transaction simulation / query execution [8c5bbe6b-4f35-44bf-9e63-f104b09f25b8]" +"2019-04-22 06:16:54.602 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ec7 constructing new query executor txid = [ac659963-916c-4a27-84c7-91ee2d1f1096]" +"2019-04-22 06:16:54.602 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ec8 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:54.603 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ec9 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:54.603 UTC [lockbasedtxmgr] Done -> DEBU eca Done with transaction simulation / query execution [ac659963-916c-4a27-84c7-91ee2d1f1096]" +"2019-04-22 06:16:54.604 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ecb constructing new query executor txid = [c9fc1102-87f6-4d1d-abd6-d6e7bc5d4bc0]" +"2019-04-22 06:16:54.604 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ecc retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:54.607 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ecd retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:54.610 UTC [lockbasedtxmgr] Done -> DEBU ece Done with transaction simulation / query execution [c9fc1102-87f6-4d1d-abd6-d6e7bc5d4bc0]" +"2019-04-22 06:16:54.611 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ecf constructing new query executor txid = [48d8ed1c-c20c-462d-b783-7548c8680a00]" +"2019-04-22 06:16:54.611 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ed0 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:54.613 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU ed1 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:54.614 UTC [lockbasedtxmgr] Done -> DEBU ed2 Done with transaction simulation / query execution [48d8ed1c-c20c-462d-b783-7548c8680a00]" +"2019-04-22 06:16:54.614 UTC [vscc] Validate -> DEBU ed3 block 3, namespace: _lifecycle, tx 0 validation results is: " +"2019-04-22 06:16:54.616 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU ed4 Transaction e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a appears to be valid" +"2019-04-22 06:16:54.616 UTC [committer.txvalidator] Dispatch -> DEBU ed5 [businesschannel] Dispatch completes env bytes 0xc00320a000" +"2019-04-22 06:16:54.620 UTC [committer.txvalidator] Validate -> DEBU ed6 got result for idx 0, code 0" +"2019-04-22 06:16:54.620 UTC [committer.txvalidator] Validate -> INFO ed7 [businesschannel] Validated block [3] in 59ms" +"2019-04-22 06:16:54.620 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU ed8 constructing new query executor txid = [d531c8ed-73ac-479c-937f-70e1741416a5]" +"2019-04-22 06:16:54.620 UTC [lockbasedtxmgr] Done -> DEBU ed9 Done with transaction simulation / query execution [d531c8ed-73ac-479c-937f-70e1741416a5]" +"2019-04-22 06:16:54.621 UTC [msp] GetManagerForChain -> DEBU eda Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:54.621 UTC [cauthdsl] func1 -> DEBU edb 0xc0034fe120 gate 1555913814621120800 evaluation starts" +"2019-04-22 06:16:54.621 UTC [cauthdsl] func2 -> DEBU edc 0xc0034fe120 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:54.621 UTC [cauthdsl] func2 -> DEBU edd 0xc0034fe120 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:54.621 UTC [cauthdsl] func2 -> DEBU ede 0xc0034fe120 principal matched by identity 0" +"2019-04-22 06:16:54.621 UTC [msp.identity] Verify -> DEBU edf Verify: digest = 00000000 66 68 7a ad f8 62 bd 77 6c 8f c1 8b 8e 9f 8e 20 |fhz..b.wl...... | +00000010 08 97 14 85 6e e2 33 b3 90 2a 59 1d 0d 5f 29 25 |....n.3..*Y.._)%|" +"2019-04-22 06:16:54.622 UTC [msp.identity] Verify -> DEBU ee0 Verify: sig = 00000000 30 44 02 20 4d 77 fd 8e 03 14 6d 30 40 a0 da a9 |0D. Mw....m0@...| +00000010 66 44 48 8b 79 ff 53 b0 7b ab c4 15 e9 02 10 28 |fDH.y.S.{......(| +00000020 57 67 8f 8d 02 20 1b 75 00 72 83 05 bf de 40 4b |Wg... .u.r....@K| +00000030 30 95 62 82 87 58 cf 86 89 8c 1c 50 ca 0c bc d9 |0.b..X.....P....| +00000040 60 71 07 23 6c 5e |`q.#l^|" +"2019-04-22 06:16:54.622 UTC [cauthdsl] func2 -> DEBU ee1 0xc0034fe120 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:54.622 UTC [cauthdsl] func1 -> DEBU ee2 0xc0034fe120 gate 1555913814621120800 evaluation succeeds" +"2019-04-22 06:16:54.622 UTC [gossip.privdata] listMissingPrivateData -> DEBU ee3 Retrieving private write sets for 1 transactions from transient store" +"2019-04-22 06:16:54.622 UTC [transientstore] GetTxPvtRWSetByTxid -> DEBU ee4 Getting private data from transient store for transaction e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a" +"2019-04-22 06:16:54.622 UTC [leveldbhelper] GetIterator -> DEBU ee5 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x50, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0xff}]" +"2019-04-22 06:16:54.623 UTC [gossip.privdata] StoreBlock -> DEBU ee6 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:16:54.623 UTC [gossip.privdata] StoreBlock -> DEBU ee7 [businesschannel] Added 1 namespace private write sets for block [3], tran [0]" +"2019-04-22 06:16:54.622 UTC [committer.txvalidator] validateTx -> DEBU ee8 [businesschannel] validateTx completes for block 0xc002502480 env 0xc0024f0be0 txn 0" +"2019-04-22 06:16:54.624 UTC [kvledger] CommitWithPvtData -> DEBU ee9 [businesschannel] Validating state for block [3]" +"2019-04-22 06:16:54.624 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU eea Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:16:54.624 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU eeb lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:16:54.624 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU eec Validating new block with num trans = [1]" +"2019-04-22 06:16:54.624 UTC [valimpl] ValidateAndPrepareBatch -> DEBU eed ValidateAndPrepareBatch() for block number = [3]" +"2019-04-22 06:16:54.625 UTC [valimpl] ValidateAndPrepareBatch -> DEBU eee preprocessing ProtoBlock..." +"2019-04-22 06:16:54.625 UTC [valimpl] preprocessProtoBlock -> DEBU eef txType=ENDORSER_TRANSACTION" +"2019-04-22 06:16:54.625 UTC [stateleveldb] GetState -> DEBU ef0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:16:54.625 UTC [statebasedval] validateKVRead -> DEBU ef1 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-04-22 06:16:54.625 UTC [stateleveldb] GetState -> DEBU ef2 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-04-22 06:16:54.625 UTC [stateleveldb] GetState -> DEBU ef3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:16:54.625 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU ef4 Block [3] Transaction index [0] TxId [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-04-22 06:16:54.626 UTC [valinternal] ApplyWriteSet -> DEBU ef5 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0024f5300), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0024f5340), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0024f5380), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0024f53c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org1MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0024f5440)}" +"2019-04-22 06:16:54.626 UTC [valimpl] ValidateAndPrepareBatch -> DEBU ef6 validating rwset..." +"2019-04-22 06:16:54.626 UTC [valimpl] ValidateAndPrepareBatch -> DEBU ef7 postprocessing ProtoBlock..." +"2019-04-22 06:16:54.626 UTC [valimpl] ValidateAndPrepareBatch -> DEBU ef8 ValidateAndPrepareBatch() complete" +"2019-04-22 06:16:54.626 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU ef9 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x24ce6a0 0xc000413c00 0x25df440 0xc00000e380}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025e9880 map[]})]}" +"2019-04-22 06:16:54.626 UTC [cceventmgmt] HandleStateUpdates -> DEBU efa Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +"2019-04-22 06:16:54.626 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU efb Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +"2019-04-22 06:16:54.626 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU efc Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440})}" +"2019-04-22 06:16:54.629 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU efd Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 83 170 140 173 163 251 80 149 96 210 221 94 183 62 19 157 250 115 43 249 173 224 186 3 250 95 126 110 189 166 49 57 2 32 114 246 129 162 164 229 222 122 103 218 14 36 179 42 12 169 194 151 81 96 101 122 194 28 168 50 204 94 230 88 39 177]} 0x14d8920}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00265fa40 0xc002563680 0xc002654dc0})]}" +"2019-04-22 06:16:54.629 UTC [confighistory] HandleStateUpdates -> ERRO efe Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00350cd80)}" +"2019-04-22 06:16:54.629 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU eff Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*confighistory.dbProvider=&{0xc00000cb00})}" +"2019-04-22 06:16:54.630 UTC [kvledger] CommitWithPvtData -> DEBU f00 [businesschannel] Committing block [3] to storage" +"2019-04-22 06:16:54.630 UTC [ledgerstorage] CommitWithPvtData -> DEBU f01 Writing block [3] to pvt block store" +"2019-04-22 06:16:54.631 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU f02 constructing new query executor txid = [1d3a9a81-0630-40da-8345-77f5cc037243]" +"2019-04-22 06:16:54.631 UTC [lockbasedtxmgr] Done -> DEBU f03 Done with transaction simulation / query execution [1d3a9a81-0630-40da-8345-77f5cc037243]" +"2019-04-22 06:16:54.637 UTC [pvtdatastorage] Prepare -> DEBU f04 Saved 1 private data write sets for block [3]" +"2019-04-22 06:16:54.647 UTC [fsblkstorage] indexBlock -> DEBU f05 Indexing block [blockNum=3, blockHash=[]byte{0x74, 0x44, 0x89, 0x23, 0x4f, 0x72, 0x94, 0x3a, 0x8a, 0x3a, 0x90, 0x5b, 0x48, 0x2, 0x23, 0x87, 0x42, 0x1b, 0x92, 0x93, 0x84, 0xb, 0xa0, 0x22, 0x97, 0x21, 0x7, 0x5f, 0x9d, 0x35, 0xac, 0x69} txOffsets= +txId=e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a locPointer=offset=70, bytesLength=3703 +]" +"2019-04-22 06:16:54.647 UTC [fsblkstorage] indexBlock -> DEBU f06 Adding txLoc [fileSuffixNum=0, offset=71445, bytesLength=3703] for tx ID: [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] to txid-index" +"2019-04-22 06:16:54.648 UTC [fsblkstorage] indexBlock -> DEBU f07 Adding txLoc [fileSuffixNum=0, offset=71445, bytesLength=3703] for tx number:[0] ID: [e31d3c96973408cab3e5749ec8253266d9bf3dcab7afabe91cfabc4b3ec7935a] to blockNumTranNum index" +"2019-04-22 06:16:54.651 UTC [fsblkstorage] updateCheckpoint -> DEBU f08 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76086], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-04-22 06:16:54.651 UTC [pvtdatastorage] Commit -> DEBU f09 Committing private data for block [3]" +"2019-04-22 06:16:54.651 UTC [fsblkstorage] waitForBlock -> DEBU f0a Came out of wait. maxAvailaBlockNumber=[3]" +"2019-04-22 06:16:54.652 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f0b Remaining bytes=[4711], Going to peek [8] bytes" +"2019-04-22 06:16:54.652 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f0c Returning blockbytes - length=[4709], placementInfo={fileNum=[0], startOffset=[71375], bytesOffset=[71377]}" +"2019-04-22 06:16:54.654 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU f0d blockbytes [4709] read from file [0]" +"2019-04-22 06:16:54.656 UTC [pvtdatastorage] Commit -> DEBU f0e Committed private data for block [3]" +"2019-04-22 06:16:54.656 UTC [kvledger] CommitWithPvtData -> DEBU f0f [businesschannel] Committing block [3] transactions to state database" +"2019-04-22 06:16:54.656 UTC [lockbasedtxmgr] Commit -> DEBU f10 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:16:54.656 UTC [lockbasedtxmgr] Commit -> DEBU f11 Committing updates to state database" +"2019-04-22 06:16:54.657 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f12 Building the expiry schedules based on the update batch" +"2019-04-22 06:16:54.657 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f13 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +"2019-04-22 06:16:54.657 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f14 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +"2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f15 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +"2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f16 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +"2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f17 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +"2019-04-22 06:16:54.658 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU f18 Adding expiry schedule for key and key hash [ns=_lifecycle, collection=_implicit_org_Org1MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +"2019-04-22 06:16:54.658 UTC [lockbasedtxmgr] Commit -> DEBU f19 Write lock acquired for committing updates to state database" +"2019-04-22 06:16:54.659 UTC [stateleveldb] ApplyUpdates -> DEBU f1a Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/fields/exp02#1/PackageID] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x50, 0x61, 0x63, 0x6b, 0x61, 0x67, 0x65, 0x49, 0x44}]" +"2019-04-22 06:16:54.659 UTC [stateleveldb] ApplyUpdates -> DEBU f1b Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPchaincode-sources/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x63, 0x68, 0x61, 0x69, 0x6e, 0x63, 0x6f, 0x64, 0x65, 0x2d, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +"2019-04-22 06:16:54.659 UTC [stateleveldb] ApplyUpdates -> DEBU f1c Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +"2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f1d Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f1e Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/fields/exp02#1/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f1f Channel [businesschannel]: Applying key(string)=[_lifecycle$$p_implicit_org_Org1MSPnamespaces/metadata/exp02#1] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x70, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x23, 0x31}]" +"2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f20 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +"2019-04-22 06:16:54.660 UTC [stateleveldb] ApplyUpdates -> DEBU f21 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +"2019-04-22 06:16:54.661 UTC [stateleveldb] ApplyUpdates -> DEBU f22 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +"2019-04-22 06:16:54.661 UTC [stateleveldb] ApplyUpdates -> DEBU f23 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP���R���l� DEBU f24 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +"2019-04-22 06:16:54.662 UTC [stateleveldb] ApplyUpdates -> DEBU f25 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org1MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +"2019-04-22 06:16:54.668 UTC [lockbasedtxmgr] Commit -> DEBU f26 Updates committed to state database and the write lock is released" +"2019-04-22 06:16:54.668 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU f27 Preparing potential purge list working-set for expiringAtBlk [4]" +"2019-04-22 06:16:54.669 UTC [leveldbhelper] GetIterator -> DEBU f29 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +"2019-04-22 06:16:54.669 UTC [lockbasedtxmgr] func1 -> DEBU f28 launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:16:54.670 UTC [kvledger] CommitWithPvtData -> DEBU f2a [businesschannel] Committing block [3] transactions to history database" +"2019-04-22 06:16:54.670 UTC [historyleveldb] Commit -> DEBU f2b Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +"2019-04-22 06:16:54.670 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU f2c No expiry entry found for expiringAtBlk [4]" +"2019-04-22 06:16:54.673 UTC [historyleveldb] Commit -> DEBU f2d Channel [businesschannel]: Updates committed to history database for blockNo [3]" +"2019-04-22 06:16:54.673 UTC [kvledger] CommitWithPvtData -> INFO f2e [businesschannel] Committed block [3] with 1 transaction(s) in 49ms (state_validation=6ms block_commit=26ms state_commit=13ms)" +"2019-04-22 06:16:54.674 UTC [transientstore] PurgeByTxids -> DEBU f2f Purging private data from transient store for committed txids" +"2019-04-22 06:16:54.674 UTC [leveldbhelper] GetIterator -> DEBU f30 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x54, 0x0, 0x65, 0x33, 0x31, 0x64, 0x33, 0x63, 0x39, 0x36, 0x39, 0x37, 0x33, 0x34, 0x30, 0x38, 0x63, 0x61, 0x62, 0x33, 0x65, 0x35, 0x37, 0x34, 0x39, 0x65, 0x63, 0x38, 0x32, 0x35, 0x33, 0x32, 0x36, 0x36, 0x64, 0x39, 0x62, 0x66, 0x33, 0x64, 0x63, 0x61, 0x62, 0x37, 0x61, 0x66, 0x61, 0x62, 0x65, 0x39, 0x31, 0x63, 0x66, 0x61, 0x62, 0x63, 0x34, 0x62, 0x33, 0x65, 0x63, 0x37, 0x39, 0x33, 0x35, 0x61, 0xff}]" +"2019-04-22 06:16:54.674 UTC [common.deliver] deliverBlocks -> DEBU f31 [channel: businesschannel] Delivering block [3] for (0xc0036aba80) for 192.168.224.9:49236" +"2019-04-22 06:16:54.675 UTC [fsblkstorage] waitForBlock -> DEBU f32 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-04-22 06:16:54.676 UTC [msp.identity] Sign -> DEBU f33 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020804 " +"2019-04-22 06:16:54.676 UTC [msp.identity] Sign -> DEBU f34 Sign: digest: BCD5910C85D65EF8CACC46BB49A27E3082ABE84988D89C486435E9336520CA2E " +"2019-04-22 06:16:54.677 UTC [gossip.state] commitBlock -> DEBU f35 [businesschannel] Committed block [3] with 1 transaction(s)" +"2019-04-22 06:16:54.684 UTC [common.deliver] deliverBlocks -> DEBU f36 Context canceled, aborting wait for next block" +"2019-04-22 06:16:54.684 UTC [common.deliverevents] func1 -> DEBU f37 Closing Deliver stream" +"2019-04-22 06:16:54.684 UTC [comm.grpc.server] 1 -> INFO f38 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:17:22.555Z grpc.peer_address=192.168.224.9:49236 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1609702s +"2019-04-22 06:16:54.685 UTC [grpc] infof -> DEBU f39 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:54.685 UTC [grpc] infof -> DEBU f3a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:54.685 UTC [fsblkstorage] waitForBlock -> DEBU f3b Came out of wait. maxAvailaBlockNumber=[3]" +"2019-04-22 06:16:54.884 UTC [gossip.pull] Hello -> DEBU f3c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:54.884 UTC [gossip.comm] Send -> DEBU f3d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:54.884 UTC [gossip.pull] Hello -> DEBU f3e Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:16:54.885 UTC [gossip.comm] Send -> DEBU f3f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:54.885 UTC [gossip.pull] Hello -> DEBU f41 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:16:54.885 UTC [gossip.comm] Send -> DEBU f42 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:54.885 UTC [gossip.comm] sendToEndpoint -> DEBU f43 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.886 UTC [gossip.comm] sendToEndpoint -> DEBU f44 Exiting" +"2019-04-22 06:16:54.886 UTC [gossip.comm] sendToEndpoint -> DEBU f45 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.886 UTC [gossip.comm] sendToEndpoint -> DEBU f46 Exiting" +"2019-04-22 06:16:54.885 UTC [gossip.comm] sendToEndpoint -> DEBU f40 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.887 UTC [gossip.comm] sendToEndpoint -> DEBU f47 Exiting" +"2019-04-22 06:16:54.891 UTC [gossip.gossip] handleMessage -> DEBU f48 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8121746611979298058 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.892 UTC [gossip.pull] HandleMessage -> DEBU f49 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8121746611979298058 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.892 UTC [gossip.gossip] handleMessage -> DEBU f4a Exiting" +"2019-04-22 06:16:54.893 UTC [gossip.comm] func1 -> DEBU f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15285500438109566118 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.893 UTC [gossip.gossip] handleMessage -> DEBU f4c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15285500438109566118 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.893 UTC [gossip.pull] HandleMessage -> DEBU f4d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15285500438109566118 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.893 UTC [gossip.gossip] handleMessage -> DEBU f4e Exiting" +"2019-04-22 06:16:54.894 UTC [gossip.comm] func1 -> DEBU f4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 341205638586266595 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 118 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.894 UTC [gossip.gossip] handleMessage -> DEBU f50 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 341205638586266595 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 118 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.894 UTC [gossip.pull] HandleMessage -> DEBU f51 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 341205638586266595 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 118 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.895 UTC [gossip.gossip] handleMessage -> DEBU f52 Exiting" +"2019-04-22 06:16:54.897 UTC [msp.identity] Sign -> DEBU f53 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151014 " +"2019-04-22 06:16:54.897 UTC [msp.identity] Sign -> DEBU f54 Sign: digest: 7F1D118D8C1AEB40DA7473D50AEE85DCF7905E837B1A6AF0EC140A9626B47F64 " +"2019-04-22 06:16:54.897 UTC [msp.identity] Sign -> DEBU f55 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:54.898 UTC [msp.identity] Sign -> DEBU f56 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:54.898 UTC [gossip.comm] Send -> DEBU f57 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:54.898 UTC [msp] DeserializeIdentity -> DEBU f58 Obtaining identity" +"2019-04-22 06:16:54.899 UTC [gossip.comm] Send -> DEBU f5a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:54.899 UTC [gossip.comm] sendToEndpoint -> DEBU f59 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.899 UTC [gossip.comm] sendToEndpoint -> DEBU f5b Exiting" +"2019-04-22 06:16:54.899 UTC [msp] DeserializeIdentity -> DEBU f5c Obtaining identity" +"2019-04-22 06:16:54.901 UTC [gossip.comm] sendToEndpoint -> DEBU f5d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.902 UTC [gossip.comm] sendToEndpoint -> DEBU f5e Exiting" +"2019-04-22 06:16:54.912 UTC [gossip.gossip] handleMessage -> DEBU f5f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.913 UTC [gossip.gossip] handleMessage -> DEBU f60 Exiting" +"2019-04-22 06:16:54.913 UTC [gossip.discovery] handleMsgFromComm -> DEBU f61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.914 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f62 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:54.914 UTC [msp.identity] Verify -> DEBU f63 Verify: digest = 00000000 7f 1d 11 8d 8c 1a eb 40 da 74 73 d5 0a ee 85 dc |.......@.ts.....| +00000010 f7 90 5e 83 7b 1a 6a f0 ec 14 0a 96 26 b4 7f 64 |..^.{.j.....&..d|" +"2019-04-22 06:16:54.914 UTC [msp.identity] Verify -> DEBU f64 Verify: sig = 00000000 30 44 02 20 06 b4 d9 d9 ad 81 6c 89 44 72 30 a9 |0D. ......l.Dr0.| +00000010 b2 21 ca b8 78 8a 9f fc cc a9 f9 e6 53 6a 97 15 |.!..x.......Sj..| +00000020 00 26 6e ad 02 20 4b 2a 91 22 8d 86 bb 19 df ca |.&n.. K*."......| +00000030 78 3c 07 60 e5 aa 71 25 8d 36 aa e5 1e c0 27 a6 |x<.`..q%.6....'.| +00000040 d0 77 cc 34 d9 a0 |.w.4..|" +"2019-04-22 06:16:54.915 UTC [gossip.comm] func1 -> DEBU f65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.915 UTC [gossip.gossip] handleMessage -> DEBU f66 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.916 UTC [gossip.discovery] handleAliveMessage -> DEBU f67 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:54.916 UTC [gossip.discovery] isSentByMe -> DEBU f68 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:54.916 UTC [gossip.comm] Send -> DEBU f69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:54.916 UTC [gossip.discovery] handleAliveMessage -> DEBU f6a Exiting" +"2019-04-22 06:16:54.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f6b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:54.917 UTC [msp] DeserializeIdentity -> DEBU f6c Obtaining identity" +"2019-04-22 06:16:54.916 UTC [gossip.comm] sendToEndpoint -> DEBU f6d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:54.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f6f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:54.917 UTC [gossip.comm] sendToEndpoint -> DEBU f70 Exiting" +"2019-04-22 06:16:54.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f71 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:54.921 UTC [policies] Evaluate -> DEBU f72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:54.921 UTC [gossip.comm] func1 -> DEBU f73 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.921 UTC [policies] Evaluate -> DEBU f74 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:54.921 UTC [policies] Evaluate -> DEBU f75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:54.922 UTC [cauthdsl] func1 -> DEBU f76 0xc0029011b0 gate 1555913814922436400 evaluation starts" +"2019-04-22 06:16:54.922 UTC [cauthdsl] func2 -> DEBU f77 0xc0029011b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:54.923 UTC [cauthdsl] func2 -> DEBU f78 0xc0029011b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:54.923 UTC [cauthdsl] func2 -> DEBU f79 0xc0029011b0 principal matched by identity 0" +"2019-04-22 06:16:54.923 UTC [msp.identity] Verify -> DEBU f7a Verify: digest = 00000000 f1 2f 14 2c 1c 0f e1 93 7d 8a d3 71 31 a5 7a 74 |./.,....}..q1.zt| +00000010 57 f6 e7 3b 09 ed 15 5c 76 00 f0 39 3a 9a a5 c6 |W..;...\v..9:...|" +"2019-04-22 06:16:54.923 UTC [msp.identity] Verify -> DEBU f7b Verify: sig = 00000000 30 44 02 20 45 24 ce b0 1a aa 23 99 23 b2 30 9b |0D. E$....#.#.0.| +00000010 33 ea d7 8d 98 ee ee 6e b5 15 95 51 92 ad 6e a4 |3......n...Q..n.| +00000020 39 f1 f2 dd 02 20 43 53 d1 af 0a 30 40 09 fd 5a |9.... CS...0@..Z| +00000030 e5 48 d5 bb e3 35 f2 20 fe b7 74 d3 ae 1a 58 89 |.H...5. ..t...X.| +00000040 8e d2 df b6 c7 5f |....._|" +"2019-04-22 06:16:54.924 UTC [cauthdsl] func2 -> DEBU f7c 0xc0029011b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:54.924 UTC [cauthdsl] func1 -> DEBU f7d 0xc0029011b0 gate 1555913814922436400 evaluation succeeds" +"2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f80 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:54.924 UTC [policies] Evaluate -> DEBU f81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:54.926 UTC [gossip.discovery] handleAliveMessage -> DEBU f82 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:54.926 UTC [gossip.discovery] handleAliveMessage -> DEBU f83 Exiting" +"2019-04-22 06:16:54.927 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f84 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:54.927 UTC [msp.identity] Verify -> DEBU f85 Verify: digest = 00000000 f3 34 6d d5 c4 64 e7 73 33 68 bd 6a f8 96 23 91 |.4m..d.s3h.j..#.| +00000010 c7 d7 3e a2 ef 90 8c 38 c0 cd 38 4f 68 8a f0 e0 |..>....8..8Oh...|" +"2019-04-22 06:16:54.927 UTC [msp.identity] Verify -> DEBU f86 Verify: sig = 00000000 30 44 02 20 02 c2 2f 91 8b 46 af 18 a8 23 cb 0a |0D. ../..F...#..| +00000010 46 7f 40 25 6e 85 2f e8 4a ff 39 f3 d7 db f5 04 |F.@%n./.J.9.....| +00000020 4f fb 5a 45 02 20 27 b9 9b c8 e0 9e fe 33 f3 ed |O.ZE. '......3..| +00000030 9a 13 16 ad 51 7c 87 0e 02 66 b5 49 ac 5d fc 3b |....Q|...f.I.].;| +00000040 04 88 5c 78 0b 7d |..\x.}|" +"2019-04-22 06:16:54.928 UTC [gossip.discovery] handleAliveMessage -> DEBU f87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:54.928 UTC [gossip.discovery] handleAliveMessage -> DEBU f88 Exiting" +"2019-04-22 06:16:54.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU f89 Exiting" +"2019-04-22 06:16:54.928 UTC [gossip.gossip] handleMessage -> DEBU f8a Exiting" +"2019-04-22 06:16:54.928 UTC [gossip.gossip] handleMessage -> DEBU f8b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU f8c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.929 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f8d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f8e Verify: digest = 00000000 7f 1d 11 8d 8c 1a eb 40 da 74 73 d5 0a ee 85 dc |.......@.ts.....| +00000010 f7 90 5e 83 7b 1a 6a f0 ec 14 0a 96 26 b4 7f 64 |..^.{.j.....&..d|" +"2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f8f Verify: sig = 00000000 30 44 02 20 06 b4 d9 d9 ad 81 6c 89 44 72 30 a9 |0D. ......l.Dr0.| +00000010 b2 21 ca b8 78 8a 9f fc cc a9 f9 e6 53 6a 97 15 |.!..x.......Sj..| +00000020 00 26 6e ad 02 20 4b 2a 91 22 8d 86 bb 19 df ca |.&n.. K*."......| +00000030 78 3c 07 60 e5 aa 71 25 8d 36 aa e5 1e c0 27 a6 |x<.`..q%.6....'.| +00000040 d0 77 cc 34 d9 a0 |.w.4..|" +"2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f90 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:16:54.930 UTC [msp.identity] Verify -> DEBU f91 Verify: sig = 00000000 30 45 02 21 00 a9 68 0b b9 8e 74 f0 15 c5 e5 bc |0E.!..h...t.....| +00000010 86 80 59 df 97 7d 11 3b 22 ca 01 e9 c7 16 bf fc |..Y..}.;".......| +00000020 8e 74 98 18 0d 02 20 10 77 6d 70 c8 de 28 e0 15 |.t.... .wmp..(..| +00000030 1a 48 2b fb f2 15 d2 55 1d 2f 60 2e 0f 78 ed 15 |.H+....U./`..x..| +00000040 c0 03 29 6f 6b b7 d6 |..)ok..|" +"2019-04-22 06:16:54.931 UTC [gossip.discovery] handleAliveMessage -> DEBU f92 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:54.931 UTC [gossip.discovery] isSentByMe -> DEBU f93 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:54.931 UTC [gossip.discovery] handleAliveMessage -> DEBU f94 Exiting" +"2019-04-22 06:16:54.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU f95 Exiting" +"2019-04-22 06:16:54.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU f96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 486 bytes, Signature: 0 bytes" +"2019-04-22 06:16:54.932 UTC [gossip.gossip] handleMessage -> DEBU f97 Exiting" +"2019-04-22 06:16:54.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f98 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:54.933 UTC [msp.identity] Verify -> DEBU f99 Verify: digest = 00000000 7f 1d 11 8d 8c 1a eb 40 da 74 73 d5 0a ee 85 dc |.......@.ts.....| +00000010 f7 90 5e 83 7b 1a 6a f0 ec 14 0a 96 26 b4 7f 64 |..^.{.j.....&..d|" +"2019-04-22 06:16:54.934 UTC [msp.identity] Verify -> DEBU f9a Verify: sig = 00000000 30 44 02 20 06 b4 d9 d9 ad 81 6c 89 44 72 30 a9 |0D. ......l.Dr0.| +00000010 b2 21 ca b8 78 8a 9f fc cc a9 f9 e6 53 6a 97 15 |.!..x.......Sj..| +00000020 00 26 6e ad 02 20 4b 2a 91 22 8d 86 bb 19 df ca |.&n.. K*."......| +00000030 78 3c 07 60 e5 aa 71 25 8d 36 aa e5 1e c0 27 a6 |x<.`..q%.6....'.| +00000040 d0 77 cc 34 d9 a0 |.w.4..|" +"2019-04-22 06:16:54.934 UTC [gossip.discovery] handleAliveMessage -> DEBU f9b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:54.934 UTC [gossip.discovery] isSentByMe -> DEBU f9c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:54.934 UTC [gossip.discovery] handleAliveMessage -> DEBU f9d Exiting" +"2019-04-22 06:16:54.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f9e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:54.935 UTC [msp] DeserializeIdentity -> DEBU f9f Obtaining identity" +"2019-04-22 06:16:54.935 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fa0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:54.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:54.936 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fa2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:54.936 UTC [policies] Evaluate -> DEBU fa3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:54.936 UTC [policies] Evaluate -> DEBU fa4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:54.936 UTC [policies] Evaluate -> DEBU fa5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:54.937 UTC [cauthdsl] func1 -> DEBU fa6 0xc00292d9b0 gate 1555913814936958900 evaluation starts" +"2019-04-22 06:16:54.937 UTC [cauthdsl] func2 -> DEBU fa7 0xc00292d9b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:54.937 UTC [cauthdsl] func2 -> DEBU fa8 0xc00292d9b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:54.937 UTC [cauthdsl] func2 -> DEBU fa9 0xc00292d9b0 principal matched by identity 0" +"2019-04-22 06:16:54.938 UTC [msp.identity] Verify -> DEBU faa Verify: digest = 00000000 bd 0b e1 d2 5c d0 f2 c1 1c 08 8f 57 9e 5c 24 2d |....\......W.\$-| +00000010 04 90 bc d8 18 36 70 e0 ce 55 c7 e6 d1 3d 70 2c |.....6p..U...=p,|" +"2019-04-22 06:16:54.938 UTC [msp.identity] Verify -> DEBU fab Verify: sig = 00000000 30 44 02 20 23 e4 b9 a0 c6 cb 10 14 e9 31 93 22 |0D. #........1."| +00000010 0f 0c 58 07 14 fe 60 db 59 bf 92 71 c9 15 4a 63 |..X...`.Y..q..Jc| +00000020 02 81 3a b9 02 20 0a e0 80 ef bb e5 ab e7 29 64 |..:.. ........)d| +00000030 7f 72 eb 85 5b 19 17 fe 20 41 dd 9e 8a 38 85 f4 |.r..[... A...8..| +00000040 fe 9a 6c 7f a4 f6 |..l...|" +"2019-04-22 06:16:54.938 UTC [cauthdsl] func2 -> DEBU fac 0xc00292d9b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:54.938 UTC [cauthdsl] func1 -> DEBU fad 0xc00292d9b0 gate 1555913814936958900 evaluation succeeds" +"2019-04-22 06:16:54.938 UTC [policies] Evaluate -> DEBU fae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:54.939 UTC [policies] Evaluate -> DEBU faf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:54.939 UTC [policies] Evaluate -> DEBU fb0 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:54.939 UTC [policies] Evaluate -> DEBU fb1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:54.939 UTC [gossip.discovery] handleAliveMessage -> DEBU fb2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:54.940 UTC [gossip.discovery] handleAliveMessage -> DEBU fb3 Exiting" +"2019-04-22 06:16:54.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU fb4 Exiting" +"2019-04-22 06:16:55.156 UTC [gossip.comm] func1 -> DEBU fb5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.157 UTC [gossip.gossip] handleMessage -> DEBU fb6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.157 UTC [gossip.pull] HandleMessage -> DEBU fb7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.157 UTC [gossip.pull] SendDigest -> DEBU fb8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:55.157 UTC [gossip.gossip] handleMessage -> DEBU fb9 Exiting" +"2019-04-22 06:16:55.170 UTC [gossip.comm] func1 -> DEBU fba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.170 UTC [gossip.gossip] handleMessage -> DEBU fbb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.170 UTC [gossip.gossip] handleMessage -> DEBU fbc Exiting" +"2019-04-22 06:16:55.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU fbd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fbe Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:55.172 UTC [msp.identity] Verify -> DEBU fbf Verify: digest = 00000000 28 9c ad 91 34 ac 50 21 f9 3e c6 da 91 1d e8 46 |(...4.P!.>.....F| +00000010 79 60 63 97 85 4d 36 54 58 08 9d ba 9a fb 91 d3 |y`c..M6TX.......|" +"2019-04-22 06:16:55.172 UTC [msp.identity] Verify -> DEBU fc0 Verify: sig = 00000000 30 45 02 21 00 a0 71 48 7c 64 0f fb a0 b5 71 cd |0E.!..qH|d....q.| +00000010 24 7d 95 c0 d4 3a ce 95 90 c8 72 b7 df 5c 5d 96 |$}...:....r..\].| +00000020 f9 ba 94 4c 7c 02 20 03 b7 6d a2 0a 23 50 e0 e3 |...L|. ..m..#P..| +00000030 a4 03 0c b9 84 3f b9 97 04 19 7c 08 5f ba 54 31 |.....?....|._.T1| +00000040 41 bf 29 79 7f 8c dc |A.)y...|" +"2019-04-22 06:16:55.173 UTC [msp.identity] Verify -> DEBU fc1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:55.173 UTC [msp.identity] Verify -> DEBU fc2 Verify: sig = 00000000 30 44 02 20 0a 1a 71 63 e7 cf 21 5b 08 c4 11 8b |0D. ..qc..![....| +00000010 78 83 dd 3f 97 95 a6 ed 83 67 cd ef 98 78 19 12 |x..?.....g...x..| +00000020 bc ec 1d 1f 02 20 05 30 b2 62 7f 2e 40 14 c1 49 |..... .0.b..@..I| +00000030 a8 2a 2c 53 a4 7f e9 a0 ad d7 d9 a1 ae a0 ba 3f |.*,S...........?| +00000040 3b a0 3c 46 6d d2 |;. DEBU fc3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc5 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 " +"2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 " +"2019-04-22 06:16:55.174 UTC [gossip.discovery] learnExistingMembers -> DEBU fc7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:55.175 UTC [gossip.discovery] learnExistingMembers -> DEBU fc8 Exiting" +"2019-04-22 06:16:55.175 UTC [gossip.discovery] handleAliveMessage -> DEBU fc9 Exiting" +"2019-04-22 06:16:55.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU fca Exiting" +"2019-04-22 06:16:55.176 UTC [gossip.discovery] sendMemResponse -> DEBU fcb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:55.176 UTC [msp] DeserializeIdentity -> DEBU fcc Obtaining identity" +"2019-04-22 06:16:55.177 UTC [msp] DeserializeIdentity -> DEBU fcd Obtaining identity" +"2019-04-22 06:16:55.177 UTC [gossip.comm] Send -> DEBU fce Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:55.177 UTC [gossip.discovery] sendMemResponse -> DEBU fcf Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:55.178 UTC [gossip.comm] sendToEndpoint -> DEBU fd0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.178 UTC [gossip.comm] sendToEndpoint -> DEBU fd1 Exiting" +"2019-04-22 06:16:55.617 UTC [gossip.comm] func1 -> DEBU fd2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.617 UTC [gossip.gossip] handleMessage -> DEBU fd3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.617 UTC [gossip.pull] HandleMessage -> DEBU fd4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.618 UTC [msp] DeserializeIdentity -> DEBU fd5 Obtaining identity" +"2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd6 Obtaining identity" +"2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd7 Obtaining identity" +"2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd8 Obtaining identity" +"2019-04-22 06:16:55.619 UTC [msp] DeserializeIdentity -> DEBU fd9 Obtaining identity" +"2019-04-22 06:16:55.620 UTC [msp] DeserializeIdentity -> DEBU fda Obtaining identity" +"2019-04-22 06:16:55.620 UTC [gossip.pull] SendDigest -> DEBU fdb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:55.620 UTC [gossip.gossip] handleMessage -> DEBU fdc Exiting" +"2019-04-22 06:16:55.625 UTC [gossip.comm] func1 -> DEBU fdd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.625 UTC [gossip.gossip] handleMessage -> DEBU fde Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.625 UTC [gossip.gossip] handleMessage -> DEBU fdf Exiting" +"2019-04-22 06:16:55.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU fe0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.626 UTC [gossip.gossip] ValidateAliveMsg -> DEBU fe1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:55.626 UTC [msp] DeserializeIdentity -> DEBU fe2 Obtaining identity" +"2019-04-22 06:16:55.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fe3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:55.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:55.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fe5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:55.628 UTC [policies] Evaluate -> DEBU fe6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:55.628 UTC [policies] Evaluate -> DEBU fe7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:55.628 UTC [policies] Evaluate -> DEBU fe8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:55.629 UTC [cauthdsl] func1 -> DEBU fe9 0xc0034a48c0 gate 1555913815628926000 evaluation starts" +"2019-04-22 06:16:55.629 UTC [cauthdsl] func2 -> DEBU fea 0xc0034a48c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:55.629 UTC [cauthdsl] func2 -> DEBU feb 0xc0034a48c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:55.629 UTC [cauthdsl] func2 -> DEBU fec 0xc0034a48c0 principal matched by identity 0" +"2019-04-22 06:16:55.630 UTC [msp.identity] Verify -> DEBU fed Verify: digest = 00000000 b6 b5 ef 2b 3b aa 01 9a 9c 4f 63 aa 0e c7 38 5e |...+;....Oc...8^| +00000010 49 f4 26 6a be 2b 03 1b 72 66 80 df 33 0a 53 fa |I.&j.+..rf..3.S.|" +"2019-04-22 06:16:55.630 UTC [msp.identity] Verify -> DEBU fee Verify: sig = 00000000 30 44 02 20 6e 1a f3 c3 a6 c7 c2 aa e5 15 fa 3d |0D. n..........=| +00000010 57 d4 5e 7e ba 9a 40 7b 44 7c 33 4d 93 6a a6 fd |W.^~..@{D|3M.j..| +00000020 89 66 f9 00 02 20 64 d2 e5 0c 43 2f cc 4e 65 c0 |.f... d...C/.Ne.| +00000030 93 ff ba 61 69 bf 5e fb ab 37 e7 a6 e2 70 8f 8a |...ai.^..7...p..| +00000040 e7 63 5d 1b b9 87 |.c]...|" +"2019-04-22 06:16:55.631 UTC [cauthdsl] func2 -> DEBU fef 0xc0034a48c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:55.631 UTC [cauthdsl] func1 -> DEBU ff0 0xc0034a48c0 gate 1555913815628926000 evaluation succeeds" +"2019-04-22 06:16:55.631 UTC [policies] Evaluate -> DEBU ff1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:55.632 UTC [policies] Evaluate -> DEBU ff2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:55.633 UTC [policies] Evaluate -> DEBU ff3 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:55.633 UTC [policies] Evaluate -> DEBU ff4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:55.633 UTC [gossip.discovery] handleAliveMessage -> DEBU ff5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:55.633 UTC [gossip.discovery] learnExistingMembers -> DEBU ff6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:55.634 UTC [gossip.discovery] learnExistingMembers -> DEBU ff7 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 " +"2019-04-22 06:16:55.634 UTC [gossip.discovery] learnExistingMembers -> DEBU ff8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 " +"2019-04-22 06:16:55.634 UTC [gossip.discovery] learnExistingMembers -> DEBU ff9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:55.635 UTC [gossip.discovery] learnExistingMembers -> DEBU ffa Exiting" +"2019-04-22 06:16:55.635 UTC [gossip.discovery] handleAliveMessage -> DEBU ffb Exiting" +"2019-04-22 06:16:55.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU ffc Exiting" +"2019-04-22 06:16:55.635 UTC [gossip.discovery] sendMemResponse -> DEBU ffd Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:55.635 UTC [msp] DeserializeIdentity -> DEBU ffe Obtaining identity" +"2019-04-22 06:16:55.636 UTC [msp] DeserializeIdentity -> DEBU fff Obtaining identity" +"2019-04-22 06:16:55.636 UTC [msp] DeserializeIdentity -> DEBU 1000 Obtaining identity" +"2019-04-22 06:16:55.636 UTC [gossip.comm] Send -> DEBU 1001 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:55.637 UTC [gossip.discovery] sendMemResponse -> DEBU 1002 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:16:55.637 UTC [gossip.comm] sendToEndpoint -> DEBU 1003 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:16:55.637 UTC [gossip.comm] sendToEndpoint -> DEBU 1004 Exiting" +"2019-04-22 06:16:55.840 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 1005 Sleeping 25s" +"2019-04-22 06:16:55.848 UTC [msp.identity] Sign -> DEBU 1006 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151015 " +"2019-04-22 06:16:55.848 UTC [msp.identity] Sign -> DEBU 1007 Sign: digest: D985D05B1EA56F93E3BCC0CCE32BC811838783BF0E58711B13E5A46AC75699DB " +"2019-04-22 06:16:55.849 UTC [msp.identity] Sign -> DEBU 1008 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:55.849 UTC [msp.identity] Sign -> DEBU 1009 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:55.849 UTC [gossip.discovery] periodicalSendAlive -> DEBU 100a Sleeping 5s" +"2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 100b Obtaining identity" +"2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 100c Obtaining identity" +"2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 100d Obtaining identity" +"2019-04-22 06:16:55.855 UTC [gossip.comm] Send -> DEBU 100e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:55.855 UTC [gossip.comm] Send -> DEBU 100f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:55.855 UTC [msp] DeserializeIdentity -> DEBU 1010 Obtaining identity" +"2019-04-22 06:16:55.856 UTC [gossip.comm] Send -> DEBU 1011 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1012 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1013 Exiting" +"2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1014 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1015 Exiting" +"2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1016 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:21 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:55.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1017 Exiting" +"2019-04-22 06:16:56.032 UTC [gossip.gossip] handleMessage -> DEBU 1018 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.033 UTC [gossip.pull] HandleMessage -> DEBU 1019 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.033 UTC [msp] DeserializeIdentity -> DEBU 101a Obtaining identity" +"2019-04-22 06:16:56.034 UTC [msp] DeserializeIdentity -> DEBU 101b Obtaining identity" +"2019-04-22 06:16:56.034 UTC [msp] DeserializeIdentity -> DEBU 101c Obtaining identity" +"2019-04-22 06:16:56.035 UTC [msp] DeserializeIdentity -> DEBU 101d Obtaining identity" +"2019-04-22 06:16:56.035 UTC [msp] DeserializeIdentity -> DEBU 101e Obtaining identity" +"2019-04-22 06:16:56.036 UTC [msp] DeserializeIdentity -> DEBU 101f Obtaining identity" +"2019-04-22 06:16:56.037 UTC [gossip.pull] SendDigest -> DEBU 1020 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:56.038 UTC [gossip.gossip] handleMessage -> DEBU 1021 Exiting" +"2019-04-22 06:16:56.049 UTC [gossip.gossip] handleMessage -> DEBU 1022 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.050 UTC [gossip.gossip] handleMessage -> DEBU 1023 Exiting" +"2019-04-22 06:16:56.051 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1024 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.051 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1025 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:56.052 UTC [msp] DeserializeIdentity -> DEBU 1026 Obtaining identity" +"2019-04-22 06:16:56.053 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1027 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1028 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1029 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.054 UTC [policies] Evaluate -> DEBU 102a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.055 UTC [policies] Evaluate -> DEBU 102b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.055 UTC [policies] Evaluate -> DEBU 102c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.056 UTC [cauthdsl] func1 -> DEBU 102d 0xc002828a50 gate 1555913816056425400 evaluation starts" +"2019-04-22 06:16:56.056 UTC [cauthdsl] func2 -> DEBU 102e 0xc002828a50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.056 UTC [cauthdsl] func2 -> DEBU 102f 0xc002828a50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.057 UTC [cauthdsl] func2 -> DEBU 1030 0xc002828a50 principal matched by identity 0" +"2019-04-22 06:16:56.057 UTC [msp.identity] Verify -> DEBU 1031 Verify: digest = 00000000 41 2a 8b 48 df ae bd 4c f1 c8 49 46 82 7c a9 b4 |A*.H...L..IF.|..| +00000010 6c ba ea fd ad 4a 5c 60 a8 c9 12 d2 cb 9a d3 59 |l....J\`.......Y|" +"2019-04-22 06:16:56.058 UTC [msp.identity] Verify -> DEBU 1032 Verify: sig = 00000000 30 44 02 20 79 c2 d1 02 4b b0 62 3d b8 89 cd f2 |0D. y...K.b=....| +00000010 33 5f ed 49 a1 a3 fb 4f 44 02 d6 99 da 4f bf 2c |3_.I...OD....O.,| +00000020 08 fd 06 9e 02 20 19 53 ad 2b 52 ff 2d 1e 8f 2d |..... .S.+R.-..-| +00000030 4b b0 94 f7 5f 42 53 76 a2 c3 ad 9d 9b 73 f0 46 |K..._BSv.....s.F| +00000040 ee 51 f3 fa fd 7e |.Q...~|" +"2019-04-22 06:16:56.058 UTC [cauthdsl] func2 -> DEBU 1033 0xc002828a50 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.059 UTC [cauthdsl] func1 -> DEBU 1034 0xc002828a50 gate 1555913816056425400 evaluation succeeds" +"2019-04-22 06:16:56.059 UTC [policies] Evaluate -> DEBU 1035 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.059 UTC [policies] Evaluate -> DEBU 1036 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.060 UTC [policies] Evaluate -> DEBU 1037 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.060 UTC [policies] Evaluate -> DEBU 1038 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 1039 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:56.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 103a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:56.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 103b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 " +"2019-04-22 06:16:56.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 103c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 " +"2019-04-22 06:16:56.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 103d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:20 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:56.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 103e Exiting" +"2019-04-22 06:16:56.062 UTC [gossip.discovery] handleAliveMessage -> DEBU 103f Exiting" +"2019-04-22 06:16:56.062 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1040 Exiting" +"2019-04-22 06:16:56.062 UTC [gossip.discovery] sendMemResponse -> DEBU 1041 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:16:56.063 UTC [msp] DeserializeIdentity -> DEBU 1042 Obtaining identity" +"2019-04-22 06:16:56.063 UTC [msp] DeserializeIdentity -> DEBU 1043 Obtaining identity" +"2019-04-22 06:16:56.063 UTC [msp] DeserializeIdentity -> DEBU 1044 Obtaining identity" +"2019-04-22 06:16:56.064 UTC [gossip.comm] Send -> DEBU 1045 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:56.064 UTC [gossip.comm] sendToEndpoint -> DEBU 1046 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.065 UTC [gossip.comm] sendToEndpoint -> DEBU 1047 Exiting" +"2019-04-22 06:16:56.065 UTC [gossip.discovery] sendMemResponse -> DEBU 1048 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:16:56.137 UTC [gossip.comm] func1 -> DEBU 1049 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:56.137 UTC [gossip.gossip] handleMessage -> DEBU 104a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:56.138 UTC [gossip.discovery] handleMsgFromComm -> DEBU 104b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:56.138 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 104c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:56.139 UTC [msp.identity] Verify -> DEBU 104d Verify: digest = 00000000 9b ce 81 e7 f0 0f 12 fc f4 87 7a 7f 71 5d 3e 8d |..........z.q]>.| +00000010 3c 49 ee 8d c6 91 29 6b 1c d2 28 ad 6d 2b f7 0b | DEBU 104e Verify: sig = 00000000 30 45 02 21 00 87 23 23 c1 ed 4f 42 63 27 46 c1 |0E.!..##..OBc'F.| +00000010 93 d2 de a9 ed 81 38 df 39 f2 47 94 da 6e e8 1a |......8.9.G..n..| +00000020 3e f4 80 ba 24 02 20 0f fe 8c 00 18 1d d5 d9 bd |>...$. .........| +00000030 11 1a a4 46 30 dd f2 41 45 54 23 89 c8 17 a3 8a |...F0..AET#.....| +00000040 d4 b5 ee 4b 27 7a b9 |...K'z.|" +"2019-04-22 06:16:56.140 UTC [msp.identity] Verify -> DEBU 104f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:56.140 UTC [msp.identity] Verify -> DEBU 1050 Verify: sig = 00000000 30 44 02 20 6a b4 4b 19 f5 0e 3c e2 60 4e d6 37 |0D. j.K...<.`N.7| +00000010 d2 11 ff b5 02 37 f0 49 a1 e0 b9 a4 14 11 85 b8 |.....7.I........| +00000020 fb 4f 51 76 02 20 04 c8 15 4e 5c 67 03 72 99 be |.OQv. ...N\g.r..| +00000030 a9 24 b3 29 82 1e ac 1b 83 c2 1f ba 4f d7 95 a9 |.$.)........O...| +00000040 28 4c 28 f7 36 db |(L(.6.|" +"2019-04-22 06:16:56.140 UTC [gossip.discovery] handleAliveMessage -> DEBU 1051 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:56.141 UTC [gossip.discovery] learnExistingMembers -> DEBU 1052 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:16:56.143 UTC [gossip.discovery] learnExistingMembers -> DEBU 1053 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 " +"2019-04-22 06:16:56.143 UTC [gossip.discovery] learnExistingMembers -> DEBU 1054 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 " +"2019-04-22 06:16:56.144 UTC [gossip.discovery] learnExistingMembers -> DEBU 1055 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:56.147 UTC [gossip.discovery] learnExistingMembers -> DEBU 1057 Exiting" +"2019-04-22 06:16:56.138 UTC [gossip.gossip] handleMessage -> DEBU 1056 Exiting" +"2019-04-22 06:16:56.148 UTC [gossip.gossip] handleMessage -> DEBU 1058 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.147 UTC [gossip.discovery] handleAliveMessage -> DEBU 1059 Exiting" +"2019-04-22 06:16:56.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 105a Exiting" +"2019-04-22 06:16:56.148 UTC [gossip.gossip] handleMessage -> DEBU 105c Exiting" +"2019-04-22 06:16:56.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 105b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.149 UTC [gossip.discovery] handleMsgFromComm -> DEBU 105d Exiting" +"2019-04-22 06:16:56.154 UTC [msp] DeserializeIdentity -> DEBU 105e Obtaining identity" +"2019-04-22 06:16:56.154 UTC [msp] DeserializeIdentity -> DEBU 105f Obtaining identity" +"2019-04-22 06:16:56.155 UTC [msp] DeserializeIdentity -> DEBU 1060 Obtaining identity" +"2019-04-22 06:16:56.155 UTC [gossip.comm] Send -> DEBU 1061 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:56.156 UTC [msp] DeserializeIdentity -> DEBU 1062 Obtaining identity" +"2019-04-22 06:16:56.156 UTC [gossip.comm] Send -> DEBU 1063 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:56.156 UTC [gossip.comm] sendToEndpoint -> DEBU 1064 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.157 UTC [gossip.comm] sendToEndpoint -> DEBU 1065 Exiting" +"2019-04-22 06:16:56.157 UTC [gossip.comm] sendToEndpoint -> DEBU 1066 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.157 UTC [gossip.comm] sendToEndpoint -> DEBU 1067 Exiting" +"2019-04-22 06:16:56.158 UTC [gossip.comm] func1 -> DEBU 1068 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.159 UTC [gossip.gossip] handleMessage -> DEBU 1069 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.159 UTC [gossip.gossip] handleMessage -> DEBU 106a Exiting" +"2019-04-22 06:16:56.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 106c Exiting" +"2019-04-22 06:16:56.425 UTC [msp] DeserializeIdentity -> DEBU 106d Obtaining identity" +"2019-04-22 06:16:56.426 UTC [msp] DeserializeIdentity -> DEBU 106e Obtaining identity" +"2019-04-22 06:16:56.426 UTC [gossip.comm] Send -> DEBU 106f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1070 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1071 Exiting" +"2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1072 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1073 Exiting" +"2019-04-22 06:16:56.427 UTC [gossip.comm] sendToEndpoint -> DEBU 1074 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.428 UTC [gossip.comm] sendToEndpoint -> DEBU 1075 Exiting" +"2019-04-22 06:16:56.430 UTC [gossip.gossip] handleMessage -> DEBU 1076 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.430 UTC [msp] DeserializeIdentity -> DEBU 1077 Obtaining identity" +"2019-04-22 06:16:56.430 UTC [gossip.comm] func1 -> DEBU 1078 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.430 UTC [gossip.comm] func1 -> DEBU 1079 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.431 UTC [msp.identity] Verify -> DEBU 107a Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:56.431 UTC [msp.identity] Verify -> DEBU 107b Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:56.432 UTC [msp.identity] Verify -> DEBU 107c Verify: digest = 00000000 be b8 95 01 1b a4 07 c9 98 d7 ce ea 60 4c 29 92 |............`L).| +00000010 45 24 ef 6d df 25 1f fb f8 7a aa c7 ac bf 60 3c |E$.m.%...z....`<|" +"2019-04-22 06:16:56.432 UTC [msp.identity] Verify -> DEBU 107d Verify: sig = 00000000 30 44 02 20 78 2b 91 68 d2 40 a7 2b 02 18 8f 74 |0D. x+.h.@.+...t| +00000010 5d 43 09 00 1e 46 e0 50 b5 19 7a 96 ba b7 06 a0 |]C...F.P..z.....| +00000020 d7 f8 89 d4 02 20 4e 63 09 41 18 fe c5 58 dd f0 |..... Nc.A...X..| +00000030 8b 71 54 cd d4 b8 90 bf 66 34 8a 03 3c e2 9c 2f |.qT.....f4..<../| +00000040 47 2b 0f d5 7d b2 |G+..}.|" +"2019-04-22 06:16:56.432 UTC [msp] DeserializeIdentity -> DEBU 107e Obtaining identity" +"2019-04-22 06:16:56.432 UTC [msp] DeserializeIdentity -> DEBU 107f Obtaining identity" +"2019-04-22 06:16:56.433 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1080 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1081 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1082 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.433 UTC [policies] Evaluate -> DEBU 1083 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.433 UTC [policies] Evaluate -> DEBU 1084 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.433 UTC [policies] Evaluate -> DEBU 1085 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.433 UTC [cauthdsl] func1 -> DEBU 1086 0xc00286f730 gate 1555913816433554700 evaluation starts" +"2019-04-22 06:16:56.433 UTC [cauthdsl] func2 -> DEBU 1087 0xc00286f730 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.433 UTC [cauthdsl] func2 -> DEBU 1088 0xc00286f730 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.433 UTC [cauthdsl] func2 -> DEBU 1089 0xc00286f730 principal matched by identity 0" +"2019-04-22 06:16:56.433 UTC [msp.identity] Verify -> DEBU 108a Verify: digest = 00000000 5c 4c f6 78 5d 0b 09 38 ba c0 5c 28 23 53 47 ad |\L.x]..8..\(#SG.| +00000010 8e 2a 2a 43 38 29 b1 5d 9e f1 6a 4b 58 15 70 d1 |.**C8).]..jKX.p.|" +"2019-04-22 06:16:56.434 UTC [msp.identity] Verify -> DEBU 108b Verify: sig = 00000000 30 44 02 20 36 2b 81 a5 43 9d 7c bb 41 fa 7c 80 |0D. 6+..C.|.A.|.| +00000010 52 8c 22 04 10 00 d3 f4 87 17 26 8a c0 e1 48 c4 |R.".......&...H.| +00000020 d3 4a 31 e8 02 20 63 45 2f b8 81 9a f0 15 8d 02 |.J1.. cE/.......| +00000030 f6 2c a9 28 cf ae a7 df 55 22 6c a3 2c 64 ab 27 |.,.(....U"l.,d.'| +00000040 4b b6 4c fc 03 1a |K.L...|" +"2019-04-22 06:16:56.434 UTC [cauthdsl] func2 -> DEBU 108c 0xc00286f730 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.434 UTC [cauthdsl] func1 -> DEBU 108d 0xc00286f730 gate 1555913816433554700 evaluation succeeds" +"2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 108e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 108f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 1090 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.434 UTC [policies] Evaluate -> DEBU 1091 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.432 UTC [msp] DeserializeIdentity -> DEBU 1092 Obtaining identity" +"2019-04-22 06:16:56.435 UTC [msp] DeserializeIdentity -> DEBU 1094 Obtaining identity" +"2019-04-22 06:16:56.434 UTC [msp] DeserializeIdentity -> DEBU 1093 Obtaining identity" +"2019-04-22 06:16:56.435 UTC [gossip.comm] Send -> DEBU 1095 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-04-22 06:16:56.436 UTC [msp] DeserializeIdentity -> DEBU 1096 Obtaining identity" +"2019-04-22 06:16:56.436 UTC [gossip.comm] sendToEndpoint -> DEBU 1099 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.437 UTC [gossip.comm] sendToEndpoint -> DEBU 109a Exiting" +"2019-04-22 06:16:56.436 UTC [msp] DeserializeIdentity -> DEBU 1098 Obtaining identity" +"2019-04-22 06:16:56.437 UTC [gossip.comm] sendToEndpoint -> DEBU 109b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.438 UTC [gossip.comm] sendToEndpoint -> DEBU 109d Exiting" +"2019-04-22 06:16:56.437 UTC [gossip.comm] sendToEndpoint -> DEBU 109c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.440 UTC [gossip.comm] sendToEndpoint -> DEBU 109e Exiting" +"2019-04-22 06:16:56.436 UTC [msp] DeserializeIdentity -> DEBU 1097 Obtaining identity" +"2019-04-22 06:16:56.441 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 109f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10a0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10a1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.441 UTC [policies] Evaluate -> DEBU 10a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.441 UTC [policies] Evaluate -> DEBU 10a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.441 UTC [policies] Evaluate -> DEBU 10a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.443 UTC [cauthdsl] func1 -> DEBU 10a5 0xc00288d660 gate 1555913816441810500 evaluation starts" +"2019-04-22 06:16:56.443 UTC [cauthdsl] func2 -> DEBU 10a6 0xc00288d660 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.443 UTC [cauthdsl] func2 -> DEBU 10a7 0xc00288d660 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.444 UTC [cauthdsl] func2 -> DEBU 10a8 0xc00288d660 principal matched by identity 0" +"2019-04-22 06:16:56.444 UTC [msp.identity] Verify -> DEBU 10a9 Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +"2019-04-22 06:16:56.444 UTC [msp.identity] Verify -> DEBU 10aa Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +00000040 aa 36 98 36 42 e6 |.6.6B.|" +"2019-04-22 06:16:56.444 UTC [cauthdsl] func2 -> DEBU 10ab 0xc00288d660 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.444 UTC [cauthdsl] func1 -> DEBU 10ac 0xc00288d660 gate 1555913816441810500 evaluation succeeds" +"2019-04-22 06:16:56.444 UTC [policies] Evaluate -> DEBU 10ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.444 UTC [policies] Evaluate -> DEBU 10ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.444 UTC [policies] Evaluate -> DEBU 10af Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.445 UTC [msp] DeserializeIdentity -> DEBU 10b1 Obtaining identity" +"2019-04-22 06:16:56.445 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.445 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.445 UTC [cauthdsl] func1 -> DEBU 10b7 0xc0028a8740 gate 1555913816445403800 evaluation starts" +"2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10b8 0xc0028a8740 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10b9 0xc0028a8740 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10ba 0xc0028a8740 principal matched by identity 0" +"2019-04-22 06:16:56.445 UTC [msp.identity] Verify -> DEBU 10bb Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +"2019-04-22 06:16:56.445 UTC [msp.identity] Verify -> DEBU 10bc Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +00000040 aa 36 98 36 42 e6 |.6.6B.|" +"2019-04-22 06:16:56.445 UTC [cauthdsl] func2 -> DEBU 10bd 0xc0028a8740 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.445 UTC [cauthdsl] func1 -> DEBU 10be 0xc0028a8740 gate 1555913816445403800 evaluation succeeds" +"2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.445 UTC [policies] Evaluate -> DEBU 10c1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.446 UTC [policies] Evaluate -> DEBU 10c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.446 UTC [gossip.gossip] handleMessage -> DEBU 10c3 Exiting" +"2019-04-22 06:16:56.446 UTC [gossip.gossip] handleMessage -> DEBU 10c4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.446 UTC [msp.identity] Verify -> DEBU 10c5 Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:56.446 UTC [msp.identity] Verify -> DEBU 10c6 Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:56.446 UTC [msp] DeserializeIdentity -> DEBU 10c7 Obtaining identity" +"2019-04-22 06:16:56.446 UTC [msp] DeserializeIdentity -> DEBU 10c8 Obtaining identity" +"2019-04-22 06:16:56.447 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10ca Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10cb Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.447 UTC [policies] Evaluate -> DEBU 10cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.447 UTC [policies] Evaluate -> DEBU 10cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.447 UTC [policies] Evaluate -> DEBU 10ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.447 UTC [cauthdsl] func1 -> DEBU 10cf 0xc0028bc870 gate 1555913816447314900 evaluation starts" +"2019-04-22 06:16:56.447 UTC [cauthdsl] func2 -> DEBU 10d0 0xc0028bc870 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.447 UTC [cauthdsl] func2 -> DEBU 10d1 0xc0028bc870 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.447 UTC [cauthdsl] func2 -> DEBU 10d2 0xc0028bc870 principal matched by identity 0" +"2019-04-22 06:16:56.447 UTC [msp.identity] Verify -> DEBU 10d3 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:56.448 UTC [msp.identity] Verify -> DEBU 10d4 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:56.448 UTC [cauthdsl] func2 -> DEBU 10d5 0xc0028bc870 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.448 UTC [cauthdsl] func1 -> DEBU 10d6 0xc0028bc870 gate 1555913816447314900 evaluation succeeds" +"2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.448 UTC [policies] Evaluate -> DEBU 10da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.449 UTC [msp.identity] Verify -> DEBU 10db Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +"2019-04-22 06:16:56.449 UTC [msp.identity] Verify -> DEBU 10dc Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +00000040 aa dd 99 2d 62 37 1c |...-b7.|" +"2019-04-22 06:16:56.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10dd Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10de Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func1 -> DEBU 10e2 0xc0028bdf70 gate 1555913816449573400 evaluation starts" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e3 0xc0028bdf70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e4 0xc0028bdf70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e5 0xc0028bdf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10e6 0xc0028bdf70 principal evaluation fails" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func1 -> DEBU 10e7 0xc0028bdf70 gate 1555913816449573400 evaluation fails" +"2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e8 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.449 UTC [policies] Evaluate -> DEBU 10ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func1 -> DEBU 10eb 0xc0028d07b0 gate 1555913816449930300 evaluation starts" +"2019-04-22 06:16:56.449 UTC [cauthdsl] func2 -> DEBU 10ec 0xc0028d07b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.450 UTC [cauthdsl] func2 -> DEBU 10ed 0xc0028d07b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.450 UTC [cauthdsl] func2 -> DEBU 10ee 0xc0028d07b0 principal matched by identity 0" +"2019-04-22 06:16:56.450 UTC [msp.identity] Verify -> DEBU 10ef Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +"2019-04-22 06:16:56.450 UTC [msp.identity] Verify -> DEBU 10f0 Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +00000040 aa dd 99 2d 62 37 1c |...-b7.|" +"2019-04-22 06:16:56.450 UTC [cauthdsl] func2 -> DEBU 10f1 0xc0028d07b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.450 UTC [cauthdsl] func1 -> DEBU 10f2 0xc0028d07b0 gate 1555913816449930300 evaluation succeeds" +"2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f3 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.450 UTC [policies] Evaluate -> DEBU 10f6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.450 UTC [gossip.gossip] handleMessage -> DEBU 10f7 Exiting" +"2019-04-22 06:16:56.450 UTC [gossip.gossip] handleMessage -> DEBU 10f8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.451 UTC [msp] DeserializeIdentity -> DEBU 10f9 Obtaining identity" +"2019-04-22 06:16:56.451 UTC [msp.identity] Verify -> DEBU 10fa Verify: digest = 00000000 60 59 12 1b 84 83 fc d2 73 25 d7 bf 52 c7 dd 1a |`Y......s%..R...| +00000010 b6 15 7e fa 82 b3 0e 9f 7a b9 71 ff 97 2d a4 f4 |..~.....z.q..-..|" +"2019-04-22 06:16:56.451 UTC [msp.identity] Verify -> DEBU 10fb Verify: sig = 00000000 30 45 02 21 00 d9 d6 5e 17 1c b1 be 10 58 55 c0 |0E.!...^.....XU.| +00000010 7d a4 a7 3c 2d 23 26 3a 68 15 55 f3 12 a5 b1 98 |}..<-#&:h.U.....| +00000020 2d 47 04 f9 c9 02 20 06 63 17 41 77 69 24 b4 a8 |-G.... .c.Awi$..| +00000030 dd 2e 86 7c 4f c6 80 37 e5 55 30 b9 87 87 32 83 |...|O..7.U0...2.| +00000040 cc d9 fe a5 bf 9f 6e |......n|" +"2019-04-22 06:16:56.451 UTC [msp] DeserializeIdentity -> DEBU 10fc Obtaining identity" +"2019-04-22 06:16:56.452 UTC [msp] DeserializeIdentity -> DEBU 10fd Obtaining identity" +"2019-04-22 06:16:56.452 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10ff Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1100 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.452 UTC [policies] Evaluate -> DEBU 1101 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.452 UTC [policies] Evaluate -> DEBU 1102 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.452 UTC [policies] Evaluate -> DEBU 1103 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.452 UTC [cauthdsl] func1 -> DEBU 1104 0xc0028e49e0 gate 1555913816452931900 evaluation starts" +"2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 1105 0xc0028e49e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 1106 0xc0028e49e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 1107 0xc0028e49e0 principal matched by identity 0" +"2019-04-22 06:16:56.453 UTC [msp.identity] Verify -> DEBU 1108 Verify: digest = 00000000 c1 4c e3 d3 05 0e 2d 37 82 92 c6 f7 70 43 b3 ab |.L....-7....pC..| +00000010 10 95 38 58 e4 ae e2 2e 7a 7c a4 47 b0 64 c6 af |..8X....z|.G.d..|" +"2019-04-22 06:16:56.453 UTC [msp.identity] Verify -> DEBU 1109 Verify: sig = 00000000 30 44 02 20 41 ac c8 f0 b0 44 93 9b c8 db e7 fa |0D. A....D......| +00000010 1c 71 25 03 25 76 64 65 c6 01 60 2b 69 9e 00 f6 |.q%.%vde..`+i...| +00000020 c5 af 82 1a 02 20 42 4e 7a 85 de 54 aa cc 8a 07 |..... BNz..T....| +00000030 cc 03 99 e0 02 ce 9d b8 df f4 14 ed ea b4 f4 6c |...............l| +00000040 c6 b2 69 37 7f 42 |..i7.B|" +"2019-04-22 06:16:56.453 UTC [cauthdsl] func2 -> DEBU 110a 0xc0028e49e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.453 UTC [cauthdsl] func1 -> DEBU 110b 0xc0028e49e0 gate 1555913816452931900 evaluation succeeds" +"2019-04-22 06:16:56.453 UTC [policies] Evaluate -> DEBU 110c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.453 UTC [policies] Evaluate -> DEBU 110d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.453 UTC [policies] Evaluate -> DEBU 110e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.454 UTC [policies] Evaluate -> DEBU 110f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.454 UTC [msp] DeserializeIdentity -> DEBU 1110 Obtaining identity" +"2019-04-22 06:16:56.454 UTC [msp] DeserializeIdentity -> DEBU 1111 Obtaining identity" +"2019-04-22 06:16:56.454 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1112 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1113 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1114 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.454 UTC [policies] Evaluate -> DEBU 1115 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.455 UTC [policies] Evaluate -> DEBU 1116 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.455 UTC [policies] Evaluate -> DEBU 1117 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.455 UTC [cauthdsl] func1 -> DEBU 1118 0xc0028f81b0 gate 1555913816455196300 evaluation starts" +"2019-04-22 06:16:56.455 UTC [cauthdsl] func2 -> DEBU 1119 0xc0028f81b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.455 UTC [cauthdsl] func2 -> DEBU 111a 0xc0028f81b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.455 UTC [cauthdsl] func2 -> DEBU 111b 0xc0028f81b0 principal matched by identity 0" +"2019-04-22 06:16:56.455 UTC [msp.identity] Verify -> DEBU 111c Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +"2019-04-22 06:16:56.456 UTC [msp.identity] Verify -> DEBU 111d Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +00000040 90 96 41 3c ce b6 f2 |..A<...|" +"2019-04-22 06:16:56.456 UTC [cauthdsl] func2 -> DEBU 111e 0xc0028f81b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.456 UTC [cauthdsl] func1 -> DEBU 111f 0xc0028f81b0 gate 1555913816455196300 evaluation succeeds" +"2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1120 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1121 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1122 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.456 UTC [policies] Evaluate -> DEBU 1123 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.456 UTC [msp] DeserializeIdentity -> DEBU 1124 Obtaining identity" +"2019-04-22 06:16:56.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1125 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1126 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.457 UTC [policies] Evaluate -> DEBU 1127 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.457 UTC [policies] Evaluate -> DEBU 1128 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.457 UTC [policies] Evaluate -> DEBU 1129 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.457 UTC [cauthdsl] func1 -> DEBU 112a 0xc0028f9290 gate 1555913816457352700 evaluation starts" +"2019-04-22 06:16:56.457 UTC [cauthdsl] func2 -> DEBU 112b 0xc0028f9290 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.457 UTC [cauthdsl] func2 -> DEBU 112c 0xc0028f9290 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.457 UTC [cauthdsl] func2 -> DEBU 112d 0xc0028f9290 principal matched by identity 0" +"2019-04-22 06:16:56.457 UTC [msp.identity] Verify -> DEBU 112e Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +"2019-04-22 06:16:56.457 UTC [msp.identity] Verify -> DEBU 112f Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +00000040 90 96 41 3c ce b6 f2 |..A<...|" +"2019-04-22 06:16:56.458 UTC [cauthdsl] func2 -> DEBU 1130 0xc0028f9290 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1131 Obtaining identity" +"2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1132 Obtaining identity" +"2019-04-22 06:16:56.459 UTC [gossip.pull] Hello -> DEBU 1133 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1134 Obtaining identity" +"2019-04-22 06:16:56.459 UTC [msp] DeserializeIdentity -> DEBU 1135 Obtaining identity" +"2019-04-22 06:16:56.460 UTC [gossip.comm] Send -> DEBU 1136 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:56.460 UTC [gossip.comm] sendToEndpoint -> DEBU 1137 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.460 UTC [gossip.comm] sendToEndpoint -> DEBU 1138 Exiting" +"2019-04-22 06:16:56.461 UTC [cauthdsl] func1 -> DEBU 1139 0xc0028f9290 gate 1555913816457352700 evaluation succeeds" +"2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.461 UTC [policies] Evaluate -> DEBU 113d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.461 UTC [gossip.gossip] handleMessage -> DEBU 113e Exiting" +"2019-04-22 06:16:56.462 UTC [gossip.gossip] handleMessage -> DEBU 113f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913814676416600 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.462 UTC [msp.identity] Verify -> DEBU 1140 Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +"2019-04-22 06:16:56.463 UTC [msp.identity] Verify -> DEBU 1141 Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +"2019-04-22 06:16:56.463 UTC [msp] DeserializeIdentity -> DEBU 1142 Obtaining identity" +"2019-04-22 06:16:56.463 UTC [gossip.gossip] handleMessage -> DEBU 1143 Exiting" +"2019-04-22 06:16:56.465 UTC [gossip.comm] func1 -> DEBU 1144 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2396584452137601230 , Msg_type: BLOCK_MSG, digests: [2 3 1], Envelope: 42 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.465 UTC [gossip.gossip] handleMessage -> DEBU 1145 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2396584452137601230 , Msg_type: BLOCK_MSG, digests: [2 3 1], Envelope: 42 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.465 UTC [gossip.pull] HandleMessage -> DEBU 1146 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2396584452137601230 , Msg_type: BLOCK_MSG, digests: [2 3 1], Envelope: 42 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.465 UTC [gossip.gossip] handleMessage -> DEBU 1147 Exiting" +"2019-04-22 06:16:56.470 UTC [gossip.election] waitForInterrupt -> DEBU 1148 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:16:56.470 UTC [gossip.election] IsLeader -> DEBU 1149 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:16:56.470 UTC [msp.identity] Sign -> DEBU 114a Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510041801 " +"2019-04-22 06:16:56.470 UTC [msp.identity] Sign -> DEBU 114b Sign: digest: BB3D8BEE5AD7904E6B8CF3C4A42A8011AABDE6B642BAAA695495B16EA497F873 " +"2019-04-22 06:16:56.470 UTC [gossip.election] waitForInterrupt -> DEBU 114c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 114d Obtaining identity" +"2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 114e Obtaining identity" +"2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 114f Obtaining identity" +"2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 1150 Obtaining identity" +"2019-04-22 06:16:56.471 UTC [gossip.comm] Send -> DEBU 1151 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 1152 Obtaining identity" +"2019-04-22 06:16:56.471 UTC [msp] DeserializeIdentity -> DEBU 1153 Obtaining identity" +"2019-04-22 06:16:56.472 UTC [gossip.comm] sendToEndpoint -> DEBU 1154 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:4 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.472 UTC [gossip.comm] sendToEndpoint -> DEBU 1155 Exiting" +"2019-04-22 06:16:56.626 UTC [gossip.comm] func1 -> DEBU 1156 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.626 UTC [gossip.gossip] handleMessage -> DEBU 1157 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.626 UTC [gossip.gossip] handleMessage -> DEBU 1158 Exiting" +"2019-04-22 06:16:56.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1159 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 115a Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:56.627 UTC [msp] DeserializeIdentity -> DEBU 115b Obtaining identity" +"2019-04-22 06:16:56.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 115c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 115e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.627 UTC [policies] Evaluate -> DEBU 115f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.627 UTC [policies] Evaluate -> DEBU 1160 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.627 UTC [policies] Evaluate -> DEBU 1161 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.628 UTC [cauthdsl] func1 -> DEBU 1162 0xc0037d40b0 gate 1555913816628109800 evaluation starts" +"2019-04-22 06:16:56.628 UTC [cauthdsl] func2 -> DEBU 1163 0xc0037d40b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.628 UTC [cauthdsl] func2 -> DEBU 1164 0xc0037d40b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.628 UTC [cauthdsl] func2 -> DEBU 1165 0xc0037d40b0 principal matched by identity 0" +"2019-04-22 06:16:56.628 UTC [msp.identity] Verify -> DEBU 1166 Verify: digest = 00000000 c8 84 d4 e1 f6 e0 9c 32 62 dc dd fc cd f2 29 97 |.......2b.....).| +00000010 26 18 c9 f8 f2 b1 e8 6a 90 73 ad 12 bf fa 02 8f |&......j.s......|" +"2019-04-22 06:16:56.628 UTC [msp.identity] Verify -> DEBU 1167 Verify: sig = 00000000 30 45 02 21 00 b5 dd 8a b7 98 47 38 01 b8 f0 e2 |0E.!......G8....| +00000010 14 05 ab 70 0b 6d 99 c9 4c 32 20 bd 87 7f 0c be |...p.m..L2 .....| +00000020 e1 5f 9f 97 1d 02 20 4b a2 0c 66 e5 75 55 4e cc |._.... K..f.uUN.| +00000030 93 dc ed c7 08 d9 3c df 4e e1 14 12 c2 6d 87 f6 |......<.N....m..| +00000040 b9 7e 35 61 c0 8d 31 |.~5a..1|" +"2019-04-22 06:16:56.629 UTC [cauthdsl] func2 -> DEBU 1168 0xc0037d40b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.629 UTC [cauthdsl] func1 -> DEBU 1169 0xc0037d40b0 gate 1555913816628109800 evaluation succeeds" +"2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.629 UTC [policies] Evaluate -> DEBU 116d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 116e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 116f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1170 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 " +"2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1171 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 " +"2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1172 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:56.630 UTC [gossip.discovery] learnExistingMembers -> DEBU 1173 Exiting" +"2019-04-22 06:16:56.630 UTC [gossip.discovery] handleAliveMessage -> DEBU 1174 Exiting" +"2019-04-22 06:16:56.630 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1175 Exiting" +"2019-04-22 06:16:56.634 UTC [msp] DeserializeIdentity -> DEBU 1176 Obtaining identity" +"2019-04-22 06:16:56.635 UTC [msp] DeserializeIdentity -> DEBU 1177 Obtaining identity" +"2019-04-22 06:16:56.635 UTC [msp] DeserializeIdentity -> DEBU 1178 Obtaining identity" +"2019-04-22 06:16:56.636 UTC [msp] DeserializeIdentity -> DEBU 1179 Obtaining identity" +"2019-04-22 06:16:56.636 UTC [msp] DeserializeIdentity -> DEBU 117a Obtaining identity" +"2019-04-22 06:16:56.637 UTC [msp] DeserializeIdentity -> DEBU 117b Obtaining identity" +"2019-04-22 06:16:56.637 UTC [gossip.comm] Send -> DEBU 117c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:56.637 UTC [msp] DeserializeIdentity -> DEBU 117d Obtaining identity" +"2019-04-22 06:16:56.638 UTC [msp] DeserializeIdentity -> DEBU 117e Obtaining identity" +"2019-04-22 06:16:56.638 UTC [gossip.comm] func1 -> DEBU 117f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.639 UTC [gossip.comm] Send -> DEBU 1180 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:16:56.639 UTC [gossip.comm] sendToEndpoint -> DEBU 1182 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.640 UTC [gossip.comm] sendToEndpoint -> DEBU 1183 Exiting" +"2019-04-22 06:16:56.639 UTC [gossip.gossip] handleMessage -> DEBU 1181 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.641 UTC [gossip.gossip] handleMessage -> DEBU 1184 Exiting" +"2019-04-22 06:16:56.641 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1185 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1186 Exiting" +"2019-04-22 06:16:56.646 UTC [gossip.gossip] handleMessage -> DEBU 1187 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.646 UTC [gossip.gossip] handleMessage -> DEBU 1189 Exiting" +"2019-04-22 06:16:56.646 UTC [gossip.comm] sendToEndpoint -> DEBU 1188 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.648 UTC [gossip.comm] sendToEndpoint -> DEBU 118b Exiting" +"2019-04-22 06:16:56.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118c Exiting" +"2019-04-22 06:16:56.684 UTC [gossip.comm] func1 -> DEBU 118d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.685 UTC [gossip.comm] func1 -> DEBU 118e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.685 UTC [gossip.gossip] handleMessage -> DEBU 118f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.686 UTC [msp] DeserializeIdentity -> DEBU 1190 Obtaining identity" +"2019-04-22 06:16:56.686 UTC [msp] DeserializeIdentity -> DEBU 1191 Obtaining identity" +"2019-04-22 06:16:56.686 UTC [gossip.gossip] handleMessage -> DEBU 1192 Exiting" +"2019-04-22 06:16:56.687 UTC [gossip.gossip] handleMessage -> DEBU 1193 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.687 UTC [gossip.pull] HandleMessage -> DEBU 1194 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.687 UTC [gossip.pull] SendDigest -> DEBU 1195 Sending BLOCK_MSG digest: [3 1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:56.688 UTC [gossip.gossip] handleMessage -> DEBU 1196 Exiting" +"2019-04-22 06:16:56.695 UTC [gossip.comm] func1 -> DEBU 1197 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.696 UTC [gossip.gossip] handleMessage -> DEBU 1198 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.696 UTC [msp.identity] Verify -> DEBU 1199 Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +"2019-04-22 06:16:56.697 UTC [msp.identity] Verify -> DEBU 119a Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +00000040 aa dd 99 2d 62 37 1c |...-b7.|" +"2019-04-22 06:16:56.698 UTC [gossip.gossip] handleMessage -> DEBU 119b Exiting" +"2019-04-22 06:16:56.700 UTC [gossip.gossip] handleMessage -> DEBU 119c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.700 UTC [msp.identity] Verify -> DEBU 119d Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +"2019-04-22 06:16:56.700 UTC [msp.identity] Verify -> DEBU 119e Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +00000040 aa dd 99 2d 62 37 1c |...-b7.|" +"2019-04-22 06:16:56.701 UTC [msp] DeserializeIdentity -> DEBU 119f Obtaining identity" +"2019-04-22 06:16:56.701 UTC [gossip.gossip] handleMessage -> DEBU 11a0 Exiting" +"2019-04-22 06:16:56.704 UTC [gossip.comm] func1 -> DEBU 11a1 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.705 UTC [gossip.gossip] handleMessage -> DEBU 11a2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913814632084900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:56.705 UTC [msp.identity] Verify -> DEBU 11a3 Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +"2019-04-22 06:16:56.705 UTC [msp.identity] Verify -> DEBU 11a4 Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +00000040 aa dd 99 2d 62 37 1c |...-b7.|" +"2019-04-22 06:16:56.706 UTC [msp] DeserializeIdentity -> DEBU 11a5 Obtaining identity" +"2019-04-22 06:16:56.706 UTC [gossip.gossip] handleMessage -> DEBU 11a6 Exiting" +"2019-04-22 06:16:56.908 UTC [gossip.gossip] handleMessage -> DEBU 11a7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:56.908 UTC [msp] DeserializeIdentity -> DEBU 11a8 Obtaining identity" +"2019-04-22 06:16:56.909 UTC [msp] DeserializeIdentity -> DEBU 11a9 Obtaining identity" +"2019-04-22 06:16:56.909 UTC [msp] DeserializeIdentity -> DEBU 11aa Obtaining identity" +"2019-04-22 06:16:56.910 UTC [gossip.gossip] handleMessage -> DEBU 11ab Exiting" +"2019-04-22 06:16:56.914 UTC [gossip.gossip] handleMessage -> DEBU 11ac Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913814637443300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:56.914 UTC [msp] DeserializeIdentity -> DEBU 11ad Obtaining identity" +"2019-04-22 06:16:56.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11ae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11af Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11b0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.916 UTC [policies] Evaluate -> DEBU 11b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.917 UTC [policies] Evaluate -> DEBU 11b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.917 UTC [policies] Evaluate -> DEBU 11b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.917 UTC [cauthdsl] func1 -> DEBU 11b4 0xc00382aed0 gate 1555913816917295900 evaluation starts" +"2019-04-22 06:16:56.917 UTC [cauthdsl] func2 -> DEBU 11b5 0xc00382aed0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.917 UTC [cauthdsl] func2 -> DEBU 11b6 0xc00382aed0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.918 UTC [cauthdsl] func2 -> DEBU 11b7 0xc00382aed0 principal matched by identity 0" +"2019-04-22 06:16:56.919 UTC [msp.identity] Verify -> DEBU 11b8 Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +"2019-04-22 06:16:56.919 UTC [msp.identity] Verify -> DEBU 11b9 Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +00000040 aa 36 98 36 42 e6 |.6.6B.|" +"2019-04-22 06:16:56.919 UTC [cauthdsl] func2 -> DEBU 11ba 0xc00382aed0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.919 UTC [cauthdsl] func1 -> DEBU 11bb 0xc00382aed0 gate 1555913816917295900 evaluation succeeds" +"2019-04-22 06:16:56.919 UTC [policies] Evaluate -> DEBU 11bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.919 UTC [policies] Evaluate -> DEBU 11bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.920 UTC [policies] Evaluate -> DEBU 11be Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.920 UTC [policies] Evaluate -> DEBU 11bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.920 UTC [msp] DeserializeIdentity -> DEBU 11c0 Obtaining identity" +"2019-04-22 06:16:56.920 UTC [gossip.gossip] handleMessage -> DEBU 11c1 Exiting" +"2019-04-22 06:16:56.925 UTC [gossip.comm] func1 -> DEBU 11c2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913814637443300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:56.925 UTC [gossip.gossip] handleMessage -> DEBU 11c3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913814637443300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:4 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:16:56.925 UTC [msp] DeserializeIdentity -> DEBU 11c4 Obtaining identity" +"2019-04-22 06:16:56.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11c5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:56.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11c7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:56.926 UTC [policies] Evaluate -> DEBU 11c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:56.926 UTC [policies] Evaluate -> DEBU 11c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:56.926 UTC [policies] Evaluate -> DEBU 11ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:56.926 UTC [cauthdsl] func1 -> DEBU 11cb 0xc00384c4b0 gate 1555913816926654100 evaluation starts" +"2019-04-22 06:16:56.926 UTC [cauthdsl] func2 -> DEBU 11cc 0xc00384c4b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:56.926 UTC [cauthdsl] func2 -> DEBU 11cd 0xc00384c4b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:56.927 UTC [cauthdsl] func2 -> DEBU 11ce 0xc00384c4b0 principal matched by identity 0" +"2019-04-22 06:16:56.927 UTC [msp.identity] Verify -> DEBU 11cf Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +"2019-04-22 06:16:56.927 UTC [msp.identity] Verify -> DEBU 11d0 Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +00000040 aa 36 98 36 42 e6 |.6.6B.|" +"2019-04-22 06:16:56.927 UTC [cauthdsl] func2 -> DEBU 11d1 0xc00384c4b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:56.927 UTC [cauthdsl] func1 -> DEBU 11d2 0xc00384c4b0 gate 1555913816926654100 evaluation succeeds" +"2019-04-22 06:16:56.927 UTC [policies] Evaluate -> DEBU 11d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.927 UTC [policies] Evaluate -> DEBU 11d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:56.928 UTC [policies] Evaluate -> DEBU 11d5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:56.928 UTC [policies] Evaluate -> DEBU 11d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:56.928 UTC [msp] DeserializeIdentity -> DEBU 11d7 Obtaining identity" +"2019-04-22 06:16:56.928 UTC [gossip.gossip] handleMessage -> DEBU 11d8 Exiting" +"2019-04-22 06:16:57.045 UTC [gossip.gossip] handleMessage -> DEBU 11d9 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.046 UTC [gossip.gossip] handleMessage -> DEBU 11da Exiting" +"2019-04-22 06:16:57.046 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11db Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.046 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11dc Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:16:57.047 UTC [msp] DeserializeIdentity -> DEBU 11dd Obtaining identity" +"2019-04-22 06:16:57.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11de Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:57.048 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11df Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:57.048 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11e0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:57.048 UTC [policies] Evaluate -> DEBU 11e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:57.048 UTC [policies] Evaluate -> DEBU 11e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:57.048 UTC [policies] Evaluate -> DEBU 11e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:57.049 UTC [cauthdsl] func1 -> DEBU 11e4 0xc00385c250 gate 1555913817049159500 evaluation starts" +"2019-04-22 06:16:57.049 UTC [cauthdsl] func2 -> DEBU 11e5 0xc00385c250 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:57.049 UTC [cauthdsl] func2 -> DEBU 11e6 0xc00385c250 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:57.049 UTC [cauthdsl] func2 -> DEBU 11e7 0xc00385c250 principal matched by identity 0" +"2019-04-22 06:16:57.050 UTC [msp.identity] Verify -> DEBU 11e8 Verify: digest = 00000000 69 7b de cc 65 26 f4 6e 15 c9 12 47 ac 1d da 72 |i{..e&.n...G...r| +00000010 54 0c 8f 86 5b 2d b4 f3 46 33 e6 20 ce 6b 21 b4 |T...[-..F3. .k!.|" +"2019-04-22 06:16:57.050 UTC [msp.identity] Verify -> DEBU 11e9 Verify: sig = 00000000 30 44 02 20 33 c4 3e f1 89 54 d2 40 b6 9a 20 e1 |0D. 3.>..T.@.. .| +00000010 e7 4f f0 3f 9e 52 8f 01 77 c4 da 3b 9f ed f3 73 |.O.?.R..w..;...s| +00000020 b1 16 f4 99 02 20 0a 0a 1d 39 6e 24 3d 44 7b 14 |..... ...9n$=D{.| +00000030 ab 0b 2a 8f f8 53 d0 58 5e 3c 3e 06 c8 75 06 62 |..*..S.X^<>..u.b| +00000040 66 9c 54 a7 ff 03 |f.T...|" +"2019-04-22 06:16:57.050 UTC [cauthdsl] func2 -> DEBU 11ea 0xc00385c250 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:57.050 UTC [cauthdsl] func1 -> DEBU 11eb 0xc00385c250 gate 1555913817049159500 evaluation succeeds" +"2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ee Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:57.051 UTC [policies] Evaluate -> DEBU 11ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:57.052 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.053 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:16:57.054 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f3 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 " +"2019-04-22 06:16:57.053 UTC [gossip.comm] func1 -> DEBU 11f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.054 UTC [gossip.gossip] handleMessage -> DEBU 11f4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f5 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 " +"2019-04-22 06:16:57.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:21 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:57.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 11f7 Exiting" +"2019-04-22 06:16:57.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 11f8 Exiting" +"2019-04-22 06:16:57.056 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11f9 Exiting" +"2019-04-22 06:16:57.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11fb Exiting" +"2019-04-22 06:16:57.057 UTC [gossip.gossip] handleMessage -> DEBU 11fc Exiting" +"2019-04-22 06:16:57.059 UTC [gossip.comm] func1 -> DEBU 11fd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.060 UTC [gossip.gossip] handleMessage -> DEBU 11fe Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.060 UTC [gossip.gossip] handleMessage -> DEBU 11ff Exiting" +"2019-04-22 06:16:57.060 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1200 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.061 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1201 Exiting" +"2019-04-22 06:16:57.062 UTC [msp] DeserializeIdentity -> DEBU 1202 Obtaining identity" +"2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1203 Obtaining identity" +"2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1204 Obtaining identity" +"2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1205 Obtaining identity" +"2019-04-22 06:16:57.063 UTC [msp] DeserializeIdentity -> DEBU 1206 Obtaining identity" +"2019-04-22 06:16:57.064 UTC [msp] DeserializeIdentity -> DEBU 1207 Obtaining identity" +"2019-04-22 06:16:57.064 UTC [msp] DeserializeIdentity -> DEBU 1208 Obtaining identity" +"2019-04-22 06:16:57.064 UTC [gossip.comm] Send -> DEBU 1209 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:57.064 UTC [msp] DeserializeIdentity -> DEBU 120a Obtaining identity" +"2019-04-22 06:16:57.065 UTC [gossip.comm] Send -> DEBU 120b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:16:57.065 UTC [gossip.comm] sendToEndpoint -> DEBU 120c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.065 UTC [gossip.comm] sendToEndpoint -> DEBU 120d Exiting" +"2019-04-22 06:16:57.065 UTC [gossip.comm] sendToEndpoint -> DEBU 120e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:57.066 UTC [gossip.comm] sendToEndpoint -> DEBU 120f Exiting" +"2019-04-22 06:16:57.123 UTC [gossip.comm] func1 -> DEBU 1210 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:57.124 UTC [gossip.gossip] handleMessage -> DEBU 1211 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:16:57.124 UTC [msp] DeserializeIdentity -> DEBU 1212 Obtaining identity" +"2019-04-22 06:16:57.124 UTC [msp] DeserializeIdentity -> DEBU 1213 Obtaining identity" +"2019-04-22 06:16:57.124 UTC [msp] DeserializeIdentity -> DEBU 1214 Obtaining identity" +"2019-04-22 06:16:57.125 UTC [gossip.gossip] handleMessage -> DEBU 1215 Exiting" +"2019-04-22 06:16:57.141 UTC [gossip.comm] func1 -> DEBU 1216 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913814645849600 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:57.143 UTC [gossip.gossip] handleMessage -> DEBU 1217 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913814645849600 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:4 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:16:57.155 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1218 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:57.158 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1219 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:57.158 UTC [policies] Evaluate -> DEBU 121a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:16:57.159 UTC [policies] Evaluate -> DEBU 121b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:57.162 UTC [policies] Evaluate -> DEBU 121c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:16:57.162 UTC [cauthdsl] func1 -> DEBU 121d 0xc003871980 gate 1555913817162648800 evaluation starts" +"2019-04-22 06:16:57.163 UTC [cauthdsl] func2 -> DEBU 121e 0xc003871980 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:57.164 UTC [cauthdsl] func2 -> DEBU 1220 0xc003871980 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:57.166 UTC [cauthdsl] func2 -> DEBU 1221 0xc003871980 principal matched by identity 0" +"2019-04-22 06:16:57.146 UTC [msp] DeserializeIdentity -> DEBU 121f Obtaining identity" +"2019-04-22 06:16:57.168 UTC [msp.identity] Verify -> DEBU 1222 Verify: digest = 00000000 7a 39 d2 60 f2 de c3 02 b6 04 56 87 72 23 cd 5d |z9.`......V.r#.]| +00000010 32 ed 4b 0f 64 54 8e 9e 15 b3 78 3d 92 54 eb a5 |2.K.dT....x=.T..|" +"2019-04-22 06:16:57.169 UTC [msp.identity] Verify -> DEBU 1223 Verify: sig = 00000000 30 44 02 20 3b a3 fd e3 68 22 3e ed f5 47 29 61 |0D. ;...h">..G)a| +00000010 c5 bf 1b 15 56 21 a5 54 59 46 bc 30 4d 3b fe f0 |....V!.TYF.0M;..| +00000020 d7 d6 d1 97 02 20 12 2e ab d0 9d f7 a3 42 e3 e4 |..... .......B..| +00000030 8b 88 2f d8 2c 21 82 c4 65 be 28 ad 20 83 71 63 |../.,!..e.(. .qc| +00000040 f8 92 7c fb b0 7f |..|...|" +"2019-04-22 06:16:57.171 UTC [cauthdsl] func2 -> DEBU 1224 0xc003871980 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:57.172 UTC [cauthdsl] func1 -> DEBU 1225 0xc003871980 gate 1555913817162648800 evaluation succeeds" +"2019-04-22 06:16:57.173 UTC [policies] Evaluate -> DEBU 1226 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:57.173 UTC [policies] Evaluate -> DEBU 1228 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:16:57.169 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1227 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:57.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 122a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:57.173 UTC [policies] Evaluate -> DEBU 1229 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:57.175 UTC [policies] Evaluate -> DEBU 122b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:16:57.176 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 122c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:57.176 UTC [blocksProvider] DeliverBlocks -> DEBU 122d [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-04-22 06:16:57.176 UTC [gossip.state] addPayload -> DEBU 122e [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-04-22 06:16:57.176 UTC [policies] Evaluate -> DEBU 122f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:57.177 UTC [policies] Evaluate -> DEBU 1232 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:57.177 UTC [gossip.state] addPayload -> DEBU 1230 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:16:57.179 UTC [blocksProvider] DeliverBlocks -> DEBU 1233 [businesschannel] Gossiping block [4], peers number [3]" +"2019-04-22 06:16:57.179 UTC [gossip.channel] AddToMsgStore -> DEBU 1235 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:16:57.179 UTC [gossip.pull] Add -> DEBU 1236 Added 4, total items: 4" +"2019-04-22 06:16:57.177 UTC [gossip.state] deliverPayloads -> DEBU 1231 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +"2019-04-22 06:16:57.179 UTC [gossip.state] deliverPayloads -> DEBU 1237 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +"2019-04-22 06:16:57.179 UTC [gossip.privdata] StoreBlock -> INFO 1238 [businesschannel] Received block [4] from buffer" +"2019-04-22 06:16:57.179 UTC [gossip.privdata] StoreBlock -> DEBU 1239 [businesschannel] Validating block [4]" +"2019-04-22 06:16:57.180 UTC [committer.txvalidator] Validate -> DEBU 123a [businesschannel] START Block Validation for block [4]" +"2019-04-22 06:16:57.177 UTC [policies] Evaluate -> DEBU 1234 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:57.180 UTC [committer.txvalidator] Validate -> DEBU 123b expecting 1 block validation responses" +"2019-04-22 06:16:57.181 UTC [cauthdsl] func1 -> DEBU 123c 0xc003881280 gate 1555913817180978800 evaluation starts" +"2019-04-22 06:16:57.181 UTC [committer.txvalidator] validateTx -> DEBU 123d [businesschannel] validateTx starts for block 0xc003183bc0 env 0xc003884410 txn 0" +"2019-04-22 06:16:57.181 UTC [protoutils] ValidateTransaction -> DEBU 123e ValidateTransactionEnvelope starts for envelope 0xc003884410" +"2019-04-22 06:16:57.181 UTC [cauthdsl] func2 -> DEBU 123f 0xc003881280 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:57.183 UTC [protoutils] ValidateTransaction -> DEBU 1240 Header is channel_header:"\010\003\032\013\010\327\270\365\345\005\020\230\335\243)\"\017businesschannel*@5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb\nr69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk\nRJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI\nzj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\337\232P\360\000\t\276c\177\320\225\036t\357\376%\277\320\335\354\315\364u" " +"2019-04-22 06:16:57.183 UTC [protoutils] validateChannelHeader -> DEBU 1241 validateChannelHeader info: header type 3" +"2019-04-22 06:16:57.186 UTC [protoutils] checkSignatureFromCreator -> DEBU 1242 begin" +"2019-04-22 06:16:57.183 UTC [cauthdsl] func2 -> DEBU 1243 0xc003881280 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:57.187 UTC [msp] GetManagerForChain -> DEBU 1244 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:57.190 UTC [msp] DeserializeIdentity -> DEBU 1245 Obtaining identity" +"2019-04-22 06:16:57.190 UTC [msp.identity] newIdentity -> DEBU 1246 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:16:57.191 UTC [protoutils] checkSignatureFromCreator -> DEBU 1247 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-04-22 06:16:57.191 UTC [msp] Validate -> DEBU 1248 MSP Org2MSP validating identity" +"2019-04-22 06:16:57.192 UTC [msp] getCertificationChain -> DEBU 1249 MSP Org2MSP getting certification chain" +"2019-04-22 06:16:57.192 UTC [protoutils] checkSignatureFromCreator -> DEBU 124a creator is valid" +"2019-04-22 06:16:57.192 UTC [msp.identity] Verify -> DEBU 124b Verify: digest = 00000000 9a e4 d0 0f d4 55 79 7d d5 a1 3f 48 f4 6a cd 96 |.....Uy}..?H.j..| +00000010 d4 d3 0b 7e 9e 3a d1 94 33 3d 05 87 b1 87 f6 ce |...~.:..3=......|" +"2019-04-22 06:16:57.193 UTC [msp.identity] Verify -> DEBU 124c Verify: sig = 00000000 30 44 02 20 26 57 c8 26 3a a7 0a af 07 00 5a 93 |0D. &W.&:.....Z.| +00000010 83 76 3e 2b db a9 a0 07 8b ab e8 66 e5 cf 97 a4 |.v>+.......f....| +00000020 be 1f 68 54 02 20 0e c2 b7 75 b5 33 90 08 33 a7 |..hT. ...u.3..3.| +00000030 e7 a4 cc b5 60 44 4a 87 4b ae b8 87 82 29 c8 94 |....`DJ.K....)..| +00000040 6b 45 2b 9b c0 82 |kE+...|" +"2019-04-22 06:16:57.194 UTC [protoutils] checkSignatureFromCreator -> DEBU 124d exits successfully" +"2019-04-22 06:16:57.195 UTC [protoutils] validateEndorserTransaction -> DEBU 124e validateEndorserTransaction starts for data 0xc00385b500, header channel_header:"\010\003\032\013\010\327\270\365\345\005\020\230\335\243)\"\017businesschannel*@5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030\030\337\232P\360\000\t\276c\177\320\225\036t\357\376%\277\320\335\354\315\364u" " +"2019-04-22 06:16:57.195 UTC [protoutils] validateEndorserTransaction -> DEBU 124f validateEndorserTransaction info: there are 1 actions" +"2019-04-22 06:16:57.195 UTC [protoutils] validateEndorserTransaction -> DEBU 1250 validateEndorserTransaction info: signature header is valid" +"2019-04-22 06:16:57.196 UTC [protoutils] ValidateTransaction -> DEBU 1251 ValidateTransactionEnvelope returns err %!s()" +"2019-04-22 06:16:57.196 UTC [committer.txvalidator] validateTx -> DEBU 1252 Transaction is for channel businesschannel" +"2019-04-22 06:16:57.196 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1253 retrieveTransactionByID() - txId = [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91]" +"2019-04-22 06:16:57.197 UTC [committer.txvalidator] validateTx -> DEBU 1254 Validating transaction with plugins" +"2019-04-22 06:16:57.197 UTC [committer.txvalidator] Dispatch -> DEBU 1255 [businesschannel] Dispatch starts for bytes 0xc0038a0000" +"2019-04-22 06:16:57.198 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1256 constructing new query executor txid = [ae8e659e-85a2-4fbb-8d15-ed56bccc3cd5]" +"2019-04-22 06:16:57.198 UTC [cauthdsl] func2 -> DEBU 1257 0xc003881280 principal matched by identity 0" +"2019-04-22 06:16:57.198 UTC [lockbasedtxmgr] Done -> DEBU 1258 Done with transaction simulation / query execution [ae8e659e-85a2-4fbb-8d15-ed56bccc3cd5]" +"2019-04-22 06:16:57.200 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 125b Validating Tx 5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +"2019-04-22 06:16:57.199 UTC [msp.identity] Verify -> DEBU 1259 Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +"2019-04-22 06:16:57.200 UTC [msp.identity] Verify -> DEBU 125c Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +00000040 90 96 41 3c ce b6 f2 |..A<...|" +"2019-04-22 06:16:57.200 UTC [cauthdsl] func2 -> DEBU 125d 0xc003881280 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:57.200 UTC [cauthdsl] func1 -> DEBU 125e 0xc003881280 gate 1555913817180978800 evaluation succeeds" +"2019-04-22 06:16:57.201 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 125f constructing new query executor txid = [bb8625b6-fe7e-4f35-a7b4-b481873af063]" +"2019-04-22 06:16:57.201 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1260 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:57.200 UTC [policies] Evaluate -> DEBU 1261 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:57.201 UTC [policies] Evaluate -> DEBU 1262 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1264 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] Done -> DEBU 1265 Done with transaction simulation / query execution [bb8625b6-fe7e-4f35-a7b4-b481873af063]" +"2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1266 constructing new query executor txid = [afacacc2-75d7-4cd3-a124-d1759f46e168]" +"2019-04-22 06:16:57.201 UTC [policies] Evaluate -> DEBU 1263 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:57.202 UTC [policies] Evaluate -> DEBU 1267 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:57.202 UTC [msp] DeserializeIdentity -> DEBU 1268 Obtaining identity" +"2019-04-22 06:16:57.202 UTC [lockbasedtxmgr] Done -> DEBU 1269 Done with transaction simulation / query execution [afacacc2-75d7-4cd3-a124-d1759f46e168]" +"2019-04-22 06:16:57.202 UTC [gossip.gossip] handleMessage -> DEBU 126a Exiting" +"2019-04-22 06:16:57.199 UTC [msp] DeserializeIdentity -> DEBU 125a Obtaining identity" +"2019-04-22 06:16:57.202 UTC [msp] DeserializeIdentity -> DEBU 126b Obtaining identity" +"2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 126c Obtaining identity" +"2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 126d Obtaining identity" +"2019-04-22 06:16:57.203 UTC [gossip.comm] Send -> DEBU 126e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 126f Obtaining identity" +"2019-04-22 06:16:57.203 UTC [msp] DeserializeIdentity -> DEBU 1270 Obtaining identity" +"2019-04-22 06:16:57.203 UTC [gossip.comm] sendToEndpoint -> DEBU 1271 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4721 bytes, seq: 4}, Envelope: 4751 bytes, Signature: 0 bytes" +"2019-04-22 06:16:57.203 UTC [gossip.comm] sendToEndpoint -> DEBU 1272 Exiting" +"2019-04-22 06:16:57.202 UTC [policies] Evaluate -> DEBU 1273 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +"2019-04-22 06:16:57.215 UTC [cauthdsl] func1 -> DEBU 1274 0xc0038b3600 gate 1555913817215207800 evaluation starts" +"2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 1275 0xc0038b3600 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 1276 0xc0038b3600 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 1277 0xc0038b3600 principal matched by identity 0" +"2019-04-22 06:16:57.215 UTC [msp.identity] Verify -> DEBU 1278 Verify: digest = 00000000 46 78 20 3b fe 4f b3 b0 68 88 2a c3 00 e9 e1 82 |Fx ;.O..h.*.....| +00000010 36 cd 23 85 3e c0 23 e0 47 9b 00 bd 35 a1 7c 35 |6.#.>.#.G...5.|5|" +"2019-04-22 06:16:57.215 UTC [msp.identity] Verify -> DEBU 1279 Verify: sig = 00000000 30 45 02 21 00 97 43 40 a6 e5 90 ed 17 6b 31 4c |0E.!..C@.....k1L| +00000010 4c 6e 55 53 12 b3 bd 69 94 db 83 15 96 de 99 3e |LnUS...i.......>| +00000020 3a ef e2 91 6a 02 20 2b be 78 18 5a 60 f5 9a 70 |:...j. +.x.Z`..p| +00000030 59 f7 6f bf 3d 48 fb 42 bc 7f 83 5d d1 43 e8 27 |Y.o.=H.B...].C.'| +00000040 fc bd 8d 7a 5f 9f f1 |...z_..|" +"2019-04-22 06:16:57.215 UTC [cauthdsl] func2 -> DEBU 127a 0xc0038b3600 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:57.215 UTC [cauthdsl] func1 -> DEBU 127b 0xc0038b3600 gate 1555913817215207800 evaluation succeeds" +"2019-04-22 06:16:57.215 UTC [policies] Evaluate -> DEBU 127c Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:57.215 UTC [policies] Evaluate -> DEBU 127d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:16:57.215 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 127e constructing new query executor txid = [fd34dba8-8dce-4119-83f6-fbfc7e7bd410]" +"2019-04-22 06:16:57.215 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 127f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1280 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 1281 Done with transaction simulation / query execution [fd34dba8-8dce-4119-83f6-fbfc7e7bd410]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1282 constructing new query executor txid = [436302e7-ba38-4ef5-a2e1-b3103188329d]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1283 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1284 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 1285 Done with transaction simulation / query execution [436302e7-ba38-4ef5-a2e1-b3103188329d]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1286 constructing new query executor txid = [df039e15-7596-453f-abc6-2b863c1bd165]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1287 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1288 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 1289 Done with transaction simulation / query execution [df039e15-7596-453f-abc6-2b863c1bd165]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 128a constructing new query executor txid = [445870ef-c3fd-4273-b8f4-46af4ec2be49]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128b retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128c retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] Done -> DEBU 128d Done with transaction simulation / query execution [445870ef-c3fd-4273-b8f4-46af4ec2be49]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 128e constructing new query executor txid = [d0865e4b-f5cd-4f70-bc31-c770d0a01e69]" +"2019-04-22 06:16:57.216 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 128f retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:57.217 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 1290 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:57.217 UTC [lockbasedtxmgr] Done -> DEBU 1291 Done with transaction simulation / query execution [d0865e4b-f5cd-4f70-bc31-c770d0a01e69]" +"2019-04-22 06:16:57.217 UTC [vscc] Validate -> DEBU 1292 block 4, namespace: _lifecycle, tx 0 validation results is: " +"2019-04-22 06:16:57.217 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1293 Transaction 5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91 appears to be valid" +"2019-04-22 06:16:57.217 UTC [committer.txvalidator] Dispatch -> DEBU 1294 [businesschannel] Dispatch completes env bytes 0xc0038a0000" +"2019-04-22 06:16:57.217 UTC [committer.txvalidator] validateTx -> DEBU 1295 [businesschannel] validateTx completes for block 0xc003183bc0 env 0xc003884410 txn 0" +"2019-04-22 06:16:57.217 UTC [committer.txvalidator] Validate -> DEBU 1296 got result for idx 0, code 0" +"2019-04-22 06:16:57.218 UTC [committer.txvalidator] Validate -> INFO 1297 [businesschannel] Validated block [4] in 37ms" +"2019-04-22 06:16:57.218 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1298 constructing new query executor txid = [381b10b1-5ff1-4f50-b7ed-5d902cfb2879]" +"2019-04-22 06:16:57.219 UTC [lockbasedtxmgr] Done -> DEBU 1299 Done with transaction simulation / query execution [381b10b1-5ff1-4f50-b7ed-5d902cfb2879]" +"2019-04-22 06:16:57.219 UTC [msp] GetManagerForChain -> DEBU 129a Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:57.219 UTC [cauthdsl] func1 -> DEBU 129b 0xc0038ebbc0 gate 1555913817219826800 evaluation starts" +"2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129c 0xc0038ebbc0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129d 0xc0038ebbc0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129e 0xc0038ebbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:57.220 UTC [cauthdsl] func2 -> DEBU 129f 0xc0038ebbc0 principal evaluation fails" +"2019-04-22 06:16:57.220 UTC [cauthdsl] func1 -> DEBU 12a0 0xc0038ebbc0 gate 1555913817219826800 evaluation fails" +"2019-04-22 06:16:57.220 UTC [gossip.privdata] isEligible -> DEBU 12a1 Skipping namespace _lifecycle collection _implicit_org_Org2MSP because we're not eligible for the private data" +"2019-04-22 06:16:57.220 UTC [gossip.privdata] inspectTransaction -> DEBU 12a2 Peer is not eligible for collection, channel [businesschannel], chaincode [_lifecycle], collection name [_implicit_org_Org2MSP], txID [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] the policy is [&privdata.SimpleCollection{name:"_implicit_org_Org2MSP", accessPolicy:(*cauthdsl.policy)(0xc0038edfe0), memberOrgs:[]string{"Org2MSP"}, conf:common.StaticCollectionConfig{Name:"_implicit_org_Org2MSP", MemberOrgsPolicy:(*common.CollectionPolicyConfig)(0xc0038f8ae0), RequiredPeerCount:0, MaximumPeerCount:0, BlockToLive:0x0, MemberOnlyRead:false, MemberOnlyWrite:false, XXX_NoUnkeyedLiteral:struct {}{}, XXX_unrecognized:[]uint8(nil), XXX_sizecache:0}}]. Skipping." +"2019-04-22 06:16:57.220 UTC [gossip.privdata] listMissingPrivateData -> DEBU 12a3 Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:16:57.220 UTC [gossip.privdata] StoreBlock -> DEBU 12a4 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:16:57.221 UTC [kvledger] CommitWithPvtData -> DEBU 12a5 [businesschannel] Validating state for block [4]" +"2019-04-22 06:16:57.221 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12a6 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:16:57.221 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12a7 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:16:57.221 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 12a8 Validating new block with num trans = [1]" +"2019-04-22 06:16:57.221 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12a9 ValidateAndPrepareBatch() for block number = [4]" +"2019-04-22 06:16:57.221 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12aa preprocessing ProtoBlock..." +"2019-04-22 06:16:57.221 UTC [valimpl] preprocessProtoBlock -> DEBU 12ab txType=ENDORSER_TRANSACTION" +"2019-04-22 06:16:57.222 UTC [stateleveldb] GetState -> DEBU 12ac GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:16:57.222 UTC [statebasedval] validateKVRead -> DEBU 12ad Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-04-22 06:16:57.222 UTC [stateleveldb] GetState -> DEBU 12ae GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-04-22 06:16:57.222 UTC [stateleveldb] GetState -> DEBU 12af GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:16:57.222 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 12b0 Block [4] Transaction index [0] TxId [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-04-22 06:16:57.222 UTC [valinternal] ApplyWriteSet -> DEBU 12b1 txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe2\xees5(e\xa8!\xb9,\xe6uݳg\x13\xf2\xb3\x8cn\xbe\x94\xfe,A\xfe=,\xa6V\xb9'"}:(*internal.keyOps)(0xc0038cb8c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\x194SNrˤ\xbe\xdf\x01s\x9dp\xdd\x15\xc3\xca\xf1oy\xd9\x02\x99&\xbd\xcct\x9d\xaeZM4"}:(*internal.keyOps)(0xc0038cb900), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xf6\xdc\xd0h\x9a-\xbb\x81\xcei\x88u\xd7E\x85\xf3\xdf\xf1^\xb0\x06kꞐ\x9d\x80\x95\x85\xcc\x13\xa9"}:(*internal.keyOps)(0xc0038cb940), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xe5\x92\x1f\x81R\xdf\xf6\x8c\x18l\xa4{\"+\x88\x12\x98\x93#b\xed\v\x1f\xf1\x13\x15\xeeT\xb5H\x8f\xc4W\x05on\x19\xdf"}:(*internal.keyOps)(0xc0038cb9c0), internal.compositeKey{ns:"_lifecycle", coll:"_implicit_org_Org2MSP", key:"\xd1\t\x1f\b\xa7\x0f\xaa=\x95Y\\\x03\xa6\xd6}\x83J=\xdbM\x1c#\x1cd\x8a\r\xf8\x82\xbfԺ\xd6"}:(*internal.keyOps)(0xc0038cb880)}" +"2019-04-22 06:16:57.222 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b2 validating rwset..." +"2019-04-22 06:16:57.222 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b3 postprocessing ProtoBlock..." +"2019-04-22 06:16:57.222 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 12b4 ValidateAndPrepareBatch() complete" +"2019-04-22 06:16:57.222 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12b5 Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[] map[]})] %!s(*lifecycle.Resources=&{0x24ce6a0 0xc000413c00 0x25df440 0xc00000e380}) Org1MSP {{%!s(int32=0) %!s(uint32=0)} %!s(uint32=0) %!s(uint32=0) %!s(int32=0) %!s(int32=0)} map[�,O��z���q�{��:�1oS'�w? ���j��:%!s(*lifecycle.LocalChaincode=&{0xc0025e9880 map[]})]}" +"2019-04-22 06:16:57.222 UTC [cceventmgmt] HandleStateUpdates -> DEBU 12b6 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite(nil)}" +"2019-04-22 06:16:57.222 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 12b7 Channel [businesschannel]: Handling chaincode deploy event for chaincode [[]]" +"2019-04-22 06:16:57.222 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12b8 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440})}" +"2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12b9 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 83 170 140 173 163 251 80 149 96 210 221 94 183 62 19 157 250 115 43 249 173 224 186 3 250 95 126 110 189 166 49 57 2 32 114 246 129 162 164 229 222 122 103 218 14 36 179 42 12 169 194 151 81 96 101 122 194 28 168 50 204 94 230 88 39 177]} 0x14d8920}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00265fa40 0xc002563680 0xc002654dc0})]}" +"2019-04-22 06:16:57.223 UTC [confighistory] HandleStateUpdates -> ERRO 12ba Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00391e240)}" +"2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 12bb Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*confighistory.dbProvider=&{0xc00000cb00})}" +"2019-04-22 06:16:57.223 UTC [kvledger] CommitWithPvtData -> DEBU 12bc [businesschannel] Committing block [4] to storage" +"2019-04-22 06:16:57.223 UTC [ledgerstorage] CommitWithPvtData -> DEBU 12bd Writing block [4] to pvt block store" +"2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 12be constructing new query executor txid = [82114033-4596-4bc7-9571-74ce1bca484e]" +"2019-04-22 06:16:57.223 UTC [lockbasedtxmgr] Done -> DEBU 12bf Done with transaction simulation / query execution [82114033-4596-4bc7-9571-74ce1bca484e]" +"2019-04-22 06:16:57.229 UTC [pvtdatastorage] Prepare -> DEBU 12c0 Saved 0 private data write sets for block [4]" +"2019-04-22 06:16:57.236 UTC [fsblkstorage] indexBlock -> DEBU 12c1 Indexing block [blockNum=4, blockHash=[]byte{0xf0, 0xcc, 0x1a, 0x99, 0xb6, 0xf2, 0x1c, 0x57, 0xc4, 0x65, 0xdc, 0xe5, 0xfd, 0x17, 0x4c, 0x10, 0xd, 0xda, 0x45, 0x9e, 0x46, 0x7c, 0x52, 0x8f, 0x16, 0x48, 0xbc, 0xa8, 0x52, 0x64, 0x75, 0x8e} txOffsets= +txId=5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91 locPointer=offset=70, bytesLength=3703 +]" +"2019-04-22 06:16:57.236 UTC [fsblkstorage] indexBlock -> DEBU 12c2 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3703] for tx ID: [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] to txid-index" +"2019-04-22 06:16:57.236 UTC [fsblkstorage] indexBlock -> DEBU 12c3 Adding txLoc [fileSuffixNum=0, offset=76156, bytesLength=3703] for tx number:[0] ID: [5719277d534f8fab6232547e218c425af401ae87b901b1f789b8e89821b0ca91] to blockNumTranNum index" +"2019-04-22 06:16:57.239 UTC [fsblkstorage] updateCheckpoint -> DEBU 12c4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[80796], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-04-22 06:16:57.239 UTC [pvtdatastorage] Commit -> DEBU 12c5 Committing private data for block [4]" +"2019-04-22 06:16:57.244 UTC [pvtdatastorage] Commit -> DEBU 12c6 Committed private data for block [4]" +"2019-04-22 06:16:57.245 UTC [kvledger] CommitWithPvtData -> DEBU 12c7 [businesschannel] Committing block [4] transactions to state database" +"2019-04-22 06:16:57.245 UTC [lockbasedtxmgr] Commit -> DEBU 12c8 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:16:57.245 UTC [lockbasedtxmgr] Commit -> DEBU 12c9 Committing updates to state database" +"2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12ca Building the expiry schedules based on the update batch" +"2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cb Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e2ee73352865a821b92ce675ddb36713f2b38c6ebe94fe2c41fe3d2ca656b927]" +"2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cc Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=1934534e72cba4bedf01739d70dd15c3caf16f79d9029926bdcc749dae5a4d34]" +"2019-04-22 06:16:57.245 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cd Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=f6dcd0689a2dbb81ce698875d74585f3dff15eb0066bea9e909d809585cc13a9]" +"2019-04-22 06:16:57.246 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12ce Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=e5921f8152dff68c186ca43c6bbe060cfc473415dcc817a4cf88e68ac92edcbf]" +"2019-04-22 06:16:57.246 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12cf Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=a5fe94f53e7b222b881298932362ed0b1ff11315ee54b5488fc457056f6e19df]" +"2019-04-22 06:16:57.246 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 12d0 Adding expiry schedule for key hash [ns=_lifecycle, collection=_implicit_org_Org2MSP, keyHash=d1091f08a70faa3d95595c03a6d67d834a3ddb4d1c231c648a0df882bfd4bad6]" +"2019-04-22 06:16:57.246 UTC [lockbasedtxmgr] Commit -> DEBU 12d1 Write lock acquired for committing updates to state database" +"2019-04-22 06:16:57.246 UTC [stateleveldb] ApplyUpdates -> DEBU 12d2 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP��s5(e�!�,�uݳg���n���,A�=,�V�'] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xe2, 0xee, 0x73, 0x35, 0x28, 0x65, 0xa8, 0x21, 0xb9, 0x2c, 0xe6, 0x75, 0xdd, 0xb3, 0x67, 0x13, 0xf2, 0xb3, 0x8c, 0x6e, 0xbe, 0x94, 0xfe, 0x2c, 0x41, 0xfe, 0x3d, 0x2c, 0xa6, 0x56, 0xb9, 0x27}]" +"2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d3 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP4SNrˤ��s�p����oy��&��t��ZM4] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0x19, 0x34, 0x53, 0x4e, 0x72, 0xcb, 0xa4, 0xbe, 0xdf, 0x1, 0x73, 0x9d, 0x70, 0xdd, 0x15, 0xc3, 0xca, 0xf1, 0x6f, 0x79, 0xd9, 0x2, 0x99, 0x26, 0xbd, 0xcc, 0x74, 0x9d, 0xae, 0x5a, 0x4d, 0x34}]" +"2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d4 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���h�-���i�u�E����^�kꞐ������] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xf6, 0xdc, 0xd0, 0x68, 0x9a, 0x2d, 0xbb, 0x81, 0xce, 0x69, 0x88, 0x75, 0xd7, 0x45, 0x85, 0xf3, 0xdf, 0xf1, 0x5e, 0xb0, 0x6, 0x6b, 0xea, 0x9e, 0x90, 0x9d, 0x80, 0x95, 0x85, 0xcc, 0x13, 0xa9}]" +"2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d5 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP���R���l� DEBU 12d6 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP����>{"+���#b� ��T�H��Won�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xa5, 0xfe, 0x94, 0xf5, 0x3e, 0x7b, 0x22, 0x2b, 0x88, 0x12, 0x98, 0x93, 0x23, 0x62, 0xed, 0xb, 0x1f, 0xf1, 0x13, 0x15, 0xee, 0x54, 0xb5, 0x48, 0x8f, 0xc4, 0x57, 0x5, 0x6f, 0x6e, 0x19, 0xdf}]" +"2019-04-22 06:16:57.247 UTC [stateleveldb] ApplyUpdates -> DEBU 12d7 Channel [businesschannel]: Applying key(string)=[_lifecycle$$h_implicit_org_Org2MSP� ��=�Y\��}�J=�M#d� ���Ժ�] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x24, 0x24, 0x68, 0x5f, 0x69, 0x6d, 0x70, 0x6c, 0x69, 0x63, 0x69, 0x74, 0x5f, 0x6f, 0x72, 0x67, 0x5f, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50, 0x0, 0xd1, 0x9, 0x1f, 0x8, 0xa7, 0xf, 0xaa, 0x3d, 0x95, 0x59, 0x5c, 0x3, 0xa6, 0xd6, 0x7d, 0x83, 0x4a, 0x3d, 0xdb, 0x4d, 0x1c, 0x23, 0x1c, 0x64, 0x8a, 0xd, 0xf8, 0x82, 0xbf, 0xd4, 0xba, 0xd6}]" +"2019-04-22 06:16:57.250 UTC [lockbasedtxmgr] Commit -> DEBU 12d8 Updates committed to state database and the write lock is released" +"2019-04-22 06:16:57.250 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12d9 Preparing potential purge list working-set for expiringAtBlk [5]" +"2019-04-22 06:16:57.250 UTC [lockbasedtxmgr] func1 -> DEBU 12da launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:16:57.251 UTC [kvledger] CommitWithPvtData -> DEBU 12db [businesschannel] Committing block [4] transactions to history database" +"2019-04-22 06:16:57.251 UTC [historyleveldb] Commit -> DEBU 12dc Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +"2019-04-22 06:16:57.251 UTC [leveldbhelper] GetIterator -> DEBU 12dd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +"2019-04-22 06:16:57.252 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 12de No expiry entry found for expiringAtBlk [5]" +"2019-04-22 06:16:57.271 UTC [historyleveldb] Commit -> DEBU 12df Channel [businesschannel]: Updates committed to history database for blockNo [4]" +"2019-04-22 06:16:57.276 UTC [kvledger] CommitWithPvtData -> INFO 12e0 [businesschannel] Committed block [4] with 1 transaction(s) in 55ms (state_validation=2ms block_commit=21ms state_commit=6ms)" +"2019-04-22 06:16:57.276 UTC [msp.identity] Sign -> DEBU 12e1 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020805 " +"2019-04-22 06:16:57.276 UTC [msp.identity] Sign -> DEBU 12e2 Sign: digest: 56D78E4BE61D85078641303305ED7A39E22EF40EF453ECDA408BC60D7CCD7733 " +"2019-04-22 06:16:57.276 UTC [gossip.state] commitBlock -> DEBU 12e3 [businesschannel] Committed block [4] with 1 transaction(s)" +"2019-04-22 06:16:57.716 UTC [endorser] ProcessProposal -> DEBU 12e4 Entering: request from 192.168.224.9:49258" +"2019-04-22 06:16:57.717 UTC [protoutils] ValidateProposalMessage -> DEBU 12e5 ValidateProposalMessage starts for signed proposal 0xc0038fb680" +"2019-04-22 06:16:57.717 UTC [protoutils] validateChannelHeader -> DEBU 12e6 validateChannelHeader info: header type 3" +"2019-04-22 06:16:57.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 12e7 begin" +"2019-04-22 06:16:57.717 UTC [msp] GetManagerForChain -> DEBU 12e8 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:57.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 12e9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:57.717 UTC [protoutils] checkSignatureFromCreator -> DEBU 12ea creator is valid" +"2019-04-22 06:16:57.718 UTC [msp.identity] Verify -> DEBU 12eb Verify: digest = 00000000 cc 3a 1a 95 22 ef ca 33 f2 95 aa 3b 4e d7 fa 44 |.:.."..3...;N..D| +00000010 42 39 4c ef 55 8c ba 64 74 ba 0f 3e 46 85 a0 1c |B9L.U..dt..>F...|" +"2019-04-22 06:16:57.718 UTC [msp.identity] Verify -> DEBU 12ec Verify: sig = 00000000 30 45 02 21 00 c1 b5 70 95 9d 04 b2 fe 0b 63 6e |0E.!...p......cn| +00000010 76 f9 bb 7a 5b 4f b7 2a 64 fe 8e 80 9e 1a f6 6d |v..z[O.*d......m| +00000020 70 f7 a4 95 03 02 20 69 eb 95 b7 85 05 e2 9b e4 |p..... i........| +00000030 32 6c 99 12 41 62 13 90 29 2b b9 c0 ef e0 df 38 |2l..Ab..)+.....8| +00000040 3b dd b0 e8 5a 38 e6 |;...Z8.|" +"2019-04-22 06:16:57.719 UTC [protoutils] checkSignatureFromCreator -> DEBU 12ed exits successfully" +"2019-04-22 06:16:57.719 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 12ee validateChaincodeProposalMessage starts for proposal 0xc0038e9ab0, header 0xc0038fba90" +"2019-04-22 06:16:57.719 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 12ef validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-04-22 06:16:57.720 UTC [endorser] preProcess -> DEBU 12f0 [businesschannel][c1345847] processing txid: c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4" +"2019-04-22 06:16:57.720 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 12f1 retrieveTransactionByID() - txId = [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +"2019-04-22 06:16:57.720 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 12f2 constructing new tx simulator" +"2019-04-22 06:16:57.721 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 12f3 constructing new tx simulator txid = [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +"2019-04-22 06:16:57.721 UTC [endorser] SimulateProposal -> DEBU 12f4 [businesschannel][c1345847] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:57.721 UTC [endorser] callChaincode -> INFO 12f5 [businesschannel][c1345847] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:57.721 UTC [chaincode] Execute -> DEBU 12f6 Entry" +"2019-04-22 06:16:57.722 UTC [aclmgmt] CheckACL -> DEBU 12f7 acl policy not found in config for resource _lifecycle/QueryApprovalStatus" +"2019-04-22 06:16:57.722 UTC [policies] Evaluate -> DEBU 12f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:57.723 UTC [policies] Evaluate -> DEBU 12f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:57.723 UTC [policies] Evaluate -> DEBU 12fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:16:57.723 UTC [cauthdsl] func1 -> DEBU 12fb 0xc0038db5c0 gate 1555913817723532800 evaluation starts" +"2019-04-22 06:16:57.723 UTC [cauthdsl] func2 -> DEBU 12fc 0xc0038db5c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:57.724 UTC [cauthdsl] func2 -> DEBU 12fd 0xc0038db5c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:57.724 UTC [cauthdsl] func2 -> DEBU 12fe 0xc0038db5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:57.724 UTC [cauthdsl] func2 -> DEBU 12ff 0xc0038db5c0 principal evaluation fails" +"2019-04-22 06:16:57.724 UTC [cauthdsl] func1 -> DEBU 1300 0xc0038db5c0 gate 1555913817723532800 evaluation fails" +"2019-04-22 06:16:57.725 UTC [policies] Evaluate -> DEBU 1301 Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:57.725 UTC [policies] Evaluate -> DEBU 1302 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:57.725 UTC [policies] Evaluate -> DEBU 1303 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:57.725 UTC [cauthdsl] func1 -> DEBU 1304 0xc0038dbe00 gate 1555913817725881000 evaluation starts" +"2019-04-22 06:16:57.726 UTC [cauthdsl] func2 -> DEBU 1305 0xc0038dbe00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:57.726 UTC [cauthdsl] func2 -> DEBU 1306 0xc0038dbe00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:57.726 UTC [cauthdsl] func2 -> DEBU 1307 0xc0038dbe00 principal matched by identity 0" +"2019-04-22 06:16:57.727 UTC [msp.identity] Verify -> DEBU 1308 Verify: digest = 00000000 cc 3a 1a 95 22 ef ca 33 f2 95 aa 3b 4e d7 fa 44 |.:.."..3...;N..D| +00000010 42 39 4c ef 55 8c ba 64 74 ba 0f 3e 46 85 a0 1c |B9L.U..dt..>F...|" +"2019-04-22 06:16:57.727 UTC [msp.identity] Verify -> DEBU 1309 Verify: sig = 00000000 30 45 02 21 00 c1 b5 70 95 9d 04 b2 fe 0b 63 6e |0E.!...p......cn| +00000010 76 f9 bb 7a 5b 4f b7 2a 64 fe 8e 80 9e 1a f6 6d |v..z[O.*d......m| +00000020 70 f7 a4 95 03 02 20 69 eb 95 b7 85 05 e2 9b e4 |p..... i........| +00000030 32 6c 99 12 41 62 13 90 29 2b b9 c0 ef e0 df 38 |2l..Ab..)+.....8| +00000040 3b dd b0 e8 5a 38 e6 |;...Z8.|" +"2019-04-22 06:16:57.728 UTC [cauthdsl] func2 -> DEBU 130a 0xc0038dbe00 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:57.728 UTC [cauthdsl] func1 -> DEBU 130b 0xc0038dbe00 gate 1555913817725881000 evaluation succeeds" +"2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130e Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:16:57.728 UTC [policies] Evaluate -> DEBU 130f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:57.729 UTC [lifecycle] QueryApprovalStatus -> DEBU 1310 received invocation of QueryApprovalStatus on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: false), validation info: (plugin: '', policy: ''), collections: ()'" +"2019-04-22 06:16:57.730 UTC [chaincode] handleMessage -> DEBU 1311 [c1345847] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:16:57.731 UTC [chaincode] HandleTransaction -> DEBU 1312 [c1345847] handling GET_STATE from chaincode" +"2019-04-22 06:16:57.731 UTC [chaincode] HandleGetState -> DEBU 1313 [c1345847] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-04-22 06:16:57.731 UTC [stateleveldb] GetState -> DEBU 1314 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:16:57.731 UTC [chaincode] HandleGetState -> DEBU 1315 [c1345847] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +"2019-04-22 06:16:57.732 UTC [chaincode] HandleTransaction -> DEBU 1316 [c1345847] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:16:57.732 UTC [chaincode] handleMessage -> DEBU 1317 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.732 UTC [chaincode] HandleTransaction -> DEBU 1318 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.732 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1319 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-04-22 06:16:57.733 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 131a retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:57.733 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 131b retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:57.733 UTC [stateleveldb] GetState -> DEBU 131c GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:16:57.733 UTC [chaincode] HandleTransaction -> DEBU 131d [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.734 UTC [chaincode] handleMessage -> DEBU 131e [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.734 UTC [chaincode] HandleTransaction -> DEBU 131f [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.734 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1320 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-04-22 06:16:57.734 UTC [stateleveldb] GetState -> DEBU 1321 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-04-22 06:16:57.734 UTC [chaincode] HandleTransaction -> DEBU 1322 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.735 UTC [chaincode] handleMessage -> DEBU 1323 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.735 UTC [chaincode] HandleTransaction -> DEBU 1324 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.735 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1325 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-04-22 06:16:57.736 UTC [stateleveldb] GetState -> DEBU 1326 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 1327 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.736 UTC [chaincode] handleMessage -> DEBU 1328 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.736 UTC [chaincode] HandleTransaction -> DEBU 1329 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.736 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 132a [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-04-22 06:16:57.737 UTC [stateleveldb] GetState -> DEBU 132b GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-04-22 06:16:57.737 UTC [chaincode] HandleTransaction -> DEBU 132c [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.737 UTC [chaincode] handleMessage -> DEBU 132d [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.737 UTC [chaincode] HandleTransaction -> DEBU 132e [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.738 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 132f [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-04-22 06:16:57.738 UTC [stateleveldb] GetState -> DEBU 1330 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:16:57.738 UTC [chaincode] HandleTransaction -> DEBU 1331 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.738 UTC [chaincode] handleMessage -> DEBU 1332 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.738 UTC [chaincode] HandleTransaction -> DEBU 1333 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.739 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1334 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-04-22 06:16:57.739 UTC [stateleveldb] GetState -> DEBU 1335 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-04-22 06:16:57.739 UTC [chaincode] HandleTransaction -> DEBU 1336 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.739 UTC [chaincode] handleMessage -> DEBU 1337 [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.739 UTC [chaincode] HandleTransaction -> DEBU 1338 [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.739 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 1339 [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-04-22 06:16:57.740 UTC [stateleveldb] GetState -> DEBU 133a GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 133b [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.740 UTC [chaincode] handleMessage -> DEBU 133c [c1345847] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:57.740 UTC [chaincode] HandleTransaction -> DEBU 133d [c1345847] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:57.740 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 133e [c1345847] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-04-22 06:16:57.740 UTC [stateleveldb] GetState -> DEBU 133f GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-04-22 06:16:57.741 UTC [chaincode] HandleTransaction -> DEBU 1340 [c1345847] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:57.741 UTC [lifecycle] QueryApprovalStatus -> INFO 1341 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:16:57.741 UTC [chaincode] handleMessage -> DEBU 1342 [c1345847] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:57.741 UTC [chaincode] Notify -> DEBU 1343 [c1345847] notifying Txid:c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4, channelID:businesschannel" +"2019-04-22 06:16:57.741 UTC [chaincode] Execute -> DEBU 1344 Exit" +"2019-04-22 06:16:57.741 UTC [endorser] callChaincode -> INFO 1345 [businesschannel][c1345847] Exit chaincode: name:"_lifecycle" (20ms)" +"2019-04-22 06:16:57.741 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1346 Simulation completed, getting simulation results" +"2019-04-22 06:16:57.741 UTC [lockbasedtxmgr] Done -> DEBU 1347 Done with transaction simulation / query execution [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +"2019-04-22 06:16:57.741 UTC [endorser] SimulateProposal -> DEBU 1348 [businesschannel][c1345847] Exit" +"2019-04-22 06:16:57.741 UTC [endorser] endorseProposal -> DEBU 1349 [businesschannel][c1345847] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:57.741 UTC [endorser] endorseProposal -> DEBU 134a [businesschannel][c1345847] escc for chaincode name:"_lifecycle" is escc" +"2019-04-22 06:16:57.741 UTC [endorser] EndorseWithPlugin -> DEBU 134b Entering endorsement for {plugin: escc, channel: businesschannel, tx: c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4, chaincode: _lifecycle}" +"2019-04-22 06:16:57.741 UTC [msp.identity] Sign -> DEBU 134c Sign: plaintext: 0A2067AE44B398FBDCFED6E83476A3D4...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:57.741 UTC [msp.identity] Sign -> DEBU 134d Sign: digest: F281C2AE2B578C2121F3DA0222AF36F09807357CD95EC92136D9031264CBD9CD " +"2019-04-22 06:16:57.741 UTC [endorser] EndorseWithPlugin -> DEBU 134e Exiting {plugin: escc, channel: businesschannel, tx: c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4, chaincode: _lifecycle}" +"2019-04-22 06:16:57.741 UTC [endorser] endorseProposal -> DEBU 134f [businesschannel][c1345847] Exit" +"2019-04-22 06:16:57.742 UTC [lockbasedtxmgr] Done -> DEBU 1350 Done with transaction simulation / query execution [c1345847d02077851bfbfa41e4c204d6e4e7ce478873f3e7cde77aae787e03c4]" +"2019-04-22 06:16:57.742 UTC [endorser] func1 -> DEBU 1351 Exit: request from 192.168.224.9:49258" +"2019-04-22 06:16:57.742 UTC [comm.grpc.server] 1 -> INFO 1352 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49258 grpc.code=OK grpc.call_duration=25.7084ms +"2019-04-22 06:16:57.751 UTC [grpc] infof -> DEBU 1353 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:57.750 UTC [grpc] infof -> DEBU 1354 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:58.417 UTC [endorser] ProcessProposal -> DEBU 1355 Entering: request from 192.168.224.9:49266" +"2019-04-22 06:16:58.417 UTC [protoutils] ValidateProposalMessage -> DEBU 1356 ValidateProposalMessage starts for signed proposal 0xc0039ae4b0" +"2019-04-22 06:16:58.417 UTC [protoutils] validateChannelHeader -> DEBU 1357 validateChannelHeader info: header type 3" +"2019-04-22 06:16:58.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 1358 begin" +"2019-04-22 06:16:58.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 1359 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:58.417 UTC [protoutils] checkSignatureFromCreator -> DEBU 135a creator is valid" +"2019-04-22 06:16:58.418 UTC [msp.identity] Verify -> DEBU 135b Verify: digest = 00000000 d5 19 33 4f 79 6f 85 e8 c1 7e 2e d8 2a 05 52 2c |..3Oyo...~..*.R,| +00000010 d3 68 1a 57 fe 52 ff f9 7e 40 35 be 57 f4 55 e9 |.h.W.R..~@5.W.U.|" +"2019-04-22 06:16:58.418 UTC [msp.identity] Verify -> DEBU 135c Verify: sig = 00000000 30 44 02 20 25 bc 40 fc 14 bf dd c5 78 df 05 45 |0D. %.@.....x..E| +00000010 28 d9 d6 d7 3c e9 8b 07 7f 05 f3 64 e1 ee 37 98 |(...<......d..7.| +00000020 c6 c3 ad 25 02 20 74 28 b6 2b 17 12 39 b9 10 f3 |...%. t(.+..9...| +00000030 76 1a 5d 5f 5d 08 fd 61 bf 97 26 72 c0 b5 47 1a |v.]_]..a..&r..G.| +00000040 4d e3 94 c9 f8 18 |M.....|" +"2019-04-22 06:16:58.419 UTC [protoutils] checkSignatureFromCreator -> DEBU 135d exits successfully" +"2019-04-22 06:16:58.419 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 135e validateChaincodeProposalMessage starts for proposal 0xc0039b0690, header 0xc0039ae8c0" +"2019-04-22 06:16:58.419 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 135f validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-04-22 06:16:58.419 UTC [endorser] preProcess -> DEBU 1360 [][ad9556a2] processing txid: ad9556a20a67c292186e48eaec03a0650d11ef24c6d214d3286298954bb072b3" +"2019-04-22 06:16:58.419 UTC [endorser] SimulateProposal -> DEBU 1361 [][ad9556a2] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:58.420 UTC [endorser] callChaincode -> INFO 1362 [][ad9556a2] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:58.420 UTC [chaincode] Execute -> DEBU 1363 Entry" +"2019-04-22 06:16:58.421 UTC [msp.identity] Verify -> DEBU 1364 Verify: digest = 00000000 d5 19 33 4f 79 6f 85 e8 c1 7e 2e d8 2a 05 52 2c |..3Oyo...~..*.R,| +00000010 d3 68 1a 57 fe 52 ff f9 7e 40 35 be 57 f4 55 e9 |.h.W.R..~@5.W.U.|" +"2019-04-22 06:16:58.421 UTC [msp.identity] Verify -> DEBU 1365 Verify: sig = 00000000 30 44 02 20 25 bc 40 fc 14 bf dd c5 78 df 05 45 |0D. %.@.....x..E| +00000010 28 d9 d6 d7 3c e9 8b 07 7f 05 f3 64 e1 ee 37 98 |(...<......d..7.| +00000020 c6 c3 ad 25 02 20 74 28 b6 2b 17 12 39 b9 10 f3 |...%. t(.+..9...| +00000030 76 1a 5d 5f 5d 08 fd 61 bf 97 26 72 c0 b5 47 1a |v.]_]..a..&r..G.| +00000040 4d e3 94 c9 f8 18 |M.....|" +"2019-04-22 06:16:58.422 UTC [lifecycle] QueryInstalledChaincodes -> DEBU 1366 received invocation of QueryInstalledChaincodes" +"2019-04-22 06:16:58.422 UTC [chaincode] handleMessage -> DEBU 1367 [ad9556a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:58.422 UTC [chaincode] Notify -> DEBU 1368 [ad9556a2] notifying Txid:ad9556a20a67c292186e48eaec03a0650d11ef24c6d214d3286298954bb072b3, channelID:" +"2019-04-22 06:16:58.423 UTC [chaincode] Execute -> DEBU 1369 Exit" +"2019-04-22 06:16:58.423 UTC [endorser] callChaincode -> INFO 136a [][ad9556a2] Exit chaincode: name:"_lifecycle" (3ms)" +"2019-04-22 06:16:58.423 UTC [endorser] SimulateProposal -> DEBU 136b [][ad9556a2] Exit" +"2019-04-22 06:16:58.423 UTC [endorser] func1 -> DEBU 136c Exit: request from 192.168.224.9:49266" +"2019-04-22 06:16:58.423 UTC [comm.grpc.server] 1 -> INFO 136d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49266 grpc.code=OK grpc.call_duration=7.1225ms +"2019-04-22 06:16:58.427 UTC [grpc] infof -> DEBU 136e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:58.428 UTC [grpc] infof -> DEBU 136f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:16:58.610 UTC [endorser] ProcessProposal -> DEBU 1370 Entering: request from 192.168.224.9:49270" +"2019-04-22 06:16:58.610 UTC [protoutils] ValidateProposalMessage -> DEBU 1371 ValidateProposalMessage starts for signed proposal 0xc00399b900" +"2019-04-22 06:16:58.610 UTC [protoutils] validateChannelHeader -> DEBU 1372 validateChannelHeader info: header type 3" +"2019-04-22 06:16:58.610 UTC [protoutils] checkSignatureFromCreator -> DEBU 1373 begin" +"2019-04-22 06:16:58.610 UTC [msp] GetManagerForChain -> DEBU 1374 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:16:58.610 UTC [protoutils] checkSignatureFromCreator -> DEBU 1375 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:16:58.610 UTC [protoutils] checkSignatureFromCreator -> DEBU 1376 creator is valid" +"2019-04-22 06:16:58.611 UTC [msp.identity] Verify -> DEBU 1377 Verify: digest = 00000000 65 95 a2 bd 8b 56 91 2d c1 7f 3e f0 87 82 41 47 |e....V.-..>...AG| +00000010 ec 96 7f a2 45 7a 15 d8 2c 14 5c 00 7d 50 71 4d |....Ez..,.\.}PqM|" +"2019-04-22 06:16:58.611 UTC [msp.identity] Verify -> DEBU 1378 Verify: sig = 00000000 30 45 02 21 00 92 c8 1a 2b d2 ae 72 0c c8 ad 61 |0E.!....+..r...a| +00000010 e9 1d 23 d8 bf 14 c4 2d 45 d1 ab 33 b4 13 9f 12 |..#....-E..3....| +00000020 95 93 e8 22 58 02 20 37 36 16 67 5e 84 c7 97 88 |..."X. 76.g^....| +00000030 37 c6 87 b0 90 ae 6d e4 6c fb da a6 50 b1 c0 5f |7.....m.l...P.._| +00000040 a1 60 f5 97 72 f7 0c |.`..r..|" +"2019-04-22 06:16:58.611 UTC [protoutils] checkSignatureFromCreator -> DEBU 1379 exits successfully" +"2019-04-22 06:16:58.611 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 137a validateChaincodeProposalMessage starts for proposal 0xc00387f810, header 0xc00399bd10" +"2019-04-22 06:16:58.611 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 137b validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-04-22 06:16:58.611 UTC [endorser] preProcess -> DEBU 137c [businesschannel][7771236d] processing txid: 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869" +"2019-04-22 06:16:58.612 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 137d retrieveTransactionByID() - txId = [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +"2019-04-22 06:16:58.612 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 137e constructing new tx simulator" +"2019-04-22 06:16:58.612 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 137f constructing new tx simulator txid = [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +"2019-04-22 06:16:58.612 UTC [endorser] SimulateProposal -> DEBU 1380 [businesschannel][7771236d] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:58.612 UTC [endorser] callChaincode -> INFO 1381 [businesschannel][7771236d] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:58.612 UTC [chaincode] Execute -> DEBU 1382 Entry" +"2019-04-22 06:16:58.612 UTC [aclmgmt] CheckACL -> DEBU 1383 acl policy /Channel/Application/Writers found in config for resource _lifecycle/CommitChaincodeDefinition" +"2019-04-22 06:16:58.612 UTC [aclmgmt] CheckACL -> DEBU 1384 acl check(/Channel/Application/Writers)" +"2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 1385 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 1386 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 1387 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:16:58.613 UTC [cauthdsl] func1 -> DEBU 1388 0xc003a893d0 gate 1555913818613219300 evaluation starts" +"2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 1389 0xc003a893d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 138a 0xc003a893d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 138b 0xc003a893d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:58.613 UTC [cauthdsl] func2 -> DEBU 138c 0xc003a893d0 principal evaluation fails" +"2019-04-22 06:16:58.613 UTC [cauthdsl] func1 -> DEBU 138d 0xc003a893d0 gate 1555913818613219300 evaluation fails" +"2019-04-22 06:16:58.613 UTC [policies] Evaluate -> DEBU 138e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:58.614 UTC [policies] Evaluate -> DEBU 138f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:16:58.614 UTC [policies] Evaluate -> DEBU 1390 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:16:58.614 UTC [cauthdsl] func1 -> DEBU 1391 0xc003a89c10 gate 1555913818614225800 evaluation starts" +"2019-04-22 06:16:58.614 UTC [cauthdsl] func2 -> DEBU 1392 0xc003a89c10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:58.614 UTC [cauthdsl] func2 -> DEBU 1393 0xc003a89c10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:58.614 UTC [cauthdsl] func2 -> DEBU 1394 0xc003a89c10 principal matched by identity 0" +"2019-04-22 06:16:58.614 UTC [msp.identity] Verify -> DEBU 1395 Verify: digest = 00000000 65 95 a2 bd 8b 56 91 2d c1 7f 3e f0 87 82 41 47 |e....V.-..>...AG| +00000010 ec 96 7f a2 45 7a 15 d8 2c 14 5c 00 7d 50 71 4d |....Ez..,.\.}PqM|" +"2019-04-22 06:16:58.614 UTC [msp.identity] Verify -> DEBU 1396 Verify: sig = 00000000 30 45 02 21 00 92 c8 1a 2b d2 ae 72 0c c8 ad 61 |0E.!....+..r...a| +00000010 e9 1d 23 d8 bf 14 c4 2d 45 d1 ab 33 b4 13 9f 12 |..#....-E..3....| +00000020 95 93 e8 22 58 02 20 37 36 16 67 5e 84 c7 97 88 |..."X. 76.g^....| +00000030 37 c6 87 b0 90 ae 6d e4 6c fb da a6 50 b1 c0 5f |7.....m.l...P.._| +00000040 a1 60 f5 97 72 f7 0c |.`..r..|" +"2019-04-22 06:16:58.615 UTC [cauthdsl] func2 -> DEBU 1397 0xc003a89c10 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:58.615 UTC [cauthdsl] func1 -> DEBU 1398 0xc003a89c10 gate 1555913818614225800 evaluation succeeds" +"2019-04-22 06:16:58.615 UTC [policies] Evaluate -> DEBU 1399 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:58.615 UTC [policies] Evaluate -> DEBU 139a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:16:58.615 UTC [policies] Evaluate -> DEBU 139b Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:16:58.616 UTC [policies] Evaluate -> DEBU 139c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:16:58.616 UTC [lifecycle] CommitChaincodeDefinition -> DEBU 139d received invocation of CommitChaincodeDefinition on channel 'businesschannel' for definition 'sequence: 1, endorsement info: (version: '1.0', plugin: '', init required: true), validation info: (plugin: '', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: ()'" +"2019-04-22 06:16:58.616 UTC [chaincode] handleMessage -> DEBU 139e [7771236d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:16:58.616 UTC [chaincode] HandleTransaction -> DEBU 139f [7771236d] handling GET_STATE from chaincode" +"2019-04-22 06:16:58.616 UTC [chaincode] HandleGetState -> DEBU 13a0 [7771236d] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-04-22 06:16:58.616 UTC [stateleveldb] GetState -> DEBU 13a1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:16:58.617 UTC [chaincode] HandleGetState -> DEBU 13a2 [7771236d] No state associated with key: namespaces/fields/exp02/Sequence. Sending RESPONSE with an empty payload" +"2019-04-22 06:16:58.617 UTC [chaincode] HandleTransaction -> DEBU 13a3 [7771236d] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:16:58.617 UTC [chaincode] handleMessage -> DEBU 13a4 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.617 UTC [chaincode] HandleTransaction -> DEBU 13a5 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.617 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13a6 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-04-22 06:16:58.617 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 13a7 retrieveCollConfigFromStateDB() begin - ns=[_lifecycle]" +"2019-04-22 06:16:58.618 UTC [lockbasedtxmgr] retrieveCollConfigFromStateDB -> DEBU 13a8 retrieveCollConfigFromStateDB() successfully retrieved - ns=[_lifecycle], confPkg=[config: > > identities: > > > > config: > > identities: > > > > ]" +"2019-04-22 06:16:58.618 UTC [stateleveldb] GetState -> DEBU 13a9 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:16:58.618 UTC [chaincode] HandleTransaction -> DEBU 13aa [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.618 UTC [chaincode] handleMessage -> DEBU 13ab [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.618 UTC [chaincode] HandleTransaction -> DEBU 13ac [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.618 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13ad [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-04-22 06:16:58.618 UTC [stateleveldb] GetState -> DEBU 13ae GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-04-22 06:16:58.619 UTC [chaincode] HandleTransaction -> DEBU 13af [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.619 UTC [chaincode] handleMessage -> DEBU 13b0 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.619 UTC [chaincode] HandleTransaction -> DEBU 13b1 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.619 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13b2 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-04-22 06:16:58.619 UTC [stateleveldb] GetState -> DEBU 13b3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 13b4 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.620 UTC [chaincode] handleMessage -> DEBU 13b5 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.620 UTC [chaincode] HandleTransaction -> DEBU 13b6 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.621 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13b7 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-04-22 06:16:58.621 UTC [stateleveldb] GetState -> DEBU 13b8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-04-22 06:16:58.621 UTC [chaincode] HandleTransaction -> DEBU 13b9 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.621 UTC [chaincode] handleMessage -> DEBU 13ba [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.621 UTC [chaincode] HandleTransaction -> DEBU 13bb [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.621 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13bc [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/metadata/exp02#1, channel businesschannel" +"2019-04-22 06:16:58.621 UTC [stateleveldb] GetState -> DEBU 13bd GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:16:58.621 UTC [chaincode] HandleTransaction -> DEBU 13be [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.622 UTC [chaincode] handleMessage -> DEBU 13bf [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.622 UTC [chaincode] HandleTransaction -> DEBU 13c0 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.622 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13c1 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/EndorsementInfo, channel businesschannel" +"2019-04-22 06:16:58.622 UTC [stateleveldb] GetState -> DEBU 13c2 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-04-22 06:16:58.622 UTC [chaincode] HandleTransaction -> DEBU 13c3 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.622 UTC [chaincode] handleMessage -> DEBU 13c4 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.622 UTC [chaincode] HandleTransaction -> DEBU 13c5 [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.623 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13c6 [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/ValidationInfo, channel businesschannel" +"2019-04-22 06:16:58.623 UTC [stateleveldb] GetState -> DEBU 13c7 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 13c8 [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.623 UTC [chaincode] handleMessage -> DEBU 13c9 [7771236d] Fabric side handling ChaincodeMessage of type: GET_PRIVATE_DATA_HASH in state ready" +"2019-04-22 06:16:58.623 UTC [chaincode] HandleTransaction -> DEBU 13ca [7771236d] handling GET_PRIVATE_DATA_HASH from chaincode" +"2019-04-22 06:16:58.623 UTC [chaincode] HandleGetPrivateDataHash -> DEBU 13cb [7771236d] getting private data hash for chaincode _lifecycle, key namespaces/fields/exp02#1/Collections, channel businesschannel" +"2019-04-22 06:16:58.623 UTC [stateleveldb] GetState -> DEBU 13cc GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-04-22 06:16:58.624 UTC [chaincode] HandleTransaction -> DEBU 13cd [7771236d] Completed GET_PRIVATE_DATA_HASH. Sending RESPONSE" +"2019-04-22 06:16:58.624 UTC [lifecycle] QueryApprovalStatus -> INFO 13ce successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:16:58.624 UTC [chaincode] handleMessage -> DEBU 13cf [7771236d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:16:58.625 UTC [chaincode] HandleTransaction -> DEBU 13d0 [7771236d] handling GET_STATE from chaincode" +"2019-04-22 06:16:58.625 UTC [chaincode] HandleGetState -> DEBU 13d1 [7771236d] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +"2019-04-22 06:16:58.625 UTC [stateleveldb] GetState -> DEBU 13d2 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-04-22 06:16:58.625 UTC [chaincode] HandleGetState -> DEBU 13d3 [7771236d] No state associated with key: namespaces/metadata/exp02. Sending RESPONSE with an empty payload" +"2019-04-22 06:16:58.626 UTC [chaincode] HandleTransaction -> DEBU 13d4 [7771236d] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:16:58.626 UTC [chaincode] handleMessage -> DEBU 13d5 [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:58.626 UTC [chaincode] HandleTransaction -> DEBU 13d6 [7771236d] handling PUT_STATE from chaincode" +"2019-04-22 06:16:58.627 UTC [chaincode] HandleTransaction -> DEBU 13d7 [7771236d] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:58.627 UTC [chaincode] handleMessage -> DEBU 13d8 [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:58.627 UTC [chaincode] HandleTransaction -> DEBU 13d9 [7771236d] handling PUT_STATE from chaincode" +"2019-04-22 06:16:58.627 UTC [chaincode] HandleTransaction -> DEBU 13da [7771236d] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:58.627 UTC [chaincode] handleMessage -> DEBU 13db [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:58.628 UTC [chaincode] HandleTransaction -> DEBU 13dc [7771236d] handling PUT_STATE from chaincode" +"2019-04-22 06:16:58.628 UTC [chaincode] HandleTransaction -> DEBU 13dd [7771236d] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:58.628 UTC [chaincode] handleMessage -> DEBU 13de [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:58.628 UTC [chaincode] HandleTransaction -> DEBU 13df [7771236d] handling PUT_STATE from chaincode" +"2019-04-22 06:16:58.629 UTC [chaincode] HandleTransaction -> DEBU 13e0 [7771236d] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:58.629 UTC [chaincode] handleMessage -> DEBU 13e1 [7771236d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:16:58.629 UTC [chaincode] HandleTransaction -> DEBU 13e2 [7771236d] handling PUT_STATE from chaincode" +"2019-04-22 06:16:58.630 UTC [chaincode] HandleTransaction -> DEBU 13e3 [7771236d] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:16:58.630 UTC [lifecycle] CommitChaincodeDefinition -> INFO 13e4 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:16:58.631 UTC [chaincode] handleMessage -> DEBU 13e5 [7771236d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:16:58.631 UTC [chaincode] Notify -> DEBU 13e6 [7771236d] notifying Txid:7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, channelID:businesschannel" +"2019-04-22 06:16:58.631 UTC [chaincode] Execute -> DEBU 13e7 Exit" +"2019-04-22 06:16:58.631 UTC [endorser] callChaincode -> INFO 13e8 [businesschannel][7771236d] Exit chaincode: name:"_lifecycle" (19ms)" +"2019-04-22 06:16:58.631 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 13e9 Simulation completed, getting simulation results" +"2019-04-22 06:16:58.631 UTC [lockbasedtxmgr] Done -> DEBU 13ea Done with transaction simulation / query execution [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +"2019-04-22 06:16:58.631 UTC [endorser] SimulateProposal -> DEBU 13eb [businesschannel][7771236d] Exit" +"2019-04-22 06:16:58.631 UTC [endorser] endorseProposal -> DEBU 13ec [businesschannel][7771236d] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:16:58.631 UTC [endorser] endorseProposal -> DEBU 13ed [businesschannel][7771236d] escc for chaincode name:"_lifecycle" is escc" +"2019-04-22 06:16:58.631 UTC [endorser] EndorseWithPlugin -> DEBU 13ee Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, chaincode: _lifecycle}" +"2019-04-22 06:16:58.631 UTC [msp.identity] Sign -> DEBU 13ef Sign: plaintext: 0A2010A6C96C351DFF563F3FD4E86222...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:16:58.631 UTC [msp.identity] Sign -> DEBU 13f0 Sign: digest: 76FC96102592EED300D1D3F1BD51FAEB798F7C68FB010F15A112D60C54832E50 " +"2019-04-22 06:16:58.631 UTC [endorser] EndorseWithPlugin -> DEBU 13f1 Exiting {plugin: escc, channel: businesschannel, tx: 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, chaincode: _lifecycle}" +"2019-04-22 06:16:58.631 UTC [endorser] endorseProposal -> DEBU 13f2 [businesschannel][7771236d] Exit" +"2019-04-22 06:16:58.631 UTC [lockbasedtxmgr] Done -> DEBU 13f3 Done with transaction simulation / query execution [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +"2019-04-22 06:16:58.632 UTC [endorser] func1 -> DEBU 13f4 Exit: request from 192.168.224.9:49270" +"2019-04-22 06:16:58.632 UTC [comm.grpc.server] 1 -> INFO 13f5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49270 grpc.code=OK grpc.call_duration=22.1126ms +"2019-04-22 06:16:58.653 UTC [common.deliverevents] DeliverFiltered -> DEBU 13f6 Starting new DeliverFiltered handler" +"2019-04-22 06:16:58.653 UTC [common.deliver] Handle -> DEBU 13f7 Starting new deliver loop for 192.168.224.9:49272" +"2019-04-22 06:16:58.653 UTC [common.deliver] Handle -> DEBU 13f8 Attempting to read seek info message from 192.168.224.9:49272" +"2019-04-22 06:16:58.654 UTC [aclmgmt] CheckACL -> DEBU 13f9 acl policy /Channel/Application/Readers found in config for resource event/FilteredBlock" +"2019-04-22 06:16:58.654 UTC [aclmgmt] CheckACL -> DEBU 13fa acl check(/Channel/Application/Readers)" +"2019-04-22 06:16:58.654 UTC [policies] Evaluate -> DEBU 13fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:58.654 UTC [policies] Evaluate -> DEBU 13fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:58.655 UTC [policies] Evaluate -> DEBU 13fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:58.655 UTC [cauthdsl] func1 -> DEBU 13fe 0xc003ad6c00 gate 1555913818655325600 evaluation starts" +"2019-04-22 06:16:58.655 UTC [cauthdsl] func2 -> DEBU 13ff 0xc003ad6c00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:58.656 UTC [cauthdsl] func2 -> DEBU 1400 0xc003ad6c00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:58.656 UTC [cauthdsl] func2 -> DEBU 1401 0xc003ad6c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:16:58.657 UTC [cauthdsl] func2 -> DEBU 1402 0xc003ad6c00 principal evaluation fails" +"2019-04-22 06:16:58.657 UTC [cauthdsl] func1 -> DEBU 1403 0xc003ad6c00 gate 1555913818655325600 evaluation fails" +"2019-04-22 06:16:58.658 UTC [policies] Evaluate -> DEBU 1404 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:58.658 UTC [policies] Evaluate -> DEBU 1405 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:58.658 UTC [policies] Evaluate -> DEBU 1406 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:16:58.659 UTC [cauthdsl] func1 -> DEBU 1407 0xc003ad7440 gate 1555913818659013200 evaluation starts" +"2019-04-22 06:16:58.659 UTC [cauthdsl] func2 -> DEBU 1408 0xc003ad7440 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:58.659 UTC [cauthdsl] func2 -> DEBU 1409 0xc003ad7440 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:58.659 UTC [cauthdsl] func2 -> DEBU 140a 0xc003ad7440 principal matched by identity 0" +"2019-04-22 06:16:58.660 UTC [msp.identity] Verify -> DEBU 140b Verify: digest = 00000000 70 3c 94 76 77 52 c4 d1 a2 30 4d cd 25 dc 08 0e |p<.vwR...0M.%...| +00000010 d7 13 f7 3e 20 82 9c be 4d 0c ad 90 b0 9b 3a 1f |...> ...M.....:.|" +"2019-04-22 06:16:58.660 UTC [msp.identity] Verify -> DEBU 140c Verify: sig = 00000000 30 45 02 21 00 82 78 0a c0 58 ca 3f 7a ea 47 95 |0E.!..x..X.?z.G.| +00000010 10 e3 cd 11 72 27 1a d5 bf 9d fa 2d 80 e8 50 81 |....r'.....-..P.| +00000020 6c 1d 82 17 f4 02 20 14 fa ab d8 0f ab e5 62 d2 |l..... .......b.| +00000030 9a 9d ec 4d d7 83 e5 30 c1 b8 9d a4 a3 d0 66 aa |...M...0......f.| +00000040 ef 74 e5 7c 31 c9 42 |.t.|1.B|" +"2019-04-22 06:16:58.661 UTC [cauthdsl] func2 -> DEBU 140d 0xc003ad7440 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:58.661 UTC [cauthdsl] func1 -> DEBU 140e 0xc003ad7440 gate 1555913818659013200 evaluation succeeds" +"2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 140f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 1411 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:58.662 UTC [policies] Evaluate -> DEBU 1412 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:58.663 UTC [common.deliver] deliverBlocks -> DEBU 1413 [channel: businesschannel] Received seekInfo (0xc00392bb80) start: > stop: > from 192.168.224.9:49272" +"2019-04-22 06:16:58.663 UTC [fsblkstorage] Next -> DEBU 1414 Initializing block stream for iterator. itr.maxBlockNumAvailable=4" +"2019-04-22 06:16:58.663 UTC [fsblkstorage] newBlockfileStream -> DEBU 1415 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[76086]" +"2019-04-22 06:16:58.664 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1416 Remaining bytes=[4710], Going to peek [8] bytes" +"2019-04-22 06:16:58.664 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1417 Returning blockbytes - length=[4708], placementInfo={fileNum=[0], startOffset=[76086], bytesOffset=[76088]}" +"2019-04-22 06:16:58.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1418 blockbytes [4708] read from file [0]" +"2019-04-22 06:16:58.665 UTC [common.deliver] deliverBlocks -> DEBU 1419 [channel: businesschannel] Delivering block [4] for (0xc00392bb80) for 192.168.224.9:49272" +"2019-04-22 06:16:58.666 UTC [fsblkstorage] waitForBlock -> DEBU 141a Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-04-22 06:16:58.888 UTC [gossip.pull] Hello -> DEBU 141b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:16:58.888 UTC [gossip.comm] Send -> DEBU 141c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:58.889 UTC [gossip.pull] Hello -> DEBU 141d Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:16:58.889 UTC [gossip.comm] Send -> DEBU 141e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:58.889 UTC [gossip.pull] Hello -> DEBU 141f Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:16:58.889 UTC [gossip.comm] Send -> DEBU 1420 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:58.889 UTC [gossip.comm] sendToEndpoint -> DEBU 1421 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1422 Exiting" +"2019-04-22 06:16:58.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1423 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1424 Exiting" +"2019-04-22 06:16:58.891 UTC [gossip.comm] sendToEndpoint -> DEBU 1425 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.891 UTC [gossip.comm] sendToEndpoint -> DEBU 1426 Exiting" +"2019-04-22 06:16:58.892 UTC [gossip.comm] func1 -> DEBU 1427 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12318132908289043989 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.893 UTC [gossip.gossip] handleMessage -> DEBU 1428 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12318132908289043989 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.893 UTC [gossip.pull] HandleMessage -> DEBU 1429 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12318132908289043989 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.893 UTC [gossip.gossip] handleMessage -> DEBU 142a Exiting" +"2019-04-22 06:16:58.894 UTC [gossip.comm] func1 -> DEBU 142b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11051994609818616944 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.894 UTC [gossip.gossip] handleMessage -> DEBU 142c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11051994609818616944 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.895 UTC [gossip.pull] HandleMessage -> DEBU 142d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11051994609818616944 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.895 UTC [gossip.gossip] handleMessage -> DEBU 142e Exiting" +"2019-04-22 06:16:58.895 UTC [gossip.gossip] handleMessage -> DEBU 142f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16533584498481495631 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.895 UTC [gossip.pull] HandleMessage -> DEBU 1430 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16533584498481495631 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.895 UTC [gossip.gossip] handleMessage -> DEBU 1431 Exiting" +"2019-04-22 06:16:58.918 UTC [msp.identity] Sign -> DEBU 1432 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151016 " +"2019-04-22 06:16:58.919 UTC [msp.identity] Sign -> DEBU 1433 Sign: digest: 53485231500E56B076979AE17E8A4E80FCA16060B13DCE8B5B9BECC85F1984A8 " +"2019-04-22 06:16:58.919 UTC [msp.identity] Sign -> DEBU 1434 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:16:58.919 UTC [msp.identity] Sign -> DEBU 1435 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:16:58.920 UTC [gossip.comm] Send -> DEBU 1436 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:58.920 UTC [msp] DeserializeIdentity -> DEBU 1437 Obtaining identity" +"2019-04-22 06:16:58.920 UTC [gossip.comm] Send -> DEBU 1438 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:58.920 UTC [msp] DeserializeIdentity -> DEBU 1439 Obtaining identity" +"2019-04-22 06:16:58.920 UTC [gossip.comm] Send -> DEBU 143a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143c Exiting" +"2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143e Exiting" +"2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 143f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1440 Exiting" +"2019-04-22 06:16:58.924 UTC [gossip.comm] func1 -> DEBU 1441 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.924 UTC [gossip.gossip] handleMessage -> DEBU 1442 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.925 UTC [gossip.gossip] handleMessage -> DEBU 1443 Exiting" +"2019-04-22 06:16:58.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1444 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.925 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1445 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:58.926 UTC [msp.identity] Verify -> DEBU 1446 Verify: digest = 00000000 53 48 52 31 50 0e 56 b0 76 97 9a e1 7e 8a 4e 80 |SHR1P.V.v...~.N.| +00000010 fc a1 60 60 b1 3d ce 8b 5b 9b ec c8 5f 19 84 a8 |..``.=..[..._...|" +"2019-04-22 06:16:58.926 UTC [msp.identity] Verify -> DEBU 1447 Verify: sig = 00000000 30 44 02 20 40 cc 1c 36 e1 7e 67 3d 72 42 aa 5f |0D. @..6.~g=rB._| +00000010 25 05 bc f9 a4 e9 e5 3e 6a ad fc 64 82 19 6d 75 |%......>j..d..mu| +00000020 21 af 1f e9 02 20 6b 76 4d e4 7e b3 d3 17 21 96 |!.... kvM.~...!.| +00000030 8e 4b 65 f2 e6 98 ff e4 29 22 da 2a 9c b1 10 08 |.Ke.....)".*....| +00000040 b2 b2 e1 e4 0f cb |......|" +"2019-04-22 06:16:58.927 UTC [msp.identity] Verify -> DEBU 1448 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:16:58.927 UTC [msp.identity] Verify -> DEBU 1449 Verify: sig = 00000000 30 45 02 21 00 fc 4d fb 5a b5 f1 ab 03 2e af de |0E.!..M.Z.......| +00000010 85 ea b0 c6 38 0d 84 47 9c 97 9f a8 8e 4e cf 83 |....8..G.....N..| +00000020 96 8d 28 92 46 02 20 78 2a df 06 f1 cc bf a5 57 |..(.F. x*......W| +00000030 09 69 1e ee 4f 0a e3 55 51 ac b1 c6 8f 1e 5d 0b |.i..O..UQ.....].| +00000040 ec ef 83 a1 ef de 8b |.......|" +"2019-04-22 06:16:58.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 144a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:58.928 UTC [gossip.discovery] isSentByMe -> DEBU 144b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:16:58.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 144c Exiting" +"2019-04-22 06:16:58.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 144d Exiting" +"2019-04-22 06:16:58.930 UTC [gossip.comm] func1 -> DEBU 144e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.930 UTC [gossip.gossip] handleMessage -> DEBU 144f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.930 UTC [gossip.gossip] handleMessage -> DEBU 1450 Exiting" +"2019-04-22 06:16:58.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1451 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1452 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:58.932 UTC [msp.identity] Verify -> DEBU 1453 Verify: digest = 00000000 53 48 52 31 50 0e 56 b0 76 97 9a e1 7e 8a 4e 80 |SHR1P.V.v...~.N.| +00000010 fc a1 60 60 b1 3d ce 8b 5b 9b ec c8 5f 19 84 a8 |..``.=..[..._...|" +"2019-04-22 06:16:58.932 UTC [msp.identity] Verify -> DEBU 1454 Verify: sig = 00000000 30 44 02 20 40 cc 1c 36 e1 7e 67 3d 72 42 aa 5f |0D. @..6.~g=rB._| +00000010 25 05 bc f9 a4 e9 e5 3e 6a ad fc 64 82 19 6d 75 |%......>j..d..mu| +00000020 21 af 1f e9 02 20 6b 76 4d e4 7e b3 d3 17 21 96 |!.... kvM.~...!.| +00000030 8e 4b 65 f2 e6 98 ff e4 29 22 da 2a 9c b1 10 08 |.Ke.....)".*....| +00000040 b2 b2 e1 e4 0f cb |......|" +"2019-04-22 06:16:58.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1455 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:58.933 UTC [gossip.discovery] isSentByMe -> DEBU 1456 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:58.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 1457 Exiting" +"2019-04-22 06:16:58.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1458 Exiting" +"2019-04-22 06:16:58.936 UTC [gossip.gossip] handleMessage -> DEBU 1459 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.936 UTC [gossip.gossip] handleMessage -> DEBU 145a Exiting" +"2019-04-22 06:16:58.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 145b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:16:58.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 145c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:16:58.936 UTC [msp.identity] Verify -> DEBU 145d Verify: digest = 00000000 53 48 52 31 50 0e 56 b0 76 97 9a e1 7e 8a 4e 80 |SHR1P.V.v...~.N.| +00000010 fc a1 60 60 b1 3d ce 8b 5b 9b ec c8 5f 19 84 a8 |..``.=..[..._...|" +"2019-04-22 06:16:58.937 UTC [msp.identity] Verify -> DEBU 145e Verify: sig = 00000000 30 44 02 20 40 cc 1c 36 e1 7e 67 3d 72 42 aa 5f |0D. @..6.~g=rB._| +00000010 25 05 bc f9 a4 e9 e5 3e 6a ad fc 64 82 19 6d 75 |%......>j..d..mu| +00000020 21 af 1f e9 02 20 6b 76 4d e4 7e b3 d3 17 21 96 |!.... kvM.~...!.| +00000030 8e 4b 65 f2 e6 98 ff e4 29 22 da 2a 9c b1 10 08 |.Ke.....)".*....| +00000040 b2 b2 e1 e4 0f cb |......|" +"2019-04-22 06:16:58.937 UTC [gossip.discovery] handleAliveMessage -> DEBU 145f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:58.938 UTC [gossip.discovery] isSentByMe -> DEBU 1460 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:16:58.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 1461 Exiting" +"2019-04-22 06:16:58.938 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1462 Exiting" +"2019-04-22 06:16:59.158 UTC [gossip.comm] func1 -> DEBU 1463 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.158 UTC [gossip.gossip] handleMessage -> DEBU 1464 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.159 UTC [gossip.pull] HandleMessage -> DEBU 1465 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.159 UTC [gossip.pull] SendDigest -> DEBU 1466 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:59.159 UTC [gossip.gossip] handleMessage -> DEBU 1467 Exiting" +"2019-04-22 06:16:59.177 UTC [gossip.comm] func1 -> DEBU 1468 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.180 UTC [gossip.gossip] handleMessage -> DEBU 1469 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.180 UTC [gossip.gossip] handleMessage -> DEBU 146a Exiting" +"2019-04-22 06:16:59.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.182 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 146c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:16:59.183 UTC [msp.identity] Verify -> DEBU 146d Verify: digest = 00000000 2b 45 51 6a ce fb e9 bc 2b 19 f2 b9 70 b3 25 a0 |+EQj....+...p.%.| +00000010 b2 cb 7e 09 7a ba 25 67 78 40 c8 a0 ec 40 f6 95 |..~.z.%gx@...@..|" +"2019-04-22 06:16:59.183 UTC [msp.identity] Verify -> DEBU 146e Verify: sig = 00000000 30 45 02 21 00 aa 1a e4 1f 97 2f f9 89 d2 89 d2 |0E.!....../.....| +00000010 90 44 de 22 92 3a 14 1f ad 99 92 bc 9a 3f 3b 29 |.D.".:.......?;)| +00000020 9c eb a7 53 55 02 20 66 2d 41 67 29 7c df c1 9d |...SU. f-Ag)|...| +00000030 6d d5 02 5c 0e 72 81 78 21 32 c4 79 8e 94 dd 68 |m..\.r.x!2.y...h| +00000040 db 43 ea 9d 59 49 28 |.C..YI(|" +"2019-04-22 06:16:59.186 UTC [msp.identity] Verify -> DEBU 146f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:16:59.187 UTC [msp.identity] Verify -> DEBU 1470 Verify: sig = 00000000 30 44 02 20 0a 12 5b 7d 0a 47 a9 78 59 51 bf 67 |0D. ..[}.G.xYQ.g| +00000010 63 3a f6 54 7c af 1a 8d 68 a4 ad aa 54 a3 5b ed |c:.T|...h...T.[.| +00000020 50 08 2e 0d 02 20 65 f2 fb f3 d2 c4 fb 72 08 1f |P.... e......r..| +00000030 59 78 56 16 d6 28 3b f2 f1 4b 2f 14 5a 4e 32 fe |YxV..(;..K/.ZN2.| +00000040 17 85 69 4a a5 75 |..iJ.u|" +"2019-04-22 06:16:59.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1471 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1472 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1473 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 " +"2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1474 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 " +"2019-04-22 06:16:59.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1475 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:16:59.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1476 Exiting" +"2019-04-22 06:16:59.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 1477 Exiting" +"2019-04-22 06:16:59.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1478 Exiting" +"2019-04-22 06:16:59.189 UTC [gossip.discovery] sendMemResponse -> DEBU 1479 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:16:59.190 UTC [msp] DeserializeIdentity -> DEBU 147a Obtaining identity" +"2019-04-22 06:16:59.190 UTC [msp] DeserializeIdentity -> DEBU 147b Obtaining identity" +"2019-04-22 06:16:59.190 UTC [gossip.comm] Send -> DEBU 147c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 147d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 147e Exiting" +"2019-04-22 06:16:59.190 UTC [gossip.discovery] sendMemResponse -> DEBU 147f Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:16:59.618 UTC [gossip.comm] func1 -> DEBU 1480 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.618 UTC [gossip.gossip] handleMessage -> DEBU 1481 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.618 UTC [gossip.pull] HandleMessage -> DEBU 1482 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1483 Obtaining identity" +"2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1484 Obtaining identity" +"2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1485 Obtaining identity" +"2019-04-22 06:16:59.619 UTC [msp] DeserializeIdentity -> DEBU 1486 Obtaining identity" +"2019-04-22 06:16:59.620 UTC [msp] DeserializeIdentity -> DEBU 1487 Obtaining identity" +"2019-04-22 06:16:59.620 UTC [msp] DeserializeIdentity -> DEBU 1488 Obtaining identity" +"2019-04-22 06:16:59.620 UTC [gossip.pull] SendDigest -> DEBU 1489 Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:59.620 UTC [gossip.gossip] handleMessage -> DEBU 148a Exiting" +"2019-04-22 06:16:59.627 UTC [gossip.comm] func1 -> DEBU 148b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.628 UTC [gossip.gossip] handleMessage -> DEBU 148c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.628 UTC [gossip.gossip] handleMessage -> DEBU 148d Exiting" +"2019-04-22 06:16:59.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 148e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.629 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 148f Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:16:59.629 UTC [msp] DeserializeIdentity -> DEBU 1490 Obtaining identity" +"2019-04-22 06:16:59.629 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1491 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:16:59.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1492 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:59.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1493 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:16:59.630 UTC [policies] Evaluate -> DEBU 1494 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:16:59.630 UTC [policies] Evaluate -> DEBU 1495 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:16:59.631 UTC [policies] Evaluate -> DEBU 1496 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:16:59.632 UTC [cauthdsl] func1 -> DEBU 1497 0xc003b821a0 gate 1555913819631969500 evaluation starts" +"2019-04-22 06:16:59.632 UTC [cauthdsl] func2 -> DEBU 1498 0xc003b821a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:16:59.636 UTC [cauthdsl] func2 -> DEBU 1499 0xc003b821a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:16:59.636 UTC [cauthdsl] func2 -> DEBU 149a 0xc003b821a0 principal matched by identity 0" +"2019-04-22 06:16:59.636 UTC [msp.identity] Verify -> DEBU 149b Verify: digest = 00000000 a8 1d 14 86 8c c9 43 28 65 75 1f 30 67 ad b2 79 |......C(eu.0g..y| +00000010 5e 7a 00 41 f5 8d ae 56 91 3f fc a9 a7 75 6d 35 |^z.A...V.?...um5|" +"2019-04-22 06:16:59.637 UTC [msp.identity] Verify -> DEBU 149c Verify: sig = 00000000 30 45 02 21 00 9e 2c 0d 96 f6 2c 76 e1 38 75 74 |0E.!..,...,v.8ut| +00000010 54 1c f8 d5 07 d5 9b 9c 8c 91 4b 56 40 bd c8 e1 |T.........KV@...| +00000020 0e cc ea cf bc 02 20 51 7b 5e 72 45 fc f6 67 c0 |...... Q{^rE..g.| +00000030 dd e8 5e d0 fb bb d2 88 10 43 54 2a 27 3d 04 b0 |..^......CT*'=..| +00000040 21 1c d3 2a ae b3 e2 |!..*...|" +"2019-04-22 06:16:59.637 UTC [cauthdsl] func2 -> DEBU 149d 0xc003b821a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:16:59.637 UTC [cauthdsl] func1 -> DEBU 149e 0xc003b821a0 gate 1555913819631969500 evaluation succeeds" +"2019-04-22 06:16:59.637 UTC [policies] Evaluate -> DEBU 149f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:59.638 UTC [policies] Evaluate -> DEBU 14a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:16:59.638 UTC [policies] Evaluate -> DEBU 14a1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:16:59.638 UTC [policies] Evaluate -> DEBU 14a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:16:59.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a5 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 " +"2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 " +"2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:24 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:16:59.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 14a8 Exiting" +"2019-04-22 06:16:59.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 14a9 Exiting" +"2019-04-22 06:16:59.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14aa Exiting" +"2019-04-22 06:16:59.639 UTC [gossip.discovery] sendMemResponse -> DEBU 14ab Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:16:59.639 UTC [msp] DeserializeIdentity -> DEBU 14ac Obtaining identity" +"2019-04-22 06:16:59.639 UTC [msp] DeserializeIdentity -> DEBU 14ad Obtaining identity" +"2019-04-22 06:16:59.639 UTC [msp] DeserializeIdentity -> DEBU 14ae Obtaining identity" +"2019-04-22 06:16:59.639 UTC [gossip.comm] Send -> DEBU 14af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:16:59.640 UTC [gossip.discovery] sendMemResponse -> DEBU 14b0 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:16:59.640 UTC [gossip.comm] sendToEndpoint -> DEBU 14b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:16:59.640 UTC [gossip.comm] sendToEndpoint -> DEBU 14b2 Exiting" +"2019-04-22 06:17:00.034 UTC [gossip.gossip] handleMessage -> DEBU 14b3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.035 UTC [gossip.pull] HandleMessage -> DEBU 14b4 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.036 UTC [msp] DeserializeIdentity -> DEBU 14b5 Obtaining identity" +"2019-04-22 06:17:00.036 UTC [msp] DeserializeIdentity -> DEBU 14b6 Obtaining identity" +"2019-04-22 06:17:00.036 UTC [msp] DeserializeIdentity -> DEBU 14b7 Obtaining identity" +"2019-04-22 06:17:00.037 UTC [msp] DeserializeIdentity -> DEBU 14b8 Obtaining identity" +"2019-04-22 06:17:00.037 UTC [msp] DeserializeIdentity -> DEBU 14b9 Obtaining identity" +"2019-04-22 06:17:00.037 UTC [msp] DeserializeIdentity -> DEBU 14ba Obtaining identity" +"2019-04-22 06:17:00.037 UTC [gossip.pull] SendDigest -> DEBU 14bb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:00.038 UTC [gossip.gossip] handleMessage -> DEBU 14bc Exiting" +"2019-04-22 06:17:00.052 UTC [gossip.gossip] handleMessage -> DEBU 14bd Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.052 UTC [gossip.gossip] handleMessage -> DEBU 14be Exiting" +"2019-04-22 06:17:00.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.054 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14c0 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:00.056 UTC [msp] DeserializeIdentity -> DEBU 14c1 Obtaining identity" +"2019-04-22 06:17:00.056 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14c3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14c4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.057 UTC [policies] Evaluate -> DEBU 14c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.058 UTC [policies] Evaluate -> DEBU 14c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.058 UTC [policies] Evaluate -> DEBU 14c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.058 UTC [cauthdsl] func1 -> DEBU 14c8 0xc003bae480 gate 1555913820058796400 evaluation starts" +"2019-04-22 06:17:00.059 UTC [cauthdsl] func2 -> DEBU 14c9 0xc003bae480 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.059 UTC [cauthdsl] func2 -> DEBU 14ca 0xc003bae480 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.059 UTC [cauthdsl] func2 -> DEBU 14cb 0xc003bae480 principal matched by identity 0" +"2019-04-22 06:17:00.060 UTC [msp.identity] Verify -> DEBU 14cc Verify: digest = 00000000 28 f2 4f b2 dd aa 71 5e cf d2 6a 9d 9e e4 53 4d |(.O...q^..j...SM| +00000010 f3 c2 8d d5 75 6d c0 c7 9f bb 8b c9 5e 2c 99 24 |....um......^,.$|" +"2019-04-22 06:17:00.060 UTC [msp.identity] Verify -> DEBU 14cd Verify: sig = 00000000 30 44 02 20 3c dc 5c cf d3 0a 93 fa 26 1b 9f 3c |0D. <.\.....&..<| +00000010 8e c6 32 85 9a 02 63 5b 1a 1d bf fb d1 65 21 f4 |..2...c[.....e!.| +00000020 25 c6 79 46 02 20 54 ec 00 d8 f6 dc 0b 93 47 99 |%.yF. T.......G.| +00000030 ec e6 83 91 64 10 bc 66 4e 55 f0 ed ec 0c 51 d7 |....d..fNU....Q.| +00000040 4c fe 0c 17 cd b9 |L.....|" +"2019-04-22 06:17:00.061 UTC [cauthdsl] func2 -> DEBU 14ce 0xc003bae480 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.061 UTC [cauthdsl] func1 -> DEBU 14cf 0xc003bae480 gate 1555913820058796400 evaluation succeeds" +"2019-04-22 06:17:00.061 UTC [policies] Evaluate -> DEBU 14d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.062 UTC [policies] Evaluate -> DEBU 14d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.062 UTC [policies] Evaluate -> DEBU 14d2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.062 UTC [policies] Evaluate -> DEBU 14d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.062 UTC [gossip.discovery] handleAliveMessage -> DEBU 14d4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:00.062 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d6 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 " +"2019-04-22 06:17:00.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d7 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 " +"2019-04-22 06:17:00.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:22 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:00.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 14d9 Exiting" +"2019-04-22 06:17:00.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 14da Exiting" +"2019-04-22 06:17:00.063 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14db Exiting" +"2019-04-22 06:17:00.063 UTC [gossip.discovery] sendMemResponse -> DEBU 14dc Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:00.064 UTC [msp] DeserializeIdentity -> DEBU 14dd Obtaining identity" +"2019-04-22 06:17:00.064 UTC [msp] DeserializeIdentity -> DEBU 14de Obtaining identity" +"2019-04-22 06:17:00.064 UTC [msp] DeserializeIdentity -> DEBU 14df Obtaining identity" +"2019-04-22 06:17:00.064 UTC [gossip.comm] Send -> DEBU 14e0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:00.065 UTC [gossip.discovery] sendMemResponse -> DEBU 14e1 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:00.065 UTC [gossip.comm] sendToEndpoint -> DEBU 14e2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.065 UTC [gossip.comm] sendToEndpoint -> DEBU 14e3 Exiting" +"2019-04-22 06:17:00.425 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" +"2019-04-22 06:17:00.426 UTC [msp] DeserializeIdentity -> DEBU 14e5 Obtaining identity" +"2019-04-22 06:17:00.426 UTC [gossip.comm] Send -> DEBU 14e6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:00.426 UTC [gossip.comm] sendToEndpoint -> DEBU 14e7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.427 UTC [gossip.comm] sendToEndpoint -> DEBU 14e8 Exiting" +"2019-04-22 06:17:00.427 UTC [gossip.comm] sendToEndpoint -> DEBU 14e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.427 UTC [gossip.comm] sendToEndpoint -> DEBU 14ea Exiting" +"2019-04-22 06:17:00.428 UTC [gossip.comm] sendToEndpoint -> DEBU 14eb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.430 UTC [gossip.comm] sendToEndpoint -> DEBU 14ee Exiting" +"2019-04-22 06:17:00.429 UTC [msp] DeserializeIdentity -> DEBU 14ec Obtaining identity" +"2019-04-22 06:17:00.430 UTC [gossip.comm] func1 -> DEBU 14ed Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.432 UTC [gossip.comm] func1 -> DEBU 14ef Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.433 UTC [gossip.gossip] handleMessage -> DEBU 14f0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.434 UTC [msp] DeserializeIdentity -> DEBU 14f1 Obtaining identity" +"2019-04-22 06:17:00.435 UTC [msp] DeserializeIdentity -> DEBU 14f2 Obtaining identity" +"2019-04-22 06:17:00.436 UTC [gossip.comm] Send -> DEBU 14f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-04-22 06:17:00.436 UTC [msp] DeserializeIdentity -> DEBU 14f4 Obtaining identity" +"2019-04-22 06:17:00.436 UTC [msp] DeserializeIdentity -> DEBU 14f5 Obtaining identity" +"2019-04-22 06:17:00.437 UTC [msp.identity] Verify -> DEBU 14f6 Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +"2019-04-22 06:17:00.437 UTC [gossip.comm] sendToEndpoint -> DEBU 14f7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:00.437 UTC [gossip.comm] sendToEndpoint -> DEBU 14f9 Exiting" +"2019-04-22 06:17:00.437 UTC [msp.identity] Verify -> DEBU 14f8 Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +"2019-04-22 06:17:00.437 UTC [gossip.comm] sendToEndpoint -> DEBU 14fa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:00.438 UTC [gossip.comm] sendToEndpoint -> DEBU 14fc Exiting" +"2019-04-22 06:17:00.438 UTC [gossip.comm] sendToEndpoint -> DEBU 14fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913817276549100 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:00.438 UTC [gossip.comm] sendToEndpoint -> DEBU 14fd Exiting" +"2019-04-22 06:17:00.442 UTC [msp.identity] Verify -> DEBU 14fe Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +"2019-04-22 06:17:00.442 UTC [msp.identity] Verify -> DEBU 14ff Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +00000040 aa dd 99 2d 62 37 1c |...-b7.|" +"2019-04-22 06:17:00.443 UTC [msp] DeserializeIdentity -> DEBU 1500 Obtaining identity" +"2019-04-22 06:17:00.443 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" +"2019-04-22 06:17:00.444 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1502 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.444 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1503 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.444 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1504 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.444 UTC [policies] Evaluate -> DEBU 1505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.445 UTC [policies] Evaluate -> DEBU 1506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.445 UTC [policies] Evaluate -> DEBU 1507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.445 UTC [cauthdsl] func1 -> DEBU 1508 0xc003bf0430 gate 1555913820445569200 evaluation starts" +"2019-04-22 06:17:00.445 UTC [cauthdsl] func2 -> DEBU 1509 0xc003bf0430 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.446 UTC [cauthdsl] func2 -> DEBU 150a 0xc003bf0430 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.446 UTC [cauthdsl] func2 -> DEBU 150b 0xc003bf0430 principal matched by identity 0" +"2019-04-22 06:17:00.446 UTC [msp.identity] Verify -> DEBU 150c Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +"2019-04-22 06:17:00.446 UTC [msp.identity] Verify -> DEBU 150d Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +00000040 90 96 41 3c ce b6 f2 |..A<...|" +"2019-04-22 06:17:00.447 UTC [cauthdsl] func2 -> DEBU 150e 0xc003bf0430 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.447 UTC [cauthdsl] func1 -> DEBU 150f 0xc003bf0430 gate 1555913820445569200 evaluation succeeds" +"2019-04-22 06:17:00.447 UTC [policies] Evaluate -> DEBU 1510 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.447 UTC [policies] Evaluate -> DEBU 1511 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.447 UTC [policies] Evaluate -> DEBU 1512 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.448 UTC [policies] Evaluate -> DEBU 1513 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.448 UTC [msp] DeserializeIdentity -> DEBU 1514 Obtaining identity" +"2019-04-22 06:17:00.448 UTC [msp] DeserializeIdentity -> DEBU 1515 Obtaining identity" +"2019-04-22 06:17:00.449 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1516 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1517 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1518 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.449 UTC [policies] Evaluate -> DEBU 1519 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.449 UTC [policies] Evaluate -> DEBU 151a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.449 UTC [policies] Evaluate -> DEBU 151b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.450 UTC [cauthdsl] func1 -> DEBU 151c 0xc003bf1c00 gate 1555913820450214700 evaluation starts" +"2019-04-22 06:17:00.450 UTC [cauthdsl] func2 -> DEBU 151d 0xc003bf1c00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.450 UTC [cauthdsl] func2 -> DEBU 151e 0xc003bf1c00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.450 UTC [cauthdsl] func2 -> DEBU 151f 0xc003bf1c00 principal matched by identity 0" +"2019-04-22 06:17:00.451 UTC [msp.identity] Verify -> DEBU 1520 Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +"2019-04-22 06:17:00.451 UTC [msp.identity] Verify -> DEBU 1521 Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +00000040 dc 88 1b 8e 89 e0 |......|" +"2019-04-22 06:17:00.452 UTC [cauthdsl] func2 -> DEBU 1522 0xc003bf1c00 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.452 UTC [cauthdsl] func1 -> DEBU 1523 0xc003bf1c00 gate 1555913820450214700 evaluation succeeds" +"2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1524 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1525 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1526 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.453 UTC [policies] Evaluate -> DEBU 1527 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.453 UTC [msp] DeserializeIdentity -> DEBU 1528 Obtaining identity" +"2019-04-22 06:17:00.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1529 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 152a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.454 UTC [policies] Evaluate -> DEBU 152b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.454 UTC [policies] Evaluate -> DEBU 152c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.454 UTC [policies] Evaluate -> DEBU 152d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.455 UTC [cauthdsl] func1 -> DEBU 152e 0xc003c08ce0 gate 1555913820455061500 evaluation starts" +"2019-04-22 06:17:00.455 UTC [cauthdsl] func2 -> DEBU 152f 0xc003c08ce0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.455 UTC [cauthdsl] func2 -> DEBU 1530 0xc003c08ce0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.455 UTC [cauthdsl] func2 -> DEBU 1531 0xc003c08ce0 principal matched by identity 0" +"2019-04-22 06:17:00.455 UTC [msp.identity] Verify -> DEBU 1532 Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +"2019-04-22 06:17:00.455 UTC [msp.identity] Verify -> DEBU 1533 Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +00000040 dc 88 1b 8e 89 e0 |......|" +"2019-04-22 06:17:00.456 UTC [cauthdsl] func2 -> DEBU 1534 0xc003c08ce0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.456 UTC [cauthdsl] func1 -> DEBU 1535 0xc003c08ce0 gate 1555913820455061500 evaluation succeeds" +"2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1536 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1537 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1538 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.456 UTC [policies] Evaluate -> DEBU 1539 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.457 UTC [gossip.gossip] handleMessage -> DEBU 153a Exiting" +"2019-04-22 06:17:00.457 UTC [gossip.gossip] handleMessage -> DEBU 153b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.458 UTC [msp.identity] Verify -> DEBU 153c Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +"2019-04-22 06:17:00.458 UTC [msp.identity] Verify -> DEBU 153d Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +"2019-04-22 06:17:00.458 UTC [msp] DeserializeIdentity -> DEBU 153e Obtaining identity" +"2019-04-22 06:17:00.459 UTC [msp] DeserializeIdentity -> DEBU 153f Obtaining identity" +"2019-04-22 06:17:00.459 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1540 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1541 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1542 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.460 UTC [policies] Evaluate -> DEBU 1543 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.460 UTC [policies] Evaluate -> DEBU 1544 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.460 UTC [policies] Evaluate -> DEBU 1545 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.460 UTC [cauthdsl] func1 -> DEBU 1546 0xc003c14e10 gate 1555913820460743700 evaluation starts" +"2019-04-22 06:17:00.460 UTC [cauthdsl] func2 -> DEBU 1547 0xc003c14e10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.460 UTC [msp] DeserializeIdentity -> DEBU 1549 Obtaining identity" +"2019-04-22 06:17:00.461 UTC [cauthdsl] func2 -> DEBU 1548 0xc003c14e10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.462 UTC [cauthdsl] func2 -> DEBU 154a 0xc003c14e10 principal matched by identity 0" +"2019-04-22 06:17:00.462 UTC [msp.identity] Verify -> DEBU 154b Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +"2019-04-22 06:17:00.462 UTC [msp.identity] Verify -> DEBU 154c Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +00000040 aa 36 98 36 42 e6 |.6.6B.|" +"2019-04-22 06:17:00.463 UTC [cauthdsl] func2 -> DEBU 154d 0xc003c14e10 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.463 UTC [cauthdsl] func1 -> DEBU 154e 0xc003c14e10 gate 1555913820460743700 evaluation succeeds" +"2019-04-22 06:17:00.463 UTC [policies] Evaluate -> DEBU 154f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.463 UTC [policies] Evaluate -> DEBU 1550 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.464 UTC [policies] Evaluate -> DEBU 1551 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.464 UTC [policies] Evaluate -> DEBU 1552 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.465 UTC [msp] DeserializeIdentity -> DEBU 1553 Obtaining identity" +"2019-04-22 06:17:00.465 UTC [msp] DeserializeIdentity -> DEBU 1554 Obtaining identity" +"2019-04-22 06:17:00.466 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1555 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1556 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1557 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.467 UTC [policies] Evaluate -> DEBU 1558 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.467 UTC [policies] Evaluate -> DEBU 1559 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.467 UTC [policies] Evaluate -> DEBU 155a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.468 UTC [cauthdsl] func1 -> DEBU 155b 0xc003c2e5e0 gate 1555913820468081600 evaluation starts" +"2019-04-22 06:17:00.468 UTC [cauthdsl] func2 -> DEBU 155c 0xc003c2e5e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.468 UTC [cauthdsl] func2 -> DEBU 155d 0xc003c2e5e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.468 UTC [cauthdsl] func2 -> DEBU 155e 0xc003c2e5e0 principal matched by identity 0" +"2019-04-22 06:17:00.468 UTC [msp.identity] Verify -> DEBU 155f Verify: digest = 00000000 ef 1c b6 b9 29 02 09 f1 be 3e b7 76 bb d0 68 af |....)....>.v..h.| +00000010 aa 39 93 cc 4c 76 e9 51 86 5d b3 57 1b 2b 5a d0 |.9..Lv.Q.].W.+Z.|" +"2019-04-22 06:17:00.469 UTC [msp.identity] Verify -> DEBU 1560 Verify: sig = 00000000 30 45 02 21 00 88 d1 79 a2 8f 89 a6 bd 7e 6a e0 |0E.!...y.....~j.| +00000010 f0 cf e6 c7 16 44 10 6b 82 02 1a 0a 01 70 8c 47 |.....D.k.....p.G| +00000020 f5 76 91 3d af 02 20 67 82 65 df b8 a2 c1 13 fc |.v.=.. g.e......| +00000030 d7 3b 8d 96 3e 52 49 37 84 c5 2a 43 20 31 df 56 |.;..>RI7..*C 1.V| +00000040 90 96 41 3c ce b6 f2 |..A<...|" +"2019-04-22 06:17:00.469 UTC [cauthdsl] func2 -> DEBU 1561 0xc003c2e5e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.469 UTC [cauthdsl] func1 -> DEBU 1562 0xc003c2e5e0 gate 1555913820468081600 evaluation succeeds" +"2019-04-22 06:17:00.469 UTC [policies] Evaluate -> DEBU 1563 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.470 UTC [policies] Evaluate -> DEBU 1564 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.470 UTC [policies] Evaluate -> DEBU 1565 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.470 UTC [policies] Evaluate -> DEBU 1566 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.471 UTC [msp.identity] Verify -> DEBU 1567 Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +"2019-04-22 06:17:00.471 UTC [msp.identity] Verify -> DEBU 1568 Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +00000040 4d 34 56 e4 dd 25 |M4V..%|" +"2019-04-22 06:17:00.472 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1569 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.472 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 156a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.472 UTC [policies] Evaluate -> DEBU 156b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.472 UTC [policies] Evaluate -> DEBU 156c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.473 UTC [policies] Evaluate -> DEBU 156d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.473 UTC [cauthdsl] func1 -> DEBU 156e 0xc003c2fce0 gate 1555913820473258100 evaluation starts" +"2019-04-22 06:17:00.473 UTC [cauthdsl] func2 -> DEBU 156f 0xc003c2fce0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.473 UTC [cauthdsl] func2 -> DEBU 1570 0xc003c2fce0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.473 UTC [cauthdsl] func2 -> DEBU 1571 0xc003c2fce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:00.474 UTC [cauthdsl] func2 -> DEBU 1572 0xc003c2fce0 principal evaluation fails" +"2019-04-22 06:17:00.474 UTC [cauthdsl] func1 -> DEBU 1573 0xc003c2fce0 gate 1555913820473258100 evaluation fails" +"2019-04-22 06:17:00.474 UTC [policies] Evaluate -> DEBU 1574 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.475 UTC [policies] Evaluate -> DEBU 1575 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.475 UTC [policies] Evaluate -> DEBU 1576 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:00.475 UTC [cauthdsl] func1 -> DEBU 1577 0xc003c44520 gate 1555913820475398200 evaluation starts" +"2019-04-22 06:17:00.475 UTC [cauthdsl] func2 -> DEBU 1578 0xc003c44520 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.476 UTC [cauthdsl] func2 -> DEBU 1579 0xc003c44520 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.476 UTC [cauthdsl] func2 -> DEBU 157a 0xc003c44520 principal matched by identity 0" +"2019-04-22 06:17:00.476 UTC [msp.identity] Verify -> DEBU 157b Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +"2019-04-22 06:17:00.477 UTC [msp] DeserializeIdentity -> DEBU 157c Obtaining identity" +"2019-04-22 06:17:00.477 UTC [gossip.pull] Hello -> DEBU 157d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:00.477 UTC [msp.identity] Verify -> DEBU 157e Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +00000040 4d 34 56 e4 dd 25 |M4V..%|" +"2019-04-22 06:17:00.478 UTC [cauthdsl] func2 -> DEBU 157f 0xc003c44520 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.478 UTC [cauthdsl] func1 -> DEBU 1581 0xc003c44520 gate 1555913820475398200 evaluation succeeds" +"2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1582 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1583 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1584 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.479 UTC [policies] Evaluate -> DEBU 1585 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.478 UTC [msp] DeserializeIdentity -> DEBU 1580 Obtaining identity" +"2019-04-22 06:17:00.480 UTC [gossip.gossip] handleMessage -> DEBU 1586 Exiting" +"2019-04-22 06:17:00.480 UTC [gossip.gossip] handleMessage -> DEBU 1587 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.480 UTC [msp] DeserializeIdentity -> DEBU 1589 Obtaining identity" +"2019-04-22 06:17:00.480 UTC [msp] DeserializeIdentity -> DEBU 1588 Obtaining identity" +"2019-04-22 06:17:00.481 UTC [gossip.comm] Send -> DEBU 158a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:00.481 UTC [msp.identity] Verify -> DEBU 158b Verify: digest = 00000000 bc d5 91 0c 85 d6 5e f8 ca cc 46 bb 49 a2 7e 30 |......^...F.I.~0| +00000010 82 ab e8 49 88 d8 9c 48 64 35 e9 33 65 20 ca 2e |...I...Hd5.3e ..|" +"2019-04-22 06:17:00.481 UTC [msp.identity] Verify -> DEBU 158d Verify: sig = 00000000 30 45 02 21 00 f4 a0 9d 86 ff 76 6a 06 b5 41 af |0E.!......vj..A.| +00000010 ac 1a 18 5c 32 db 53 c5 01 28 78 4b b2 59 5a ff |...\2.S..(xK.YZ.| +00000020 d9 0c ba e1 e6 02 20 4f 92 2b 24 ec ef 5a 08 ec |...... O.+$..Z..| +00000030 2f d1 00 aa 52 e5 6c 45 05 f3 97 6b ab 7c 31 38 |/...R.lE...k.|18| +00000040 be 8d 2d 86 c7 79 27 |..-..y'|" +"2019-04-22 06:17:00.481 UTC [gossip.comm] sendToEndpoint -> DEBU 158c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.482 UTC [gossip.comm] sendToEndpoint -> DEBU 158e Exiting" +"2019-04-22 06:17:00.482 UTC [msp.identity] Verify -> DEBU 158f Verify: digest = 00000000 d0 41 16 2e 01 40 02 d0 11 05 22 22 7e ee 34 04 |.A...@....""~.4.| +00000010 3d ec dd 26 c7 84 6e 48 ce 98 0d 83 f7 e9 c4 d3 |=..&..nH........|" +"2019-04-22 06:17:00.484 UTC [msp.identity] Verify -> DEBU 1590 Verify: sig = 00000000 30 45 02 21 00 fd a5 88 6f da a4 8a cd 8d 5c b3 |0E.!....o.....\.| +00000010 1f 4b 07 bb c0 aa 1e 25 56 5a 00 59 90 01 0f bf |.K.....%VZ.Y....| +00000020 c1 c1 fd 38 48 02 20 74 a9 db 35 b7 06 0d f0 0e |...8H. t..5.....| +00000030 b5 61 02 7a 21 82 f4 6c 1b a1 3e 93 b8 34 bb 4f |.a.z!..l..>..4.O| +00000040 aa dd 99 2d 62 37 1c |...-b7.|" +"2019-04-22 06:17:00.484 UTC [gossip.comm] func1 -> DEBU 1591 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17542010109647925644 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.485 UTC [msp] DeserializeIdentity -> DEBU 1592 Obtaining identity" +"2019-04-22 06:17:00.485 UTC [msp] DeserializeIdentity -> DEBU 1593 Obtaining identity" +"2019-04-22 06:17:00.486 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1594 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.486 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1595 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.486 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1596 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.486 UTC [policies] Evaluate -> DEBU 1597 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.486 UTC [policies] Evaluate -> DEBU 1598 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.487 UTC [policies] Evaluate -> DEBU 1599 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.487 UTC [cauthdsl] func1 -> DEBU 159a 0xc003c5f570 gate 1555913820487137400 evaluation starts" +"2019-04-22 06:17:00.487 UTC [cauthdsl] func2 -> DEBU 159b 0xc003c5f570 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.487 UTC [cauthdsl] func2 -> DEBU 159c 0xc003c5f570 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.488 UTC [cauthdsl] func2 -> DEBU 159d 0xc003c5f570 principal matched by identity 0" +"2019-04-22 06:17:00.488 UTC [msp.identity] Verify -> DEBU 159e Verify: digest = 00000000 81 06 e9 cc 96 51 4f ea f5 f6 94 c9 c3 32 87 2b |.....QO......2.+| +00000010 2b ad ec a7 b2 d2 a2 c2 a1 0b ae 52 b8 bb b4 5a |+..........R...Z|" +"2019-04-22 06:17:00.488 UTC [msp.identity] Verify -> DEBU 159f Verify: sig = 00000000 30 44 02 20 45 ba a3 3d c7 f1 f9 c0 72 20 71 c6 |0D. E..=....r q.| +00000010 d3 f2 44 ac 74 2e c7 13 2e 93 c5 a1 1a 55 de a7 |..D.t........U..| +00000020 49 4a 66 3c 02 20 22 7f 6f 17 53 ca 22 a6 84 87 |IJf<. ".o.S."...| +00000030 83 0c 16 d8 e2 b4 5d f9 1f 1b 20 d2 13 1f 0d 5c |......]... ....\| +00000040 aa 36 98 36 42 e6 |.6.6B.|" +"2019-04-22 06:17:00.489 UTC [cauthdsl] func2 -> DEBU 15a0 0xc003c5f570 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.489 UTC [cauthdsl] func1 -> DEBU 15a1 0xc003c5f570 gate 1555913820487137400 evaluation succeeds" +"2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a4 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.489 UTC [policies] Evaluate -> DEBU 15a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.490 UTC [msp] DeserializeIdentity -> DEBU 15a6 Obtaining identity" +"2019-04-22 06:17:00.490 UTC [msp] DeserializeIdentity -> DEBU 15a7 Obtaining identity" +"2019-04-22 06:17:00.491 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.491 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15a9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.491 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15aa Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.491 UTC [policies] Evaluate -> DEBU 15ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.491 UTC [policies] Evaluate -> DEBU 15ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.492 UTC [policies] Evaluate -> DEBU 15ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.492 UTC [cauthdsl] func1 -> DEBU 15ae 0xc003c72d40 gate 1555913820492280300 evaluation starts" +"2019-04-22 06:17:00.492 UTC [cauthdsl] func2 -> DEBU 15af 0xc003c72d40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.492 UTC [cauthdsl] func2 -> DEBU 15b0 0xc003c72d40 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.492 UTC [cauthdsl] func2 -> DEBU 15b1 0xc003c72d40 principal matched by identity 0" +"2019-04-22 06:17:00.493 UTC [msp.identity] Verify -> DEBU 15b2 Verify: digest = 00000000 82 84 ad 98 1e dd 70 2a 51 ec fa 32 8e 3d 9d e6 |......p*Q..2.=..| +00000010 af d4 c7 75 57 6f ea 33 67 5b 5a 17 af 6c 1b 9a |...uWo.3g[Z..l..|" +"2019-04-22 06:17:00.493 UTC [msp.identity] Verify -> DEBU 15b3 Verify: sig = 00000000 30 44 02 20 51 c4 48 61 aa 06 39 f1 4b c3 41 fa |0D. Q.Ha..9.K.A.| +00000010 53 bc ae b0 70 b8 99 88 46 ce fb 7a c2 54 95 c1 |S...p...F..z.T..| +00000020 07 76 3e 9f 02 20 65 ea 05 41 fc 1b 38 e3 4a e4 |.v>.. e..A..8.J.| +00000030 cf d5 63 01 ec fe b9 8e 43 fc 3d 4a 50 01 b1 3e |..c.....C.=JP..>| +00000040 b3 8c 91 40 a7 e5 |...@..|" +"2019-04-22 06:17:00.493 UTC [cauthdsl] func2 -> DEBU 15b4 0xc003c72d40 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.494 UTC [cauthdsl] func1 -> DEBU 15b5 0xc003c72d40 gate 1555913820492280300 evaluation succeeds" +"2019-04-22 06:17:00.494 UTC [policies] Evaluate -> DEBU 15b6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.494 UTC [policies] Evaluate -> DEBU 15b7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.494 UTC [policies] Evaluate -> DEBU 15b8 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.495 UTC [policies] Evaluate -> DEBU 15b9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.496 UTC [msp] DeserializeIdentity -> DEBU 15ba Obtaining identity" +"2019-04-22 06:17:00.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bb Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15bc Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.497 UTC [policies] Evaluate -> DEBU 15bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.497 UTC [policies] Evaluate -> DEBU 15be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.497 UTC [policies] Evaluate -> DEBU 15bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.497 UTC [cauthdsl] func1 -> DEBU 15c0 0xc003c73e20 gate 1555913820497798600 evaluation starts" +"2019-04-22 06:17:00.498 UTC [cauthdsl] func2 -> DEBU 15c1 0xc003c73e20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.498 UTC [cauthdsl] func2 -> DEBU 15c2 0xc003c73e20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.498 UTC [cauthdsl] func2 -> DEBU 15c3 0xc003c73e20 principal matched by identity 0" +"2019-04-22 06:17:00.498 UTC [msp.identity] Verify -> DEBU 15c4 Verify: digest = 00000000 82 84 ad 98 1e dd 70 2a 51 ec fa 32 8e 3d 9d e6 |......p*Q..2.=..| +00000010 af d4 c7 75 57 6f ea 33 67 5b 5a 17 af 6c 1b 9a |...uWo.3g[Z..l..|" +"2019-04-22 06:17:00.499 UTC [msp.identity] Verify -> DEBU 15c5 Verify: sig = 00000000 30 44 02 20 51 c4 48 61 aa 06 39 f1 4b c3 41 fa |0D. Q.Ha..9.K.A.| +00000010 53 bc ae b0 70 b8 99 88 46 ce fb 7a c2 54 95 c1 |S...p...F..z.T..| +00000020 07 76 3e 9f 02 20 65 ea 05 41 fc 1b 38 e3 4a e4 |.v>.. e..A..8.J.| +00000030 cf d5 63 01 ec fe b9 8e 43 fc 3d 4a 50 01 b1 3e |..c.....C.=JP..>| +00000040 b3 8c 91 40 a7 e5 |...@..|" +"2019-04-22 06:17:00.499 UTC [cauthdsl] func2 -> DEBU 15c6 0xc003c73e20 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.499 UTC [cauthdsl] func1 -> DEBU 15c7 0xc003c73e20 gate 1555913820497798600 evaluation succeeds" +"2019-04-22 06:17:00.499 UTC [policies] Evaluate -> DEBU 15c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.499 UTC [policies] Evaluate -> DEBU 15c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.500 UTC [policies] Evaluate -> DEBU 15ca Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.500 UTC [policies] Evaluate -> DEBU 15cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.500 UTC [gossip.gossip] handleMessage -> DEBU 15cc Exiting" +"2019-04-22 06:17:00.501 UTC [gossip.gossip] handleMessage -> DEBU 15cd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17542010109647925644 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.501 UTC [gossip.pull] HandleMessage -> DEBU 15ce GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17542010109647925644 , Msg_type: BLOCK_MSG, digests: [1 2 3 4], Envelope: 46 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.501 UTC [gossip.gossip] handleMessage -> DEBU 15cf Exiting" +"2019-04-22 06:17:00.682 UTC [gossip.comm] func1 -> DEBU 15d0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.683 UTC [gossip.gossip] handleMessage -> DEBU 15d1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.684 UTC [msp] DeserializeIdentity -> DEBU 15d2 Obtaining identity" +"2019-04-22 06:17:00.684 UTC [msp] DeserializeIdentity -> DEBU 15d3 Obtaining identity" +"2019-04-22 06:17:00.685 UTC [gossip.gossip] handleMessage -> DEBU 15d4 Exiting" +"2019-04-22 06:17:00.711 UTC [gossip.gossip] handleMessage -> DEBU 15d5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.711 UTC [msp.identity] Verify -> DEBU 15d6 Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +"2019-04-22 06:17:00.711 UTC [msp.identity] Verify -> DEBU 15d7 Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +00000040 4d 34 56 e4 dd 25 |M4V..%|" +"2019-04-22 06:17:00.712 UTC [msp] DeserializeIdentity -> DEBU 15d8 Obtaining identity" +"2019-04-22 06:17:00.712 UTC [gossip.gossip] handleMessage -> DEBU 15d9 Exiting" +"2019-04-22 06:17:00.713 UTC [gossip.comm] func1 -> DEBU 15da Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.713 UTC [gossip.gossip] handleMessage -> DEBU 15db Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.714 UTC [msp.identity] Verify -> DEBU 15dc Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +"2019-04-22 06:17:00.714 UTC [msp.identity] Verify -> DEBU 15dd Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +00000040 4d 34 56 e4 dd 25 |M4V..%|" +"2019-04-22 06:17:00.715 UTC [msp] DeserializeIdentity -> DEBU 15de Obtaining identity" +"2019-04-22 06:17:00.715 UTC [gossip.gossip] handleMessage -> DEBU 15df Exiting" +"2019-04-22 06:17:00.715 UTC [gossip.comm] func1 -> DEBU 15e0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.716 UTC [gossip.comm] func1 -> DEBU 15e1 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.716 UTC [gossip.gossip] handleMessage -> DEBU 15e2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.717 UTC [gossip.pull] HandleMessage -> DEBU 15e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.717 UTC [gossip.pull] SendDigest -> DEBU 15e4 Sending BLOCK_MSG digest: [1 2 3 4] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:00.719 UTC [gossip.gossip] handleMessage -> DEBU 15e5 Exiting" +"2019-04-22 06:17:00.719 UTC [gossip.gossip] handleMessage -> DEBU 15e6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913817242908100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.719 UTC [msp.identity] Verify -> DEBU 15e7 Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +"2019-04-22 06:17:00.719 UTC [msp.identity] Verify -> DEBU 15e8 Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +00000040 4d 34 56 e4 dd 25 |M4V..%|" +"2019-04-22 06:17:00.719 UTC [gossip.gossip] handleMessage -> DEBU 15e9 Exiting" +"2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15ea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151017 " +"2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15eb Sign: digest: 6BD237304AD2ADB7C08E1B15C6E287120F4886805257A5E268E1225AEEFDD75F " +"2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15ec Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:00.850 UTC [msp.identity] Sign -> DEBU 15ed Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:00.851 UTC [gossip.discovery] periodicalSendAlive -> DEBU 15ee Sleeping 5s" +"2019-04-22 06:17:00.854 UTC [msp] DeserializeIdentity -> DEBU 15ef Obtaining identity" +"2019-04-22 06:17:00.854 UTC [msp] DeserializeIdentity -> DEBU 15f0 Obtaining identity" +"2019-04-22 06:17:00.855 UTC [msp] DeserializeIdentity -> DEBU 15f1 Obtaining identity" +"2019-04-22 06:17:00.855 UTC [gossip.comm] Send -> DEBU 15f2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:00.856 UTC [msp] DeserializeIdentity -> DEBU 15f3 Obtaining identity" +"2019-04-22 06:17:00.856 UTC [gossip.comm] Send -> DEBU 15f4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:00.856 UTC [gossip.comm] sendToEndpoint -> DEBU 15f5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:00.857 UTC [gossip.comm] sendToEndpoint -> DEBU 15f6 Exiting" +"2019-04-22 06:17:00.857 UTC [gossip.comm] Send -> DEBU 15f7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:00.858 UTC [gossip.comm] sendToEndpoint -> DEBU 15f8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:00.858 UTC [gossip.comm] sendToEndpoint -> DEBU 15f9 Exiting" +"2019-04-22 06:17:00.860 UTC [gossip.comm] sendToEndpoint -> DEBU 15fa Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:23 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:00.861 UTC [gossip.comm] sendToEndpoint -> DEBU 15fb Exiting" +"2019-04-22 06:17:00.906 UTC [gossip.gossip] handleMessage -> DEBU 15fc Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.907 UTC [msp] DeserializeIdentity -> DEBU 15fd Obtaining identity" +"2019-04-22 06:17:00.908 UTC [msp] DeserializeIdentity -> DEBU 15fe Obtaining identity" +"2019-04-22 06:17:00.908 UTC [msp] DeserializeIdentity -> DEBU 15ff Obtaining identity" +"2019-04-22 06:17:00.909 UTC [gossip.gossip] handleMessage -> DEBU 1600 Exiting" +"2019-04-22 06:17:00.914 UTC [gossip.gossip] handleMessage -> DEBU 1601 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913817265788600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.914 UTC [msp] DeserializeIdentity -> DEBU 1602 Obtaining identity" +"2019-04-22 06:17:00.915 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1603 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.915 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1604 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.916 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1605 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.916 UTC [policies] Evaluate -> DEBU 1606 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.916 UTC [policies] Evaluate -> DEBU 1607 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.917 UTC [policies] Evaluate -> DEBU 1608 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.917 UTC [cauthdsl] func1 -> DEBU 1609 0xc003caffd0 gate 1555913820917682500 evaluation starts" +"2019-04-22 06:17:00.919 UTC [gossip.comm] func1 -> DEBU 160a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913817265788600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.938 UTC [cauthdsl] func2 -> DEBU 160b 0xc003caffd0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.941 UTC [cauthdsl] func2 -> DEBU 160c 0xc003caffd0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.942 UTC [cauthdsl] func2 -> DEBU 160d 0xc003caffd0 principal matched by identity 0" +"2019-04-22 06:17:00.943 UTC [msp.identity] Verify -> DEBU 160e Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +"2019-04-22 06:17:00.944 UTC [msp.identity] Verify -> DEBU 160f Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +00000040 dc 88 1b 8e 89 e0 |......|" +"2019-04-22 06:17:00.950 UTC [cauthdsl] func2 -> DEBU 1610 0xc003caffd0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.951 UTC [cauthdsl] func1 -> DEBU 1611 0xc003caffd0 gate 1555913820917682500 evaluation succeeds" +"2019-04-22 06:17:00.951 UTC [policies] Evaluate -> DEBU 1612 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.952 UTC [policies] Evaluate -> DEBU 1613 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.952 UTC [policies] Evaluate -> DEBU 1614 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.952 UTC [policies] Evaluate -> DEBU 1615 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.953 UTC [msp] DeserializeIdentity -> DEBU 1617 Obtaining identity" +"2019-04-22 06:17:00.952 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1616 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.956 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 1618 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.956 UTC [policies] Evaluate -> DEBU 1619 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:17:00.956 UTC [policies] Evaluate -> DEBU 161a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.956 UTC [policies] Evaluate -> DEBU 161b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:17:00.956 UTC [cauthdsl] func1 -> DEBU 161c 0xc003ce0e20 gate 1555913820956472700 evaluation starts" +"2019-04-22 06:17:00.956 UTC [cauthdsl] func2 -> DEBU 161e 0xc003ce0e20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.956 UTC [cauthdsl] func2 -> DEBU 161f 0xc003ce0e20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.956 UTC [cauthdsl] func2 -> DEBU 1620 0xc003ce0e20 principal matched by identity 0" +"2019-04-22 06:17:00.957 UTC [msp.identity] Verify -> DEBU 1621 Verify: digest = 00000000 84 fd ab 8d f2 6b 37 c0 fd 65 1b 79 a0 7f 4a 24 |.....k7..e.y..J$| +00000010 c0 4a 27 63 66 3e 58 5a b5 9a 6d 1f 3a eb d8 73 |.J'cf>XZ..m.:..s|" +"2019-04-22 06:17:00.957 UTC [msp.identity] Verify -> DEBU 1622 Verify: sig = 00000000 30 45 02 21 00 bb dd 4e 1d 38 68 52 af a8 bb d4 |0E.!...N.8hR....| +00000010 18 59 0c c4 e8 28 54 16 06 14 dd 37 87 f1 d3 e3 |.Y...(T....7....| +00000020 ff 68 bd da ee 02 20 16 46 94 ea 77 a3 36 07 57 |.h.... .F..w.6.W| +00000030 f6 4c cf 81 0f 47 55 a5 dd 1e d4 8d 25 6f e4 b2 |.L...GU.....%o..| +00000040 28 fe da c2 b2 f7 d8 |(......|" +"2019-04-22 06:17:00.957 UTC [cauthdsl] func2 -> DEBU 1623 0xc003ce0e20 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.957 UTC [cauthdsl] func1 -> DEBU 1624 0xc003ce0e20 gate 1555913820956472700 evaluation succeeds" +"2019-04-22 06:17:00.957 UTC [policies] Evaluate -> DEBU 1625 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:00.957 UTC [policies] Evaluate -> DEBU 1626 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:00.957 UTC [policies] Evaluate -> DEBU 1627 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:00.958 UTC [policies] Evaluate -> DEBU 1628 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:00.958 UTC [blocksProvider] DeliverBlocks -> DEBU 1629 [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-04-22 06:17:00.958 UTC [gossip.state] addPayload -> DEBU 162a [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-04-22 06:17:00.958 UTC [gossip.state] addPayload -> DEBU 162b Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:17:00.958 UTC [blocksProvider] DeliverBlocks -> DEBU 162c [businesschannel] Gossiping block [5], peers number [3]" +"2019-04-22 06:17:00.955 UTC [gossip.gossip] handleMessage -> DEBU 161d Exiting" +"2019-04-22 06:17:00.959 UTC [gossip.gossip] handleMessage -> DEBU 162e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913817265788600 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:5 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:00.959 UTC [gossip.state] deliverPayloads -> DEBU 162f [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +"2019-04-22 06:17:00.959 UTC [gossip.state] deliverPayloads -> DEBU 1630 [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +"2019-04-22 06:17:00.959 UTC [gossip.privdata] StoreBlock -> INFO 1631 [businesschannel] Received block [5] from buffer" +"2019-04-22 06:17:00.960 UTC [gossip.privdata] StoreBlock -> DEBU 1632 [businesschannel] Validating block [5]" +"2019-04-22 06:17:00.960 UTC [committer.txvalidator] Validate -> DEBU 1633 [businesschannel] START Block Validation for block [5]" +"2019-04-22 06:17:00.959 UTC [msp] DeserializeIdentity -> DEBU 1634 Obtaining identity" +"2019-04-22 06:17:00.961 UTC [committer.txvalidator] validateTx -> DEBU 1636 [businesschannel] validateTx starts for block 0xc003b15a00 env 0xc003c27ea0 txn 0" +"2019-04-22 06:17:00.961 UTC [protoutils] ValidateTransaction -> DEBU 1637 ValidateTransactionEnvelope starts for envelope 0xc003c27ea0" +"2019-04-22 06:17:00.961 UTC [protoutils] ValidateTransaction -> DEBU 1638 Header is channel_header:"\010\003\032\014\010\332\270\365\345\005\020\254\356\305\242\002\"\017businesschannel*@7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\0307\361D\354S\337KT\2032\335\364\314,\224c\216\362+\t\242\331\335." " +"2019-04-22 06:17:00.961 UTC [protoutils] validateChannelHeader -> DEBU 1639 validateChannelHeader info: header type 3" +"2019-04-22 06:17:00.961 UTC [protoutils] checkSignatureFromCreator -> DEBU 163a begin" +"2019-04-22 06:17:00.961 UTC [msp] GetManagerForChain -> DEBU 163b Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:00.962 UTC [protoutils] checkSignatureFromCreator -> DEBU 163c creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:00.962 UTC [protoutils] checkSignatureFromCreator -> DEBU 163d creator is valid" +"2019-04-22 06:17:00.961 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 163e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:00.962 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1640 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.960 UTC [committer.txvalidator] Validate -> DEBU 1635 expecting 1 block validation responses" +"2019-04-22 06:17:00.962 UTC [msp.identity] Verify -> DEBU 163f Verify: digest = 00000000 40 4c 26 4c fb 34 d1 c3 d2 5f f2 5e 28 85 0a 26 |@L&L.4..._.^(..&| +00000010 54 e4 8b e2 03 db 5d dc ca 5f 9a 06 d2 68 86 b9 |T.....].._...h..|" +"2019-04-22 06:17:00.959 UTC [gossip.channel] AddToMsgStore -> DEBU 162d Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5726 bytes, seq: 5}, Envelope: 5756 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:17:00.964 UTC [gossip.pull] Add -> DEBU 1643 Added 5, total items: 5" +"2019-04-22 06:17:00.963 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1641 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:00.965 UTC [policies] Evaluate -> DEBU 1644 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:00.965 UTC [policies] Evaluate -> DEBU 1645 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.966 UTC [policies] Evaluate -> DEBU 1646 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:00.966 UTC [cauthdsl] func1 -> DEBU 1647 0xc003d14cb0 gate 1555913820966783000 evaluation starts" +"2019-04-22 06:17:00.967 UTC [cauthdsl] func2 -> DEBU 1648 0xc003d14cb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:00.968 UTC [cauthdsl] func2 -> DEBU 1649 0xc003d14cb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.968 UTC [cauthdsl] func2 -> DEBU 164a 0xc003d14cb0 principal matched by identity 0" +"2019-04-22 06:17:00.969 UTC [msp.identity] Verify -> DEBU 164b Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +"2019-04-22 06:17:00.969 UTC [msp.identity] Verify -> DEBU 164c Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +00000040 dc 88 1b 8e 89 e0 |......|" +"2019-04-22 06:17:00.970 UTC [cauthdsl] func2 -> DEBU 164d 0xc003d14cb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.971 UTC [cauthdsl] func1 -> DEBU 164e 0xc003d14cb0 gate 1555913820966783000 evaluation succeeds" +"2019-04-22 06:17:00.971 UTC [policies] Evaluate -> DEBU 164f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.972 UTC [policies] Evaluate -> DEBU 1650 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:00.972 UTC [policies] Evaluate -> DEBU 1651 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:00.973 UTC [policies] Evaluate -> DEBU 1652 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:00.973 UTC [msp] DeserializeIdentity -> DEBU 1653 Obtaining identity" +"2019-04-22 06:17:00.974 UTC [gossip.gossip] handleMessage -> DEBU 1654 Exiting" +"2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1655 Obtaining identity" +"2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1656 Obtaining identity" +"2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1657 Obtaining identity" +"2019-04-22 06:17:00.964 UTC [msp.identity] Verify -> DEBU 1642 Verify: sig = 00000000 30 44 02 20 2b 6f d0 55 6c 20 6d a0 ad fd fc 45 |0D. +o.Ul m....E| +00000010 1a 21 7f 2e 86 57 96 c0 73 80 19 3d 4f 01 9f ac |.!...W..s..=O...| +00000020 02 40 0e 2d 02 20 0c 0a a3 dc 20 5d 41 73 23 0c |.@.-. .... ]As#.| +00000030 6a 4f b3 00 27 41 21 da 7e f7 1c cd c0 ca d9 2d |jO..'A!.~......-| +00000040 c8 3d 55 08 7b 14 |.=U.{.|" +"2019-04-22 06:17:00.975 UTC [msp] DeserializeIdentity -> DEBU 1658 Obtaining identity" +"2019-04-22 06:17:00.976 UTC [gossip.comm] Send -> DEBU 1659 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5726 bytes, seq: 5}, Envelope: 5756 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:00.976 UTC [msp] DeserializeIdentity -> DEBU 165a Obtaining identity" +"2019-04-22 06:17:00.979 UTC [msp] DeserializeIdentity -> DEBU 165d Obtaining identity" +"2019-04-22 06:17:00.977 UTC [protoutils] checkSignatureFromCreator -> DEBU 165b exits successfully" +"2019-04-22 06:17:00.979 UTC [protoutils] validateEndorserTransaction -> DEBU 165e validateEndorserTransaction starts for data 0xc003cf5000, header channel_header:"\010\003\032\014\010\332\270\365\345\005\020\254\356\305\242\002\"\017businesschannel*@7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869:\016\022\014\022\n_lifecycle" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\0307\361D\354S\337KT\2032\335\364\314,\224c\216\362+\t\242\331\335." " +"2019-04-22 06:17:00.980 UTC [protoutils] validateEndorserTransaction -> DEBU 165f validateEndorserTransaction info: there are 1 actions" +"2019-04-22 06:17:00.980 UTC [protoutils] validateEndorserTransaction -> DEBU 1660 validateEndorserTransaction info: signature header is valid" +"2019-04-22 06:17:00.977 UTC [gossip.comm] sendToEndpoint -> DEBU 165c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 5726 bytes, seq: 5}, Envelope: 5756 bytes, Signature: 0 bytes" +"2019-04-22 06:17:00.981 UTC [gossip.comm] sendToEndpoint -> DEBU 1662 Exiting" +"2019-04-22 06:17:00.981 UTC [protoutils] ValidateTransaction -> DEBU 1661 ValidateTransactionEnvelope returns err %!s()" +"2019-04-22 06:17:00.982 UTC [committer.txvalidator] validateTx -> DEBU 1663 Transaction is for channel businesschannel" +"2019-04-22 06:17:00.982 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1664 retrieveTransactionByID() - txId = [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869]" +"2019-04-22 06:17:00.982 UTC [committer.txvalidator] validateTx -> DEBU 1665 Validating transaction with plugins" +"2019-04-22 06:17:00.983 UTC [committer.txvalidator] Dispatch -> DEBU 1666 [businesschannel] Dispatch starts for bytes 0xc003d08000" +"2019-04-22 06:17:00.983 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1667 constructing new query executor txid = [81942db6-05e2-4ac5-b541-c45461ee60f3]" +"2019-04-22 06:17:00.983 UTC [lockbasedtxmgr] Done -> DEBU 1668 Done with transaction simulation / query execution [81942db6-05e2-4ac5-b541-c45461ee60f3]" +"2019-04-22 06:17:00.985 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 1669 Validating Tx 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +"2019-04-22 06:17:00.985 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 166a constructing new query executor txid = [806f47ef-f29f-472a-8fd1-6cc8980f9050]" +"2019-04-22 06:17:00.986 UTC [lockbasedtxmgr] Done -> DEBU 166b Done with transaction simulation / query execution [806f47ef-f29f-472a-8fd1-6cc8980f9050]" +"2019-04-22 06:17:00.986 UTC [policies] Evaluate -> DEBU 166c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement ==" +"2019-04-22 06:17:00.986 UTC [policies] Evaluate -> DEBU 166d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:00.987 UTC [policies] Evaluate -> DEBU 166e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement ==" +"2019-04-22 06:17:00.987 UTC [cauthdsl] func1 -> DEBU 166f 0xc003d44d20 gate 1555913820987827500 evaluation starts" +"2019-04-22 06:17:00.988 UTC [cauthdsl] func2 -> DEBU 1670 0xc003d44d20 signed by 0 principal evaluation starts (used [false false])" +"2019-04-22 06:17:00.988 UTC [cauthdsl] func2 -> DEBU 1671 0xc003d44d20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.989 UTC [cauthdsl] func2 -> DEBU 1672 0xc003d44d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:00.989 UTC [cauthdsl] func2 -> DEBU 1673 0xc003d44d20 processing identity 1 with bytes of 10c48e0" +"2019-04-22 06:17:00.989 UTC [cauthdsl] func2 -> DEBU 1674 0xc003d44d20 principal matched by identity 1" +"2019-04-22 06:17:00.990 UTC [msp.identity] Verify -> DEBU 1675 Verify: digest = 00000000 a9 92 0e 52 fc 39 d3 c3 e6 08 63 bf 5f c0 d0 49 |...R.9....c._..I| +00000010 1c 92 69 ed b2 b1 e1 68 2c 7a 49 55 db c8 a7 12 |..i....h,zIU....|" +"2019-04-22 06:17:00.990 UTC [msp.identity] Verify -> DEBU 1676 Verify: sig = 00000000 30 45 02 21 00 b4 e9 d1 2e ac 51 5e b0 08 02 4f |0E.!......Q^...O| +00000010 7b 65 17 88 58 6a 27 bf a5 2e 95 22 a5 77 ce 27 |{e..Xj'....".w.'| +00000020 2e 6d e0 df 54 02 20 5d 30 ec ca ab 4d 81 16 42 |.m..T. ]0...M..B| +00000030 dc 9e 5b b7 2f 0c f1 48 a6 ee 6c b0 01 90 49 ce |..[./..H..l...I.| +00000040 9b 0e 61 b0 b7 ff 73 |..a...s|" +"2019-04-22 06:17:00.991 UTC [cauthdsl] func2 -> DEBU 1677 0xc003d44d20 principal evaluation succeeds for identity 1" +"2019-04-22 06:17:00.991 UTC [cauthdsl] func1 -> DEBU 1678 0xc003d44d20 gate 1555913820987827500 evaluation succeeds" +"2019-04-22 06:17:00.992 UTC [policies] Evaluate -> DEBU 1679 Signature set satisfies policy /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:17:00.992 UTC [policies] Evaluate -> DEBU 167a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:17:00.993 UTC [policies] Evaluate -> DEBU 167b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement ==" +"2019-04-22 06:17:00.993 UTC [cauthdsl] func1 -> DEBU 167c 0xc003d45b60 gate 1555913820993939300 evaluation starts" +"2019-04-22 06:17:00.994 UTC [cauthdsl] func2 -> DEBU 167d 0xc003d45b60 signed by 0 principal evaluation starts (used [false false])" +"2019-04-22 06:17:00.995 UTC [cauthdsl] func2 -> DEBU 167e 0xc003d45b60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:00.995 UTC [cauthdsl] func2 -> DEBU 167f 0xc003d45b60 principal matched by identity 0" +"2019-04-22 06:17:00.996 UTC [msp.identity] Verify -> DEBU 1680 Verify: digest = 00000000 76 fc 96 10 25 92 ee d3 00 d1 d3 f1 bd 51 fa eb |v...%........Q..| +00000010 79 8f 7c 68 fb 01 0f 15 a1 12 d6 0c 54 83 2e 50 |y.|h........T..P|" +"2019-04-22 06:17:00.996 UTC [msp.identity] Verify -> DEBU 1681 Verify: sig = 00000000 30 45 02 21 00 f9 64 75 7d 8d f7 13 2d f3 a0 cb |0E.!..du}...-...| +00000010 8d a4 eb 73 41 35 3a 75 92 a8 b7 a4 46 51 01 21 |...sA5:u....FQ.!| +00000020 89 2b 35 ca e4 02 20 0e 54 d4 76 00 a1 2f 46 25 |.+5... .T.v../F%| +00000030 90 ff 8c 6a 20 4f 39 c3 05 3c 07 86 2c 92 e3 34 |...j O9..<..,..4| +00000040 c7 7e e4 e2 6e 62 6c |.~..nbl|" +"2019-04-22 06:17:00.998 UTC [cauthdsl] func2 -> DEBU 1682 0xc003d45b60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:00.998 UTC [cauthdsl] func1 -> DEBU 1683 0xc003d45b60 gate 1555913820993939300 evaluation succeeds" +"2019-04-22 06:17:00.999 UTC [policies] Evaluate -> DEBU 1684 Signature set satisfies policy /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:17:00.999 UTC [policies] Evaluate -> DEBU 1685 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:17:01.000 UTC [policies] Evaluate -> DEBU 1686 Signature set satisfies policy /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:17:01.000 UTC [policies] Evaluate -> DEBU 1687 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:17:01.001 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1688 constructing new query executor txid = [053908d5-2aac-4f89-98b4-7b4c04190724]" +"2019-04-22 06:17:01.001 UTC [lockbasedtxmgr] Done -> DEBU 1689 Done with transaction simulation / query execution [053908d5-2aac-4f89-98b4-7b4c04190724]" +"2019-04-22 06:17:01.002 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 168a constructing new query executor txid = [ac60990f-933a-4319-9fe6-1731dc837c8e]" +"2019-04-22 06:17:01.002 UTC [lockbasedtxmgr] Done -> DEBU 168b Done with transaction simulation / query execution [ac60990f-933a-4319-9fe6-1731dc837c8e]" +"2019-04-22 06:17:01.003 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 168c constructing new query executor txid = [fde5c74d-f7a5-4f6d-a1e6-ebd6f50f0c50]" +"2019-04-22 06:17:01.003 UTC [lockbasedtxmgr] Done -> DEBU 168d Done with transaction simulation / query execution [fde5c74d-f7a5-4f6d-a1e6-ebd6f50f0c50]" +"2019-04-22 06:17:01.004 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 168e constructing new query executor txid = [d2bc4688-286d-4d99-8e89-325c9983e540]" +"2019-04-22 06:17:01.004 UTC [lockbasedtxmgr] Done -> DEBU 168f Done with transaction simulation / query execution [d2bc4688-286d-4d99-8e89-325c9983e540]" +"2019-04-22 06:17:01.005 UTC [vscc] Validate -> DEBU 1690 block 5, namespace: _lifecycle, tx 0 validation results is: " +"2019-04-22 06:17:01.005 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 1691 Transaction 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869 appears to be valid" +"2019-04-22 06:17:01.005 UTC [committer.txvalidator] Dispatch -> DEBU 1692 [businesschannel] Dispatch completes env bytes 0xc003d08000" +"2019-04-22 06:17:01.006 UTC [committer.txvalidator] validateTx -> DEBU 1693 [businesschannel] validateTx completes for block 0xc003b15a00 env 0xc003c27ea0 txn 0" +"2019-04-22 06:17:01.006 UTC [committer.txvalidator] Validate -> DEBU 1694 got result for idx 0, code 0" +"2019-04-22 06:17:01.006 UTC [committer.txvalidator] Validate -> INFO 1695 [businesschannel] Validated block [5] in 46ms" +"2019-04-22 06:17:01.007 UTC [gossip.privdata] containsWrites -> DEBU 1696 HashedRWSet of tx 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, namespace _lifecycle, collection _implicit_org_Org1MSP doesn't contain writes" +"2019-04-22 06:17:01.007 UTC [gossip.privdata] containsWrites -> DEBU 1697 HashedRWSet of tx 7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869, namespace _lifecycle, collection _implicit_org_Org2MSP doesn't contain writes" +"2019-04-22 06:17:01.007 UTC [gossip.privdata] listMissingPrivateData -> DEBU 1698 Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:17:01.008 UTC [gossip.privdata] StoreBlock -> DEBU 1699 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:17:01.008 UTC [kvledger] CommitWithPvtData -> DEBU 169a [businesschannel] Validating state for block [5]" +"2019-04-22 06:17:01.008 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 169b Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:17:01.009 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 169c lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:17:01.009 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 169d Validating new block with num trans = [1]" +"2019-04-22 06:17:01.009 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 169e ValidateAndPrepareBatch() for block number = [5]" +"2019-04-22 06:17:01.009 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 169f preprocessing ProtoBlock..." +"2019-04-22 06:17:01.010 UTC [valimpl] preprocessProtoBlock -> DEBU 16a0 txType=ENDORSER_TRANSACTION" +"2019-04-22 06:17:01.010 UTC [stateleveldb] GetState -> DEBU 16a1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:01.010 UTC [statebasedval] validateKVRead -> DEBU 16a2 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-04-22 06:17:01.010 UTC [stateleveldb] GetState -> DEBU 16a3 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-04-22 06:17:01.011 UTC [statebasedval] validateKVRead -> DEBU 16a4 Comparing versions for key [namespaces/metadata/exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-04-22 06:17:01.011 UTC [stateleveldb] GetState -> DEBU 16a5 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-04-22 06:17:01.011 UTC [stateleveldb] GetState -> DEBU 16a6 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-04-22 06:17:01.011 UTC [stateleveldb] GetState -> DEBU 16a7 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 16a8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:17:01.012 UTC [stateleveldb] GetState -> DEBU 16a9 GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-04-22 06:17:01.012 UTC [stateleveldb] GetState -> DEBU 16aa GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-04-22 06:17:01.012 UTC [stateleveldb] GetState -> DEBU 16ab GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=���R���l� DEBU 16ac GetState(). ns=_lifecycle$$h_implicit_org_Org2MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:17:01.013 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 16ad Block [5] Transaction index [0] TxId [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-04-22 06:17:01.014 UTC [valinternal] ApplyWriteSet -> DEBU 16ae txops=internal.txOps{internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Collections"}:(*internal.keyOps)(0xc003d4d380), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/EndorsementInfo"}:(*internal.keyOps)(0xc003d4d3c0), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/Sequence"}:(*internal.keyOps)(0xc003d4d400), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/fields/exp02/ValidationInfo"}:(*internal.keyOps)(0xc003d4d440), internal.compositeKey{ns:"_lifecycle", coll:"", key:"namespaces/metadata/exp02"}:(*internal.keyOps)(0xc003d4d480)}" +"2019-04-22 06:17:01.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 16af validating rwset..." +"2019-04-22 06:17:01.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 16b0 postprocessing ProtoBlock..." +"2019-04-22 06:17:01.014 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 16b1 ValidateAndPrepareBatch() complete" +"2019-04-22 06:17:01.015 UTC [lifecycle] update -> INFO 16b2 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +"2019-04-22 06:17:01.015 UTC [stateleveldb] GetState -> DEBU 16b3 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=����>{"+���#b� ��T�H��Won�" +"2019-04-22 06:17:01.016 UTC [stateleveldb] GetState -> DEBU 16b4 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���h�-���i�u�E����^�kꞐ������" +"2019-04-22 06:17:01.016 UTC [stateleveldb] GetState -> DEBU 16b5 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=���R���l� DEBU 16b6 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=4SNrˤ��s�p����oy��&��t��ZM4" +"2019-04-22 06:17:01.017 UTC [stateleveldb] GetState -> DEBU 16b7 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=��s5(e�!�,�uݳg���n���,A�=,�V�'" +"2019-04-22 06:17:01.017 UTC [stateleveldb] GetState -> DEBU 16b8 GetState(). ns=_lifecycle$$h_implicit_org_Org1MSP, key=� ��=�Y\��}�J=�M#d� ���Ժ�" +"2019-04-22 06:17:01.018 UTC [lifecycle] update -> INFO 16b9 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +"2019-04-22 06:17:01.018 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16ba Invoking listener for state changes:&{map[businesschannel:%!s(*lifecycle.ChannelCache=&{map[exp02:0xc003d8a600] map[����>{"+���#b� ��T�H��Won�:exp02 ���h�-���i�u�E����^�kꞐ������:exp02 ���R���l� DEBU 16bb Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"_lifecycle":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc003d86780), (*kvrwset.KVWrite)(0xc003d867d0), (*kvrwset.KVWrite)(0xc003d86820), (*kvrwset.KVWrite)(0xc003d86870), (*kvrwset.KVWrite)(0xc003d868c0)}}" +"2019-04-22 06:17:01.019 UTC [cceventmgmt] HandleStateUpdates -> INFO 16bc Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-04-22 06:17:01.019 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 16bd Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}]]" +"2019-04-22 06:17:01.019 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 16be Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +"2019-04-22 06:17:01.020 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 16bf Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +"2019-04-22 06:17:01.020 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16c0 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440})}" +"2019-04-22 06:17:01.020 UTC [stateleveldb] GetState -> DEBU 16c1 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-04-22 06:17:01.020 UTC [stateleveldb] GetState -> DEBU 16c2 GetState(). ns=lscc, key=exp02" +"2019-04-22 06:17:01.021 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16c3 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 78 53 51 74 98 101 70 84 43 120 74 113 104 68 100 117 77 57 106 110 87 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 48 77 68 69 119 79 68 69 48 77 68 66 97 70 119 48 121 79 84 65 122 77 106 107 119 79 68 69 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 110 82 106 100 111 116 120 82 82 54 110 115 10 70 114 73 54 65 100 121 78 108 78 69 86 119 48 111 49 51 116 65 65 99 118 68 67 90 98 69 84 53 85 85 72 65 120 113 109 69 112 72 119 115 110 81 111 120 56 88 98 56 72 110 55 112 106 71 76 117 107 79 117 104 80 66 54 10 53 109 51 76 105 78 81 47 109 113 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 97 55 116 76 80 68 90 87 115 120 67 114 118 79 111 101 107 108 67 122 71 80 103 108 47 97 114 55 97 81 53 78 121 121 66 47 53 99 116 67 43 78 103 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 78 116 83 110 97 70 120 73 106 53 50 68 90 66 111 49 88 82 81 54 67 104 120 104 105 51 121 110 69 81 47 86 105 100 112 67 69 98 86 57 120 84 103 67 73 65 121 54 109 120 51 102 10 119 104 65 118 111 106 118 76 73 105 107 115 102 79 56 82 102 78 121 43 69 74 43 103 119 82 55 111 106 50 108 98 53 54 105 103 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 83 170 140 173 163 251 80 149 96 210 221 94 183 62 19 157 250 115 43 249 173 224 186 3 250 95 126 110 189 166 49 57 2 32 114 246 129 162 164 229 222 122 103 218 14 36 179 42 12 169 194 151 81 96 101 122 194 28 168 50 204 94 230 88 39 177]} 0x14d8920}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc00265fa40 0xc002563680 0xc002654dc0})]}" +"2019-04-22 06:17:01.021 UTC [confighistory] add -> DEBU 16c4 add() - {lscc, exp02~collection, 5}" +"2019-04-22 06:17:01.026 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 16c5 Invoking listener for state changes:&{%!s(*lifecycle.ValidatorCommitter=&{0xc0000c0bc0 0x25df440}) %!s(*confighistory.dbProvider=&{0xc00000cb00})}" +"2019-04-22 06:17:01.026 UTC [kvledger] CommitWithPvtData -> DEBU 16c6 [businesschannel] Committing block [5] to storage" +"2019-04-22 06:17:01.026 UTC [ledgerstorage] CommitWithPvtData -> DEBU 16c7 Writing block [5] to pvt block store" +"2019-04-22 06:17:01.029 UTC [pvtdatastorage] Prepare -> DEBU 16c8 Saved 0 private data write sets for block [5]" +"2019-04-22 06:17:01.034 UTC [fsblkstorage] indexBlock -> DEBU 16c9 Indexing block [blockNum=5, blockHash=[]byte{0xf, 0x5a, 0xbc, 0x96, 0x5a, 0x90, 0x27, 0x82, 0xd2, 0x66, 0x93, 0xf6, 0xa4, 0x7b, 0xd3, 0x45, 0x68, 0xc2, 0x57, 0xa8, 0xb7, 0xa4, 0x2b, 0xc8, 0x69, 0x86, 0x9a, 0xd3, 0xd0, 0x37, 0x56, 0x39} txOffsets= +txId=7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869 locPointer=offset=70, bytesLength=4707 +]" +"2019-04-22 06:17:01.034 UTC [fsblkstorage] indexBlock -> DEBU 16ca Adding txLoc [fileSuffixNum=0, offset=80866, bytesLength=4707] for tx ID: [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869] to txid-index" +"2019-04-22 06:17:01.035 UTC [fsblkstorage] indexBlock -> DEBU 16cb Adding txLoc [fileSuffixNum=0, offset=80866, bytesLength=4707] for tx number:[0] ID: [7771236ddb9b43d2eb747a65635dbc3fe9fd205e20ce35b61ac67eaa0c76e869] to blockNumTranNum index" +"2019-04-22 06:17:01.037 UTC [fsblkstorage] updateCheckpoint -> DEBU 16cc Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[86511], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-04-22 06:17:01.038 UTC [pvtdatastorage] Commit -> DEBU 16cd Committing private data for block [5]" +"2019-04-22 06:17:01.041 UTC [fsblkstorage] waitForBlock -> DEBU 16ce Came out of wait. maxAvailaBlockNumber=[5]" +"2019-04-22 06:17:01.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16cf Remaining bytes=[5715], Going to peek [8] bytes" +"2019-04-22 06:17:01.042 UTC [pvtdatastorage] Commit -> DEBU 16d0 Committed private data for block [5]" +"2019-04-22 06:17:01.042 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d1 Returning blockbytes - length=[5713], placementInfo={fileNum=[0], startOffset=[80796], bytesOffset=[80798]}" +"2019-04-22 06:17:01.043 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 16d2 blockbytes [5713] read from file [0]" +"2019-04-22 06:17:01.044 UTC [kvledger] CommitWithPvtData -> DEBU 16d3 [businesschannel] Committing block [5] transactions to state database" +"2019-04-22 06:17:01.044 UTC [lockbasedtxmgr] Commit -> DEBU 16d4 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:17:01.044 UTC [lockbasedtxmgr] Commit -> DEBU 16d5 Committing updates to state database" +"2019-04-22 06:17:01.045 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 16d6 Building the expiry schedules based on the update batch" +"2019-04-22 06:17:01.048 UTC [lockbasedtxmgr] Commit -> DEBU 16d7 Write lock acquired for committing updates to state database" +"2019-04-22 06:17:01.048 UTC [stateleveldb] ApplyUpdates -> DEBU 16d8 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Sequence] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x53, 0x65, 0x71, 0x75, 0x65, 0x6e, 0x63, 0x65}]" +"2019-04-22 06:17:01.049 UTC [stateleveldb] ApplyUpdates -> DEBU 16d9 Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/ValidationInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x56, 0x61, 0x6c, 0x69, 0x64, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-04-22 06:17:01.049 UTC [stateleveldb] ApplyUpdates -> DEBU 16da Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/metadata/exp02] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x6d, 0x65, 0x74, 0x61, 0x64, 0x61, 0x74, 0x61, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32}]" +"2019-04-22 06:17:01.050 UTC [stateleveldb] ApplyUpdates -> DEBU 16db Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/Collections] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x43, 0x6f, 0x6c, 0x6c, 0x65, 0x63, 0x74, 0x69, 0x6f, 0x6e, 0x73}]" +"2019-04-22 06:17:01.050 UTC [stateleveldb] ApplyUpdates -> DEBU 16dc Channel [businesschannel]: Applying key(string)=[_lifecyclenamespaces/fields/exp02/EndorsementInfo] key(bytes)=[[]byte{0x5f, 0x6c, 0x69, 0x66, 0x65, 0x63, 0x79, 0x63, 0x6c, 0x65, 0x0, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x2f, 0x66, 0x69, 0x65, 0x6c, 0x64, 0x73, 0x2f, 0x65, 0x78, 0x70, 0x30, 0x32, 0x2f, 0x45, 0x6e, 0x64, 0x6f, 0x72, 0x73, 0x65, 0x6d, 0x65, 0x6e, 0x74, 0x49, 0x6e, 0x66, 0x6f}]" +"2019-04-22 06:17:01.052 UTC [lockbasedtxmgr] Commit -> DEBU 16dd Updates committed to state database and the write lock is released" +"2019-04-22 06:17:01.052 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 16de Preparing potential purge list working-set for expiringAtBlk [6]" +"2019-04-22 06:17:01.052 UTC [leveldbhelper] GetIterator -> DEBU 16df Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +"2019-04-22 06:17:01.052 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 16e0 No expiry entry found for expiringAtBlk [6]" +"2019-04-22 06:17:01.052 UTC [lockbasedtxmgr] func1 -> DEBU 16e1 launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:17:01.053 UTC [kvledger] CommitWithPvtData -> DEBU 16e2 [businesschannel] Committing block [5] transactions to history database" +"2019-04-22 06:17:01.053 UTC [historyleveldb] Commit -> DEBU 16e3 Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +"2019-04-22 06:17:01.056 UTC [historyleveldb] Commit -> DEBU 16e4 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +"2019-04-22 06:17:01.057 UTC [kvledger] CommitWithPvtData -> INFO 16e5 [businesschannel] Committed block [5] with 1 transaction(s) in 48ms (state_validation=17ms block_commit=17ms state_commit=9ms)" +"2019-04-22 06:17:01.061 UTC [msp.identity] Sign -> DEBU 16e6 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020806 " +"2019-04-22 06:17:01.061 UTC [msp.identity] Sign -> DEBU 16e7 Sign: digest: 695F95D761FE184353A81E451CF4724D334DF6EC3F2F5FC11CDF371D79E7ACB1 " +"2019-04-22 06:17:01.062 UTC [gossip.state] commitBlock -> DEBU 16e8 [businesschannel] Committed block [5] with 1 transaction(s)" +"2019-04-22 06:17:01.063 UTC [common.deliver] deliverBlocks -> DEBU 16e9 [channel: businesschannel] Delivering block [5] for (0xc00392bb80) for 192.168.224.9:49272" +"2019-04-22 06:17:01.064 UTC [fsblkstorage] waitForBlock -> DEBU 16ea Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-04-22 06:17:01.077 UTC [grpc] infof -> DEBU 16eb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:01.077 UTC [grpc] warningf -> DEBU 16ec transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49272: read: connection reset by peer" +"2019-04-22 06:17:01.078 UTC [common.deliver] deliverBlocks -> DEBU 16ed Context canceled, aborting wait for next block" +"2019-04-22 06:17:01.078 UTC [common.deliverevents] func1 -> DEBU 16ee Closing Deliver stream" +"2019-04-22 06:17:01.078 UTC [comm.grpc.server] 1 -> INFO 16ef streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:17:28.647Z grpc.peer_address=192.168.224.9:49272 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.425635s +"2019-04-22 06:17:01.079 UTC [grpc] infof -> DEBU 16f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:01.079 UTC [fsblkstorage] waitForBlock -> DEBU 16f1 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-04-22 06:17:01.125 UTC [gossip.comm] func1 -> DEBU 16f2 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:01.125 UTC [gossip.gossip] handleMessage -> DEBU 16f3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:01.125 UTC [msp] DeserializeIdentity -> DEBU 16f4 Obtaining identity" +"2019-04-22 06:17:01.133 UTC [msp] DeserializeIdentity -> DEBU 16f5 Obtaining identity" +"2019-04-22 06:17:01.133 UTC [msp] DeserializeIdentity -> DEBU 16f6 Obtaining identity" +"2019-04-22 06:17:01.133 UTC [gossip.gossip] handleMessage -> DEBU 16f7 Exiting" +"2019-04-22 06:17:01.144 UTC [gossip.comm] func1 -> DEBU 16f8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.146 UTC [gossip.gossip] handleMessage -> DEBU 16f9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.147 UTC [msp] DeserializeIdentity -> DEBU 16fa Obtaining identity" +"2019-04-22 06:17:01.152 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16fb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:01.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fc Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.152 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16fd Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.153 UTC [policies] Evaluate -> DEBU 16fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:01.162 UTC [policies] Evaluate -> DEBU 16ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:01.162 UTC [policies] Evaluate -> DEBU 1700 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:01.162 UTC [cauthdsl] func1 -> DEBU 1701 0xc003dc7d00 gate 1555913821162758300 evaluation starts" +"2019-04-22 06:17:01.162 UTC [cauthdsl] func2 -> DEBU 1702 0xc003dc7d00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:01.162 UTC [cauthdsl] func2 -> DEBU 1703 0xc003dc7d00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:01.162 UTC [cauthdsl] func2 -> DEBU 1704 0xc003dc7d00 principal matched by identity 0" +"2019-04-22 06:17:01.162 UTC [msp.identity] Verify -> DEBU 1705 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:01.163 UTC [msp.identity] Verify -> DEBU 1706 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:01.173 UTC [cauthdsl] func2 -> DEBU 1707 0xc003dc7d00 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:01.173 UTC [cauthdsl] func1 -> DEBU 1708 0xc003dc7d00 gate 1555913821162758300 evaluation succeeds" +"2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 1709 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 170a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 170b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:01.173 UTC [policies] Evaluate -> DEBU 170c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:01.173 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" +"2019-04-22 06:17:01.173 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" +"2019-04-22 06:17:01.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 170f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1710 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 1711 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 1712 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 1713 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:01.174 UTC [cauthdsl] func1 -> DEBU 1714 0xc003dd6ee0 gate 1555913821174189900 evaluation starts" +"2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 1715 0xc003dd6ee0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 1716 0xc003dd6ee0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 1717 0xc003dd6ee0 principal matched by identity 0" +"2019-04-22 06:17:01.174 UTC [msp.identity] Verify -> DEBU 1718 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:01.174 UTC [msp.identity] Verify -> DEBU 1719 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:01.174 UTC [cauthdsl] func2 -> DEBU 171a 0xc003dd6ee0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:01.174 UTC [cauthdsl] func1 -> DEBU 171b 0xc003dd6ee0 gate 1555913821174189900 evaluation succeeds" +"2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:01.174 UTC [policies] Evaluate -> DEBU 171f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:01.174 UTC [gossip.gossip] handleMessage -> DEBU 1720 Exiting" +"2019-04-22 06:17:01.174 UTC [gossip.gossip] handleMessage -> DEBU 1721 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.175 UTC [msp] DeserializeIdentity -> DEBU 1722 Obtaining identity" +"2019-04-22 06:17:01.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1723 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:01.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1724 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1725 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1726 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1727 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1728 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:01.175 UTC [cauthdsl] func1 -> DEBU 1729 0xc003dee800 gate 1555913821175459600 evaluation starts" +"2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172a 0xc003dee800 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172b 0xc003dee800 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172c 0xc003dee800 principal matched by identity 0" +"2019-04-22 06:17:01.175 UTC [msp.identity] Verify -> DEBU 172d Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:01.175 UTC [msp.identity] Verify -> DEBU 172e Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:01.175 UTC [cauthdsl] func2 -> DEBU 172f 0xc003dee800 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:01.175 UTC [cauthdsl] func1 -> DEBU 1730 0xc003dee800 gate 1555913821175459600 evaluation succeeds" +"2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1731 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.175 UTC [policies] Evaluate -> DEBU 1732 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.176 UTC [policies] Evaluate -> DEBU 1733 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:01.176 UTC [policies] Evaluate -> DEBU 1734 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:01.176 UTC [msp] DeserializeIdentity -> DEBU 1735 Obtaining identity" +"2019-04-22 06:17:01.176 UTC [gossip.gossip] handleMessage -> DEBU 1736 Exiting" +"2019-04-22 06:17:01.176 UTC [gossip.comm] func1 -> DEBU 1737 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.176 UTC [gossip.comm] func1 -> DEBU 1738 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:01.176 UTC [gossip.gossip] handleMessage -> DEBU 1739 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.177 UTC [msp] DeserializeIdentity -> DEBU 173a Obtaining identity" +"2019-04-22 06:17:01.184 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 173b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:01.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.184 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 173d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.184 UTC [policies] Evaluate -> DEBU 173e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:01.184 UTC [policies] Evaluate -> DEBU 173f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:01.185 UTC [policies] Evaluate -> DEBU 1740 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:01.185 UTC [cauthdsl] func1 -> DEBU 1741 0xc003e044f0 gate 1555913821185149700 evaluation starts" +"2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1742 0xc003e044f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1743 0xc003e044f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1744 0xc003e044f0 principal matched by identity 0" +"2019-04-22 06:17:01.185 UTC [msp.identity] Verify -> DEBU 1745 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:01.185 UTC [msp.identity] Verify -> DEBU 1746 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:01.185 UTC [cauthdsl] func2 -> DEBU 1747 0xc003e044f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:01.185 UTC [cauthdsl] func1 -> DEBU 1748 0xc003e044f0 gate 1555913821185149700 evaluation succeeds" +"2019-04-22 06:17:01.185 UTC [policies] Evaluate -> DEBU 1749 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.186 UTC [policies] Evaluate -> DEBU 174a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.186 UTC [policies] Evaluate -> DEBU 174b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:01.186 UTC [policies] Evaluate -> DEBU 174c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:01.186 UTC [gossip.gossip] handleMessage -> DEBU 174d Exiting" +"2019-04-22 06:17:01.186 UTC [gossip.gossip] handleMessage -> DEBU 174e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:01.186 UTC [gossip.gossip] handleMessage -> DEBU 174f Exiting" +"2019-04-22 06:17:01.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1750 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:01.186 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1751 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1752 Verify: digest = 00000000 7f a0 a5 1b 8d fc 96 77 2b 0d f1 60 29 2c 8e dc |.......w+..`),..| +00000010 a3 92 d6 0f 5f 4e cb ee 9c bd f7 03 e3 5e 4c 76 |...._N.......^Lv|" +"2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1753 Verify: sig = 00000000 30 44 02 20 7e a2 0a 30 da 12 42 95 92 01 fe ed |0D. ~..0..B.....| +00000010 36 a6 f3 e3 2e f8 8d f5 7e b9 0f db ed c4 78 86 |6.......~.....x.| +00000020 0d 2d 95 c3 02 20 3d 41 1f c1 c3 a3 48 ff 0b de |.-... =A....H...| +00000030 1a ef ae a5 53 ec b5 12 99 62 cc b6 9d 73 15 12 |....S....b...s..| +00000040 c2 52 fc bd 75 cd |.R..u.|" +"2019-04-22 06:17:01.187 UTC [msp] DeserializeIdentity -> DEBU 1754 Obtaining identity" +"2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1755 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:01.187 UTC [msp.identity] Verify -> DEBU 1756 Verify: sig = 00000000 30 44 02 20 01 d9 60 8a 36 5a 8b 4d ca 1b ea 5d |0D. ..`.6Z.M...]| +00000010 28 06 16 1b 72 1d 7f 88 c0 16 2e ff ef 3f d4 6f |(...r........?.o| +00000020 92 55 26 26 02 20 6c 5a 5d 75 b0 fc 6e bc e9 fa |.U&&. lZ]u..n...| +00000030 27 22 ab fe 21 0d c0 3e 5a e2 63 4b c1 05 3f 14 |'"..!..>Z.cK..?.| +00000040 89 38 2a 94 9b 65 |.8*..e|" +"2019-04-22 06:17:01.188 UTC [msp] DeserializeIdentity -> DEBU 1757 Obtaining identity" +"2019-04-22 06:17:01.190 UTC [gossip.comm] Send -> DEBU 1758 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" +"2019-04-22 06:17:01.193 UTC [msp] DeserializeIdentity -> DEBU 1759 Obtaining identity" +"2019-04-22 06:17:01.194 UTC [msp] DeserializeIdentity -> DEBU 175a Obtaining identity" +"2019-04-22 06:17:01.195 UTC [gossip.comm] sendToEndpoint -> DEBU 175b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.195 UTC [gossip.comm] sendToEndpoint -> DEBU 175c Exiting" +"2019-04-22 06:17:01.196 UTC [gossip.comm] sendToEndpoint -> DEBU 175d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913821016315400 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.196 UTC [gossip.comm] sendToEndpoint -> DEBU 175e Exiting" +"2019-04-22 06:17:01.203 UTC [gossip.gossip] handleMessage -> DEBU 175f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:01.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1760 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1761 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1762 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 " +"2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1763 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 " +"2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1764 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:01.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1765 Exiting" +"2019-04-22 06:17:01.205 UTC [gossip.discovery] handleAliveMessage -> DEBU 1766 Exiting" +"2019-04-22 06:17:01.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1767 Exiting" +"2019-04-22 06:17:01.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1768 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:01.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1769 Exiting" +"2019-04-22 06:17:01.206 UTC [gossip.gossip] handleMessage -> DEBU 176a Exiting" +"2019-04-22 06:17:01.207 UTC [msp] DeserializeIdentity -> DEBU 176b Obtaining identity" +"2019-04-22 06:17:01.233 UTC [msp] DeserializeIdentity -> DEBU 176d Obtaining identity" +"2019-04-22 06:17:01.236 UTC [msp] DeserializeIdentity -> DEBU 176e Obtaining identity" +"2019-04-22 06:17:01.218 UTC [gossip.comm] func1 -> DEBU 176c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:01.237 UTC [gossip.gossip] handleMessage -> DEBU 176f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:01.237 UTC [gossip.gossip] handleMessage -> DEBU 1770 Exiting" +"2019-04-22 06:17:01.237 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1771 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:01.237 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1772 Exiting" +"2019-04-22 06:17:01.238 UTC [gossip.comm] Send -> DEBU 1773 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:01.241 UTC [gossip.comm] sendToEndpoint -> DEBU 1774 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:01.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1775 Exiting" +"2019-04-22 06:17:01.241 UTC [msp] DeserializeIdentity -> DEBU 1776 Obtaining identity" +"2019-04-22 06:17:01.244 UTC [gossip.comm] Send -> DEBU 1777 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:01.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1778 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:01.245 UTC [gossip.comm] sendToEndpoint -> DEBU 1779 Exiting" +"2019-04-22 06:17:01.471 UTC [gossip.election] waitForInterrupt -> DEBU 177a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:01.472 UTC [gossip.election] IsLeader -> DEBU 177b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:01.472 UTC [msp.identity] Sign -> DEBU 177c Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510051801 " +"2019-04-22 06:17:01.472 UTC [msp.identity] Sign -> DEBU 177d Sign: digest: 54E7B83CDCCFDAB50094E59165131DF3DCC1CD56B094A17F3BED5A55645F66D6 " +"2019-04-22 06:17:01.472 UTC [gossip.election] waitForInterrupt -> DEBU 177e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:01.478 UTC [msp] DeserializeIdentity -> DEBU 177f Obtaining identity" +"2019-04-22 06:17:01.478 UTC [msp] DeserializeIdentity -> DEBU 1780 Obtaining identity" +"2019-04-22 06:17:01.479 UTC [msp] DeserializeIdentity -> DEBU 1781 Obtaining identity" +"2019-04-22 06:17:01.480 UTC [msp] DeserializeIdentity -> DEBU 1782 Obtaining identity" +"2019-04-22 06:17:01.480 UTC [gossip.comm] Send -> DEBU 1783 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:01.480 UTC [msp] DeserializeIdentity -> DEBU 1784 Obtaining identity" +"2019-04-22 06:17:01.481 UTC [msp] DeserializeIdentity -> DEBU 1785 Obtaining identity" +"2019-04-22 06:17:01.481 UTC [gossip.comm] sendToEndpoint -> DEBU 1786 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:5 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.481 UTC [gossip.comm] sendToEndpoint -> DEBU 1787 Exiting" +"2019-04-22 06:17:01.600 UTC [endorser] ProcessProposal -> DEBU 1788 Entering: request from 192.168.224.9:49280" +"2019-04-22 06:17:01.600 UTC [protoutils] ValidateProposalMessage -> DEBU 1789 ValidateProposalMessage starts for signed proposal 0xc003dad130" +"2019-04-22 06:17:01.600 UTC [protoutils] validateChannelHeader -> DEBU 178a validateChannelHeader info: header type 3" +"2019-04-22 06:17:01.600 UTC [protoutils] checkSignatureFromCreator -> DEBU 178b begin" +"2019-04-22 06:17:01.601 UTC [msp] GetManagerForChain -> DEBU 178c Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:01.601 UTC [protoutils] checkSignatureFromCreator -> DEBU 178d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:01.601 UTC [protoutils] checkSignatureFromCreator -> DEBU 178e creator is valid" +"2019-04-22 06:17:01.601 UTC [msp.identity] Verify -> DEBU 178f Verify: digest = 00000000 d6 57 4e 63 27 ee aa d6 8e 3a 88 0d 03 94 7e f7 |.WNc'....:....~.| +00000010 d8 14 e0 bf 5e ba 3f 56 f3 b2 05 76 23 61 dd c6 |....^.?V...v#a..|" +"2019-04-22 06:17:01.602 UTC [msp.identity] Verify -> DEBU 1790 Verify: sig = 00000000 30 45 02 21 00 92 84 2b b3 6c fb 80 17 d1 4b 3d |0E.!...+.l....K=| +00000010 7c 78 4c c1 5a 6b 6b 5d 09 ac c9 e1 52 a7 78 71 ||xL.Zkk]....R.xq| +00000020 bb c2 79 55 22 02 20 19 05 4e 6c 99 00 e2 86 45 |..yU". ..Nl....E| +00000030 59 85 63 cc 9e 35 19 2a cc 6f 14 c1 7d 1a 45 89 |Y.c..5.*.o..}.E.| +00000040 9b bd 0e 8b 5a 28 6f |....Z(o|" +"2019-04-22 06:17:01.602 UTC [protoutils] checkSignatureFromCreator -> DEBU 1791 exits successfully" +"2019-04-22 06:17:01.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1792 validateChaincodeProposalMessage starts for proposal 0xc003c98e70, header 0xc003dad540" +"2019-04-22 06:17:01.603 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 1793 validateChaincodeProposalMessage info: header extension references chaincode name:"_lifecycle" " +"2019-04-22 06:17:01.603 UTC [endorser] preProcess -> DEBU 1794 [businesschannel][d64f027b] processing txid: d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59" +"2019-04-22 06:17:01.603 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 1795 retrieveTransactionByID() - txId = [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +"2019-04-22 06:17:01.604 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1796 constructing new tx simulator" +"2019-04-22 06:17:01.604 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1797 constructing new tx simulator txid = [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +"2019-04-22 06:17:01.604 UTC [endorser] SimulateProposal -> DEBU 1798 [businesschannel][d64f027b] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:17:01.605 UTC [endorser] callChaincode -> INFO 1799 [businesschannel][d64f027b] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:17:01.605 UTC [chaincode] Execute -> DEBU 179a Entry" +"2019-04-22 06:17:01.605 UTC [aclmgmt] CheckACL -> DEBU 179b acl policy /Channel/Application/Readers found in config for resource _lifecycle/QueryChaincodeDefinition" +"2019-04-22 06:17:01.605 UTC [aclmgmt] CheckACL -> DEBU 179c acl check(/Channel/Application/Readers)" +"2019-04-22 06:17:01.605 UTC [policies] Evaluate -> DEBU 179d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:01.606 UTC [policies] Evaluate -> DEBU 179e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:01.606 UTC [policies] Evaluate -> DEBU 179f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:01.606 UTC [cauthdsl] func1 -> DEBU 17a0 0xc003ea0a40 gate 1555913821606638700 evaluation starts" +"2019-04-22 06:17:01.606 UTC [cauthdsl] func2 -> DEBU 17a1 0xc003ea0a40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:01.607 UTC [cauthdsl] func2 -> DEBU 17a2 0xc003ea0a40 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:01.607 UTC [cauthdsl] func2 -> DEBU 17a3 0xc003ea0a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:01.607 UTC [cauthdsl] func2 -> DEBU 17a4 0xc003ea0a40 principal evaluation fails" +"2019-04-22 06:17:01.607 UTC [cauthdsl] func1 -> DEBU 17a5 0xc003ea0a40 gate 1555913821606638700 evaluation fails" +"2019-04-22 06:17:01.608 UTC [policies] Evaluate -> DEBU 17a6 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.608 UTC [policies] Evaluate -> DEBU 17a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.608 UTC [policies] Evaluate -> DEBU 17a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:01.609 UTC [cauthdsl] func1 -> DEBU 17a9 0xc003ea1280 gate 1555913821609009000 evaluation starts" +"2019-04-22 06:17:01.609 UTC [cauthdsl] func2 -> DEBU 17aa 0xc003ea1280 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:01.609 UTC [cauthdsl] func2 -> DEBU 17ab 0xc003ea1280 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:01.609 UTC [cauthdsl] func2 -> DEBU 17ac 0xc003ea1280 principal matched by identity 0" +"2019-04-22 06:17:01.610 UTC [msp.identity] Verify -> DEBU 17ad Verify: digest = 00000000 d6 57 4e 63 27 ee aa d6 8e 3a 88 0d 03 94 7e f7 |.WNc'....:....~.| +00000010 d8 14 e0 bf 5e ba 3f 56 f3 b2 05 76 23 61 dd c6 |....^.?V...v#a..|" +"2019-04-22 06:17:01.610 UTC [msp.identity] Verify -> DEBU 17ae Verify: sig = 00000000 30 45 02 21 00 92 84 2b b3 6c fb 80 17 d1 4b 3d |0E.!...+.l....K=| +00000010 7c 78 4c c1 5a 6b 6b 5d 09 ac c9 e1 52 a7 78 71 ||xL.Zkk]....R.xq| +00000020 bb c2 79 55 22 02 20 19 05 4e 6c 99 00 e2 86 45 |..yU". ..Nl....E| +00000030 59 85 63 cc 9e 35 19 2a cc 6f 14 c1 7d 1a 45 89 |Y.c..5.*.o..}.E.| +00000040 9b bd 0e 8b 5a 28 6f |....Z(o|" +"2019-04-22 06:17:01.610 UTC [cauthdsl] func2 -> DEBU 17af 0xc003ea1280 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:01.610 UTC [cauthdsl] func1 -> DEBU 17b0 0xc003ea1280 gate 1555913821609009000 evaluation succeeds" +"2019-04-22 06:17:01.610 UTC [policies] Evaluate -> DEBU 17b1 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:01.610 UTC [policies] Evaluate -> DEBU 17b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:01.611 UTC [policies] Evaluate -> DEBU 17b3 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:01.611 UTC [policies] Evaluate -> DEBU 17b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:01.612 UTC [lifecycle] QueryChaincodeDefinition -> DEBU 17b5 received invocation of QueryChaincodeDefinition on channel 'businesschannel' for chaincode 'exp02'" +"2019-04-22 06:17:01.612 UTC [chaincode] handleMessage -> DEBU 17b6 [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:01.613 UTC [chaincode] HandleTransaction -> DEBU 17b7 [d64f027b] handling GET_STATE from chaincode" +"2019-04-22 06:17:01.613 UTC [chaincode] HandleGetState -> DEBU 17b8 [d64f027b] getting state for chaincode _lifecycle, key namespaces/metadata/exp02, channel businesschannel" +"2019-04-22 06:17:01.614 UTC [stateleveldb] GetState -> DEBU 17b9 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-04-22 06:17:01.614 UTC [chaincode] HandleTransaction -> DEBU 17ba [d64f027b] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:01.615 UTC [chaincode] handleMessage -> DEBU 17bb [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:01.615 UTC [chaincode] HandleTransaction -> DEBU 17bc [d64f027b] handling GET_STATE from chaincode" +"2019-04-22 06:17:01.615 UTC [chaincode] HandleGetState -> DEBU 17bd [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Sequence, channel businesschannel" +"2019-04-22 06:17:01.615 UTC [stateleveldb] GetState -> DEBU 17be GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:01.615 UTC [chaincode] HandleTransaction -> DEBU 17bf [d64f027b] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:01.616 UTC [chaincode] handleMessage -> DEBU 17c0 [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:01.616 UTC [chaincode] HandleTransaction -> DEBU 17c1 [d64f027b] handling GET_STATE from chaincode" +"2019-04-22 06:17:01.616 UTC [chaincode] HandleGetState -> DEBU 17c2 [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/EndorsementInfo, channel businesschannel" +"2019-04-22 06:17:01.616 UTC [stateleveldb] GetState -> DEBU 17c3 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-04-22 06:17:01.617 UTC [chaincode] HandleTransaction -> DEBU 17c4 [d64f027b] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:01.617 UTC [chaincode] handleMessage -> DEBU 17c5 [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:01.617 UTC [chaincode] HandleTransaction -> DEBU 17c6 [d64f027b] handling GET_STATE from chaincode" +"2019-04-22 06:17:01.617 UTC [chaincode] HandleGetState -> DEBU 17c7 [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/ValidationInfo, channel businesschannel" +"2019-04-22 06:17:01.617 UTC [stateleveldb] GetState -> DEBU 17c8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-04-22 06:17:01.617 UTC [chaincode] HandleTransaction -> DEBU 17c9 [d64f027b] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:01.618 UTC [chaincode] handleMessage -> DEBU 17ca [d64f027b] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:01.618 UTC [chaincode] HandleTransaction -> DEBU 17cb [d64f027b] handling GET_STATE from chaincode" +"2019-04-22 06:17:01.618 UTC [chaincode] HandleGetState -> DEBU 17cc [d64f027b] getting state for chaincode _lifecycle, key namespaces/fields/exp02/Collections, channel businesschannel" +"2019-04-22 06:17:01.618 UTC [stateleveldb] GetState -> DEBU 17cd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-04-22 06:17:01.618 UTC [chaincode] HandleTransaction -> DEBU 17ce [d64f027b] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:01.618 UTC [lifecycle] QueryChaincodeDefinition -> INFO 17cf successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +"2019-04-22 06:17:01.619 UTC [chaincode] handleMessage -> DEBU 17d0 [d64f027b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:01.619 UTC [chaincode] Notify -> DEBU 17d1 [d64f027b] notifying Txid:d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59, channelID:businesschannel" +"2019-04-22 06:17:01.619 UTC [chaincode] Execute -> DEBU 17d2 Exit" +"2019-04-22 06:17:01.620 UTC [endorser] callChaincode -> INFO 17d3 [businesschannel][d64f027b] Exit chaincode: name:"_lifecycle" (15ms)" +"2019-04-22 06:17:01.620 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 17d4 Simulation completed, getting simulation results" +"2019-04-22 06:17:01.620 UTC [lockbasedtxmgr] Done -> DEBU 17d5 Done with transaction simulation / query execution [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +"2019-04-22 06:17:01.621 UTC [endorser] SimulateProposal -> DEBU 17d6 [businesschannel][d64f027b] Exit" +"2019-04-22 06:17:01.621 UTC [endorser] endorseProposal -> DEBU 17d7 [businesschannel][d64f027b] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:17:01.621 UTC [endorser] endorseProposal -> DEBU 17d8 [businesschannel][d64f027b] escc for chaincode name:"_lifecycle" is escc" +"2019-04-22 06:17:01.621 UTC [endorser] EndorseWithPlugin -> DEBU 17d9 Entering endorsement for {plugin: escc, channel: businesschannel, tx: d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59, chaincode: _lifecycle}" +"2019-04-22 06:17:01.621 UTC [msp.identity] Sign -> DEBU 17da Sign: plaintext: 0A205F50B26EA97BFBBD9F693102A809...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:01.622 UTC [msp.identity] Sign -> DEBU 17db Sign: digest: FC317AC4C3ACD202401BBFB5E624FEF4452E4588543E1D1C5AA8817B7A41DF80 " +"2019-04-22 06:17:01.622 UTC [endorser] EndorseWithPlugin -> DEBU 17dc Exiting {plugin: escc, channel: businesschannel, tx: d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59, chaincode: _lifecycle}" +"2019-04-22 06:17:01.622 UTC [endorser] endorseProposal -> DEBU 17dd [businesschannel][d64f027b] Exit" +"2019-04-22 06:17:01.623 UTC [lockbasedtxmgr] Done -> DEBU 17de Done with transaction simulation / query execution [d64f027b806a7112e6b5abf0999ec76d95dcc5ef06950daf8546b5f328d6db59]" +"2019-04-22 06:17:01.623 UTC [endorser] func1 -> DEBU 17df Exit: request from 192.168.224.9:49280" +"2019-04-22 06:17:01.624 UTC [comm.grpc.server] 1 -> INFO 17e0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49280 grpc.code=OK grpc.call_duration=24.5399ms +"2019-04-22 06:17:01.626 UTC [gossip.comm] func1 -> DEBU 17e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.626 UTC [gossip.gossip] handleMessage -> DEBU 17e2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.626 UTC [gossip.gossip] handleMessage -> DEBU 17e3 Exiting" +"2019-04-22 06:17:01.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 17e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 17e5 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:01.627 UTC [msp] DeserializeIdentity -> DEBU 17e6 Obtaining identity" +"2019-04-22 06:17:01.628 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17e7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:01.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17e8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17e9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:01.628 UTC [policies] Evaluate -> DEBU 17ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:01.629 UTC [policies] Evaluate -> DEBU 17eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:01.629 UTC [policies] Evaluate -> DEBU 17ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:01.630 UTC [cauthdsl] func1 -> DEBU 17ed 0xc003ebba70 gate 1555913821629783000 evaluation starts" +"2019-04-22 06:17:01.630 UTC [cauthdsl] func2 -> DEBU 17ee 0xc003ebba70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:01.630 UTC [cauthdsl] func2 -> DEBU 17ef 0xc003ebba70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:01.630 UTC [cauthdsl] func2 -> DEBU 17f0 0xc003ebba70 principal matched by identity 0" +"2019-04-22 06:17:01.631 UTC [msp.identity] Verify -> DEBU 17f1 Verify: digest = 00000000 cd 80 55 f1 85 b9 80 23 0a e5 1f 37 08 f6 8d 4a |..U....#...7...J| +00000010 27 5c 05 60 3d fd 8b b4 48 de bf 45 42 31 2f e6 |'\.`=...H..EB1/.|" +"2019-04-22 06:17:01.631 UTC [msp.identity] Verify -> DEBU 17f2 Verify: sig = 00000000 30 45 02 21 00 d1 ae c5 0e a5 04 a0 3a 93 53 74 |0E.!........:.St| +00000010 4b 89 48 35 5d 3b b4 b6 b4 fc a0 87 7f a4 a9 2c |K.H5];.........,| +00000020 b2 0d c5 9a a3 02 20 28 1d 66 fb 7d 01 a7 52 5f |...... (.f.}..R_| +00000030 af f0 13 8c 6c ac ec ce 40 15 87 9f 13 0e 3a ee |....l...@.....:.| +00000040 a9 cf 20 c7 70 84 4c |.. .p.L|" +"2019-04-22 06:17:01.636 UTC [cauthdsl] func2 -> DEBU 17f3 0xc003ebba70 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:01.637 UTC [cauthdsl] func1 -> DEBU 17f4 0xc003ebba70 gate 1555913821629783000 evaluation succeeds" +"2019-04-22 06:17:01.638 UTC [policies] Evaluate -> DEBU 17f5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.639 UTC [policies] Evaluate -> DEBU 17f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:01.639 UTC [policies] Evaluate -> DEBU 17f7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:01.639 UTC [policies] Evaluate -> DEBU 17f8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:01.647 UTC [grpc] infof -> DEBU 17f9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:01.648 UTC [gossip.gossip] handleMessage -> DEBU 17fa Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.650 UTC [gossip.comm] func1 -> DEBU 17fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.650 UTC [grpc] infof -> DEBU 17fc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:01.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 17fd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.652 UTC [gossip.discovery] learnExistingMembers -> DEBU 17fe Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:01.653 UTC [gossip.discovery] learnExistingMembers -> DEBU 17ff updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 " +"2019-04-22 06:17:01.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 1800 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 " +"2019-04-22 06:17:01.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 1801 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:25 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:01.654 UTC [gossip.discovery] learnExistingMembers -> DEBU 1802 Exiting" +"2019-04-22 06:17:01.654 UTC [gossip.discovery] handleAliveMessage -> DEBU 1803 Exiting" +"2019-04-22 06:17:01.656 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1804 Exiting" +"2019-04-22 06:17:01.657 UTC [gossip.gossip] handleMessage -> DEBU 1805 Exiting" +"2019-04-22 06:17:01.658 UTC [gossip.gossip] handleMessage -> DEBU 1806 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.660 UTC [msp] DeserializeIdentity -> DEBU 1807 Obtaining identity" +"2019-04-22 06:17:01.661 UTC [msp] DeserializeIdentity -> DEBU 1808 Obtaining identity" +"2019-04-22 06:17:01.661 UTC [msp] DeserializeIdentity -> DEBU 1809 Obtaining identity" +"2019-04-22 06:17:01.663 UTC [msp] DeserializeIdentity -> DEBU 180a Obtaining identity" +"2019-04-22 06:17:01.663 UTC [msp] DeserializeIdentity -> DEBU 180b Obtaining identity" +"2019-04-22 06:17:01.664 UTC [msp] DeserializeIdentity -> DEBU 180c Obtaining identity" +"2019-04-22 06:17:01.666 UTC [msp] DeserializeIdentity -> DEBU 180d Obtaining identity" +"2019-04-22 06:17:01.670 UTC [gossip.comm] Send -> DEBU 180e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:01.671 UTC [msp] DeserializeIdentity -> DEBU 180f Obtaining identity" +"2019-04-22 06:17:01.674 UTC [gossip.comm] Send -> DEBU 1810 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:01.674 UTC [gossip.comm] sendToEndpoint -> DEBU 1811 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.674 UTC [gossip.comm] sendToEndpoint -> DEBU 1812 Exiting" +"2019-04-22 06:17:01.675 UTC [gossip.comm] sendToEndpoint -> DEBU 1813 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.675 UTC [gossip.comm] sendToEndpoint -> DEBU 1814 Exiting" +"2019-04-22 06:17:01.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1815 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.676 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1816 Exiting" +"2019-04-22 06:17:01.677 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1817 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:01.678 UTC [gossip.gossip] handleMessage -> DEBU 1818 Exiting" +"2019-04-22 06:17:01.679 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1819 Exiting" +"2019-04-22 06:17:02.047 UTC [gossip.gossip] handleMessage -> DEBU 181a Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.047 UTC [gossip.gossip] handleMessage -> DEBU 181b Exiting" +"2019-04-22 06:17:02.047 UTC [gossip.discovery] handleMsgFromComm -> DEBU 181c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.047 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 181d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:02.047 UTC [msp] DeserializeIdentity -> DEBU 181e Obtaining identity" +"2019-04-22 06:17:02.047 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 181f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:02.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1820 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:02.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1821 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:02.047 UTC [policies] Evaluate -> DEBU 1822 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:02.047 UTC [policies] Evaluate -> DEBU 1823 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:02.047 UTC [policies] Evaluate -> DEBU 1824 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:02.048 UTC [cauthdsl] func1 -> DEBU 1825 0xc003ef6410 gate 1555913822048019600 evaluation starts" +"2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 1826 0xc003ef6410 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 1827 0xc003ef6410 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 1828 0xc003ef6410 principal matched by identity 0" +"2019-04-22 06:17:02.048 UTC [msp.identity] Verify -> DEBU 1829 Verify: digest = 00000000 26 89 6d 55 68 1e 53 f4 30 4d de 0c 97 53 41 ef |&.mUh.S.0M...SA.| +00000010 9c a6 0b 59 27 4d 8c 38 f9 69 5b ea 38 38 7d 4e |...Y'M.8.i[.88}N|" +"2019-04-22 06:17:02.048 UTC [msp.identity] Verify -> DEBU 182a Verify: sig = 00000000 30 44 02 20 60 04 89 a8 92 ec d0 c8 79 94 78 a8 |0D. `.......y.x.| +00000010 04 fc 6a 8c 2e a5 2a 0d 33 45 be ad f3 26 da bb |..j...*.3E...&..| +00000020 93 fc f0 72 02 20 55 42 31 a8 3a 5c b6 36 b2 72 |...r. UB1.:\.6.r| +00000030 f8 29 67 b3 f1 07 d0 00 55 ab fd 62 37 13 a2 54 |.)g.....U..b7..T| +00000040 03 aa dd ab c2 62 |.....b|" +"2019-04-22 06:17:02.048 UTC [cauthdsl] func2 -> DEBU 182b 0xc003ef6410 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:02.048 UTC [cauthdsl] func1 -> DEBU 182c 0xc003ef6410 gate 1555913822048019600 evaluation succeeds" +"2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 182d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 182e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 182f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:02.048 UTC [policies] Evaluate -> DEBU 1830 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:02.048 UTC [gossip.discovery] handleAliveMessage -> DEBU 1831 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 1832 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:02.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 1833 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 " +"2019-04-22 06:17:02.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 1834 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 " +"2019-04-22 06:17:02.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 1835 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:23 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:02.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 1836 Exiting" +"2019-04-22 06:17:02.049 UTC [gossip.discovery] handleAliveMessage -> DEBU 1837 Exiting" +"2019-04-22 06:17:02.049 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1838 Exiting" +"2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 1839 Obtaining identity" +"2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183a Obtaining identity" +"2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183b Obtaining identity" +"2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183c Obtaining identity" +"2019-04-22 06:17:02.054 UTC [msp] DeserializeIdentity -> DEBU 183d Obtaining identity" +"2019-04-22 06:17:02.055 UTC [msp] DeserializeIdentity -> DEBU 183e Obtaining identity" +"2019-04-22 06:17:02.055 UTC [gossip.comm] Send -> DEBU 183f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:02.055 UTC [msp] DeserializeIdentity -> DEBU 1840 Obtaining identity" +"2019-04-22 06:17:02.055 UTC [msp] DeserializeIdentity -> DEBU 1841 Obtaining identity" +"2019-04-22 06:17:02.055 UTC [gossip.comm] Send -> DEBU 1842 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1843 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1844 Exiting" +"2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1845 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.055 UTC [gossip.comm] sendToEndpoint -> DEBU 1846 Exiting" +"2019-04-22 06:17:02.057 UTC [gossip.comm] func1 -> DEBU 1847 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.057 UTC [gossip.gossip] handleMessage -> DEBU 1848 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.057 UTC [gossip.gossip] handleMessage -> DEBU 1849 Exiting" +"2019-04-22 06:17:02.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184b Exiting" +"2019-04-22 06:17:02.061 UTC [gossip.comm] func1 -> DEBU 184c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.061 UTC [gossip.gossip] handleMessage -> DEBU 184d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.061 UTC [gossip.gossip] handleMessage -> DEBU 184e Exiting" +"2019-04-22 06:17:02.062 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.062 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1850 Exiting" +"2019-04-22 06:17:02.382 UTC [endorser] ProcessProposal -> DEBU 1851 Entering: request from 192.168.224.9:49288" +"2019-04-22 06:17:02.382 UTC [protoutils] ValidateProposalMessage -> DEBU 1852 ValidateProposalMessage starts for signed proposal 0xc003ec1b30" +"2019-04-22 06:17:02.382 UTC [protoutils] validateChannelHeader -> DEBU 1853 validateChannelHeader info: header type 3" +"2019-04-22 06:17:02.383 UTC [protoutils] checkSignatureFromCreator -> DEBU 1854 begin" +"2019-04-22 06:17:02.383 UTC [msp] GetManagerForChain -> DEBU 1855 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:02.383 UTC [protoutils] checkSignatureFromCreator -> DEBU 1856 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:02.383 UTC [protoutils] checkSignatureFromCreator -> DEBU 1857 creator is valid" +"2019-04-22 06:17:02.383 UTC [msp.identity] Verify -> DEBU 1858 Verify: digest = 00000000 22 22 7e a4 58 09 95 56 b9 66 ae 98 03 93 a9 7c |""~.X..V.f.....|| +00000010 4f 83 b8 e7 68 7d 79 00 d7 1e 40 40 2a 89 2f 8b |O...h}y...@@*./.|" +"2019-04-22 06:17:02.383 UTC [msp.identity] Verify -> DEBU 1859 Verify: sig = 00000000 30 45 02 21 00 8e 68 d6 bb f7 48 67 f0 a2 00 6b |0E.!..h...Hg...k| +00000010 b2 35 cb c2 81 94 c3 ea a1 74 3d 65 9b ca e5 b5 |.5.......t=e....| +00000020 37 6e 32 de 10 02 20 79 f0 a5 e5 89 28 06 af c1 |7n2... y....(...| +00000030 14 78 53 5a ce 31 9f 59 7a de 94 a0 ae 71 75 b3 |.xSZ.1.Yz....qu.| +00000040 ea 41 6f 6b c3 c4 1c |.Aok...|" +"2019-04-22 06:17:02.384 UTC [protoutils] checkSignatureFromCreator -> DEBU 185a exits successfully" +"2019-04-22 06:17:02.384 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 185b validateChaincodeProposalMessage starts for proposal 0xc003f104d0, header 0xc003ec1f40" +"2019-04-22 06:17:02.384 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 185c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:02.384 UTC [endorser] preProcess -> DEBU 185d [businesschannel][b6035b01] processing txid: b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead" +"2019-04-22 06:17:02.385 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 185e retrieveTransactionByID() - txId = [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +"2019-04-22 06:17:02.385 UTC [aclmgmt] CheckACL -> DEBU 185f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:02.385 UTC [aclmgmt] CheckACL -> DEBU 1860 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:02.385 UTC [policies] Evaluate -> DEBU 1861 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:02.385 UTC [policies] Evaluate -> DEBU 1862 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:02.386 UTC [policies] Evaluate -> DEBU 1863 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:02.386 UTC [cauthdsl] func1 -> DEBU 1864 0xc003f64d70 gate 1555913822386093400 evaluation starts" +"2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1865 0xc003f64d70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1866 0xc003f64d70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1867 0xc003f64d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:02.386 UTC [cauthdsl] func2 -> DEBU 1868 0xc003f64d70 principal evaluation fails" +"2019-04-22 06:17:02.387 UTC [cauthdsl] func1 -> DEBU 1869 0xc003f64d70 gate 1555913822386093400 evaluation fails" +"2019-04-22 06:17:02.387 UTC [policies] Evaluate -> DEBU 186a Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:02.387 UTC [policies] Evaluate -> DEBU 186b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:02.388 UTC [policies] Evaluate -> DEBU 186c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:02.388 UTC [cauthdsl] func1 -> DEBU 186d 0xc003f655b0 gate 1555913822388502600 evaluation starts" +"2019-04-22 06:17:02.388 UTC [cauthdsl] func2 -> DEBU 186e 0xc003f655b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:02.388 UTC [cauthdsl] func2 -> DEBU 186f 0xc003f655b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:02.389 UTC [cauthdsl] func2 -> DEBU 1870 0xc003f655b0 principal matched by identity 0" +"2019-04-22 06:17:02.389 UTC [msp.identity] Verify -> DEBU 1871 Verify: digest = 00000000 22 22 7e a4 58 09 95 56 b9 66 ae 98 03 93 a9 7c |""~.X..V.f.....|| +00000010 4f 83 b8 e7 68 7d 79 00 d7 1e 40 40 2a 89 2f 8b |O...h}y...@@*./.|" +"2019-04-22 06:17:02.389 UTC [msp.identity] Verify -> DEBU 1872 Verify: sig = 00000000 30 45 02 21 00 8e 68 d6 bb f7 48 67 f0 a2 00 6b |0E.!..h...Hg...k| +00000010 b2 35 cb c2 81 94 c3 ea a1 74 3d 65 9b ca e5 b5 |.5.......t=e....| +00000020 37 6e 32 de 10 02 20 79 f0 a5 e5 89 28 06 af c1 |7n2... y....(...| +00000030 14 78 53 5a ce 31 9f 59 7a de 94 a0 ae 71 75 b3 |.xSZ.1.Yz....qu.| +00000040 ea 41 6f 6b c3 c4 1c |.Aok...|" +"2019-04-22 06:17:02.389 UTC [cauthdsl] func2 -> DEBU 1873 0xc003f655b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:02.390 UTC [cauthdsl] func1 -> DEBU 1874 0xc003f655b0 gate 1555913822388502600 evaluation succeeds" +"2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1875 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1876 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1877 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:02.390 UTC [policies] Evaluate -> DEBU 1878 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:02.390 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1879 constructing new tx simulator" +"2019-04-22 06:17:02.391 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 187a constructing new tx simulator txid = [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +"2019-04-22 06:17:02.391 UTC [endorser] SimulateProposal -> DEBU 187b [businesschannel][b6035b01] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:02.391 UTC [stateleveldb] GetState -> DEBU 187c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:02.392 UTC [endorser] callChaincode -> INFO 187d [businesschannel][b6035b01] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:02.392 UTC [stateleveldb] GetState -> DEBU 187e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:02.394 UTC [chaincode] LaunchConfig -> DEBU 187f launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-04-22 06:17:02.394 UTC [chaincode] Start -> DEBU 1880 start container: exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-04-22 06:17:02.394 UTC [chaincode] Start -> DEBU 1881 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-04-22 06:17:02.394 UTC [chaincode] Start -> DEBU 1882 start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-04-22 06:17:02.394 UTC [container] lockContainer -> DEBU 1883 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-04-22 06:17:02.394 UTC [container] lockContainer -> DEBU 1884 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-04-22 06:17:02.394 UTC [dockercontroller] stopInternal -> DEBU 1885 stopping container" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1886 stop container result" error="No such container: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1887 killing container" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1888 kill container result" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="No such container: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-04-22 06:17:02.395 UTC [dockercontroller] stopInternal -> DEBU 1889 removing container" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-04-22 06:17:02.397 UTC [dockercontroller] stopInternal -> DEBU 188a remove container result" id=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b error="No such container: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-04-22 06:17:02.397 UTC [dockercontroller] createContainer -> DEBU 188b create container" imageID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c containerID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-04-22 06:17:02.400 UTC [chaincode.platform] GenerateDockerfile -> DEBU 188c +FROM hyperledger/fabric-baseos:2.0.0 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="2.0.0" +ENV CORE_CHAINCODE_BUILDLEVEL=2.0.0" +"2019-04-22 06:17:02.403 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 188d building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-04-22 06:17:02.403 UTC [chaincode.platform.util] DockerBuild -> DEBU 188e Attempting build with image hyperledger/fabric-ccenv:2.0.0" +"2019-04-22 06:17:02.890 UTC [gossip.pull] Hello -> DEBU 188f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:02.890 UTC [gossip.comm] Send -> DEBU 1890 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:02.890 UTC [gossip.pull] Hello -> DEBU 1891 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:02.890 UTC [gossip.comm] Send -> DEBU 1892 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:02.890 UTC [gossip.pull] Hello -> DEBU 1893 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:02.890 UTC [gossip.comm] Send -> DEBU 1894 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1895 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1896 Exiting" +"2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1897 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1898 Exiting" +"2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 1899 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.890 UTC [gossip.comm] sendToEndpoint -> DEBU 189a Exiting" +"2019-04-22 06:17:02.892 UTC [gossip.comm] func1 -> DEBU 189b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13455117212195446162 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 189c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13455117212195446162 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.892 UTC [gossip.pull] HandleMessage -> DEBU 189d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13455117212195446162 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 189e Exiting" +"2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 189f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7917530305665029805 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.892 UTC [gossip.pull] HandleMessage -> DEBU 18a0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7917530305665029805 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.892 UTC [gossip.gossip] handleMessage -> DEBU 18a1 Exiting" +"2019-04-22 06:17:02.893 UTC [gossip.comm] func1 -> DEBU 18a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13521793691202731586 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.893 UTC [gossip.gossip] handleMessage -> DEBU 18a3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13521793691202731586 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.893 UTC [gossip.pull] HandleMessage -> DEBU 18a4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13521793691202731586 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.893 UTC [gossip.gossip] handleMessage -> DEBU 18a5 Exiting" +"2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a6 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151018 " +"2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a7 Sign: digest: 2FCD1EA2AA999BB9C114E25074F80AE236DC6CD483D8144EAF27BCA9569693E3 " +"2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:02.921 UTC [msp.identity] Sign -> DEBU 18a9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:02.922 UTC [msp] DeserializeIdentity -> DEBU 18aa Obtaining identity" +"2019-04-22 06:17:02.922 UTC [gossip.comm] Send -> DEBU 18ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:02.922 UTC [gossip.comm] Send -> DEBU 18ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:02.922 UTC [msp] DeserializeIdentity -> DEBU 18ad Obtaining identity" +"2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18ae Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.922 UTC [gossip.comm] Send -> DEBU 18af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" +"2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18b1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.922 UTC [gossip.comm] sendToEndpoint -> DEBU 18b2 Exiting" +"2019-04-22 06:17:02.923 UTC [gossip.comm] sendToEndpoint -> DEBU 18b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.923 UTC [gossip.comm] sendToEndpoint -> DEBU 18b4 Exiting" +"2019-04-22 06:17:02.925 UTC [gossip.gossip] handleMessage -> DEBU 18b5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.925 UTC [gossip.gossip] handleMessage -> DEBU 18b6 Exiting" +"2019-04-22 06:17:02.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.925 UTC [gossip.comm] func1 -> DEBU 18b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.925 UTC [gossip.gossip] handleMessage -> DEBU 18b9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.925 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ba Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:02.925 UTC [msp.identity] Verify -> DEBU 18bb Verify: digest = 00000000 2f cd 1e a2 aa 99 9b b9 c1 14 e2 50 74 f8 0a e2 |/..........Pt...| +00000010 36 dc 6c d4 83 d8 14 4e af 27 bc a9 56 96 93 e3 |6.l....N.'..V...|" +"2019-04-22 06:17:02.925 UTC [msp.identity] Verify -> DEBU 18bc Verify: sig = 00000000 30 44 02 20 03 03 b9 4e da 61 20 26 c8 b7 64 2c |0D. ...N.a &..d,| +00000010 4f 56 80 04 2b e1 ce 52 24 78 59 f9 9c 6e c5 ae |OV..+..R$xY..n..| +00000020 bd af c6 51 02 20 2a e6 f3 d9 66 18 37 27 9e 23 |...Q. *...f.7'.#| +00000030 8c 4d 6d 2f 6d cb c0 77 f5 a7 07 03 67 10 b8 e9 |.Mm/m..w....g...| +00000040 f1 b5 06 cf ab fa |......|" +"2019-04-22 06:17:02.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 18bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.925 UTC [gossip.discovery] isSentByMe -> DEBU 18be Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 18bf Exiting" +"2019-04-22 06:17:02.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c0 Exiting" +"2019-04-22 06:17:02.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.926 UTC [gossip.gossip] handleMessage -> DEBU 18c2 Exiting" +"2019-04-22 06:17:02.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18c3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:02.926 UTC [msp.identity] Verify -> DEBU 18c4 Verify: digest = 00000000 2f cd 1e a2 aa 99 9b b9 c1 14 e2 50 74 f8 0a e2 |/..........Pt...| +00000010 36 dc 6c d4 83 d8 14 4e af 27 bc a9 56 96 93 e3 |6.l....N.'..V...|" +"2019-04-22 06:17:02.926 UTC [msp.identity] Verify -> DEBU 18c5 Verify: sig = 00000000 30 44 02 20 03 03 b9 4e da 61 20 26 c8 b7 64 2c |0D. ...N.a &..d,| +00000010 4f 56 80 04 2b e1 ce 52 24 78 59 f9 9c 6e c5 ae |OV..+..R$xY..n..| +00000020 bd af c6 51 02 20 2a e6 f3 d9 66 18 37 27 9e 23 |...Q. *...f.7'.#| +00000030 8c 4d 6d 2f 6d cb c0 77 f5 a7 07 03 67 10 b8 e9 |.Mm/m..w....g...| +00000040 f1 b5 06 cf ab fa |......|" +"2019-04-22 06:17:02.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 18c6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.926 UTC [gossip.discovery] isSentByMe -> DEBU 18c7 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:02.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 18c8 Exiting" +"2019-04-22 06:17:02.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18c9 Exiting" +"2019-04-22 06:17:02.927 UTC [gossip.comm] func1 -> DEBU 18ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.927 UTC [gossip.gossip] handleMessage -> DEBU 18cb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.927 UTC [gossip.gossip] handleMessage -> DEBU 18cc Exiting" +"2019-04-22 06:17:02.927 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:02.927 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18ce Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18cf Verify: digest = 00000000 2f cd 1e a2 aa 99 9b b9 c1 14 e2 50 74 f8 0a e2 |/..........Pt...| +00000010 36 dc 6c d4 83 d8 14 4e af 27 bc a9 56 96 93 e3 |6.l....N.'..V...|" +"2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18d0 Verify: sig = 00000000 30 44 02 20 03 03 b9 4e da 61 20 26 c8 b7 64 2c |0D. ...N.a &..d,| +00000010 4f 56 80 04 2b e1 ce 52 24 78 59 f9 9c 6e c5 ae |OV..+..R$xY..n..| +00000020 bd af c6 51 02 20 2a e6 f3 d9 66 18 37 27 9e 23 |...Q. *...f.7'.#| +00000030 8c 4d 6d 2f 6d cb c0 77 f5 a7 07 03 67 10 b8 e9 |.Mm/m..w....g...| +00000040 f1 b5 06 cf ab fa |......|" +"2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18d1 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:02.927 UTC [msp.identity] Verify -> DEBU 18d2 Verify: sig = 00000000 30 44 02 20 22 36 36 11 c2 9b 31 90 b4 3f 3f 83 |0D. "66...1..??.| +00000010 2a d6 64 ec d2 b6 57 55 30 dc a0 4b aa 2a 9e ab |*.d...WU0..K.*..| +00000020 3f 2f a8 cf 02 20 65 9f 7d 3b ab 71 f4 74 5c ce |?/... e.};.q.t\.| +00000030 76 75 5c 40 24 82 4d fb 81 87 54 1f 18 bc 7e 79 |vu\@$.M...T...~y| +00000040 57 dd 8a 6c b4 f1 |W..l..|" +"2019-04-22 06:17:02.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:02.928 UTC [gossip.discovery] isSentByMe -> DEBU 18d4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:02.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d5 Exiting" +"2019-04-22 06:17:02.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18d6 Exiting" +"2019-04-22 06:17:03.158 UTC [gossip.comm] func1 -> DEBU 18d7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.158 UTC [gossip.gossip] handleMessage -> DEBU 18d8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.158 UTC [gossip.pull] HandleMessage -> DEBU 18d9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.158 UTC [gossip.pull] SendDigest -> DEBU 18da Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:03.158 UTC [gossip.gossip] handleMessage -> DEBU 18db Exiting" +"2019-04-22 06:17:03.179 UTC [gossip.comm] func1 -> DEBU 18dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.179 UTC [gossip.gossip] handleMessage -> DEBU 18dd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.180 UTC [gossip.gossip] handleMessage -> DEBU 18de Exiting" +"2019-04-22 06:17:03.180 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.180 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18e0 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e1 Verify: digest = 00000000 c6 81 44 83 3a a5 01 2d b0 8d 91 be e2 74 52 b8 |..D.:..-.....tR.| +00000010 02 08 35 88 e6 df 3b 30 07 6e e0 cb 62 46 9d 14 |..5...;0.n..bF..|" +"2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e2 Verify: sig = 00000000 30 45 02 21 00 c0 6d 99 d7 87 a2 d7 81 a1 1a 40 |0E.!..m........@| +00000010 dd 95 cf 2e 1a 17 2c e0 59 6a ea 03 4e 56 46 89 |......,.Yj..NVF.| +00000020 2d cd fe c1 15 02 20 39 05 e0 4d 79 fa b4 6a 7f |-..... 9..My..j.| +00000030 bf 55 c1 41 6e 5e 1f 5e 43 47 d8 8a 14 90 34 62 |.U.An^.^CG....4b| +00000040 1f bf fb 86 75 83 80 |....u..|" +"2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:03.180 UTC [msp.identity] Verify -> DEBU 18e4 Verify: sig = 00000000 30 45 02 21 00 8d db 8c 4e 96 22 88 0a 48 b8 41 |0E.!....N."..H.A| +00000010 00 a0 5f e7 ca 8b 7a 8e f4 4a fb 96 e0 ea 51 d0 |.._...z..J....Q.| +00000020 74 01 e3 60 dc 02 20 30 7b d3 37 80 52 d5 d2 26 |t..`.. 0{.7.R..&| +00000030 23 9d 04 fb e6 aa 7c 1b c2 d4 cd 7e c5 56 6a 6c |#.....|....~.Vjl| +00000040 b5 df 89 a8 47 01 08 |....G..|" +"2019-04-22 06:17:03.180 UTC [gossip.discovery] handleAliveMessage -> DEBU 18e5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:03.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e6 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:03.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e7 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 " +"2019-04-22 06:17:03.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 " +"2019-04-22 06:17:03.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 18e9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:03.181 UTC [gossip.discovery] learnExistingMembers -> DEBU 18ea Exiting" +"2019-04-22 06:17:03.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 18eb Exiting" +"2019-04-22 06:17:03.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ec Exiting" +"2019-04-22 06:17:03.181 UTC [gossip.discovery] sendMemResponse -> DEBU 18ed Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:03.181 UTC [msp] DeserializeIdentity -> DEBU 18ee Obtaining identity" +"2019-04-22 06:17:03.181 UTC [msp] DeserializeIdentity -> DEBU 18ef Obtaining identity" +"2019-04-22 06:17:03.181 UTC [gossip.comm] Send -> DEBU 18f0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:03.181 UTC [gossip.discovery] sendMemResponse -> DEBU 18f1 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:03.181 UTC [gossip.comm] sendToEndpoint -> DEBU 18f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.181 UTC [gossip.comm] sendToEndpoint -> DEBU 18f3 Exiting" +"2019-04-22 06:17:03.619 UTC [gossip.comm] func1 -> DEBU 18f4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.620 UTC [gossip.gossip] handleMessage -> DEBU 18f5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.620 UTC [gossip.pull] HandleMessage -> DEBU 18f6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.620 UTC [msp] DeserializeIdentity -> DEBU 18f7 Obtaining identity" +"2019-04-22 06:17:03.621 UTC [msp] DeserializeIdentity -> DEBU 18f8 Obtaining identity" +"2019-04-22 06:17:03.621 UTC [msp] DeserializeIdentity -> DEBU 18f9 Obtaining identity" +"2019-04-22 06:17:03.621 UTC [msp] DeserializeIdentity -> DEBU 18fa Obtaining identity" +"2019-04-22 06:17:03.622 UTC [msp] DeserializeIdentity -> DEBU 18fb Obtaining identity" +"2019-04-22 06:17:03.622 UTC [msp] DeserializeIdentity -> DEBU 18fc Obtaining identity" +"2019-04-22 06:17:03.623 UTC [gossip.pull] SendDigest -> DEBU 18fd Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:03.623 UTC [gossip.gossip] handleMessage -> DEBU 18fe Exiting" +"2019-04-22 06:17:03.628 UTC [gossip.comm] func1 -> DEBU 18ff Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.628 UTC [gossip.gossip] handleMessage -> DEBU 1900 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.629 UTC [gossip.gossip] handleMessage -> DEBU 1901 Exiting" +"2019-04-22 06:17:03.629 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1902 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.630 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1903 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:03.630 UTC [msp] DeserializeIdentity -> DEBU 1904 Obtaining identity" +"2019-04-22 06:17:03.631 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1905 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:03.631 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1906 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:03.632 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1907 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:03.632 UTC [policies] Evaluate -> DEBU 1908 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:03.632 UTC [policies] Evaluate -> DEBU 1909 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:03.633 UTC [policies] Evaluate -> DEBU 190a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:03.633 UTC [cauthdsl] func1 -> DEBU 190b 0xc004188210 gate 1555913823633668800 evaluation starts" +"2019-04-22 06:17:03.634 UTC [cauthdsl] func2 -> DEBU 190c 0xc004188210 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:03.634 UTC [cauthdsl] func2 -> DEBU 190d 0xc004188210 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:03.634 UTC [cauthdsl] func2 -> DEBU 190e 0xc004188210 principal matched by identity 0" +"2019-04-22 06:17:03.635 UTC [msp.identity] Verify -> DEBU 190f Verify: digest = 00000000 80 8e 0a 8a 80 27 a1 13 dc 59 cb 6a 68 2d ff 0c |.....'...Y.jh-..| +00000010 1a 92 74 d6 c6 fd f7 28 15 95 a1 32 d6 1f a3 f5 |..t....(...2....|" +"2019-04-22 06:17:03.635 UTC [msp.identity] Verify -> DEBU 1910 Verify: sig = 00000000 30 44 02 20 7b de 7a f7 26 8a 13 e8 05 a9 aa 6b |0D. {.z.&......k| +00000010 88 18 d0 df ee 34 7d d2 08 53 92 ec c4 80 d3 fc |.....4}..S......| +00000020 be e2 54 01 02 20 5a 3d dc a2 39 1f 18 5b 8e 7a |..T.. Z=..9..[.z| +00000030 34 a7 f9 85 f2 ff f8 6d ce 4f 81 64 9d ee ed 7b |4......m.O.d...{| +00000040 ec 9f e3 ee 3e 91 |....>.|" +"2019-04-22 06:17:03.636 UTC [cauthdsl] func2 -> DEBU 1911 0xc004188210 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:03.636 UTC [cauthdsl] func1 -> DEBU 1912 0xc004188210 gate 1555913823633668800 evaluation succeeds" +"2019-04-22 06:17:03.636 UTC [policies] Evaluate -> DEBU 1913 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:03.636 UTC [policies] Evaluate -> DEBU 1914 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:03.637 UTC [policies] Evaluate -> DEBU 1915 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:03.637 UTC [policies] Evaluate -> DEBU 1916 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:03.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 1917 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:03.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1918 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:03.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1919 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 " +"2019-04-22 06:17:03.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 191a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 " +"2019-04-22 06:17:03.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 191b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:03.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 191c Exiting" +"2019-04-22 06:17:03.640 UTC [gossip.discovery] handleAliveMessage -> DEBU 191d Exiting" +"2019-04-22 06:17:03.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 191e Exiting" +"2019-04-22 06:17:03.640 UTC [gossip.discovery] sendMemResponse -> DEBU 191f Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:03.640 UTC [msp] DeserializeIdentity -> DEBU 1920 Obtaining identity" +"2019-04-22 06:17:03.644 UTC [msp] DeserializeIdentity -> DEBU 1921 Obtaining identity" +"2019-04-22 06:17:03.645 UTC [msp] DeserializeIdentity -> DEBU 1922 Obtaining identity" +"2019-04-22 06:17:03.646 UTC [gossip.comm] Send -> DEBU 1923 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:03.646 UTC [gossip.discovery] sendMemResponse -> DEBU 1924 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:03.646 UTC [gossip.comm] sendToEndpoint -> DEBU 1925 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:03.647 UTC [gossip.comm] sendToEndpoint -> DEBU 1926 Exiting" +"2019-04-22 06:17:04.035 UTC [gossip.gossip] handleMessage -> DEBU 1927 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.035 UTC [gossip.pull] HandleMessage -> DEBU 1928 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 1929 Obtaining identity" +"2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 192a Obtaining identity" +"2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 192b Obtaining identity" +"2019-04-22 06:17:04.035 UTC [msp] DeserializeIdentity -> DEBU 192c Obtaining identity" +"2019-04-22 06:17:04.036 UTC [msp] DeserializeIdentity -> DEBU 192d Obtaining identity" +"2019-04-22 06:17:04.036 UTC [msp] DeserializeIdentity -> DEBU 192e Obtaining identity" +"2019-04-22 06:17:04.036 UTC [gossip.pull] SendDigest -> DEBU 192f Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:04.036 UTC [gossip.gossip] handleMessage -> DEBU 1930 Exiting" +"2019-04-22 06:17:04.054 UTC [gossip.gossip] handleMessage -> DEBU 1931 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.054 UTC [gossip.gossip] handleMessage -> DEBU 1932 Exiting" +"2019-04-22 06:17:04.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1933 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.056 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1934 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:04.056 UTC [msp] DeserializeIdentity -> DEBU 1935 Obtaining identity" +"2019-04-22 06:17:04.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1936 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1937 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1938 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.057 UTC [policies] Evaluate -> DEBU 1939 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.057 UTC [policies] Evaluate -> DEBU 193a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.057 UTC [policies] Evaluate -> DEBU 193b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.057 UTC [cauthdsl] func1 -> DEBU 193c 0xc0041acda0 gate 1555913824057796500 evaluation starts" +"2019-04-22 06:17:04.057 UTC [cauthdsl] func2 -> DEBU 193d 0xc0041acda0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.058 UTC [cauthdsl] func2 -> DEBU 193e 0xc0041acda0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.058 UTC [cauthdsl] func2 -> DEBU 193f 0xc0041acda0 principal matched by identity 0" +"2019-04-22 06:17:04.058 UTC [msp.identity] Verify -> DEBU 1940 Verify: digest = 00000000 b5 08 b4 8c b9 84 c3 e3 7b d9 2b 4c 13 b8 69 aa |........{.+L..i.| +00000010 7d eb d0 fc 9b 5e ff d2 c9 a5 0c 38 2f 6a 46 30 |}....^.....8/jF0|" +"2019-04-22 06:17:04.058 UTC [msp.identity] Verify -> DEBU 1941 Verify: sig = 00000000 30 44 02 20 47 24 0c c2 a9 ae 13 41 52 0c 63 69 |0D. G$.....AR.ci| +00000010 ef 4a 00 d8 07 b5 1f e0 80 05 be 75 fd 6d e5 5d |.J.........u.m.]| +00000020 5b 7d bf 25 02 20 7e c3 70 af 88 62 04 b7 c8 fe |[}.%. ~.p..b....| +00000030 2f e8 ff 3d 33 06 5a 51 58 cd 86 f3 a7 4a 15 8f |/..=3.ZQX....J..| +00000040 75 cd 03 ca 58 6d |u...Xm|" +"2019-04-22 06:17:04.058 UTC [cauthdsl] func2 -> DEBU 1942 0xc0041acda0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.060 UTC [cauthdsl] func1 -> DEBU 1943 0xc0041acda0 gate 1555913824057796500 evaluation succeeds" +"2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1944 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1946 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.060 UTC [policies] Evaluate -> DEBU 1947 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.060 UTC [gossip.discovery] handleAliveMessage -> DEBU 1948 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 1949 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 194a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 " +"2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 194b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 " +"2019-04-22 06:17:04.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 194c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:24 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:04.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 194d Exiting" +"2019-04-22 06:17:04.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 194e Exiting" +"2019-04-22 06:17:04.064 UTC [gossip.discovery] sendMemResponse -> DEBU 194f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:04.064 UTC [msp] DeserializeIdentity -> DEBU 1950 Obtaining identity" +"2019-04-22 06:17:04.064 UTC [msp] DeserializeIdentity -> DEBU 1951 Obtaining identity" +"2019-04-22 06:17:04.064 UTC [msp] DeserializeIdentity -> DEBU 1952 Obtaining identity" +"2019-04-22 06:17:04.064 UTC [gossip.comm] Send -> DEBU 1953 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:04.064 UTC [gossip.discovery] sendMemResponse -> DEBU 1954 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:04.064 UTC [gossip.comm] sendToEndpoint -> DEBU 1955 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.065 UTC [gossip.comm] sendToEndpoint -> DEBU 1956 Exiting" +"2019-04-22 06:17:04.063 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1957 Exiting" +"2019-04-22 06:17:04.423 UTC [msp] DeserializeIdentity -> DEBU 1958 Obtaining identity" +"2019-04-22 06:17:04.424 UTC [msp] DeserializeIdentity -> DEBU 1959 Obtaining identity" +"2019-04-22 06:17:04.424 UTC [gossip.comm] Send -> DEBU 195a Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195f Exiting" +"2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195d Exiting" +"2019-04-22 06:17:04.425 UTC [gossip.comm] sendToEndpoint -> DEBU 195e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.426 UTC [gossip.comm] sendToEndpoint -> DEBU 1960 Exiting" +"2019-04-22 06:17:04.427 UTC [gossip.comm] func1 -> DEBU 1961 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.428 UTC [gossip.gossip] handleMessage -> DEBU 1962 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.429 UTC [msp] DeserializeIdentity -> DEBU 1963 Obtaining identity" +"2019-04-22 06:17:04.429 UTC [msp] DeserializeIdentity -> DEBU 1964 Obtaining identity" +"2019-04-22 06:17:04.429 UTC [gossip.comm] Send -> DEBU 1965 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes to 3 peers" +"2019-04-22 06:17:04.430 UTC [msp] DeserializeIdentity -> DEBU 1966 Obtaining identity" +"2019-04-22 06:17:04.430 UTC [msp] DeserializeIdentity -> DEBU 1967 Obtaining identity" +"2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 1968 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 1969 Exiting" +"2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 196a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:04.431 UTC [gossip.comm] sendToEndpoint -> DEBU 196b Exiting" +"2019-04-22 06:17:04.432 UTC [gossip.comm] sendToEndpoint -> DEBU 196c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913821061008500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:04.432 UTC [gossip.comm] sendToEndpoint -> DEBU 196d Exiting" +"2019-04-22 06:17:04.429 UTC [msp.identity] Verify -> DEBU 196e Verify: digest = 00000000 56 d7 8e 4b e6 1d 85 07 86 41 30 33 05 ed 7a 39 |V..K.....A03..z9| +00000010 e2 2e f4 0e f4 53 ec da 40 8b c6 0d 7c cd 77 33 |.....S..@...|.w3|" +"2019-04-22 06:17:04.436 UTC [msp.identity] Verify -> DEBU 1970 Verify: sig = 00000000 30 45 02 21 00 9d ab 13 34 61 cb 42 80 26 cc bf |0E.!....4a.B.&..| +00000010 af 44 b2 af fb e3 80 ba 7e b0 0e dd a6 12 e2 e5 |.D......~.......| +00000020 4d 5e 6c 74 ed 02 20 5a 40 37 e1 a0 70 3c 67 19 |M^lt.. Z@7..p DEBU 196f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.441 UTC [msp] DeserializeIdentity -> DEBU 1971 Obtaining identity" +"2019-04-22 06:17:04.441 UTC [msp] DeserializeIdentity -> DEBU 1972 Obtaining identity" +"2019-04-22 06:17:04.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1973 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1974 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1975 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.442 UTC [policies] Evaluate -> DEBU 1976 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.442 UTC [policies] Evaluate -> DEBU 1977 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.443 UTC [policies] Evaluate -> DEBU 1978 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.443 UTC [cauthdsl] func1 -> DEBU 1979 0xc0041d3700 gate 1555913824443363000 evaluation starts" +"2019-04-22 06:17:04.443 UTC [cauthdsl] func2 -> DEBU 197a 0xc0041d3700 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.443 UTC [cauthdsl] func2 -> DEBU 197b 0xc0041d3700 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.443 UTC [cauthdsl] func2 -> DEBU 197c 0xc0041d3700 principal matched by identity 0" +"2019-04-22 06:17:04.444 UTC [msp.identity] Verify -> DEBU 197d Verify: digest = 00000000 a1 47 6f 2c 73 c5 7e eb 34 75 03 58 13 cf f7 ba |.Go,s.~.4u.X....| +00000010 44 85 23 c7 93 f1 50 d2 99 c4 f5 f4 ed 75 63 1b |D.#...P......uc.|" +"2019-04-22 06:17:04.444 UTC [msp.identity] Verify -> DEBU 197e Verify: sig = 00000000 30 44 02 20 13 13 9f b3 1a 71 eb 4e 0a aa 43 25 |0D. .....q.N..C%| +00000010 88 99 48 a8 12 08 1d 21 95 f1 53 96 9a 49 35 b5 |..H....!..S..I5.| +00000020 78 44 bb a9 02 20 11 a7 50 05 77 92 c2 62 3b ef |xD... ..P.w..b;.| +00000030 2d 46 0d 37 6a 2d 3f 84 38 c6 6f d9 74 b7 b8 84 |-F.7j-?.8.o.t...| +00000040 dc 88 1b 8e 89 e0 |......|" +"2019-04-22 06:17:04.444 UTC [cauthdsl] func2 -> DEBU 197f 0xc0041d3700 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.444 UTC [cauthdsl] func1 -> DEBU 1980 0xc0041d3700 gate 1555913824443363000 evaluation succeeds" +"2019-04-22 06:17:04.444 UTC [policies] Evaluate -> DEBU 1981 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.445 UTC [policies] Evaluate -> DEBU 1982 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.445 UTC [policies] Evaluate -> DEBU 1983 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.446 UTC [policies] Evaluate -> DEBU 1984 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.447 UTC [msp.identity] Verify -> DEBU 1985 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:04.447 UTC [msp.identity] Verify -> DEBU 1986 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:04.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1987 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1988 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.449 UTC [policies] Evaluate -> DEBU 1989 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.450 UTC [policies] Evaluate -> DEBU 198a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.450 UTC [policies] Evaluate -> DEBU 198b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.450 UTC [cauthdsl] func1 -> DEBU 198c 0xc0041f6e00 gate 1555913824450859800 evaluation starts" +"2019-04-22 06:17:04.456 UTC [cauthdsl] func2 -> DEBU 198d 0xc0041f6e00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.456 UTC [cauthdsl] func2 -> DEBU 198e 0xc0041f6e00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.457 UTC [cauthdsl] func2 -> DEBU 198f 0xc0041f6e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:04.457 UTC [cauthdsl] func2 -> DEBU 1990 0xc0041f6e00 principal evaluation fails" +"2019-04-22 06:17:04.457 UTC [cauthdsl] func1 -> DEBU 1991 0xc0041f6e00 gate 1555913824450859800 evaluation fails" +"2019-04-22 06:17:04.458 UTC [policies] Evaluate -> DEBU 1992 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.458 UTC [policies] Evaluate -> DEBU 1993 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.458 UTC [policies] Evaluate -> DEBU 1994 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:04.458 UTC [cauthdsl] func1 -> DEBU 1995 0xc0041f7640 gate 1555913824458975900 evaluation starts" +"2019-04-22 06:17:04.459 UTC [cauthdsl] func2 -> DEBU 1996 0xc0041f7640 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.459 UTC [cauthdsl] func2 -> DEBU 1997 0xc0041f7640 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.459 UTC [cauthdsl] func2 -> DEBU 1998 0xc0041f7640 principal matched by identity 0" +"2019-04-22 06:17:04.460 UTC [msp.identity] Verify -> DEBU 1999 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:04.460 UTC [msp.identity] Verify -> DEBU 199a Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:04.460 UTC [cauthdsl] func2 -> DEBU 199b 0xc0041f7640 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.460 UTC [cauthdsl] func1 -> DEBU 199c 0xc0041f7640 gate 1555913824458975900 evaluation succeeds" +"2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 199d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 199e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 199f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.461 UTC [policies] Evaluate -> DEBU 19a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.462 UTC [msp] DeserializeIdentity -> DEBU 19a1 Obtaining identity" +"2019-04-22 06:17:04.462 UTC [msp] DeserializeIdentity -> DEBU 19a2 Obtaining identity" +"2019-04-22 06:17:04.463 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.463 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.463 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.464 UTC [policies] Evaluate -> DEBU 19a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.464 UTC [policies] Evaluate -> DEBU 19a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.464 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.465 UTC [cauthdsl] func1 -> DEBU 19a9 0xc00420ae10 gate 1555913824465018000 evaluation starts" +"2019-04-22 06:17:04.465 UTC [cauthdsl] func2 -> DEBU 19aa 0xc00420ae10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.465 UTC [cauthdsl] func2 -> DEBU 19ab 0xc00420ae10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.465 UTC [cauthdsl] func2 -> DEBU 19ac 0xc00420ae10 principal matched by identity 0" +"2019-04-22 06:17:04.466 UTC [msp.identity] Verify -> DEBU 19ad Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:04.466 UTC [msp.identity] Verify -> DEBU 19ae Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:04.467 UTC [cauthdsl] func2 -> DEBU 19af 0xc00420ae10 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.467 UTC [cauthdsl] func1 -> DEBU 19b0 0xc00420ae10 gate 1555913824465018000 evaluation succeeds" +"2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b3 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.468 UTC [policies] Evaluate -> DEBU 19b4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.469 UTC [gossip.gossip] handleMessage -> DEBU 19b5 Exiting" +"2019-04-22 06:17:04.469 UTC [gossip.gossip] handleMessage -> DEBU 19b6 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.469 UTC [msp] DeserializeIdentity -> DEBU 19b7 Obtaining identity" +"2019-04-22 06:17:04.470 UTC [msp.identity] Verify -> DEBU 19b8 Verify: digest = 00000000 56 d7 8e 4b e6 1d 85 07 86 41 30 33 05 ed 7a 39 |V..K.....A03..z9| +00000010 e2 2e f4 0e f4 53 ec da 40 8b c6 0d 7c cd 77 33 |.....S..@...|.w3|" +"2019-04-22 06:17:04.470 UTC [msp.identity] Verify -> DEBU 19b9 Verify: sig = 00000000 30 45 02 21 00 9d ab 13 34 61 cb 42 80 26 cc bf |0E.!....4a.B.&..| +00000010 af 44 b2 af fb e3 80 ba 7e b0 0e dd a6 12 e2 e5 |.D......~.......| +00000020 4d 5e 6c 74 ed 02 20 5a 40 37 e1 a0 70 3c 67 19 |M^lt.. Z@7..p DEBU 19ba Verify: digest = 00000000 60 d8 64 83 fd f8 31 8b 5e 46 3c a1 c9 56 4f 59 |`.d...1.^F<..VOY| +00000010 fe 6a aa e8 df 2d 6d 6d 8f 2f c8 8a bc 45 ad c0 |.j...-mm./...E..|" +"2019-04-22 06:17:04.471 UTC [msp.identity] Verify -> DEBU 19bb Verify: sig = 00000000 30 44 02 20 24 c5 c4 bc b8 b9 30 56 c5 61 16 31 |0D. $.....0V.a.1| +00000010 28 27 26 d9 56 cd 97 20 88 f6 ec 74 27 f0 c9 8a |('&.V.. ...t'...| +00000020 e6 9c db e9 02 20 7f de 7d 45 da 53 2b 27 96 91 |..... ..}E.S+'..| +00000030 85 06 8a be a2 eb 00 59 e4 f7 c2 7d f8 e5 23 ae |.......Y...}..#.| +00000040 4d 34 56 e4 dd 25 |M4V..%|" +"2019-04-22 06:17:04.472 UTC [msp] DeserializeIdentity -> DEBU 19bc Obtaining identity" +"2019-04-22 06:17:04.472 UTC [msp] DeserializeIdentity -> DEBU 19bd Obtaining identity" +"2019-04-22 06:17:04.473 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19be Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19bf Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.473 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19c0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.473 UTC [policies] Evaluate -> DEBU 19c1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.474 UTC [policies] Evaluate -> DEBU 19c2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.474 UTC [policies] Evaluate -> DEBU 19c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.474 UTC [cauthdsl] func1 -> DEBU 19c4 0xc004221760 gate 1555913824474523500 evaluation starts" +"2019-04-22 06:17:04.474 UTC [cauthdsl] func2 -> DEBU 19c5 0xc004221760 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.475 UTC [cauthdsl] func2 -> DEBU 19c6 0xc004221760 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.475 UTC [cauthdsl] func2 -> DEBU 19c7 0xc004221760 principal matched by identity 0" +"2019-04-22 06:17:04.475 UTC [msp.identity] Verify -> DEBU 19c8 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:04.475 UTC [msp.identity] Verify -> DEBU 19c9 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:04.476 UTC [cauthdsl] func2 -> DEBU 19ca 0xc004221760 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.476 UTC [cauthdsl] func1 -> DEBU 19cb 0xc004221760 gate 1555913824474523500 evaluation succeeds" +"2019-04-22 06:17:04.476 UTC [policies] Evaluate -> DEBU 19cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.476 UTC [policies] Evaluate -> DEBU 19cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.477 UTC [policies] Evaluate -> DEBU 19ce Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.477 UTC [policies] Evaluate -> DEBU 19cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.478 UTC [msp] DeserializeIdentity -> DEBU 19d0 Obtaining identity" +"2019-04-22 06:17:04.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19d1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19d2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.479 UTC [policies] Evaluate -> DEBU 19d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.479 UTC [policies] Evaluate -> DEBU 19d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.479 UTC [policies] Evaluate -> DEBU 19d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.479 UTC [cauthdsl] func1 -> DEBU 19d6 0xc004242840 gate 1555913824479581700 evaluation starts" +"2019-04-22 06:17:04.479 UTC [cauthdsl] func2 -> DEBU 19d7 0xc004242840 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.480 UTC [cauthdsl] func2 -> DEBU 19d8 0xc004242840 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.480 UTC [cauthdsl] func2 -> DEBU 19d9 0xc004242840 principal matched by identity 0" +"2019-04-22 06:17:04.480 UTC [msp.identity] Verify -> DEBU 19da Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:04.481 UTC [msp.identity] Verify -> DEBU 19db Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:04.481 UTC [cauthdsl] func2 -> DEBU 19dc 0xc004242840 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.482 UTC [cauthdsl] func1 -> DEBU 19de 0xc004242840 gate 1555913824479581700 evaluation succeeds" +"2019-04-22 06:17:04.481 UTC [msp] DeserializeIdentity -> DEBU 19dd Obtaining identity" +"2019-04-22 06:17:04.482 UTC [policies] Evaluate -> DEBU 19df Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.482 UTC [policies] Evaluate -> DEBU 19e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.483 UTC [policies] Evaluate -> DEBU 19e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.483 UTC [policies] Evaluate -> DEBU 19e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.482 UTC [msp] DeserializeIdentity -> DEBU 19e1 Obtaining identity" +"2019-04-22 06:17:04.484 UTC [msp] DeserializeIdentity -> DEBU 19e4 Obtaining identity" +"2019-04-22 06:17:04.483 UTC [gossip.pull] Hello -> DEBU 19e5 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:04.484 UTC [msp] DeserializeIdentity -> DEBU 19e6 Obtaining identity" +"2019-04-22 06:17:04.484 UTC [msp] DeserializeIdentity -> DEBU 19e7 Obtaining identity" +"2019-04-22 06:17:04.485 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.485 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19ea Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.485 UTC [msp] DeserializeIdentity -> DEBU 19e9 Obtaining identity" +"2019-04-22 06:17:04.485 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19eb Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.485 UTC [gossip.comm] Send -> DEBU 19ec Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:04.485 UTC [policies] Evaluate -> DEBU 19ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.486 UTC [policies] Evaluate -> DEBU 19ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.486 UTC [policies] Evaluate -> DEBU 19ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.487 UTC [cauthdsl] func1 -> DEBU 19f0 0xc00425e170 gate 1555913824487706400 evaluation starts" +"2019-04-22 06:17:04.487 UTC [cauthdsl] func2 -> DEBU 19f1 0xc00425e170 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.488 UTC [cauthdsl] func2 -> DEBU 19f2 0xc00425e170 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.488 UTC [cauthdsl] func2 -> DEBU 19f3 0xc00425e170 principal matched by identity 0" +"2019-04-22 06:17:04.488 UTC [msp.identity] Verify -> DEBU 19f4 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:04.489 UTC [msp.identity] Verify -> DEBU 19f5 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:04.489 UTC [cauthdsl] func2 -> DEBU 19f6 0xc00425e170 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.490 UTC [cauthdsl] func1 -> DEBU 19f7 0xc00425e170 gate 1555913824487706400 evaluation succeeds" +"2019-04-22 06:17:04.490 UTC [policies] Evaluate -> DEBU 19f8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.491 UTC [policies] Evaluate -> DEBU 19f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.491 UTC [policies] Evaluate -> DEBU 19fa Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.492 UTC [policies] Evaluate -> DEBU 19fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.492 UTC [gossip.gossip] handleMessage -> DEBU 19fc Exiting" +"2019-04-22 06:17:04.492 UTC [gossip.gossip] handleMessage -> DEBU 19fd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.492 UTC [msp] DeserializeIdentity -> DEBU 19fe Obtaining identity" +"2019-04-22 06:17:04.493 UTC [msp] DeserializeIdentity -> DEBU 19ff Obtaining identity" +"2019-04-22 06:17:04.493 UTC [msp] DeserializeIdentity -> DEBU 1a00 Obtaining identity" +"2019-04-22 06:17:04.493 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.493 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a02 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.494 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a03 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.494 UTC [policies] Evaluate -> DEBU 1a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.494 UTC [policies] Evaluate -> DEBU 1a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.494 UTC [policies] Evaluate -> DEBU 1a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.494 UTC [cauthdsl] func1 -> DEBU 1a07 0xc00425fc80 gate 1555913824494568900 evaluation starts" +"2019-04-22 06:17:04.494 UTC [cauthdsl] func2 -> DEBU 1a08 0xc00425fc80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.495 UTC [cauthdsl] func2 -> DEBU 1a09 0xc00425fc80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.495 UTC [cauthdsl] func2 -> DEBU 1a0a 0xc00425fc80 principal matched by identity 0" +"2019-04-22 06:17:04.496 UTC [msp.identity] Verify -> DEBU 1a0b Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:04.496 UTC [msp.identity] Verify -> DEBU 1a0c Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:04.497 UTC [cauthdsl] func2 -> DEBU 1a0d 0xc00425fc80 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.498 UTC [cauthdsl] func1 -> DEBU 1a0e 0xc00425fc80 gate 1555913824494568900 evaluation succeeds" +"2019-04-22 06:17:04.498 UTC [policies] Evaluate -> DEBU 1a0f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.498 UTC [policies] Evaluate -> DEBU 1a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.498 UTC [policies] Evaluate -> DEBU 1a11 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.499 UTC [policies] Evaluate -> DEBU 1a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.499 UTC [msp] DeserializeIdentity -> DEBU 1a13 Obtaining identity" +"2019-04-22 06:17:04.499 UTC [msp] DeserializeIdentity -> DEBU 1a14 Obtaining identity" +"2019-04-22 06:17:04.500 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a16 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.500 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a17 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.500 UTC [policies] Evaluate -> DEBU 1a18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.501 UTC [policies] Evaluate -> DEBU 1a1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.501 UTC [policies] Evaluate -> DEBU 1a1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.501 UTC [cauthdsl] func1 -> DEBU 1a1c 0xc00426d450 gate 1555913824501896900 evaluation starts" +"2019-04-22 06:17:04.502 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc00426d450 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.501 UTC [gossip.comm] sendToEndpoint -> DEBU 1a19 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.502 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc00426d450 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.503 UTC [cauthdsl] func2 -> DEBU 1a20 0xc00426d450 principal matched by identity 0" +"2019-04-22 06:17:04.504 UTC [msp.identity] Verify -> DEBU 1a22 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:04.502 UTC [gossip.comm] sendToEndpoint -> DEBU 1a1f Exiting" +"2019-04-22 06:17:04.504 UTC [gossip.comm] func1 -> DEBU 1a21 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 225577992717231854 , Msg_type: BLOCK_MSG, digests: [5 1 2 3 4], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.504 UTC [msp.identity] Verify -> DEBU 1a23 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:04.505 UTC [cauthdsl] func2 -> DEBU 1a24 0xc00426d450 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.506 UTC [cauthdsl] func1 -> DEBU 1a25 0xc00426d450 gate 1555913824501896900 evaluation succeeds" +"2019-04-22 06:17:04.506 UTC [policies] Evaluate -> DEBU 1a26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.506 UTC [policies] Evaluate -> DEBU 1a27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.506 UTC [policies] Evaluate -> DEBU 1a28 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.507 UTC [policies] Evaluate -> DEBU 1a29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.508 UTC [msp.identity] Verify -> DEBU 1a2a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:04.508 UTC [msp.identity] Verify -> DEBU 1a2b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:04.512 UTC [msp.identity] Verify -> DEBU 1a2c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:04.512 UTC [msp.identity] Verify -> DEBU 1a2d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:04.512 UTC [gossip.gossip] handleMessage -> DEBU 1a2e Exiting" +"2019-04-22 06:17:04.512 UTC [gossip.gossip] handleMessage -> DEBU 1a2f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 225577992717231854 , Msg_type: BLOCK_MSG, digests: [5 1 2 3 4], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.513 UTC [gossip.pull] HandleMessage -> DEBU 1a30 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 225577992717231854 , Msg_type: BLOCK_MSG, digests: [5 1 2 3 4], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.513 UTC [gossip.gossip] handleMessage -> DEBU 1a31 Exiting" +"2019-04-22 06:17:04.681 UTC [gossip.comm] func1 -> DEBU 1a32 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.681 UTC [gossip.gossip] handleMessage -> DEBU 1a33 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.682 UTC [msp] DeserializeIdentity -> DEBU 1a34 Obtaining identity" +"2019-04-22 06:17:04.683 UTC [msp] DeserializeIdentity -> DEBU 1a35 Obtaining identity" +"2019-04-22 06:17:04.684 UTC [gossip.gossip] handleMessage -> DEBU 1a36 Exiting" +"2019-04-22 06:17:04.699 UTC [gossip.comm] func1 -> DEBU 1a37 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913821064386700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:04.702 UTC [gossip.comm] func1 -> DEBU 1a38 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.704 UTC [gossip.gossip] handleMessage -> DEBU 1a39 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913821064386700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:04.704 UTC [msp.identity] Verify -> DEBU 1a3a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:04.705 UTC [msp.identity] Verify -> DEBU 1a3b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:04.715 UTC [gossip.gossip] handleMessage -> DEBU 1a3c Exiting" +"2019-04-22 06:17:04.716 UTC [gossip.gossip] handleMessage -> DEBU 1a3d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.717 UTC [gossip.pull] HandleMessage -> DEBU 1a3e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.717 UTC [gossip.pull] SendDigest -> DEBU 1a3f Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:04.717 UTC [gossip.gossip] handleMessage -> DEBU 1a40 Exiting" +"2019-04-22 06:17:04.722 UTC [gossip.gossip] handleMessage -> DEBU 1a41 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913821064386700 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:04.725 UTC [msp.identity] Verify -> DEBU 1a42 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:04.726 UTC [msp.identity] Verify -> DEBU 1a43 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:04.727 UTC [msp] DeserializeIdentity -> DEBU 1a44 Obtaining identity" +"2019-04-22 06:17:04.727 UTC [gossip.gossip] handleMessage -> DEBU 1a45 Exiting" +"2019-04-22 06:17:04.906 UTC [gossip.gossip] handleMessage -> DEBU 1a46 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:04.906 UTC [msp] DeserializeIdentity -> DEBU 1a47 Obtaining identity" +"2019-04-22 06:17:04.907 UTC [msp] DeserializeIdentity -> DEBU 1a48 Obtaining identity" +"2019-04-22 06:17:04.907 UTC [msp] DeserializeIdentity -> DEBU 1a49 Obtaining identity" +"2019-04-22 06:17:04.907 UTC [gossip.gossip] handleMessage -> DEBU 1a4a Exiting" +"2019-04-22 06:17:04.911 UTC [gossip.gossip] handleMessage -> DEBU 1a4b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913821053638500 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:6 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:04.911 UTC [msp] DeserializeIdentity -> DEBU 1a4c Obtaining identity" +"2019-04-22 06:17:04.912 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:04.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a4e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a4f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:04.912 UTC [policies] Evaluate -> DEBU 1a50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:04.913 UTC [policies] Evaluate -> DEBU 1a51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:04.913 UTC [policies] Evaluate -> DEBU 1a52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:04.914 UTC [cauthdsl] func1 -> DEBU 1a53 0xc0042b2960 gate 1555913824914090800 evaluation starts" +"2019-04-22 06:17:04.914 UTC [cauthdsl] func2 -> DEBU 1a54 0xc0042b2960 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:04.914 UTC [cauthdsl] func2 -> DEBU 1a55 0xc0042b2960 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:04.914 UTC [cauthdsl] func2 -> DEBU 1a56 0xc0042b2960 principal matched by identity 0" +"2019-04-22 06:17:04.914 UTC [msp.identity] Verify -> DEBU 1a57 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:04.915 UTC [msp.identity] Verify -> DEBU 1a58 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:04.915 UTC [cauthdsl] func2 -> DEBU 1a59 0xc0042b2960 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:04.915 UTC [cauthdsl] func1 -> DEBU 1a5a 0xc0042b2960 gate 1555913824914090800 evaluation succeeds" +"2019-04-22 06:17:04.915 UTC [policies] Evaluate -> DEBU 1a5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.916 UTC [policies] Evaluate -> DEBU 1a5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:04.916 UTC [policies] Evaluate -> DEBU 1a5d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:04.916 UTC [policies] Evaluate -> DEBU 1a5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:04.917 UTC [msp] DeserializeIdentity -> DEBU 1a5f Obtaining identity" +"2019-04-22 06:17:04.918 UTC [gossip.gossip] handleMessage -> DEBU 1a60 Exiting" +"2019-04-22 06:17:05.121 UTC [gossip.comm] func1 -> DEBU 1a61 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:05.121 UTC [gossip.gossip] handleMessage -> DEBU 1a62 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:05.122 UTC [msp] DeserializeIdentity -> DEBU 1a63 Obtaining identity" +"2019-04-22 06:17:05.122 UTC [msp] DeserializeIdentity -> DEBU 1a64 Obtaining identity" +"2019-04-22 06:17:05.123 UTC [msp] DeserializeIdentity -> DEBU 1a65 Obtaining identity" +"2019-04-22 06:17:05.123 UTC [gossip.gossip] handleMessage -> DEBU 1a66 Exiting" +"2019-04-22 06:17:05.852 UTC [msp.identity] Sign -> DEBU 1a67 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151019 " +"2019-04-22 06:17:05.852 UTC [msp.identity] Sign -> DEBU 1a68 Sign: digest: 36B3A2AFE92775C577A4D5F52AD2E1AE7BAEA0F68266DB57A497ED62732CDDFC " +"2019-04-22 06:17:05.852 UTC [msp.identity] Sign -> DEBU 1a69 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:05.853 UTC [msp.identity] Sign -> DEBU 1a6a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:05.853 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1a6b Sleeping 5s" +"2019-04-22 06:17:05.861 UTC [msp] DeserializeIdentity -> DEBU 1a6c Obtaining identity" +"2019-04-22 06:17:05.861 UTC [msp] DeserializeIdentity -> DEBU 1a6d Obtaining identity" +"2019-04-22 06:17:05.862 UTC [msp] DeserializeIdentity -> DEBU 1a6e Obtaining identity" +"2019-04-22 06:17:05.862 UTC [gossip.comm] Send -> DEBU 1a6f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:05.862 UTC [msp] DeserializeIdentity -> DEBU 1a70 Obtaining identity" +"2019-04-22 06:17:05.862 UTC [gossip.comm] Send -> DEBU 1a72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:05.862 UTC [gossip.comm] sendToEndpoint -> DEBU 1a71 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:05.863 UTC [gossip.comm] sendToEndpoint -> DEBU 1a73 Exiting" +"2019-04-22 06:17:05.863 UTC [gossip.comm] Send -> DEBU 1a74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:05.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1a75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:05.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1a76 Exiting" +"2019-04-22 06:17:05.865 UTC [gossip.comm] sendToEndpoint -> DEBU 1a77 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:05.865 UTC [gossip.comm] sendToEndpoint -> DEBU 1a78 Exiting" +"2019-04-22 06:17:06.137 UTC [gossip.comm] func1 -> DEBU 1a79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:06.139 UTC [gossip.gossip] handleMessage -> DEBU 1a7a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:06.139 UTC [gossip.comm] func1 -> DEBU 1a7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.139 UTC [gossip.gossip] handleMessage -> DEBU 1a7c Exiting" +"2019-04-22 06:17:06.140 UTC [gossip.gossip] handleMessage -> DEBU 1a7d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a7e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:06.145 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1a7f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:06.146 UTC [msp.identity] Verify -> DEBU 1a80 Verify: digest = 00000000 f7 e4 38 73 a1 05 dc 6f 84 11 12 22 ca 77 e0 10 |..8s...o...".w..| +00000010 fe 4b 87 25 8f 09 08 35 57 c1 17 79 6f 30 77 9d |.K.%...5W..yo0w.|" +"2019-04-22 06:17:06.147 UTC [msp.identity] Verify -> DEBU 1a81 Verify: sig = 00000000 30 45 02 21 00 93 d0 14 ed 6f 01 68 f7 5f 8c 14 |0E.!.....o.h._..| +00000010 89 cd 5e 3f cf 28 d5 6c 0d a5 7e b0 aa a1 fc 51 |..^?.(.l..~....Q| +00000020 7b dc 1f e7 1d 02 20 2e dd 41 50 91 ae 86 bf 77 |{..... ..AP....w| +00000030 d3 df 02 de 0c 07 dd 96 f9 55 a5 f2 b2 87 c5 39 |.........U.....9| +00000040 06 cc aa 67 d0 ea 48 |...g..H|" +"2019-04-22 06:17:06.149 UTC [msp.identity] Verify -> DEBU 1a82 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:06.150 UTC [msp.identity] Verify -> DEBU 1a83 Verify: sig = 00000000 30 45 02 21 00 bf 52 e8 f5 7e 90 5d ac 8e 5b ed |0E.!..R..~.]..[.| +00000010 cd 23 12 be b5 63 3c 62 ab 69 3b c1 7c 55 b1 fa |.#...c DEBU 1a84 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:06.150 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a85 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:06.151 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a86 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 " +"2019-04-22 06:17:06.151 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a87 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 " +"2019-04-22 06:17:06.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a88 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:06.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 1a89 Exiting" +"2019-04-22 06:17:06.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 1a8a Exiting" +"2019-04-22 06:17:06.154 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a8b Exiting" +"2019-04-22 06:17:06.154 UTC [gossip.gossip] handleMessage -> DEBU 1a8c Exiting" +"2019-04-22 06:17:06.154 UTC [gossip.gossip] handleMessage -> DEBU 1a8d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a8f Exiting" +"2019-04-22 06:17:06.155 UTC [gossip.gossip] handleMessage -> DEBU 1a90 Exiting" +"2019-04-22 06:17:06.155 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a91 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1a92 Exiting" +"2019-04-22 06:17:06.160 UTC [msp] DeserializeIdentity -> DEBU 1a93 Obtaining identity" +"2019-04-22 06:17:06.160 UTC [msp] DeserializeIdentity -> DEBU 1a94 Obtaining identity" +"2019-04-22 06:17:06.161 UTC [msp] DeserializeIdentity -> DEBU 1a95 Obtaining identity" +"2019-04-22 06:17:06.161 UTC [gossip.comm] Send -> DEBU 1a96 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:06.161 UTC [msp] DeserializeIdentity -> DEBU 1a97 Obtaining identity" +"2019-04-22 06:17:06.162 UTC [gossip.comm] Send -> DEBU 1a98 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:06.162 UTC [gossip.comm] sendToEndpoint -> DEBU 1a99 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.162 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9a Exiting" +"2019-04-22 06:17:06.163 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.163 UTC [gossip.comm] sendToEndpoint -> DEBU 1a9c Exiting" +"2019-04-22 06:17:06.473 UTC [gossip.election] waitForInterrupt -> DEBU 1a9d c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:06.473 UTC [gossip.election] IsLeader -> DEBU 1a9e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:06.474 UTC [msp.identity] Sign -> DEBU 1a9f Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510061801 " +"2019-04-22 06:17:06.474 UTC [msp.identity] Sign -> DEBU 1aa0 Sign: digest: 9EE17E559BC6BC2E22F4C57D015A5BBA6950C1C2195DFD78B4BBF840C4A335F5 " +"2019-04-22 06:17:06.474 UTC [gossip.election] waitForInterrupt -> DEBU 1aa1 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:06.480 UTC [msp] DeserializeIdentity -> DEBU 1aa2 Obtaining identity" +"2019-04-22 06:17:06.481 UTC [msp] DeserializeIdentity -> DEBU 1aa3 Obtaining identity" +"2019-04-22 06:17:06.481 UTC [msp] DeserializeIdentity -> DEBU 1aa4 Obtaining identity" +"2019-04-22 06:17:06.482 UTC [msp] DeserializeIdentity -> DEBU 1aa5 Obtaining identity" +"2019-04-22 06:17:06.482 UTC [gossip.comm] Send -> DEBU 1aa6 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:06.483 UTC [gossip.comm] sendToEndpoint -> DEBU 1aa7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:6 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:17:06.483 UTC [gossip.comm] sendToEndpoint -> DEBU 1aa8 Exiting" +"2019-04-22 06:17:06.484 UTC [msp] DeserializeIdentity -> DEBU 1aa9 Obtaining identity" +"2019-04-22 06:17:06.484 UTC [msp] DeserializeIdentity -> DEBU 1aaa Obtaining identity" +"2019-04-22 06:17:06.621 UTC [gossip.comm] func1 -> DEBU 1aab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.623 UTC [gossip.gossip] handleMessage -> DEBU 1aac Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.623 UTC [gossip.gossip] handleMessage -> DEBU 1aad Exiting" +"2019-04-22 06:17:06.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aae Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.623 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1aaf Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:06.624 UTC [msp] DeserializeIdentity -> DEBU 1ab0 Obtaining identity" +"2019-04-22 06:17:06.624 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ab1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:06.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ab2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:06.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ab3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:06.625 UTC [policies] Evaluate -> DEBU 1ab4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:06.625 UTC [policies] Evaluate -> DEBU 1ab5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:06.626 UTC [policies] Evaluate -> DEBU 1ab6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:06.626 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc004312470 gate 1555913826626495600 evaluation starts" +"2019-04-22 06:17:06.626 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc004312470 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:06.626 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc004312470 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:06.626 UTC [cauthdsl] func2 -> DEBU 1aba 0xc004312470 principal matched by identity 0" +"2019-04-22 06:17:06.627 UTC [msp.identity] Verify -> DEBU 1abb Verify: digest = 00000000 6c b0 13 64 3a f8 41 54 1d e7 85 ce ae fb 19 47 |l..d:.AT.......G| +00000010 31 ad 37 c7 bf fb 8d 91 50 96 14 90 fa e8 39 d7 |1.7.....P.....9.|" +"2019-04-22 06:17:06.627 UTC [msp.identity] Verify -> DEBU 1abc Verify: sig = 00000000 30 45 02 21 00 be 25 cf 4b 3b f4 0f 96 8f e5 15 |0E.!..%.K;......| +00000010 12 a1 22 d8 aa 26 fa 9c c0 c2 85 e5 39 e9 f2 ea |.."..&......9...| +00000020 22 a3 77 01 12 02 20 52 ac ba 43 77 5e 83 76 43 |".w... R..Cw^.vC| +00000030 48 60 ee d3 db ca 07 b5 c0 b0 2b d4 9b ea 68 d0 |H`........+...h.| +00000040 4f 5d f4 1c fd d0 83 |O].....|" +"2019-04-22 06:17:06.627 UTC [cauthdsl] func2 -> DEBU 1abd 0xc004312470 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:06.628 UTC [cauthdsl] func1 -> DEBU 1abe 0xc004312470 gate 1555913826626495600 evaluation succeeds" +"2019-04-22 06:17:06.628 UTC [policies] Evaluate -> DEBU 1abf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:06.628 UTC [policies] Evaluate -> DEBU 1ac0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:06.628 UTC [policies] Evaluate -> DEBU 1ac1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:06.629 UTC [policies] Evaluate -> DEBU 1ac2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:06.629 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ac3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:06.629 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac5 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 " +"2019-04-22 06:17:06.631 UTC [gossip.comm] func1 -> DEBU 1ac6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.632 UTC [gossip.gossip] handleMessage -> DEBU 1ac7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac8 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 " +"2019-04-22 06:17:06.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ac9 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:06.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 1aca Exiting" +"2019-04-22 06:17:06.634 UTC [gossip.discovery] handleAliveMessage -> DEBU 1acb Exiting" +"2019-04-22 06:17:06.634 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1acc Exiting" +"2019-04-22 06:17:06.634 UTC [gossip.gossip] handleMessage -> DEBU 1acd Exiting" +"2019-04-22 06:17:06.634 UTC [gossip.gossip] handleMessage -> DEBU 1ace Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.635 UTC [msp] DeserializeIdentity -> DEBU 1acf Obtaining identity" +"2019-04-22 06:17:06.635 UTC [msp] DeserializeIdentity -> DEBU 1ad0 Obtaining identity" +"2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad1 Obtaining identity" +"2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad2 Obtaining identity" +"2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad3 Obtaining identity" +"2019-04-22 06:17:06.636 UTC [msp] DeserializeIdentity -> DEBU 1ad4 Obtaining identity" +"2019-04-22 06:17:06.637 UTC [gossip.comm] Send -> DEBU 1ad5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:06.637 UTC [msp] DeserializeIdentity -> DEBU 1ad6 Obtaining identity" +"2019-04-22 06:17:06.637 UTC [msp] DeserializeIdentity -> DEBU 1ad7 Obtaining identity" +"2019-04-22 06:17:06.637 UTC [gossip.comm] Send -> DEBU 1ad8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:06.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1ad9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.638 UTC [gossip.comm] sendToEndpoint -> DEBU 1ada Exiting" +"2019-04-22 06:17:06.639 UTC [gossip.comm] sendToEndpoint -> DEBU 1adb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.639 UTC [gossip.comm] sendToEndpoint -> DEBU 1adc Exiting" +"2019-04-22 06:17:06.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1add Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ade Exiting" +"2019-04-22 06:17:06.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1adf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae1 Exiting" +"2019-04-22 06:17:06.647 UTC [gossip.gossip] handleMessage -> DEBU 1ae0 Exiting" +"2019-04-22 06:17:06.891 UTC [gossip.pull] Hello -> DEBU 1ae2 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:06.891 UTC [gossip.comm] Send -> DEBU 1ae3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:06.892 UTC [gossip.pull] Hello -> DEBU 1ae4 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:06.892 UTC [gossip.comm] Send -> DEBU 1ae5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:06.892 UTC [gossip.pull] Hello -> DEBU 1ae6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:06.893 UTC [gossip.comm] Send -> DEBU 1ae7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:06.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.894 UTC [gossip.comm] sendToEndpoint -> DEBU 1aea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.894 UTC [gossip.comm] sendToEndpoint -> DEBU 1aeb Exiting" +"2019-04-22 06:17:06.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1ae9 Exiting" +"2019-04-22 06:17:06.895 UTC [gossip.comm] sendToEndpoint -> DEBU 1aec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1aed Exiting" +"2019-04-22 06:17:06.897 UTC [gossip.comm] func1 -> DEBU 1aee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2421829310105822763 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.899 UTC [gossip.comm] func1 -> DEBU 1aef Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8388459247206392471 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.899 UTC [gossip.gossip] handleMessage -> DEBU 1af0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10897878003932075742 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.900 UTC [gossip.pull] HandleMessage -> DEBU 1af1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10897878003932075742 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af2 Exiting" +"2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2421829310105822763 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.901 UTC [gossip.pull] HandleMessage -> DEBU 1af4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2421829310105822763 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af5 Exiting" +"2019-04-22 06:17:06.901 UTC [gossip.gossip] handleMessage -> DEBU 1af6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8388459247206392471 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.902 UTC [gossip.pull] HandleMessage -> DEBU 1af7 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8388459247206392471 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.902 UTC [gossip.gossip] handleMessage -> DEBU 1af8 Exiting" +"2019-04-22 06:17:06.923 UTC [msp.identity] Sign -> DEBU 1af9 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101A " +"2019-04-22 06:17:06.923 UTC [msp.identity] Sign -> DEBU 1afa Sign: digest: E9F65E69CF01B32F87F59651BA1FA3DD552F15C9B735AC0DA7B15EFB2CAD3BA2 " +"2019-04-22 06:17:06.923 UTC [msp.identity] Sign -> DEBU 1afb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:06.924 UTC [msp.identity] Sign -> DEBU 1afc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:06.924 UTC [gossip.comm] Send -> DEBU 1afd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:06.924 UTC [msp] DeserializeIdentity -> DEBU 1afe Obtaining identity" +"2019-04-22 06:17:06.925 UTC [gossip.comm] Send -> DEBU 1aff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:06.925 UTC [msp] DeserializeIdentity -> DEBU 1b00 Obtaining identity" +"2019-04-22 06:17:06.925 UTC [gossip.comm] Send -> DEBU 1b01 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b02 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Exiting" +"2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 1b05 Exiting" +"2019-04-22 06:17:06.927 UTC [gossip.comm] sendToEndpoint -> DEBU 1b06 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.927 UTC [gossip.comm] sendToEndpoint -> DEBU 1b07 Exiting" +"2019-04-22 06:17:06.930 UTC [gossip.gossip] handleMessage -> DEBU 1b08 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.930 UTC [gossip.gossip] handleMessage -> DEBU 1b09 Exiting" +"2019-04-22 06:17:06.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b0b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:06.932 UTC [gossip.comm] func1 -> DEBU 1b0c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.932 UTC [msp.identity] Verify -> DEBU 1b0d Verify: digest = 00000000 e9 f6 5e 69 cf 01 b3 2f 87 f5 96 51 ba 1f a3 dd |..^i.../...Q....| +00000010 55 2f 15 c9 b7 35 ac 0d a7 b1 5e fb 2c ad 3b a2 |U/...5....^.,.;.|" +"2019-04-22 06:17:06.933 UTC [gossip.gossip] handleMessage -> DEBU 1b0f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.933 UTC [msp.identity] Verify -> DEBU 1b10 Verify: sig = 00000000 30 45 02 21 00 b8 52 e6 6a b6 ed 10 a1 d7 52 e2 |0E.!..R.j.....R.| +00000010 54 22 5f 88 60 77 a3 bb 58 80 dc 86 87 e2 77 24 |T"_.`w..X.....w$| +00000020 83 60 c2 8a e9 02 20 31 8f 42 76 ab ec 6f d9 df |.`.... 1.Bv..o..| +00000030 5a 3e 3b 14 53 d5 bd b6 e5 47 6e ea 55 ac 8f 35 |Z>;.S....Gn.U..5| +00000040 b2 88 e4 80 c1 6a e1 |.....j.|" +"2019-04-22 06:17:06.933 UTC [gossip.comm] func1 -> DEBU 1b0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b11 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.934 UTC [gossip.discovery] isSentByMe -> DEBU 1b12 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b13 Exiting" +"2019-04-22 06:17:06.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b14 Exiting" +"2019-04-22 06:17:06.935 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b15 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.935 UTC [gossip.gossip] handleMessage -> DEBU 1b16 Exiting" +"2019-04-22 06:17:06.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b17 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:06.935 UTC [gossip.gossip] handleMessage -> DEBU 1b18 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.936 UTC [msp.identity] Verify -> DEBU 1b19 Verify: digest = 00000000 e9 f6 5e 69 cf 01 b3 2f 87 f5 96 51 ba 1f a3 dd |..^i.../...Q....| +00000010 55 2f 15 c9 b7 35 ac 0d a7 b1 5e fb 2c ad 3b a2 |U/...5....^.,.;.|" +"2019-04-22 06:17:06.937 UTC [msp.identity] Verify -> DEBU 1b1a Verify: sig = 00000000 30 45 02 21 00 b8 52 e6 6a b6 ed 10 a1 d7 52 e2 |0E.!..R.j.....R.| +00000010 54 22 5f 88 60 77 a3 bb 58 80 dc 86 87 e2 77 24 |T"_.`w..X.....w$| +00000020 83 60 c2 8a e9 02 20 31 8f 42 76 ab ec 6f d9 df |.`.... 1.Bv..o..| +00000030 5a 3e 3b 14 53 d5 bd b6 e5 47 6e ea 55 ac 8f 35 |Z>;.S....Gn.U..5| +00000040 b2 88 e4 80 c1 6a e1 |.....j.|" +"2019-04-22 06:17:06.937 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b1b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.937 UTC [gossip.discovery] isSentByMe -> DEBU 1b1c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:06.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b1d Exiting" +"2019-04-22 06:17:06.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b1e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:06.938 UTC [msp] DeserializeIdentity -> DEBU 1b1f Obtaining identity" +"2019-04-22 06:17:06.938 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:06.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b21 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:06.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b22 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:06.939 UTC [policies] Evaluate -> DEBU 1b23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:06.939 UTC [policies] Evaluate -> DEBU 1b24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:06.939 UTC [policies] Evaluate -> DEBU 1b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:06.940 UTC [cauthdsl] func1 -> DEBU 1b26 0xc00437cc80 gate 1555913826939930200 evaluation starts" +"2019-04-22 06:17:06.940 UTC [cauthdsl] func2 -> DEBU 1b27 0xc00437cc80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:06.940 UTC [cauthdsl] func2 -> DEBU 1b28 0xc00437cc80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:06.940 UTC [cauthdsl] func2 -> DEBU 1b29 0xc00437cc80 principal matched by identity 0" +"2019-04-22 06:17:06.940 UTC [msp.identity] Verify -> DEBU 1b2a Verify: digest = 00000000 b5 08 b4 8c b9 84 c3 e3 7b d9 2b 4c 13 b8 69 aa |........{.+L..i.| +00000010 7d eb d0 fc 9b 5e ff d2 c9 a5 0c 38 2f 6a 46 30 |}....^.....8/jF0|" +"2019-04-22 06:17:06.941 UTC [msp.identity] Verify -> DEBU 1b2b Verify: sig = 00000000 30 44 02 20 47 24 0c c2 a9 ae 13 41 52 0c 63 69 |0D. G$.....AR.ci| +00000010 ef 4a 00 d8 07 b5 1f e0 80 05 be 75 fd 6d e5 5d |.J.........u.m.]| +00000020 5b 7d bf 25 02 20 7e c3 70 af 88 62 04 b7 c8 fe |[}.%. ~.p..b....| +00000030 2f e8 ff 3d 33 06 5a 51 58 cd 86 f3 a7 4a 15 8f |/..=3.ZQX....J..| +00000040 75 cd 03 ca 58 6d |u...Xm|" +"2019-04-22 06:17:06.941 UTC [cauthdsl] func2 -> DEBU 1b2c 0xc00437cc80 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:06.941 UTC [cauthdsl] func1 -> DEBU 1b2d 0xc00437cc80 gate 1555913826939930200 evaluation succeeds" +"2019-04-22 06:17:06.942 UTC [policies] Evaluate -> DEBU 1b2e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:06.943 UTC [policies] Evaluate -> DEBU 1b2f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:06.943 UTC [policies] Evaluate -> DEBU 1b30 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:06.944 UTC [policies] Evaluate -> DEBU 1b31 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:06.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b32 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:06.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b33 Exiting" +"2019-04-22 06:17:06.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b34 Exiting" +"2019-04-22 06:17:06.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b35 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:06.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b37 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:06.945 UTC [gossip.gossip] handleMessage -> DEBU 1b36 Exiting" +"2019-04-22 06:17:06.948 UTC [msp.identity] Verify -> DEBU 1b38 Verify: digest = 00000000 e9 f6 5e 69 cf 01 b3 2f 87 f5 96 51 ba 1f a3 dd |..^i.../...Q....| +00000010 55 2f 15 c9 b7 35 ac 0d a7 b1 5e fb 2c ad 3b a2 |U/...5....^.,.;.|" +"2019-04-22 06:17:06.948 UTC [msp.identity] Verify -> DEBU 1b39 Verify: sig = 00000000 30 45 02 21 00 b8 52 e6 6a b6 ed 10 a1 d7 52 e2 |0E.!..R.j.....R.| +00000010 54 22 5f 88 60 77 a3 bb 58 80 dc 86 87 e2 77 24 |T"_.`w..X.....w$| +00000020 83 60 c2 8a e9 02 20 31 8f 42 76 ab ec 6f d9 df |.`.... 1.Bv..o..| +00000030 5a 3e 3b 14 53 d5 bd b6 e5 47 6e ea 55 ac 8f 35 |Z>;.S....Gn.U..5| +00000040 b2 88 e4 80 c1 6a e1 |.....j.|" +"2019-04-22 06:17:06.949 UTC [msp.identity] Verify -> DEBU 1b3a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:06.949 UTC [msp.identity] Verify -> DEBU 1b3b Verify: sig = 00000000 30 44 02 20 72 29 94 4d fe 42 45 6e be b9 74 7c |0D. r).M.BEn..t|| +00000010 d1 00 a0 0d 0f a1 e2 96 04 64 84 9a 9f 4e 58 ef |.........d...NX.| +00000020 07 69 a2 e5 02 20 3f b9 c3 c7 f9 dc 55 ad d4 06 |.i... ?.....U...| +00000030 4f a8 5b 90 4b 7b 21 92 b7 be a6 54 2d 20 2e 45 |O.[.K{!....T- .E| +00000040 d0 08 34 d6 87 6d |..4..m|" +"2019-04-22 06:17:06.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:06.954 UTC [gossip.discovery] isSentByMe -> DEBU 1b3d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:06.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3e Exiting" +"2019-04-22 06:17:06.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b3f Exiting" +"2019-04-22 06:17:07.051 UTC [gossip.gossip] handleMessage -> DEBU 1b40 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.051 UTC [gossip.gossip] handleMessage -> DEBU 1b41 Exiting" +"2019-04-22 06:17:07.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b42 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.053 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b43 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:07.054 UTC [msp] DeserializeIdentity -> DEBU 1b44 Obtaining identity" +"2019-04-22 06:17:07.054 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b45 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:07.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b46 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:07.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b47 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:07.056 UTC [policies] Evaluate -> DEBU 1b48 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:07.056 UTC [policies] Evaluate -> DEBU 1b49 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:07.056 UTC [policies] Evaluate -> DEBU 1b4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:07.057 UTC [cauthdsl] func1 -> DEBU 1b4b 0xc004339b60 gate 1555913827057187600 evaluation starts" +"2019-04-22 06:17:07.057 UTC [cauthdsl] func2 -> DEBU 1b4c 0xc004339b60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:07.057 UTC [cauthdsl] func2 -> DEBU 1b4d 0xc004339b60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:07.057 UTC [cauthdsl] func2 -> DEBU 1b4e 0xc004339b60 principal matched by identity 0" +"2019-04-22 06:17:07.057 UTC [msp.identity] Verify -> DEBU 1b4f Verify: digest = 00000000 66 dc 81 ee 7a ff 3c f0 75 94 fa e0 40 61 69 26 |f...z.<.u...@ai&| +00000010 ef b1 fd 02 03 0c e3 6c 57 17 34 30 1f 03 5f 98 |.......lW.40.._.|" +"2019-04-22 06:17:07.058 UTC [msp.identity] Verify -> DEBU 1b50 Verify: sig = 00000000 30 45 02 21 00 cc 82 52 ea b6 b4 a2 37 ac cf c6 |0E.!...R....7...| +00000010 80 66 16 5a ab de d3 10 26 8c 4e e9 61 77 3a 1f |.f.Z....&.N.aw:.| +00000020 6d c4 69 9f 47 02 20 7a 77 48 af 5c a2 af 53 50 |m.i.G. zwH.\..SP| +00000030 a8 cd 55 39 bb e6 de 09 42 1f fc be d8 fb a2 aa |..U9....B.......| +00000040 04 5a 95 e8 74 bc 4f |.Z..t.O|" +"2019-04-22 06:17:07.059 UTC [cauthdsl] func2 -> DEBU 1b51 0xc004339b60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:07.059 UTC [cauthdsl] func1 -> DEBU 1b52 0xc004339b60 gate 1555913827057187600 evaluation succeeds" +"2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b53 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b54 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b55 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:07.059 UTC [policies] Evaluate -> DEBU 1b56 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:07.060 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b57 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b58 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:07.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b59 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 " +"2019-04-22 06:17:07.060 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 " +"2019-04-22 06:17:07.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:25 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:07.061 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b5c Exiting" +"2019-04-22 06:17:07.061 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b5d Exiting" +"2019-04-22 06:17:07.063 UTC [gossip.comm] func1 -> DEBU 1b5e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.063 UTC [gossip.gossip] handleMessage -> DEBU 1b5f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.064 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b60 Exiting" +"2019-04-22 06:17:07.064 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.064 UTC [gossip.gossip] handleMessage -> DEBU 1b62 Exiting" +"2019-04-22 06:17:07.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b63 Exiting" +"2019-04-22 06:17:07.066 UTC [gossip.comm] func1 -> DEBU 1b64 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.067 UTC [gossip.gossip] handleMessage -> DEBU 1b65 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.067 UTC [gossip.gossip] handleMessage -> DEBU 1b66 Exiting" +"2019-04-22 06:17:07.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b68 Exiting" +"2019-04-22 06:17:07.071 UTC [msp] DeserializeIdentity -> DEBU 1b69 Obtaining identity" +"2019-04-22 06:17:07.072 UTC [msp] DeserializeIdentity -> DEBU 1b6a Obtaining identity" +"2019-04-22 06:17:07.072 UTC [msp] DeserializeIdentity -> DEBU 1b6b Obtaining identity" +"2019-04-22 06:17:07.072 UTC [msp] DeserializeIdentity -> DEBU 1b6c Obtaining identity" +"2019-04-22 06:17:07.073 UTC [msp] DeserializeIdentity -> DEBU 1b6d Obtaining identity" +"2019-04-22 06:17:07.073 UTC [msp] DeserializeIdentity -> DEBU 1b6e Obtaining identity" +"2019-04-22 06:17:07.073 UTC [msp] DeserializeIdentity -> DEBU 1b6f Obtaining identity" +"2019-04-22 06:17:07.074 UTC [gossip.comm] Send -> DEBU 1b70 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:07.074 UTC [msp] DeserializeIdentity -> DEBU 1b71 Obtaining identity" +"2019-04-22 06:17:07.074 UTC [gossip.comm] Send -> DEBU 1b73 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:07.074 UTC [gossip.comm] sendToEndpoint -> DEBU 1b72 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.075 UTC [gossip.comm] sendToEndpoint -> DEBU 1b74 Exiting" +"2019-04-22 06:17:07.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1b75 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.076 UTC [gossip.comm] sendToEndpoint -> DEBU 1b76 Exiting" +"2019-04-22 06:17:07.158 UTC [gossip.comm] func1 -> DEBU 1b77 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.159 UTC [gossip.gossip] handleMessage -> DEBU 1b78 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.159 UTC [gossip.pull] HandleMessage -> DEBU 1b79 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.160 UTC [gossip.pull] SendDigest -> DEBU 1b7a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:07.160 UTC [gossip.gossip] handleMessage -> DEBU 1b7b Exiting" +"2019-04-22 06:17:07.179 UTC [gossip.comm] func1 -> DEBU 1b7c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.180 UTC [gossip.gossip] handleMessage -> DEBU 1b7d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.180 UTC [gossip.gossip] handleMessage -> DEBU 1b7e Exiting" +"2019-04-22 06:17:07.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.182 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b80 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:07.182 UTC [msp.identity] Verify -> DEBU 1b81 Verify: digest = 00000000 b5 cc bc 52 b3 cb a7 58 b9 59 f5 f4 09 e9 eb 6a |...R...X.Y.....j| +00000010 44 14 d9 35 9d b8 6c 08 64 b1 96 10 78 d0 d4 28 |D..5..l.d...x..(|" +"2019-04-22 06:17:07.182 UTC [msp.identity] Verify -> DEBU 1b82 Verify: sig = 00000000 30 44 02 20 1b 28 37 a8 7e 00 24 72 e4 d1 eb bf |0D. .(7.~.$r....| +00000010 0f d7 b1 74 8e 08 ff 23 5d cb aa 7f 0f 29 31 a1 |...t...#]....)1.| +00000020 fa b1 1a a9 02 20 1d e9 8f 0a a5 91 17 80 71 e9 |..... ........q.| +00000030 bf 4a 2b 2b e2 80 79 57 d1 b4 a0 90 58 22 df 06 |.J++..yW....X"..| +00000040 29 b6 17 b6 d9 ba |).....|" +"2019-04-22 06:17:07.183 UTC [msp.identity] Verify -> DEBU 1b83 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:07.184 UTC [msp.identity] Verify -> DEBU 1b84 Verify: sig = 00000000 30 45 02 21 00 cf a0 74 81 99 ea 93 28 76 d5 8c |0E.!...t....(v..| +00000010 d2 5f 0b a3 ff 7d fa b2 8e 59 47 af d2 71 4c 54 |._...}...YG..qLT| +00000020 2a 2f 61 41 46 02 20 3a 24 4a 58 f6 f7 f0 f9 a8 |*/aAF. :$JX.....| +00000030 bb f7 61 91 95 2f 9a 62 53 01 33 24 ce 18 25 20 |..a../.bS.3$..% | +00000040 73 db 09 89 c9 8f 4d |s.....M|" +"2019-04-22 06:17:07.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b85 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:07.185 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b86 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:07.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b87 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 " +"2019-04-22 06:17:07.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b88 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 " +"2019-04-22 06:17:07.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b89 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:07.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b8a Exiting" +"2019-04-22 06:17:07.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8b Exiting" +"2019-04-22 06:17:07.188 UTC [gossip.discovery] sendMemResponse -> DEBU 1b8c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:07.189 UTC [msp] DeserializeIdentity -> DEBU 1b8d Obtaining identity" +"2019-04-22 06:17:07.189 UTC [msp] DeserializeIdentity -> DEBU 1b8e Obtaining identity" +"2019-04-22 06:17:07.190 UTC [gossip.comm] Send -> DEBU 1b8f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:07.190 UTC [gossip.discovery] sendMemResponse -> DEBU 1b90 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:07.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1b91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.190 UTC [gossip.comm] sendToEndpoint -> DEBU 1b92 Exiting" +"2019-04-22 06:17:07.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b93 Exiting" +"2019-04-22 06:17:07.620 UTC [gossip.comm] func1 -> DEBU 1b94 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.620 UTC [gossip.gossip] handleMessage -> DEBU 1b95 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.621 UTC [gossip.pull] HandleMessage -> DEBU 1b96 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.621 UTC [msp] DeserializeIdentity -> DEBU 1b97 Obtaining identity" +"2019-04-22 06:17:07.621 UTC [msp] DeserializeIdentity -> DEBU 1b98 Obtaining identity" +"2019-04-22 06:17:07.622 UTC [msp] DeserializeIdentity -> DEBU 1b99 Obtaining identity" +"2019-04-22 06:17:07.623 UTC [msp] DeserializeIdentity -> DEBU 1b9a Obtaining identity" +"2019-04-22 06:17:07.623 UTC [msp] DeserializeIdentity -> DEBU 1b9b Obtaining identity" +"2019-04-22 06:17:07.623 UTC [msp] DeserializeIdentity -> DEBU 1b9c Obtaining identity" +"2019-04-22 06:17:07.624 UTC [gossip.pull] SendDigest -> DEBU 1b9d Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:07.624 UTC [gossip.gossip] handleMessage -> DEBU 1b9e Exiting" +"2019-04-22 06:17:07.629 UTC [gossip.comm] func1 -> DEBU 1b9f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.629 UTC [gossip.gossip] handleMessage -> DEBU 1ba0 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.631 UTC [gossip.gossip] handleMessage -> DEBU 1ba1 Exiting" +"2019-04-22 06:17:07.632 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ba2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.632 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ba3 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:07.632 UTC [msp] DeserializeIdentity -> DEBU 1ba4 Obtaining identity" +"2019-04-22 06:17:07.635 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ba5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:07.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:07.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ba7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:07.635 UTC [policies] Evaluate -> DEBU 1ba8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:07.636 UTC [policies] Evaluate -> DEBU 1ba9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:07.636 UTC [policies] Evaluate -> DEBU 1baa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:07.636 UTC [cauthdsl] func1 -> DEBU 1bab 0xc0043f3210 gate 1555913827636773200 evaluation starts" +"2019-04-22 06:17:07.636 UTC [cauthdsl] func2 -> DEBU 1bac 0xc0043f3210 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:07.636 UTC [cauthdsl] func2 -> DEBU 1bad 0xc0043f3210 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:07.636 UTC [cauthdsl] func2 -> DEBU 1bae 0xc0043f3210 principal matched by identity 0" +"2019-04-22 06:17:07.637 UTC [msp.identity] Verify -> DEBU 1baf Verify: digest = 00000000 6a 42 aa 15 8a d8 66 79 94 f2 29 bf 21 02 bb c5 |jB....fy..).!...| +00000010 a8 e7 0a bf 60 4f 56 f9 d7 07 8c 69 b0 be 9c ec |....`OV....i....|" +"2019-04-22 06:17:07.637 UTC [msp.identity] Verify -> DEBU 1bb0 Verify: sig = 00000000 30 45 02 21 00 e4 0f 6e 9f 8b d6 92 64 39 17 60 |0E.!...n....d9.`| +00000010 ca ce ac 86 c4 10 40 7a ab a0 e5 a1 7e df 5e 59 |......@z....~.^Y| +00000020 ec cd 31 62 63 02 20 2e 4e bc 2f e2 69 c9 24 bf |..1bc. .N./.i.$.| +00000030 c0 09 a6 b5 dd f3 95 3f 87 02 61 d0 3b 00 2d 04 |.......?..a.;.-.| +00000040 3f d0 61 e8 20 d3 9e |?.a. ..|" +"2019-04-22 06:17:07.637 UTC [cauthdsl] func2 -> DEBU 1bb1 0xc0043f3210 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:07.637 UTC [cauthdsl] func1 -> DEBU 1bb2 0xc0043f3210 gate 1555913827636773200 evaluation succeeds" +"2019-04-22 06:17:07.637 UTC [policies] Evaluate -> DEBU 1bb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:07.637 UTC [policies] Evaluate -> DEBU 1bb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:07.638 UTC [policies] Evaluate -> DEBU 1bb5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:07.638 UTC [policies] Evaluate -> DEBU 1bb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:07.638 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bb8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bb9 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 " +"2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bba Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 " +"2019-04-22 06:17:07.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:28 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:07.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bbc Exiting" +"2019-04-22 06:17:07.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bbd Exiting" +"2019-04-22 06:17:07.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bbe Exiting" +"2019-04-22 06:17:07.639 UTC [gossip.discovery] sendMemResponse -> DEBU 1bbf Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:07.640 UTC [msp] DeserializeIdentity -> DEBU 1bc0 Obtaining identity" +"2019-04-22 06:17:07.647 UTC [msp] DeserializeIdentity -> DEBU 1bc1 Obtaining identity" +"2019-04-22 06:17:07.647 UTC [msp] DeserializeIdentity -> DEBU 1bc2 Obtaining identity" +"2019-04-22 06:17:07.647 UTC [gossip.comm] Send -> DEBU 1bc3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:07.648 UTC [gossip.discovery] sendMemResponse -> DEBU 1bc4 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:07.648 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:07.648 UTC [gossip.comm] sendToEndpoint -> DEBU 1bc6 Exiting" +"2019-04-22 06:17:08.033 UTC [gossip.gossip] handleMessage -> DEBU 1bc7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.034 UTC [gossip.pull] HandleMessage -> DEBU 1bc8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.034 UTC [msp] DeserializeIdentity -> DEBU 1bc9 Obtaining identity" +"2019-04-22 06:17:08.034 UTC [msp] DeserializeIdentity -> DEBU 1bca Obtaining identity" +"2019-04-22 06:17:08.035 UTC [msp] DeserializeIdentity -> DEBU 1bcb Obtaining identity" +"2019-04-22 06:17:08.035 UTC [msp] DeserializeIdentity -> DEBU 1bcc Obtaining identity" +"2019-04-22 06:17:08.036 UTC [msp] DeserializeIdentity -> DEBU 1bcd Obtaining identity" +"2019-04-22 06:17:08.036 UTC [msp] DeserializeIdentity -> DEBU 1bce Obtaining identity" +"2019-04-22 06:17:08.038 UTC [gossip.pull] SendDigest -> DEBU 1bcf Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:08.038 UTC [gossip.gossip] handleMessage -> DEBU 1bd0 Exiting" +"2019-04-22 06:17:08.054 UTC [gossip.gossip] handleMessage -> DEBU 1bd1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.055 UTC [gossip.gossip] handleMessage -> DEBU 1bd2 Exiting" +"2019-04-22 06:17:08.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bd3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.056 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bd4 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:08.056 UTC [msp] DeserializeIdentity -> DEBU 1bd5 Obtaining identity" +"2019-04-22 06:17:08.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bd6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:08.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bd8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.058 UTC [policies] Evaluate -> DEBU 1bd9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:08.058 UTC [policies] Evaluate -> DEBU 1bda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:08.059 UTC [policies] Evaluate -> DEBU 1bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:08.059 UTC [cauthdsl] func1 -> DEBU 1bdc 0xc0044194a0 gate 1555913828059882900 evaluation starts" +"2019-04-22 06:17:08.060 UTC [cauthdsl] func2 -> DEBU 1bdd 0xc0044194a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:08.060 UTC [cauthdsl] func2 -> DEBU 1bde 0xc0044194a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:08.061 UTC [cauthdsl] func2 -> DEBU 1bdf 0xc0044194a0 principal matched by identity 0" +"2019-04-22 06:17:08.061 UTC [msp.identity] Verify -> DEBU 1be0 Verify: digest = 00000000 5d 5f 2c e3 0b 9c 94 0b f7 6b 12 20 50 a0 81 41 |]_,......k. P..A| +00000010 93 ef 2c 51 10 1c 57 d8 94 fd 76 f8 09 4c be 41 |..,Q..W...v..L.A|" +"2019-04-22 06:17:08.064 UTC [msp.identity] Verify -> DEBU 1be1 Verify: sig = 00000000 30 44 02 20 57 da c6 09 c4 1e 43 e4 a9 68 f7 f8 |0D. W.....C..h..| +00000010 05 2e aa 6a d0 c7 df 44 d8 ed 9f 71 ab 38 bb b8 |...j...D...q.8..| +00000020 6a b8 6d 1f 02 20 47 40 92 a7 27 8a 1a 31 15 4b |j.m.. G@..'..1.K| +00000030 bc 11 52 6d 05 54 50 4c 5a 68 75 c5 5d fe 81 32 |..Rm.TPLZhu.]..2| +00000040 c6 a3 cf 63 2b c7 |...c+.|" +"2019-04-22 06:17:08.065 UTC [cauthdsl] func2 -> DEBU 1be2 0xc0044194a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:08.065 UTC [cauthdsl] func1 -> DEBU 1be3 0xc0044194a0 gate 1555913828059882900 evaluation succeeds" +"2019-04-22 06:17:08.065 UTC [policies] Evaluate -> DEBU 1be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.065 UTC [policies] Evaluate -> DEBU 1be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.066 UTC [policies] Evaluate -> DEBU 1be6 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:08.066 UTC [policies] Evaluate -> DEBU 1be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:08.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 1be8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:08.066 UTC [gossip.discovery] learnExistingMembers -> DEBU 1be9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bea updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 " +"2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1beb Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 " +"2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bec Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:26 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:08.067 UTC [gossip.discovery] learnExistingMembers -> DEBU 1bed Exiting" +"2019-04-22 06:17:08.068 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bee Exiting" +"2019-04-22 06:17:08.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bef Exiting" +"2019-04-22 06:17:08.068 UTC [gossip.discovery] sendMemResponse -> DEBU 1bf0 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:08.069 UTC [msp] DeserializeIdentity -> DEBU 1bf1 Obtaining identity" +"2019-04-22 06:17:08.069 UTC [msp] DeserializeIdentity -> DEBU 1bf2 Obtaining identity" +"2019-04-22 06:17:08.069 UTC [msp] DeserializeIdentity -> DEBU 1bf3 Obtaining identity" +"2019-04-22 06:17:08.070 UTC [gossip.comm] Send -> DEBU 1bf4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:08.070 UTC [gossip.discovery] sendMemResponse -> DEBU 1bf5 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:08.070 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.070 UTC [gossip.comm] sendToEndpoint -> DEBU 1bf7 Exiting" +"2019-04-22 06:17:08.423 UTC [msp] DeserializeIdentity -> DEBU 1bf8 Obtaining identity" +"2019-04-22 06:17:08.423 UTC [msp] DeserializeIdentity -> DEBU 1bf9 Obtaining identity" +"2019-04-22 06:17:08.423 UTC [gossip.comm] Send -> DEBU 1bfa Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfc Exiting" +"2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1bfe Exiting" +"2019-04-22 06:17:08.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1bff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1c00 Exiting" +"2019-04-22 06:17:08.426 UTC [gossip.gossip] handleMessage -> DEBU 1c01 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.427 UTC [msp] DeserializeIdentity -> DEBU 1c02 Obtaining identity" +"2019-04-22 06:17:08.427 UTC [msp] DeserializeIdentity -> DEBU 1c03 Obtaining identity" +"2019-04-22 06:17:08.428 UTC [msp] DeserializeIdentity -> DEBU 1c04 Obtaining identity" +"2019-04-22 06:17:08.428 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:08.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c06 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c07 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.429 UTC [policies] Evaluate -> DEBU 1c08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:08.430 UTC [policies] Evaluate -> DEBU 1c09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:08.430 UTC [policies] Evaluate -> DEBU 1c0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:08.431 UTC [gossip.comm] func1 -> DEBU 1c0b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.431 UTC [cauthdsl] func1 -> DEBU 1c0c 0xc00442fea0 gate 1555913828431164100 evaluation starts" +"2019-04-22 06:17:08.432 UTC [cauthdsl] func2 -> DEBU 1c0d 0xc00442fea0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:08.432 UTC [cauthdsl] func2 -> DEBU 1c0e 0xc00442fea0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:08.432 UTC [gossip.comm] func1 -> DEBU 1c0f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.433 UTC [cauthdsl] func2 -> DEBU 1c10 0xc00442fea0 principal matched by identity 0" +"2019-04-22 06:17:08.433 UTC [msp.identity] Verify -> DEBU 1c11 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:08.433 UTC [msp.identity] Verify -> DEBU 1c12 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:08.434 UTC [cauthdsl] func2 -> DEBU 1c13 0xc00442fea0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:08.434 UTC [cauthdsl] func1 -> DEBU 1c14 0xc00442fea0 gate 1555913828431164100 evaluation succeeds" +"2019-04-22 06:17:08.434 UTC [policies] Evaluate -> DEBU 1c15 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.434 UTC [policies] Evaluate -> DEBU 1c16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.435 UTC [policies] Evaluate -> DEBU 1c17 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:08.435 UTC [policies] Evaluate -> DEBU 1c18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:08.435 UTC [msp] DeserializeIdentity -> DEBU 1c19 Obtaining identity" +"2019-04-22 06:17:08.436 UTC [msp] DeserializeIdentity -> DEBU 1c1a Obtaining identity" +"2019-04-22 06:17:08.436 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:08.436 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c1c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.437 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c1d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.437 UTC [policies] Evaluate -> DEBU 1c1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:08.437 UTC [policies] Evaluate -> DEBU 1c1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:08.437 UTC [policies] Evaluate -> DEBU 1c20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:08.437 UTC [cauthdsl] func1 -> DEBU 1c21 0xc004449670 gate 1555913828437798400 evaluation starts" +"2019-04-22 06:17:08.437 UTC [cauthdsl] func2 -> DEBU 1c22 0xc004449670 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:08.438 UTC [cauthdsl] func2 -> DEBU 1c23 0xc004449670 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:08.438 UTC [cauthdsl] func2 -> DEBU 1c24 0xc004449670 principal matched by identity 0" +"2019-04-22 06:17:08.438 UTC [msp.identity] Verify -> DEBU 1c25 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:08.438 UTC [msp.identity] Verify -> DEBU 1c26 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:08.439 UTC [cauthdsl] func2 -> DEBU 1c27 0xc004449670 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:08.439 UTC [cauthdsl] func1 -> DEBU 1c28 0xc004449670 gate 1555913828437798400 evaluation succeeds" +"2019-04-22 06:17:08.439 UTC [policies] Evaluate -> DEBU 1c29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.439 UTC [policies] Evaluate -> DEBU 1c2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.440 UTC [policies] Evaluate -> DEBU 1c2b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:08.440 UTC [policies] Evaluate -> DEBU 1c2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:08.442 UTC [msp.identity] Verify -> DEBU 1c2d Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:08.442 UTC [msp.identity] Verify -> DEBU 1c2e Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:08.443 UTC [msp.identity] Verify -> DEBU 1c2f Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:08.443 UTC [msp.identity] Verify -> DEBU 1c30 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:08.444 UTC [gossip.gossip] handleMessage -> DEBU 1c31 Exiting" +"2019-04-22 06:17:08.444 UTC [gossip.gossip] handleMessage -> DEBU 1c32 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.444 UTC [msp.identity] Verify -> DEBU 1c33 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:08.445 UTC [msp.identity] Verify -> DEBU 1c34 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:08.445 UTC [msp] DeserializeIdentity -> DEBU 1c35 Obtaining identity" +"2019-04-22 06:17:08.445 UTC [msp] DeserializeIdentity -> DEBU 1c36 Obtaining identity" +"2019-04-22 06:17:08.447 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:08.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c38 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c39 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.448 UTC [policies] Evaluate -> DEBU 1c3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:08.448 UTC [policies] Evaluate -> DEBU 1c3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:08.448 UTC [policies] Evaluate -> DEBU 1c3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:08.449 UTC [cauthdsl] func1 -> DEBU 1c3d 0xc0044825e0 gate 1555913828449171900 evaluation starts" +"2019-04-22 06:17:08.449 UTC [cauthdsl] func2 -> DEBU 1c3e 0xc0044825e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:08.449 UTC [cauthdsl] func2 -> DEBU 1c3f 0xc0044825e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:08.449 UTC [cauthdsl] func2 -> DEBU 1c40 0xc0044825e0 principal matched by identity 0" +"2019-04-22 06:17:08.450 UTC [msp.identity] Verify -> DEBU 1c41 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:08.450 UTC [msp.identity] Verify -> DEBU 1c42 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:08.450 UTC [cauthdsl] func2 -> DEBU 1c43 0xc0044825e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:08.450 UTC [cauthdsl] func1 -> DEBU 1c44 0xc0044825e0 gate 1555913828449171900 evaluation succeeds" +"2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c45 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c46 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c47 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:08.451 UTC [policies] Evaluate -> DEBU 1c48 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:08.452 UTC [msp.identity] Verify -> DEBU 1c49 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:08.452 UTC [msp.identity] Verify -> DEBU 1c4a Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:08.453 UTC [msp] DeserializeIdentity -> DEBU 1c4b Obtaining identity" +"2019-04-22 06:17:08.453 UTC [msp] DeserializeIdentity -> DEBU 1c4c Obtaining identity" +"2019-04-22 06:17:08.454 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:08.455 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.455 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.455 UTC [policies] Evaluate -> DEBU 1c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:08.455 UTC [policies] Evaluate -> DEBU 1c51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:08.456 UTC [policies] Evaluate -> DEBU 1c52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:08.456 UTC [cauthdsl] func1 -> DEBU 1c53 0xc0044964d0 gate 1555913828456398000 evaluation starts" +"2019-04-22 06:17:08.456 UTC [cauthdsl] func2 -> DEBU 1c54 0xc0044964d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:08.456 UTC [cauthdsl] func2 -> DEBU 1c55 0xc0044964d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:08.456 UTC [cauthdsl] func2 -> DEBU 1c56 0xc0044964d0 principal matched by identity 0" +"2019-04-22 06:17:08.457 UTC [msp.identity] Verify -> DEBU 1c57 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:08.457 UTC [msp.identity] Verify -> DEBU 1c58 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:08.458 UTC [cauthdsl] func2 -> DEBU 1c59 0xc0044964d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:08.458 UTC [cauthdsl] func1 -> DEBU 1c5a 0xc0044964d0 gate 1555913828456398000 evaluation succeeds" +"2019-04-22 06:17:08.458 UTC [policies] Evaluate -> DEBU 1c5b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.458 UTC [policies] Evaluate -> DEBU 1c5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.459 UTC [policies] Evaluate -> DEBU 1c5d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:08.459 UTC [policies] Evaluate -> DEBU 1c5e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:08.459 UTC [gossip.gossip] handleMessage -> DEBU 1c5f Exiting" +"2019-04-22 06:17:08.459 UTC [gossip.gossip] handleMessage -> DEBU 1c60 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.460 UTC [msp] DeserializeIdentity -> DEBU 1c61 Obtaining identity" +"2019-04-22 06:17:08.460 UTC [msp] DeserializeIdentity -> DEBU 1c62 Obtaining identity" +"2019-04-22 06:17:08.461 UTC [msp] DeserializeIdentity -> DEBU 1c63 Obtaining identity" +"2019-04-22 06:17:08.461 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:08.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c65 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.462 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c66 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.462 UTC [policies] Evaluate -> DEBU 1c67 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:08.462 UTC [policies] Evaluate -> DEBU 1c68 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:08.463 UTC [policies] Evaluate -> DEBU 1c69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:08.464 UTC [cauthdsl] func1 -> DEBU 1c6a 0xc004497fe0 gate 1555913828464274400 evaluation starts" +"2019-04-22 06:17:08.464 UTC [cauthdsl] func2 -> DEBU 1c6b 0xc004497fe0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:08.464 UTC [cauthdsl] func2 -> DEBU 1c6c 0xc004497fe0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:08.465 UTC [cauthdsl] func2 -> DEBU 1c6d 0xc004497fe0 principal matched by identity 0" +"2019-04-22 06:17:08.465 UTC [msp.identity] Verify -> DEBU 1c6e Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:08.465 UTC [msp.identity] Verify -> DEBU 1c6f Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:08.466 UTC [cauthdsl] func2 -> DEBU 1c70 0xc004497fe0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:08.466 UTC [cauthdsl] func1 -> DEBU 1c71 0xc004497fe0 gate 1555913828464274400 evaluation succeeds" +"2019-04-22 06:17:08.466 UTC [policies] Evaluate -> DEBU 1c72 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.466 UTC [policies] Evaluate -> DEBU 1c73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.467 UTC [policies] Evaluate -> DEBU 1c74 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:08.467 UTC [policies] Evaluate -> DEBU 1c75 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:08.467 UTC [msp] DeserializeIdentity -> DEBU 1c76 Obtaining identity" +"2019-04-22 06:17:08.467 UTC [msp] DeserializeIdentity -> DEBU 1c77 Obtaining identity" +"2019-04-22 06:17:08.468 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:08.468 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c79 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.469 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c7a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:08.469 UTC [policies] Evaluate -> DEBU 1c7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:08.470 UTC [policies] Evaluate -> DEBU 1c7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:08.470 UTC [policies] Evaluate -> DEBU 1c7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:08.470 UTC [cauthdsl] func1 -> DEBU 1c7e 0xc0044a97b0 gate 1555913828470662900 evaluation starts" +"2019-04-22 06:17:08.470 UTC [cauthdsl] func2 -> DEBU 1c7f 0xc0044a97b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:08.471 UTC [cauthdsl] func2 -> DEBU 1c80 0xc0044a97b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:08.471 UTC [cauthdsl] func2 -> DEBU 1c81 0xc0044a97b0 principal matched by identity 0" +"2019-04-22 06:17:08.471 UTC [msp.identity] Verify -> DEBU 1c82 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:08.471 UTC [msp.identity] Verify -> DEBU 1c83 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:08.472 UTC [cauthdsl] func2 -> DEBU 1c84 0xc0044a97b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:08.472 UTC [cauthdsl] func1 -> DEBU 1c85 0xc0044a97b0 gate 1555913828470662900 evaluation succeeds" +"2019-04-22 06:17:08.473 UTC [policies] Evaluate -> DEBU 1c86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.473 UTC [policies] Evaluate -> DEBU 1c87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:08.473 UTC [policies] Evaluate -> DEBU 1c88 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:08.474 UTC [policies] Evaluate -> DEBU 1c89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:08.475 UTC [msp.identity] Verify -> DEBU 1c8a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:08.475 UTC [msp.identity] Verify -> DEBU 1c8b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:08.476 UTC [msp.identity] Verify -> DEBU 1c8c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:08.476 UTC [msp.identity] Verify -> DEBU 1c8d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:08.477 UTC [gossip.gossip] handleMessage -> DEBU 1c8e Exiting" +"2019-04-22 06:17:08.486 UTC [msp] DeserializeIdentity -> DEBU 1c8f Obtaining identity" +"2019-04-22 06:17:08.487 UTC [msp] DeserializeIdentity -> DEBU 1c90 Obtaining identity" +"2019-04-22 06:17:08.487 UTC [gossip.pull] Hello -> DEBU 1c91 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:08.488 UTC [msp] DeserializeIdentity -> DEBU 1c92 Obtaining identity" +"2019-04-22 06:17:08.488 UTC [msp] DeserializeIdentity -> DEBU 1c93 Obtaining identity" +"2019-04-22 06:17:08.488 UTC [gossip.comm] Send -> DEBU 1c94 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:08.489 UTC [gossip.comm] sendToEndpoint -> DEBU 1c95 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.489 UTC [gossip.comm] sendToEndpoint -> DEBU 1c96 Exiting" +"2019-04-22 06:17:08.491 UTC [gossip.comm] func1 -> DEBU 1c97 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15614556382781871061 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.491 UTC [gossip.gossip] handleMessage -> DEBU 1c98 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15614556382781871061 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.491 UTC [gossip.pull] HandleMessage -> DEBU 1c99 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15614556382781871061 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.491 UTC [gossip.gossip] handleMessage -> DEBU 1c9a Exiting" +"2019-04-22 06:17:08.681 UTC [gossip.comm] func1 -> DEBU 1c9b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.682 UTC [gossip.gossip] handleMessage -> DEBU 1c9c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.683 UTC [msp] DeserializeIdentity -> DEBU 1c9d Obtaining identity" +"2019-04-22 06:17:08.683 UTC [msp] DeserializeIdentity -> DEBU 1c9e Obtaining identity" +"2019-04-22 06:17:08.684 UTC [gossip.gossip] handleMessage -> DEBU 1c9f Exiting" +"2019-04-22 06:17:08.701 UTC [gossip.comm] func1 -> DEBU 1ca0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.701 UTC [gossip.gossip] handleMessage -> DEBU 1ca1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.702 UTC [gossip.pull] HandleMessage -> DEBU 1ca2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.702 UTC [gossip.pull] SendDigest -> DEBU 1ca3 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:08.702 UTC [gossip.gossip] handleMessage -> DEBU 1ca4 Exiting" +"2019-04-22 06:17:08.905 UTC [gossip.gossip] handleMessage -> DEBU 1ca5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:08.906 UTC [msp] DeserializeIdentity -> DEBU 1ca6 Obtaining identity" +"2019-04-22 06:17:08.906 UTC [msp] DeserializeIdentity -> DEBU 1ca7 Obtaining identity" +"2019-04-22 06:17:08.907 UTC [msp] DeserializeIdentity -> DEBU 1ca8 Obtaining identity" +"2019-04-22 06:17:08.912 UTC [gossip.gossip] handleMessage -> DEBU 1ca9 Exiting" +"2019-04-22 06:17:09.120 UTC [gossip.comm] func1 -> DEBU 1caa Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:09.121 UTC [gossip.gossip] handleMessage -> DEBU 1cab Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:09.121 UTC [msp] DeserializeIdentity -> DEBU 1cac Obtaining identity" +"2019-04-22 06:17:09.122 UTC [msp] DeserializeIdentity -> DEBU 1cad Obtaining identity" +"2019-04-22 06:17:09.122 UTC [msp] DeserializeIdentity -> DEBU 1cae Obtaining identity" +"2019-04-22 06:17:09.123 UTC [gossip.gossip] handleMessage -> DEBU 1caf Exiting" +"2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101B " +"2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb1 Sign: digest: 6D947C259A0952B16882FDB91C0D78F4C15CC9505934D42FF5E684EF53C73466 " +"2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:10.854 UTC [msp.identity] Sign -> DEBU 1cb3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:10.855 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1cb4 Sleeping 5s" +"2019-04-22 06:17:10.860 UTC [msp] DeserializeIdentity -> DEBU 1cb5 Obtaining identity" +"2019-04-22 06:17:10.861 UTC [msp] DeserializeIdentity -> DEBU 1cb6 Obtaining identity" +"2019-04-22 06:17:10.862 UTC [msp] DeserializeIdentity -> DEBU 1cb7 Obtaining identity" +"2019-04-22 06:17:10.862 UTC [gossip.comm] Send -> DEBU 1cb8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:10.862 UTC [msp] DeserializeIdentity -> DEBU 1cb9 Obtaining identity" +"2019-04-22 06:17:10.862 UTC [gossip.comm] Send -> DEBU 1cba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:10.863 UTC [gossip.comm] Send -> DEBU 1cbb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:10.863 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:10.863 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbd Exiting" +"2019-04-22 06:17:10.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc0 Exiting" +"2019-04-22 06:17:10.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1cbe Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.876 UTC [gossip.comm] sendToEndpoint -> DEBU 1cc1 Exiting" +"2019-04-22 06:17:10.878 UTC [gossip.comm] func1 -> DEBU 1cc2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.879 UTC [gossip.gossip] handleMessage -> DEBU 1cc3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.879 UTC [gossip.gossip] handleMessage -> DEBU 1cc4 Exiting" +"2019-04-22 06:17:10.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cc5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cc6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:10.881 UTC [msp.identity] Verify -> DEBU 1cc7 Verify: digest = 00000000 6d 94 7c 25 9a 09 52 b1 68 82 fd b9 1c 0d 78 f4 |m.|%..R.h.....x.| +00000010 c1 5c c9 50 59 34 d4 2f f5 e6 84 ef 53 c7 34 66 |.\.PY4./....S.4f|" +"2019-04-22 06:17:10.881 UTC [msp.identity] Verify -> DEBU 1cc8 Verify: sig = 00000000 30 44 02 20 22 be c8 f8 84 06 3c ab 3a db b5 4f |0D. ".....<.:..O| +00000010 af 7d ee d8 bf 56 bf 1e 0f 14 4a 4d 2c a0 b2 04 |.}...V....JM,...| +00000020 d6 c1 48 62 02 20 73 76 64 4c 48 b7 6d 9e 8a 83 |..Hb. svdLH.m...| +00000030 f8 d1 ff 15 08 3b 03 3b 03 4b 74 b4 a5 b8 b5 8c |.....;.;.Kt.....| +00000040 2b 87 58 f9 f4 b2 |+.X...|" +"2019-04-22 06:17:10.882 UTC [gossip.discovery] isSentByMe -> DEBU 1cc9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cca Exiting" +"2019-04-22 06:17:10.896 UTC [gossip.pull] Hello -> DEBU 1ccb Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:10.896 UTC [gossip.comm] Send -> DEBU 1ccc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:10.896 UTC [gossip.pull] Hello -> DEBU 1ccd Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:10.896 UTC [gossip.comm] Send -> DEBU 1cce Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:10.896 UTC [gossip.pull] Hello -> DEBU 1ccf Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:10.896 UTC [gossip.comm] Send -> DEBU 1cd0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:10.897 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.897 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd2 Exiting" +"2019-04-22 06:17:10.898 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.898 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd4 Exiting" +"2019-04-22 06:17:10.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1cd6 Exiting" +"2019-04-22 06:17:10.901 UTC [gossip.comm] func1 -> DEBU 1cd7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 668469623925424906 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.903 UTC [gossip.comm] func1 -> DEBU 1cd9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2461737636992223306 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.901 UTC [gossip.gossip] handleMessage -> DEBU 1cd8 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7323212113891659779 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.903 UTC [gossip.pull] HandleMessage -> DEBU 1cda GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7323212113891659779 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.903 UTC [gossip.gossip] handleMessage -> DEBU 1cdb Exiting" +"2019-04-22 06:17:10.903 UTC [gossip.gossip] handleMessage -> DEBU 1cdc Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 668469623925424906 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.904 UTC [gossip.pull] HandleMessage -> DEBU 1cdd GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 668469623925424906 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.904 UTC [gossip.gossip] handleMessage -> DEBU 1cde Exiting" +"2019-04-22 06:17:10.905 UTC [gossip.gossip] handleMessage -> DEBU 1cdf Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2461737636992223306 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.905 UTC [gossip.pull] HandleMessage -> DEBU 1ce0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2461737636992223306 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.905 UTC [gossip.gossip] handleMessage -> DEBU 1ce1 Exiting" +"2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101C " +"2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce3 Sign: digest: A5A28F48B9FB823ABC83F689CFD16DF44963722DB97C19AC20C61A1D96AFFFCC " +"2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:10.927 UTC [msp.identity] Sign -> DEBU 1ce5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:10.928 UTC [msp] DeserializeIdentity -> DEBU 1ce6 Obtaining identity" +"2019-04-22 06:17:10.928 UTC [gossip.comm] Send -> DEBU 1ce7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:10.928 UTC [msp] DeserializeIdentity -> DEBU 1ce8 Obtaining identity" +"2019-04-22 06:17:10.932 UTC [gossip.comm] Send -> DEBU 1ce9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:10.932 UTC [gossip.comm] Send -> DEBU 1cea Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:10.933 UTC [gossip.comm] sendToEndpoint -> DEBU 1ceb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.933 UTC [gossip.comm] sendToEndpoint -> DEBU 1cec Exiting" +"2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1ced Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1cee Exiting" +"2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1cef Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.934 UTC [gossip.comm] sendToEndpoint -> DEBU 1cf0 Exiting" +"2019-04-22 06:17:10.943 UTC [gossip.gossip] handleMessage -> DEBU 1cf1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.944 UTC [gossip.gossip] handleMessage -> DEBU 1cf2 Exiting" +"2019-04-22 06:17:10.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1cf3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cf4 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:10.945 UTC [msp.identity] Verify -> DEBU 1cf5 Verify: digest = 00000000 a5 a2 8f 48 b9 fb 82 3a bc 83 f6 89 cf d1 6d f4 |...H...:......m.| +00000010 49 63 72 2d b9 7c 19 ac 20 c6 1a 1d 96 af ff cc |Icr-.|.. .......|" +"2019-04-22 06:17:10.945 UTC [msp.identity] Verify -> DEBU 1cf6 Verify: sig = 00000000 30 44 02 20 07 f5 dc 50 8f c5 28 57 db c0 9c f9 |0D. ...P..(W....| +00000010 6c 78 3c e5 dd 0b f2 c0 a9 31 1f 6a 11 42 66 f0 |lx<......1.j.Bf.| +00000020 37 a6 93 d5 02 20 48 da 3c 52 59 75 a9 59 6d 99 |7.... H. DEBU 1cf7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.946 UTC [gossip.discovery] isSentByMe -> DEBU 1cf8 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 1cf9 Exiting" +"2019-04-22 06:17:10.946 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1cfa Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:10.947 UTC [msp] DeserializeIdentity -> DEBU 1cfb Obtaining identity" +"2019-04-22 06:17:10.947 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cfc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:10.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cfd Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:10.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cfe Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:10.948 UTC [policies] Evaluate -> DEBU 1cff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:10.948 UTC [policies] Evaluate -> DEBU 1d00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:10.948 UTC [policies] Evaluate -> DEBU 1d01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:10.949 UTC [cauthdsl] func1 -> DEBU 1d02 0xc003658040 gate 1555913830948972800 evaluation starts" +"2019-04-22 06:17:10.949 UTC [cauthdsl] func2 -> DEBU 1d03 0xc003658040 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:10.949 UTC [cauthdsl] func2 -> DEBU 1d04 0xc003658040 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:10.951 UTC [cauthdsl] func2 -> DEBU 1d05 0xc003658040 principal matched by identity 0" +"2019-04-22 06:17:10.951 UTC [msp.identity] Verify -> DEBU 1d06 Verify: digest = 00000000 6a 42 aa 15 8a d8 66 79 94 f2 29 bf 21 02 bb c5 |jB....fy..).!...| +00000010 a8 e7 0a bf 60 4f 56 f9 d7 07 8c 69 b0 be 9c ec |....`OV....i....|" +"2019-04-22 06:17:10.951 UTC [msp.identity] Verify -> DEBU 1d07 Verify: sig = 00000000 30 45 02 21 00 e4 0f 6e 9f 8b d6 92 64 39 17 60 |0E.!...n....d9.`| +00000010 ca ce ac 86 c4 10 40 7a ab a0 e5 a1 7e df 5e 59 |......@z....~.^Y| +00000020 ec cd 31 62 63 02 20 2e 4e bc 2f e2 69 c9 24 bf |..1bc. .N./.i.$.| +00000030 c0 09 a6 b5 dd f3 95 3f 87 02 61 d0 3b 00 2d 04 |.......?..a.;.-.| +00000040 3f d0 61 e8 20 d3 9e |?.a. ..|" +"2019-04-22 06:17:10.951 UTC [cauthdsl] func2 -> DEBU 1d08 0xc003658040 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:10.951 UTC [cauthdsl] func1 -> DEBU 1d09 0xc003658040 gate 1555913830948972800 evaluation succeeds" +"2019-04-22 06:17:10.951 UTC [policies] Evaluate -> DEBU 1d0a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:10.952 UTC [policies] Evaluate -> DEBU 1d0b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:10.952 UTC [policies] Evaluate -> DEBU 1d0c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:10.952 UTC [policies] Evaluate -> DEBU 1d0d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:10.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d0e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:10.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d0f Exiting" +"2019-04-22 06:17:10.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d10 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:10.953 UTC [msp.identity] Verify -> DEBU 1d11 Verify: digest = 00000000 b5 cc bc 52 b3 cb a7 58 b9 59 f5 f4 09 e9 eb 6a |...R...X.Y.....j| +00000010 44 14 d9 35 9d b8 6c 08 64 b1 96 10 78 d0 d4 28 |D..5..l.d...x..(|" +"2019-04-22 06:17:10.953 UTC [msp.identity] Verify -> DEBU 1d12 Verify: sig = 00000000 30 44 02 20 1b 28 37 a8 7e 00 24 72 e4 d1 eb bf |0D. .(7.~.$r....| +00000010 0f d7 b1 74 8e 08 ff 23 5d cb aa 7f 0f 29 31 a1 |...t...#]....)1.| +00000020 fa b1 1a a9 02 20 1d e9 8f 0a a5 91 17 80 71 e9 |..... ........q.| +00000030 bf 4a 2b 2b e2 80 79 57 d1 b4 a0 90 58 22 df 06 |.J++..yW....X"..| +00000040 29 b6 17 b6 d9 ba |).....|" +"2019-04-22 06:17:10.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d13 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d14 Exiting" +"2019-04-22 06:17:10.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d15 Exiting" +"2019-04-22 06:17:10.954 UTC [gossip.comm] func1 -> DEBU 1d16 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.955 UTC [gossip.comm] func1 -> DEBU 1d17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.955 UTC [gossip.gossip] handleMessage -> DEBU 1d18 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.956 UTC [gossip.gossip] handleMessage -> DEBU 1d19 Exiting" +"2019-04-22 06:17:10.959 UTC [gossip.gossip] handleMessage -> DEBU 1d1a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d1b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.959 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d1c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:10.960 UTC [msp.identity] Verify -> DEBU 1d1d Verify: digest = 00000000 a5 a2 8f 48 b9 fb 82 3a bc 83 f6 89 cf d1 6d f4 |...H...:......m.| +00000010 49 63 72 2d b9 7c 19 ac 20 c6 1a 1d 96 af ff cc |Icr-.|.. .......|" +"2019-04-22 06:17:10.960 UTC [msp.identity] Verify -> DEBU 1d1e Verify: sig = 00000000 30 44 02 20 07 f5 dc 50 8f c5 28 57 db c0 9c f9 |0D. ...P..(W....| +00000010 6c 78 3c e5 dd 0b f2 c0 a9 31 1f 6a 11 42 66 f0 |lx<......1.j.Bf.| +00000020 37 a6 93 d5 02 20 48 da 3c 52 59 75 a9 59 6d 99 |7.... H. DEBU 1d1f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:10.961 UTC [msp.identity] Verify -> DEBU 1d20 Verify: sig = 00000000 30 45 02 21 00 c6 09 79 f0 c6 f8 c7 f8 99 2a d5 |0E.!...y......*.| +00000010 a8 5a 04 7f 71 47 48 a7 83 29 d8 73 3c 4d d9 c4 |.Z..qGH..).s..GyJoz)%..g..N| +00000040 2f c4 f5 fa d0 fb 8b |/......|" +"2019-04-22 06:17:10.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d21 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:10.961 UTC [gossip.discovery] isSentByMe -> DEBU 1d22 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:10.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d23 Exiting" +"2019-04-22 06:17:10.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d24 Exiting" +"2019-04-22 06:17:10.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d25 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:10.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d26 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:10.962 UTC [msp.identity] Verify -> DEBU 1d27 Verify: digest = 00000000 a5 a2 8f 48 b9 fb 82 3a bc 83 f6 89 cf d1 6d f4 |...H...:......m.| +00000010 49 63 72 2d b9 7c 19 ac 20 c6 1a 1d 96 af ff cc |Icr-.|.. .......|" +"2019-04-22 06:17:10.963 UTC [msp.identity] Verify -> DEBU 1d28 Verify: sig = 00000000 30 44 02 20 07 f5 dc 50 8f c5 28 57 db c0 9c f9 |0D. ...P..(W....| +00000010 6c 78 3c e5 dd 0b f2 c0 a9 31 1f 6a 11 42 66 f0 |lx<......1.j.Bf.| +00000020 37 a6 93 d5 02 20 48 da 3c 52 59 75 a9 59 6d 99 |7.... H. DEBU 1d29 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.963 UTC [gossip.discovery] isSentByMe -> DEBU 1d2a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.963 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d2b Exiting" +"2019-04-22 06:17:10.964 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d2c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:10.964 UTC [msp] DeserializeIdentity -> DEBU 1d2d Obtaining identity" +"2019-04-22 06:17:10.964 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d2e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d2f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d30 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:10.966 UTC [policies] Evaluate -> DEBU 1d31 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:10.966 UTC [policies] Evaluate -> DEBU 1d32 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:10.966 UTC [policies] Evaluate -> DEBU 1d33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:10.966 UTC [cauthdsl] func1 -> DEBU 1d34 0xc0035aa250 gate 1555913830966664800 evaluation starts" +"2019-04-22 06:17:10.966 UTC [cauthdsl] func2 -> DEBU 1d35 0xc0035aa250 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:10.967 UTC [cauthdsl] func2 -> DEBU 1d36 0xc0035aa250 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:10.967 UTC [cauthdsl] func2 -> DEBU 1d37 0xc0035aa250 principal matched by identity 0" +"2019-04-22 06:17:10.967 UTC [msp.identity] Verify -> DEBU 1d38 Verify: digest = 00000000 5d 5f 2c e3 0b 9c 94 0b f7 6b 12 20 50 a0 81 41 |]_,......k. P..A| +00000010 93 ef 2c 51 10 1c 57 d8 94 fd 76 f8 09 4c be 41 |..,Q..W...v..L.A|" +"2019-04-22 06:17:10.967 UTC [msp.identity] Verify -> DEBU 1d39 Verify: sig = 00000000 30 44 02 20 57 da c6 09 c4 1e 43 e4 a9 68 f7 f8 |0D. W.....C..h..| +00000010 05 2e aa 6a d0 c7 df 44 d8 ed 9f 71 ab 38 bb b8 |...j...D...q.8..| +00000020 6a b8 6d 1f 02 20 47 40 92 a7 27 8a 1a 31 15 4b |j.m.. G@..'..1.K| +00000030 bc 11 52 6d 05 54 50 4c 5a 68 75 c5 5d fe 81 32 |..Rm.TPLZhu.]..2| +00000040 c6 a3 cf 63 2b c7 |...c+.|" +"2019-04-22 06:17:10.969 UTC [cauthdsl] func2 -> DEBU 1d3a 0xc0035aa250 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:10.969 UTC [cauthdsl] func1 -> DEBU 1d3b 0xc0035aa250 gate 1555913830966664800 evaluation succeeds" +"2019-04-22 06:17:10.970 UTC [policies] Evaluate -> DEBU 1d3c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:10.970 UTC [policies] Evaluate -> DEBU 1d3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:10.971 UTC [policies] Evaluate -> DEBU 1d3e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:10.971 UTC [policies] Evaluate -> DEBU 1d3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:10.971 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d41 Exiting" +"2019-04-22 06:17:10.972 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d42 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:10.972 UTC [msp.identity] Verify -> DEBU 1d43 Verify: digest = 00000000 b5 cc bc 52 b3 cb a7 58 b9 59 f5 f4 09 e9 eb 6a |...R...X.Y.....j| +00000010 44 14 d9 35 9d b8 6c 08 64 b1 96 10 78 d0 d4 28 |D..5..l.d...x..(|" +"2019-04-22 06:17:10.972 UTC [msp.identity] Verify -> DEBU 1d44 Verify: sig = 00000000 30 44 02 20 1b 28 37 a8 7e 00 24 72 e4 d1 eb bf |0D. .(7.~.$r....| +00000010 0f d7 b1 74 8e 08 ff 23 5d cb aa 7f 0f 29 31 a1 |...t...#]....)1.| +00000020 fa b1 1a a9 02 20 1d e9 8f 0a a5 91 17 80 71 e9 |..... ........q.| +00000030 bf 4a 2b 2b e2 80 79 57 d1 b4 a0 90 58 22 df 06 |.J++..yW....X"..| +00000040 29 b6 17 b6 d9 ba |).....|" +"2019-04-22 06:17:10.973 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:10.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d47 Exiting" +"2019-04-22 06:17:10.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d48 Exiting" +"2019-04-22 06:17:10.973 UTC [gossip.gossip] handleMessage -> DEBU 1d46 Exiting" +"2019-04-22 06:17:11.140 UTC [gossip.comm] func1 -> DEBU 1d49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:11.146 UTC [gossip.gossip] handleMessage -> DEBU 1d4a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:11.150 UTC [gossip.gossip] handleMessage -> DEBU 1d4b Exiting" +"2019-04-22 06:17:11.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:11.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d4d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:11.151 UTC [msp.identity] Verify -> DEBU 1d4e Verify: digest = 00000000 71 39 b9 61 92 0c fa 19 3f 2f 89 94 48 e9 2b 37 |q9.a....?/..H.+7| +00000010 f1 0d 41 79 3c 06 1e f8 d4 43 af 2c 88 a4 1a f7 |..Ay<....C.,....|" +"2019-04-22 06:17:11.151 UTC [msp.identity] Verify -> DEBU 1d4f Verify: sig = 00000000 30 44 02 20 21 a0 d4 b9 80 bf e5 94 7d 24 43 30 |0D. !.......}$C0| +00000010 17 c3 e3 0a 46 5e 17 10 47 38 7e 41 02 4b ca e5 |....F^..G8~A.K..| +00000020 8f fd 29 8e 02 20 3d 62 51 e6 e5 9c b5 06 23 33 |..).. =bQ.....#3| +00000030 dd ed ec 9a 9d 4c a8 2a 6c 86 df cd f6 de 34 bb |.....L.*l.....4.| +00000040 97 57 aa 98 52 42 |.W..RB|" +"2019-04-22 06:17:11.152 UTC [msp.identity] Verify -> DEBU 1d50 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:11.152 UTC [msp.identity] Verify -> DEBU 1d51 Verify: sig = 00000000 30 44 02 20 64 e3 2b ac 0d 13 f5 2a 30 1e fc 06 |0D. d.+....*0...| +00000010 3d 7f 98 43 eb 5d 55 34 b7 e5 30 37 c5 8f 99 73 |=..C.]U4..07...s| +00000020 1a 5b 9c eb 02 20 47 4f d9 19 69 ad fa 37 3d b3 |.[... GO..i..7=.| +00000030 89 9b 61 5d 56 83 fb 0c 98 ee 00 c0 3d 91 8b 2a |..a]V.......=..*| +00000040 7f 0b 5b a1 3c 45 |..[. DEBU 1d52 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:11.153 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d53 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:11.155 UTC [gossip.comm] func1 -> DEBU 1d54 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.156 UTC [gossip.gossip] handleMessage -> DEBU 1d55 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.157 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d56 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 " +"2019-04-22 06:17:11.157 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d57 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 " +"2019-04-22 06:17:11.158 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d58 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:11.162 UTC [gossip.comm] func1 -> DEBU 1d59 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.158 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d5a Exiting" +"2019-04-22 06:17:11.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d5b Exiting" +"2019-04-22 06:17:11.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d5c Exiting" +"2019-04-22 06:17:11.166 UTC [gossip.gossip] handleMessage -> DEBU 1d5d Exiting" +"2019-04-22 06:17:11.166 UTC [gossip.gossip] handleMessage -> DEBU 1d5e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d5f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d60 Exiting" +"2019-04-22 06:17:11.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d62 Exiting" +"2019-04-22 06:17:11.167 UTC [gossip.gossip] handleMessage -> DEBU 1d63 Exiting" +"2019-04-22 06:17:11.167 UTC [gossip.gossip] handleMessage -> DEBU 1d64 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.167 UTC [gossip.pull] HandleMessage -> DEBU 1d65 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.168 UTC [gossip.pull] SendDigest -> DEBU 1d66 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:11.168 UTC [gossip.gossip] handleMessage -> DEBU 1d67 Exiting" +"2019-04-22 06:17:11.166 UTC [msp] DeserializeIdentity -> DEBU 1d68 Obtaining identity" +"2019-04-22 06:17:11.169 UTC [msp] DeserializeIdentity -> DEBU 1d69 Obtaining identity" +"2019-04-22 06:17:11.170 UTC [msp] DeserializeIdentity -> DEBU 1d6a Obtaining identity" +"2019-04-22 06:17:11.171 UTC [gossip.comm] Send -> DEBU 1d6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:11.172 UTC [msp] DeserializeIdentity -> DEBU 1d6c Obtaining identity" +"2019-04-22 06:17:11.172 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.172 UTC [gossip.comm] sendToEndpoint -> DEBU 1d6f Exiting" +"2019-04-22 06:17:11.172 UTC [gossip.comm] Send -> DEBU 1d6e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:11.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d70 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.173 UTC [gossip.comm] sendToEndpoint -> DEBU 1d71 Exiting" +"2019-04-22 06:17:11.182 UTC [gossip.comm] func1 -> DEBU 1d72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.182 UTC [gossip.gossip] handleMessage -> DEBU 1d73 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.182 UTC [gossip.gossip] handleMessage -> DEBU 1d74 Exiting" +"2019-04-22 06:17:11.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.184 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:11.185 UTC [msp.identity] Verify -> DEBU 1d77 Verify: digest = 00000000 b7 5c cb 09 77 38 39 ad ee a0 c0 be 82 79 3b 4c |.\..w89......y;L| +00000010 87 e4 35 f4 10 96 e1 ea e8 72 f1 e1 4b 4d 78 02 |..5......r..KMx.|" +"2019-04-22 06:17:11.185 UTC [msp.identity] Verify -> DEBU 1d78 Verify: sig = 00000000 30 44 02 20 4a 77 fc 66 61 29 14 48 cd 91 68 f5 |0D. Jw.fa).H..h.| +00000010 da 2d b8 22 13 85 db c4 42 20 c9 28 14 40 a1 6a |.-."....B .(.@.j| +00000020 be e0 af 8b 02 20 53 2c 13 84 59 dc 54 d9 97 c6 |..... S,..Y.T...| +00000030 e5 9f 3f 19 6d 26 98 a6 bd fd 91 bd 35 6a 6e 3b |..?.m&......5jn;| +00000040 92 95 49 d6 d7 88 |..I...|" +"2019-04-22 06:17:11.187 UTC [msp.identity] Verify -> DEBU 1d79 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:11.187 UTC [msp.identity] Verify -> DEBU 1d7a Verify: sig = 00000000 30 44 02 20 21 a7 87 a6 32 c0 6b 74 76 02 38 69 |0D. !...2.ktv.8i| +00000010 2f a4 41 67 5b 4b 8d b9 3d 93 22 9d 60 66 e1 38 |/.Ag[K..=.".`f.8| +00000020 8e fd 82 aa 02 20 79 f6 b9 03 6b 7d d9 b9 ca f3 |..... y...k}....| +00000030 fa a4 54 c0 eb 93 21 22 99 19 0c 1f b2 95 bf 61 |..T...!".......a| +00000040 59 10 5f c3 41 a6 |Y._.A.|" +"2019-04-22 06:17:11.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:11.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7d updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 " +"2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7e Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 " +"2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d7f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:11.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1d80 Exiting" +"2019-04-22 06:17:11.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 1d81 Exiting" +"2019-04-22 06:17:11.190 UTC [gossip.discovery] sendMemResponse -> DEBU 1d82 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:11.191 UTC [msp] DeserializeIdentity -> DEBU 1d83 Obtaining identity" +"2019-04-22 06:17:11.191 UTC [msp] DeserializeIdentity -> DEBU 1d84 Obtaining identity" +"2019-04-22 06:17:11.192 UTC [gossip.comm] Send -> DEBU 1d85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:11.192 UTC [gossip.discovery] sendMemResponse -> DEBU 1d86 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:11.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1d87 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1d88 Exiting" +"2019-04-22 06:17:11.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d89 Exiting" +"2019-04-22 06:17:11.475 UTC [gossip.election] waitForInterrupt -> DEBU 1d8a c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:11.475 UTC [gossip.election] IsLeader -> DEBU 1d8b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:11.475 UTC [msp.identity] Sign -> DEBU 1d8c Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510071801 " +"2019-04-22 06:17:11.475 UTC [msp.identity] Sign -> DEBU 1d8d Sign: digest: AB0A42BDCE3145EC8CD85F33F9E58504B4FAD529192EF0B1BB6EC12645FE7AA9 " +"2019-04-22 06:17:11.476 UTC [gossip.election] waitForInterrupt -> DEBU 1d8e c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:11.484 UTC [msp] DeserializeIdentity -> DEBU 1d8f Obtaining identity" +"2019-04-22 06:17:11.484 UTC [msp] DeserializeIdentity -> DEBU 1d90 Obtaining identity" +"2019-04-22 06:17:11.484 UTC [msp] DeserializeIdentity -> DEBU 1d91 Obtaining identity" +"2019-04-22 06:17:11.485 UTC [msp] DeserializeIdentity -> DEBU 1d92 Obtaining identity" +"2019-04-22 06:17:11.485 UTC [gossip.comm] Send -> DEBU 1d93 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:11.485 UTC [msp] DeserializeIdentity -> DEBU 1d94 Obtaining identity" +"2019-04-22 06:17:11.486 UTC [msp] DeserializeIdentity -> DEBU 1d95 Obtaining identity" +"2019-04-22 06:17:11.486 UTC [gossip.comm] sendToEndpoint -> DEBU 1d96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:7 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:17:11.486 UTC [gossip.comm] sendToEndpoint -> DEBU 1d97 Exiting" +"2019-04-22 06:17:11.619 UTC [gossip.comm] func1 -> DEBU 1d98 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.620 UTC [gossip.gossip] handleMessage -> DEBU 1d99 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.620 UTC [gossip.pull] HandleMessage -> DEBU 1d9a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.621 UTC [msp] DeserializeIdentity -> DEBU 1d9b Obtaining identity" +"2019-04-22 06:17:11.621 UTC [msp] DeserializeIdentity -> DEBU 1d9c Obtaining identity" +"2019-04-22 06:17:11.622 UTC [msp] DeserializeIdentity -> DEBU 1d9d Obtaining identity" +"2019-04-22 06:17:11.622 UTC [msp] DeserializeIdentity -> DEBU 1d9e Obtaining identity" +"2019-04-22 06:17:11.622 UTC [msp] DeserializeIdentity -> DEBU 1d9f Obtaining identity" +"2019-04-22 06:17:11.623 UTC [msp] DeserializeIdentity -> DEBU 1da0 Obtaining identity" +"2019-04-22 06:17:11.623 UTC [gossip.pull] SendDigest -> DEBU 1da1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:11.624 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Exiting" +"2019-04-22 06:17:11.626 UTC [gossip.comm] func1 -> DEBU 1da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.626 UTC [gossip.gossip] handleMessage -> DEBU 1da4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.626 UTC [gossip.gossip] handleMessage -> DEBU 1da5 Exiting" +"2019-04-22 06:17:11.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1da6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1da7 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:11.627 UTC [msp] DeserializeIdentity -> DEBU 1da8 Obtaining identity" +"2019-04-22 06:17:11.628 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1da9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:11.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1daa Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:11.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dab Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:11.629 UTC [policies] Evaluate -> DEBU 1dac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:11.629 UTC [policies] Evaluate -> DEBU 1dad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:11.631 UTC [policies] Evaluate -> DEBU 1dae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:11.631 UTC [cauthdsl] func1 -> DEBU 1daf 0xc00311c960 gate 1555913831631446100 evaluation starts" +"2019-04-22 06:17:11.631 UTC [cauthdsl] func2 -> DEBU 1db0 0xc00311c960 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:11.632 UTC [cauthdsl] func2 -> DEBU 1db1 0xc00311c960 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:11.632 UTC [cauthdsl] func2 -> DEBU 1db2 0xc00311c960 principal matched by identity 0" +"2019-04-22 06:17:11.632 UTC [msp.identity] Verify -> DEBU 1db3 Verify: digest = 00000000 fc 50 91 4b 1e 0c e0 b3 08 c6 a8 15 e1 68 e2 6d |.P.K.........h.m| +00000010 fc 6d f9 43 0c e2 33 07 a9 6d 69 4c 7e 3b 32 7a |.m.C..3..miL~;2z|" +"2019-04-22 06:17:11.633 UTC [msp.identity] Verify -> DEBU 1db4 Verify: sig = 00000000 30 45 02 21 00 e9 3a a4 b6 86 f4 6b 45 9e 1c 66 |0E.!..:....kE..f| +00000010 92 d1 7a cf 3a d2 27 82 3b 34 7a 3d 8e f3 04 68 |..z.:.'.;4z=...h| +00000020 6b ad cd 0b d2 02 20 2a 87 39 d2 12 b0 e3 b6 23 |k..... *.9.....#| +00000030 7f 31 01 44 6b 13 e0 06 d2 cb 01 41 97 8b e6 11 |.1.Dk......A....| +00000040 9e ea 72 8d 8a ec 4f |..r...O|" +"2019-04-22 06:17:11.633 UTC [cauthdsl] func2 -> DEBU 1db5 0xc00311c960 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:11.633 UTC [cauthdsl] func1 -> DEBU 1db6 0xc00311c960 gate 1555913831631446100 evaluation succeeds" +"2019-04-22 06:17:11.633 UTC [policies] Evaluate -> DEBU 1db7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:11.634 UTC [policies] Evaluate -> DEBU 1db8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:11.636 UTC [gossip.comm] func1 -> DEBU 1db9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.645 UTC [gossip.comm] func1 -> DEBU 1dbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.634 UTC [policies] Evaluate -> DEBU 1dbc Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:11.645 UTC [policies] Evaluate -> DEBU 1dbd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:11.636 UTC [gossip.gossip] handleMessage -> DEBU 1dba Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dbe Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dbf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:11.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 " +"2019-04-22 06:17:11.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 " +"2019-04-22 06:17:11.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:29 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:11.647 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc3 Exiting" +"2019-04-22 06:17:11.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc4 Exiting" +"2019-04-22 06:17:11.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dc5 Exiting" +"2019-04-22 06:17:11.648 UTC [gossip.gossip] handleMessage -> DEBU 1dc6 Exiting" +"2019-04-22 06:17:11.648 UTC [gossip.gossip] handleMessage -> DEBU 1dc7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dc9 Exiting" +"2019-04-22 06:17:11.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dcc Exiting" +"2019-04-22 06:17:11.651 UTC [gossip.gossip] handleMessage -> DEBU 1dcb Exiting" +"2019-04-22 06:17:11.651 UTC [gossip.gossip] handleMessage -> DEBU 1dcd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.652 UTC [gossip.gossip] handleMessage -> DEBU 1dce Exiting" +"2019-04-22 06:17:11.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dcf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.652 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dd0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:11.652 UTC [msp] DeserializeIdentity -> DEBU 1dd1 Obtaining identity" +"2019-04-22 06:17:11.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1dd2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dd3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1dd4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:11.653 UTC [msp] DeserializeIdentity -> DEBU 1dd5 Obtaining identity" +"2019-04-22 06:17:11.653 UTC [msp] DeserializeIdentity -> DEBU 1dd6 Obtaining identity" +"2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dd7 Obtaining identity" +"2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dd8 Obtaining identity" +"2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dd9 Obtaining identity" +"2019-04-22 06:17:11.654 UTC [msp] DeserializeIdentity -> DEBU 1dda Obtaining identity" +"2019-04-22 06:17:11.655 UTC [msp] DeserializeIdentity -> DEBU 1ddb Obtaining identity" +"2019-04-22 06:17:11.655 UTC [gossip.comm] Send -> DEBU 1ddc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:11.655 UTC [msp] DeserializeIdentity -> DEBU 1ddd Obtaining identity" +"2019-04-22 06:17:11.655 UTC [gossip.comm] Send -> DEBU 1dde Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:11.656 UTC [gossip.comm] sendToEndpoint -> DEBU 1ddf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.656 UTC [gossip.comm] sendToEndpoint -> DEBU 1de0 Exiting" +"2019-04-22 06:17:11.657 UTC [gossip.comm] sendToEndpoint -> DEBU 1de1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.657 UTC [gossip.comm] sendToEndpoint -> DEBU 1de2 Exiting" +"2019-04-22 06:17:11.653 UTC [policies] Evaluate -> DEBU 1de3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:11.659 UTC [policies] Evaluate -> DEBU 1de4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:11.659 UTC [policies] Evaluate -> DEBU 1de5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:11.666 UTC [cauthdsl] func1 -> DEBU 1de6 0xc0030b56b0 gate 1555913831659222800 evaluation starts" +"2019-04-22 06:17:11.666 UTC [cauthdsl] func2 -> DEBU 1de7 0xc0030b56b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:11.667 UTC [cauthdsl] func2 -> DEBU 1de8 0xc0030b56b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:11.667 UTC [cauthdsl] func2 -> DEBU 1de9 0xc0030b56b0 principal matched by identity 0" +"2019-04-22 06:17:11.667 UTC [msp.identity] Verify -> DEBU 1dea Verify: digest = 00000000 9e d2 cf 72 97 3e 9a 23 5d 65 3e 01 3d be e7 8e |...r.>.#]e>.=...| +00000010 c1 f1 e9 e5 32 1d ac 39 ab ed af 94 1a 25 27 70 |....2..9.....%'p|" +"2019-04-22 06:17:11.667 UTC [msp.identity] Verify -> DEBU 1deb Verify: sig = 00000000 30 45 02 21 00 de f5 53 d9 f1 35 19 12 14 57 83 |0E.!...S..5...W.| +00000010 db 2d 6b ac b7 ff 27 6d 08 10 03 8b f7 28 b6 aa |.-k...'m.....(..| +00000020 89 1c 93 53 dc 02 20 64 fd d4 52 03 1b cc 1d a1 |...S.. d..R.....| +00000030 b8 bf a7 1c ec a4 6c b8 9a a7 5f c5 2a 9a 51 15 |......l..._.*.Q.| +00000040 ea 18 94 5c d8 fa 72 |...\..r|" +"2019-04-22 06:17:11.668 UTC [cauthdsl] func2 -> DEBU 1dec 0xc0030b56b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:11.668 UTC [cauthdsl] func1 -> DEBU 1ded 0xc0030b56b0 gate 1555913831659222800 evaluation succeeds" +"2019-04-22 06:17:11.668 UTC [policies] Evaluate -> DEBU 1dee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:11.668 UTC [policies] Evaluate -> DEBU 1def == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:11.669 UTC [policies] Evaluate -> DEBU 1df0 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:11.669 UTC [policies] Evaluate -> DEBU 1df1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:11.669 UTC [gossip.discovery] handleAliveMessage -> DEBU 1df2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:11.669 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df4 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 " +"2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 " +"2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:30 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 1df7 Exiting" +"2019-04-22 06:17:11.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 1df8 Exiting" +"2019-04-22 06:17:11.670 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1df9 Exiting" +"2019-04-22 06:17:11.671 UTC [gossip.discovery] sendMemResponse -> DEBU 1dfa Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:11.671 UTC [msp] DeserializeIdentity -> DEBU 1dfb Obtaining identity" +"2019-04-22 06:17:11.671 UTC [msp] DeserializeIdentity -> DEBU 1dfc Obtaining identity" +"2019-04-22 06:17:11.672 UTC [msp] DeserializeIdentity -> DEBU 1dfd Obtaining identity" +"2019-04-22 06:17:11.672 UTC [gossip.comm] Send -> DEBU 1dfe Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:11.672 UTC [gossip.discovery] sendMemResponse -> DEBU 1dff Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:11.673 UTC [gossip.comm] sendToEndpoint -> DEBU 1e00 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:11.673 UTC [gossip.comm] sendToEndpoint -> DEBU 1e01 Exiting" +"2019-04-22 06:17:12.036 UTC [gossip.gossip] handleMessage -> DEBU 1e02 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.036 UTC [gossip.pull] HandleMessage -> DEBU 1e03 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.036 UTC [msp] DeserializeIdentity -> DEBU 1e04 Obtaining identity" +"2019-04-22 06:17:12.037 UTC [msp] DeserializeIdentity -> DEBU 1e05 Obtaining identity" +"2019-04-22 06:17:12.037 UTC [msp] DeserializeIdentity -> DEBU 1e06 Obtaining identity" +"2019-04-22 06:17:12.038 UTC [msp] DeserializeIdentity -> DEBU 1e07 Obtaining identity" +"2019-04-22 06:17:12.038 UTC [msp] DeserializeIdentity -> DEBU 1e08 Obtaining identity" +"2019-04-22 06:17:12.039 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" +"2019-04-22 06:17:12.039 UTC [gossip.pull] SendDigest -> DEBU 1e0a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:12.040 UTC [gossip.gossip] handleMessage -> DEBU 1e0b Exiting" +"2019-04-22 06:17:12.052 UTC [gossip.gossip] handleMessage -> DEBU 1e0c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.052 UTC [gossip.gossip] handleMessage -> DEBU 1e0d Exiting" +"2019-04-22 06:17:12.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.053 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e0f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:12.053 UTC [msp] DeserializeIdentity -> DEBU 1e10 Obtaining identity" +"2019-04-22 06:17:12.054 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e12 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.054 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e13 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.055 UTC [policies] Evaluate -> DEBU 1e14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.055 UTC [policies] Evaluate -> DEBU 1e15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.057 UTC [policies] Evaluate -> DEBU 1e16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.057 UTC [cauthdsl] func1 -> DEBU 1e17 0xc00305eb00 gate 1555913832057428100 evaluation starts" +"2019-04-22 06:17:12.058 UTC [gossip.gossip] handleMessage -> DEBU 1e18 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.058 UTC [cauthdsl] func2 -> DEBU 1e19 0xc00305eb00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.061 UTC [cauthdsl] func2 -> DEBU 1e1a 0xc00305eb00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.061 UTC [cauthdsl] func2 -> DEBU 1e1b 0xc00305eb00 principal matched by identity 0" +"2019-04-22 06:17:12.062 UTC [msp.identity] Verify -> DEBU 1e1c Verify: digest = 00000000 c7 a6 32 91 cd 83 d1 e7 e4 be f6 2b 0c 9d 01 e5 |..2........+....| +00000010 85 c0 29 7e 5e 36 3f bb 0b e5 d2 9b 15 ad 86 93 |..)~^6?.........|" +"2019-04-22 06:17:12.062 UTC [msp.identity] Verify -> DEBU 1e1d Verify: sig = 00000000 30 44 02 20 5b 6d 09 7a 79 b1 91 32 32 a2 b1 46 |0D. [m.zy..22..F| +00000010 50 dd 70 0b 3a 57 dd 00 47 bb 5a 2a 6d e8 b4 9d |P.p.:W..G.Z*m...| +00000020 54 9a bf 04 02 20 0f 20 b3 a0 47 21 d6 fe 3a 29 |T.... . ..G!..:)| +00000030 d9 e8 38 e9 59 bd e2 f6 73 47 52 19 ea aa ec ef |..8.Y...sGR.....| +00000040 d3 64 49 ea 49 59 |.dI.IY|" +"2019-04-22 06:17:12.062 UTC [cauthdsl] func2 -> DEBU 1e1e 0xc00305eb00 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.062 UTC [cauthdsl] func1 -> DEBU 1e1f 0xc00305eb00 gate 1555913832057428100 evaluation succeeds" +"2019-04-22 06:17:12.062 UTC [policies] Evaluate -> DEBU 1e20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.063 UTC [policies] Evaluate -> DEBU 1e21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.063 UTC [policies] Evaluate -> DEBU 1e22 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.062 UTC [gossip.comm] func1 -> DEBU 1e23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.063 UTC [policies] Evaluate -> DEBU 1e24 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.063 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e25 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.063 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e26 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:12.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e27 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 " +"2019-04-22 06:17:12.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e28 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 " +"2019-04-22 06:17:12.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e29 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:27 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:12.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e2a Exiting" +"2019-04-22 06:17:12.066 UTC [gossip.comm] func1 -> DEBU 1e2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e2c Exiting" +"2019-04-22 06:17:12.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2d Exiting" +"2019-04-22 06:17:12.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e2e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.067 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e30 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:12.067 UTC [msp] DeserializeIdentity -> DEBU 1e31 Obtaining identity" +"2019-04-22 06:17:12.068 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e32 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e33 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.067 UTC [gossip.gossip] handleMessage -> DEBU 1e2f Exiting" +"2019-04-22 06:17:12.069 UTC [msp] DeserializeIdentity -> DEBU 1e34 Obtaining identity" +"2019-04-22 06:17:12.071 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e35 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.071 UTC [gossip.gossip] handleMessage -> DEBU 1e36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.071 UTC [msp] DeserializeIdentity -> DEBU 1e37 Obtaining identity" +"2019-04-22 06:17:12.072 UTC [policies] Evaluate -> DEBU 1e38 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.072 UTC [msp] DeserializeIdentity -> DEBU 1e39 Obtaining identity" +"2019-04-22 06:17:12.072 UTC [policies] Evaluate -> DEBU 1e3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.073 UTC [policies] Evaluate -> DEBU 1e3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.073 UTC [cauthdsl] func1 -> DEBU 1e3d 0xc003069aa0 gate 1555913832073748800 evaluation starts" +"2019-04-22 06:17:12.074 UTC [cauthdsl] func2 -> DEBU 1e3e 0xc003069aa0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.074 UTC [cauthdsl] func2 -> DEBU 1e3f 0xc003069aa0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.075 UTC [cauthdsl] func2 -> DEBU 1e40 0xc003069aa0 principal matched by identity 0" +"2019-04-22 06:17:12.073 UTC [msp] DeserializeIdentity -> DEBU 1e3b Obtaining identity" +"2019-04-22 06:17:12.075 UTC [msp.identity] Verify -> DEBU 1e41 Verify: digest = 00000000 fd c6 6c 46 f1 20 41 b3 c2 ce 87 ea 57 8c a6 d2 |..lF. A.....W...| +00000010 01 56 02 57 5e 02 b4 73 b9 96 ec 84 b0 b3 8c 63 |.V.W^..s.......c|" +"2019-04-22 06:17:12.076 UTC [msp.identity] Verify -> DEBU 1e42 Verify: sig = 00000000 30 44 02 20 68 c1 08 0a be 5e 38 c3 cf 94 74 3e |0D. h....^8...t>| +00000010 08 6f 25 86 bd 1c 07 2d 14 58 e2 0b 67 85 d9 ba |.o%....-.X..g...| +00000020 94 a9 16 1d 02 20 3f d1 65 0c 01 69 14 32 f2 0b |..... ?.e..i.2..| +00000030 09 15 f1 ed 2c 3b 97 71 00 ef d1 92 f3 bf 1e a9 |....,;.q........| +00000040 d1 1d 75 2a 6b 25 |..u*k%|" +"2019-04-22 06:17:12.076 UTC [msp] DeserializeIdentity -> DEBU 1e43 Obtaining identity" +"2019-04-22 06:17:12.077 UTC [msp] DeserializeIdentity -> DEBU 1e44 Obtaining identity" +"2019-04-22 06:17:12.077 UTC [msp] DeserializeIdentity -> DEBU 1e45 Obtaining identity" +"2019-04-22 06:17:12.078 UTC [gossip.comm] Send -> DEBU 1e46 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:12.078 UTC [msp] DeserializeIdentity -> DEBU 1e47 Obtaining identity" +"2019-04-22 06:17:12.078 UTC [gossip.comm] Send -> DEBU 1e48 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:12.079 UTC [gossip.comm] sendToEndpoint -> DEBU 1e49 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.079 UTC [gossip.comm] sendToEndpoint -> DEBU 1e4a Exiting" +"2019-04-22 06:17:12.079 UTC [gossip.comm] sendToEndpoint -> DEBU 1e4b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.080 UTC [gossip.comm] sendToEndpoint -> DEBU 1e4c Exiting" +"2019-04-22 06:17:12.081 UTC [cauthdsl] func2 -> DEBU 1e4d 0xc003069aa0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.082 UTC [cauthdsl] func1 -> DEBU 1e4e 0xc003069aa0 gate 1555913832073748800 evaluation succeeds" +"2019-04-22 06:17:12.082 UTC [policies] Evaluate -> DEBU 1e4f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.082 UTC [policies] Evaluate -> DEBU 1e50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.083 UTC [policies] Evaluate -> DEBU 1e51 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.083 UTC [policies] Evaluate -> DEBU 1e52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.084 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e53 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.084 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e54 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:12.084 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e55 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 " +"2019-04-22 06:17:12.085 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e56 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 " +"2019-04-22 06:17:12.086 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e57 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:12.086 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e58 Exiting" +"2019-04-22 06:17:12.086 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e59 Exiting" +"2019-04-22 06:17:12.087 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5a Exiting" +"2019-04-22 06:17:12.087 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.087 UTC [gossip.gossip] handleMessage -> DEBU 1e5d Exiting" +"2019-04-22 06:17:12.087 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e5e Exiting" +"2019-04-22 06:17:12.087 UTC [gossip.gossip] handleMessage -> DEBU 1e5f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.088 UTC [gossip.gossip] handleMessage -> DEBU 1e60 Exiting" +"2019-04-22 06:17:12.088 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e61 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:28 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:12.088 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e62 Exiting" +"2019-04-22 06:17:12.087 UTC [gossip.discovery] sendMemResponse -> DEBU 1e5c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:12.089 UTC [msp] DeserializeIdentity -> DEBU 1e63 Obtaining identity" +"2019-04-22 06:17:12.090 UTC [msp] DeserializeIdentity -> DEBU 1e64 Obtaining identity" +"2019-04-22 06:17:12.090 UTC [msp] DeserializeIdentity -> DEBU 1e65 Obtaining identity" +"2019-04-22 06:17:12.092 UTC [gossip.comm] Send -> DEBU 1e66 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:12.093 UTC [gossip.comm] sendToEndpoint -> DEBU 1e67 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.093 UTC [gossip.comm] sendToEndpoint -> DEBU 1e69 Exiting" +"2019-04-22 06:17:12.093 UTC [gossip.discovery] sendMemResponse -> DEBU 1e68 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:12.423 UTC [msp] DeserializeIdentity -> DEBU 1e6a Obtaining identity" +"2019-04-22 06:17:12.423 UTC [msp] DeserializeIdentity -> DEBU 1e6b Obtaining identity" +"2019-04-22 06:17:12.424 UTC [gossip.comm] Send -> DEBU 1e6c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e70 Exiting" +"2019-04-22 06:17:12.424 UTC [gossip.comm] sendToEndpoint -> DEBU 1e6f Exiting" +"2019-04-22 06:17:12.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1e71 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.425 UTC [gossip.comm] sendToEndpoint -> DEBU 1e72 Exiting" +"2019-04-22 06:17:12.426 UTC [gossip.comm] func1 -> DEBU 1e73 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.426 UTC [gossip.gossip] handleMessage -> DEBU 1e74 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.427 UTC [msp.identity] Verify -> DEBU 1e75 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:12.427 UTC [msp.identity] Verify -> DEBU 1e76 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:12.428 UTC [gossip.comm] func1 -> DEBU 1e78 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.428 UTC [msp] DeserializeIdentity -> DEBU 1e77 Obtaining identity" +"2019-04-22 06:17:12.429 UTC [msp] DeserializeIdentity -> DEBU 1e79 Obtaining identity" +"2019-04-22 06:17:12.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e7b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e7c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.430 UTC [policies] Evaluate -> DEBU 1e7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.430 UTC [policies] Evaluate -> DEBU 1e7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.430 UTC [policies] Evaluate -> DEBU 1e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.430 UTC [cauthdsl] func1 -> DEBU 1e80 0xc002fb08e0 gate 1555913832430874400 evaluation starts" +"2019-04-22 06:17:12.431 UTC [cauthdsl] func2 -> DEBU 1e81 0xc002fb08e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.431 UTC [cauthdsl] func2 -> DEBU 1e82 0xc002fb08e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.431 UTC [cauthdsl] func2 -> DEBU 1e83 0xc002fb08e0 principal matched by identity 0" +"2019-04-22 06:17:12.432 UTC [msp.identity] Verify -> DEBU 1e84 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:12.432 UTC [msp.identity] Verify -> DEBU 1e85 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:12.432 UTC [cauthdsl] func2 -> DEBU 1e86 0xc002fb08e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.432 UTC [cauthdsl] func1 -> DEBU 1e87 0xc002fb08e0 gate 1555913832430874400 evaluation succeeds" +"2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e8a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.433 UTC [policies] Evaluate -> DEBU 1e8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.434 UTC [msp.identity] Verify -> DEBU 1e8c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:12.434 UTC [msp.identity] Verify -> DEBU 1e8d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:12.435 UTC [msp] DeserializeIdentity -> DEBU 1e8e Obtaining identity" +"2019-04-22 06:17:12.435 UTC [msp] DeserializeIdentity -> DEBU 1e8f Obtaining identity" +"2019-04-22 06:17:12.435 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e90 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e91 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.436 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e92 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.436 UTC [policies] Evaluate -> DEBU 1e93 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.436 UTC [policies] Evaluate -> DEBU 1e94 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.436 UTC [policies] Evaluate -> DEBU 1e95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.436 UTC [cauthdsl] func1 -> DEBU 1e96 0xc002f44870 gate 1555913832436809600 evaluation starts" +"2019-04-22 06:17:12.437 UTC [cauthdsl] func2 -> DEBU 1e97 0xc002f44870 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.437 UTC [cauthdsl] func2 -> DEBU 1e98 0xc002f44870 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.437 UTC [cauthdsl] func2 -> DEBU 1e99 0xc002f44870 principal matched by identity 0" +"2019-04-22 06:17:12.437 UTC [msp.identity] Verify -> DEBU 1e9a Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:12.437 UTC [msp.identity] Verify -> DEBU 1e9b Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:12.438 UTC [cauthdsl] func2 -> DEBU 1e9c 0xc002f44870 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.438 UTC [cauthdsl] func1 -> DEBU 1e9d 0xc002f44870 gate 1555913832436809600 evaluation succeeds" +"2019-04-22 06:17:12.438 UTC [policies] Evaluate -> DEBU 1e9e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.438 UTC [policies] Evaluate -> DEBU 1e9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.438 UTC [policies] Evaluate -> DEBU 1ea0 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.439 UTC [policies] Evaluate -> DEBU 1ea1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.439 UTC [gossip.gossip] handleMessage -> DEBU 1ea2 Exiting" +"2019-04-22 06:17:12.439 UTC [gossip.gossip] handleMessage -> DEBU 1ea3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.440 UTC [msp] DeserializeIdentity -> DEBU 1ea4 Obtaining identity" +"2019-04-22 06:17:12.440 UTC [msp] DeserializeIdentity -> DEBU 1ea5 Obtaining identity" +"2019-04-22 06:17:12.440 UTC [msp] DeserializeIdentity -> DEBU 1ea6 Obtaining identity" +"2019-04-22 06:17:12.440 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ea7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ea8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ea9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.441 UTC [policies] Evaluate -> DEBU 1eaa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.441 UTC [policies] Evaluate -> DEBU 1eab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.442 UTC [policies] Evaluate -> DEBU 1eac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.443 UTC [cauthdsl] func1 -> DEBU 1ead 0xc002f003a0 gate 1555913832443250700 evaluation starts" +"2019-04-22 06:17:12.443 UTC [cauthdsl] func2 -> DEBU 1eae 0xc002f003a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.443 UTC [cauthdsl] func2 -> DEBU 1eaf 0xc002f003a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.444 UTC [cauthdsl] func2 -> DEBU 1eb0 0xc002f003a0 principal matched by identity 0" +"2019-04-22 06:17:12.444 UTC [msp.identity] Verify -> DEBU 1eb1 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:12.445 UTC [msp.identity] Verify -> DEBU 1eb2 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:12.445 UTC [cauthdsl] func2 -> DEBU 1eb3 0xc002f003a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.445 UTC [cauthdsl] func1 -> DEBU 1eb4 0xc002f003a0 gate 1555913832443250700 evaluation succeeds" +"2019-04-22 06:17:12.446 UTC [policies] Evaluate -> DEBU 1eb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.449 UTC [policies] Evaluate -> DEBU 1eb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.449 UTC [policies] Evaluate -> DEBU 1eb7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.450 UTC [policies] Evaluate -> DEBU 1eb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.450 UTC [msp] DeserializeIdentity -> DEBU 1eb9 Obtaining identity" +"2019-04-22 06:17:12.450 UTC [msp] DeserializeIdentity -> DEBU 1eba Obtaining identity" +"2019-04-22 06:17:12.451 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ebb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.451 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ebc Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ebd Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.452 UTC [policies] Evaluate -> DEBU 1ebe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.453 UTC [policies] Evaluate -> DEBU 1ebf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.453 UTC [policies] Evaluate -> DEBU 1ec0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.453 UTC [cauthdsl] func1 -> DEBU 1ec1 0xc002f01d00 gate 1555913832453795600 evaluation starts" +"2019-04-22 06:17:12.454 UTC [cauthdsl] func2 -> DEBU 1ec2 0xc002f01d00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.455 UTC [cauthdsl] func2 -> DEBU 1ec3 0xc002f01d00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.455 UTC [cauthdsl] func2 -> DEBU 1ec4 0xc002f01d00 principal matched by identity 0" +"2019-04-22 06:17:12.455 UTC [msp.identity] Verify -> DEBU 1ec5 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:12.456 UTC [msp.identity] Verify -> DEBU 1ec6 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:12.456 UTC [cauthdsl] func2 -> DEBU 1ec7 0xc002f01d00 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.456 UTC [cauthdsl] func1 -> DEBU 1ec8 0xc002f01d00 gate 1555913832453795600 evaluation succeeds" +"2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1ec9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1eca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1ecb Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.457 UTC [policies] Evaluate -> DEBU 1ecc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.458 UTC [msp.identity] Verify -> DEBU 1ecd Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:12.458 UTC [msp.identity] Verify -> DEBU 1ece Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:12.459 UTC [msp.identity] Verify -> DEBU 1ecf Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:12.459 UTC [msp.identity] Verify -> DEBU 1ed0 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:12.460 UTC [gossip.gossip] handleMessage -> DEBU 1ed1 Exiting" +"2019-04-22 06:17:12.460 UTC [gossip.gossip] handleMessage -> DEBU 1ed2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.460 UTC [msp] DeserializeIdentity -> DEBU 1ed3 Obtaining identity" +"2019-04-22 06:17:12.463 UTC [msp] DeserializeIdentity -> DEBU 1ed4 Obtaining identity" +"2019-04-22 06:17:12.463 UTC [msp] DeserializeIdentity -> DEBU 1ed5 Obtaining identity" +"2019-04-22 06:17:12.463 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ed6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.463 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.464 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ed8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.464 UTC [policies] Evaluate -> DEBU 1ed9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.464 UTC [policies] Evaluate -> DEBU 1eda This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.464 UTC [policies] Evaluate -> DEBU 1edb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.465 UTC [cauthdsl] func1 -> DEBU 1edc 0xc002ee46e0 gate 1555913832465074000 evaluation starts" +"2019-04-22 06:17:12.465 UTC [cauthdsl] func2 -> DEBU 1edd 0xc002ee46e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.465 UTC [cauthdsl] func2 -> DEBU 1ede 0xc002ee46e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.465 UTC [cauthdsl] func2 -> DEBU 1edf 0xc002ee46e0 principal matched by identity 0" +"2019-04-22 06:17:12.466 UTC [msp.identity] Verify -> DEBU 1ee0 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:12.466 UTC [msp.identity] Verify -> DEBU 1ee1 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:12.466 UTC [cauthdsl] func2 -> DEBU 1ee2 0xc002ee46e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.467 UTC [cauthdsl] func1 -> DEBU 1ee3 0xc002ee46e0 gate 1555913832465074000 evaluation succeeds" +"2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee6 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.467 UTC [policies] Evaluate -> DEBU 1ee7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.468 UTC [msp] DeserializeIdentity -> DEBU 1ee8 Obtaining identity" +"2019-04-22 06:17:12.468 UTC [msp] DeserializeIdentity -> DEBU 1ee9 Obtaining identity" +"2019-04-22 06:17:12.469 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1eea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:12.469 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eeb Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.469 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1eec Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:12.469 UTC [policies] Evaluate -> DEBU 1eed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:12.469 UTC [policies] Evaluate -> DEBU 1eee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:12.469 UTC [policies] Evaluate -> DEBU 1eef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:12.470 UTC [cauthdsl] func1 -> DEBU 1ef0 0xc002ee5eb0 gate 1555913832470496800 evaluation starts" +"2019-04-22 06:17:12.470 UTC [cauthdsl] func2 -> DEBU 1ef1 0xc002ee5eb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:12.471 UTC [cauthdsl] func2 -> DEBU 1ef2 0xc002ee5eb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:12.471 UTC [cauthdsl] func2 -> DEBU 1ef3 0xc002ee5eb0 principal matched by identity 0" +"2019-04-22 06:17:12.471 UTC [msp.identity] Verify -> DEBU 1ef4 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:12.473 UTC [msp.identity] Verify -> DEBU 1ef5 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:12.474 UTC [cauthdsl] func2 -> DEBU 1ef6 0xc002ee5eb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:12.474 UTC [cauthdsl] func1 -> DEBU 1ef7 0xc002ee5eb0 gate 1555913832470496800 evaluation succeeds" +"2019-04-22 06:17:12.474 UTC [policies] Evaluate -> DEBU 1ef8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.474 UTC [policies] Evaluate -> DEBU 1ef9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:12.475 UTC [policies] Evaluate -> DEBU 1efa Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:12.475 UTC [policies] Evaluate -> DEBU 1efb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:12.475 UTC [msp.identity] Verify -> DEBU 1efc Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:12.476 UTC [msp.identity] Verify -> DEBU 1efd Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:12.476 UTC [msp.identity] Verify -> DEBU 1efe Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:12.477 UTC [msp.identity] Verify -> DEBU 1eff Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:12.477 UTC [gossip.gossip] handleMessage -> DEBU 1f00 Exiting" +"2019-04-22 06:17:12.490 UTC [msp] DeserializeIdentity -> DEBU 1f01 Obtaining identity" +"2019-04-22 06:17:12.490 UTC [msp] DeserializeIdentity -> DEBU 1f02 Obtaining identity" +"2019-04-22 06:17:12.491 UTC [gossip.pull] Hello -> DEBU 1f03 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:12.491 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" +"2019-04-22 06:17:12.491 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" +"2019-04-22 06:17:12.492 UTC [gossip.comm] Send -> DEBU 1f06 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:12.492 UTC [gossip.comm] sendToEndpoint -> DEBU 1f07 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.493 UTC [gossip.comm] sendToEndpoint -> DEBU 1f08 Exiting" +"2019-04-22 06:17:12.494 UTC [gossip.comm] func1 -> DEBU 1f09 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16043837562002828108 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 1], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.494 UTC [gossip.gossip] handleMessage -> DEBU 1f0a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16043837562002828108 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 1], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.495 UTC [gossip.pull] HandleMessage -> DEBU 1f0b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16043837562002828108 , Msg_type: BLOCK_MSG, digests: [2 3 4 5 1], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.495 UTC [gossip.gossip] handleMessage -> DEBU 1f0c Exiting" +"2019-04-22 06:17:12.681 UTC [gossip.comm] func1 -> DEBU 1f0d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.683 UTC [gossip.gossip] handleMessage -> DEBU 1f0e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.683 UTC [msp] DeserializeIdentity -> DEBU 1f0f Obtaining identity" +"2019-04-22 06:17:12.683 UTC [msp] DeserializeIdentity -> DEBU 1f10 Obtaining identity" +"2019-04-22 06:17:12.684 UTC [gossip.gossip] handleMessage -> DEBU 1f11 Exiting" +"2019-04-22 06:17:12.701 UTC [gossip.comm] func1 -> DEBU 1f12 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.701 UTC [gossip.gossip] handleMessage -> DEBU 1f13 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.702 UTC [gossip.pull] HandleMessage -> DEBU 1f14 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.702 UTC [gossip.pull] SendDigest -> DEBU 1f15 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:12.702 UTC [gossip.gossip] handleMessage -> DEBU 1f16 Exiting" +"2019-04-22 06:17:12.906 UTC [gossip.gossip] handleMessage -> DEBU 1f17 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:12.906 UTC [msp] DeserializeIdentity -> DEBU 1f18 Obtaining identity" +"2019-04-22 06:17:12.906 UTC [msp] DeserializeIdentity -> DEBU 1f19 Obtaining identity" +"2019-04-22 06:17:12.907 UTC [msp] DeserializeIdentity -> DEBU 1f1a Obtaining identity" +"2019-04-22 06:17:12.907 UTC [gossip.gossip] handleMessage -> DEBU 1f1b Exiting" +"2019-04-22 06:17:13.120 UTC [gossip.comm] func1 -> DEBU 1f1c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:13.121 UTC [gossip.gossip] handleMessage -> DEBU 1f1d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:13.121 UTC [msp] DeserializeIdentity -> DEBU 1f1e Obtaining identity" +"2019-04-22 06:17:13.121 UTC [msp] DeserializeIdentity -> DEBU 1f1f Obtaining identity" +"2019-04-22 06:17:13.122 UTC [msp] DeserializeIdentity -> DEBU 1f20 Obtaining identity" +"2019-04-22 06:17:13.122 UTC [gossip.gossip] handleMessage -> DEBU 1f21 Exiting" +"2019-04-22 06:17:14.898 UTC [gossip.pull] Hello -> DEBU 1f22 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:14.899 UTC [gossip.comm] Send -> DEBU 1f23 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:14.899 UTC [gossip.pull] Hello -> DEBU 1f24 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:14.899 UTC [gossip.comm] Send -> DEBU 1f25 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:14.899 UTC [gossip.comm] sendToEndpoint -> DEBU 1f26 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.900 UTC [gossip.pull] Hello -> DEBU 1f27 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:14.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1f28 Exiting" +"2019-04-22 06:17:14.900 UTC [gossip.comm] Send -> DEBU 1f29 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:14.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.901 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2c Exiting" +"2019-04-22 06:17:14.903 UTC [gossip.comm] func1 -> DEBU 1f2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8035115496546039748 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.903 UTC [gossip.gossip] handleMessage -> DEBU 1f2e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8035115496546039748 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.904 UTC [gossip.pull] HandleMessage -> DEBU 1f2f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8035115496546039748 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.904 UTC [gossip.gossip] handleMessage -> DEBU 1f30 Exiting" +"2019-04-22 06:17:14.904 UTC [gossip.gossip] handleMessage -> DEBU 1f31 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9806469447705849204 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.905 UTC [gossip.pull] HandleMessage -> DEBU 1f32 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9806469447705849204 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.905 UTC [gossip.gossip] handleMessage -> DEBU 1f33 Exiting" +"2019-04-22 06:17:14.900 UTC [gossip.comm] sendToEndpoint -> DEBU 1f2a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.905 UTC [gossip.comm] sendToEndpoint -> DEBU 1f34 Exiting" +"2019-04-22 06:17:14.906 UTC [gossip.comm] func1 -> DEBU 1f35 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7432820561090957802 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.907 UTC [gossip.gossip] handleMessage -> DEBU 1f36 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7432820561090957802 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.907 UTC [gossip.pull] HandleMessage -> DEBU 1f37 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7432820561090957802 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.907 UTC [gossip.gossip] handleMessage -> DEBU 1f38 Exiting" +"2019-04-22 06:17:14.934 UTC [msp.identity] Sign -> DEBU 1f39 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101D " +"2019-04-22 06:17:14.934 UTC [msp.identity] Sign -> DEBU 1f3a Sign: digest: 47BE2088D39197400D87A68B040D208892EE69ADE311531646B13B5BA950258A " +"2019-04-22 06:17:14.935 UTC [msp.identity] Sign -> DEBU 1f3b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:14.935 UTC [msp.identity] Sign -> DEBU 1f3c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:14.935 UTC [msp] DeserializeIdentity -> DEBU 1f3d Obtaining identity" +"2019-04-22 06:17:14.935 UTC [gossip.comm] Send -> DEBU 1f3e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:14.936 UTC [msp] DeserializeIdentity -> DEBU 1f3f Obtaining identity" +"2019-04-22 06:17:14.936 UTC [gossip.comm] Send -> DEBU 1f40 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:14.936 UTC [gossip.comm] Send -> DEBU 1f41 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:14.936 UTC [gossip.comm] sendToEndpoint -> DEBU 1f42 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.937 UTC [gossip.comm] sendToEndpoint -> DEBU 1f43 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.937 UTC [gossip.comm] sendToEndpoint -> DEBU 1f45 Exiting" +"2019-04-22 06:17:14.937 UTC [gossip.comm] sendToEndpoint -> DEBU 1f44 Exiting" +"2019-04-22 06:17:14.938 UTC [gossip.comm] sendToEndpoint -> DEBU 1f46 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.938 UTC [gossip.comm] sendToEndpoint -> DEBU 1f47 Exiting" +"2019-04-22 06:17:14.941 UTC [gossip.comm] func1 -> DEBU 1f48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.941 UTC [gossip.gossip] handleMessage -> DEBU 1f49 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.941 UTC [gossip.gossip] handleMessage -> DEBU 1f4a Exiting" +"2019-04-22 06:17:14.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f4c Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:14.943 UTC [msp.identity] Verify -> DEBU 1f4d Verify: digest = 00000000 47 be 20 88 d3 91 97 40 0d 87 a6 8b 04 0d 20 88 |G. ....@...... .| +00000010 92 ee 69 ad e3 11 53 16 46 b1 3b 5b a9 50 25 8a |..i...S.F.;[.P%.|" +"2019-04-22 06:17:14.943 UTC [msp.identity] Verify -> DEBU 1f4e Verify: sig = 00000000 30 44 02 20 51 07 5a ea 5b 41 b8 bd f9 17 80 d7 |0D. Q.Z.[A......| +00000010 1f 42 f7 30 67 8c de f6 80 a3 5d 03 6a 14 2b b8 |.B.0g.....].j.+.| +00000020 47 96 2f 55 02 20 0a a5 62 97 ed 4d 7a 59 ae 40 |G./U. ..b..MzY.@| +00000030 a0 83 db 10 a8 00 0b 6d 93 91 7b 5e 8b 24 19 f4 |.......m..{^.$..| +00000040 c5 46 f9 08 1a a7 |.F....|" +"2019-04-22 06:17:14.944 UTC [gossip.gossip] handleMessage -> DEBU 1f50 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f51 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:14.944 UTC [gossip.discovery] isSentByMe -> DEBU 1f52 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:14.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f53 Exiting" +"2019-04-22 06:17:14.943 UTC [gossip.comm] func1 -> DEBU 1f4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.945 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f54 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:14.946 UTC [msp] DeserializeIdentity -> DEBU 1f55 Obtaining identity" +"2019-04-22 06:17:14.946 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:14.946 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f57 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:14.947 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f58 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:14.947 UTC [policies] Evaluate -> DEBU 1f59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:14.947 UTC [policies] Evaluate -> DEBU 1f5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:14.947 UTC [policies] Evaluate -> DEBU 1f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:14.948 UTC [cauthdsl] func1 -> DEBU 1f5c 0xc0029d9930 gate 1555913834948051400 evaluation starts" +"2019-04-22 06:17:14.948 UTC [cauthdsl] func2 -> DEBU 1f5d 0xc0029d9930 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:14.948 UTC [cauthdsl] func2 -> DEBU 1f5e 0xc0029d9930 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:14.948 UTC [cauthdsl] func2 -> DEBU 1f5f 0xc0029d9930 principal matched by identity 0" +"2019-04-22 06:17:14.949 UTC [msp.identity] Verify -> DEBU 1f60 Verify: digest = 00000000 fd c6 6c 46 f1 20 41 b3 c2 ce 87 ea 57 8c a6 d2 |..lF. A.....W...| +00000010 01 56 02 57 5e 02 b4 73 b9 96 ec 84 b0 b3 8c 63 |.V.W^..s.......c|" +"2019-04-22 06:17:14.949 UTC [msp.identity] Verify -> DEBU 1f61 Verify: sig = 00000000 30 44 02 20 68 c1 08 0a be 5e 38 c3 cf 94 74 3e |0D. h....^8...t>| +00000010 08 6f 25 86 bd 1c 07 2d 14 58 e2 0b 67 85 d9 ba |.o%....-.X..g...| +00000020 94 a9 16 1d 02 20 3f d1 65 0c 01 69 14 32 f2 0b |..... ?.e..i.2..| +00000030 09 15 f1 ed 2c 3b 97 71 00 ef d1 92 f3 bf 1e a9 |....,;.q........| +00000040 d1 1d 75 2a 6b 25 |..u*k%|" +"2019-04-22 06:17:14.949 UTC [cauthdsl] func2 -> DEBU 1f62 0xc0029d9930 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:14.949 UTC [cauthdsl] func1 -> DEBU 1f63 0xc0029d9930 gate 1555913834948051400 evaluation succeeds" +"2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f66 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:14.950 UTC [policies] Evaluate -> DEBU 1f67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:14.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f68 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f69 Exiting" +"2019-04-22 06:17:14.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6a Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:14.951 UTC [msp.identity] Verify -> DEBU 1f6b Verify: digest = 00000000 b7 5c cb 09 77 38 39 ad ee a0 c0 be 82 79 3b 4c |.\..w89......y;L| +00000010 87 e4 35 f4 10 96 e1 ea e8 72 f1 e1 4b 4d 78 02 |..5......r..KMx.|" +"2019-04-22 06:17:14.951 UTC [msp.identity] Verify -> DEBU 1f6c Verify: sig = 00000000 30 44 02 20 4a 77 fc 66 61 29 14 48 cd 91 68 f5 |0D. Jw.fa).H..h.| +00000010 da 2d b8 22 13 85 db c4 42 20 c9 28 14 40 a1 6a |.-."....B .(.@.j| +00000020 be e0 af 8b 02 20 53 2c 13 84 59 dc 54 d9 97 c6 |..... S,..Y.T...| +00000030 e5 9f 3f 19 6d 26 98 a6 bd fd 91 bd 35 6a 6e 3b |..?.m&......5jn;| +00000040 92 95 49 d6 d7 88 |..I...|" +"2019-04-22 06:17:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f6d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f6e Exiting" +"2019-04-22 06:17:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6f Exiting" +"2019-04-22 06:17:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.953 UTC [gossip.gossip] handleMessage -> DEBU 1f71 Exiting" +"2019-04-22 06:17:14.954 UTC [gossip.gossip] handleMessage -> DEBU 1f72 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.955 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f73 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:14.956 UTC [msp] DeserializeIdentity -> DEBU 1f74 Obtaining identity" +"2019-04-22 06:17:14.957 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:14.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f76 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:14.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f77 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:14.965 UTC [policies] Evaluate -> DEBU 1f78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:14.965 UTC [policies] Evaluate -> DEBU 1f79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:14.965 UTC [policies] Evaluate -> DEBU 1f7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:14.966 UTC [cauthdsl] func1 -> DEBU 1f7b 0xc0026dc190 gate 1555913834966288300 evaluation starts" +"2019-04-22 06:17:14.966 UTC [cauthdsl] func2 -> DEBU 1f7c 0xc0026dc190 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:14.967 UTC [cauthdsl] func2 -> DEBU 1f7d 0xc0026dc190 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:14.967 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0026dc190 principal matched by identity 0" +"2019-04-22 06:17:14.967 UTC [msp.identity] Verify -> DEBU 1f7f Verify: digest = 00000000 9e d2 cf 72 97 3e 9a 23 5d 65 3e 01 3d be e7 8e |...r.>.#]e>.=...| +00000010 c1 f1 e9 e5 32 1d ac 39 ab ed af 94 1a 25 27 70 |....2..9.....%'p|" +"2019-04-22 06:17:14.968 UTC [msp.identity] Verify -> DEBU 1f80 Verify: sig = 00000000 30 45 02 21 00 de f5 53 d9 f1 35 19 12 14 57 83 |0E.!...S..5...W.| +00000010 db 2d 6b ac b7 ff 27 6d 08 10 03 8b f7 28 b6 aa |.-k...'m.....(..| +00000020 89 1c 93 53 dc 02 20 64 fd d4 52 03 1b cc 1d a1 |...S.. d..R.....| +00000030 b8 bf a7 1c ec a4 6c b8 9a a7 5f c5 2a 9a 51 15 |......l..._.*.Q.| +00000040 ea 18 94 5c d8 fa 72 |...\..r|" +"2019-04-22 06:17:14.969 UTC [cauthdsl] func2 -> DEBU 1f81 0xc0026dc190 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:14.969 UTC [cauthdsl] func1 -> DEBU 1f82 0xc0026dc190 gate 1555913834966288300 evaluation succeeds" +"2019-04-22 06:17:14.969 UTC [policies] Evaluate -> DEBU 1f83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:14.970 UTC [policies] Evaluate -> DEBU 1f84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:14.970 UTC [policies] Evaluate -> DEBU 1f85 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:14.970 UTC [policies] Evaluate -> DEBU 1f86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:14.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:14.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f88 Exiting" +"2019-04-22 06:17:14.971 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f89 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:14.971 UTC [msp.identity] Verify -> DEBU 1f8a Verify: digest = 00000000 b7 5c cb 09 77 38 39 ad ee a0 c0 be 82 79 3b 4c |.\..w89......y;L| +00000010 87 e4 35 f4 10 96 e1 ea e8 72 f1 e1 4b 4d 78 02 |..5......r..KMx.|" +"2019-04-22 06:17:14.971 UTC [msp.identity] Verify -> DEBU 1f8b Verify: sig = 00000000 30 44 02 20 4a 77 fc 66 61 29 14 48 cd 91 68 f5 |0D. Jw.fa).H..h.| +00000010 da 2d b8 22 13 85 db c4 42 20 c9 28 14 40 a1 6a |.-."....B .(.@.j| +00000020 be e0 af 8b 02 20 53 2c 13 84 59 dc 54 d9 97 c6 |..... S,..Y.T...| +00000030 e5 9f 3f 19 6d 26 98 a6 bd fd 91 bd 35 6a 6e 3b |..?.m&......5jn;| +00000040 92 95 49 d6 d7 88 |..I...|" +"2019-04-22 06:17:14.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:14.972 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f8d Exiting" +"2019-04-22 06:17:14.973 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f8e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:14.973 UTC [msp.identity] Verify -> DEBU 1f8f Verify: digest = 00000000 47 be 20 88 d3 91 97 40 0d 87 a6 8b 04 0d 20 88 |G. ....@...... .| +00000010 92 ee 69 ad e3 11 53 16 46 b1 3b 5b a9 50 25 8a |..i...S.F.;[.P%.|" +"2019-04-22 06:17:14.973 UTC [msp.identity] Verify -> DEBU 1f90 Verify: sig = 00000000 30 44 02 20 51 07 5a ea 5b 41 b8 bd f9 17 80 d7 |0D. Q.Z.[A......| +00000010 1f 42 f7 30 67 8c de f6 80 a3 5d 03 6a 14 2b b8 |.B.0g.....].j.+.| +00000020 47 96 2f 55 02 20 0a a5 62 97 ed 4d 7a 59 ae 40 |G./U. ..b..MzY.@| +00000030 a0 83 db 10 a8 00 0b 6d 93 91 7b 5e 8b 24 19 f4 |.......m..{^.$..| +00000040 c5 46 f9 08 1a a7 |.F....|" +"2019-04-22 06:17:14.974 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f91 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:14.974 UTC [gossip.discovery] isSentByMe -> DEBU 1f92 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:14.974 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f93 Exiting" +"2019-04-22 06:17:14.974 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f94 Exiting" +"2019-04-22 06:17:14.975 UTC [gossip.gossip] handleMessage -> DEBU 1f95 Exiting" +"2019-04-22 06:17:14.975 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f96 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:14.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f97 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:14.975 UTC [msp.identity] Verify -> DEBU 1f98 Verify: digest = 00000000 47 be 20 88 d3 91 97 40 0d 87 a6 8b 04 0d 20 88 |G. ....@...... .| +00000010 92 ee 69 ad e3 11 53 16 46 b1 3b 5b a9 50 25 8a |..i...S.F.;[.P%.|" +"2019-04-22 06:17:14.976 UTC [msp.identity] Verify -> DEBU 1f99 Verify: sig = 00000000 30 44 02 20 51 07 5a ea 5b 41 b8 bd f9 17 80 d7 |0D. Q.Z.[A......| +00000010 1f 42 f7 30 67 8c de f6 80 a3 5d 03 6a 14 2b b8 |.B.0g.....].j.+.| +00000020 47 96 2f 55 02 20 0a a5 62 97 ed 4d 7a 59 ae 40 |G./U. ..b..MzY.@| +00000030 a0 83 db 10 a8 00 0b 6d 93 91 7b 5e 8b 24 19 f4 |.......m..{^.$..| +00000040 c5 46 f9 08 1a a7 |.F....|" +"2019-04-22 06:17:14.976 UTC [msp.identity] Verify -> DEBU 1f9a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:14.976 UTC [msp.identity] Verify -> DEBU 1f9b Verify: sig = 00000000 30 44 02 20 58 ac 77 4e e2 3e e3 0a 4b 08 21 3b |0D. X.wN.>..K.!;| +00000010 7e c9 ce 58 53 f5 fa 46 a7 3e fa ab ff 4d ed c3 |~..XS..F.>...M..| +00000020 d6 c0 c6 f0 02 20 04 41 bf 84 9d 3b f6 e9 4a 62 |..... .A...;..Jb| +00000030 3f 78 2e a5 28 9d 51 ba 8b b3 3b d7 88 e7 2b 37 |?x..(.Q...;...+7| +00000040 01 08 15 b1 0f 1d |......|" +"2019-04-22 06:17:14.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f9c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:14.977 UTC [gossip.discovery] isSentByMe -> DEBU 1f9d Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:14.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f9e Exiting" +"2019-04-22 06:17:14.978 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9f Exiting" +"2019-04-22 06:17:15.161 UTC [gossip.comm] func1 -> DEBU 1fa0 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.161 UTC [gossip.gossip] handleMessage -> DEBU 1fa1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.162 UTC [gossip.pull] HandleMessage -> DEBU 1fa2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.162 UTC [gossip.pull] SendDigest -> DEBU 1fa3 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:15.162 UTC [gossip.gossip] handleMessage -> DEBU 1fa4 Exiting" +"2019-04-22 06:17:15.182 UTC [gossip.comm] func1 -> DEBU 1fa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.182 UTC [gossip.gossip] handleMessage -> DEBU 1fa6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.183 UTC [gossip.gossip] handleMessage -> DEBU 1fa7 Exiting" +"2019-04-22 06:17:15.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fa9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:15.184 UTC [msp.identity] Verify -> DEBU 1faa Verify: digest = 00000000 42 11 9d 68 7f c6 7e 82 86 b8 d4 b9 83 71 52 98 |B..h..~......qR.| +00000010 ca a7 57 95 e7 0d fd ee a9 14 6a 4e a2 73 20 ca |..W.......jN.s .|" +"2019-04-22 06:17:15.186 UTC [msp.identity] Verify -> DEBU 1fab Verify: sig = 00000000 30 44 02 20 7a 88 9b e8 c9 76 51 29 e4 93 7d 2b |0D. z....vQ)..}+| +00000010 9b e8 eb 96 e8 68 58 fb 3d ec e3 4e 78 94 13 ae |.....hX.=..Nx...| +00000020 c9 b4 bb e5 02 20 3b 59 ec e8 4a 60 be c1 f2 2c |..... ;Y..J`...,| +00000030 52 32 53 f3 c9 fd f4 f1 51 ec 93 6f fd 1e 5b cb |R2S.....Q..o..[.| +00000040 cf 37 40 2d 4a 28 |.7@-J(|" +"2019-04-22 06:17:15.187 UTC [msp.identity] Verify -> DEBU 1fac Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:15.187 UTC [msp.identity] Verify -> DEBU 1fad Verify: sig = 00000000 30 45 02 21 00 9d 44 b0 10 65 63 92 9b 8b 41 21 |0E.!..D..ec...A!| +00000010 07 98 1d 28 38 38 0b 88 7e 10 24 2a 79 5c a0 a1 |...(88..~.$*y\..| +00000020 31 58 0d ab eb 02 20 76 6f 85 26 f7 1a 6f ae 39 |1X.... vo.&..o.9| +00000030 db 22 4b 21 18 1e 08 65 fc 36 50 7d b0 95 1e 38 |."K!...e.6P}...8| +00000040 9c 9f 10 17 62 bc 41 |....b.A|" +"2019-04-22 06:17:15.188 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:15.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1faf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:15.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb0 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 " +"2019-04-22 06:17:15.188 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 " +"2019-04-22 06:17:15.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:32 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:15.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fb3 Exiting" +"2019-04-22 06:17:15.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fb4 Exiting" +"2019-04-22 06:17:15.190 UTC [gossip.discovery] sendMemResponse -> DEBU 1fb6 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:15.191 UTC [msp] DeserializeIdentity -> DEBU 1fb7 Obtaining identity" +"2019-04-22 06:17:15.191 UTC [msp] DeserializeIdentity -> DEBU 1fb8 Obtaining identity" +"2019-04-22 06:17:15.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fb5 Exiting" +"2019-04-22 06:17:15.192 UTC [gossip.comm] Send -> DEBU 1fb9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:15.193 UTC [gossip.discovery] sendMemResponse -> DEBU 1fba Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:15.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.193 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbc Exiting" +"2019-04-22 06:17:15.620 UTC [gossip.comm] func1 -> DEBU 1fbd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.621 UTC [gossip.gossip] handleMessage -> DEBU 1fbe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.621 UTC [gossip.pull] HandleMessage -> DEBU 1fbf GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.622 UTC [msp] DeserializeIdentity -> DEBU 1fc0 Obtaining identity" +"2019-04-22 06:17:15.622 UTC [msp] DeserializeIdentity -> DEBU 1fc1 Obtaining identity" +"2019-04-22 06:17:15.622 UTC [msp] DeserializeIdentity -> DEBU 1fc2 Obtaining identity" +"2019-04-22 06:17:15.623 UTC [msp] DeserializeIdentity -> DEBU 1fc3 Obtaining identity" +"2019-04-22 06:17:15.623 UTC [msp] DeserializeIdentity -> DEBU 1fc4 Obtaining identity" +"2019-04-22 06:17:15.623 UTC [msp] DeserializeIdentity -> DEBU 1fc5 Obtaining identity" +"2019-04-22 06:17:15.624 UTC [gossip.pull] SendDigest -> DEBU 1fc6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:15.624 UTC [gossip.gossip] handleMessage -> DEBU 1fc7 Exiting" +"2019-04-22 06:17:15.631 UTC [gossip.comm] func1 -> DEBU 1fc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.631 UTC [gossip.gossip] handleMessage -> DEBU 1fc9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.633 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.633 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1fcb Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:15.634 UTC [msp] DeserializeIdentity -> DEBU 1fcc Obtaining identity" +"2019-04-22 06:17:15.634 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fcd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:15.634 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fce Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:15.634 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fcf Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:15.635 UTC [policies] Evaluate -> DEBU 1fd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:15.635 UTC [policies] Evaluate -> DEBU 1fd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:15.636 UTC [policies] Evaluate -> DEBU 1fd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:15.636 UTC [cauthdsl] func1 -> DEBU 1fd3 0xc0025e3cf0 gate 1555913835636802800 evaluation starts" +"2019-04-22 06:17:15.637 UTC [cauthdsl] func2 -> DEBU 1fd4 0xc0025e3cf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:15.637 UTC [cauthdsl] func2 -> DEBU 1fd5 0xc0025e3cf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:15.637 UTC [cauthdsl] func2 -> DEBU 1fd6 0xc0025e3cf0 principal matched by identity 0" +"2019-04-22 06:17:15.645 UTC [gossip.gossip] handleMessage -> DEBU 1fd7 Exiting" +"2019-04-22 06:17:15.646 UTC [msp.identity] Verify -> DEBU 1fd8 Verify: digest = 00000000 f6 1e 27 df ae 4a b5 51 4a e2 30 c7 a1 51 59 2b |..'..J.QJ.0..QY+| +00000010 96 47 bf ba 4a 64 2c e5 41 d8 00 7d 04 c1 f9 af |.G..Jd,.A..}....|" +"2019-04-22 06:17:15.647 UTC [msp.identity] Verify -> DEBU 1fd9 Verify: sig = 00000000 30 45 02 21 00 e9 a5 e1 29 e5 2b 13 60 67 92 25 |0E.!....).+.`g.%| +00000010 e1 93 a5 d0 05 e2 3b a2 d2 3c 41 d4 59 6b db e3 |......;.. DEBU 1fda 0xc0025e3cf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:15.647 UTC [cauthdsl] func1 -> DEBU 1fdb 0xc0025e3cf0 gate 1555913835636802800 evaluation succeeds" +"2019-04-22 06:17:15.647 UTC [policies] Evaluate -> DEBU 1fdc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:15.648 UTC [policies] Evaluate -> DEBU 1fdd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:15.648 UTC [policies] Evaluate -> DEBU 1fde Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:15.648 UTC [policies] Evaluate -> DEBU 1fdf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:15.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fe0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 " +"2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 " +"2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:31 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:15.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 1fe5 Exiting" +"2019-04-22 06:17:15.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 1fe6 Exiting" +"2019-04-22 06:17:15.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fe7 Exiting" +"2019-04-22 06:17:15.650 UTC [gossip.discovery] sendMemResponse -> DEBU 1fe8 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:15.650 UTC [msp] DeserializeIdentity -> DEBU 1fe9 Obtaining identity" +"2019-04-22 06:17:15.651 UTC [msp] DeserializeIdentity -> DEBU 1fea Obtaining identity" +"2019-04-22 06:17:15.651 UTC [msp] DeserializeIdentity -> DEBU 1feb Obtaining identity" +"2019-04-22 06:17:15.651 UTC [gossip.comm] Send -> DEBU 1fec Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:15.652 UTC [gossip.discovery] sendMemResponse -> DEBU 1fed Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:15.652 UTC [gossip.comm] sendToEndpoint -> DEBU 1fee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:15.652 UTC [gossip.comm] sendToEndpoint -> DEBU 1fef Exiting" +"2019-04-22 06:17:15.856 UTC [msp.identity] Sign -> DEBU 1ff0 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101E " +"2019-04-22 06:17:15.856 UTC [msp.identity] Sign -> DEBU 1ff1 Sign: digest: 56975123F69AC92C774DD958CC11C1CBBFAF4DD7F0EAD9379E8A640F04E90790 " +"2019-04-22 06:17:15.857 UTC [msp.identity] Sign -> DEBU 1ff2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:15.857 UTC [msp.identity] Sign -> DEBU 1ff3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:15.857 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1ff4 Sleeping 5s" +"2019-04-22 06:17:15.863 UTC [msp] DeserializeIdentity -> DEBU 1ff5 Obtaining identity" +"2019-04-22 06:17:15.863 UTC [msp] DeserializeIdentity -> DEBU 1ff6 Obtaining identity" +"2019-04-22 06:17:15.863 UTC [gossip.comm] Send -> DEBU 1ff7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:15.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:15.864 UTC [gossip.comm] sendToEndpoint -> DEBU 1ff9 Exiting" +"2019-04-22 06:17:15.865 UTC [msp] DeserializeIdentity -> DEBU 1ffa Obtaining identity" +"2019-04-22 06:17:15.865 UTC [gossip.comm] Send -> DEBU 1ffb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:15.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1ffc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:15.866 UTC [gossip.comm] sendToEndpoint -> DEBU 1ffd Exiting" +"2019-04-22 06:17:15.867 UTC [msp] DeserializeIdentity -> DEBU 1ffe Obtaining identity" +"2019-04-22 06:17:15.868 UTC [gossip.comm] Send -> DEBU 1fff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:15.869 UTC [gossip.comm] sendToEndpoint -> DEBU 2000 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:15.869 UTC [gossip.comm] sendToEndpoint -> DEBU 2001 Exiting" +"2019-04-22 06:17:16.038 UTC [gossip.gossip] handleMessage -> DEBU 2002 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.038 UTC [gossip.pull] HandleMessage -> DEBU 2003 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2004 Obtaining identity" +"2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2005 Obtaining identity" +"2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2006 Obtaining identity" +"2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2007 Obtaining identity" +"2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2008 Obtaining identity" +"2019-04-22 06:17:16.041 UTC [msp] DeserializeIdentity -> DEBU 2009 Obtaining identity" +"2019-04-22 06:17:16.041 UTC [gossip.pull] SendDigest -> DEBU 200a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:16.041 UTC [gossip.gossip] handleMessage -> DEBU 200b Exiting" +"2019-04-22 06:17:16.057 UTC [gossip.gossip] handleMessage -> DEBU 200c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.057 UTC [gossip.gossip] handleMessage -> DEBU 200d Exiting" +"2019-04-22 06:17:16.058 UTC [gossip.discovery] handleMsgFromComm -> DEBU 200e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.058 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 200f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:16.058 UTC [msp] DeserializeIdentity -> DEBU 2010 Obtaining identity" +"2019-04-22 06:17:16.059 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2011 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2012 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.059 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2013 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.060 UTC [policies] Evaluate -> DEBU 2014 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.060 UTC [policies] Evaluate -> DEBU 2015 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.060 UTC [policies] Evaluate -> DEBU 2016 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.061 UTC [cauthdsl] func1 -> DEBU 2017 0xc0024d3b60 gate 1555913836061011300 evaluation starts" +"2019-04-22 06:17:16.061 UTC [cauthdsl] func2 -> DEBU 2018 0xc0024d3b60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.061 UTC [cauthdsl] func2 -> DEBU 2019 0xc0024d3b60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.061 UTC [cauthdsl] func2 -> DEBU 201a 0xc0024d3b60 principal matched by identity 0" +"2019-04-22 06:17:16.061 UTC [msp.identity] Verify -> DEBU 201b Verify: digest = 00000000 24 91 ac e3 96 9d f9 82 32 b5 04 94 d8 9f 61 f1 |$.......2.....a.| +00000010 1d 94 0e 3e 00 62 25 38 fd 12 de a6 a0 c5 d9 f8 |...>.b%8........|" +"2019-04-22 06:17:16.062 UTC [msp.identity] Verify -> DEBU 201c Verify: sig = 00000000 30 44 02 20 5f 3b 1c fa fb 88 50 97 05 f6 f3 70 |0D. _;....P....p| +00000010 ec e2 9a e5 0c a5 e8 03 d3 4e 13 df cd 24 76 c5 |.........N...$v.| +00000020 41 a9 26 6a 02 20 48 f0 8b dc 71 44 d7 19 75 56 |A.&j. H...qD..uV| +00000030 e6 90 a4 40 83 87 73 de 6b d8 02 ef ff 4d 94 dc |...@..s.k....M..| +00000040 1e a9 f7 6a 2d 80 |...j-.|" +"2019-04-22 06:17:16.062 UTC [cauthdsl] func2 -> DEBU 201d 0xc0024d3b60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.062 UTC [cauthdsl] func1 -> DEBU 201e 0xc0024d3b60 gate 1555913836061011300 evaluation succeeds" +"2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 201f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 2020 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 2021 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.063 UTC [policies] Evaluate -> DEBU 2022 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 2023 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:16.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2024 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:16.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2025 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 " +"2019-04-22 06:17:16.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2026 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 " +"2019-04-22 06:17:16.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2027 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:29 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:16.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2028 Exiting" +"2019-04-22 06:17:16.065 UTC [gossip.discovery] handleAliveMessage -> DEBU 2029 Exiting" +"2019-04-22 06:17:16.065 UTC [gossip.discovery] handleMsgFromComm -> DEBU 202a Exiting" +"2019-04-22 06:17:16.065 UTC [gossip.discovery] sendMemResponse -> DEBU 202b Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:16.066 UTC [msp] DeserializeIdentity -> DEBU 202c Obtaining identity" +"2019-04-22 06:17:16.066 UTC [msp] DeserializeIdentity -> DEBU 202d Obtaining identity" +"2019-04-22 06:17:16.066 UTC [msp] DeserializeIdentity -> DEBU 202e Obtaining identity" +"2019-04-22 06:17:16.067 UTC [gossip.comm] Send -> DEBU 202f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:16.067 UTC [gossip.discovery] sendMemResponse -> DEBU 2030 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:16.067 UTC [gossip.comm] sendToEndpoint -> DEBU 2031 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.070 UTC [gossip.comm] sendToEndpoint -> DEBU 2032 Exiting" +"2019-04-22 06:17:16.144 UTC [gossip.comm] func1 -> DEBU 2033 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:16.144 UTC [gossip.gossip] handleMessage -> DEBU 2034 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:16.147 UTC [gossip.gossip] handleMessage -> DEBU 2035 Exiting" +"2019-04-22 06:17:16.148 UTC [gossip.gossip] handleMessage -> DEBU 2036 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:16.148 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2037 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:16.149 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2038 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:16.150 UTC [msp.identity] Verify -> DEBU 2039 Verify: digest = 00000000 c8 02 3d 18 65 f4 62 e4 d5 45 fd 11 77 15 b4 10 |..=.e.b..E..w...| +00000010 82 9d ee 79 2b 1d ad 8c 0b 72 ff 6e 33 35 8a 1b |...y+....r.n35..|" +"2019-04-22 06:17:16.150 UTC [msp.identity] Verify -> DEBU 203a Verify: sig = 00000000 30 43 02 1f 59 6f c3 25 44 b7 1f 63 8e 6a 08 60 |0C..Yo.%D..c.j.`| +00000010 e5 e3 a1 2e 78 0d a9 e6 41 f2 4c e3 e0 d9 03 6a |....x...A.L....j| +00000020 86 b3 c9 02 20 36 53 d4 50 b8 f5 c7 23 fc f4 94 |.... 6S.P...#...| +00000030 35 b0 06 78 71 a0 f5 d5 35 4e 72 f6 fb 23 ab 87 |5..xq...5Nr..#..| +00000040 31 9e 3a b0 ac |1.:..|" +"2019-04-22 06:17:16.151 UTC [msp.identity] Verify -> DEBU 203b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:16.151 UTC [msp.identity] Verify -> DEBU 203c Verify: sig = 00000000 30 45 02 21 00 9d 62 ff 75 e5 ef 29 da 72 f4 d3 |0E.!..b.u..).r..| +00000010 cb 4b 89 bf 20 09 ab 71 06 c8 00 02 ae 8f fb e5 |.K.. ..q........| +00000020 39 3f 39 13 44 02 20 44 f1 5b ba 67 50 af 6b 9d |9?9.D. D.[.gP.k.| +00000030 8d e5 cb 2c 1c 84 24 e1 a2 7a 1d 4c ca e0 b8 29 |...,..$..z.L...)| +00000040 be 2f a0 7c 0e 35 a0 |./.|.5.|" +"2019-04-22 06:17:16.152 UTC [gossip.discovery] handleAliveMessage -> DEBU 203d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 203e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 203f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 " +"2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 2040 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 " +"2019-04-22 06:17:16.152 UTC [gossip.discovery] learnExistingMembers -> DEBU 2041 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:16.154 UTC [gossip.discovery] learnExistingMembers -> DEBU 2042 Exiting" +"2019-04-22 06:17:16.154 UTC [gossip.discovery] handleAliveMessage -> DEBU 2043 Exiting" +"2019-04-22 06:17:16.154 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2044 Exiting" +"2019-04-22 06:17:16.155 UTC [msp] DeserializeIdentity -> DEBU 2045 Obtaining identity" +"2019-04-22 06:17:16.156 UTC [msp] DeserializeIdentity -> DEBU 2046 Obtaining identity" +"2019-04-22 06:17:16.156 UTC [msp] DeserializeIdentity -> DEBU 2047 Obtaining identity" +"2019-04-22 06:17:16.156 UTC [gossip.comm] Send -> DEBU 2048 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers" +"2019-04-22 06:17:16.158 UTC [msp] DeserializeIdentity -> DEBU 2049 Obtaining identity" +"2019-04-22 06:17:16.158 UTC [gossip.comm] Send -> DEBU 204a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes to 1 peers" +"2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204c Exiting" +"2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:16.159 UTC [gossip.comm] sendToEndpoint -> DEBU 204e Exiting" +"2019-04-22 06:17:16.162 UTC [gossip.comm] func1 -> DEBU 204f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:16.162 UTC [gossip.gossip] handleMessage -> DEBU 2050 Exiting" +"2019-04-22 06:17:16.162 UTC [gossip.gossip] handleMessage -> DEBU 2051 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:16.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2052 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:16.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2053 Exiting" +"2019-04-22 06:17:16.163 UTC [gossip.gossip] handleMessage -> DEBU 2054 Exiting" +"2019-04-22 06:17:16.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2055 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:16.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2056 Exiting" +"2019-04-22 06:17:16.423 UTC [msp] DeserializeIdentity -> DEBU 2057 Obtaining identity" +"2019-04-22 06:17:16.423 UTC [msp] DeserializeIdentity -> DEBU 2058 Obtaining identity" +"2019-04-22 06:17:16.424 UTC [gossip.comm] Send -> DEBU 2059 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:16.424 UTC [gossip.comm] sendToEndpoint -> DEBU 205a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.424 UTC [gossip.comm] sendToEndpoint -> DEBU 205b Exiting" +"2019-04-22 06:17:16.425 UTC [gossip.comm] sendToEndpoint -> DEBU 205c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.427 UTC [gossip.comm] sendToEndpoint -> DEBU 205d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.427 UTC [gossip.comm] sendToEndpoint -> DEBU 205e Exiting" +"2019-04-22 06:17:16.428 UTC [gossip.gossip] handleMessage -> DEBU 205f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.428 UTC [msp] DeserializeIdentity -> DEBU 2060 Obtaining identity" +"2019-04-22 06:17:16.428 UTC [msp] DeserializeIdentity -> DEBU 2061 Obtaining identity" +"2019-04-22 06:17:16.429 UTC [msp] DeserializeIdentity -> DEBU 2062 Obtaining identity" +"2019-04-22 06:17:16.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2063 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2064 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2065 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.433 UTC [policies] Evaluate -> DEBU 2067 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.433 UTC [policies] Evaluate -> DEBU 2068 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.433 UTC [policies] Evaluate -> DEBU 2069 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.434 UTC [cauthdsl] func1 -> DEBU 206a 0xc00236eb30 gate 1555913836434154800 evaluation starts" +"2019-04-22 06:17:16.434 UTC [cauthdsl] func2 -> DEBU 206b 0xc00236eb30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.432 UTC [gossip.comm] func1 -> DEBU 2066 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.435 UTC [cauthdsl] func2 -> DEBU 206c 0xc00236eb30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.435 UTC [cauthdsl] func2 -> DEBU 206d 0xc00236eb30 principal matched by identity 0" +"2019-04-22 06:17:16.436 UTC [msp.identity] Verify -> DEBU 206e Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:16.436 UTC [msp.identity] Verify -> DEBU 206f Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:16.437 UTC [cauthdsl] func2 -> DEBU 2070 0xc00236eb30 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.437 UTC [cauthdsl] func1 -> DEBU 2071 0xc00236eb30 gate 1555913836434154800 evaluation succeeds" +"2019-04-22 06:17:16.437 UTC [policies] Evaluate -> DEBU 2072 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.438 UTC [policies] Evaluate -> DEBU 2073 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.438 UTC [policies] Evaluate -> DEBU 2074 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.445 UTC [policies] Evaluate -> DEBU 2075 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.446 UTC [msp] DeserializeIdentity -> DEBU 2076 Obtaining identity" +"2019-04-22 06:17:16.447 UTC [msp] DeserializeIdentity -> DEBU 2077 Obtaining identity" +"2019-04-22 06:17:16.448 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2078 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2079 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 207a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.449 UTC [policies] Evaluate -> DEBU 207b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.449 UTC [policies] Evaluate -> DEBU 207c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.449 UTC [policies] Evaluate -> DEBU 207d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.450 UTC [cauthdsl] func1 -> DEBU 207e 0xc00230c360 gate 1555913836450397000 evaluation starts" +"2019-04-22 06:17:16.450 UTC [cauthdsl] func2 -> DEBU 207f 0xc00230c360 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.450 UTC [cauthdsl] func2 -> DEBU 2080 0xc00230c360 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.451 UTC [cauthdsl] func2 -> DEBU 2081 0xc00230c360 principal matched by identity 0" +"2019-04-22 06:17:16.452 UTC [msp.identity] Verify -> DEBU 2082 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:16.452 UTC [msp.identity] Verify -> DEBU 2083 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:16.453 UTC [cauthdsl] func2 -> DEBU 2084 0xc00230c360 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.453 UTC [cauthdsl] func1 -> DEBU 2085 0xc00230c360 gate 1555913836450397000 evaluation succeeds" +"2019-04-22 06:17:16.454 UTC [policies] Evaluate -> DEBU 2086 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.454 UTC [policies] Evaluate -> DEBU 2087 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.454 UTC [policies] Evaluate -> DEBU 2088 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.455 UTC [policies] Evaluate -> DEBU 2089 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.454 UTC [gossip.comm] sendToEndpoint -> DEBU 208a Exiting" +"2019-04-22 06:17:16.458 UTC [gossip.comm] func1 -> DEBU 208b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.459 UTC [msp.identity] Verify -> DEBU 208c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:16.459 UTC [msp.identity] Verify -> DEBU 208d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:16.460 UTC [msp.identity] Verify -> DEBU 208e Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:16.460 UTC [msp.identity] Verify -> DEBU 208f Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:16.460 UTC [gossip.gossip] handleMessage -> DEBU 2090 Exiting" +"2019-04-22 06:17:16.460 UTC [gossip.gossip] handleMessage -> DEBU 2091 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.461 UTC [msp] DeserializeIdentity -> DEBU 2092 Obtaining identity" +"2019-04-22 06:17:16.461 UTC [msp] DeserializeIdentity -> DEBU 2093 Obtaining identity" +"2019-04-22 06:17:16.462 UTC [msp] DeserializeIdentity -> DEBU 2094 Obtaining identity" +"2019-04-22 06:17:16.462 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2095 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.462 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2096 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.462 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2097 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.463 UTC [policies] Evaluate -> DEBU 2098 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.463 UTC [policies] Evaluate -> DEBU 2099 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.463 UTC [policies] Evaluate -> DEBU 209a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.463 UTC [cauthdsl] func1 -> DEBU 209b 0xc0022d9150 gate 1555913836463270500 evaluation starts" +"2019-04-22 06:17:16.463 UTC [cauthdsl] func2 -> DEBU 209c 0xc0022d9150 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.463 UTC [cauthdsl] func2 -> DEBU 209d 0xc0022d9150 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.464 UTC [cauthdsl] func2 -> DEBU 209e 0xc0022d9150 principal matched by identity 0" +"2019-04-22 06:17:16.464 UTC [msp.identity] Verify -> DEBU 209f Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:16.464 UTC [msp.identity] Verify -> DEBU 20a0 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:16.465 UTC [cauthdsl] func2 -> DEBU 20a1 0xc0022d9150 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.465 UTC [cauthdsl] func1 -> DEBU 20a2 0xc0022d9150 gate 1555913836463270500 evaluation succeeds" +"2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.465 UTC [policies] Evaluate -> DEBU 20a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.466 UTC [msp] DeserializeIdentity -> DEBU 20a7 Obtaining identity" +"2019-04-22 06:17:16.466 UTC [msp] DeserializeIdentity -> DEBU 20a8 Obtaining identity" +"2019-04-22 06:17:16.467 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20aa Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20ab Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.467 UTC [policies] Evaluate -> DEBU 20ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.467 UTC [policies] Evaluate -> DEBU 20ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.467 UTC [policies] Evaluate -> DEBU 20ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.469 UTC [cauthdsl] func1 -> DEBU 20af 0xc00229c700 gate 1555913836469075000 evaluation starts" +"2019-04-22 06:17:16.469 UTC [cauthdsl] func2 -> DEBU 20b0 0xc00229c700 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.469 UTC [cauthdsl] func2 -> DEBU 20b1 0xc00229c700 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.469 UTC [cauthdsl] func2 -> DEBU 20b2 0xc00229c700 principal matched by identity 0" +"2019-04-22 06:17:16.470 UTC [msp.identity] Verify -> DEBU 20b3 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:16.470 UTC [msp.identity] Verify -> DEBU 20b4 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:16.471 UTC [cauthdsl] func2 -> DEBU 20b5 0xc00229c700 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.471 UTC [cauthdsl] func1 -> DEBU 20b6 0xc00229c700 gate 1555913836469075000 evaluation succeeds" +"2019-04-22 06:17:16.471 UTC [policies] Evaluate -> DEBU 20b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.471 UTC [policies] Evaluate -> DEBU 20b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.472 UTC [policies] Evaluate -> DEBU 20b9 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.472 UTC [policies] Evaluate -> DEBU 20ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.472 UTC [msp.identity] Verify -> DEBU 20bb Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:16.473 UTC [msp.identity] Verify -> DEBU 20bc Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:16.473 UTC [msp.identity] Verify -> DEBU 20bd Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:16.473 UTC [msp.identity] Verify -> DEBU 20be Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:16.474 UTC [gossip.gossip] handleMessage -> DEBU 20bf Exiting" +"2019-04-22 06:17:16.474 UTC [gossip.gossip] handleMessage -> DEBU 20c0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.475 UTC [msp.identity] Verify -> DEBU 20c1 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:16.475 UTC [msp.identity] Verify -> DEBU 20c2 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:16.476 UTC [msp] DeserializeIdentity -> DEBU 20c3 Obtaining identity" +"2019-04-22 06:17:16.476 UTC [msp] DeserializeIdentity -> DEBU 20c4 Obtaining identity" +"2019-04-22 06:17:16.477 UTC [gossip.election] waitForInterrupt -> DEBU 20c5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:16.477 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.478 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20c8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.478 UTC [policies] Evaluate -> DEBU 20c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.477 UTC [gossip.election] IsLeader -> DEBU 20ca c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:16.479 UTC [msp.identity] Sign -> DEBU 20cb Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510081801 " +"2019-04-22 06:17:16.479 UTC [msp.identity] Sign -> DEBU 20cd Sign: digest: 7F56D2C9B13FE31A48A43DC7F90E65EAB727E65113A1E41C2947968E9C461E07 " +"2019-04-22 06:17:16.478 UTC [policies] Evaluate -> DEBU 20cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.479 UTC [gossip.election] waitForInterrupt -> DEBU 20ce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:16.479 UTC [policies] Evaluate -> DEBU 20cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.481 UTC [cauthdsl] func1 -> DEBU 20d0 0xc002258a60 gate 1555913836481130800 evaluation starts" +"2019-04-22 06:17:16.481 UTC [cauthdsl] func2 -> DEBU 20d2 0xc002258a60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.481 UTC [msp] DeserializeIdentity -> DEBU 20d1 Obtaining identity" +"2019-04-22 06:17:16.481 UTC [cauthdsl] func2 -> DEBU 20d3 0xc002258a60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.482 UTC [msp] DeserializeIdentity -> DEBU 20d5 Obtaining identity" +"2019-04-22 06:17:16.482 UTC [cauthdsl] func2 -> DEBU 20d4 0xc002258a60 principal matched by identity 0" +"2019-04-22 06:17:16.483 UTC [msp.identity] Verify -> DEBU 20d6 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:16.484 UTC [msp.identity] Verify -> DEBU 20d8 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:16.483 UTC [msp] DeserializeIdentity -> DEBU 20d7 Obtaining identity" +"2019-04-22 06:17:16.485 UTC [msp] DeserializeIdentity -> DEBU 20d9 Obtaining identity" +"2019-04-22 06:17:16.485 UTC [cauthdsl] func2 -> DEBU 20da 0xc002258a60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.485 UTC [cauthdsl] func1 -> DEBU 20db 0xc002258a60 gate 1555913836481130800 evaluation succeeds" +"2019-04-22 06:17:16.486 UTC [gossip.comm] Send -> DEBU 20dc Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:16.486 UTC [policies] Evaluate -> DEBU 20dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.487 UTC [msp] DeserializeIdentity -> DEBU 20de Obtaining identity" +"2019-04-22 06:17:16.487 UTC [policies] Evaluate -> DEBU 20df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.488 UTC [policies] Evaluate -> DEBU 20e1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.488 UTC [policies] Evaluate -> DEBU 20e2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.490 UTC [msp.identity] Verify -> DEBU 20e3 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:16.490 UTC [msp.identity] Verify -> DEBU 20e4 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:16.489 UTC [gossip.comm] sendToEndpoint -> DEBU 20e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:8 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.490 UTC [gossip.comm] sendToEndpoint -> DEBU 20e6 Exiting" +"2019-04-22 06:17:16.492 UTC [msp] DeserializeIdentity -> DEBU 20e7 Obtaining identity" +"2019-04-22 06:17:16.493 UTC [msp] DeserializeIdentity -> DEBU 20e8 Obtaining identity" +"2019-04-22 06:17:16.494 UTC [msp] DeserializeIdentity -> DEBU 20e9 Obtaining identity" +"2019-04-22 06:17:16.495 UTC [gossip.pull] Hello -> DEBU 20ea Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:16.499 UTC [msp] DeserializeIdentity -> DEBU 20eb Obtaining identity" +"2019-04-22 06:17:16.500 UTC [msp] DeserializeIdentity -> DEBU 20ec Obtaining identity" +"2019-04-22 06:17:16.501 UTC [gossip.comm] Send -> DEBU 20ed Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:16.501 UTC [gossip.comm] sendToEndpoint -> DEBU 20ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.501 UTC [gossip.comm] sendToEndpoint -> DEBU 20ef Exiting" +"2019-04-22 06:17:16.502 UTC [msp] DeserializeIdentity -> DEBU 20f0 Obtaining identity" +"2019-04-22 06:17:16.488 UTC [msp] DeserializeIdentity -> DEBU 20e0 Obtaining identity" +"2019-04-22 06:17:16.504 UTC [gossip.comm] func1 -> DEBU 20f1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4728153794874347372 , Msg_type: BLOCK_MSG, digests: [4 5 1 2 3], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.505 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.505 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20f3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.506 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 20f4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.506 UTC [policies] Evaluate -> DEBU 20f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.507 UTC [policies] Evaluate -> DEBU 20f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.507 UTC [policies] Evaluate -> DEBU 20f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.508 UTC [cauthdsl] func1 -> DEBU 20f8 0xc00221c950 gate 1555913836508079100 evaluation starts" +"2019-04-22 06:17:16.508 UTC [cauthdsl] func2 -> DEBU 20f9 0xc00221c950 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.508 UTC [cauthdsl] func2 -> DEBU 20fa 0xc00221c950 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.509 UTC [cauthdsl] func2 -> DEBU 20fb 0xc00221c950 principal matched by identity 0" +"2019-04-22 06:17:16.509 UTC [msp.identity] Verify -> DEBU 20fc Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:16.510 UTC [msp.identity] Verify -> DEBU 20fd Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:16.510 UTC [cauthdsl] func2 -> DEBU 20fe 0xc00221c950 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.510 UTC [cauthdsl] func1 -> DEBU 20ff 0xc00221c950 gate 1555913836508079100 evaluation succeeds" +"2019-04-22 06:17:16.510 UTC [policies] Evaluate -> DEBU 2100 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.511 UTC [policies] Evaluate -> DEBU 2101 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.511 UTC [policies] Evaluate -> DEBU 2102 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.511 UTC [policies] Evaluate -> DEBU 2103 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.512 UTC [gossip.gossip] handleMessage -> DEBU 2104 Exiting" +"2019-04-22 06:17:16.512 UTC [gossip.gossip] handleMessage -> DEBU 2105 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4728153794874347372 , Msg_type: BLOCK_MSG, digests: [4 5 1 2 3], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.512 UTC [gossip.pull] HandleMessage -> DEBU 2106 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4728153794874347372 , Msg_type: BLOCK_MSG, digests: [4 5 1 2 3], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.512 UTC [gossip.gossip] handleMessage -> DEBU 2107 Exiting" +"2019-04-22 06:17:16.573 UTC [gossip.comm] func1 -> DEBU 2108 Got message: GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.574 UTC [gossip.gossip] handleMessage -> DEBU 2109 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.574 UTC [gossip.gossip] handleMessage -> DEBU 210a Exiting" +"2019-04-22 06:17:16.574 UTC [gossip.discovery] handleMsgFromComm -> DEBU 210b Got message: GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:13 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.575 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 210c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:16.576 UTC [msp.identity] Verify -> DEBU 210d Verify: digest = 00000000 21 63 17 8e aa 54 4c ff 33 43 17 99 fa 72 05 7c |!c...TL.3C...r.|| +00000010 72 25 64 d7 0e 13 63 63 0a e3 3e 9c bd 1f e9 bb |r%d...cc..>.....|" +"2019-04-22 06:17:16.576 UTC [msp.identity] Verify -> DEBU 210e Verify: sig = 00000000 30 44 02 20 0e cc 91 64 c8 03 21 28 7b 2b 41 eb |0D. ...d..!({+A.| +00000010 50 8d 69 6e c8 8c 0f e9 bf d0 c3 c7 36 2a ff cb |P.in........6*..| +00000020 d7 98 33 d1 02 20 3d e4 0d cf b7 ea 42 14 01 3c |..3.. =.....B..<| +00000030 0e ac 5d f5 76 a0 13 9f 8a 16 8a 4a 38 3c 1f fd |..].v......J8<..| +00000040 37 55 84 c5 4e 5c |7U..N\|" +"2019-04-22 06:17:16.577 UTC [msp.identity] Verify -> DEBU 210f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:16.577 UTC [msp.identity] Verify -> DEBU 2110 Verify: sig = 00000000 30 44 02 20 53 2f 01 41 7a 00 fa 5e 7a aa 15 1f |0D. S/.Az..^z...| +00000010 8f c0 c3 93 24 e9 9a 98 2c 7d 06 08 f8 6e 2c 84 |....$...,}...n,.| +00000020 52 2f 3d d5 02 20 1b 4c f8 a3 f5 da 21 16 67 3e |R/=.. .L....!.g>| +00000030 0b af 2f 27 ce c1 6f 68 d2 37 b8 ec 2f a3 0d f1 |../'..oh.7../...| +00000040 70 ad 49 1e b8 94 |p.I...|" +"2019-04-22 06:17:16.578 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2111 Exiting" +"2019-04-22 06:17:16.579 UTC [gossip.discovery] sendMemResponse -> DEBU 2112 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:16.579 UTC [msp] DeserializeIdentity -> DEBU 2113 Obtaining identity" +"2019-04-22 06:17:16.579 UTC [msp] DeserializeIdentity -> DEBU 2114 Obtaining identity" +"2019-04-22 06:17:16.580 UTC [gossip.comm] Send -> DEBU 2115 Entering, sending GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:16.580 UTC [gossip.discovery] sendMemResponse -> DEBU 2116 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:16.580 UTC [gossip.comm] sendToEndpoint -> DEBU 2117 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 16931274077394816645, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.581 UTC [gossip.comm] sendToEndpoint -> DEBU 2118 Exiting" +"2019-04-22 06:17:16.625 UTC [gossip.comm] func1 -> DEBU 2119 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.625 UTC [gossip.gossip] handleMessage -> DEBU 211a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.627 UTC [gossip.gossip] handleMessage -> DEBU 211b Exiting" +"2019-04-22 06:17:16.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 211c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.628 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 211d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:16.629 UTC [msp] DeserializeIdentity -> DEBU 211e Obtaining identity" +"2019-04-22 06:17:16.630 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 211f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:16.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2120 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.630 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2121 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:16.630 UTC [policies] Evaluate -> DEBU 2122 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:16.630 UTC [policies] Evaluate -> DEBU 2123 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:16.631 UTC [policies] Evaluate -> DEBU 2124 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:16.631 UTC [cauthdsl] func1 -> DEBU 2125 0xc0005d7820 gate 1555913836631289300 evaluation starts" +"2019-04-22 06:17:16.631 UTC [cauthdsl] func2 -> DEBU 2126 0xc0005d7820 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:16.631 UTC [cauthdsl] func2 -> DEBU 2127 0xc0005d7820 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:16.632 UTC [cauthdsl] func2 -> DEBU 2128 0xc0005d7820 principal matched by identity 0" +"2019-04-22 06:17:16.632 UTC [msp.identity] Verify -> DEBU 2129 Verify: digest = 00000000 db a1 42 aa 13 95 05 a8 42 72 ca 71 bd 30 99 f6 |..B.....Br.q.0..| +00000010 26 52 57 a0 e9 fe 1f 02 d3 c0 ce 69 62 68 75 34 |&RW........ibhu4|" +"2019-04-22 06:17:16.632 UTC [msp.identity] Verify -> DEBU 212a Verify: sig = 00000000 30 45 02 21 00 a7 29 45 fd 72 91 b8 b0 93 66 c6 |0E.!..)E.r....f.| +00000010 54 ab 5a aa 31 4d 00 5e 77 ec e8 6b 79 e3 9a 51 |T.Z.1M.^w..ky..Q| +00000020 03 fa b6 54 4e 02 20 73 33 3b d6 b5 7f 8f 3c b3 |...TN. s3;....<.| +00000030 7e 4b f2 df 88 25 a0 51 9b 4a c4 26 80 f8 d3 24 |~K...%.Q.J.&...$| +00000040 d9 18 6a 5b f1 06 20 |..j[.. |" +"2019-04-22 06:17:16.632 UTC [cauthdsl] func2 -> DEBU 212b 0xc0005d7820 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:16.633 UTC [cauthdsl] func1 -> DEBU 212c 0xc0005d7820 gate 1555913836631289300 evaluation succeeds" +"2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 212d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 212e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 212f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:16.633 UTC [policies] Evaluate -> DEBU 2130 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:16.635 UTC [gossip.comm] func1 -> DEBU 2131 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.635 UTC [gossip.gossip] handleMessage -> DEBU 2132 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 2133 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 2134 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:16.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 2135 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 " +"2019-04-22 06:17:16.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 2136 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 " +"2019-04-22 06:17:16.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 2137 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:16.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 2138 Exiting" +"2019-04-22 06:17:16.640 UTC [gossip.discovery] handleAliveMessage -> DEBU 2139 Exiting" +"2019-04-22 06:17:16.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213a Exiting" +"2019-04-22 06:17:16.647 UTC [gossip.gossip] handleMessage -> DEBU 213b Exiting" +"2019-04-22 06:17:16.647 UTC [gossip.gossip] handleMessage -> DEBU 213c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.647 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 213e Exiting" +"2019-04-22 06:17:16.648 UTC [gossip.gossip] handleMessage -> DEBU 213f Exiting" +"2019-04-22 06:17:16.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2140 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.649 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2141 Exiting" +"2019-04-22 06:17:16.650 UTC [msp] DeserializeIdentity -> DEBU 2142 Obtaining identity" +"2019-04-22 06:17:16.650 UTC [msp] DeserializeIdentity -> DEBU 2143 Obtaining identity" +"2019-04-22 06:17:16.651 UTC [msp] DeserializeIdentity -> DEBU 2144 Obtaining identity" +"2019-04-22 06:17:16.651 UTC [msp] DeserializeIdentity -> DEBU 2145 Obtaining identity" +"2019-04-22 06:17:16.651 UTC [msp] DeserializeIdentity -> DEBU 2146 Obtaining identity" +"2019-04-22 06:17:16.652 UTC [msp] DeserializeIdentity -> DEBU 2147 Obtaining identity" +"2019-04-22 06:17:16.652 UTC [msp] DeserializeIdentity -> DEBU 2148 Obtaining identity" +"2019-04-22 06:17:16.653 UTC [gossip.comm] Send -> DEBU 2149 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:16.653 UTC [msp] DeserializeIdentity -> DEBU 214a Obtaining identity" +"2019-04-22 06:17:16.653 UTC [gossip.comm] Send -> DEBU 214b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214d Exiting" +"2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:16.654 UTC [gossip.comm] sendToEndpoint -> DEBU 214f Exiting" +"2019-04-22 06:17:16.691 UTC [gossip.comm] func1 -> DEBU 2150 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.691 UTC [gossip.comm] func1 -> DEBU 2151 Got message: GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.692 UTC [gossip.gossip] handleMessage -> DEBU 2152 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.692 UTC [msp] DeserializeIdentity -> DEBU 2153 Obtaining identity" +"2019-04-22 06:17:16.692 UTC [msp] DeserializeIdentity -> DEBU 2154 Obtaining identity" +"2019-04-22 06:17:16.693 UTC [gossip.gossip] handleMessage -> DEBU 2155 Exiting" +"2019-04-22 06:17:16.693 UTC [gossip.gossip] handleMessage -> DEBU 2156 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.693 UTC [gossip.gossip] handleMessage -> DEBU 2157 Exiting" +"2019-04-22 06:17:16.693 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2158 Got message: GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:19 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 281 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.694 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2159 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:16.694 UTC [msp.identity] Verify -> DEBU 215a Verify: digest = 00000000 42 80 37 bf 1f bd 8a be 11 9b 0a 86 16 65 55 eb |B.7..........eU.| +00000010 1a bf 2d 58 36 7e 0b 12 fb d0 8e f4 32 f7 e9 68 |..-X6~......2..h|" +"2019-04-22 06:17:16.694 UTC [msp.identity] Verify -> DEBU 215b Verify: sig = 00000000 30 45 02 21 00 f9 78 a9 dc 72 62 70 ec e8 9a 49 |0E.!..x..rbp...I| +00000010 b2 17 9c 71 00 52 63 f6 fc 56 15 40 c4 f2 f0 25 |...q.Rc..V.@...%| +00000020 8a c6 76 c2 0f 02 20 1a f7 a0 20 c7 5a c4 a7 f5 |..v... ... .Z...| +00000030 a4 fd f9 05 2d 11 6c 37 05 91 fa 25 bb e0 6b 53 |....-.l7...%..kS| +00000040 b5 09 00 da a2 38 73 |.....8s|" +"2019-04-22 06:17:16.695 UTC [msp.identity] Verify -> DEBU 215c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:16.695 UTC [msp.identity] Verify -> DEBU 215d Verify: sig = 00000000 30 44 02 20 62 ff 38 d3 48 e4 89 8a b7 87 fb ea |0D. b.8.H.......| +00000010 f0 43 86 ef 06 02 99 32 32 89 19 91 93 d8 bc 6f |.C.....22......o| +00000020 ec 6c 84 70 02 20 75 2f 0e 47 41 af 8a 3e be d0 |.l.p. u/.GA..>..| +00000030 b5 3b c2 06 eb 08 bf 37 73 73 23 c8 27 46 32 5b |.;.....7ss#.'F2[| +00000040 ca 40 c2 51 2c 6e |.@.Q,n|" +"2019-04-22 06:17:16.696 UTC [gossip.discovery] handleMsgFromComm -> DEBU 215e Exiting" +"2019-04-22 06:17:16.696 UTC [gossip.discovery] sendMemResponse -> DEBU 215f Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:16.696 UTC [msp] DeserializeIdentity -> DEBU 2160 Obtaining identity" +"2019-04-22 06:17:16.696 UTC [msp] DeserializeIdentity -> DEBU 2161 Obtaining identity" +"2019-04-22 06:17:16.697 UTC [gossip.comm] Send -> DEBU 2162 Entering, sending GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:16.697 UTC [gossip.discovery] sendMemResponse -> DEBU 2163 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:16.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2164 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1372759857063008550, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.698 UTC [gossip.comm] sendToEndpoint -> DEBU 2165 Exiting" +"2019-04-22 06:17:16.704 UTC [gossip.comm] func1 -> DEBU 2166 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.704 UTC [gossip.gossip] handleMessage -> DEBU 2167 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.705 UTC [gossip.pull] HandleMessage -> DEBU 2168 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.705 UTC [gossip.pull] SendDigest -> DEBU 2169 Sending BLOCK_MSG digest: [3 4 5 1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:16.706 UTC [gossip.gossip] handleMessage -> DEBU 216a Exiting" +"2019-04-22 06:17:16.906 UTC [gossip.gossip] handleMessage -> DEBU 216b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:16.908 UTC [msp] DeserializeIdentity -> DEBU 216c Obtaining identity" +"2019-04-22 06:17:16.909 UTC [msp] DeserializeIdentity -> DEBU 216d Obtaining identity" +"2019-04-22 06:17:16.910 UTC [msp] DeserializeIdentity -> DEBU 216e Obtaining identity" +"2019-04-22 06:17:16.910 UTC [gossip.gossip] handleMessage -> DEBU 216f Exiting" +"2019-04-22 06:17:17.035 UTC [gossip.gossip] handleMessage -> DEBU 2170 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.035 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2171 Got message: GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:11 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.036 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2172 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:17.037 UTC [msp] DeserializeIdentity -> DEBU 2173 Obtaining identity" +"2019-04-22 06:17:17.037 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2174 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:17.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2175 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:17.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2176 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:17.038 UTC [policies] Evaluate -> DEBU 2177 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:17.039 UTC [policies] Evaluate -> DEBU 2178 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:17.039 UTC [policies] Evaluate -> DEBU 2179 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:17.039 UTC [cauthdsl] func1 -> DEBU 217a 0xc00055f790 gate 1555913837039782300 evaluation starts" +"2019-04-22 06:17:17.040 UTC [cauthdsl] func2 -> DEBU 217b 0xc00055f790 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:17.040 UTC [cauthdsl] func2 -> DEBU 217c 0xc00055f790 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:17.040 UTC [cauthdsl] func2 -> DEBU 217d 0xc00055f790 principal matched by identity 0" +"2019-04-22 06:17:17.041 UTC [msp.identity] Verify -> DEBU 217f Verify: digest = 00000000 94 bf 18 7b 77 13 62 84 35 98 43 55 bc 07 3f b7 |...{w.b.5.CU..?.| +00000010 01 86 1b 8b 87 5b 72 87 3c b2 ba b7 ff 08 03 13 |.....[r.<.......|" +"2019-04-22 06:17:17.035 UTC [gossip.gossip] handleMessage -> DEBU 217e Exiting" +"2019-04-22 06:17:17.042 UTC [msp.identity] Verify -> DEBU 2180 Verify: sig = 00000000 30 44 02 20 3e 7d 2f 4e 11 e4 a7 f4 4c 50 ef 84 |0D. >}/N....LP..| +00000010 33 1d 79 1f f7 9a d2 33 f1 9a a8 9b c4 d3 09 90 |3.y....3........| +00000020 4a 5c 3d 82 02 20 51 fe aa 35 e0 a3 84 66 e2 bd |J\=.. Q..5...f..| +00000030 03 5b d5 c8 fc a2 c3 bb 47 fc 15 36 6c 08 57 a8 |.[......G..6l.W.| +00000040 36 89 4a fb de ef |6.J...|" +"2019-04-22 06:17:17.043 UTC [cauthdsl] func2 -> DEBU 2181 0xc00055f790 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:17.043 UTC [cauthdsl] func1 -> DEBU 2182 0xc00055f790 gate 1555913837039782300 evaluation succeeds" +"2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2183 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2184 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2185 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:17.043 UTC [policies] Evaluate -> DEBU 2186 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:17.044 UTC [gossip.discovery] sendMemResponse -> DEBU 2187 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:17.044 UTC [msp] DeserializeIdentity -> DEBU 2188 Obtaining identity" +"2019-04-22 06:17:17.045 UTC [msp] DeserializeIdentity -> DEBU 2189 Obtaining identity" +"2019-04-22 06:17:17.045 UTC [msp] DeserializeIdentity -> DEBU 218a Obtaining identity" +"2019-04-22 06:17:17.046 UTC [gossip.comm] Send -> DEBU 218b Entering, sending GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:17.046 UTC [gossip.discovery] sendMemResponse -> DEBU 218c Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:17.047 UTC [gossip.comm] sendToEndpoint -> DEBU 218d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 652238585103898947, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.047 UTC [gossip.comm] sendToEndpoint -> DEBU 218e Exiting" +"2019-04-22 06:17:17.055 UTC [gossip.gossip] handleMessage -> DEBU 218f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2190 Exiting" +"2019-04-22 06:17:17.055 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2191 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.055 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2192 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:17.056 UTC [msp] DeserializeIdentity -> DEBU 2193 Obtaining identity" +"2019-04-22 06:17:17.057 UTC [gossip.gossip] handleMessage -> DEBU 2194 Exiting" +"2019-04-22 06:17:17.060 UTC [gossip.comm] func1 -> DEBU 2195 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.060 UTC [gossip.gossip] handleMessage -> DEBU 2196 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.065 UTC [gossip.comm] func1 -> DEBU 2197 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2198 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:17.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2199 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:17.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 219a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:17.066 UTC [policies] Evaluate -> DEBU 219b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:17.067 UTC [policies] Evaluate -> DEBU 219c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:17.067 UTC [policies] Evaluate -> DEBU 219d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:17.067 UTC [cauthdsl] func1 -> DEBU 219e 0xc000328d70 gate 1555913837067477900 evaluation starts" +"2019-04-22 06:17:17.067 UTC [cauthdsl] func2 -> DEBU 219f 0xc000328d70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:17.067 UTC [cauthdsl] func2 -> DEBU 21a0 0xc000328d70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:17.067 UTC [cauthdsl] func2 -> DEBU 21a1 0xc000328d70 principal matched by identity 0" +"2019-04-22 06:17:17.067 UTC [msp.identity] Verify -> DEBU 21a2 Verify: digest = 00000000 19 16 f4 d8 df 53 38 28 02 1d fe f4 e9 fc 2b 36 |.....S8(......+6| +00000010 28 40 8a 22 d9 c9 cf 65 39 6a ba 36 fe b8 f4 79 |(@."...e9j.6...y|" +"2019-04-22 06:17:17.068 UTC [msp.identity] Verify -> DEBU 21a3 Verify: sig = 00000000 30 44 02 20 52 80 b7 7f 5a 26 bd 2c 12 df 32 f6 |0D. R...Z&.,..2.| +00000010 89 06 23 f1 9a 25 57 96 6b 33 6b 9a f4 f0 1d 22 |..#..%W.k3k...."| +00000020 c1 72 f3 66 02 20 39 94 8f bd 85 17 05 e4 38 a9 |.r.f. 9.......8.| +00000030 7c 8e f9 10 19 97 a3 a1 7e c2 50 4d a8 7f 24 14 ||.......~.PM..$.| +00000040 0e 86 8c a7 06 d1 |......|" +"2019-04-22 06:17:17.068 UTC [cauthdsl] func2 -> DEBU 21a4 0xc000328d70 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:17.068 UTC [cauthdsl] func1 -> DEBU 21a5 0xc000328d70 gate 1555913837067477900 evaluation succeeds" +"2019-04-22 06:17:17.068 UTC [policies] Evaluate -> DEBU 21a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:17.068 UTC [policies] Evaluate -> DEBU 21a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:17.069 UTC [policies] Evaluate -> DEBU 21a8 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:17.069 UTC [policies] Evaluate -> DEBU 21a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:17.073 UTC [gossip.discovery] handleAliveMessage -> DEBU 21aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ac updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 " +"2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ad Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 " +"2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:30 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:17.074 UTC [gossip.discovery] learnExistingMembers -> DEBU 21af Exiting" +"2019-04-22 06:17:17.074 UTC [gossip.discovery] handleAliveMessage -> DEBU 21b0 Exiting" +"2019-04-22 06:17:17.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b1 Exiting" +"2019-04-22 06:17:17.075 UTC [gossip.gossip] handleMessage -> DEBU 21b2 Exiting" +"2019-04-22 06:17:17.075 UTC [gossip.gossip] handleMessage -> DEBU 21b3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.075 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b5 Exiting" +"2019-04-22 06:17:17.076 UTC [gossip.gossip] handleMessage -> DEBU 21b6 Exiting" +"2019-04-22 06:17:17.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.076 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21b8 Exiting" +"2019-04-22 06:17:17.076 UTC [msp] DeserializeIdentity -> DEBU 21b9 Obtaining identity" +"2019-04-22 06:17:17.076 UTC [msp] DeserializeIdentity -> DEBU 21ba Obtaining identity" +"2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bb Obtaining identity" +"2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bc Obtaining identity" +"2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bd Obtaining identity" +"2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21be Obtaining identity" +"2019-04-22 06:17:17.077 UTC [msp] DeserializeIdentity -> DEBU 21bf Obtaining identity" +"2019-04-22 06:17:17.078 UTC [gossip.comm] Send -> DEBU 21c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c3 Exiting" +"2019-04-22 06:17:17.078 UTC [msp] DeserializeIdentity -> DEBU 21c1 Obtaining identity" +"2019-04-22 06:17:17.078 UTC [gossip.comm] Send -> DEBU 21c4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:17.078 UTC [gossip.comm] sendToEndpoint -> DEBU 21c6 Exiting" +"2019-04-22 06:17:17.120 UTC [gossip.comm] func1 -> DEBU 21c7 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.120 UTC [gossip.gossip] handleMessage -> DEBU 21c8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.122 UTC [msp] DeserializeIdentity -> DEBU 21c9 Obtaining identity" +"2019-04-22 06:17:17.122 UTC [msp] DeserializeIdentity -> DEBU 21ca Obtaining identity" +"2019-04-22 06:17:17.123 UTC [msp] DeserializeIdentity -> DEBU 21cb Obtaining identity" +"2019-04-22 06:17:17.123 UTC [gossip.gossip] handleMessage -> DEBU 21cc Exiting" +"2019-04-22 06:17:17.380 UTC [gossip.comm] func1 -> DEBU 21cd Got message: GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.381 UTC [gossip.gossip] handleMessage -> DEBU 21ce Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.381 UTC [gossip.gossip] handleMessage -> DEBU 21cf Exiting" +"2019-04-22 06:17:17.381 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21d0 Got message: GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:19 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 176 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.381 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21d1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:17.382 UTC [msp] DeserializeIdentity -> DEBU 21d2 Obtaining identity" +"2019-04-22 06:17:17.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:17.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:17.383 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21d5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:17.383 UTC [policies] Evaluate -> DEBU 21d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:17.383 UTC [policies] Evaluate -> DEBU 21d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:17.383 UTC [policies] Evaluate -> DEBU 21d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:17.384 UTC [cauthdsl] func1 -> DEBU 21d9 0xc0003167c0 gate 1555913837384104500 evaluation starts" +"2019-04-22 06:17:17.384 UTC [cauthdsl] func2 -> DEBU 21da 0xc0003167c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:17.384 UTC [cauthdsl] func2 -> DEBU 21db 0xc0003167c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:17.384 UTC [cauthdsl] func2 -> DEBU 21dc 0xc0003167c0 principal matched by identity 0" +"2019-04-22 06:17:17.384 UTC [msp.identity] Verify -> DEBU 21dd Verify: digest = 00000000 78 6d 64 75 17 3f 16 01 e5 74 7f d6 60 e5 61 f7 |xmdu.?...t..`.a.| +00000010 c0 2a 89 d9 4f 5e 8a 6c be fe 76 76 3d c8 59 6a |.*..O^.l..vv=.Yj|" +"2019-04-22 06:17:17.385 UTC [msp.identity] Verify -> DEBU 21de Verify: sig = 00000000 30 44 02 20 37 b4 9f bd 73 e3 bb 7a e8 5d 0a 11 |0D. 7...s..z.]..| +00000010 df 75 2d cb 3d 71 ea ee 56 45 12 98 ce af 6c 4d |.u-.=q..VE....lM| +00000020 a5 4d 84 68 02 20 0c 2a 3d ef 7b be 16 b6 46 fa |.M.h. .*=.{...F.| +00000030 c9 c0 d4 44 69 ef 19 b9 39 23 6a 95 b5 1e 30 6b |...Di...9#j...0k| +00000040 09 62 12 6f 6e 15 |.b.on.|" +"2019-04-22 06:17:17.385 UTC [cauthdsl] func2 -> DEBU 21df 0xc0003167c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:17.385 UTC [cauthdsl] func1 -> DEBU 21e0 0xc0003167c0 gate 1555913837384104500 evaluation succeeds" +"2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e3 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:17.386 UTC [policies] Evaluate -> DEBU 21e4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:17.387 UTC [gossip.discovery] sendMemResponse -> DEBU 21e5 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:17.387 UTC [msp] DeserializeIdentity -> DEBU 21e6 Obtaining identity" +"2019-04-22 06:17:17.387 UTC [msp] DeserializeIdentity -> DEBU 21e7 Obtaining identity" +"2019-04-22 06:17:17.388 UTC [msp] DeserializeIdentity -> DEBU 21e8 Obtaining identity" +"2019-04-22 06:17:17.388 UTC [gossip.comm] Send -> DEBU 21e9 Entering, sending GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:17.388 UTC [gossip.discovery] sendMemResponse -> DEBU 21ea Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:17.388 UTC [gossip.comm] sendToEndpoint -> DEBU 21eb Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 12137831609955278608, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-04-22 06:17:17.389 UTC [gossip.comm] sendToEndpoint -> DEBU 21ec Exiting" +"2019-04-22 06:17:17.387 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ed Exiting" +"2019-04-22 06:17:18.901 UTC [gossip.pull] Hello -> DEBU 21ee Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:18.901 UTC [gossip.comm] Send -> DEBU 21ef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:18.901 UTC [gossip.pull] Hello -> DEBU 21f0 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:18.902 UTC [gossip.comm] Send -> DEBU 21f1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:18.902 UTC [gossip.pull] Hello -> DEBU 21f2 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:18.902 UTC [gossip.comm] Send -> DEBU 21f3 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:18.902 UTC [gossip.comm] sendToEndpoint -> DEBU 21f4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.902 UTC [gossip.comm] sendToEndpoint -> DEBU 21f5 Exiting" +"2019-04-22 06:17:18.902 UTC [gossip.comm] sendToEndpoint -> DEBU 21f6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.903 UTC [gossip.comm] sendToEndpoint -> DEBU 21f7 Exiting" +"2019-04-22 06:17:18.903 UTC [gossip.comm] sendToEndpoint -> DEBU 21f8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.903 UTC [gossip.comm] sendToEndpoint -> DEBU 21f9 Exiting" +"2019-04-22 06:17:18.904 UTC [gossip.comm] func1 -> DEBU 21fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2263129698614670238 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.905 UTC [gossip.gossip] handleMessage -> DEBU 21fb Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2263129698614670238 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.905 UTC [gossip.pull] HandleMessage -> DEBU 21fc GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2263129698614670238 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.906 UTC [gossip.gossip] handleMessage -> DEBU 21fd Exiting" +"2019-04-22 06:17:18.906 UTC [gossip.comm] func1 -> DEBU 21fe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17161054818514722358 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.906 UTC [gossip.gossip] handleMessage -> DEBU 21ff Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17161054818514722358 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.906 UTC [gossip.pull] HandleMessage -> DEBU 2200 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 17161054818514722358 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.906 UTC [gossip.gossip] handleMessage -> DEBU 2201 Exiting" +"2019-04-22 06:17:18.907 UTC [gossip.gossip] handleMessage -> DEBU 2202 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4227670384076092799 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.907 UTC [gossip.pull] HandleMessage -> DEBU 2203 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4227670384076092799 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.907 UTC [gossip.gossip] handleMessage -> DEBU 2204 Exiting" +"2019-04-22 06:17:18.937 UTC [msp.identity] Sign -> DEBU 2205 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15101F " +"2019-04-22 06:17:18.937 UTC [msp.identity] Sign -> DEBU 2206 Sign: digest: F6F22D75C521E239563CFFB096BDA966BF3F94F5C12B4B535AEDD506CAA51686 " +"2019-04-22 06:17:18.938 UTC [msp.identity] Sign -> DEBU 2207 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:18.938 UTC [msp.identity] Sign -> DEBU 2208 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:18.938 UTC [msp] DeserializeIdentity -> DEBU 2209 Obtaining identity" +"2019-04-22 06:17:18.938 UTC [gossip.comm] Send -> DEBU 220a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:18.938 UTC [msp] DeserializeIdentity -> DEBU 220b Obtaining identity" +"2019-04-22 06:17:18.939 UTC [gossip.comm] Send -> DEBU 220c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:18.939 UTC [gossip.comm] Send -> DEBU 220d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:18.939 UTC [gossip.comm] sendToEndpoint -> DEBU 220e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.939 UTC [gossip.comm] sendToEndpoint -> DEBU 220f Exiting" +"2019-04-22 06:17:18.939 UTC [gossip.comm] sendToEndpoint -> DEBU 2210 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.940 UTC [gossip.comm] sendToEndpoint -> DEBU 2211 Exiting" +"2019-04-22 06:17:18.940 UTC [gossip.comm] sendToEndpoint -> DEBU 2212 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.940 UTC [gossip.comm] sendToEndpoint -> DEBU 2213 Exiting" +"2019-04-22 06:17:18.943 UTC [gossip.comm] func1 -> DEBU 2214 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.944 UTC [gossip.gossip] handleMessage -> DEBU 2215 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.944 UTC [gossip.gossip] handleMessage -> DEBU 2216 Exiting" +"2019-04-22 06:17:18.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2217 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.944 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2218 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:18.945 UTC [gossip.gossip] handleMessage -> DEBU 2219 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.945 UTC [msp.identity] Verify -> DEBU 221a Verify: digest = 00000000 f6 f2 2d 75 c5 21 e2 39 56 3c ff b0 96 bd a9 66 |..-u.!.9V<.....f| +00000010 bf 3f 94 f5 c1 2b 4b 53 5a ed d5 06 ca a5 16 86 |.?...+KSZ.......|" +"2019-04-22 06:17:18.945 UTC [msp.identity] Verify -> DEBU 221b Verify: sig = 00000000 30 44 02 20 58 de de 65 e8 ce 87 83 6c 4b e5 07 |0D. X..e....lK..| +00000010 e3 56 fe 23 b0 fb 15 f8 4e 3f e3 8e 2a 5f e8 03 |.V.#....N?..*_..| +00000020 4f f1 b0 a1 02 20 10 52 70 81 51 70 81 2d e3 5f |O.... .Rp.Qp.-._| +00000030 52 2e 1a 5f a4 4e f2 0f d9 4b 88 86 29 2d ff cd |R.._.N...K..)-..| +00000040 59 75 30 1b 95 1e |Yu0...|" +"2019-04-22 06:17:18.946 UTC [gossip.comm] func1 -> DEBU 221c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 221d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:18.946 UTC [gossip.discovery] isSentByMe -> DEBU 221e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:18.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 221f Exiting" +"2019-04-22 06:17:18.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2220 Exiting" +"2019-04-22 06:17:18.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2221 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2223 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:18.948 UTC [msp.identity] Verify -> DEBU 2224 Verify: digest = 00000000 f6 f2 2d 75 c5 21 e2 39 56 3c ff b0 96 bd a9 66 |..-u.!.9V<.....f| +00000010 bf 3f 94 f5 c1 2b 4b 53 5a ed d5 06 ca a5 16 86 |.?...+KSZ.......|" +"2019-04-22 06:17:18.947 UTC [gossip.gossip] handleMessage -> DEBU 2222 Exiting" +"2019-04-22 06:17:18.949 UTC [msp.identity] Verify -> DEBU 2225 Verify: sig = 00000000 30 44 02 20 58 de de 65 e8 ce 87 83 6c 4b e5 07 |0D. X..e....lK..| +00000010 e3 56 fe 23 b0 fb 15 f8 4e 3f e3 8e 2a 5f e8 03 |.V.#....N?..*_..| +00000020 4f f1 b0 a1 02 20 10 52 70 81 51 70 81 2d e3 5f |O.... .Rp.Qp.-._| +00000030 52 2e 1a 5f a4 4e f2 0f d9 4b 88 86 29 2d ff cd |R.._.N...K..)-..| +00000040 59 75 30 1b 95 1e |Yu0...|" +"2019-04-22 06:17:18.949 UTC [gossip.gossip] handleMessage -> DEBU 2226 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 2227 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:18.950 UTC [gossip.discovery] isSentByMe -> DEBU 2228 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:18.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 2229 Exiting" +"2019-04-22 06:17:18.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 222a Exiting" +"2019-04-22 06:17:18.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 222b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:18.951 UTC [gossip.gossip] handleMessage -> DEBU 222c Exiting" +"2019-04-22 06:17:18.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 222d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 222e Verify: digest = 00000000 f6 f2 2d 75 c5 21 e2 39 56 3c ff b0 96 bd a9 66 |..-u.!.9V<.....f| +00000010 bf 3f 94 f5 c1 2b 4b 53 5a ed d5 06 ca a5 16 86 |.?...+KSZ.......|" +"2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 222f Verify: sig = 00000000 30 44 02 20 58 de de 65 e8 ce 87 83 6c 4b e5 07 |0D. X..e....lK..| +00000010 e3 56 fe 23 b0 fb 15 f8 4e 3f e3 8e 2a 5f e8 03 |.V.#....N?..*_..| +00000020 4f f1 b0 a1 02 20 10 52 70 81 51 70 81 2d e3 5f |O.... .Rp.Qp.-._| +00000030 52 2e 1a 5f a4 4e f2 0f d9 4b 88 86 29 2d ff cd |R.._.N...K..)-..| +00000040 59 75 30 1b 95 1e |Yu0...|" +"2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 2230 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:18.952 UTC [msp.identity] Verify -> DEBU 2231 Verify: sig = 00000000 30 45 02 21 00 a4 ca b6 72 7a 12 e0 64 ae 83 43 |0E.!....rz..d..C| +00000010 1b 7e f7 c4 2a e9 50 3e ce 0d ca de 84 ad 28 73 |.~..*.P>......(s| +00000020 34 1d 8c 90 29 02 20 36 93 bb 9d 16 33 e9 a4 49 |4...). 6....3..I| +00000030 af b8 2f d0 47 8a 01 ca 44 e0 e0 14 f7 de a7 29 |../.G...D......)| +00000040 bc bb c0 8f 1e 1b ae |.......|" +"2019-04-22 06:17:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2232 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:18.953 UTC [gossip.discovery] isSentByMe -> DEBU 2233 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2234 Exiting" +"2019-04-22 06:17:18.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2235 Exiting" +"2019-04-22 06:17:19.162 UTC [gossip.comm] func1 -> DEBU 2236 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.163 UTC [gossip.gossip] handleMessage -> DEBU 2237 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.164 UTC [gossip.pull] HandleMessage -> DEBU 2238 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.164 UTC [gossip.pull] SendDigest -> DEBU 2239 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:19.165 UTC [gossip.gossip] handleMessage -> DEBU 223a Exiting" +"2019-04-22 06:17:19.189 UTC [gossip.comm] func1 -> DEBU 223b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.189 UTC [gossip.gossip] handleMessage -> DEBU 223c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.190 UTC [gossip.gossip] handleMessage -> DEBU 223d Exiting" +"2019-04-22 06:17:19.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 223e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.191 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 223f Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:19.192 UTC [msp.identity] Verify -> DEBU 2240 Verify: digest = 00000000 d4 05 37 cf fe cf 27 88 34 f8 ab 08 66 d5 df b8 |..7...'.4...f...| +00000010 68 01 af d4 c1 b4 2f 89 9a df 0d 91 99 02 ea ff |h...../.........|" +"2019-04-22 06:17:19.192 UTC [msp.identity] Verify -> DEBU 2241 Verify: sig = 00000000 30 44 02 20 26 f0 30 7a a6 ef c2 bf 57 4d a0 59 |0D. &.0z....WM.Y| +00000010 16 ef 9e d8 85 e4 d5 93 4d 39 6b ac f0 f0 f9 6b |........M9k....k| +00000020 cf db 81 f9 02 20 7a de 24 6d 11 2d 16 ce 0b ac |..... z.$m.-....| +00000030 39 59 e4 db a2 1c 41 86 1e d0 17 33 94 a8 3e cf |9Y....A....3..>.| +00000040 9c 80 87 55 c8 91 |...U..|" +"2019-04-22 06:17:19.193 UTC [msp.identity] Verify -> DEBU 2242 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:19.194 UTC [msp.identity] Verify -> DEBU 2243 Verify: sig = 00000000 30 44 02 20 1c e2 e1 e6 4a db f9 ac 70 32 59 c2 |0D. ....J...p2Y.| +00000010 49 64 57 f0 d5 04 3c 91 01 84 bb c5 a0 aa 7f 2d |IdW...<........-| +00000020 63 ca 5a a0 02 20 6e 34 16 a7 b5 df 8e 36 e6 9c |c.Z.. n4.....6..| +00000030 6f b4 6e 56 c4 fb 35 f8 0a de 0b c0 dd 9b 29 1f |o.nV..5.......).| +00000040 79 e4 52 81 17 19 |y.R...|" +"2019-04-22 06:17:19.195 UTC [gossip.discovery] handleAliveMessage -> DEBU 2244 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:19.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2245 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:19.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 2246 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 " +"2019-04-22 06:17:19.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 2247 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 " +"2019-04-22 06:17:19.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 2248 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:34 , Envelope: 83 bytes, Signature: 69 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:19.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 2249 Exiting" +"2019-04-22 06:17:19.198 UTC [gossip.discovery] handleAliveMessage -> DEBU 224a Exiting" +"2019-04-22 06:17:19.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 224b Exiting" +"2019-04-22 06:17:19.198 UTC [gossip.discovery] sendMemResponse -> DEBU 224c Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:19.199 UTC [msp] DeserializeIdentity -> DEBU 224d Obtaining identity" +"2019-04-22 06:17:19.199 UTC [msp] DeserializeIdentity -> DEBU 224e Obtaining identity" +"2019-04-22 06:17:19.199 UTC [gossip.comm] Send -> DEBU 224f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:19.199 UTC [gossip.discovery] sendMemResponse -> DEBU 2250 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:19.199 UTC [gossip.comm] sendToEndpoint -> DEBU 2251 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.200 UTC [gossip.comm] sendToEndpoint -> DEBU 2252 Exiting" +"2019-04-22 06:17:19.621 UTC [gossip.comm] func1 -> DEBU 2253 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.622 UTC [gossip.gossip] handleMessage -> DEBU 2254 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.623 UTC [gossip.pull] HandleMessage -> DEBU 2255 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.624 UTC [msp] DeserializeIdentity -> DEBU 2256 Obtaining identity" +"2019-04-22 06:17:19.625 UTC [msp] DeserializeIdentity -> DEBU 2257 Obtaining identity" +"2019-04-22 06:17:19.625 UTC [msp] DeserializeIdentity -> DEBU 2258 Obtaining identity" +"2019-04-22 06:17:19.625 UTC [msp] DeserializeIdentity -> DEBU 2259 Obtaining identity" +"2019-04-22 06:17:19.626 UTC [msp] DeserializeIdentity -> DEBU 225a Obtaining identity" +"2019-04-22 06:17:19.626 UTC [msp] DeserializeIdentity -> DEBU 225b Obtaining identity" +"2019-04-22 06:17:19.626 UTC [gossip.pull] SendDigest -> DEBU 225c Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:19.627 UTC [gossip.gossip] handleMessage -> DEBU 225d Exiting" +"2019-04-22 06:17:19.633 UTC [gossip.comm] func1 -> DEBU 225e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.633 UTC [gossip.gossip] handleMessage -> DEBU 225f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.635 UTC [gossip.gossip] handleMessage -> DEBU 2260 Exiting" +"2019-04-22 06:17:19.636 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2261 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.636 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2262 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:19.636 UTC [msp] DeserializeIdentity -> DEBU 2263 Obtaining identity" +"2019-04-22 06:17:19.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2264 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:19.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2265 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:19.637 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2266 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:19.637 UTC [policies] Evaluate -> DEBU 2267 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:19.637 UTC [policies] Evaluate -> DEBU 2268 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:19.638 UTC [policies] Evaluate -> DEBU 2269 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:19.638 UTC [cauthdsl] func1 -> DEBU 226a 0xc000358bd0 gate 1555913839638342200 evaluation starts" +"2019-04-22 06:17:19.638 UTC [cauthdsl] func2 -> DEBU 226b 0xc000358bd0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:19.638 UTC [cauthdsl] func2 -> DEBU 226c 0xc000358bd0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:19.638 UTC [cauthdsl] func2 -> DEBU 226d 0xc000358bd0 principal matched by identity 0" +"2019-04-22 06:17:19.641 UTC [msp.identity] Verify -> DEBU 226e Verify: digest = 00000000 21 00 e3 f9 6e 48 25 d2 af ed 3b 20 38 b5 d2 2e |!...nH%...; 8...| +00000010 04 92 3f 7c aa b1 3a f2 71 24 d5 63 b7 71 37 e0 |..?|..:.q$.c.q7.|" +"2019-04-22 06:17:19.644 UTC [msp.identity] Verify -> DEBU 226f Verify: sig = 00000000 30 45 02 21 00 9e fc 5b 5b 1f 8f d3 09 41 e8 33 |0E.!...[[....A.3| +00000010 44 e8 be 19 7c be 3a 3c ac 4c d2 e0 0b 2f 5d 4b |D...|.:<.L.../]K| +00000020 46 6b 97 71 6b 02 20 58 51 37 ca 42 14 66 eb 86 |Fk.qk. XQ7.B.f..| +00000030 4e 2e 32 ac dc 52 dd f1 1b 9d 33 13 e7 50 a5 a6 |N.2..R....3..P..| +00000040 f7 31 58 d8 c6 a9 c6 |.1X....|" +"2019-04-22 06:17:19.645 UTC [cauthdsl] func2 -> DEBU 2270 0xc000358bd0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:19.645 UTC [cauthdsl] func1 -> DEBU 2271 0xc000358bd0 gate 1555913839638342200 evaluation succeeds" +"2019-04-22 06:17:19.645 UTC [policies] Evaluate -> DEBU 2272 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:19.646 UTC [policies] Evaluate -> DEBU 2273 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:19.646 UTC [policies] Evaluate -> DEBU 2274 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:19.647 UTC [policies] Evaluate -> DEBU 2275 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:19.647 UTC [gossip.discovery] handleAliveMessage -> DEBU 2276 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:19.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 2277 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:19.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 2278 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 " +"2019-04-22 06:17:19.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 2279 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 " +"2019-04-22 06:17:19.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 227a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:19.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 227b Exiting" +"2019-04-22 06:17:19.650 UTC [gossip.discovery] handleAliveMessage -> DEBU 227c Exiting" +"2019-04-22 06:17:19.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227d Exiting" +"2019-04-22 06:17:19.650 UTC [gossip.discovery] sendMemResponse -> DEBU 227e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:19.650 UTC [msp] DeserializeIdentity -> DEBU 227f Obtaining identity" +"2019-04-22 06:17:19.651 UTC [msp] DeserializeIdentity -> DEBU 2280 Obtaining identity" +"2019-04-22 06:17:19.651 UTC [msp] DeserializeIdentity -> DEBU 2281 Obtaining identity" +"2019-04-22 06:17:19.651 UTC [gossip.comm] Send -> DEBU 2282 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:19.651 UTC [gossip.discovery] sendMemResponse -> DEBU 2283 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:19.652 UTC [gossip.comm] sendToEndpoint -> DEBU 2284 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:19.652 UTC [gossip.comm] sendToEndpoint -> DEBU 2285 Exiting" +"2019-04-22 06:17:20.040 UTC [gossip.gossip] handleMessage -> DEBU 2286 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.040 UTC [gossip.pull] HandleMessage -> DEBU 2287 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.042 UTC [msp] DeserializeIdentity -> DEBU 2288 Obtaining identity" +"2019-04-22 06:17:20.042 UTC [msp] DeserializeIdentity -> DEBU 2289 Obtaining identity" +"2019-04-22 06:17:20.043 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +"2019-04-22 06:17:20.043 UTC [msp] DeserializeIdentity -> DEBU 228b Obtaining identity" +"2019-04-22 06:17:20.043 UTC [msp] DeserializeIdentity -> DEBU 228c Obtaining identity" +"2019-04-22 06:17:20.044 UTC [msp] DeserializeIdentity -> DEBU 228d Obtaining identity" +"2019-04-22 06:17:20.044 UTC [gossip.pull] SendDigest -> DEBU 228e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:20.044 UTC [gossip.gossip] handleMessage -> DEBU 228f Exiting" +"2019-04-22 06:17:20.059 UTC [gossip.gossip] handleMessage -> DEBU 2290 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.060 UTC [gossip.gossip] handleMessage -> DEBU 2291 Exiting" +"2019-04-22 06:17:20.060 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2292 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes , Envelope: 164 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.060 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2293 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:20.061 UTC [msp] DeserializeIdentity -> DEBU 2294 Obtaining identity" +"2019-04-22 06:17:20.065 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2295 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:20.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2296 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.065 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2297 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.066 UTC [policies] Evaluate -> DEBU 2298 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:20.066 UTC [policies] Evaluate -> DEBU 2299 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:20.066 UTC [policies] Evaluate -> DEBU 229a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:20.066 UTC [cauthdsl] func1 -> DEBU 229b 0xc000442ba0 gate 1555913840066882700 evaluation starts" +"2019-04-22 06:17:20.066 UTC [cauthdsl] func2 -> DEBU 229c 0xc000442ba0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:20.067 UTC [cauthdsl] func2 -> DEBU 229d 0xc000442ba0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:20.067 UTC [cauthdsl] func2 -> DEBU 229e 0xc000442ba0 principal matched by identity 0" +"2019-04-22 06:17:20.067 UTC [msp.identity] Verify -> DEBU 229f Verify: digest = 00000000 eb 5b 13 63 30 24 3e f1 c9 fa cf eb 65 6c be a7 |.[.c0$>.....el..| +00000010 03 4b 78 58 4d 7b e6 4f da b3 5d 8d 33 6d 8e 76 |.KxXM{.O..].3m.v|" +"2019-04-22 06:17:20.068 UTC [msp.identity] Verify -> DEBU 22a0 Verify: sig = 00000000 30 43 02 1f 37 a8 d5 b6 e0 1b 79 84 38 73 94 fb |0C..7.....y.8s..| +00000010 12 3b d6 30 41 05 5d e6 af d9 a3 49 22 96 c3 41 |.;.0A.]....I"..A| +00000020 17 09 48 02 20 44 d4 a0 e9 5b 75 51 31 0c b9 b9 |..H. D...[uQ1...| +00000030 27 54 79 b7 fb f6 bf 81 1e 93 3c 35 9c 21 d0 90 |'Ty.......<5.!..| +00000040 c4 4e ea 07 b3 |.N...|" +"2019-04-22 06:17:20.069 UTC [cauthdsl] func2 -> DEBU 22a1 0xc000442ba0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:20.069 UTC [cauthdsl] func1 -> DEBU 22a2 0xc000442ba0 gate 1555913840066882700 evaluation succeeds" +"2019-04-22 06:17:20.070 UTC [policies] Evaluate -> DEBU 22a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.071 UTC [policies] Evaluate -> DEBU 22a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.071 UTC [policies] Evaluate -> DEBU 22a5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:20.071 UTC [policies] Evaluate -> DEBU 22a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:20.071 UTC [gossip.discovery] handleAliveMessage -> DEBU 22a7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes" +"2019-04-22 06:17:20.071 UTC [gossip.discovery] learnExistingMembers -> DEBU 22a8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes]}" +"2019-04-22 06:17:20.071 UTC [gossip.discovery] learnExistingMembers -> DEBU 22a9 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 " +"2019-04-22 06:17:20.072 UTC [gossip.discovery] learnExistingMembers -> DEBU 22aa Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 " +"2019-04-22 06:17:20.072 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ab Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:31 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:20.072 UTC [gossip.discovery] learnExistingMembers -> DEBU 22ac Exiting" +"2019-04-22 06:17:20.072 UTC [gossip.discovery] handleAliveMessage -> DEBU 22ad Exiting" +"2019-04-22 06:17:20.072 UTC [gossip.discovery] handleMsgFromComm -> DEBU 22ae Exiting" +"2019-04-22 06:17:20.072 UTC [gossip.discovery] sendMemResponse -> DEBU 22af Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:20.073 UTC [msp] DeserializeIdentity -> DEBU 22b0 Obtaining identity" +"2019-04-22 06:17:20.074 UTC [msp] DeserializeIdentity -> DEBU 22b1 Obtaining identity" +"2019-04-22 06:17:20.074 UTC [msp] DeserializeIdentity -> DEBU 22b2 Obtaining identity" +"2019-04-22 06:17:20.074 UTC [gossip.comm] Send -> DEBU 22b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:20.075 UTC [gossip.discovery] sendMemResponse -> DEBU 22b4 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:20.075 UTC [gossip.comm] sendToEndpoint -> DEBU 22b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.075 UTC [gossip.comm] sendToEndpoint -> DEBU 22b6 Exiting" +"2019-04-22 06:17:20.423 UTC [msp] DeserializeIdentity -> DEBU 22b7 Obtaining identity" +"2019-04-22 06:17:20.423 UTC [msp] DeserializeIdentity -> DEBU 22b8 Obtaining identity" +"2019-04-22 06:17:20.424 UTC [gossip.comm] Send -> DEBU 22b9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22ba Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22bb Exiting" +"2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22bc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.425 UTC [gossip.comm] sendToEndpoint -> DEBU 22bd Exiting" +"2019-04-22 06:17:20.424 UTC [gossip.comm] sendToEndpoint -> DEBU 22be Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.425 UTC [gossip.comm] sendToEndpoint -> DEBU 22bf Exiting" +"2019-04-22 06:17:20.426 UTC [gossip.comm] func1 -> DEBU 22c0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.427 UTC [gossip.gossip] handleMessage -> DEBU 22c1 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.427 UTC [gossip.comm] func1 -> DEBU 22c2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.428 UTC [msp.identity] Verify -> DEBU 22c3 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:20.428 UTC [msp.identity] Verify -> DEBU 22c4 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:20.428 UTC [msp] DeserializeIdentity -> DEBU 22c5 Obtaining identity" +"2019-04-22 06:17:20.429 UTC [msp] DeserializeIdentity -> DEBU 22c6 Obtaining identity" +"2019-04-22 06:17:20.429 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:20.429 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.430 UTC [policies] Evaluate -> DEBU 22ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:20.430 UTC [policies] Evaluate -> DEBU 22cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:20.430 UTC [policies] Evaluate -> DEBU 22cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:20.430 UTC [cauthdsl] func1 -> DEBU 22cd 0xc0003da080 gate 1555913840430725600 evaluation starts" +"2019-04-22 06:17:20.430 UTC [cauthdsl] func2 -> DEBU 22ce 0xc0003da080 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:20.431 UTC [cauthdsl] func2 -> DEBU 22cf 0xc0003da080 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:20.431 UTC [cauthdsl] func2 -> DEBU 22d0 0xc0003da080 principal matched by identity 0" +"2019-04-22 06:17:20.431 UTC [msp.identity] Verify -> DEBU 22d1 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:20.431 UTC [msp.identity] Verify -> DEBU 22d2 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:20.432 UTC [cauthdsl] func2 -> DEBU 22d3 0xc0003da080 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:20.432 UTC [cauthdsl] func1 -> DEBU 22d4 0xc0003da080 gate 1555913840430725600 evaluation succeeds" +"2019-04-22 06:17:20.432 UTC [policies] Evaluate -> DEBU 22d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.432 UTC [policies] Evaluate -> DEBU 22d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.433 UTC [policies] Evaluate -> DEBU 22d7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:20.433 UTC [policies] Evaluate -> DEBU 22d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:20.433 UTC [msp.identity] Verify -> DEBU 22d9 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:20.433 UTC [msp.identity] Verify -> DEBU 22da Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:20.434 UTC [msp] DeserializeIdentity -> DEBU 22db Obtaining identity" +"2019-04-22 06:17:20.434 UTC [msp] DeserializeIdentity -> DEBU 22dc Obtaining identity" +"2019-04-22 06:17:20.435 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:20.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22de Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22df Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.435 UTC [policies] Evaluate -> DEBU 22e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:20.435 UTC [policies] Evaluate -> DEBU 22e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:20.435 UTC [policies] Evaluate -> DEBU 22e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:20.435 UTC [cauthdsl] func1 -> DEBU 22e3 0xc0003f2400 gate 1555913840435805200 evaluation starts" +"2019-04-22 06:17:20.436 UTC [cauthdsl] func2 -> DEBU 22e4 0xc0003f2400 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:20.436 UTC [cauthdsl] func2 -> DEBU 22e5 0xc0003f2400 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:20.436 UTC [cauthdsl] func2 -> DEBU 22e6 0xc0003f2400 principal matched by identity 0" +"2019-04-22 06:17:20.436 UTC [msp.identity] Verify -> DEBU 22e7 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:20.436 UTC [msp.identity] Verify -> DEBU 22e8 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:20.437 UTC [cauthdsl] func2 -> DEBU 22e9 0xc0003f2400 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:20.437 UTC [cauthdsl] func1 -> DEBU 22ea 0xc0003f2400 gate 1555913840435805200 evaluation succeeds" +"2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22ed Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:20.437 UTC [policies] Evaluate -> DEBU 22ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:20.437 UTC [gossip.gossip] handleMessage -> DEBU 22ef Exiting" +"2019-04-22 06:17:20.438 UTC [gossip.gossip] handleMessage -> DEBU 22f0 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.438 UTC [msp] DeserializeIdentity -> DEBU 22f1 Obtaining identity" +"2019-04-22 06:17:20.438 UTC [msp] DeserializeIdentity -> DEBU 22f2 Obtaining identity" +"2019-04-22 06:17:20.439 UTC [msp] DeserializeIdentity -> DEBU 22f3 Obtaining identity" +"2019-04-22 06:17:20.440 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:20.440 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.440 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22f6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.440 UTC [policies] Evaluate -> DEBU 22f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:20.440 UTC [policies] Evaluate -> DEBU 22f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:20.441 UTC [policies] Evaluate -> DEBU 22f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:20.441 UTC [cauthdsl] func1 -> DEBU 22fa 0xc0002201c0 gate 1555913840441141400 evaluation starts" +"2019-04-22 06:17:20.441 UTC [cauthdsl] func2 -> DEBU 22fb 0xc0002201c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:20.441 UTC [cauthdsl] func2 -> DEBU 22fc 0xc0002201c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:20.442 UTC [cauthdsl] func2 -> DEBU 22fd 0xc0002201c0 principal matched by identity 0" +"2019-04-22 06:17:20.442 UTC [msp.identity] Verify -> DEBU 22fe Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:20.443 UTC [msp.identity] Verify -> DEBU 22ff Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:20.444 UTC [cauthdsl] func2 -> DEBU 2300 0xc0002201c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:20.444 UTC [cauthdsl] func1 -> DEBU 2301 0xc0002201c0 gate 1555913840441141400 evaluation succeeds" +"2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2302 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2303 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2304 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:20.444 UTC [policies] Evaluate -> DEBU 2305 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:20.445 UTC [msp] DeserializeIdentity -> DEBU 2306 Obtaining identity" +"2019-04-22 06:17:20.445 UTC [msp] DeserializeIdentity -> DEBU 2307 Obtaining identity" +"2019-04-22 06:17:20.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2308 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:20.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2309 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 230a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.446 UTC [policies] Evaluate -> DEBU 230b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:20.446 UTC [policies] Evaluate -> DEBU 230c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:20.447 UTC [policies] Evaluate -> DEBU 230d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:20.447 UTC [cauthdsl] func1 -> DEBU 230e 0xc000221d90 gate 1555913840447298800 evaluation starts" +"2019-04-22 06:17:20.447 UTC [cauthdsl] func2 -> DEBU 230f 0xc000221d90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:20.447 UTC [cauthdsl] func2 -> DEBU 2310 0xc000221d90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:20.448 UTC [cauthdsl] func2 -> DEBU 2311 0xc000221d90 principal matched by identity 0" +"2019-04-22 06:17:20.448 UTC [msp.identity] Verify -> DEBU 2312 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:20.448 UTC [msp.identity] Verify -> DEBU 2313 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:20.449 UTC [cauthdsl] func2 -> DEBU 2314 0xc000221d90 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:20.450 UTC [cauthdsl] func1 -> DEBU 2315 0xc000221d90 gate 1555913840447298800 evaluation succeeds" +"2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2316 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2317 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2318 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:20.450 UTC [policies] Evaluate -> DEBU 2319 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:20.451 UTC [msp.identity] Verify -> DEBU 231a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:20.451 UTC [msp.identity] Verify -> DEBU 231b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:20.452 UTC [msp.identity] Verify -> DEBU 231c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:20.455 UTC [msp.identity] Verify -> DEBU 231d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:20.456 UTC [gossip.gossip] handleMessage -> DEBU 231e Exiting" +"2019-04-22 06:17:20.456 UTC [gossip.gossip] handleMessage -> DEBU 231f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.456 UTC [msp] DeserializeIdentity -> DEBU 2320 Obtaining identity" +"2019-04-22 06:17:20.456 UTC [msp] DeserializeIdentity -> DEBU 2321 Obtaining identity" +"2019-04-22 06:17:20.456 UTC [msp] DeserializeIdentity -> DEBU 2322 Obtaining identity" +"2019-04-22 06:17:20.457 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2323 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:20.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2324 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2325 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.457 UTC [policies] Evaluate -> DEBU 2326 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:20.457 UTC [policies] Evaluate -> DEBU 2327 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:20.457 UTC [policies] Evaluate -> DEBU 2328 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:20.457 UTC [cauthdsl] func1 -> DEBU 2329 0xc0034528f0 gate 1555913840457682600 evaluation starts" +"2019-04-22 06:17:20.457 UTC [cauthdsl] func2 -> DEBU 232a 0xc0034528f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:20.457 UTC [cauthdsl] func2 -> DEBU 232b 0xc0034528f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:20.458 UTC [cauthdsl] func2 -> DEBU 232c 0xc0034528f0 principal matched by identity 0" +"2019-04-22 06:17:20.458 UTC [msp.identity] Verify -> DEBU 232d Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:20.458 UTC [msp.identity] Verify -> DEBU 232e Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:20.458 UTC [cauthdsl] func2 -> DEBU 232f 0xc0034528f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:20.458 UTC [cauthdsl] func1 -> DEBU 2330 0xc0034528f0 gate 1555913840457682600 evaluation succeeds" +"2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2331 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2332 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2333 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:20.458 UTC [policies] Evaluate -> DEBU 2334 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:20.459 UTC [msp] DeserializeIdentity -> DEBU 2335 Obtaining identity" +"2019-04-22 06:17:20.459 UTC [msp] DeserializeIdentity -> DEBU 2336 Obtaining identity" +"2019-04-22 06:17:20.459 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2337 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:20.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2338 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2339 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:20.459 UTC [policies] Evaluate -> DEBU 233a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:20.459 UTC [policies] Evaluate -> DEBU 233b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:20.459 UTC [policies] Evaluate -> DEBU 233c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:20.460 UTC [cauthdsl] func1 -> DEBU 233d 0xc0034600d0 gate 1555913840459893100 evaluation starts" +"2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 233e 0xc0034600d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 233f 0xc0034600d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 2340 0xc0034600d0 principal matched by identity 0" +"2019-04-22 06:17:20.460 UTC [msp.identity] Verify -> DEBU 2341 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:20.460 UTC [msp.identity] Verify -> DEBU 2342 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:20.460 UTC [cauthdsl] func2 -> DEBU 2343 0xc0034600d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:20.460 UTC [cauthdsl] func1 -> DEBU 2344 0xc0034600d0 gate 1555913840459893100 evaluation succeeds" +"2019-04-22 06:17:20.460 UTC [policies] Evaluate -> DEBU 2345 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.460 UTC [policies] Evaluate -> DEBU 2346 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:20.460 UTC [policies] Evaluate -> DEBU 2347 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:20.461 UTC [policies] Evaluate -> DEBU 2348 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:20.461 UTC [msp.identity] Verify -> DEBU 2349 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:20.461 UTC [msp.identity] Verify -> DEBU 234a Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:20.462 UTC [msp.identity] Verify -> DEBU 234b Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:20.462 UTC [msp.identity] Verify -> DEBU 234c Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:20.462 UTC [gossip.gossip] handleMessage -> DEBU 234d Exiting" +"2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 234e Obtaining identity" +"2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 234f Obtaining identity" +"2019-04-22 06:17:20.502 UTC [gossip.pull] Hello -> DEBU 2350 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 2351 Obtaining identity" +"2019-04-22 06:17:20.502 UTC [msp] DeserializeIdentity -> DEBU 2352 Obtaining identity" +"2019-04-22 06:17:20.503 UTC [gossip.comm] Send -> DEBU 2353 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:20.503 UTC [gossip.comm] sendToEndpoint -> DEBU 2354 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.503 UTC [gossip.comm] sendToEndpoint -> DEBU 2355 Exiting" +"2019-04-22 06:17:20.504 UTC [gossip.comm] func1 -> DEBU 2356 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7343894145420002700 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.505 UTC [gossip.gossip] handleMessage -> DEBU 2357 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7343894145420002700 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.505 UTC [gossip.pull] HandleMessage -> DEBU 2358 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 7343894145420002700 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.505 UTC [gossip.gossip] handleMessage -> DEBU 2359 Exiting" +"2019-04-22 06:17:20.683 UTC [gossip.comm] func1 -> DEBU 235a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.683 UTC [gossip.gossip] handleMessage -> DEBU 235b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.684 UTC [msp] DeserializeIdentity -> DEBU 235c Obtaining identity" +"2019-04-22 06:17:20.684 UTC [msp] DeserializeIdentity -> DEBU 235d Obtaining identity" +"2019-04-22 06:17:20.685 UTC [gossip.gossip] handleMessage -> DEBU 235e Exiting" +"2019-04-22 06:17:20.705 UTC [gossip.comm] func1 -> DEBU 235f Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.706 UTC [gossip.gossip] handleMessage -> DEBU 2360 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.706 UTC [gossip.pull] HandleMessage -> DEBU 2361 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.707 UTC [gossip.pull] SendDigest -> DEBU 2362 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:20.707 UTC [gossip.gossip] handleMessage -> DEBU 2363 Exiting" +"2019-04-22 06:17:20.841 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 2364 Sleeping 25s" +"2019-04-22 06:17:20.858 UTC [msp.identity] Sign -> DEBU 2365 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151020 " +"2019-04-22 06:17:20.858 UTC [msp.identity] Sign -> DEBU 2366 Sign: digest: 1DC3375D0B1854B36B3805CCA7E917664713B1F79485189A655CF36447317606 " +"2019-04-22 06:17:20.859 UTC [msp.identity] Sign -> DEBU 2367 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:20.859 UTC [msp.identity] Sign -> DEBU 2368 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:20.859 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2369 Sleeping 5s" +"2019-04-22 06:17:20.860 UTC [msp] DeserializeIdentity -> DEBU 236a Obtaining identity" +"2019-04-22 06:17:20.861 UTC [msp] DeserializeIdentity -> DEBU 236b Obtaining identity" +"2019-04-22 06:17:20.861 UTC [msp] DeserializeIdentity -> DEBU 236c Obtaining identity" +"2019-04-22 06:17:20.862 UTC [gossip.comm] Send -> DEBU 236d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:20.862 UTC [msp] DeserializeIdentity -> DEBU 236e Obtaining identity" +"2019-04-22 06:17:20.862 UTC [gossip.comm] sendToEndpoint -> DEBU 236f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:20.863 UTC [gossip.comm] sendToEndpoint -> DEBU 2370 Exiting" +"2019-04-22 06:17:20.863 UTC [gossip.comm] Send -> DEBU 2371 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:20.865 UTC [gossip.comm] Send -> DEBU 2372 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:20.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2373 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:20.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2374 Exiting" +"2019-04-22 06:17:20.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2375 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:32 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:20.867 UTC [gossip.comm] sendToEndpoint -> DEBU 2376 Exiting" +"2019-04-22 06:17:20.905 UTC [gossip.gossip] handleMessage -> DEBU 2377 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:20.906 UTC [msp] DeserializeIdentity -> DEBU 2378 Obtaining identity" +"2019-04-22 06:17:20.906 UTC [msp] DeserializeIdentity -> DEBU 2379 Obtaining identity" +"2019-04-22 06:17:20.907 UTC [msp] DeserializeIdentity -> DEBU 237a Obtaining identity" +"2019-04-22 06:17:20.908 UTC [gossip.gossip] handleMessage -> DEBU 237b Exiting" +"2019-04-22 06:17:21.120 UTC [gossip.comm] func1 -> DEBU 237c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:21.121 UTC [gossip.gossip] handleMessage -> DEBU 237d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:21.121 UTC [msp] DeserializeIdentity -> DEBU 237e Obtaining identity" +"2019-04-22 06:17:21.122 UTC [msp] DeserializeIdentity -> DEBU 237f Obtaining identity" +"2019-04-22 06:17:21.122 UTC [msp] DeserializeIdentity -> DEBU 2380 Obtaining identity" +"2019-04-22 06:17:21.123 UTC [gossip.gossip] handleMessage -> DEBU 2381 Exiting" +"2019-04-22 06:17:21.147 UTC [gossip.comm] func1 -> DEBU 2382 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:21.149 UTC [gossip.gossip] handleMessage -> DEBU 2383 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:21.149 UTC [gossip.gossip] handleMessage -> DEBU 2384 Exiting" +"2019-04-22 06:17:21.150 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2385 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:21.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2386 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:21.151 UTC [gossip.comm] func1 -> DEBU 2387 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:21.152 UTC [gossip.gossip] handleMessage -> DEBU 2388 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:21.152 UTC [msp.identity] Verify -> DEBU 2389 Verify: digest = 00000000 b4 9b ef 32 18 d9 e7 c0 74 ba 82 55 0f 3c 10 8a |...2....t..U.<..| +00000010 02 cc b1 25 a9 9b 8b 23 db d0 89 62 43 43 81 70 |...%...#...bCC.p|" +"2019-04-22 06:17:21.153 UTC [msp.identity] Verify -> DEBU 238a Verify: sig = 00000000 30 44 02 20 58 9d 3a 2e 17 5e b5 57 3b 95 ab b3 |0D. X.:..^.W;...| +00000010 64 f2 8d fa b2 14 e9 07 80 68 99 6f cc 58 a0 a3 |d........h.o.X..| +00000020 7f 48 f5 b6 02 20 69 58 5a ae 4d 54 34 62 27 e2 |.H... iXZ.MT4b'.| +00000030 bd c6 64 6d 9c ea 4a af cd 5f 5d de c5 03 58 0d |..dm..J.._]...X.| +00000040 b8 cb 52 b0 75 45 |..R.uE|" +"2019-04-22 06:17:21.153 UTC [msp.identity] Verify -> DEBU 238b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:21.154 UTC [msp.identity] Verify -> DEBU 238c Verify: sig = 00000000 30 44 02 20 73 53 f4 0c 58 47 c5 6b b3 e6 e9 ef |0D. sS..XG.k....| +00000010 a9 a7 9d 9c 8e 41 e1 bf 77 43 7c d0 b1 63 de 9c |.....A..wC|..c..| +00000020 39 28 52 42 02 20 70 22 f1 d2 b5 27 c2 27 44 cc |9(RB. p"...'.'D.| +00000030 88 48 f6 3a 50 2d 44 40 7f 8c df 0f 21 1a ee c1 |.H.:P-D@....!...| +00000040 1f ea af db ee fa |......|" +"2019-04-22 06:17:21.154 UTC [gossip.discovery] handleAliveMessage -> DEBU 238d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:21.154 UTC [gossip.discovery] learnExistingMembers -> DEBU 238e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:21.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 238f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 " +"2019-04-22 06:17:21.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2390 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 " +"2019-04-22 06:17:21.156 UTC [gossip.discovery] learnExistingMembers -> DEBU 2391 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:21.156 UTC [gossip.discovery] learnExistingMembers -> DEBU 2392 Exiting" +"2019-04-22 06:17:21.156 UTC [gossip.discovery] handleAliveMessage -> DEBU 2393 Exiting" +"2019-04-22 06:17:21.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2394 Exiting" +"2019-04-22 06:17:21.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2396 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:21.158 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2398 Exiting" +"2019-04-22 06:17:21.157 UTC [msp] DeserializeIdentity -> DEBU 2395 Obtaining identity" +"2019-04-22 06:17:21.157 UTC [gossip.gossip] handleMessage -> DEBU 2397 Exiting" +"2019-04-22 06:17:21.159 UTC [msp] DeserializeIdentity -> DEBU 2399 Obtaining identity" +"2019-04-22 06:17:21.160 UTC [msp] DeserializeIdentity -> DEBU 239a Obtaining identity" +"2019-04-22 06:17:21.160 UTC [gossip.comm] Send -> DEBU 239b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:21.161 UTC [msp] DeserializeIdentity -> DEBU 239c Obtaining identity" +"2019-04-22 06:17:21.161 UTC [gossip.comm] Send -> DEBU 239d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:21.162 UTC [gossip.comm] sendToEndpoint -> DEBU 239e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:21.162 UTC [gossip.comm] sendToEndpoint -> DEBU 239f Exiting" +"2019-04-22 06:17:21.162 UTC [gossip.comm] sendToEndpoint -> DEBU 23a0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:21.163 UTC [gossip.comm] sendToEndpoint -> DEBU 23a1 Exiting" +"2019-04-22 06:17:21.164 UTC [gossip.gossip] handleMessage -> DEBU 23a2 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:21.164 UTC [gossip.gossip] handleMessage -> DEBU 23a3 Exiting" +"2019-04-22 06:17:21.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:21.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23a5 Exiting" +"2019-04-22 06:17:21.480 UTC [gossip.election] waitForInterrupt -> DEBU 23a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:21.480 UTC [gossip.election] IsLeader -> DEBU 23a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:21.481 UTC [msp.identity] Sign -> DEBU 23a8 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510091801 " +"2019-04-22 06:17:21.481 UTC [msp.identity] Sign -> DEBU 23a9 Sign: digest: 915532C4154797F60B0B457FCDA82E89C9DAE566AD4D3C719933BFB52A397281 " +"2019-04-22 06:17:21.482 UTC [gossip.election] waitForInterrupt -> DEBU 23aa c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:21.486 UTC [msp] DeserializeIdentity -> DEBU 23ab Obtaining identity" +"2019-04-22 06:17:21.487 UTC [msp] DeserializeIdentity -> DEBU 23ac Obtaining identity" +"2019-04-22 06:17:21.488 UTC [msp] DeserializeIdentity -> DEBU 23ad Obtaining identity" +"2019-04-22 06:17:21.489 UTC [msp] DeserializeIdentity -> DEBU 23ae Obtaining identity" +"2019-04-22 06:17:21.489 UTC [gossip.comm] Send -> DEBU 23af Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:21.490 UTC [msp] DeserializeIdentity -> DEBU 23b0 Obtaining identity" +"2019-04-22 06:17:21.491 UTC [gossip.comm] sendToEndpoint -> DEBU 23b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:9 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.492 UTC [gossip.comm] sendToEndpoint -> DEBU 23b2 Exiting" +"2019-04-22 06:17:21.491 UTC [msp] DeserializeIdentity -> DEBU 23b3 Obtaining identity" +"2019-04-22 06:17:21.624 UTC [gossip.comm] func1 -> DEBU 23b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.626 UTC [gossip.gossip] handleMessage -> DEBU 23b5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.627 UTC [gossip.gossip] handleMessage -> DEBU 23b6 Exiting" +"2019-04-22 06:17:21.627 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.627 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23b8 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:21.628 UTC [msp] DeserializeIdentity -> DEBU 23b9 Obtaining identity" +"2019-04-22 06:17:21.628 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:21.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23bb Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:21.629 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23bc Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:21.629 UTC [policies] Evaluate -> DEBU 23bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:21.631 UTC [policies] Evaluate -> DEBU 23bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:21.632 UTC [policies] Evaluate -> DEBU 23c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:21.631 UTC [gossip.gossip] handleMessage -> DEBU 23be Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.632 UTC [cauthdsl] func1 -> DEBU 23c1 0xc0033c8520 gate 1555913841632510300 evaluation starts" +"2019-04-22 06:17:21.632 UTC [cauthdsl] func2 -> DEBU 23c2 0xc0033c8520 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:21.633 UTC [cauthdsl] func2 -> DEBU 23c3 0xc0033c8520 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:21.633 UTC [cauthdsl] func2 -> DEBU 23c4 0xc0033c8520 principal matched by identity 0" +"2019-04-22 06:17:21.633 UTC [msp.identity] Verify -> DEBU 23c5 Verify: digest = 00000000 51 88 1b c5 c8 36 d5 d0 de 6d df 6c 80 ab 50 db |Q....6...m.l..P.| +00000010 0a 3c e7 c4 a0 1e a7 e0 52 e8 f0 5d 65 4f 3c 46 |.<......R..]eO DEBU 23c6 Verify: sig = 00000000 30 45 02 21 00 de 44 5a c5 92 8f 3c da 12 2d 5e |0E.!..DZ...<..-^| +00000010 32 9a 50 e6 85 7f 0e cf 1c 65 b8 92 3b 4b b3 e7 |2.P......e..;K..| +00000020 bf a2 5a c5 c1 02 20 18 3b 04 0e c3 2b ea 94 12 |..Z... .;...+...| +00000030 c1 74 96 87 8c 76 ed 62 74 89 79 b2 be fa ad a0 |.t...v.bt.y.....| +00000040 b9 e8 12 2e f9 49 37 |.....I7|" +"2019-04-22 06:17:21.635 UTC [gossip.comm] func1 -> DEBU 23c7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.635 UTC [cauthdsl] func2 -> DEBU 23c8 0xc0033c8520 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:21.636 UTC [cauthdsl] func1 -> DEBU 23c9 0xc0033c8520 gate 1555913841632510300 evaluation succeeds" +"2019-04-22 06:17:21.636 UTC [policies] Evaluate -> DEBU 23ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:21.636 UTC [policies] Evaluate -> DEBU 23cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:21.636 UTC [policies] Evaluate -> DEBU 23cc Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:21.637 UTC [policies] Evaluate -> DEBU 23cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:21.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 23ce Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 23cf Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 " +"2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d1 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 " +"2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d2 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:21.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d3 Exiting" +"2019-04-22 06:17:21.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 23d4 Exiting" +"2019-04-22 06:17:21.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d5 Exiting" +"2019-04-22 06:17:21.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d8 Exiting" +"2019-04-22 06:17:21.639 UTC [gossip.gossip] handleMessage -> DEBU 23d7 Exiting" +"2019-04-22 06:17:21.640 UTC [gossip.gossip] handleMessage -> DEBU 23d9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23db Exiting" +"2019-04-22 06:17:21.641 UTC [gossip.gossip] handleMessage -> DEBU 23dc Exiting" +"2019-04-22 06:17:21.646 UTC [msp] DeserializeIdentity -> DEBU 23dd Obtaining identity" +"2019-04-22 06:17:21.647 UTC [msp] DeserializeIdentity -> DEBU 23de Obtaining identity" +"2019-04-22 06:17:21.648 UTC [msp] DeserializeIdentity -> DEBU 23df Obtaining identity" +"2019-04-22 06:17:21.648 UTC [msp] DeserializeIdentity -> DEBU 23e0 Obtaining identity" +"2019-04-22 06:17:21.648 UTC [msp] DeserializeIdentity -> DEBU 23e1 Obtaining identity" +"2019-04-22 06:17:21.649 UTC [msp] DeserializeIdentity -> DEBU 23e2 Obtaining identity" +"2019-04-22 06:17:21.649 UTC [msp] DeserializeIdentity -> DEBU 23e3 Obtaining identity" +"2019-04-22 06:17:21.650 UTC [gossip.comm] Send -> DEBU 23e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:21.650 UTC [msp] DeserializeIdentity -> DEBU 23e5 Obtaining identity" +"2019-04-22 06:17:21.650 UTC [gossip.comm] sendToEndpoint -> DEBU 23e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.650 UTC [gossip.comm] sendToEndpoint -> DEBU 23e7 Exiting" +"2019-04-22 06:17:21.651 UTC [gossip.comm] Send -> DEBU 23e8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:21.652 UTC [gossip.comm] sendToEndpoint -> DEBU 23e9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:21.654 UTC [gossip.comm] sendToEndpoint -> DEBU 23ea Exiting" +"2019-04-22 06:17:22.051 UTC [gossip.gossip] handleMessage -> DEBU 23eb Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.053 UTC [gossip.gossip] handleMessage -> DEBU 23ec Exiting" +"2019-04-22 06:17:22.053 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23ed Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.054 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23ee Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:22.054 UTC [msp] DeserializeIdentity -> DEBU 23ef Obtaining identity" +"2019-04-22 06:17:22.055 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23f0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:22.056 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23f1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:22.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23f2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:22.057 UTC [policies] Evaluate -> DEBU 23f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:22.058 UTC [policies] Evaluate -> DEBU 23f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:22.058 UTC [policies] Evaluate -> DEBU 23f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:22.059 UTC [cauthdsl] func1 -> DEBU 23f6 0xc0033ddef0 gate 1555913842059218600 evaluation starts" +"2019-04-22 06:17:22.059 UTC [gossip.comm] func1 -> DEBU 23f8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.060 UTC [gossip.comm] func1 -> DEBU 23f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.059 UTC [cauthdsl] func2 -> DEBU 23f7 0xc0033ddef0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:22.060 UTC [cauthdsl] func2 -> DEBU 23fa 0xc0033ddef0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:22.060 UTC [cauthdsl] func2 -> DEBU 23fb 0xc0033ddef0 principal matched by identity 0" +"2019-04-22 06:17:22.060 UTC [msp.identity] Verify -> DEBU 23fc Verify: digest = 00000000 e2 32 d7 6a d3 50 5a fe de f3 e1 d0 e2 27 e5 09 |.2.j.PZ......'..| +00000010 7c db 57 ff 00 37 69 9b 14 c7 4f 24 cf ae 63 1d ||.W..7i...O$..c.|" +"2019-04-22 06:17:22.060 UTC [msp.identity] Verify -> DEBU 23fd Verify: sig = 00000000 30 45 02 21 00 8e 23 7f a4 cb fe a7 d8 df 67 6b |0E.!..#.......gk| +00000010 af ac 13 9c 4d 37 c5 62 71 61 0f 4a ba de d8 5f |....M7.bqa.J..._| +00000020 1a 2e a7 25 84 02 20 15 fa 12 79 4a 1c 52 5d c5 |...%.. ...yJ.R].| +00000030 22 26 10 0b 4a ce 16 b1 ae 0b fd 44 4b 88 33 5d |"&..J......DK.3]| +00000040 77 4b d3 f5 99 b6 03 |wK.....|" +"2019-04-22 06:17:22.060 UTC [gossip.gossip] handleMessage -> DEBU 23fe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.061 UTC [cauthdsl] func2 -> DEBU 23ff 0xc0033ddef0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:22.062 UTC [cauthdsl] func1 -> DEBU 2400 0xc0033ddef0 gate 1555913842059218600 evaluation succeeds" +"2019-04-22 06:17:22.062 UTC [policies] Evaluate -> DEBU 2401 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:22.062 UTC [policies] Evaluate -> DEBU 2402 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:22.063 UTC [policies] Evaluate -> DEBU 2403 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:22.063 UTC [policies] Evaluate -> DEBU 2404 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:22.064 UTC [gossip.discovery] handleAliveMessage -> DEBU 2405 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2406 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:22.064 UTC [gossip.discovery] learnExistingMembers -> DEBU 2407 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 " +"2019-04-22 06:17:22.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2408 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 " +"2019-04-22 06:17:22.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 2409 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:32 , Envelope: 83 bytes, Signature: 69 bytes in aliveMembership" +"2019-04-22 06:17:22.065 UTC [gossip.discovery] learnExistingMembers -> DEBU 240a Exiting" +"2019-04-22 06:17:22.066 UTC [gossip.discovery] handleAliveMessage -> DEBU 240b Exiting" +"2019-04-22 06:17:22.066 UTC [gossip.discovery] handleMsgFromComm -> DEBU 240c Exiting" +"2019-04-22 06:17:22.067 UTC [gossip.gossip] handleMessage -> DEBU 240d Exiting" +"2019-04-22 06:17:22.067 UTC [gossip.gossip] handleMessage -> DEBU 240e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 240f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.067 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2410 Exiting" +"2019-04-22 06:17:22.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2411 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.068 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2413 Exiting" +"2019-04-22 06:17:22.068 UTC [gossip.gossip] handleMessage -> DEBU 2412 Exiting" +"2019-04-22 06:17:22.069 UTC [msp] DeserializeIdentity -> DEBU 2414 Obtaining identity" +"2019-04-22 06:17:22.069 UTC [msp] DeserializeIdentity -> DEBU 2415 Obtaining identity" +"2019-04-22 06:17:22.070 UTC [msp] DeserializeIdentity -> DEBU 2416 Obtaining identity" +"2019-04-22 06:17:22.070 UTC [msp] DeserializeIdentity -> DEBU 2417 Obtaining identity" +"2019-04-22 06:17:22.071 UTC [msp] DeserializeIdentity -> DEBU 2418 Obtaining identity" +"2019-04-22 06:17:22.071 UTC [msp] DeserializeIdentity -> DEBU 2419 Obtaining identity" +"2019-04-22 06:17:22.072 UTC [msp] DeserializeIdentity -> DEBU 241a Obtaining identity" +"2019-04-22 06:17:22.072 UTC [gossip.comm] Send -> DEBU 241b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:22.072 UTC [msp] DeserializeIdentity -> DEBU 241c Obtaining identity" +"2019-04-22 06:17:22.075 UTC [gossip.comm] Send -> DEBU 241d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:22.075 UTC [gossip.comm] sendToEndpoint -> DEBU 241e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.075 UTC [gossip.comm] sendToEndpoint -> DEBU 241f Exiting" +"2019-04-22 06:17:22.076 UTC [gossip.comm] sendToEndpoint -> DEBU 2420 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:22.077 UTC [gossip.comm] sendToEndpoint -> DEBU 2421 Exiting" +"2019-04-22 06:17:22.903 UTC [gossip.pull] Hello -> DEBU 2422 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:22.903 UTC [gossip.comm] Send -> DEBU 2423 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:22.904 UTC [gossip.pull] Hello -> DEBU 2424 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:22.905 UTC [gossip.comm] Send -> DEBU 2426 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:22.904 UTC [gossip.comm] sendToEndpoint -> DEBU 2425 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.905 UTC [gossip.comm] sendToEndpoint -> DEBU 2427 Exiting" +"2019-04-22 06:17:22.905 UTC [gossip.pull] Hello -> DEBU 2428 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:22.906 UTC [gossip.comm] Send -> DEBU 2429 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:22.906 UTC [gossip.comm] sendToEndpoint -> DEBU 242c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.907 UTC [gossip.comm] sendToEndpoint -> DEBU 242d Exiting" +"2019-04-22 06:17:22.905 UTC [gossip.comm] sendToEndpoint -> DEBU 242a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.906 UTC [gossip.comm] func1 -> DEBU 242b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13009051010668466515 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.908 UTC [gossip.gossip] handleMessage -> DEBU 242e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13009051010668466515 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.909 UTC [gossip.pull] HandleMessage -> DEBU 242f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13009051010668466515 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.909 UTC [gossip.gossip] handleMessage -> DEBU 2430 Exiting" +"2019-04-22 06:17:22.910 UTC [gossip.comm] func1 -> DEBU 2431 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16749726424293271070 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.908 UTC [gossip.comm] sendToEndpoint -> DEBU 2432 Exiting" +"2019-04-22 06:17:22.911 UTC [gossip.gossip] handleMessage -> DEBU 2433 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16749726424293271070 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.914 UTC [gossip.pull] HandleMessage -> DEBU 2434 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 16749726424293271070 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.915 UTC [gossip.gossip] handleMessage -> DEBU 2435 Exiting" +"2019-04-22 06:17:22.915 UTC [gossip.gossip] handleMessage -> DEBU 2436 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12583559006767350319 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.916 UTC [gossip.pull] HandleMessage -> DEBU 2437 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 12583559006767350319 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.916 UTC [gossip.gossip] handleMessage -> DEBU 2438 Exiting" +"2019-04-22 06:17:22.940 UTC [msp.identity] Sign -> DEBU 2439 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151021 " +"2019-04-22 06:17:22.940 UTC [msp.identity] Sign -> DEBU 243a Sign: digest: A73E8A6CF4D07234645E7573FA21808821032DC038A538FD4AF47FD636C4BD1F " +"2019-04-22 06:17:22.941 UTC [msp.identity] Sign -> DEBU 243b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:22.941 UTC [msp.identity] Sign -> DEBU 243c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:22.942 UTC [gossip.comm] Send -> DEBU 243d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:22.943 UTC [msp] DeserializeIdentity -> DEBU 243e Obtaining identity" +"2019-04-22 06:17:22.943 UTC [gossip.comm] sendToEndpoint -> DEBU 243f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.943 UTC [gossip.comm] sendToEndpoint -> DEBU 2440 Exiting" +"2019-04-22 06:17:22.943 UTC [gossip.comm] Send -> DEBU 2441 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:22.945 UTC [msp] DeserializeIdentity -> DEBU 2442 Obtaining identity" +"2019-04-22 06:17:22.946 UTC [gossip.comm] Send -> DEBU 2444 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:22.945 UTC [gossip.comm] sendToEndpoint -> DEBU 2443 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.947 UTC [gossip.comm] sendToEndpoint -> DEBU 2446 Exiting" +"2019-04-22 06:17:22.947 UTC [gossip.comm] sendToEndpoint -> DEBU 2445 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.949 UTC [gossip.comm] sendToEndpoint -> DEBU 2447 Exiting" +"2019-04-22 06:17:22.954 UTC [gossip.comm] func1 -> DEBU 2448 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.954 UTC [gossip.gossip] handleMessage -> DEBU 2449 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.956 UTC [gossip.comm] func1 -> DEBU 244a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.954 UTC [gossip.gossip] handleMessage -> DEBU 244b Exiting" +"2019-04-22 06:17:22.956 UTC [gossip.gossip] handleMessage -> DEBU 244c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 244d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.957 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 244e Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:22.957 UTC [msp.identity] Verify -> DEBU 244f Verify: digest = 00000000 a7 3e 8a 6c f4 d0 72 34 64 5e 75 73 fa 21 80 88 |.>.l..r4d^us.!..| +00000010 21 03 2d c0 38 a5 38 fd 4a f4 7f d6 36 c4 bd 1f |!.-.8.8.J...6...|" +"2019-04-22 06:17:22.957 UTC [msp.identity] Verify -> DEBU 2450 Verify: sig = 00000000 30 44 02 20 5c d8 db fa 2b e0 b6 46 b5 53 b0 21 |0D. \...+..F.S.!| +00000010 de 27 30 b1 b8 62 16 a6 86 ef 5b 41 13 2b 23 66 |.'0..b....[A.+#f| +00000020 7d 70 b7 a0 02 20 0e 5f cc b5 70 f8 7a 47 35 5a |}p... ._..p.zG5Z| +00000030 c4 7e a0 cb 43 2f fc 79 79 bf 88 ce 27 25 83 b6 |.~..C/.yy...'%..| +00000040 74 32 c9 c8 3e 63 |t2..>c|" +"2019-04-22 06:17:22.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 2451 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:22.958 UTC [gossip.discovery] isSentByMe -> DEBU 2452 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:22.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 2453 Exiting" +"2019-04-22 06:17:22.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2454 Exiting" +"2019-04-22 06:17:22.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2455 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.959 UTC [gossip.gossip] handleMessage -> DEBU 2456 Exiting" +"2019-04-22 06:17:22.959 UTC [gossip.gossip] handleMessage -> DEBU 2458 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.959 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2457 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:22.960 UTC [msp.identity] Verify -> DEBU 2459 Verify: digest = 00000000 a7 3e 8a 6c f4 d0 72 34 64 5e 75 73 fa 21 80 88 |.>.l..r4d^us.!..| +00000010 21 03 2d c0 38 a5 38 fd 4a f4 7f d6 36 c4 bd 1f |!.-.8.8.J...6...|" +"2019-04-22 06:17:22.961 UTC [msp.identity] Verify -> DEBU 245a Verify: sig = 00000000 30 44 02 20 5c d8 db fa 2b e0 b6 46 b5 53 b0 21 |0D. \...+..F.S.!| +00000010 de 27 30 b1 b8 62 16 a6 86 ef 5b 41 13 2b 23 66 |.'0..b....[A.+#f| +00000020 7d 70 b7 a0 02 20 0e 5f cc b5 70 f8 7a 47 35 5a |}p... ._..p.zG5Z| +00000030 c4 7e a0 cb 43 2f fc 79 79 bf 88 ce 27 25 83 b6 |.~..C/.yy...'%..| +00000040 74 32 c9 c8 3e 63 |t2..>c|" +"2019-04-22 06:17:22.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 245b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:22.962 UTC [gossip.discovery] isSentByMe -> DEBU 245c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:22.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 245d Exiting" +"2019-04-22 06:17:22.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 245e Exiting" +"2019-04-22 06:17:22.963 UTC [gossip.discovery] handleMsgFromComm -> DEBU 245f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:17:22.963 UTC [gossip.gossip] handleMessage -> DEBU 2460 Exiting" +"2019-04-22 06:17:22.963 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2461 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:22.964 UTC [msp.identity] Verify -> DEBU 2462 Verify: digest = 00000000 a7 3e 8a 6c f4 d0 72 34 64 5e 75 73 fa 21 80 88 |.>.l..r4d^us.!..| +00000010 21 03 2d c0 38 a5 38 fd 4a f4 7f d6 36 c4 bd 1f |!.-.8.8.J...6...|" +"2019-04-22 06:17:22.964 UTC [msp.identity] Verify -> DEBU 2463 Verify: sig = 00000000 30 44 02 20 5c d8 db fa 2b e0 b6 46 b5 53 b0 21 |0D. \...+..F.S.!| +00000010 de 27 30 b1 b8 62 16 a6 86 ef 5b 41 13 2b 23 66 |.'0..b....[A.+#f| +00000020 7d 70 b7 a0 02 20 0e 5f cc b5 70 f8 7a 47 35 5a |}p... ._..p.zG5Z| +00000030 c4 7e a0 cb 43 2f fc 79 79 bf 88 ce 27 25 83 b6 |.~..C/.yy...'%..| +00000040 74 32 c9 c8 3e 63 |t2..>c|" +"2019-04-22 06:17:22.965 UTC [msp.identity] Verify -> DEBU 2464 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:22.966 UTC [msp.identity] Verify -> DEBU 2465 Verify: sig = 00000000 30 44 02 20 7a c3 35 0b 15 31 70 9e 22 2a 01 32 |0D. z.5..1p."*.2| +00000010 88 50 cd 1a 2a b4 da 66 fc 9a c2 0e 6d fb fb b3 |.P..*..f....m...| +00000020 16 df 83 b0 02 20 1d b7 61 11 cd cd 05 1e d4 57 |..... ..a......W| +00000030 4b 2d b6 a1 bc e8 fd 52 d8 b3 cd ce c6 5e 1f 76 |K-.....R.....^.v| +00000040 0e dc 7d 48 ca eb |..}H..|" +"2019-04-22 06:17:22.967 UTC [gossip.discovery] handleAliveMessage -> DEBU 2466 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:22.967 UTC [gossip.discovery] isSentByMe -> DEBU 2467 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:33 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:22.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 2468 Exiting" +"2019-04-22 06:17:22.968 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2469 Exiting" +"2019-04-22 06:17:23.164 UTC [gossip.comm] func1 -> DEBU 246a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.164 UTC [gossip.gossip] handleMessage -> DEBU 246b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.166 UTC [gossip.pull] HandleMessage -> DEBU 246c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.166 UTC [gossip.pull] SendDigest -> DEBU 246d Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:23.166 UTC [gossip.gossip] handleMessage -> DEBU 246e Exiting" +"2019-04-22 06:17:23.185 UTC [gossip.comm] func1 -> DEBU 246f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.185 UTC [gossip.gossip] handleMessage -> DEBU 2470 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.188 UTC [gossip.gossip] handleMessage -> DEBU 2471 Exiting" +"2019-04-22 06:17:23.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2472 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2473 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:23.189 UTC [msp.identity] Verify -> DEBU 2474 Verify: digest = 00000000 76 7f 08 83 ed c7 63 d8 3a 7d ee 73 a9 1c 01 ff |v.....c.:}.s....| +00000010 8e d7 b2 bf 78 06 81 69 22 fc 6b 5e 6d 96 77 25 |....x..i".k^m.w%|" +"2019-04-22 06:17:23.189 UTC [msp.identity] Verify -> DEBU 2475 Verify: sig = 00000000 30 45 02 21 00 a8 f8 fd 2f c1 5c a0 16 b3 9b 6b |0E.!..../.\....k| +00000010 54 dd ab 1e 75 6f 1e 90 98 b6 6d cd 26 9e ce 16 |T...uo....m.&...| +00000020 e1 d6 44 08 fe 02 20 38 c3 c0 d7 09 97 51 ef 0d |..D... 8.....Q..| +00000030 7c b1 a4 08 f4 27 f4 0f 0c 9f 7a fd 43 a4 3e f3 ||....'....z.C.>.| +00000040 51 93 66 64 db 2e ad |Q.fd...|" +"2019-04-22 06:17:23.190 UTC [msp.identity] Verify -> DEBU 2476 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:23.190 UTC [msp.identity] Verify -> DEBU 2477 Verify: sig = 00000000 30 45 02 21 00 a5 6b f3 99 58 de c3 54 3d 7f 3e |0E.!..k..X..T=.>| +00000010 ac d9 25 1f 21 e6 18 33 97 fe 72 c8 b1 76 31 d7 |..%.!..3..r..v1.| +00000020 58 6a 25 92 98 02 20 11 3f 8a 5f 6b 81 66 99 0a |Xj%... .?._k.f..| +00000030 26 4b 52 eb 51 0d 49 3e fb 3f 0d 97 83 7a d7 cc |&KR.Q.I>.?...z..| +00000040 d4 1b 0d 5e 30 e9 b2 |...^0..|" +"2019-04-22 06:17:23.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 2478 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:23.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 2479 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:23.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 247a updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 " +"2019-04-22 06:17:23.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 247b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 " +"2019-04-22 06:17:23.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 247c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:23.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 247d Exiting" +"2019-04-22 06:17:23.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 247e Exiting" +"2019-04-22 06:17:23.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 247f Exiting" +"2019-04-22 06:17:23.194 UTC [gossip.discovery] sendMemResponse -> DEBU 2480 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:23.194 UTC [msp] DeserializeIdentity -> DEBU 2481 Obtaining identity" +"2019-04-22 06:17:23.194 UTC [msp] DeserializeIdentity -> DEBU 2482 Obtaining identity" +"2019-04-22 06:17:23.194 UTC [gossip.comm] Send -> DEBU 2483 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:23.195 UTC [gossip.discovery] sendMemResponse -> DEBU 2484 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:23.195 UTC [gossip.comm] sendToEndpoint -> DEBU 2485 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.195 UTC [gossip.comm] sendToEndpoint -> DEBU 2486 Exiting" +"2019-04-22 06:17:23.588 UTC [gossip.comm] func1 -> DEBU 2487 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.588 UTC [gossip.gossip] handleMessage -> DEBU 2488 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.589 UTC [gossip.pull] HandleMessage -> DEBU 2489 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.589 UTC [msp] DeserializeIdentity -> DEBU 248a Obtaining identity" +"2019-04-22 06:17:23.589 UTC [msp] DeserializeIdentity -> DEBU 248b Obtaining identity" +"2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248c Obtaining identity" +"2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248d Obtaining identity" +"2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248e Obtaining identity" +"2019-04-22 06:17:23.590 UTC [msp] DeserializeIdentity -> DEBU 248f Obtaining identity" +"2019-04-22 06:17:23.590 UTC [gossip.pull] SendDigest -> DEBU 2490 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:23.590 UTC [gossip.gossip] handleMessage -> DEBU 2491 Exiting" +"2019-04-22 06:17:23.602 UTC [gossip.comm] func1 -> DEBU 2492 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.602 UTC [gossip.gossip] handleMessage -> DEBU 2493 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.603 UTC [gossip.gossip] handleMessage -> DEBU 2494 Exiting" +"2019-04-22 06:17:23.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2495 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.603 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2496 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:23.603 UTC [msp] DeserializeIdentity -> DEBU 2497 Obtaining identity" +"2019-04-22 06:17:23.603 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2498 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:23.603 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2499 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:23.603 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 249a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:23.603 UTC [policies] Evaluate -> DEBU 249b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:23.604 UTC [policies] Evaluate -> DEBU 249c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:23.604 UTC [policies] Evaluate -> DEBU 249d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:23.604 UTC [cauthdsl] func1 -> DEBU 249e 0xc00340b490 gate 1555913843604294800 evaluation starts" +"2019-04-22 06:17:23.604 UTC [cauthdsl] func2 -> DEBU 249f 0xc00340b490 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:23.604 UTC [cauthdsl] func2 -> DEBU 24a0 0xc00340b490 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:23.604 UTC [cauthdsl] func2 -> DEBU 24a1 0xc00340b490 principal matched by identity 0" +"2019-04-22 06:17:23.604 UTC [msp.identity] Verify -> DEBU 24a2 Verify: digest = 00000000 89 13 a0 78 81 4e b5 fa d1 0c 14 ff 24 4c f8 81 |...x.N......$L..| +00000010 01 d7 10 33 3a 98 eb 10 8c 54 92 eb 2d f6 a7 bf |...3:....T..-...|" +"2019-04-22 06:17:23.604 UTC [msp.identity] Verify -> DEBU 24a3 Verify: sig = 00000000 30 45 02 21 00 8c be 6b ba a9 0a fe fb 4f c1 ab |0E.!...k.....O..| +00000010 e8 0f 37 c6 50 f6 47 93 f0 03 23 9f 33 d9 a5 e8 |..7.P.G...#.3...| +00000020 a5 ab 6f 37 64 02 20 6e 7c 23 1b 41 19 01 09 80 |..o7d. n|#.A....| +00000030 e6 36 14 6d 99 88 30 10 30 2b 8d ff 54 ff 9f c4 |.6.m..0.0+..T...| +00000040 cd 31 d9 91 10 b9 40 |.1....@|" +"2019-04-22 06:17:23.605 UTC [cauthdsl] func2 -> DEBU 24a4 0xc00340b490 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:23.605 UTC [cauthdsl] func1 -> DEBU 24a5 0xc00340b490 gate 1555913843604294800 evaluation succeeds" +"2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a8 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:23.605 UTC [policies] Evaluate -> DEBU 24a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:23.606 UTC [gossip.discovery] handleAliveMessage -> DEBU 24aa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:23.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ab Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:23.606 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ac updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 " +"2019-04-22 06:17:23.607 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ad Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 " +"2019-04-22 06:17:23.607 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ae Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:23.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 24af Exiting" +"2019-04-22 06:17:23.611 UTC [gossip.discovery] handleAliveMessage -> DEBU 24b0 Exiting" +"2019-04-22 06:17:23.611 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24b1 Exiting" +"2019-04-22 06:17:23.611 UTC [gossip.discovery] sendMemResponse -> DEBU 24b2 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:23.612 UTC [msp] DeserializeIdentity -> DEBU 24b3 Obtaining identity" +"2019-04-22 06:17:23.612 UTC [msp] DeserializeIdentity -> DEBU 24b4 Obtaining identity" +"2019-04-22 06:17:23.613 UTC [msp] DeserializeIdentity -> DEBU 24b5 Obtaining identity" +"2019-04-22 06:17:23.613 UTC [gossip.comm] Send -> DEBU 24b6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:23.614 UTC [gossip.discovery] sendMemResponse -> DEBU 24b7 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:23.614 UTC [gossip.comm] sendToEndpoint -> DEBU 24b8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-04-22 06:17:23.614 UTC [gossip.comm] sendToEndpoint -> DEBU 24b9 Exiting" +"2019-04-22 06:17:24.007 UTC [gossip.gossip] handleMessage -> DEBU 24ba Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.007 UTC [gossip.pull] HandleMessage -> DEBU 24bb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.007 UTC [msp] DeserializeIdentity -> DEBU 24bc Obtaining identity" +"2019-04-22 06:17:24.007 UTC [msp] DeserializeIdentity -> DEBU 24bd Obtaining identity" +"2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24be Obtaining identity" +"2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24bf Obtaining identity" +"2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24c0 Obtaining identity" +"2019-04-22 06:17:24.008 UTC [msp] DeserializeIdentity -> DEBU 24c1 Obtaining identity" +"2019-04-22 06:17:24.008 UTC [gossip.pull] SendDigest -> DEBU 24c2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:24.008 UTC [gossip.gossip] handleMessage -> DEBU 24c3 Exiting" +"2019-04-22 06:17:24.025 UTC [gossip.gossip] handleMessage -> DEBU 24c4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.026 UTC [gossip.gossip] handleMessage -> DEBU 24c5 Exiting" +"2019-04-22 06:17:24.026 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.027 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24c7 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:24.027 UTC [msp] DeserializeIdentity -> DEBU 24c8 Obtaining identity" +"2019-04-22 06:17:24.028 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24c9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:24.032 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24ca Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.032 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24cb Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.033 UTC [policies] Evaluate -> DEBU 24cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:24.033 UTC [policies] Evaluate -> DEBU 24cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:24.033 UTC [policies] Evaluate -> DEBU 24ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:24.034 UTC [cauthdsl] func1 -> DEBU 24cf 0xc0039a2700 gate 1555913844034262400 evaluation starts" +"2019-04-22 06:17:24.034 UTC [cauthdsl] func2 -> DEBU 24d0 0xc0039a2700 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:24.034 UTC [cauthdsl] func2 -> DEBU 24d1 0xc0039a2700 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:24.035 UTC [cauthdsl] func2 -> DEBU 24d2 0xc0039a2700 principal matched by identity 0" +"2019-04-22 06:17:24.035 UTC [msp.identity] Verify -> DEBU 24d3 Verify: digest = 00000000 f1 e5 67 88 67 58 e4 ac 85 06 2f 5d 05 05 a7 05 |..g.gX..../]....| +00000010 e6 4f 2c 34 18 e8 e8 86 06 5e f2 28 c6 2a c2 57 |.O,4.....^.(.*.W|" +"2019-04-22 06:17:24.035 UTC [msp.identity] Verify -> DEBU 24d4 Verify: sig = 00000000 30 45 02 21 00 a0 7f 3c 19 0e 93 82 ad 9b b0 88 |0E.!...<........| +00000010 06 e4 d3 d7 12 03 29 bd 48 10 b8 ed 4c 91 d8 e2 |......).H...L...| +00000020 c9 c9 01 b5 f0 02 20 69 3b ac 89 d1 e6 5a 4e 1f |...... i;....ZN.| +00000030 33 07 39 0d 58 04 a6 4a bc 5b 9d f3 2a 1e 4c 4c |3.9.X..J.[..*.LL| +00000040 61 1a f1 7e f8 cb a0 |a..~...|" +"2019-04-22 06:17:24.036 UTC [cauthdsl] func2 -> DEBU 24d5 0xc0039a2700 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:24.036 UTC [cauthdsl] func1 -> DEBU 24d6 0xc0039a2700 gate 1555913844034262400 evaluation succeeds" +"2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:24.037 UTC [policies] Evaluate -> DEBU 24da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:24.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 24db Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:24.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 24dc Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:24.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 24dd updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 " +"2019-04-22 06:17:24.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 24de Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 " +"2019-04-22 06:17:24.039 UTC [gossip.discovery] learnExistingMembers -> DEBU 24df Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:33 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:24.039 UTC [gossip.discovery] learnExistingMembers -> DEBU 24e0 Exiting" +"2019-04-22 06:17:24.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 24e1 Exiting" +"2019-04-22 06:17:24.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24e2 Exiting" +"2019-04-22 06:17:24.040 UTC [gossip.discovery] sendMemResponse -> DEBU 24e3 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:24.041 UTC [msp] DeserializeIdentity -> DEBU 24e4 Obtaining identity" +"2019-04-22 06:17:24.041 UTC [msp] DeserializeIdentity -> DEBU 24e5 Obtaining identity" +"2019-04-22 06:17:24.042 UTC [msp] DeserializeIdentity -> DEBU 24e6 Obtaining identity" +"2019-04-22 06:17:24.042 UTC [gossip.comm] Send -> DEBU 24e7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:24.043 UTC [gossip.discovery] sendMemResponse -> DEBU 24e8 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:24.043 UTC [gossip.comm] sendToEndpoint -> DEBU 24e9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.043 UTC [gossip.comm] sendToEndpoint -> DEBU 24ea Exiting" +"2019-04-22 06:17:24.388 UTC [msp] DeserializeIdentity -> DEBU 24eb Obtaining identity" +"2019-04-22 06:17:24.388 UTC [msp] DeserializeIdentity -> DEBU 24ec Obtaining identity" +"2019-04-22 06:17:24.389 UTC [gossip.comm] Send -> DEBU 24ed Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24ee Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24ef Exiting" +"2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24f0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.389 UTC [gossip.comm] sendToEndpoint -> DEBU 24f1 Exiting" +"2019-04-22 06:17:24.390 UTC [gossip.comm] sendToEndpoint -> DEBU 24f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.390 UTC [gossip.comm] sendToEndpoint -> DEBU 24f3 Exiting" +"2019-04-22 06:17:24.391 UTC [gossip.gossip] handleMessage -> DEBU 24f4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.392 UTC [msp] DeserializeIdentity -> DEBU 24f7 Obtaining identity" +"2019-04-22 06:17:24.392 UTC [msp] DeserializeIdentity -> DEBU 24f8 Obtaining identity" +"2019-04-22 06:17:24.392 UTC [gossip.comm] func1 -> DEBU 24f5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.392 UTC [gossip.comm] func1 -> DEBU 24f6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.393 UTC [msp] DeserializeIdentity -> DEBU 24f9 Obtaining identity" +"2019-04-22 06:17:24.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 24fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:24.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24fb Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 24fc Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.395 UTC [policies] Evaluate -> DEBU 24fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:24.395 UTC [policies] Evaluate -> DEBU 24fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:24.395 UTC [policies] Evaluate -> DEBU 24ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:24.396 UTC [cauthdsl] func1 -> DEBU 2500 0xc0039ad0a0 gate 1555913844396031300 evaluation starts" +"2019-04-22 06:17:24.396 UTC [cauthdsl] func2 -> DEBU 2501 0xc0039ad0a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:24.396 UTC [cauthdsl] func2 -> DEBU 2502 0xc0039ad0a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:24.397 UTC [cauthdsl] func2 -> DEBU 2503 0xc0039ad0a0 principal matched by identity 0" +"2019-04-22 06:17:24.397 UTC [msp.identity] Verify -> DEBU 2504 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:24.397 UTC [msp.identity] Verify -> DEBU 2505 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:24.398 UTC [cauthdsl] func2 -> DEBU 2506 0xc0039ad0a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:24.398 UTC [cauthdsl] func1 -> DEBU 2507 0xc0039ad0a0 gate 1555913844396031300 evaluation succeeds" +"2019-04-22 06:17:24.398 UTC [policies] Evaluate -> DEBU 2508 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.399 UTC [policies] Evaluate -> DEBU 2509 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.399 UTC [policies] Evaluate -> DEBU 250a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:24.400 UTC [policies] Evaluate -> DEBU 250b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:24.400 UTC [msp] DeserializeIdentity -> DEBU 250c Obtaining identity" +"2019-04-22 06:17:24.401 UTC [msp] DeserializeIdentity -> DEBU 250d Obtaining identity" +"2019-04-22 06:17:24.401 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 250e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:24.402 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 250f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.402 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2510 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.402 UTC [policies] Evaluate -> DEBU 2511 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:24.403 UTC [policies] Evaluate -> DEBU 2512 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:24.403 UTC [policies] Evaluate -> DEBU 2513 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:24.404 UTC [cauthdsl] func1 -> DEBU 2514 0xc003da0870 gate 1555913844404018000 evaluation starts" +"2019-04-22 06:17:24.404 UTC [cauthdsl] func2 -> DEBU 2515 0xc003da0870 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:24.404 UTC [cauthdsl] func2 -> DEBU 2516 0xc003da0870 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:24.404 UTC [cauthdsl] func2 -> DEBU 2517 0xc003da0870 principal matched by identity 0" +"2019-04-22 06:17:24.405 UTC [msp.identity] Verify -> DEBU 2518 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:24.405 UTC [msp.identity] Verify -> DEBU 2519 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:24.406 UTC [cauthdsl] func2 -> DEBU 251a 0xc003da0870 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:24.406 UTC [cauthdsl] func1 -> DEBU 251b 0xc003da0870 gate 1555913844404018000 evaluation succeeds" +"2019-04-22 06:17:24.406 UTC [policies] Evaluate -> DEBU 251c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.406 UTC [policies] Evaluate -> DEBU 251d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.407 UTC [policies] Evaluate -> DEBU 251e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:24.409 UTC [policies] Evaluate -> DEBU 251f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:24.410 UTC [msp.identity] Verify -> DEBU 2520 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:24.411 UTC [msp.identity] Verify -> DEBU 2521 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:24.411 UTC [msp.identity] Verify -> DEBU 2522 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:24.411 UTC [msp.identity] Verify -> DEBU 2523 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:24.412 UTC [gossip.gossip] handleMessage -> DEBU 2524 Exiting" +"2019-04-22 06:17:24.412 UTC [gossip.gossip] handleMessage -> DEBU 2525 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.413 UTC [msp.identity] Verify -> DEBU 2526 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:24.414 UTC [msp.identity] Verify -> DEBU 2527 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:24.414 UTC [msp] DeserializeIdentity -> DEBU 2528 Obtaining identity" +"2019-04-22 06:17:24.414 UTC [msp] DeserializeIdentity -> DEBU 2529 Obtaining identity" +"2019-04-22 06:17:24.415 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 252a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:24.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 252b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 252c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.416 UTC [policies] Evaluate -> DEBU 252d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:24.416 UTC [policies] Evaluate -> DEBU 252e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:24.416 UTC [policies] Evaluate -> DEBU 252f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:24.417 UTC [cauthdsl] func1 -> DEBU 2530 0xc003dc7820 gate 1555913844417106300 evaluation starts" +"2019-04-22 06:17:24.417 UTC [cauthdsl] func2 -> DEBU 2531 0xc003dc7820 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:24.417 UTC [cauthdsl] func2 -> DEBU 2532 0xc003dc7820 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:24.417 UTC [cauthdsl] func2 -> DEBU 2533 0xc003dc7820 principal matched by identity 0" +"2019-04-22 06:17:24.418 UTC [msp.identity] Verify -> DEBU 2534 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:24.418 UTC [msp.identity] Verify -> DEBU 2535 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:24.419 UTC [cauthdsl] func2 -> DEBU 2536 0xc003dc7820 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:24.420 UTC [cauthdsl] func1 -> DEBU 2537 0xc003dc7820 gate 1555913844417106300 evaluation succeeds" +"2019-04-22 06:17:24.420 UTC [policies] Evaluate -> DEBU 2538 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.420 UTC [policies] Evaluate -> DEBU 2539 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.421 UTC [policies] Evaluate -> DEBU 253a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:24.421 UTC [policies] Evaluate -> DEBU 253b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:24.421 UTC [msp.identity] Verify -> DEBU 253c Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:24.422 UTC [msp.identity] Verify -> DEBU 253d Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:24.422 UTC [msp] DeserializeIdentity -> DEBU 253e Obtaining identity" +"2019-04-22 06:17:24.423 UTC [msp] DeserializeIdentity -> DEBU 253f Obtaining identity" +"2019-04-22 06:17:24.423 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2540 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:24.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2541 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2542 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.427 UTC [policies] Evaluate -> DEBU 2543 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:24.428 UTC [policies] Evaluate -> DEBU 2544 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:24.428 UTC [policies] Evaluate -> DEBU 2545 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:24.428 UTC [cauthdsl] func1 -> DEBU 2546 0xc003ea1710 gate 1555913844428767300 evaluation starts" +"2019-04-22 06:17:24.429 UTC [cauthdsl] func2 -> DEBU 2547 0xc003ea1710 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:24.429 UTC [cauthdsl] func2 -> DEBU 2548 0xc003ea1710 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:24.429 UTC [cauthdsl] func2 -> DEBU 2549 0xc003ea1710 principal matched by identity 0" +"2019-04-22 06:17:24.430 UTC [msp.identity] Verify -> DEBU 254a Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:24.430 UTC [msp.identity] Verify -> DEBU 254b Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:24.431 UTC [cauthdsl] func2 -> DEBU 254c 0xc003ea1710 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:24.431 UTC [cauthdsl] func1 -> DEBU 254d 0xc003ea1710 gate 1555913844428767300 evaluation succeeds" +"2019-04-22 06:17:24.431 UTC [policies] Evaluate -> DEBU 254e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.431 UTC [policies] Evaluate -> DEBU 254f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.432 UTC [policies] Evaluate -> DEBU 2550 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:24.432 UTC [policies] Evaluate -> DEBU 2551 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:24.432 UTC [gossip.gossip] handleMessage -> DEBU 2552 Exiting" +"2019-04-22 06:17:24.433 UTC [gossip.gossip] handleMessage -> DEBU 2553 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.433 UTC [msp] DeserializeIdentity -> DEBU 2554 Obtaining identity" +"2019-04-22 06:17:24.434 UTC [msp] DeserializeIdentity -> DEBU 2555 Obtaining identity" +"2019-04-22 06:17:24.434 UTC [msp] DeserializeIdentity -> DEBU 2556 Obtaining identity" +"2019-04-22 06:17:24.435 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2557 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:24.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2558 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2559 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.435 UTC [policies] Evaluate -> DEBU 255a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:24.436 UTC [policies] Evaluate -> DEBU 255b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:24.436 UTC [policies] Evaluate -> DEBU 255c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:24.436 UTC [cauthdsl] func1 -> DEBU 255d 0xc003ead260 gate 1555913844436763400 evaluation starts" +"2019-04-22 06:17:24.437 UTC [cauthdsl] func2 -> DEBU 255e 0xc003ead260 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:24.437 UTC [cauthdsl] func2 -> DEBU 255f 0xc003ead260 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:24.437 UTC [cauthdsl] func2 -> DEBU 2560 0xc003ead260 principal matched by identity 0" +"2019-04-22 06:17:24.438 UTC [msp.identity] Verify -> DEBU 2561 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:24.438 UTC [msp.identity] Verify -> DEBU 2562 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:24.439 UTC [cauthdsl] func2 -> DEBU 2563 0xc003ead260 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:24.439 UTC [cauthdsl] func1 -> DEBU 2564 0xc003ead260 gate 1555913844436763400 evaluation succeeds" +"2019-04-22 06:17:24.439 UTC [policies] Evaluate -> DEBU 2565 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.439 UTC [policies] Evaluate -> DEBU 2566 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.440 UTC [policies] Evaluate -> DEBU 2567 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:24.440 UTC [policies] Evaluate -> DEBU 2568 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:24.440 UTC [msp] DeserializeIdentity -> DEBU 2569 Obtaining identity" +"2019-04-22 06:17:24.441 UTC [msp] DeserializeIdentity -> DEBU 256a Obtaining identity" +"2019-04-22 06:17:24.441 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 256b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:24.443 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.443 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:24.444 UTC [policies] Evaluate -> DEBU 256e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:24.444 UTC [policies] Evaluate -> DEBU 256f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:24.444 UTC [policies] Evaluate -> DEBU 2570 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:24.444 UTC [cauthdsl] func1 -> DEBU 2571 0xc003ef6a50 gate 1555913844444857400 evaluation starts" +"2019-04-22 06:17:24.445 UTC [cauthdsl] func2 -> DEBU 2572 0xc003ef6a50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:24.445 UTC [cauthdsl] func2 -> DEBU 2573 0xc003ef6a50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:24.445 UTC [cauthdsl] func2 -> DEBU 2574 0xc003ef6a50 principal matched by identity 0" +"2019-04-22 06:17:24.445 UTC [msp.identity] Verify -> DEBU 2575 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:24.446 UTC [msp.identity] Verify -> DEBU 2576 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:24.446 UTC [cauthdsl] func2 -> DEBU 2577 0xc003ef6a50 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:24.447 UTC [cauthdsl] func1 -> DEBU 2578 0xc003ef6a50 gate 1555913844444857400 evaluation succeeds" +"2019-04-22 06:17:24.447 UTC [policies] Evaluate -> DEBU 2579 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.447 UTC [policies] Evaluate -> DEBU 257a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:24.447 UTC [policies] Evaluate -> DEBU 257b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:24.448 UTC [policies] Evaluate -> DEBU 257c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:24.448 UTC [msp.identity] Verify -> DEBU 257d Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:24.449 UTC [msp.identity] Verify -> DEBU 257e Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:24.449 UTC [msp.identity] Verify -> DEBU 257f Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:24.451 UTC [msp.identity] Verify -> DEBU 2580 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:24.452 UTC [gossip.gossip] handleMessage -> DEBU 2581 Exiting" +"2019-04-22 06:17:24.469 UTC [msp] DeserializeIdentity -> DEBU 2582 Obtaining identity" +"2019-04-22 06:17:24.469 UTC [msp] DeserializeIdentity -> DEBU 2583 Obtaining identity" +"2019-04-22 06:17:24.470 UTC [gossip.pull] Hello -> DEBU 2584 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:24.470 UTC [msp] DeserializeIdentity -> DEBU 2585 Obtaining identity" +"2019-04-22 06:17:24.471 UTC [msp] DeserializeIdentity -> DEBU 2586 Obtaining identity" +"2019-04-22 06:17:24.471 UTC [gossip.comm] Send -> DEBU 2587 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:24.471 UTC [gossip.comm] sendToEndpoint -> DEBU 2588 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.472 UTC [gossip.comm] sendToEndpoint -> DEBU 2589 Exiting" +"2019-04-22 06:17:24.474 UTC [gossip.comm] func1 -> DEBU 258a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8705486053438910658 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.474 UTC [gossip.gossip] handleMessage -> DEBU 258b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8705486053438910658 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.475 UTC [gossip.pull] HandleMessage -> DEBU 258c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 8705486053438910658 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.475 UTC [gossip.gossip] handleMessage -> DEBU 258d Exiting" +"2019-04-22 06:17:24.647 UTC [gossip.comm] func1 -> DEBU 258e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.647 UTC [gossip.gossip] handleMessage -> DEBU 258f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.648 UTC [msp] DeserializeIdentity -> DEBU 2590 Obtaining identity" +"2019-04-22 06:17:24.648 UTC [msp] DeserializeIdentity -> DEBU 2591 Obtaining identity" +"2019-04-22 06:17:24.648 UTC [gossip.gossip] handleMessage -> DEBU 2592 Exiting" +"2019-04-22 06:17:24.671 UTC [gossip.comm] func1 -> DEBU 2593 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.672 UTC [gossip.gossip] handleMessage -> DEBU 2594 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.672 UTC [gossip.pull] HandleMessage -> DEBU 2595 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.672 UTC [gossip.pull] SendDigest -> DEBU 2596 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:24.672 UTC [gossip.gossip] handleMessage -> DEBU 2597 Exiting" +"2019-04-22 06:17:24.871 UTC [gossip.gossip] handleMessage -> DEBU 2598 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:24.871 UTC [msp] DeserializeIdentity -> DEBU 2599 Obtaining identity" +"2019-04-22 06:17:24.871 UTC [msp] DeserializeIdentity -> DEBU 259a Obtaining identity" +"2019-04-22 06:17:24.872 UTC [msp] DeserializeIdentity -> DEBU 259b Obtaining identity" +"2019-04-22 06:17:24.872 UTC [gossip.gossip] handleMessage -> DEBU 259c Exiting" +"2019-04-22 06:17:25.085 UTC [gossip.comm] func1 -> DEBU 259d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:25.085 UTC [gossip.gossip] handleMessage -> DEBU 259e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:25.086 UTC [msp] DeserializeIdentity -> DEBU 259f Obtaining identity" +"2019-04-22 06:17:25.093 UTC [msp] DeserializeIdentity -> DEBU 25a0 Obtaining identity" +"2019-04-22 06:17:25.093 UTC [msp] DeserializeIdentity -> DEBU 25a1 Obtaining identity" +"2019-04-22 06:17:25.094 UTC [gossip.gossip] handleMessage -> DEBU 25a2 Exiting" +"2019-04-22 06:17:25.825 UTC [msp.identity] Sign -> DEBU 25a3 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151022 " +"2019-04-22 06:17:25.825 UTC [msp.identity] Sign -> DEBU 25a4 Sign: digest: 3C1438FA8929F488534466D9A00E87AC383895C1C2310656C8FC953CFDB2540D " +"2019-04-22 06:17:25.826 UTC [msp.identity] Sign -> DEBU 25a5 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:25.826 UTC [msp.identity] Sign -> DEBU 25a6 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:25.827 UTC [gossip.discovery] periodicalSendAlive -> DEBU 25a7 Sleeping 5s" +"2019-04-22 06:17:25.831 UTC [msp] DeserializeIdentity -> DEBU 25a8 Obtaining identity" +"2019-04-22 06:17:25.832 UTC [msp] DeserializeIdentity -> DEBU 25a9 Obtaining identity" +"2019-04-22 06:17:25.832 UTC [msp] DeserializeIdentity -> DEBU 25aa Obtaining identity" +"2019-04-22 06:17:25.833 UTC [gossip.comm] Send -> DEBU 25ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:25.833 UTC [gossip.comm] Send -> DEBU 25ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:25.834 UTC [msp] DeserializeIdentity -> DEBU 25ae Obtaining identity" +"2019-04-22 06:17:25.834 UTC [gossip.comm] Send -> DEBU 25b0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:25.834 UTC [gossip.comm] sendToEndpoint -> DEBU 25ad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:25.835 UTC [gossip.comm] sendToEndpoint -> DEBU 25b1 Exiting" +"2019-04-22 06:17:25.834 UTC [gossip.comm] sendToEndpoint -> DEBU 25af Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:25.835 UTC [gossip.comm] sendToEndpoint -> DEBU 25b2 Exiting" +"2019-04-22 06:17:25.836 UTC [gossip.comm] sendToEndpoint -> DEBU 25b3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:34 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:25.836 UTC [gossip.comm] sendToEndpoint -> DEBU 25b4 Exiting" +"2019-04-22 06:17:26.104 UTC [gossip.comm] func1 -> DEBU 25b5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:26.105 UTC [gossip.gossip] handleMessage -> DEBU 25b6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:26.105 UTC [gossip.gossip] handleMessage -> DEBU 25b7 Exiting" +"2019-04-22 06:17:26.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25b8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:26.106 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25b9 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:26.108 UTC [msp.identity] Verify -> DEBU 25ba Verify: digest = 00000000 5b 1d ec 22 e0 14 8f 9d e7 d0 a7 47 8d fa 23 5f |[..".......G..#_| +00000010 0e 9e b9 b2 49 11 9d 6a 33 26 81 67 25 a9 03 d5 |....I..j3&.g%...|" +"2019-04-22 06:17:26.109 UTC [msp.identity] Verify -> DEBU 25bb Verify: sig = 00000000 30 45 02 21 00 95 72 b7 d1 a9 d4 ae 5b f9 f6 1f |0E.!..r.....[...| +00000010 46 8a f8 2c cc 57 a1 b6 ca 8a 9c 52 7b 71 65 06 |F..,.W.....R{qe.| +00000020 6d 3b 0a 1f ab 02 20 19 08 24 27 bc f4 02 66 4c |m;.... ..$'...fL| +00000030 90 29 a9 9c a8 3f bb 51 c0 d0 7c ad 34 c3 5f 94 |.)...?.Q..|.4._.| +00000040 42 3c c4 74 22 6f 97 |B<.t"o.|" +"2019-04-22 06:17:26.110 UTC [msp.identity] Verify -> DEBU 25bc Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:26.111 UTC [msp.identity] Verify -> DEBU 25bd Verify: sig = 00000000 30 44 02 20 38 81 c5 50 70 c5 43 c9 aa 8b e4 6a |0D. 8..Pp.C....j| +00000010 86 5b 8f 0b 1f 97 0b b1 03 cc 82 f4 9c 8a 50 f5 |.[............P.| +00000020 66 56 f2 28 02 20 2f 30 67 b9 ee 7d be 3a db b6 |fV.(. /0g..}.:..| +00000030 2b 48 bb 59 47 2a 9a ba b6 6a b7 0b 8b 05 5e 1b |+H.YG*...j....^.| +00000040 e4 a3 89 a8 02 94 |......|" +"2019-04-22 06:17:26.112 UTC [gossip.discovery] handleAliveMessage -> DEBU 25be Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:26.115 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:26.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c2 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 " +"2019-04-22 06:17:26.115 UTC [gossip.gossip] handleMessage -> DEBU 25bf Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.118 UTC [gossip.comm] func1 -> DEBU 25c1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.119 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 " +"2019-04-22 06:17:26.120 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:26.121 UTC [gossip.discovery] learnExistingMembers -> DEBU 25c5 Exiting" +"2019-04-22 06:17:26.121 UTC [gossip.discovery] handleAliveMessage -> DEBU 25c6 Exiting" +"2019-04-22 06:17:26.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25c7 Exiting" +"2019-04-22 06:17:26.122 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ca Exiting" +"2019-04-22 06:17:26.122 UTC [gossip.gossip] handleMessage -> DEBU 25c9 Exiting" +"2019-04-22 06:17:26.123 UTC [gossip.gossip] handleMessage -> DEBU 25cb Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.124 UTC [gossip.gossip] handleMessage -> DEBU 25cc Exiting" +"2019-04-22 06:17:26.124 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.124 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ce Exiting" +"2019-04-22 06:17:26.125 UTC [msp] DeserializeIdentity -> DEBU 25cf Obtaining identity" +"2019-04-22 06:17:26.125 UTC [msp] DeserializeIdentity -> DEBU 25d0 Obtaining identity" +"2019-04-22 06:17:26.126 UTC [msp] DeserializeIdentity -> DEBU 25d1 Obtaining identity" +"2019-04-22 06:17:26.126 UTC [gossip.comm] Send -> DEBU 25d2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:26.127 UTC [msp] DeserializeIdentity -> DEBU 25d3 Obtaining identity" +"2019-04-22 06:17:26.127 UTC [gossip.comm] sendToEndpoint -> DEBU 25d4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.127 UTC [gossip.comm] sendToEndpoint -> DEBU 25d5 Exiting" +"2019-04-22 06:17:26.128 UTC [gossip.comm] Send -> DEBU 25d6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:26.129 UTC [gossip.comm] sendToEndpoint -> DEBU 25d7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.129 UTC [gossip.comm] sendToEndpoint -> DEBU 25d8 Exiting" +"2019-04-22 06:17:26.448 UTC [gossip.election] waitForInterrupt -> DEBU 25d9 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:26.449 UTC [gossip.election] IsLeader -> DEBU 25da c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:26.449 UTC [msp.identity] Sign -> DEBU 25db Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100A1801 " +"2019-04-22 06:17:26.449 UTC [msp.identity] Sign -> DEBU 25dc Sign: digest: F05C56F2FC83D4004CC2DE475F5D8D6B46DD641419502C6833847C9B6F0FEBAD " +"2019-04-22 06:17:26.450 UTC [gossip.election] waitForInterrupt -> DEBU 25dd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:26.454 UTC [msp] DeserializeIdentity -> DEBU 25de Obtaining identity" +"2019-04-22 06:17:26.454 UTC [msp] DeserializeIdentity -> DEBU 25df Obtaining identity" +"2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e0 Obtaining identity" +"2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e1 Obtaining identity" +"2019-04-22 06:17:26.455 UTC [gossip.comm] Send -> DEBU 25e2 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e3 Obtaining identity" +"2019-04-22 06:17:26.455 UTC [msp] DeserializeIdentity -> DEBU 25e4 Obtaining identity" +"2019-04-22 06:17:26.456 UTC [gossip.comm] sendToEndpoint -> DEBU 25e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:10 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.456 UTC [gossip.comm] sendToEndpoint -> DEBU 25e6 Exiting" +"2019-04-22 06:17:26.593 UTC [gossip.comm] func1 -> DEBU 25e7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.593 UTC [gossip.gossip] handleMessage -> DEBU 25e8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.593 UTC [gossip.gossip] handleMessage -> DEBU 25e9 Exiting" +"2019-04-22 06:17:26.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU 25ea Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.595 UTC [gossip.comm] func1 -> DEBU 25eb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.595 UTC [gossip.gossip] handleMessage -> DEBU 25ec Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.595 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 25ed Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:26.595 UTC [msp] DeserializeIdentity -> DEBU 25ee Obtaining identity" +"2019-04-22 06:17:26.596 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:26.596 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:26.596 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:26.596 UTC [policies] Evaluate -> DEBU 25f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:26.596 UTC [policies] Evaluate -> DEBU 25f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:26.596 UTC [policies] Evaluate -> DEBU 25f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:26.596 UTC [cauthdsl] func1 -> DEBU 25f5 0xc003fe9ff0 gate 1555913846596879200 evaluation starts" +"2019-04-22 06:17:26.596 UTC [cauthdsl] func2 -> DEBU 25f6 0xc003fe9ff0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:26.597 UTC [cauthdsl] func2 -> DEBU 25f7 0xc003fe9ff0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:26.597 UTC [cauthdsl] func2 -> DEBU 25f8 0xc003fe9ff0 principal matched by identity 0" +"2019-04-22 06:17:26.597 UTC [msp.identity] Verify -> DEBU 25f9 Verify: digest = 00000000 20 6b 52 a4 8a 4f e0 5c 25 8a 94 45 2d 61 48 8e | kR..O.\%..E-aH.| +00000010 20 73 80 01 42 2c 16 d2 43 40 80 30 dd 2a a8 b0 | s..B,..C@.0.*..|" +"2019-04-22 06:17:26.597 UTC [msp.identity] Verify -> DEBU 25fa Verify: sig = 00000000 30 44 02 20 20 53 3d 69 ea aa 58 85 8b 18 95 d5 |0D. S=i..X.....| +00000010 1a f7 cc d6 24 77 20 1e f9 12 ba 7f 1f f1 99 93 |....$w .........| +00000020 e6 1f 4b 88 02 20 75 81 08 2e 77 a2 3a f0 74 f8 |..K.. u...w.:.t.| +00000030 3a 6e 08 93 c0 95 db d8 e7 81 a8 33 5a 0e 31 54 |:n.........3Z.1T| +00000040 e8 d7 06 c9 58 2a |....X*|" +"2019-04-22 06:17:26.597 UTC [cauthdsl] func2 -> DEBU 25fb 0xc003fe9ff0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:26.597 UTC [cauthdsl] func1 -> DEBU 25fc 0xc003fe9ff0 gate 1555913846596879200 evaluation succeeds" +"2019-04-22 06:17:26.597 UTC [policies] Evaluate -> DEBU 25fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:26.597 UTC [policies] Evaluate -> DEBU 25fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:26.598 UTC [policies] Evaluate -> DEBU 25ff Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:26.598 UTC [policies] Evaluate -> DEBU 2600 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:26.598 UTC [gossip.discovery] handleAliveMessage -> DEBU 2601 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.598 UTC [gossip.discovery] learnExistingMembers -> DEBU 2602 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:26.598 UTC [gossip.discovery] learnExistingMembers -> DEBU 2603 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 " +"2019-04-22 06:17:26.598 UTC [gossip.discovery] learnExistingMembers -> DEBU 2604 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 " +"2019-04-22 06:17:26.599 UTC [gossip.discovery] learnExistingMembers -> DEBU 2605 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:26.599 UTC [gossip.discovery] learnExistingMembers -> DEBU 2606 Exiting" +"2019-04-22 06:17:26.599 UTC [gossip.discovery] handleAliveMessage -> DEBU 2607 Exiting" +"2019-04-22 06:17:26.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2608 Exiting" +"2019-04-22 06:17:26.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2609 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 260a Exiting" +"2019-04-22 06:17:26.599 UTC [gossip.gossip] handleMessage -> DEBU 260b Exiting" +"2019-04-22 06:17:26.603 UTC [msp] DeserializeIdentity -> DEBU 260c Obtaining identity" +"2019-04-22 06:17:26.603 UTC [msp] DeserializeIdentity -> DEBU 260d Obtaining identity" +"2019-04-22 06:17:26.603 UTC [msp] DeserializeIdentity -> DEBU 260e Obtaining identity" +"2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 260f Obtaining identity" +"2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2610 Obtaining identity" +"2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2611 Obtaining identity" +"2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2612 Obtaining identity" +"2019-04-22 06:17:26.604 UTC [gossip.comm] Send -> DEBU 2613 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2614 Obtaining identity" +"2019-04-22 06:17:26.604 UTC [msp] DeserializeIdentity -> DEBU 2615 Obtaining identity" +"2019-04-22 06:17:26.605 UTC [gossip.comm] Send -> DEBU 2616 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 2617 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 2618 Exiting" +"2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 2619 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.605 UTC [gossip.comm] sendToEndpoint -> DEBU 261a Exiting" +"2019-04-22 06:17:26.605 UTC [gossip.gossip] handleMessage -> DEBU 261b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.605 UTC [gossip.gossip] handleMessage -> DEBU 261c Exiting" +"2019-04-22 06:17:26.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 261d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 261e Exiting" +"2019-04-22 06:17:26.872 UTC [gossip.pull] Hello -> DEBU 261f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:26.873 UTC [gossip.comm] Send -> DEBU 2620 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:26.873 UTC [gossip.pull] Hello -> DEBU 2621 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:26.873 UTC [gossip.comm] sendToEndpoint -> DEBU 2622 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.874 UTC [gossip.comm] sendToEndpoint -> DEBU 2624 Exiting" +"2019-04-22 06:17:26.874 UTC [gossip.comm] Send -> DEBU 2623 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:26.874 UTC [gossip.pull] Hello -> DEBU 2625 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:26.875 UTC [gossip.comm] Send -> DEBU 2626 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:26.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2628 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2629 Exiting" +"2019-04-22 06:17:26.875 UTC [gossip.comm] func1 -> DEBU 2627 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4603628502522413175 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.876 UTC [gossip.gossip] handleMessage -> DEBU 262a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4603628502522413175 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.875 UTC [gossip.comm] sendToEndpoint -> DEBU 262b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.876 UTC [gossip.comm] sendToEndpoint -> DEBU 262c Exiting" +"2019-04-22 06:17:26.877 UTC [gossip.pull] HandleMessage -> DEBU 262d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4603628502522413175 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.879 UTC [gossip.gossip] handleMessage -> DEBU 262f Exiting" +"2019-04-22 06:17:26.879 UTC [gossip.gossip] handleMessage -> DEBU 2630 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14899484622785461077 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.880 UTC [gossip.pull] HandleMessage -> DEBU 2631 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14899484622785461077 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.879 UTC [gossip.comm] func1 -> DEBU 262e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3038898488532442087 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.880 UTC [gossip.gossip] handleMessage -> DEBU 2632 Exiting" +"2019-04-22 06:17:26.881 UTC [gossip.gossip] handleMessage -> DEBU 2633 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3038898488532442087 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.881 UTC [gossip.pull] HandleMessage -> DEBU 2634 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3038898488532442087 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.881 UTC [gossip.gossip] handleMessage -> DEBU 2635 Exiting" +"2019-04-22 06:17:26.913 UTC [msp.identity] Sign -> DEBU 2636 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151023 " +"2019-04-22 06:17:26.913 UTC [msp.identity] Sign -> DEBU 2637 Sign: digest: 0056B1D0BBA245F810D6B893FC19ADD881FAE1309FF9497780C5A044DBB6CC38 " +"2019-04-22 06:17:26.913 UTC [msp.identity] Sign -> DEBU 2638 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:26.914 UTC [msp.identity] Sign -> DEBU 2639 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:26.915 UTC [gossip.comm] Send -> DEBU 263a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:26.915 UTC [msp] DeserializeIdentity -> DEBU 263b Obtaining identity" +"2019-04-22 06:17:26.915 UTC [gossip.comm] Send -> DEBU 263c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:26.916 UTC [msp] DeserializeIdentity -> DEBU 263d Obtaining identity" +"2019-04-22 06:17:26.916 UTC [gossip.comm] Send -> DEBU 263e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:26.916 UTC [gossip.comm] sendToEndpoint -> DEBU 263f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.917 UTC [gossip.comm] sendToEndpoint -> DEBU 2640 Exiting" +"2019-04-22 06:17:26.917 UTC [gossip.comm] sendToEndpoint -> DEBU 2641 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.917 UTC [gossip.comm] sendToEndpoint -> DEBU 2642 Exiting" +"2019-04-22 06:17:26.918 UTC [gossip.comm] sendToEndpoint -> DEBU 2643 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.918 UTC [gossip.comm] sendToEndpoint -> DEBU 2644 Exiting" +"2019-04-22 06:17:26.923 UTC [gossip.comm] func1 -> DEBU 2645 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.924 UTC [gossip.gossip] handleMessage -> DEBU 2647 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.924 UTC [gossip.gossip] handleMessage -> DEBU 2648 Exiting" +"2019-04-22 06:17:26.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2649 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.923 UTC [gossip.comm] func1 -> DEBU 2646 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 264a Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:26.927 UTC [msp.identity] Verify -> DEBU 264c Verify: digest = 00000000 00 56 b1 d0 bb a2 45 f8 10 d6 b8 93 fc 19 ad d8 |.V....E.........| +00000010 81 fa e1 30 9f f9 49 77 80 c5 a0 44 db b6 cc 38 |...0..Iw...D...8|" +"2019-04-22 06:17:26.927 UTC [msp.identity] Verify -> DEBU 264d Verify: sig = 00000000 30 44 02 20 5f aa 8a 64 a4 23 ea c6 3f 46 27 d3 |0D. _..d.#..?F'.| +00000010 4f 07 b5 75 e1 28 89 95 83 b2 e9 b5 13 c4 75 30 |O..u.(........u0| +00000020 3e ea 58 19 02 20 56 23 14 1f 9a 04 a7 dc a9 ca |>.X.. V#........| +00000030 d5 79 af 47 54 f0 f0 2e d5 22 32 82 a9 c4 d0 be |.y.GT...."2.....| +00000040 8d 91 a5 79 3a 78 |...y:x|" +"2019-04-22 06:17:26.927 UTC [gossip.gossip] handleMessage -> DEBU 264b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.928 UTC [msp.identity] Verify -> DEBU 264e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:26.930 UTC [msp.identity] Verify -> DEBU 264f Verify: sig = 00000000 30 45 02 21 00 a7 64 41 01 a8 57 f3 75 a0 73 0a |0E.!..dA..W.u.s.| +00000010 d1 02 08 e8 a5 21 2f 62 d7 30 af 1a 5d 3d e2 69 |.....!/b.0..]=.i| +00000020 b9 5f 9d e5 00 02 20 48 1e a0 cd f5 1f d1 97 69 |._.... H.......i| +00000030 ca 36 00 79 f2 09 5d 55 7f ef 1e 41 57 76 72 20 |.6.y..]U...AWvr | +00000040 8c 74 9a 0f 29 27 4c |.t..)'L|" +"2019-04-22 06:17:26.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 2650 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:26.930 UTC [gossip.discovery] isSentByMe -> DEBU 2651 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:26.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 2652 Exiting" +"2019-04-22 06:17:26.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2653 Exiting" +"2019-04-22 06:17:26.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2654 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2655 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:26.933 UTC [msp.identity] Verify -> DEBU 2656 Verify: digest = 00000000 00 56 b1 d0 bb a2 45 f8 10 d6 b8 93 fc 19 ad d8 |.V....E.........| +00000010 81 fa e1 30 9f f9 49 77 80 c5 a0 44 db b6 cc 38 |...0..Iw...D...8|" +"2019-04-22 06:17:26.933 UTC [msp.identity] Verify -> DEBU 2657 Verify: sig = 00000000 30 44 02 20 5f aa 8a 64 a4 23 ea c6 3f 46 27 d3 |0D. _..d.#..?F'.| +00000010 4f 07 b5 75 e1 28 89 95 83 b2 e9 b5 13 c4 75 30 |O..u.(........u0| +00000020 3e ea 58 19 02 20 56 23 14 1f 9a 04 a7 dc a9 ca |>.X.. V#........| +00000030 d5 79 af 47 54 f0 f0 2e d5 22 32 82 a9 c4 d0 be |.y.GT...."2.....| +00000040 8d 91 a5 79 3a 78 |...y:x|" +"2019-04-22 06:17:26.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 2659 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.935 UTC [gossip.discovery] isSentByMe -> DEBU 265a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.933 UTC [gossip.gossip] handleMessage -> DEBU 2658 Exiting" +"2019-04-22 06:17:26.936 UTC [gossip.gossip] handleMessage -> DEBU 265c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 265b Exiting" +"2019-04-22 06:17:26.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 265d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:26.936 UTC [msp] DeserializeIdentity -> DEBU 265e Obtaining identity" +"2019-04-22 06:17:26.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 265f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:26.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2660 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:26.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2661 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:26.937 UTC [policies] Evaluate -> DEBU 2662 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:26.937 UTC [policies] Evaluate -> DEBU 2663 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:26.937 UTC [policies] Evaluate -> DEBU 2664 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:26.937 UTC [cauthdsl] func1 -> DEBU 2665 0xc0042dfeb0 gate 1555913846937697600 evaluation starts" +"2019-04-22 06:17:26.937 UTC [cauthdsl] func2 -> DEBU 2666 0xc0042dfeb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:26.937 UTC [cauthdsl] func2 -> DEBU 2667 0xc0042dfeb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:26.938 UTC [cauthdsl] func2 -> DEBU 2668 0xc0042dfeb0 principal matched by identity 0" +"2019-04-22 06:17:26.938 UTC [msp.identity] Verify -> DEBU 2669 Verify: digest = 00000000 f1 e5 67 88 67 58 e4 ac 85 06 2f 5d 05 05 a7 05 |..g.gX..../]....| +00000010 e6 4f 2c 34 18 e8 e8 86 06 5e f2 28 c6 2a c2 57 |.O,4.....^.(.*.W|" +"2019-04-22 06:17:26.938 UTC [msp.identity] Verify -> DEBU 266a Verify: sig = 00000000 30 45 02 21 00 a0 7f 3c 19 0e 93 82 ad 9b b0 88 |0E.!...<........| +00000010 06 e4 d3 d7 12 03 29 bd 48 10 b8 ed 4c 91 d8 e2 |......).H...L...| +00000020 c9 c9 01 b5 f0 02 20 69 3b ac 89 d1 e6 5a 4e 1f |...... i;....ZN.| +00000030 33 07 39 0d 58 04 a6 4a bc 5b 9d f3 2a 1e 4c 4c |3.9.X..J.[..*.LL| +00000040 61 1a f1 7e f8 cb a0 |a..~...|" +"2019-04-22 06:17:26.938 UTC [cauthdsl] func2 -> DEBU 266b 0xc0042dfeb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:26.938 UTC [cauthdsl] func1 -> DEBU 266c 0xc0042dfeb0 gate 1555913846937697600 evaluation succeeds" +"2019-04-22 06:17:26.938 UTC [policies] Evaluate -> DEBU 266d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:26.938 UTC [policies] Evaluate -> DEBU 266e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:26.938 UTC [policies] Evaluate -> DEBU 266f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:26.939 UTC [policies] Evaluate -> DEBU 2670 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:26.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 2671 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:26.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 2672 Exiting" +"2019-04-22 06:17:26.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2673 Exiting" +"2019-04-22 06:17:26.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2674 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:26.939 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2675 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:26.940 UTC [msp.identity] Verify -> DEBU 2676 Verify: digest = 00000000 00 56 b1 d0 bb a2 45 f8 10 d6 b8 93 fc 19 ad d8 |.V....E.........| +00000010 81 fa e1 30 9f f9 49 77 80 c5 a0 44 db b6 cc 38 |...0..Iw...D...8|" +"2019-04-22 06:17:26.940 UTC [msp.identity] Verify -> DEBU 2677 Verify: sig = 00000000 30 44 02 20 5f aa 8a 64 a4 23 ea c6 3f 46 27 d3 |0D. _..d.#..?F'.| +00000010 4f 07 b5 75 e1 28 89 95 83 b2 e9 b5 13 c4 75 30 |O..u.(........u0| +00000020 3e ea 58 19 02 20 56 23 14 1f 9a 04 a7 dc a9 ca |>.X.. V#........| +00000030 d5 79 af 47 54 f0 f0 2e d5 22 32 82 a9 c4 d0 be |.y.GT...."2.....| +00000040 8d 91 a5 79 3a 78 |...y:x|" +"2019-04-22 06:17:26.940 UTC [gossip.gossip] handleMessage -> DEBU 2678 Exiting" +"2019-04-22 06:17:26.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 2679 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.941 UTC [gossip.discovery] isSentByMe -> DEBU 267a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:35 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:26.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 267b Exiting" +"2019-04-22 06:17:26.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 267c Exiting" +"2019-04-22 06:17:27.017 UTC [gossip.gossip] handleMessage -> DEBU 267d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.019 UTC [gossip.gossip] handleMessage -> DEBU 267e Exiting" +"2019-04-22 06:17:27.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 267f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.020 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2680 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:27.020 UTC [msp] DeserializeIdentity -> DEBU 2681 Obtaining identity" +"2019-04-22 06:17:27.021 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2682 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:27.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2683 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:27.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2684 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:27.022 UTC [policies] Evaluate -> DEBU 2685 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:27.022 UTC [policies] Evaluate -> DEBU 2686 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:27.023 UTC [policies] Evaluate -> DEBU 2687 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:27.023 UTC [cauthdsl] func1 -> DEBU 2688 0xc0044d28a0 gate 1555913847023962000 evaluation starts" +"2019-04-22 06:17:27.024 UTC [cauthdsl] func2 -> DEBU 2689 0xc0044d28a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:27.024 UTC [cauthdsl] func2 -> DEBU 268a 0xc0044d28a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:27.024 UTC [cauthdsl] func2 -> DEBU 268b 0xc0044d28a0 principal matched by identity 0" +"2019-04-22 06:17:27.025 UTC [msp.identity] Verify -> DEBU 268c Verify: digest = 00000000 92 75 1a 7a 21 f8 5e e3 1e 02 01 18 33 b4 a8 99 |.u.z!.^.....3...| +00000010 95 7b ff de 05 a6 2f be cd 7d a7 d1 b9 a6 4b cc |.{..../..}....K.|" +"2019-04-22 06:17:27.025 UTC [msp.identity] Verify -> DEBU 268d Verify: sig = 00000000 30 45 02 21 00 ec ad 15 7d 3e 88 e5 79 0e 22 c2 |0E.!....}>..y.".| +00000010 3e eb c7 4a 16 0f 3d 5c da 55 57 76 20 17 0e 9c |>..J..=\.UWv ...| +00000020 92 f3 49 5a 98 02 20 47 af f6 ad 32 9b 4f 02 bc |..IZ.. G...2.O..| +00000030 9a 3f f6 7c a5 d2 15 98 21 4f 0b fe 5b c0 5a f4 |.?.|....!O..[.Z.| +00000040 7b 53 64 06 de c6 d2 |{Sd....|" +"2019-04-22 06:17:27.028 UTC [cauthdsl] func2 -> DEBU 268e 0xc0044d28a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:27.028 UTC [cauthdsl] func1 -> DEBU 268f 0xc0044d28a0 gate 1555913847023962000 evaluation succeeds" +"2019-04-22 06:17:27.029 UTC [policies] Evaluate -> DEBU 2690 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:27.029 UTC [policies] Evaluate -> DEBU 2691 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:27.029 UTC [policies] Evaluate -> DEBU 2692 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:27.030 UTC [policies] Evaluate -> DEBU 2693 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:27.030 UTC [gossip.comm] func1 -> DEBU 2694 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.031 UTC [gossip.gossip] handleMessage -> DEBU 2695 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.031 UTC [gossip.comm] func1 -> DEBU 2696 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.031 UTC [gossip.discovery] handleAliveMessage -> DEBU 2697 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 2698 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:27.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 2699 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 " +"2019-04-22 06:17:27.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 269a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 " +"2019-04-22 06:17:27.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 269b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:34 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:27.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 269c Exiting" +"2019-04-22 06:17:27.033 UTC [gossip.discovery] handleAliveMessage -> DEBU 269d Exiting" +"2019-04-22 06:17:27.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 269e Exiting" +"2019-04-22 06:17:27.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 269f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a0 Exiting" +"2019-04-22 06:17:27.034 UTC [gossip.gossip] handleMessage -> DEBU 26a1 Exiting" +"2019-04-22 06:17:27.035 UTC [gossip.gossip] handleMessage -> DEBU 26a2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.035 UTC [gossip.gossip] handleMessage -> DEBU 26a3 Exiting" +"2019-04-22 06:17:27.035 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26a5 Exiting" +"2019-04-22 06:17:27.037 UTC [msp] DeserializeIdentity -> DEBU 26a6 Obtaining identity" +"2019-04-22 06:17:27.037 UTC [msp] DeserializeIdentity -> DEBU 26a7 Obtaining identity" +"2019-04-22 06:17:27.038 UTC [msp] DeserializeIdentity -> DEBU 26a8 Obtaining identity" +"2019-04-22 06:17:27.039 UTC [msp] DeserializeIdentity -> DEBU 26a9 Obtaining identity" +"2019-04-22 06:17:27.039 UTC [msp] DeserializeIdentity -> DEBU 26aa Obtaining identity" +"2019-04-22 06:17:27.039 UTC [msp] DeserializeIdentity -> DEBU 26ab Obtaining identity" +"2019-04-22 06:17:27.040 UTC [gossip.comm] Send -> DEBU 26ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:27.040 UTC [msp] DeserializeIdentity -> DEBU 26ad Obtaining identity" +"2019-04-22 06:17:27.041 UTC [msp] DeserializeIdentity -> DEBU 26ae Obtaining identity" +"2019-04-22 06:17:27.041 UTC [gossip.comm] Send -> DEBU 26af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:27.041 UTC [gossip.comm] sendToEndpoint -> DEBU 26b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.042 UTC [gossip.comm] sendToEndpoint -> DEBU 26b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:27.042 UTC [gossip.comm] sendToEndpoint -> DEBU 26b3 Exiting" +"2019-04-22 06:17:27.042 UTC [gossip.comm] sendToEndpoint -> DEBU 26b2 Exiting" +"2019-04-22 06:17:27.130 UTC [gossip.comm] func1 -> DEBU 26b4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.131 UTC [gossip.gossip] handleMessage -> DEBU 26b5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.131 UTC [gossip.pull] HandleMessage -> DEBU 26b6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.132 UTC [gossip.pull] SendDigest -> DEBU 26b7 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:27.132 UTC [gossip.gossip] handleMessage -> DEBU 26b8 Exiting" +"2019-04-22 06:17:27.155 UTC [gossip.comm] func1 -> DEBU 26b9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.155 UTC [gossip.gossip] handleMessage -> DEBU 26ba Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.155 UTC [gossip.gossip] handleMessage -> DEBU 26bb Exiting" +"2019-04-22 06:17:27.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26bd Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:27.156 UTC [msp.identity] Verify -> DEBU 26be Verify: digest = 00000000 3c 03 93 f5 2b b3 53 36 f4 13 b2 6b c4 6f 17 3a |<...+.S6...k.o.:| +00000010 39 da 5a d7 1b db 27 5f 40 85 55 ab e2 0e ad e9 |9.Z...'_@.U.....|" +"2019-04-22 06:17:27.156 UTC [msp.identity] Verify -> DEBU 26bf Verify: sig = 00000000 30 45 02 21 00 f9 0b 19 8c 2d cb 9c 7e f2 13 0d |0E.!.....-..~...| +00000010 db 8a 6c 46 88 ed fd 93 1b 75 4a 3c 65 6e e3 36 |..lF.....uJ.i.!c| +00000030 24 20 96 b1 7d d7 4a 71 34 50 eb d7 0d 8f b6 e0 |$ ..}.Jq4P......| +00000040 b6 d4 e9 c3 33 fb 84 |....3..|" +"2019-04-22 06:17:27.157 UTC [msp.identity] Verify -> DEBU 26c0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:27.157 UTC [msp.identity] Verify -> DEBU 26c1 Verify: sig = 00000000 30 45 02 21 00 da fd 0d 9f 7b 5c 12 0f 6c d9 c0 |0E.!.....{\..l..| +00000010 2e f3 97 1d 9f eb aa 3c 35 48 5b 49 a5 fe 94 05 |.......<5H[I....| +00000020 64 08 6c f2 2f 02 20 61 16 a0 ae 0d f1 a2 26 10 |d.l./. a......&.| +00000030 3d 7a 81 2a 35 a0 5f 32 53 ca e4 c0 fc 4e 30 3d |=z.*5._2S....N0=| +00000040 47 40 08 e1 f9 d2 22 |G@...."|" +"2019-04-22 06:17:27.159 UTC [gossip.discovery] handleAliveMessage -> DEBU 26c2 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c3 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c4 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 " +"2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c5 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 " +"2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c6 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:27.162 UTC [gossip.discovery] learnExistingMembers -> DEBU 26c7 Exiting" +"2019-04-22 06:17:27.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 26c8 Exiting" +"2019-04-22 06:17:27.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26c9 Exiting" +"2019-04-22 06:17:27.163 UTC [gossip.discovery] sendMemResponse -> DEBU 26ca Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:27.164 UTC [msp] DeserializeIdentity -> DEBU 26cb Obtaining identity" +"2019-04-22 06:17:27.165 UTC [msp] DeserializeIdentity -> DEBU 26cc Obtaining identity" +"2019-04-22 06:17:27.165 UTC [gossip.comm] Send -> DEBU 26cd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:27.165 UTC [gossip.discovery] sendMemResponse -> DEBU 26ce Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:27.165 UTC [gossip.comm] sendToEndpoint -> DEBU 26cf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.165 UTC [gossip.comm] sendToEndpoint -> DEBU 26d0 Exiting" +"2019-04-22 06:17:27.589 UTC [gossip.comm] func1 -> DEBU 26d1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.590 UTC [gossip.gossip] handleMessage -> DEBU 26d2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.590 UTC [gossip.pull] HandleMessage -> DEBU 26d3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.591 UTC [msp] DeserializeIdentity -> DEBU 26d4 Obtaining identity" +"2019-04-22 06:17:27.591 UTC [msp] DeserializeIdentity -> DEBU 26d5 Obtaining identity" +"2019-04-22 06:17:27.591 UTC [msp] DeserializeIdentity -> DEBU 26d6 Obtaining identity" +"2019-04-22 06:17:27.592 UTC [msp] DeserializeIdentity -> DEBU 26d7 Obtaining identity" +"2019-04-22 06:17:27.592 UTC [msp] DeserializeIdentity -> DEBU 26d8 Obtaining identity" +"2019-04-22 06:17:27.593 UTC [msp] DeserializeIdentity -> DEBU 26d9 Obtaining identity" +"2019-04-22 06:17:27.593 UTC [gossip.pull] SendDigest -> DEBU 26da Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:27.594 UTC [gossip.gossip] handleMessage -> DEBU 26db Exiting" +"2019-04-22 06:17:27.601 UTC [gossip.comm] func1 -> DEBU 26dc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.602 UTC [gossip.gossip] handleMessage -> DEBU 26dd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.603 UTC [gossip.gossip] handleMessage -> DEBU 26de Exiting" +"2019-04-22 06:17:27.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.604 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 26e0 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:27.604 UTC [msp] DeserializeIdentity -> DEBU 26e1 Obtaining identity" +"2019-04-22 06:17:27.605 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26e2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:27.605 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:27.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26e4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:27.613 UTC [policies] Evaluate -> DEBU 26e5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:27.613 UTC [policies] Evaluate -> DEBU 26e6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:27.614 UTC [policies] Evaluate -> DEBU 26e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:27.614 UTC [cauthdsl] func1 -> DEBU 26e8 0xc003930430 gate 1555913847614565200 evaluation starts" +"2019-04-22 06:17:27.614 UTC [cauthdsl] func2 -> DEBU 26e9 0xc003930430 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:27.615 UTC [cauthdsl] func2 -> DEBU 26ea 0xc003930430 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:27.615 UTC [cauthdsl] func2 -> DEBU 26eb 0xc003930430 principal matched by identity 0" +"2019-04-22 06:17:27.616 UTC [msp.identity] Verify -> DEBU 26ec Verify: digest = 00000000 44 b2 06 e3 dd 55 de 0a 7d 7d e5 3d 63 d1 9c 5c |D....U..}}.=c..\| +00000010 f1 14 f9 7e dd 4f 9d 85 8c 8a 0b 46 c7 95 f0 b5 |...~.O.....F....|" +"2019-04-22 06:17:27.616 UTC [msp.identity] Verify -> DEBU 26ed Verify: sig = 00000000 30 44 02 20 5d 3f 46 a9 ee b0 a9 d3 5c 6c 6a eb |0D. ]?F.....\lj.| +00000010 07 3c bb 75 41 61 15 d7 07 d4 53 0d 0b 8f b1 7c |.<.uAa....S....|| +00000020 f0 7b bd 8d 02 20 52 4e 09 32 a7 d7 36 f9 a4 51 |.{... RN.2..6..Q| +00000030 8c 73 4f 7b cf 85 58 fd 9c c8 c9 82 fe 2e ec 06 |.sO{..X.........| +00000040 f3 4b ef 4f 01 c2 |.K.O..|" +"2019-04-22 06:17:27.617 UTC [cauthdsl] func2 -> DEBU 26ee 0xc003930430 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:27.617 UTC [cauthdsl] func1 -> DEBU 26ef 0xc003930430 gate 1555913847614565200 evaluation succeeds" +"2019-04-22 06:17:27.617 UTC [policies] Evaluate -> DEBU 26f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:27.618 UTC [policies] Evaluate -> DEBU 26f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:27.618 UTC [policies] Evaluate -> DEBU 26f2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:27.620 UTC [policies] Evaluate -> DEBU 26f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:27.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 26f4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:27.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:27.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f6 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 " +"2019-04-22 06:17:27.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f7 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 " +"2019-04-22 06:17:27.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:37 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:27.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 26f9 Exiting" +"2019-04-22 06:17:27.623 UTC [gossip.discovery] handleAliveMessage -> DEBU 26fa Exiting" +"2019-04-22 06:17:27.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 26fb Exiting" +"2019-04-22 06:17:27.623 UTC [gossip.discovery] sendMemResponse -> DEBU 26fc Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:27.624 UTC [msp] DeserializeIdentity -> DEBU 26fd Obtaining identity" +"2019-04-22 06:17:27.624 UTC [msp] DeserializeIdentity -> DEBU 26fe Obtaining identity" +"2019-04-22 06:17:27.625 UTC [msp] DeserializeIdentity -> DEBU 26ff Obtaining identity" +"2019-04-22 06:17:27.625 UTC [gossip.comm] Send -> DEBU 2700 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:27.625 UTC [gossip.discovery] sendMemResponse -> DEBU 2701 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:27.626 UTC [gossip.comm] sendToEndpoint -> DEBU 2702 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:27.626 UTC [gossip.comm] sendToEndpoint -> DEBU 2703 Exiting" +"2019-04-22 06:17:28.007 UTC [gossip.gossip] handleMessage -> DEBU 2704 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.007 UTC [gossip.pull] HandleMessage -> DEBU 2705 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.007 UTC [msp] DeserializeIdentity -> DEBU 2706 Obtaining identity" +"2019-04-22 06:17:28.008 UTC [msp] DeserializeIdentity -> DEBU 2707 Obtaining identity" +"2019-04-22 06:17:28.008 UTC [msp] DeserializeIdentity -> DEBU 2708 Obtaining identity" +"2019-04-22 06:17:28.009 UTC [msp] DeserializeIdentity -> DEBU 2709 Obtaining identity" +"2019-04-22 06:17:28.009 UTC [msp] DeserializeIdentity -> DEBU 270a Obtaining identity" +"2019-04-22 06:17:28.009 UTC [msp] DeserializeIdentity -> DEBU 270b Obtaining identity" +"2019-04-22 06:17:28.009 UTC [gossip.pull] SendDigest -> DEBU 270c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:28.010 UTC [gossip.gossip] handleMessage -> DEBU 270d Exiting" +"2019-04-22 06:17:28.028 UTC [gossip.gossip] handleMessage -> DEBU 270e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.029 UTC [gossip.gossip] handleMessage -> DEBU 270f Exiting" +"2019-04-22 06:17:28.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2710 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.030 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2711 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:28.030 UTC [msp] DeserializeIdentity -> DEBU 2712 Obtaining identity" +"2019-04-22 06:17:28.031 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2713 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:28.031 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2714 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.033 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2715 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.033 UTC [policies] Evaluate -> DEBU 2716 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:28.033 UTC [policies] Evaluate -> DEBU 2717 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:28.034 UTC [policies] Evaluate -> DEBU 2718 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:28.034 UTC [cauthdsl] func1 -> DEBU 2719 0xc0039a71c0 gate 1555913848034397800 evaluation starts" +"2019-04-22 06:17:28.034 UTC [cauthdsl] func2 -> DEBU 271a 0xc0039a71c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:28.035 UTC [cauthdsl] func2 -> DEBU 271b 0xc0039a71c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:28.035 UTC [cauthdsl] func2 -> DEBU 271c 0xc0039a71c0 principal matched by identity 0" +"2019-04-22 06:17:28.036 UTC [msp.identity] Verify -> DEBU 271d Verify: digest = 00000000 1c a2 82 41 69 17 74 79 86 65 84 a5 16 d7 a0 0e |...Ai.ty.e......| +00000010 ee b9 9c 52 84 20 0a 3d 93 7b f6 d7 99 65 33 76 |...R. .=.{...e3v|" +"2019-04-22 06:17:28.036 UTC [msp.identity] Verify -> DEBU 271e Verify: sig = 00000000 30 45 02 21 00 ac e9 5b 5f ab 92 f3 ca 29 4b 2b |0E.!...[_....)K+| +00000010 17 83 13 6c 96 a0 d8 57 31 10 16 de bf e8 4d 27 |...l...W1.....M'| +00000020 95 fd 76 46 55 02 20 06 0f 78 4e b1 18 b0 32 d8 |..vFU. ..xN...2.| +00000030 e8 9b 65 c5 e7 a2 3a 71 02 83 f4 ad 86 c2 20 99 |..e...:q...... .| +00000040 50 1c b8 ec 05 92 de |P......|" +"2019-04-22 06:17:28.038 UTC [cauthdsl] func2 -> DEBU 271f 0xc0039a71c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:28.039 UTC [cauthdsl] func1 -> DEBU 2720 0xc0039a71c0 gate 1555913848034397800 evaluation succeeds" +"2019-04-22 06:17:28.039 UTC [policies] Evaluate -> DEBU 2721 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.039 UTC [policies] Evaluate -> DEBU 2722 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.040 UTC [policies] Evaluate -> DEBU 2723 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:28.040 UTC [policies] Evaluate -> DEBU 2724 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:28.041 UTC [gossip.discovery] handleAliveMessage -> DEBU 2725 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:28.041 UTC [gossip.discovery] learnExistingMembers -> DEBU 2726 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:28.041 UTC [gossip.discovery] learnExistingMembers -> DEBU 2727 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 " +"2019-04-22 06:17:28.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 2728 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 " +"2019-04-22 06:17:28.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 2729 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:35 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:28.042 UTC [gossip.discovery] learnExistingMembers -> DEBU 272a Exiting" +"2019-04-22 06:17:28.043 UTC [gossip.discovery] handleAliveMessage -> DEBU 272b Exiting" +"2019-04-22 06:17:28.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 272c Exiting" +"2019-04-22 06:17:28.043 UTC [gossip.discovery] sendMemResponse -> DEBU 272d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:28.044 UTC [msp] DeserializeIdentity -> DEBU 272e Obtaining identity" +"2019-04-22 06:17:28.044 UTC [msp] DeserializeIdentity -> DEBU 272f Obtaining identity" +"2019-04-22 06:17:28.045 UTC [msp] DeserializeIdentity -> DEBU 2730 Obtaining identity" +"2019-04-22 06:17:28.045 UTC [gossip.comm] Send -> DEBU 2731 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:28.045 UTC [gossip.discovery] sendMemResponse -> DEBU 2732 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 2733 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.046 UTC [gossip.comm] sendToEndpoint -> DEBU 2734 Exiting" +"2019-04-22 06:17:28.388 UTC [msp] DeserializeIdentity -> DEBU 2735 Obtaining identity" +"2019-04-22 06:17:28.389 UTC [msp] DeserializeIdentity -> DEBU 2736 Obtaining identity" +"2019-04-22 06:17:28.389 UTC [gossip.comm] Send -> DEBU 2737 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:28.389 UTC [gossip.comm] sendToEndpoint -> DEBU 2738 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.390 UTC [gossip.comm] sendToEndpoint -> DEBU 2739 Exiting" +"2019-04-22 06:17:28.390 UTC [gossip.comm] sendToEndpoint -> DEBU 273a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.391 UTC [gossip.comm] sendToEndpoint -> DEBU 273b Exiting" +"2019-04-22 06:17:28.391 UTC [gossip.comm] func1 -> DEBU 273c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.392 UTC [gossip.gossip] handleMessage -> DEBU 273d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.392 UTC [msp.identity] Verify -> DEBU 273e Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:28.392 UTC [msp.identity] Verify -> DEBU 273f Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:28.393 UTC [msp] DeserializeIdentity -> DEBU 2740 Obtaining identity" +"2019-04-22 06:17:28.393 UTC [msp] DeserializeIdentity -> DEBU 2741 Obtaining identity" +"2019-04-22 06:17:28.393 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2742 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:28.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2743 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.393 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2744 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.393 UTC [policies] Evaluate -> DEBU 2745 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:28.393 UTC [policies] Evaluate -> DEBU 2746 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:28.393 UTC [policies] Evaluate -> DEBU 2747 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:28.393 UTC [cauthdsl] func1 -> DEBU 2748 0xc003d4ae00 gate 1555913848393510600 evaluation starts" +"2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 2749 0xc003d4ae00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 274a 0xc003d4ae00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 274b 0xc003d4ae00 principal matched by identity 0" +"2019-04-22 06:17:28.393 UTC [msp.identity] Verify -> DEBU 274c Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:28.393 UTC [msp.identity] Verify -> DEBU 274d Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:28.393 UTC [cauthdsl] func2 -> DEBU 274e 0xc003d4ae00 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:28.394 UTC [cauthdsl] func1 -> DEBU 274f 0xc003d4ae00 gate 1555913848393510600 evaluation succeeds" +"2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2750 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2751 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2752 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 2753 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:28.394 UTC [msp.identity] Verify -> DEBU 2754 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:28.394 UTC [msp.identity] Verify -> DEBU 2755 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:28.394 UTC [msp] DeserializeIdentity -> DEBU 2756 Obtaining identity" +"2019-04-22 06:17:28.394 UTC [msp] DeserializeIdentity -> DEBU 2757 Obtaining identity" +"2019-04-22 06:17:28.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2758 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:28.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2759 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 275a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 275b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 275c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:28.394 UTC [policies] Evaluate -> DEBU 275d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:28.394 UTC [cauthdsl] func1 -> DEBU 275e 0xc003d92cf0 gate 1555913848394960500 evaluation starts" +"2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 275f 0xc003d92cf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 2760 0xc003d92cf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 2761 0xc003d92cf0 principal matched by identity 0" +"2019-04-22 06:17:28.395 UTC [msp.identity] Verify -> DEBU 2762 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:28.395 UTC [msp.identity] Verify -> DEBU 2763 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:28.395 UTC [cauthdsl] func2 -> DEBU 2764 0xc003d92cf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:28.395 UTC [cauthdsl] func1 -> DEBU 2765 0xc003d92cf0 gate 1555913848394960500 evaluation succeeds" +"2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2766 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2767 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2768 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:28.395 UTC [policies] Evaluate -> DEBU 2769 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:28.395 UTC [gossip.gossip] handleMessage -> DEBU 276a Exiting" +"2019-04-22 06:17:28.396 UTC [gossip.comm] func1 -> DEBU 276b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.396 UTC [gossip.gossip] handleMessage -> DEBU 276c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.396 UTC [msp] DeserializeIdentity -> DEBU 276d Obtaining identity" +"2019-04-22 06:17:28.396 UTC [msp] DeserializeIdentity -> DEBU 276e Obtaining identity" +"2019-04-22 06:17:28.397 UTC [msp] DeserializeIdentity -> DEBU 276f Obtaining identity" +"2019-04-22 06:17:28.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2770 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:28.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2771 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2772 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.397 UTC [policies] Evaluate -> DEBU 2773 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:28.397 UTC [policies] Evaluate -> DEBU 2774 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:28.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2775 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.398 UTC [policies] Evaluate -> DEBU 2776 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:28.398 UTC [cauthdsl] func1 -> DEBU 2777 0xc003eb2960 gate 1555913848398895800 evaluation starts" +"2019-04-22 06:17:28.399 UTC [cauthdsl] func2 -> DEBU 2778 0xc003eb2960 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:28.399 UTC [cauthdsl] func2 -> DEBU 2779 0xc003eb2960 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:28.399 UTC [cauthdsl] func2 -> DEBU 277a 0xc003eb2960 principal matched by identity 0" +"2019-04-22 06:17:28.398 UTC [gossip.comm] sendToEndpoint -> DEBU 277b Exiting" +"2019-04-22 06:17:28.400 UTC [msp.identity] Verify -> DEBU 277c Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:28.400 UTC [msp.identity] Verify -> DEBU 277d Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:28.400 UTC [cauthdsl] func2 -> DEBU 277e 0xc003eb2960 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:28.400 UTC [cauthdsl] func1 -> DEBU 277f 0xc003eb2960 gate 1555913848398895800 evaluation succeeds" +"2019-04-22 06:17:28.400 UTC [policies] Evaluate -> DEBU 2780 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.400 UTC [policies] Evaluate -> DEBU 2781 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.400 UTC [policies] Evaluate -> DEBU 2782 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 2783 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:28.401 UTC [msp] DeserializeIdentity -> DEBU 2784 Obtaining identity" +"2019-04-22 06:17:28.401 UTC [msp] DeserializeIdentity -> DEBU 2785 Obtaining identity" +"2019-04-22 06:17:28.401 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2786 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:28.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2787 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2788 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 2789 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 278a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:28.401 UTC [policies] Evaluate -> DEBU 278b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:28.401 UTC [cauthdsl] func1 -> DEBU 278c 0xc003f5c590 gate 1555913848401756300 evaluation starts" +"2019-04-22 06:17:28.401 UTC [cauthdsl] func2 -> DEBU 278d 0xc003f5c590 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:28.401 UTC [cauthdsl] func2 -> DEBU 278e 0xc003f5c590 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:28.401 UTC [cauthdsl] func2 -> DEBU 278f 0xc003f5c590 principal matched by identity 0" +"2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2790 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2791 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:28.402 UTC [cauthdsl] func2 -> DEBU 2792 0xc003f5c590 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:28.402 UTC [cauthdsl] func1 -> DEBU 2793 0xc003f5c590 gate 1555913848401756300 evaluation succeeds" +"2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2794 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2795 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2796 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:28.402 UTC [policies] Evaluate -> DEBU 2797 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2798 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:28.402 UTC [msp.identity] Verify -> DEBU 2799 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:28.403 UTC [msp.identity] Verify -> DEBU 279a Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:28.403 UTC [msp.identity] Verify -> DEBU 279b Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:28.403 UTC [gossip.gossip] handleMessage -> DEBU 279c Exiting" +"2019-04-22 06:17:28.403 UTC [gossip.gossip] handleMessage -> DEBU 279d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.403 UTC [msp] DeserializeIdentity -> DEBU 279e Obtaining identity" +"2019-04-22 06:17:28.403 UTC [msp] DeserializeIdentity -> DEBU 279f Obtaining identity" +"2019-04-22 06:17:28.403 UTC [msp] DeserializeIdentity -> DEBU 27a0 Obtaining identity" +"2019-04-22 06:17:28.406 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27a1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:28.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.406 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27a3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.406 UTC [policies] Evaluate -> DEBU 27a4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:28.406 UTC [policies] Evaluate -> DEBU 27a5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:28.406 UTC [policies] Evaluate -> DEBU 27a6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:28.406 UTC [cauthdsl] func1 -> DEBU 27a7 0xc0041fcee0 gate 1555913848406971300 evaluation starts" +"2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27a8 0xc0041fcee0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27a9 0xc0041fcee0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27aa 0xc0041fcee0 principal matched by identity 0" +"2019-04-22 06:17:28.407 UTC [msp.identity] Verify -> DEBU 27ab Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:28.407 UTC [msp.identity] Verify -> DEBU 27ac Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:28.407 UTC [cauthdsl] func2 -> DEBU 27ad 0xc0041fcee0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:28.407 UTC [cauthdsl] func1 -> DEBU 27ae 0xc0041fcee0 gate 1555913848406971300 evaluation succeeds" +"2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27b1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:28.407 UTC [policies] Evaluate -> DEBU 27b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:28.407 UTC [msp] DeserializeIdentity -> DEBU 27b3 Obtaining identity" +"2019-04-22 06:17:28.407 UTC [msp] DeserializeIdentity -> DEBU 27b4 Obtaining identity" +"2019-04-22 06:17:28.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:28.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27b7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:28.408 UTC [policies] Evaluate -> DEBU 27b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:28.408 UTC [policies] Evaluate -> DEBU 27b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:28.408 UTC [policies] Evaluate -> DEBU 27ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:28.408 UTC [cauthdsl] func1 -> DEBU 27bb 0xc00435a6b0 gate 1555913848408582500 evaluation starts" +"2019-04-22 06:17:28.408 UTC [cauthdsl] func2 -> DEBU 27bc 0xc00435a6b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:28.408 UTC [cauthdsl] func2 -> DEBU 27bd 0xc00435a6b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:28.408 UTC [cauthdsl] func2 -> DEBU 27be 0xc00435a6b0 principal matched by identity 0" +"2019-04-22 06:17:28.408 UTC [msp.identity] Verify -> DEBU 27bf Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:28.408 UTC [msp.identity] Verify -> DEBU 27c0 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:28.409 UTC [cauthdsl] func2 -> DEBU 27c1 0xc00435a6b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:28.409 UTC [cauthdsl] func1 -> DEBU 27c2 0xc00435a6b0 gate 1555913848408582500 evaluation succeeds" +"2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:28.409 UTC [policies] Evaluate -> DEBU 27c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27c7 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27c8 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27c9 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:28.409 UTC [msp.identity] Verify -> DEBU 27ca Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:28.410 UTC [gossip.gossip] handleMessage -> DEBU 27cb Exiting" +"2019-04-22 06:17:28.472 UTC [msp] DeserializeIdentity -> DEBU 27cc Obtaining identity" +"2019-04-22 06:17:28.472 UTC [msp] DeserializeIdentity -> DEBU 27cd Obtaining identity" +"2019-04-22 06:17:28.472 UTC [gossip.pull] Hello -> DEBU 27ce Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:28.473 UTC [msp] DeserializeIdentity -> DEBU 27cf Obtaining identity" +"2019-04-22 06:17:28.473 UTC [msp] DeserializeIdentity -> DEBU 27d0 Obtaining identity" +"2019-04-22 06:17:28.474 UTC [gossip.comm] Send -> DEBU 27d1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:28.474 UTC [gossip.comm] sendToEndpoint -> DEBU 27d2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.474 UTC [gossip.comm] sendToEndpoint -> DEBU 27d3 Exiting" +"2019-04-22 06:17:28.476 UTC [gossip.comm] func1 -> DEBU 27d4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16601679828563786798 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.476 UTC [gossip.gossip] handleMessage -> DEBU 27d5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16601679828563786798 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.476 UTC [gossip.pull] HandleMessage -> DEBU 27d6 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 16601679828563786798 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 49 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.476 UTC [gossip.gossip] handleMessage -> DEBU 27d7 Exiting" +"2019-04-22 06:17:28.646 UTC [gossip.comm] func1 -> DEBU 27d8 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.646 UTC [gossip.gossip] handleMessage -> DEBU 27d9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.647 UTC [msp] DeserializeIdentity -> DEBU 27da Obtaining identity" +"2019-04-22 06:17:28.648 UTC [msp] DeserializeIdentity -> DEBU 27db Obtaining identity" +"2019-04-22 06:17:28.648 UTC [gossip.gossip] handleMessage -> DEBU 27dc Exiting" +"2019-04-22 06:17:28.672 UTC [gossip.comm] func1 -> DEBU 27dd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.673 UTC [gossip.gossip] handleMessage -> DEBU 27de Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.673 UTC [gossip.pull] HandleMessage -> DEBU 27df GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.673 UTC [gossip.pull] SendDigest -> DEBU 27e0 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:28.673 UTC [gossip.gossip] handleMessage -> DEBU 27e1 Exiting" +"2019-04-22 06:17:28.870 UTC [gossip.gossip] handleMessage -> DEBU 27e2 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:28.871 UTC [msp] DeserializeIdentity -> DEBU 27e3 Obtaining identity" +"2019-04-22 06:17:28.871 UTC [msp] DeserializeIdentity -> DEBU 27e4 Obtaining identity" +"2019-04-22 06:17:28.872 UTC [msp] DeserializeIdentity -> DEBU 27e5 Obtaining identity" +"2019-04-22 06:17:28.872 UTC [gossip.gossip] handleMessage -> DEBU 27e6 Exiting" +"2019-04-22 06:17:29.086 UTC [gossip.comm] func1 -> DEBU 27e7 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:29.086 UTC [gossip.gossip] handleMessage -> DEBU 27e8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:29.086 UTC [msp] DeserializeIdentity -> DEBU 27e9 Obtaining identity" +"2019-04-22 06:17:29.086 UTC [msp] DeserializeIdentity -> DEBU 27ea Obtaining identity" +"2019-04-22 06:17:29.086 UTC [msp] DeserializeIdentity -> DEBU 27eb Obtaining identity" +"2019-04-22 06:17:29.087 UTC [gossip.gossip] handleMessage -> DEBU 27ec Exiting" +"2019-04-22 06:17:30.827 UTC [msp.identity] Sign -> DEBU 27ed Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151024 " +"2019-04-22 06:17:30.828 UTC [msp.identity] Sign -> DEBU 27ee Sign: digest: B240AE3821E145D38E71F6020C3D992B89DCBF6E53B0CC7F2A7708F2E21521ED " +"2019-04-22 06:17:30.828 UTC [msp.identity] Sign -> DEBU 27ef Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:30.828 UTC [msp.identity] Sign -> DEBU 27f0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:30.828 UTC [gossip.discovery] periodicalSendAlive -> DEBU 27f1 Sleeping 5s" +"2019-04-22 06:17:30.834 UTC [msp] DeserializeIdentity -> DEBU 27f2 Obtaining identity" +"2019-04-22 06:17:30.834 UTC [msp] DeserializeIdentity -> DEBU 27f3 Obtaining identity" +"2019-04-22 06:17:30.835 UTC [gossip.comm] Send -> DEBU 27f4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:30.835 UTC [msp] DeserializeIdentity -> DEBU 27f5 Obtaining identity" +"2019-04-22 06:17:30.835 UTC [gossip.comm] Send -> DEBU 27f6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:30.835 UTC [msp] DeserializeIdentity -> DEBU 27f7 Obtaining identity" +"2019-04-22 06:17:30.836 UTC [gossip.comm] Send -> DEBU 27f8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27f9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fa Exiting" +"2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fc Exiting" +"2019-04-22 06:17:30.836 UTC [gossip.comm] sendToEndpoint -> DEBU 27fd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:36 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:30.837 UTC [gossip.comm] sendToEndpoint -> DEBU 27fe Exiting" +"2019-04-22 06:17:30.875 UTC [gossip.pull] Hello -> DEBU 27ff Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:30.875 UTC [gossip.comm] Send -> DEBU 2800 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:30.875 UTC [gossip.pull] Hello -> DEBU 2801 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:30.876 UTC [gossip.comm] Send -> DEBU 2802 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:30.876 UTC [gossip.pull] Hello -> DEBU 2803 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:30.876 UTC [gossip.comm] Send -> DEBU 2804 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2805 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2806 Exiting" +"2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2807 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.877 UTC [gossip.comm] sendToEndpoint -> DEBU 2808 Exiting" +"2019-04-22 06:17:30.878 UTC [gossip.comm] sendToEndpoint -> DEBU 2809 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.878 UTC [gossip.comm] sendToEndpoint -> DEBU 280a Exiting" +"2019-04-22 06:17:30.880 UTC [gossip.comm] func1 -> DEBU 280b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225548540752222031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.880 UTC [gossip.gossip] handleMessage -> DEBU 280c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225548540752222031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.880 UTC [gossip.pull] HandleMessage -> DEBU 280d GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225548540752222031 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.880 UTC [gossip.gossip] handleMessage -> DEBU 280e Exiting" +"2019-04-22 06:17:30.881 UTC [gossip.comm] func1 -> DEBU 280f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11107884482448524324 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.881 UTC [gossip.gossip] handleMessage -> DEBU 2810 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11107884482448524324 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.881 UTC [gossip.pull] HandleMessage -> DEBU 2811 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11107884482448524324 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.882 UTC [gossip.gossip] handleMessage -> DEBU 2812 Exiting" +"2019-04-22 06:17:30.882 UTC [gossip.gossip] handleMessage -> DEBU 2813 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11404403117458605259 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.882 UTC [gossip.pull] HandleMessage -> DEBU 2814 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11404403117458605259 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.882 UTC [gossip.gossip] handleMessage -> DEBU 2815 Exiting" +"2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2816 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151025 " +"2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2817 Sign: digest: 304E60A458AE1E8B6D75992CA738AF5794051C98CCBF3A83C35A24BC91217C11 " +"2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2818 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:30.917 UTC [msp.identity] Sign -> DEBU 2819 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:30.918 UTC [msp] DeserializeIdentity -> DEBU 281a Obtaining identity" +"2019-04-22 06:17:30.918 UTC [gossip.comm] Send -> DEBU 281b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:30.919 UTC [gossip.comm] Send -> DEBU 281c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:30.919 UTC [msp] DeserializeIdentity -> DEBU 281d Obtaining identity" +"2019-04-22 06:17:30.919 UTC [gossip.comm] sendToEndpoint -> DEBU 281e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.919 UTC [gossip.comm] sendToEndpoint -> DEBU 281f Exiting" +"2019-04-22 06:17:30.920 UTC [gossip.comm] sendToEndpoint -> DEBU 2820 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.920 UTC [gossip.comm] sendToEndpoint -> DEBU 2821 Exiting" +"2019-04-22 06:17:30.919 UTC [gossip.comm] Send -> DEBU 2822 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:30.923 UTC [gossip.comm] sendToEndpoint -> DEBU 2823 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.923 UTC [gossip.comm] sendToEndpoint -> DEBU 2824 Exiting" +"2019-04-22 06:17:30.924 UTC [gossip.comm] func1 -> DEBU 2825 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.924 UTC [gossip.gossip] handleMessage -> DEBU 2826 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.924 UTC [gossip.gossip] handleMessage -> DEBU 2827 Exiting" +"2019-04-22 06:17:30.924 UTC [gossip.comm] func1 -> DEBU 2828 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.924 UTC [gossip.gossip] handleMessage -> DEBU 2829 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 282a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.925 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 282b Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:30.925 UTC [msp] DeserializeIdentity -> DEBU 282c Obtaining identity" +"2019-04-22 06:17:30.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 282d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:30.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 282e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:30.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 282f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:30.926 UTC [policies] Evaluate -> DEBU 2830 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:30.926 UTC [policies] Evaluate -> DEBU 2831 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:30.926 UTC [policies] Evaluate -> DEBU 2832 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:30.926 UTC [cauthdsl] func1 -> DEBU 2833 0xc002ed2f30 gate 1555913850926791200 evaluation starts" +"2019-04-22 06:17:30.927 UTC [cauthdsl] func2 -> DEBU 2834 0xc002ed2f30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:30.927 UTC [cauthdsl] func2 -> DEBU 2835 0xc002ed2f30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:30.927 UTC [cauthdsl] func2 -> DEBU 2836 0xc002ed2f30 principal matched by identity 0" +"2019-04-22 06:17:30.927 UTC [msp.identity] Verify -> DEBU 2837 Verify: digest = 00000000 1c a2 82 41 69 17 74 79 86 65 84 a5 16 d7 a0 0e |...Ai.ty.e......| +00000010 ee b9 9c 52 84 20 0a 3d 93 7b f6 d7 99 65 33 76 |...R. .=.{...e3v|" +"2019-04-22 06:17:30.928 UTC [msp.identity] Verify -> DEBU 2838 Verify: sig = 00000000 30 45 02 21 00 ac e9 5b 5f ab 92 f3 ca 29 4b 2b |0E.!...[_....)K+| +00000010 17 83 13 6c 96 a0 d8 57 31 10 16 de bf e8 4d 27 |...l...W1.....M'| +00000020 95 fd 76 46 55 02 20 06 0f 78 4e b1 18 b0 32 d8 |..vFU. ..xN...2.| +00000030 e8 9b 65 c5 e7 a2 3a 71 02 83 f4 ad 86 c2 20 99 |..e...:q...... .| +00000040 50 1c b8 ec 05 92 de |P......|" +"2019-04-22 06:17:30.929 UTC [cauthdsl] func2 -> DEBU 2839 0xc002ed2f30 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:30.930 UTC [cauthdsl] func1 -> DEBU 283a 0xc002ed2f30 gate 1555913850926791200 evaluation succeeds" +"2019-04-22 06:17:30.930 UTC [policies] Evaluate -> DEBU 283b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:30.931 UTC [policies] Evaluate -> DEBU 283c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:30.931 UTC [policies] Evaluate -> DEBU 283d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:30.931 UTC [policies] Evaluate -> DEBU 283e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:30.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 283f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:30.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 2840 Exiting" +"2019-04-22 06:17:30.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2841 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:30.934 UTC [msp.identity] Verify -> DEBU 2842 Verify: digest = 00000000 3c 03 93 f5 2b b3 53 36 f4 13 b2 6b c4 6f 17 3a |<...+.S6...k.o.:| +00000010 39 da 5a d7 1b db 27 5f 40 85 55 ab e2 0e ad e9 |9.Z...'_@.U.....|" +"2019-04-22 06:17:30.934 UTC [msp.identity] Verify -> DEBU 2843 Verify: sig = 00000000 30 45 02 21 00 f9 0b 19 8c 2d cb 9c 7e f2 13 0d |0E.!.....-..~...| +00000010 db 8a 6c 46 88 ed fd 93 1b 75 4a 3c 65 6e e3 36 |..lF.....uJ.i.!c| +00000030 24 20 96 b1 7d d7 4a 71 34 50 eb d7 0d 8f b6 e0 |$ ..}.Jq4P......| +00000040 b6 d4 e9 c3 33 fb 84 |....3..|" +"2019-04-22 06:17:30.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 2844 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:30.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 2845 Exiting" +"2019-04-22 06:17:30.935 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2846 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:30.935 UTC [msp.identity] Verify -> DEBU 2847 Verify: digest = 00000000 30 4e 60 a4 58 ae 1e 8b 6d 75 99 2c a7 38 af 57 |0N`.X...mu.,.8.W| +00000010 94 05 1c 98 cc bf 3a 83 c3 5a 24 bc 91 21 7c 11 |......:..Z$..!|.|" +"2019-04-22 06:17:30.935 UTC [msp.identity] Verify -> DEBU 2848 Verify: sig = 00000000 30 45 02 21 00 f4 51 c8 37 c7 af 33 fc 9e d0 90 |0E.!..Q.7..3....| +00000010 7d 91 3e 14 7d f1 a2 ee 32 e5 7e 7a e8 51 a0 05 |}.>.}...2.~z.Q..| +00000020 22 0b f6 7e 3f 02 20 0f 3c 62 4f 02 fe 1b 61 db |"..~?. . DEBU 2849 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:30.936 UTC [gossip.discovery] isSentByMe -> DEBU 284a Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:30.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 284b Exiting" +"2019-04-22 06:17:30.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 284c Exiting" +"2019-04-22 06:17:30.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 284d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.937 UTC [gossip.gossip] handleMessage -> DEBU 284e Exiting" +"2019-04-22 06:17:30.937 UTC [gossip.gossip] handleMessage -> DEBU 284f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2850 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:30.939 UTC [msp.identity] Verify -> DEBU 2851 Verify: digest = 00000000 30 4e 60 a4 58 ae 1e 8b 6d 75 99 2c a7 38 af 57 |0N`.X...mu.,.8.W| +00000010 94 05 1c 98 cc bf 3a 83 c3 5a 24 bc 91 21 7c 11 |......:..Z$..!|.|" +"2019-04-22 06:17:30.939 UTC [msp.identity] Verify -> DEBU 2852 Verify: sig = 00000000 30 45 02 21 00 f4 51 c8 37 c7 af 33 fc 9e d0 90 |0E.!..Q.7..3....| +00000010 7d 91 3e 14 7d f1 a2 ee 32 e5 7e 7a e8 51 a0 05 |}.>.}...2.~z.Q..| +00000020 22 0b f6 7e 3f 02 20 0f 3c 62 4f 02 fe 1b 61 db |"..~?. . DEBU 2853 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:30.940 UTC [msp.identity] Verify -> DEBU 2854 Verify: sig = 00000000 30 44 02 20 1c 76 36 b6 db 8e 16 f2 76 6c 81 92 |0D. .v6.....vl..| +00000010 fd 83 ca cb c6 7f 8a dd a6 ff 73 ab 92 e4 f2 b9 |..........s.....| +00000020 72 52 db 1f 02 20 10 72 f1 be 20 8a a7 42 fc bd |rR... .r.. ..B..| +00000030 0a 66 ec c3 4a 3b f6 cc 07 4a 3a 63 73 4c 20 64 |.f..J;...J:csL d| +00000040 75 75 62 5d 09 b9 |uub]..|" +"2019-04-22 06:17:30.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 2855 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:30.942 UTC [gossip.discovery] isSentByMe -> DEBU 2856 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:30.942 UTC [gossip.discovery] handleAliveMessage -> DEBU 2857 Exiting" +"2019-04-22 06:17:30.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2858 Exiting" +"2019-04-22 06:17:30.942 UTC [gossip.gossip] handleMessage -> DEBU 2859 Exiting" +"2019-04-22 06:17:30.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 285a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:30.943 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 285b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:30.943 UTC [msp.identity] Verify -> DEBU 285c Verify: digest = 00000000 3c 03 93 f5 2b b3 53 36 f4 13 b2 6b c4 6f 17 3a |<...+.S6...k.o.:| +00000010 39 da 5a d7 1b db 27 5f 40 85 55 ab e2 0e ad e9 |9.Z...'_@.U.....|" +"2019-04-22 06:17:30.943 UTC [msp.identity] Verify -> DEBU 285d Verify: sig = 00000000 30 45 02 21 00 f9 0b 19 8c 2d cb 9c 7e f2 13 0d |0E.!.....-..~...| +00000010 db 8a 6c 46 88 ed fd 93 1b 75 4a 3c 65 6e e3 36 |..lF.....uJ.i.!c| +00000030 24 20 96 b1 7d d7 4a 71 34 50 eb d7 0d 8f b6 e0 |$ ..}.Jq4P......| +00000040 b6 d4 e9 c3 33 fb 84 |....3..|" +"2019-04-22 06:17:30.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 285e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:30.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 285f Exiting" +"2019-04-22 06:17:30.946 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2860 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:30.947 UTC [msp.identity] Verify -> DEBU 2861 Verify: digest = 00000000 30 4e 60 a4 58 ae 1e 8b 6d 75 99 2c a7 38 af 57 |0N`.X...mu.,.8.W| +00000010 94 05 1c 98 cc bf 3a 83 c3 5a 24 bc 91 21 7c 11 |......:..Z$..!|.|" +"2019-04-22 06:17:30.947 UTC [msp.identity] Verify -> DEBU 2862 Verify: sig = 00000000 30 45 02 21 00 f4 51 c8 37 c7 af 33 fc 9e d0 90 |0E.!..Q.7..3....| +00000010 7d 91 3e 14 7d f1 a2 ee 32 e5 7e 7a e8 51 a0 05 |}.>.}...2.~z.Q..| +00000020 22 0b f6 7e 3f 02 20 0f 3c 62 4f 02 fe 1b 61 db |"..~?. . DEBU 2863 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:30.948 UTC [gossip.discovery] isSentByMe -> DEBU 2864 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:30.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 2865 Exiting" +"2019-04-22 06:17:30.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2866 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:30.948 UTC [msp] DeserializeIdentity -> DEBU 2867 Obtaining identity" +"2019-04-22 06:17:30.949 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2868 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:30.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2869 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:30.949 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 286a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:30.949 UTC [policies] Evaluate -> DEBU 286b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:30.950 UTC [policies] Evaluate -> DEBU 286c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:30.950 UTC [policies] Evaluate -> DEBU 286d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:30.950 UTC [cauthdsl] func1 -> DEBU 286e 0xc002772d90 gate 1555913850950243200 evaluation starts" +"2019-04-22 06:17:30.950 UTC [cauthdsl] func2 -> DEBU 286f 0xc002772d90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:30.950 UTC [cauthdsl] func2 -> DEBU 2870 0xc002772d90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:30.950 UTC [cauthdsl] func2 -> DEBU 2871 0xc002772d90 principal matched by identity 0" +"2019-04-22 06:17:30.951 UTC [msp.identity] Verify -> DEBU 2872 Verify: digest = 00000000 44 b2 06 e3 dd 55 de 0a 7d 7d e5 3d 63 d1 9c 5c |D....U..}}.=c..\| +00000010 f1 14 f9 7e dd 4f 9d 85 8c 8a 0b 46 c7 95 f0 b5 |...~.O.....F....|" +"2019-04-22 06:17:30.951 UTC [msp.identity] Verify -> DEBU 2873 Verify: sig = 00000000 30 44 02 20 5d 3f 46 a9 ee b0 a9 d3 5c 6c 6a eb |0D. ]?F.....\lj.| +00000010 07 3c bb 75 41 61 15 d7 07 d4 53 0d 0b 8f b1 7c |.<.uAa....S....|| +00000020 f0 7b bd 8d 02 20 52 4e 09 32 a7 d7 36 f9 a4 51 |.{... RN.2..6..Q| +00000030 8c 73 4f 7b cf 85 58 fd 9c c8 c9 82 fe 2e ec 06 |.sO{..X.........| +00000040 f3 4b ef 4f 01 c2 |.K.O..|" +"2019-04-22 06:17:30.951 UTC [cauthdsl] func2 -> DEBU 2874 0xc002772d90 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:30.952 UTC [cauthdsl] func1 -> DEBU 2875 0xc002772d90 gate 1555913850950243200 evaluation succeeds" +"2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2876 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2877 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2878 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:30.952 UTC [policies] Evaluate -> DEBU 2879 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:30.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 287a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:30.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 287b Exiting" +"2019-04-22 06:17:30.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 287c Exiting" +"2019-04-22 06:17:31.112 UTC [gossip.comm] func1 -> DEBU 287d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:31.112 UTC [gossip.gossip] handleMessage -> DEBU 287e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:31.112 UTC [gossip.gossip] handleMessage -> DEBU 287f Exiting" +"2019-04-22 06:17:31.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2880 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:31.113 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2881 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:31.114 UTC [msp.identity] Verify -> DEBU 2882 Verify: digest = 00000000 1e a3 f0 36 8d 5d 92 e0 bd 2c db 64 12 06 f3 fa |...6.]...,.d....| +00000010 79 4c 1f 91 8f 2f 99 54 7d 8c bc 38 6d 38 64 d3 |yL.../.T}..8m8d.|" +"2019-04-22 06:17:31.115 UTC [msp.identity] Verify -> DEBU 2883 Verify: sig = 00000000 30 45 02 21 00 c3 d1 94 7a 2a fb e4 97 25 7e 28 |0E.!....z*...%~(| +00000010 c6 83 24 b5 85 eb 3f 17 0e c2 46 87 a1 0e 8c 66 |..$...?...F....f| +00000020 81 1e 68 86 73 02 20 6c f2 f2 20 6a c7 c6 a7 a2 |..h.s. l.. j....| +00000030 b6 11 4c e1 10 bf 7d d5 57 89 a2 93 bb 9a b7 38 |..L...}.W......8| +00000040 c1 5e 75 31 65 86 f2 |.^u1e..|" +"2019-04-22 06:17:31.116 UTC [msp.identity] Verify -> DEBU 2884 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:31.116 UTC [msp.identity] Verify -> DEBU 2885 Verify: sig = 00000000 30 45 02 21 00 a5 7b 39 ff 8b 3a 96 a7 a9 e9 69 |0E.!..{9..:....i| +00000010 77 f9 8a 29 de e0 6a 08 69 b9 63 45 ac 71 29 1f |w..)..j.i.cE.q).| +00000020 a9 a0 fa 1f 5e 02 20 57 a4 17 09 7d a2 74 46 55 |....^. W...}.tFU| +00000030 4b 20 db db 53 76 53 fc 96 06 6d 52 47 2e 8a e9 |K ..SvS...mRG...| +00000040 19 60 9b c5 7e c1 12 |.`..~..|" +"2019-04-22 06:17:31.116 UTC [gossip.discovery] handleAliveMessage -> DEBU 2886 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:31.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2887 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2888 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 " +"2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2889 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 " +"2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 288a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:39 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:31.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 288b Exiting" +"2019-04-22 06:17:31.117 UTC [gossip.discovery] handleAliveMessage -> DEBU 288c Exiting" +"2019-04-22 06:17:31.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 288d Exiting" +"2019-04-22 06:17:31.120 UTC [msp] DeserializeIdentity -> DEBU 288e Obtaining identity" +"2019-04-22 06:17:31.120 UTC [msp] DeserializeIdentity -> DEBU 288f Obtaining identity" +"2019-04-22 06:17:31.121 UTC [msp] DeserializeIdentity -> DEBU 2890 Obtaining identity" +"2019-04-22 06:17:31.121 UTC [gossip.comm] Send -> DEBU 2891 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:31.122 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" +"2019-04-22 06:17:31.122 UTC [gossip.comm] Send -> DEBU 2893 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:31.122 UTC [gossip.comm] sendToEndpoint -> DEBU 2894 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.122 UTC [gossip.comm] sendToEndpoint -> DEBU 2895 Exiting" +"2019-04-22 06:17:31.123 UTC [gossip.comm] sendToEndpoint -> DEBU 2896 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.123 UTC [gossip.comm] sendToEndpoint -> DEBU 2897 Exiting" +"2019-04-22 06:17:31.125 UTC [gossip.comm] func1 -> DEBU 2898 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.125 UTC [gossip.gossip] handleMessage -> DEBU 2899 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.125 UTC [gossip.gossip] handleMessage -> DEBU 289a Exiting" +"2019-04-22 06:17:31.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.126 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289c Exiting" +"2019-04-22 06:17:31.126 UTC [gossip.gossip] handleMessage -> DEBU 289d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.127 UTC [gossip.gossip] handleMessage -> DEBU 289e Exiting" +"2019-04-22 06:17:31.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a0 Exiting" +"2019-04-22 06:17:31.134 UTC [gossip.comm] func1 -> DEBU 28a1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.134 UTC [gossip.gossip] handleMessage -> DEBU 28a2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.134 UTC [gossip.pull] HandleMessage -> DEBU 28a3 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.134 UTC [gossip.pull] SendDigest -> DEBU 28a4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:31.135 UTC [gossip.gossip] handleMessage -> DEBU 28a5 Exiting" +"2019-04-22 06:17:31.156 UTC [gossip.comm] func1 -> DEBU 28a6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.156 UTC [gossip.gossip] handleMessage -> DEBU 28a7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.156 UTC [gossip.gossip] handleMessage -> DEBU 28a8 Exiting" +"2019-04-22 06:17:31.157 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28a9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.157 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28aa Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:31.158 UTC [msp.identity] Verify -> DEBU 28ab Verify: digest = 00000000 a1 33 1b aa 18 67 dd bf e0 df 37 e0 b1 4b 77 3d |.3...g....7..Kw=| +00000010 4d d0 73 69 32 ca 6c 52 a3 83 5d aa 32 5a 6c 25 |M.si2.lR..].2Zl%|" +"2019-04-22 06:17:31.158 UTC [msp.identity] Verify -> DEBU 28ac Verify: sig = 00000000 30 44 02 20 41 9d 1b c0 07 e8 cc 5a 28 d6 cb 03 |0D. A......Z(...| +00000010 85 34 65 85 7a 8b e1 47 79 b3 31 11 ba 86 99 96 |.4e.z..Gy.1.....| +00000020 02 d0 4a fe 02 20 22 ee 04 ea d0 54 eb 4e 94 18 |..J.. "....T.N..| +00000030 dd 41 76 96 ca c1 0d 66 41 35 7f 0b f5 c8 dc bf |.Av....fA5......| +00000040 50 49 a2 15 8c 90 |PI....|" +"2019-04-22 06:17:31.159 UTC [msp.identity] Verify -> DEBU 28ad Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:31.159 UTC [msp.identity] Verify -> DEBU 28ae Verify: sig = 00000000 30 44 02 20 55 86 5d 3c d9 3c 5a d8 10 6c 81 3b |0D. U.]<. DEBU 28af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:31.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:31.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b1 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 " +"2019-04-22 06:17:31.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 " +"2019-04-22 06:17:31.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:31.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 28b4 Exiting" +"2019-04-22 06:17:31.161 UTC [gossip.discovery] handleAliveMessage -> DEBU 28b5 Exiting" +"2019-04-22 06:17:31.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28b6 Exiting" +"2019-04-22 06:17:31.162 UTC [gossip.discovery] sendMemResponse -> DEBU 28b7 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:31.163 UTC [msp] DeserializeIdentity -> DEBU 28b8 Obtaining identity" +"2019-04-22 06:17:31.163 UTC [msp] DeserializeIdentity -> DEBU 28b9 Obtaining identity" +"2019-04-22 06:17:31.163 UTC [gossip.comm] Send -> DEBU 28ba Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:31.164 UTC [gossip.discovery] sendMemResponse -> DEBU 28bb Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:31.164 UTC [gossip.comm] sendToEndpoint -> DEBU 28bc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.164 UTC [gossip.comm] sendToEndpoint -> DEBU 28bd Exiting" +"2019-04-22 06:17:31.451 UTC [gossip.election] waitForInterrupt -> DEBU 28be c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:31.451 UTC [gossip.election] IsLeader -> DEBU 28bf c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:31.451 UTC [msp.identity] Sign -> DEBU 28c0 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100B1801 " +"2019-04-22 06:17:31.451 UTC [msp.identity] Sign -> DEBU 28c1 Sign: digest: 842B870A65C0700A716F2C3AD81C8A2FB2BD772F44676F31ED3923249EB83823 " +"2019-04-22 06:17:31.452 UTC [gossip.election] waitForInterrupt -> DEBU 28c2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:31.454 UTC [msp] DeserializeIdentity -> DEBU 28c3 Obtaining identity" +"2019-04-22 06:17:31.455 UTC [msp] DeserializeIdentity -> DEBU 28c4 Obtaining identity" +"2019-04-22 06:17:31.455 UTC [msp] DeserializeIdentity -> DEBU 28c5 Obtaining identity" +"2019-04-22 06:17:31.455 UTC [msp] DeserializeIdentity -> DEBU 28c6 Obtaining identity" +"2019-04-22 06:17:31.456 UTC [gossip.comm] Send -> DEBU 28c7 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:31.456 UTC [msp] DeserializeIdentity -> DEBU 28c8 Obtaining identity" +"2019-04-22 06:17:31.456 UTC [msp] DeserializeIdentity -> DEBU 28c9 Obtaining identity" +"2019-04-22 06:17:31.457 UTC [gossip.comm] sendToEndpoint -> DEBU 28ca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:11 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:17:31.457 UTC [gossip.comm] sendToEndpoint -> DEBU 28cb Exiting" +"2019-04-22 06:17:31.590 UTC [gossip.comm] func1 -> DEBU 28cc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.590 UTC [gossip.gossip] handleMessage -> DEBU 28cd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.591 UTC [gossip.pull] HandleMessage -> DEBU 28ce GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.591 UTC [msp] DeserializeIdentity -> DEBU 28cf Obtaining identity" +"2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d0 Obtaining identity" +"2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d1 Obtaining identity" +"2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d2 Obtaining identity" +"2019-04-22 06:17:31.592 UTC [msp] DeserializeIdentity -> DEBU 28d3 Obtaining identity" +"2019-04-22 06:17:31.593 UTC [msp] DeserializeIdentity -> DEBU 28d4 Obtaining identity" +"2019-04-22 06:17:31.593 UTC [gossip.pull] SendDigest -> DEBU 28d5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:31.593 UTC [gossip.gossip] handleMessage -> DEBU 28d6 Exiting" +"2019-04-22 06:17:31.597 UTC [gossip.comm] func1 -> DEBU 28d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.597 UTC [gossip.gossip] handleMessage -> DEBU 28d8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.598 UTC [gossip.gossip] handleMessage -> DEBU 28d9 Exiting" +"2019-04-22 06:17:31.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.598 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 28db Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:31.598 UTC [msp] DeserializeIdentity -> DEBU 28dc Obtaining identity" +"2019-04-22 06:17:31.599 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:31.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28de Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:31.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28df Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:31.599 UTC [policies] Evaluate -> DEBU 28e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:31.599 UTC [policies] Evaluate -> DEBU 28e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:31.599 UTC [policies] Evaluate -> DEBU 28e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:31.599 UTC [cauthdsl] func1 -> DEBU 28e3 0xc003214770 gate 1555913851599723700 evaluation starts" +"2019-04-22 06:17:31.599 UTC [cauthdsl] func2 -> DEBU 28e4 0xc003214770 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:31.600 UTC [cauthdsl] func2 -> DEBU 28e5 0xc003214770 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:31.600 UTC [cauthdsl] func2 -> DEBU 28e6 0xc003214770 principal matched by identity 0" +"2019-04-22 06:17:31.600 UTC [msp.identity] Verify -> DEBU 28e7 Verify: digest = 00000000 e8 c2 8e 49 b5 20 70 13 ba 55 79 ce fa 96 9e 65 |...I. p..Uy....e| +00000010 a0 14 c2 99 f7 00 67 22 8d f1 99 4f fa e6 fe 70 |......g"...O...p|" +"2019-04-22 06:17:31.600 UTC [msp.identity] Verify -> DEBU 28e8 Verify: sig = 00000000 30 44 02 20 3f e7 dc 55 3c 70 cb 9d d9 97 3f 1c |0D. ?..U.7.| +00000020 fd 4a 62 d6 02 20 26 bf 5c a4 72 f9 c9 62 2c ef |.Jb.. &.\.r..b,.| +00000030 78 a8 b8 9e 69 b4 ad 6f e0 fc 91 3c 42 5a 49 5b |x...i..o... DEBU 28e9 0xc003214770 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:31.601 UTC [cauthdsl] func1 -> DEBU 28ea 0xc003214770 gate 1555913851599723700 evaluation succeeds" +"2019-04-22 06:17:31.601 UTC [policies] Evaluate -> DEBU 28eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:31.601 UTC [policies] Evaluate -> DEBU 28ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:31.603 UTC [policies] Evaluate -> DEBU 28ed Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:31.603 UTC [policies] Evaluate -> DEBU 28ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:31.604 UTC [gossip.discovery] handleAliveMessage -> DEBU 28ef Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:31.604 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 " +"2019-04-22 06:17:31.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 " +"2019-04-22 06:17:31.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:31.605 UTC [gossip.discovery] learnExistingMembers -> DEBU 28f4 Exiting" +"2019-04-22 06:17:31.606 UTC [gossip.discovery] handleAliveMessage -> DEBU 28f5 Exiting" +"2019-04-22 06:17:31.606 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28f6 Exiting" +"2019-04-22 06:17:31.608 UTC [gossip.gossip] handleMessage -> DEBU 28f7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.608 UTC [gossip.gossip] handleMessage -> DEBU 28f8 Exiting" +"2019-04-22 06:17:31.608 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.608 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28fa Exiting" +"2019-04-22 06:17:31.611 UTC [msp] DeserializeIdentity -> DEBU 28fc Obtaining identity" +"2019-04-22 06:17:31.612 UTC [msp] DeserializeIdentity -> DEBU 28fd Obtaining identity" +"2019-04-22 06:17:31.612 UTC [msp] DeserializeIdentity -> DEBU 28fe Obtaining identity" +"2019-04-22 06:17:31.611 UTC [gossip.comm] func1 -> DEBU 28fb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.613 UTC [msp] DeserializeIdentity -> DEBU 28ff Obtaining identity" +"2019-04-22 06:17:31.614 UTC [msp] DeserializeIdentity -> DEBU 2901 Obtaining identity" +"2019-04-22 06:17:31.614 UTC [msp] DeserializeIdentity -> DEBU 2902 Obtaining identity" +"2019-04-22 06:17:31.615 UTC [gossip.comm] Send -> DEBU 2903 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:31.613 UTC [gossip.gossip] handleMessage -> DEBU 2900 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.615 UTC [gossip.gossip] handleMessage -> DEBU 2905 Exiting" +"2019-04-22 06:17:31.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2906 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2907 Exiting" +"2019-04-22 06:17:31.615 UTC [msp] DeserializeIdentity -> DEBU 2904 Obtaining identity" +"2019-04-22 06:17:31.616 UTC [msp] DeserializeIdentity -> DEBU 2908 Obtaining identity" +"2019-04-22 06:17:31.616 UTC [gossip.comm] Send -> DEBU 2909 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:31.616 UTC [gossip.comm] sendToEndpoint -> DEBU 290a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.616 UTC [gossip.comm] sendToEndpoint -> DEBU 290b Exiting" +"2019-04-22 06:17:31.616 UTC [gossip.comm] sendToEndpoint -> DEBU 290c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.617 UTC [gossip.comm] sendToEndpoint -> DEBU 290d Exiting" +"2019-04-22 06:17:31.624 UTC [gossip.comm] func1 -> DEBU 290e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.625 UTC [gossip.gossip] handleMessage -> DEBU 290f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.625 UTC [gossip.gossip] handleMessage -> DEBU 2910 Exiting" +"2019-04-22 06:17:31.626 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2911 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.626 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2912 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:31.627 UTC [msp] DeserializeIdentity -> DEBU 2913 Obtaining identity" +"2019-04-22 06:17:31.627 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2914 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:31.627 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2915 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:31.628 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2916 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:31.628 UTC [policies] Evaluate -> DEBU 2917 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:31.628 UTC [policies] Evaluate -> DEBU 2918 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:31.629 UTC [policies] Evaluate -> DEBU 2919 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:31.629 UTC [cauthdsl] func1 -> DEBU 291a 0xc0039cc660 gate 1555913851629338400 evaluation starts" +"2019-04-22 06:17:31.629 UTC [cauthdsl] func2 -> DEBU 291b 0xc0039cc660 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:31.630 UTC [cauthdsl] func2 -> DEBU 291c 0xc0039cc660 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:31.630 UTC [cauthdsl] func2 -> DEBU 291d 0xc0039cc660 principal matched by identity 0" +"2019-04-22 06:17:31.630 UTC [msp.identity] Verify -> DEBU 291e Verify: digest = 00000000 58 9f d3 12 8f d6 80 98 97 a7 e0 54 3f 7f 3a 40 |X..........T?.:@| +00000010 d3 46 38 b2 cb 60 e4 72 b1 44 c8 0b 42 ec c5 c3 |.F8..`.r.D..B...|" +"2019-04-22 06:17:31.631 UTC [msp.identity] Verify -> DEBU 291f Verify: sig = 00000000 30 44 02 20 14 c2 07 88 8a ef 91 83 82 1e c6 ad |0D. ............| +00000010 c3 f8 66 7f f8 f1 e8 b1 9b fe 5e a8 01 2b c6 6a |..f.......^..+.j| +00000020 d4 0b 93 7c 02 20 29 10 85 e0 01 b4 b5 ec e9 f0 |...|. ).........| +00000030 60 08 f7 be dd f3 05 d2 3d cf 43 d8 f3 55 3e b3 |`.......=.C..U>.| +00000040 31 73 d3 2d a3 24 |1s.-.$|" +"2019-04-22 06:17:31.631 UTC [cauthdsl] func2 -> DEBU 2920 0xc0039cc660 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:31.633 UTC [cauthdsl] func1 -> DEBU 2921 0xc0039cc660 gate 1555913851629338400 evaluation succeeds" +"2019-04-22 06:17:31.634 UTC [policies] Evaluate -> DEBU 2922 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:31.634 UTC [policies] Evaluate -> DEBU 2923 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:31.635 UTC [policies] Evaluate -> DEBU 2924 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:31.636 UTC [policies] Evaluate -> DEBU 2925 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:31.636 UTC [gossip.discovery] handleAliveMessage -> DEBU 2926 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:31.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 2927 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:31.638 UTC [gossip.discovery] learnExistingMembers -> DEBU 2928 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 " +"2019-04-22 06:17:31.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 2929 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 " +"2019-04-22 06:17:31.641 UTC [gossip.discovery] learnExistingMembers -> DEBU 292a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:31.641 UTC [gossip.discovery] learnExistingMembers -> DEBU 292b Exiting" +"2019-04-22 06:17:31.642 UTC [gossip.discovery] handleAliveMessage -> DEBU 292c Exiting" +"2019-04-22 06:17:31.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 292d Exiting" +"2019-04-22 06:17:31.642 UTC [gossip.discovery] sendMemResponse -> DEBU 292e Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:31.643 UTC [msp] DeserializeIdentity -> DEBU 292f Obtaining identity" +"2019-04-22 06:17:31.643 UTC [msp] DeserializeIdentity -> DEBU 2930 Obtaining identity" +"2019-04-22 06:17:31.644 UTC [msp] DeserializeIdentity -> DEBU 2931 Obtaining identity" +"2019-04-22 06:17:31.644 UTC [gossip.comm] Send -> DEBU 2932 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:31.645 UTC [gossip.discovery] sendMemResponse -> DEBU 2933 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:31.645 UTC [gossip.comm] sendToEndpoint -> DEBU 2934 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:31.645 UTC [gossip.comm] sendToEndpoint -> DEBU 2935 Exiting" +"2019-04-22 06:17:32.009 UTC [gossip.gossip] handleMessage -> DEBU 2936 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.009 UTC [gossip.pull] HandleMessage -> DEBU 2937 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.009 UTC [msp] DeserializeIdentity -> DEBU 2938 Obtaining identity" +"2019-04-22 06:17:32.009 UTC [msp] DeserializeIdentity -> DEBU 2939 Obtaining identity" +"2019-04-22 06:17:32.009 UTC [msp] DeserializeIdentity -> DEBU 293a Obtaining identity" +"2019-04-22 06:17:32.010 UTC [msp] DeserializeIdentity -> DEBU 293b Obtaining identity" +"2019-04-22 06:17:32.010 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" +"2019-04-22 06:17:32.010 UTC [msp] DeserializeIdentity -> DEBU 293d Obtaining identity" +"2019-04-22 06:17:32.010 UTC [gossip.pull] SendDigest -> DEBU 293e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:32.010 UTC [gossip.gossip] handleMessage -> DEBU 293f Exiting" +"2019-04-22 06:17:32.021 UTC [gossip.gossip] handleMessage -> DEBU 2940 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.021 UTC [gossip.gossip] handleMessage -> DEBU 2941 Exiting" +"2019-04-22 06:17:32.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2942 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.021 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2943 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:32.021 UTC [msp] DeserializeIdentity -> DEBU 2944 Obtaining identity" +"2019-04-22 06:17:32.022 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2945 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2946 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.022 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2947 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.022 UTC [policies] Evaluate -> DEBU 2948 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.022 UTC [policies] Evaluate -> DEBU 2949 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.022 UTC [policies] Evaluate -> DEBU 294a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.022 UTC [cauthdsl] func1 -> DEBU 294b 0xc0039dd1c0 gate 1555913852022971200 evaluation starts" +"2019-04-22 06:17:32.023 UTC [cauthdsl] func2 -> DEBU 294c 0xc0039dd1c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.023 UTC [cauthdsl] func2 -> DEBU 294d 0xc0039dd1c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.023 UTC [cauthdsl] func2 -> DEBU 294e 0xc0039dd1c0 principal matched by identity 0" +"2019-04-22 06:17:32.023 UTC [msp.identity] Verify -> DEBU 294f Verify: digest = 00000000 29 60 e6 2c 81 35 71 32 8a db f5 f6 12 02 6a 30 |)`.,.5q2......j0| +00000010 9f 5c be 15 f8 39 dc 31 45 15 b9 7c 03 73 14 31 |.\...9.1E..|.s.1|" +"2019-04-22 06:17:32.023 UTC [msp.identity] Verify -> DEBU 2950 Verify: sig = 00000000 30 45 02 21 00 99 e3 86 3d e9 bc 92 fc 5c 07 68 |0E.!....=....\.h| +00000010 3c 3e 88 87 4c 0e 89 91 c6 69 67 00 a8 7f c8 52 |<>..L....ig....R| +00000020 be b1 82 29 3d 02 20 59 ac e3 f8 d7 51 f2 ff 6e |...)=. Y....Q..n| +00000030 99 58 c2 46 59 1f f0 0b 39 0f 68 5c b5 78 70 08 |.X.FY...9.h\.xp.| +00000040 91 6c e9 4a 5f 5d 5c |.l.J_]\|" +"2019-04-22 06:17:32.024 UTC [cauthdsl] func2 -> DEBU 2951 0xc0039dd1c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.024 UTC [cauthdsl] func1 -> DEBU 2952 0xc0039dd1c0 gate 1555913852022971200 evaluation succeeds" +"2019-04-22 06:17:32.024 UTC [policies] Evaluate -> DEBU 2953 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.024 UTC [policies] Evaluate -> DEBU 2954 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.025 UTC [policies] Evaluate -> DEBU 2955 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.025 UTC [policies] Evaluate -> DEBU 2956 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.025 UTC [gossip.discovery] handleAliveMessage -> DEBU 2957 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.025 UTC [gossip.discovery] learnExistingMembers -> DEBU 2958 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 2959 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 " +"2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 295a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 " +"2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 295b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:36 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:32.026 UTC [gossip.discovery] learnExistingMembers -> DEBU 295c Exiting" +"2019-04-22 06:17:32.026 UTC [gossip.discovery] handleAliveMessage -> DEBU 295d Exiting" +"2019-04-22 06:17:32.026 UTC [gossip.discovery] handleMsgFromComm -> DEBU 295e Exiting" +"2019-04-22 06:17:32.030 UTC [gossip.comm] func1 -> DEBU 295f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.030 UTC [gossip.gossip] handleMessage -> DEBU 2960 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.030 UTC [gossip.gossip] handleMessage -> DEBU 2961 Exiting" +"2019-04-22 06:17:32.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2962 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2963 Exiting" +"2019-04-22 06:17:32.034 UTC [gossip.gossip] handleMessage -> DEBU 2964 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.034 UTC [gossip.gossip] handleMessage -> DEBU 2965 Exiting" +"2019-04-22 06:17:32.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2966 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.034 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2967 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:32.035 UTC [msp] DeserializeIdentity -> DEBU 2968 Obtaining identity" +"2019-04-22 06:17:32.035 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2969 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.036 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.036 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 296b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.036 UTC [policies] Evaluate -> DEBU 296c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.036 UTC [policies] Evaluate -> DEBU 296d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.036 UTC [policies] Evaluate -> DEBU 296e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.036 UTC [cauthdsl] func1 -> DEBU 296f 0xc00411aad0 gate 1555913852036740200 evaluation starts" +"2019-04-22 06:17:32.036 UTC [cauthdsl] func2 -> DEBU 2970 0xc00411aad0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.036 UTC [cauthdsl] func2 -> DEBU 2971 0xc00411aad0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.037 UTC [cauthdsl] func2 -> DEBU 2972 0xc00411aad0 principal matched by identity 0" +"2019-04-22 06:17:32.037 UTC [msp.identity] Verify -> DEBU 2973 Verify: digest = 00000000 08 61 eb 57 a9 a5 4a 30 1a 93 ef ff cc df 45 4e |.a.W..J0......EN| +00000010 ff b7 ab 2f 63 74 01 0f c3 23 90 04 e7 e9 3a 5d |.../ct...#....:]|" +"2019-04-22 06:17:32.037 UTC [msp.identity] Verify -> DEBU 2974 Verify: sig = 00000000 30 45 02 21 00 98 96 4c 5e b4 66 4f f7 44 9c 88 |0E.!...L^.fO.D..| +00000010 83 5b 7e b7 11 15 44 46 97 f3 35 cb c7 d4 09 75 |.[~...DF..5....u| +00000020 2e 15 68 6c 2d 02 20 06 58 d8 a0 02 07 96 34 9c |..hl-. .X.....4.| +00000030 9f d6 eb aa 7c d1 39 4a 92 97 09 cc 09 91 19 a2 |....|.9J........| +00000040 62 12 1a ee f9 29 89 |b....).|" +"2019-04-22 06:17:32.037 UTC [cauthdsl] func2 -> DEBU 2975 0xc00411aad0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.037 UTC [cauthdsl] func1 -> DEBU 2976 0xc00411aad0 gate 1555913852036740200 evaluation succeeds" +"2019-04-22 06:17:32.038 UTC [msp] DeserializeIdentity -> DEBU 2977 Obtaining identity" +"2019-04-22 06:17:32.038 UTC [msp] DeserializeIdentity -> DEBU 2978 Obtaining identity" +"2019-04-22 06:17:32.038 UTC [msp] DeserializeIdentity -> DEBU 2979 Obtaining identity" +"2019-04-22 06:17:32.039 UTC [msp] DeserializeIdentity -> DEBU 297a Obtaining identity" +"2019-04-22 06:17:32.039 UTC [msp] DeserializeIdentity -> DEBU 297b Obtaining identity" +"2019-04-22 06:17:32.039 UTC [msp] DeserializeIdentity -> DEBU 297c Obtaining identity" +"2019-04-22 06:17:32.040 UTC [gossip.comm] Send -> DEBU 297d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:32.040 UTC [msp] DeserializeIdentity -> DEBU 297e Obtaining identity" +"2019-04-22 06:17:32.041 UTC [policies] Evaluate -> DEBU 297f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.041 UTC [policies] Evaluate -> DEBU 2980 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.041 UTC [policies] Evaluate -> DEBU 2981 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.042 UTC [policies] Evaluate -> DEBU 2984 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.042 UTC [msp] DeserializeIdentity -> DEBU 2982 Obtaining identity" +"2019-04-22 06:17:32.043 UTC [gossip.comm] Send -> DEBU 2985 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:32.043 UTC [gossip.comm] sendToEndpoint -> DEBU 2986 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.044 UTC [gossip.comm] sendToEndpoint -> DEBU 2987 Exiting" +"2019-04-22 06:17:32.042 UTC [gossip.comm] sendToEndpoint -> DEBU 2983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.044 UTC [gossip.comm] sendToEndpoint -> DEBU 2988 Exiting" +"2019-04-22 06:17:32.045 UTC [gossip.discovery] handleAliveMessage -> DEBU 2989 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.045 UTC [gossip.discovery] learnExistingMembers -> DEBU 298a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:32.046 UTC [gossip.comm] func1 -> DEBU 298b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.048 UTC [gossip.gossip] handleMessage -> DEBU 298c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 298d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 " +"2019-04-22 06:17:32.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 298e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 " +"2019-04-22 06:17:32.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 298f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:32.050 UTC [gossip.discovery] learnExistingMembers -> DEBU 2990 Exiting" +"2019-04-22 06:17:32.050 UTC [gossip.discovery] handleAliveMessage -> DEBU 2991 Exiting" +"2019-04-22 06:17:32.050 UTC [gossip.discovery] sendMemResponse -> DEBU 2992 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:32.051 UTC [msp] DeserializeIdentity -> DEBU 2993 Obtaining identity" +"2019-04-22 06:17:32.051 UTC [msp] DeserializeIdentity -> DEBU 2994 Obtaining identity" +"2019-04-22 06:17:32.051 UTC [msp] DeserializeIdentity -> DEBU 2995 Obtaining identity" +"2019-04-22 06:17:32.052 UTC [gossip.comm] Send -> DEBU 2996 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:32.053 UTC [gossip.discovery] sendMemResponse -> DEBU 2997 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:32.053 UTC [gossip.comm] sendToEndpoint -> DEBU 2998 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.056 UTC [gossip.comm] sendToEndpoint -> DEBU 2999 Exiting" +"2019-04-22 06:17:32.050 UTC [gossip.discovery] handleMsgFromComm -> DEBU 299a Exiting" +"2019-04-22 06:17:32.058 UTC [gossip.gossip] handleMessage -> DEBU 299b Exiting" +"2019-04-22 06:17:32.058 UTC [gossip.discovery] handleMsgFromComm -> DEBU 299c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:37 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:32.059 UTC [gossip.discovery] handleMsgFromComm -> DEBU 299d Exiting" +"2019-04-22 06:17:32.393 UTC [msp] DeserializeIdentity -> DEBU 299e Obtaining identity" +"2019-04-22 06:17:32.394 UTC [msp] DeserializeIdentity -> DEBU 299f Obtaining identity" +"2019-04-22 06:17:32.394 UTC [gossip.comm] Send -> DEBU 29a0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:32.394 UTC [gossip.comm] sendToEndpoint -> DEBU 29a1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.394 UTC [gossip.comm] sendToEndpoint -> DEBU 29a2 Exiting" +"2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a4 Exiting" +"2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.395 UTC [gossip.comm] sendToEndpoint -> DEBU 29a6 Exiting" +"2019-04-22 06:17:32.397 UTC [gossip.comm] func1 -> DEBU 29a7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.398 UTC [gossip.comm] func1 -> DEBU 29a8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.398 UTC [gossip.gossip] handleMessage -> DEBU 29a9 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.400 UTC [msp] DeserializeIdentity -> DEBU 29aa Obtaining identity" +"2019-04-22 06:17:32.400 UTC [msp] DeserializeIdentity -> DEBU 29ab Obtaining identity" +"2019-04-22 06:17:32.400 UTC [msp] DeserializeIdentity -> DEBU 29ac Obtaining identity" +"2019-04-22 06:17:32.401 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29ad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29ae Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.401 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29af Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.401 UTC [policies] Evaluate -> DEBU 29b0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.402 UTC [policies] Evaluate -> DEBU 29b1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.402 UTC [policies] Evaluate -> DEBU 29b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.402 UTC [cauthdsl] func1 -> DEBU 29b3 0xc0042d1b40 gate 1555913852402746500 evaluation starts" +"2019-04-22 06:17:32.402 UTC [cauthdsl] func2 -> DEBU 29b4 0xc0042d1b40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.402 UTC [cauthdsl] func2 -> DEBU 29b5 0xc0042d1b40 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.402 UTC [cauthdsl] func2 -> DEBU 29b6 0xc0042d1b40 principal matched by identity 0" +"2019-04-22 06:17:32.403 UTC [msp.identity] Verify -> DEBU 29b7 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:32.404 UTC [msp.identity] Verify -> DEBU 29b8 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:32.404 UTC [cauthdsl] func2 -> DEBU 29b9 0xc0042d1b40 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.405 UTC [cauthdsl] func1 -> DEBU 29ba 0xc0042d1b40 gate 1555913852402746500 evaluation succeeds" +"2019-04-22 06:17:32.405 UTC [policies] Evaluate -> DEBU 29bb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.408 UTC [policies] Evaluate -> DEBU 29bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.408 UTC [policies] Evaluate -> DEBU 29bd Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.408 UTC [policies] Evaluate -> DEBU 29be == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.409 UTC [msp] DeserializeIdentity -> DEBU 29bf Obtaining identity" +"2019-04-22 06:17:32.409 UTC [msp] DeserializeIdentity -> DEBU 29c0 Obtaining identity" +"2019-04-22 06:17:32.410 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.410 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.410 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.410 UTC [policies] Evaluate -> DEBU 29c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.411 UTC [policies] Evaluate -> DEBU 29c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.411 UTC [policies] Evaluate -> DEBU 29c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.411 UTC [cauthdsl] func1 -> DEBU 29c7 0xc004499310 gate 1555913852411739500 evaluation starts" +"2019-04-22 06:17:32.412 UTC [cauthdsl] func2 -> DEBU 29c8 0xc004499310 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.412 UTC [cauthdsl] func2 -> DEBU 29c9 0xc004499310 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.412 UTC [cauthdsl] func2 -> DEBU 29ca 0xc004499310 principal matched by identity 0" +"2019-04-22 06:17:32.414 UTC [msp.identity] Verify -> DEBU 29cb Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:32.414 UTC [msp.identity] Verify -> DEBU 29cc Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:32.415 UTC [cauthdsl] func2 -> DEBU 29cd 0xc004499310 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.415 UTC [cauthdsl] func1 -> DEBU 29ce 0xc004499310 gate 1555913852411739500 evaluation succeeds" +"2019-04-22 06:17:32.419 UTC [policies] Evaluate -> DEBU 29cf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.419 UTC [policies] Evaluate -> DEBU 29d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.420 UTC [policies] Evaluate -> DEBU 29d1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.420 UTC [policies] Evaluate -> DEBU 29d2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.421 UTC [msp.identity] Verify -> DEBU 29d3 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:32.421 UTC [msp.identity] Verify -> DEBU 29d4 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:32.423 UTC [msp.identity] Verify -> DEBU 29d5 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:32.423 UTC [msp.identity] Verify -> DEBU 29d6 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:32.423 UTC [gossip.gossip] handleMessage -> DEBU 29d7 Exiting" +"2019-04-22 06:17:32.423 UTC [gossip.gossip] handleMessage -> DEBU 29d8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.424 UTC [msp.identity] Verify -> DEBU 29d9 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:32.424 UTC [msp.identity] Verify -> DEBU 29da Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:32.429 UTC [msp] DeserializeIdentity -> DEBU 29db Obtaining identity" +"2019-04-22 06:17:32.429 UTC [msp] DeserializeIdentity -> DEBU 29dc Obtaining identity" +"2019-04-22 06:17:32.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29de Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.430 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29df Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.430 UTC [cauthdsl] func1 -> DEBU 29e3 0xc003694280 gate 1555913852430501000 evaluation starts" +"2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e4 0xc003694280 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e5 0xc003694280 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e6 0xc003694280 principal matched by identity 0" +"2019-04-22 06:17:32.430 UTC [msp.identity] Verify -> DEBU 29e7 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:32.430 UTC [msp.identity] Verify -> DEBU 29e8 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:32.430 UTC [cauthdsl] func2 -> DEBU 29e9 0xc003694280 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.430 UTC [cauthdsl] func1 -> DEBU 29ea 0xc003694280 gate 1555913852430501000 evaluation succeeds" +"2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.430 UTC [policies] Evaluate -> DEBU 29ed Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.431 UTC [msp.identity] Verify -> DEBU 29ef Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:32.431 UTC [msp.identity] Verify -> DEBU 29f0 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:32.431 UTC [msp] DeserializeIdentity -> DEBU 29f1 Obtaining identity" +"2019-04-22 06:17:32.431 UTC [msp] DeserializeIdentity -> DEBU 29f2 Obtaining identity" +"2019-04-22 06:17:32.431 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29f4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29f5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.431 UTC [policies] Evaluate -> DEBU 29f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.431 UTC [cauthdsl] func1 -> DEBU 29f9 0xc00377c170 gate 1555913852431894600 evaluation starts" +"2019-04-22 06:17:32.431 UTC [cauthdsl] func2 -> DEBU 29fa 0xc00377c170 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.431 UTC [cauthdsl] func2 -> DEBU 29fb 0xc00377c170 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.432 UTC [cauthdsl] func2 -> DEBU 29fc 0xc00377c170 principal matched by identity 0" +"2019-04-22 06:17:32.432 UTC [msp.identity] Verify -> DEBU 29fd Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:32.432 UTC [msp.identity] Verify -> DEBU 29fe Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:32.432 UTC [cauthdsl] func2 -> DEBU 29ff 0xc00377c170 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.432 UTC [cauthdsl] func1 -> DEBU 2a00 0xc00377c170 gate 1555913852431894600 evaluation succeeds" +"2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a01 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a03 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.432 UTC [policies] Evaluate -> DEBU 2a04 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.432 UTC [gossip.gossip] handleMessage -> DEBU 2a05 Exiting" +"2019-04-22 06:17:32.432 UTC [gossip.gossip] handleMessage -> DEBU 2a06 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.432 UTC [msp] DeserializeIdentity -> DEBU 2a07 Obtaining identity" +"2019-04-22 06:17:32.432 UTC [msp] DeserializeIdentity -> DEBU 2a08 Obtaining identity" +"2019-04-22 06:17:32.432 UTC [msp] DeserializeIdentity -> DEBU 2a09 Obtaining identity" +"2019-04-22 06:17:32.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a0a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a0b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a0c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.433 UTC [cauthdsl] func1 -> DEBU 2a10 0xc00377dc80 gate 1555913852433143200 evaluation starts" +"2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a11 0xc00377dc80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a12 0xc00377dc80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a13 0xc00377dc80 principal matched by identity 0" +"2019-04-22 06:17:32.433 UTC [msp.identity] Verify -> DEBU 2a14 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:32.433 UTC [msp.identity] Verify -> DEBU 2a15 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:32.433 UTC [cauthdsl] func2 -> DEBU 2a16 0xc00377dc80 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.433 UTC [cauthdsl] func1 -> DEBU 2a17 0xc00377dc80 gate 1555913852433143200 evaluation succeeds" +"2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a1a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.433 UTC [policies] Evaluate -> DEBU 2a1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.433 UTC [msp] DeserializeIdentity -> DEBU 2a1c Obtaining identity" +"2019-04-22 06:17:32.433 UTC [msp] DeserializeIdentity -> DEBU 2a1d Obtaining identity" +"2019-04-22 06:17:32.433 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:32.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a1f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.434 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a20 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:32.434 UTC [policies] Evaluate -> DEBU 2a21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:32.434 UTC [policies] Evaluate -> DEBU 2a22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:32.434 UTC [policies] Evaluate -> DEBU 2a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:32.434 UTC [cauthdsl] func1 -> DEBU 2a24 0xc0032bb450 gate 1555913852434205600 evaluation starts" +"2019-04-22 06:17:32.434 UTC [cauthdsl] func2 -> DEBU 2a25 0xc0032bb450 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:32.434 UTC [cauthdsl] func2 -> DEBU 2a26 0xc0032bb450 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:32.434 UTC [cauthdsl] func2 -> DEBU 2a27 0xc0032bb450 principal matched by identity 0" +"2019-04-22 06:17:32.434 UTC [msp.identity] Verify -> DEBU 2a28 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:32.434 UTC [msp.identity] Verify -> DEBU 2a29 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:32.435 UTC [cauthdsl] func2 -> DEBU 2a2a 0xc0032bb450 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:32.435 UTC [cauthdsl] func1 -> DEBU 2a2b 0xc0032bb450 gate 1555913852434205600 evaluation succeeds" +"2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:32.435 UTC [policies] Evaluate -> DEBU 2a2f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:32.438 UTC [msp.identity] Verify -> DEBU 2a30 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:32.438 UTC [msp.identity] Verify -> DEBU 2a31 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:32.439 UTC [msp.identity] Verify -> DEBU 2a32 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:32.439 UTC [msp.identity] Verify -> DEBU 2a33 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:32.440 UTC [gossip.gossip] handleMessage -> DEBU 2a34 Exiting" +"2019-04-22 06:17:32.475 UTC [msp] DeserializeIdentity -> DEBU 2a35 Obtaining identity" +"2019-04-22 06:17:32.475 UTC [msp] DeserializeIdentity -> DEBU 2a36 Obtaining identity" +"2019-04-22 06:17:32.475 UTC [gossip.pull] Hello -> DEBU 2a37 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:32.476 UTC [msp] DeserializeIdentity -> DEBU 2a38 Obtaining identity" +"2019-04-22 06:17:32.477 UTC [msp] DeserializeIdentity -> DEBU 2a39 Obtaining identity" +"2019-04-22 06:17:32.477 UTC [gossip.comm] Send -> DEBU 2a3a Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:32.477 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.477 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3c Exiting" +"2019-04-22 06:17:32.478 UTC [gossip.comm] func1 -> DEBU 2a3d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 501491995307507059 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.479 UTC [gossip.gossip] handleMessage -> DEBU 2a3e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 501491995307507059 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.479 UTC [gossip.pull] HandleMessage -> DEBU 2a3f GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 501491995307507059 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.479 UTC [gossip.gossip] handleMessage -> DEBU 2a40 Exiting" +"2019-04-22 06:17:32.647 UTC [gossip.comm] func1 -> DEBU 2a41 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.647 UTC [gossip.gossip] handleMessage -> DEBU 2a42 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.648 UTC [msp] DeserializeIdentity -> DEBU 2a43 Obtaining identity" +"2019-04-22 06:17:32.648 UTC [msp] DeserializeIdentity -> DEBU 2a44 Obtaining identity" +"2019-04-22 06:17:32.648 UTC [gossip.gossip] handleMessage -> DEBU 2a45 Exiting" +"2019-04-22 06:17:32.679 UTC [gossip.comm] func1 -> DEBU 2a46 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.679 UTC [gossip.gossip] handleMessage -> DEBU 2a47 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.679 UTC [gossip.pull] HandleMessage -> DEBU 2a48 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.679 UTC [gossip.pull] SendDigest -> DEBU 2a49 Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:32.679 UTC [gossip.gossip] handleMessage -> DEBU 2a4a Exiting" +"2019-04-22 06:17:32.872 UTC [gossip.gossip] handleMessage -> DEBU 2a4b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:32.873 UTC [msp] DeserializeIdentity -> DEBU 2a4c Obtaining identity" +"2019-04-22 06:17:32.873 UTC [msp] DeserializeIdentity -> DEBU 2a4d Obtaining identity" +"2019-04-22 06:17:32.874 UTC [msp] DeserializeIdentity -> DEBU 2a4e Obtaining identity" +"2019-04-22 06:17:32.874 UTC [gossip.gossip] handleMessage -> DEBU 2a4f Exiting" +"2019-04-22 06:17:33.025 UTC [chaincode.platform.util] DockerBuild -> DEBU 2a50 Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-079629731/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-079629731/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-079629731/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-079629731/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-079629731/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-079629731/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-079629731/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +"2019-04-22 06:17:33.086 UTC [gossip.comm] func1 -> DEBU 2a51 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:33.087 UTC [gossip.gossip] handleMessage -> DEBU 2a52 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:33.088 UTC [msp] DeserializeIdentity -> DEBU 2a53 Obtaining identity" +"2019-04-22 06:17:33.089 UTC [msp] DeserializeIdentity -> DEBU 2a54 Obtaining identity" +"2019-04-22 06:17:33.089 UTC [msp] DeserializeIdentity -> DEBU 2a55 Obtaining identity" +"2019-04-22 06:17:33.089 UTC [gossip.gossip] handleMessage -> DEBU 2a56 Exiting" +"2019-04-22 06:17:34.877 UTC [gossip.pull] Hello -> DEBU 2a57 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:34.878 UTC [gossip.comm] Send -> DEBU 2a58 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:34.878 UTC [gossip.pull] Hello -> DEBU 2a59 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:34.878 UTC [gossip.comm] Send -> DEBU 2a5a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:34.878 UTC [gossip.pull] Hello -> DEBU 2a5b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:34.879 UTC [gossip.comm] Send -> DEBU 2a5c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:34.880 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.880 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5e Exiting" +"2019-04-22 06:17:34.880 UTC [gossip.comm] sendToEndpoint -> DEBU 2a5f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2a60 Exiting" +"2019-04-22 06:17:34.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2a61 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2a62 Exiting" +"2019-04-22 06:17:34.884 UTC [gossip.comm] func1 -> DEBU 2a63 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795309603885020109 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.885 UTC [gossip.gossip] handleMessage -> DEBU 2a64 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795309603885020109 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.886 UTC [gossip.pull] HandleMessage -> DEBU 2a65 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3795309603885020109 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.887 UTC [gossip.gossip] handleMessage -> DEBU 2a66 Exiting" +"2019-04-22 06:17:34.888 UTC [gossip.gossip] handleMessage -> DEBU 2a67 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2047457086371567968 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.888 UTC [gossip.pull] HandleMessage -> DEBU 2a68 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2047457086371567968 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.888 UTC [gossip.gossip] handleMessage -> DEBU 2a69 Exiting" +"2019-04-22 06:17:34.888 UTC [gossip.comm] func1 -> DEBU 2a6a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15924882921435455467 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.888 UTC [gossip.gossip] handleMessage -> DEBU 2a6b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15924882921435455467 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.889 UTC [gossip.pull] HandleMessage -> DEBU 2a6c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15924882921435455467 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.889 UTC [gossip.gossip] handleMessage -> DEBU 2a6d Exiting" +"2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a6e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151026 " +"2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a6f Sign: digest: 9A365C6143083AF782BB34863DD6396F644594D9AB71024728DF7C467FBF14E5 " +"2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a70 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:34.927 UTC [msp.identity] Sign -> DEBU 2a71 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:34.927 UTC [gossip.comm] Send -> DEBU 2a72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:34.927 UTC [msp] DeserializeIdentity -> DEBU 2a73 Obtaining identity" +"2019-04-22 06:17:34.927 UTC [gossip.comm] Send -> DEBU 2a74 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:34.927 UTC [msp] DeserializeIdentity -> DEBU 2a75 Obtaining identity" +"2019-04-22 06:17:34.928 UTC [gossip.comm] Send -> DEBU 2a76 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a77 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a78 Exiting" +"2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a79 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7a Exiting" +"2019-04-22 06:17:34.932 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.932 UTC [gossip.comm] sendToEndpoint -> DEBU 2a7c Exiting" +"2019-04-22 06:17:34.935 UTC [gossip.comm] func1 -> DEBU 2a7d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.935 UTC [gossip.gossip] handleMessage -> DEBU 2a7e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.936 UTC [gossip.gossip] handleMessage -> DEBU 2a7f Exiting" +"2019-04-22 06:17:34.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2a80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a81 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:34.937 UTC [msp.identity] Verify -> DEBU 2a82 Verify: digest = 00000000 9a 36 5c 61 43 08 3a f7 82 bb 34 86 3d d6 39 6f |.6\aC.:...4.=.9o| +00000010 64 45 94 d9 ab 71 02 47 28 df 7c 46 7f bf 14 e5 |dE...q.G(.|F....|" +"2019-04-22 06:17:34.937 UTC [msp.identity] Verify -> DEBU 2a83 Verify: sig = 00000000 30 44 02 20 12 38 3a 96 ec ae 15 3f 38 c1 a7 e3 |0D. .8:....?8...| +00000010 c2 c8 c8 76 88 e0 c6 ef 76 ba 4a fa b5 60 ab f7 |...v....v.J..`..| +00000020 be 0b 38 06 02 20 6d 3f 2f dc 98 b6 c0 6f 61 47 |..8.. m?/....oaG| +00000030 8a c9 6d 00 ba c6 d6 76 22 7f d1 b6 5b d8 7f b0 |..m....v"...[...| +00000040 d0 c5 c4 04 c2 85 |......|" +"2019-04-22 06:17:34.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a84 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:34.938 UTC [gossip.discovery] isSentByMe -> DEBU 2a85 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:34.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a86 Exiting" +"2019-04-22 06:17:34.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a87 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:34.939 UTC [msp] DeserializeIdentity -> DEBU 2a88 Obtaining identity" +"2019-04-22 06:17:34.939 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2a89 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:34.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a8a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:34.940 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2a8b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:34.940 UTC [policies] Evaluate -> DEBU 2a8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:34.940 UTC [policies] Evaluate -> DEBU 2a8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:34.940 UTC [policies] Evaluate -> DEBU 2a8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:34.941 UTC [cauthdsl] func1 -> DEBU 2a8f 0xc0040cb6d0 gate 1555913854941101300 evaluation starts" +"2019-04-22 06:17:34.941 UTC [cauthdsl] func2 -> DEBU 2a90 0xc0040cb6d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:34.941 UTC [cauthdsl] func2 -> DEBU 2a91 0xc0040cb6d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:34.941 UTC [cauthdsl] func2 -> DEBU 2a92 0xc0040cb6d0 principal matched by identity 0" +"2019-04-22 06:17:34.941 UTC [msp.identity] Verify -> DEBU 2a93 Verify: digest = 00000000 08 61 eb 57 a9 a5 4a 30 1a 93 ef ff cc df 45 4e |.a.W..J0......EN| +00000010 ff b7 ab 2f 63 74 01 0f c3 23 90 04 e7 e9 3a 5d |.../ct...#....:]|" +"2019-04-22 06:17:34.941 UTC [msp.identity] Verify -> DEBU 2a94 Verify: sig = 00000000 30 45 02 21 00 98 96 4c 5e b4 66 4f f7 44 9c 88 |0E.!...L^.fO.D..| +00000010 83 5b 7e b7 11 15 44 46 97 f3 35 cb c7 d4 09 75 |.[~...DF..5....u| +00000020 2e 15 68 6c 2d 02 20 06 58 d8 a0 02 07 96 34 9c |..hl-. .X.....4.| +00000030 9f d6 eb aa 7c d1 39 4a 92 97 09 cc 09 91 19 a2 |....|.9J........| +00000040 62 12 1a ee f9 29 89 |b....).|" +"2019-04-22 06:17:34.942 UTC [cauthdsl] func2 -> DEBU 2a95 0xc0040cb6d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:34.942 UTC [cauthdsl] func1 -> DEBU 2a96 0xc0040cb6d0 gate 1555913854941101300 evaluation succeeds" +"2019-04-22 06:17:34.942 UTC [policies] Evaluate -> DEBU 2a97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:34.943 UTC [policies] Evaluate -> DEBU 2a98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:34.943 UTC [policies] Evaluate -> DEBU 2a99 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:34.943 UTC [policies] Evaluate -> DEBU 2a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:34.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:34.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 2a9c Exiting" +"2019-04-22 06:17:34.944 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2a9d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:34.944 UTC [msp.identity] Verify -> DEBU 2a9e Verify: digest = 00000000 a1 33 1b aa 18 67 dd bf e0 df 37 e0 b1 4b 77 3d |.3...g....7..Kw=| +00000010 4d d0 73 69 32 ca 6c 52 a3 83 5d aa 32 5a 6c 25 |M.si2.lR..].2Zl%|" +"2019-04-22 06:17:34.944 UTC [msp.identity] Verify -> DEBU 2a9f Verify: sig = 00000000 30 44 02 20 41 9d 1b c0 07 e8 cc 5a 28 d6 cb 03 |0D. A......Z(...| +00000010 85 34 65 85 7a 8b e1 47 79 b3 31 11 ba 86 99 96 |.4e.z..Gy.1.....| +00000020 02 d0 4a fe 02 20 22 ee 04 ea d0 54 eb 4e 94 18 |..J.. "....T.N..| +00000030 dd 41 76 96 ca c1 0d 66 41 35 7f 0b f5 c8 dc bf |.Av....fA5......| +00000040 50 49 a2 15 8c 90 |PI....|" +"2019-04-22 06:17:34.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aa0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:34.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aa1 Exiting" +"2019-04-22 06:17:34.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa2 Exiting" +"2019-04-22 06:17:34.946 UTC [gossip.gossip] handleMessage -> DEBU 2aa3 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.946 UTC [gossip.gossip] handleMessage -> DEBU 2aa4 Exiting" +"2019-04-22 06:17:34.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aa5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aa6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:34.947 UTC [msp.identity] Verify -> DEBU 2aa7 Verify: digest = 00000000 a1 33 1b aa 18 67 dd bf e0 df 37 e0 b1 4b 77 3d |.3...g....7..Kw=| +00000010 4d d0 73 69 32 ca 6c 52 a3 83 5d aa 32 5a 6c 25 |M.si2.lR..].2Zl%|" +"2019-04-22 06:17:34.947 UTC [msp.identity] Verify -> DEBU 2aa8 Verify: sig = 00000000 30 44 02 20 41 9d 1b c0 07 e8 cc 5a 28 d6 cb 03 |0D. A......Z(...| +00000010 85 34 65 85 7a 8b e1 47 79 b3 31 11 ba 86 99 96 |.4e.z..Gy.1.....| +00000020 02 d0 4a fe 02 20 22 ee 04 ea d0 54 eb 4e 94 18 |..J.. "....T.N..| +00000030 dd 41 76 96 ca c1 0d 66 41 35 7f 0b f5 c8 dc bf |.Av....fA5......| +00000040 50 49 a2 15 8c 90 |PI....|" +"2019-04-22 06:17:34.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aa9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:34.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aaa Exiting" +"2019-04-22 06:17:34.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2aab Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:34.949 UTC [msp.identity] Verify -> DEBU 2aac Verify: digest = 00000000 9a 36 5c 61 43 08 3a f7 82 bb 34 86 3d d6 39 6f |.6\aC.:...4.=.9o| +00000010 64 45 94 d9 ab 71 02 47 28 df 7c 46 7f bf 14 e5 |dE...q.G(.|F....|" +"2019-04-22 06:17:34.949 UTC [msp.identity] Verify -> DEBU 2aad Verify: sig = 00000000 30 44 02 20 12 38 3a 96 ec ae 15 3f 38 c1 a7 e3 |0D. .8:....?8...| +00000010 c2 c8 c8 76 88 e0 c6 ef 76 ba 4a fa b5 60 ab f7 |...v....v.J..`..| +00000020 be 0b 38 06 02 20 6d 3f 2f dc 98 b6 c0 6f 61 47 |..8.. m?/....oaG| +00000030 8a c9 6d 00 ba c6 d6 76 22 7f d1 b6 5b d8 7f b0 |..m....v"...[...| +00000040 d0 c5 c4 04 c2 85 |......|" +"2019-04-22 06:17:34.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 2aae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:34.950 UTC [gossip.discovery] isSentByMe -> DEBU 2aaf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:34.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ab0 Exiting" +"2019-04-22 06:17:34.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ab1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:34.950 UTC [msp] DeserializeIdentity -> DEBU 2ab2 Obtaining identity" +"2019-04-22 06:17:34.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ab3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:34.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ab4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:34.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ab5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:34.952 UTC [policies] Evaluate -> DEBU 2ab6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:34.952 UTC [policies] Evaluate -> DEBU 2ab7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:34.952 UTC [policies] Evaluate -> DEBU 2ab8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:34.952 UTC [cauthdsl] func1 -> DEBU 2ab9 0xc003f76090 gate 1555913854952540000 evaluation starts" +"2019-04-22 06:17:34.952 UTC [cauthdsl] func2 -> DEBU 2aba 0xc003f76090 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:34.952 UTC [cauthdsl] func2 -> DEBU 2abb 0xc003f76090 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:34.953 UTC [cauthdsl] func2 -> DEBU 2abc 0xc003f76090 principal matched by identity 0" +"2019-04-22 06:17:34.953 UTC [msp.identity] Verify -> DEBU 2abd Verify: digest = 00000000 58 9f d3 12 8f d6 80 98 97 a7 e0 54 3f 7f 3a 40 |X..........T?.:@| +00000010 d3 46 38 b2 cb 60 e4 72 b1 44 c8 0b 42 ec c5 c3 |.F8..`.r.D..B...|" +"2019-04-22 06:17:34.953 UTC [msp.identity] Verify -> DEBU 2abe Verify: sig = 00000000 30 44 02 20 14 c2 07 88 8a ef 91 83 82 1e c6 ad |0D. ............| +00000010 c3 f8 66 7f f8 f1 e8 b1 9b fe 5e a8 01 2b c6 6a |..f.......^..+.j| +00000020 d4 0b 93 7c 02 20 29 10 85 e0 01 b4 b5 ec e9 f0 |...|. ).........| +00000030 60 08 f7 be dd f3 05 d2 3d cf 43 d8 f3 55 3e b3 |`.......=.C..U>.| +00000040 31 73 d3 2d a3 24 |1s.-.$|" +"2019-04-22 06:17:34.953 UTC [cauthdsl] func2 -> DEBU 2abf 0xc003f76090 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:34.953 UTC [cauthdsl] func1 -> DEBU 2ac0 0xc003f76090 gate 1555913854952540000 evaluation succeeds" +"2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac3 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:34.954 UTC [policies] Evaluate -> DEBU 2ac4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:34.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:34.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ac6 Exiting" +"2019-04-22 06:17:34.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ac7 Exiting" +"2019-04-22 06:17:34.957 UTC [gossip.comm] func1 -> DEBU 2ac8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.957 UTC [gossip.gossip] handleMessage -> DEBU 2ac9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.958 UTC [gossip.gossip] handleMessage -> DEBU 2aca Exiting" +"2019-04-22 06:17:34.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2acb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:34.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2acc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:34.959 UTC [msp.identity] Verify -> DEBU 2acd Verify: digest = 00000000 9a 36 5c 61 43 08 3a f7 82 bb 34 86 3d d6 39 6f |.6\aC.:...4.=.9o| +00000010 64 45 94 d9 ab 71 02 47 28 df 7c 46 7f bf 14 e5 |dE...q.G(.|F....|" +"2019-04-22 06:17:34.959 UTC [msp.identity] Verify -> DEBU 2ace Verify: sig = 00000000 30 44 02 20 12 38 3a 96 ec ae 15 3f 38 c1 a7 e3 |0D. .8:....?8...| +00000010 c2 c8 c8 76 88 e0 c6 ef 76 ba 4a fa b5 60 ab f7 |...v....v.J..`..| +00000020 be 0b 38 06 02 20 6d 3f 2f dc 98 b6 c0 6f 61 47 |..8.. m?/....oaG| +00000030 8a c9 6d 00 ba c6 d6 76 22 7f d1 b6 5b d8 7f b0 |..m....v"...[...| +00000040 d0 c5 c4 04 c2 85 |......|" +"2019-04-22 06:17:34.960 UTC [msp.identity] Verify -> DEBU 2acf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:34.960 UTC [msp.identity] Verify -> DEBU 2ad0 Verify: sig = 00000000 30 45 02 21 00 9f d6 b7 d4 56 8d 11 a2 c8 0e ed |0E.!.....V......| +00000010 56 56 8c 5d f3 4d 53 0a 2b fc 22 08 f4 a0 cb 17 |VV.].MS.+.".....| +00000020 12 98 eb dd 38 02 20 6f 38 b3 d2 5e f7 44 ca 72 |....8. o8..^.D.r| +00000030 55 b2 51 60 ac 2f af a0 2c da 57 a3 67 cc 07 d6 |U.Q`./..,.W.g...| +00000040 29 cd 72 d5 51 f0 de |).r.Q..|" +"2019-04-22 06:17:34.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ad1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:34.962 UTC [gossip.discovery] isSentByMe -> DEBU 2ad2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:38 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:34.962 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ad3 Exiting" +"2019-04-22 06:17:34.962 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ad4 Exiting" +"2019-04-22 06:17:35.136 UTC [gossip.comm] func1 -> DEBU 2ad5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.136 UTC [gossip.gossip] handleMessage -> DEBU 2ad6 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.137 UTC [gossip.pull] HandleMessage -> DEBU 2ad7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.137 UTC [gossip.pull] SendDigest -> DEBU 2ad8 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:35.138 UTC [gossip.gossip] handleMessage -> DEBU 2ad9 Exiting" +"2019-04-22 06:17:35.157 UTC [gossip.comm] func1 -> DEBU 2ada Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.158 UTC [gossip.gossip] handleMessage -> DEBU 2adb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.159 UTC [gossip.gossip] handleMessage -> DEBU 2adc Exiting" +"2019-04-22 06:17:35.160 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2add Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.161 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ade Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:35.161 UTC [msp.identity] Verify -> DEBU 2adf Verify: digest = 00000000 9b 92 e0 70 43 63 f0 31 92 a8 62 6a a1 d9 5c e4 |...pCc.1..bj..\.| +00000010 fd 57 6c 00 c8 0c 1d c3 88 ee aa 94 71 51 fd 93 |.Wl.........qQ..|" +"2019-04-22 06:17:35.161 UTC [msp.identity] Verify -> DEBU 2ae0 Verify: sig = 00000000 30 44 02 20 4e 06 99 1e 70 e0 88 3a 16 49 ba 66 |0D. N...p..:.I.f| +00000010 6f c2 b9 af bf e8 71 e5 15 cf 0b 0d 75 9b cf 23 |o.....q.....u..#| +00000020 e0 4a 4d f3 02 20 2a 11 0c e5 3e 98 4f 60 5c c0 |.JM.. *...>.O`\.| +00000030 f6 32 10 8a 4a f2 60 55 ea f4 ff d3 32 7e cd 09 |.2..J.`U....2~..| +00000040 85 c2 18 8e e9 02 |......|" +"2019-04-22 06:17:35.162 UTC [msp.identity] Verify -> DEBU 2ae1 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:35.162 UTC [msp.identity] Verify -> DEBU 2ae2 Verify: sig = 00000000 30 45 02 21 00 d0 a2 79 9a 61 4b aa a3 0a 44 e6 |0E.!...y.aK...D.| +00000010 70 69 7b 08 db 84 39 27 09 46 78 9d ea 18 63 33 |pi{...9'.Fx...c3| +00000020 07 64 54 c4 d6 02 20 1a e8 f5 4c c4 66 fa f3 8d |.dT... ...L.f...| +00000030 fb d9 18 c1 cb 44 fa fc b8 cc 87 03 1d d0 ec 13 |.....D..........| +00000040 7f 07 8e b0 eb 12 87 |.......|" +"2019-04-22 06:17:35.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:35.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:35.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae5 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 " +"2019-04-22 06:17:35.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae6 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 " +"2019-04-22 06:17:35.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:35.171 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ae8 Exiting" +"2019-04-22 06:17:35.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ae9 Exiting" +"2019-04-22 06:17:35.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2aea Exiting" +"2019-04-22 06:17:35.172 UTC [gossip.discovery] sendMemResponse -> DEBU 2aeb Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:35.173 UTC [msp] DeserializeIdentity -> DEBU 2aec Obtaining identity" +"2019-04-22 06:17:35.174 UTC [msp] DeserializeIdentity -> DEBU 2aed Obtaining identity" +"2019-04-22 06:17:35.174 UTC [gossip.comm] Send -> DEBU 2aee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:35.175 UTC [gossip.discovery] sendMemResponse -> DEBU 2aef Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:35.175 UTC [gossip.comm] sendToEndpoint -> DEBU 2af0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.176 UTC [gossip.comm] sendToEndpoint -> DEBU 2af1 Exiting" +"2019-04-22 06:17:35.592 UTC [gossip.comm] func1 -> DEBU 2af2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.592 UTC [gossip.gossip] handleMessage -> DEBU 2af3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.592 UTC [gossip.pull] HandleMessage -> DEBU 2af4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af5 Obtaining identity" +"2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af6 Obtaining identity" +"2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af7 Obtaining identity" +"2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af8 Obtaining identity" +"2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2af9 Obtaining identity" +"2019-04-22 06:17:35.592 UTC [msp] DeserializeIdentity -> DEBU 2afa Obtaining identity" +"2019-04-22 06:17:35.593 UTC [gossip.pull] SendDigest -> DEBU 2afb Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:35.593 UTC [gossip.gossip] handleMessage -> DEBU 2afc Exiting" +"2019-04-22 06:17:35.635 UTC [gossip.comm] func1 -> DEBU 2afd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.635 UTC [gossip.gossip] handleMessage -> DEBU 2afe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.635 UTC [gossip.gossip] handleMessage -> DEBU 2aff Exiting" +"2019-04-22 06:17:35.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b00 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.636 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b01 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:35.636 UTC [msp] DeserializeIdentity -> DEBU 2b02 Obtaining identity" +"2019-04-22 06:17:35.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b03 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:35.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b04 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:35.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b05 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b06 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b07 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b08 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:35.636 UTC [cauthdsl] func1 -> DEBU 2b09 0xc003eaccf0 gate 1555913855636458300 evaluation starts" +"2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0a 0xc003eaccf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0b 0xc003eaccf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0c 0xc003eaccf0 principal matched by identity 0" +"2019-04-22 06:17:35.636 UTC [msp.identity] Verify -> DEBU 2b0d Verify: digest = 00000000 20 aa d3 12 18 9f 09 77 84 fa dd f8 63 9d 39 e4 | ......w....c.9.| +00000010 26 95 b6 10 4f af 08 2a 00 c5 87 39 c1 41 b2 4c |&...O..*...9.A.L|" +"2019-04-22 06:17:35.636 UTC [msp.identity] Verify -> DEBU 2b0e Verify: sig = 00000000 30 44 02 20 58 92 5c a6 d4 e3 d2 0c f0 e2 6b d6 |0D. X.\.......k.| +00000010 57 65 ce cc 9e b3 1b e2 7f e2 ea 67 76 24 52 b7 |We.........gv$R.| +00000020 fc 88 16 fa 02 20 24 3d 21 bd 92 9c 2e 21 08 8c |..... $=!....!..| +00000030 23 c4 0f a2 9c f2 ec 5c 25 68 fa 8d 9d 27 38 a3 |#......\%h...'8.| +00000040 38 33 85 87 f4 08 |83....|" +"2019-04-22 06:17:35.636 UTC [cauthdsl] func2 -> DEBU 2b0f 0xc003eaccf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:35.636 UTC [cauthdsl] func1 -> DEBU 2b10 0xc003eaccf0 gate 1555913855636458300 evaluation succeeds" +"2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b11 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b12 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b13 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:35.636 UTC [policies] Evaluate -> DEBU 2b14 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b15 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b16 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b17 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 " +"2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b18 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 " +"2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b19 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b1a Exiting" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b1b Exiting" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b1c Exiting" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] sendMemResponse -> DEBU 2b1d Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:35.637 UTC [msp] DeserializeIdentity -> DEBU 2b1e Obtaining identity" +"2019-04-22 06:17:35.637 UTC [msp] DeserializeIdentity -> DEBU 2b1f Obtaining identity" +"2019-04-22 06:17:35.637 UTC [msp] DeserializeIdentity -> DEBU 2b20 Obtaining identity" +"2019-04-22 06:17:35.637 UTC [gossip.comm] Send -> DEBU 2b21 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:35.637 UTC [gossip.discovery] sendMemResponse -> DEBU 2b22 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:35.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b23 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:35.637 UTC [gossip.comm] sendToEndpoint -> DEBU 2b24 Exiting" +"2019-04-22 06:17:35.829 UTC [msp.identity] Sign -> DEBU 2b25 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151027 " +"2019-04-22 06:17:35.830 UTC [msp.identity] Sign -> DEBU 2b26 Sign: digest: 97908C94109087893440528F651AD8E7946E98FBAB99CD36D07C9E7AAFF3559B " +"2019-04-22 06:17:35.830 UTC [msp.identity] Sign -> DEBU 2b27 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:35.830 UTC [msp.identity] Sign -> DEBU 2b28 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:35.830 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2b29 Sleeping 5s" +"2019-04-22 06:17:35.830 UTC [msp] DeserializeIdentity -> DEBU 2b2a Obtaining identity" +"2019-04-22 06:17:35.830 UTC [msp] DeserializeIdentity -> DEBU 2b2b Obtaining identity" +"2019-04-22 06:17:35.831 UTC [msp] DeserializeIdentity -> DEBU 2b2c Obtaining identity" +"2019-04-22 06:17:35.831 UTC [gossip.comm] Send -> DEBU 2b2d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:35.831 UTC [msp] DeserializeIdentity -> DEBU 2b2e Obtaining identity" +"2019-04-22 06:17:35.831 UTC [gossip.comm] Send -> DEBU 2b2f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:35.831 UTC [gossip.comm] Send -> DEBU 2b30 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:35.831 UTC [gossip.comm] sendToEndpoint -> DEBU 2b31 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b32 Exiting" +"2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b34 Exiting" +"2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b35 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:35.832 UTC [gossip.comm] sendToEndpoint -> DEBU 2b36 Exiting" +"2019-04-22 06:17:36.020 UTC [gossip.gossip] handleMessage -> DEBU 2b37 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.020 UTC [gossip.pull] HandleMessage -> DEBU 2b38 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.020 UTC [msp] DeserializeIdentity -> DEBU 2b39 Obtaining identity" +"2019-04-22 06:17:36.020 UTC [msp] DeserializeIdentity -> DEBU 2b3a Obtaining identity" +"2019-04-22 06:17:36.021 UTC [msp] DeserializeIdentity -> DEBU 2b3b Obtaining identity" +"2019-04-22 06:17:36.021 UTC [msp] DeserializeIdentity -> DEBU 2b3c Obtaining identity" +"2019-04-22 06:17:36.021 UTC [msp] DeserializeIdentity -> DEBU 2b3d Obtaining identity" +"2019-04-22 06:17:36.022 UTC [msp] DeserializeIdentity -> DEBU 2b3e Obtaining identity" +"2019-04-22 06:17:36.022 UTC [gossip.pull] SendDigest -> DEBU 2b3f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:36.022 UTC [gossip.gossip] handleMessage -> DEBU 2b40 Exiting" +"2019-04-22 06:17:36.036 UTC [gossip.gossip] handleMessage -> DEBU 2b41 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.036 UTC [gossip.gossip] handleMessage -> DEBU 2b42 Exiting" +"2019-04-22 06:17:36.036 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.036 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b44 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:36.036 UTC [msp] DeserializeIdentity -> DEBU 2b45 Obtaining identity" +"2019-04-22 06:17:36.036 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.036 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b47 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.037 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b48 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.037 UTC [policies] Evaluate -> DEBU 2b49 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b4a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b4b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.038 UTC [cauthdsl] func1 -> DEBU 2b4c 0xc003dc6590 gate 1555913856038079800 evaluation starts" +"2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b4d 0xc003dc6590 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b4e 0xc003dc6590 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b4f 0xc003dc6590 principal matched by identity 0" +"2019-04-22 06:17:36.038 UTC [msp.identity] Verify -> DEBU 2b50 Verify: digest = 00000000 c3 82 87 01 8c 79 b2 60 53 1a b0 2d f3 93 b6 f6 |.....y.`S..-....| +00000010 9a be 22 7e 27 fe eb 9e 50 70 08 f5 43 fb fd da |.."~'...Pp..C...|" +"2019-04-22 06:17:36.038 UTC [msp.identity] Verify -> DEBU 2b51 Verify: sig = 00000000 30 44 02 20 7f 62 cc 43 da aa 81 e4 60 ae 5c 82 |0D. .b.C....`.\.| +00000010 73 83 89 2d 71 de 63 07 86 73 27 7d 8b cf 21 22 |s..-q.c..s'}..!"| +00000020 8b 60 de d5 02 20 34 5b 02 f5 bd 3b 0e 70 3f 97 |.`... 4[...;.p?.| +00000030 d2 1c 2c 4d 94 e4 25 a4 08 ea 0a 8a 78 61 c4 f1 |..,M..%.....xa..| +00000040 4e 37 b5 e3 cb 46 |N7...F|" +"2019-04-22 06:17:36.038 UTC [cauthdsl] func2 -> DEBU 2b52 0xc003dc6590 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.038 UTC [cauthdsl] func1 -> DEBU 2b53 0xc003dc6590 gate 1555913856038079800 evaluation succeeds" +"2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b54 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b55 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b56 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.038 UTC [policies] Evaluate -> DEBU 2b57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b58 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b59 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5a updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 " +"2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5b Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 " +"2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:38 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:36.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b5d Exiting" +"2019-04-22 06:17:36.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b5e Exiting" +"2019-04-22 06:17:36.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b5f Exiting" +"2019-04-22 06:17:36.038 UTC [gossip.discovery] sendMemResponse -> DEBU 2b60 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:36.039 UTC [msp] DeserializeIdentity -> DEBU 2b61 Obtaining identity" +"2019-04-22 06:17:36.039 UTC [msp] DeserializeIdentity -> DEBU 2b62 Obtaining identity" +"2019-04-22 06:17:36.039 UTC [msp] DeserializeIdentity -> DEBU 2b63 Obtaining identity" +"2019-04-22 06:17:36.039 UTC [gossip.comm] Send -> DEBU 2b64 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:36.039 UTC [gossip.discovery] sendMemResponse -> DEBU 2b65 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:36.039 UTC [gossip.comm] sendToEndpoint -> DEBU 2b66 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.039 UTC [gossip.comm] sendToEndpoint -> DEBU 2b67 Exiting" +"2019-04-22 06:17:36.118 UTC [gossip.comm] func1 -> DEBU 2b68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:36.118 UTC [gossip.gossip] handleMessage -> DEBU 2b69 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:36.119 UTC [gossip.gossip] handleMessage -> DEBU 2b6a Exiting" +"2019-04-22 06:17:36.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b6b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:36.119 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2b6c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:36.120 UTC [msp.identity] Verify -> DEBU 2b6d Verify: digest = 00000000 76 d6 de 99 b0 55 0a dc 72 57 9d df da fc 79 3e |v....U..rW....y>| +00000010 bf ba 96 b1 bb 2b 03 e2 bd f2 2f 82 69 3e 2b b6 |.....+..../.i>+.|" +"2019-04-22 06:17:36.120 UTC [msp.identity] Verify -> DEBU 2b6e Verify: sig = 00000000 30 44 02 20 1a d5 b6 08 88 2a d5 66 dc 38 54 79 |0D. .....*.f.8Ty| +00000010 7a 27 b2 7c 7d 69 ec c7 6c f1 ca 9e d3 24 0e 1b |z'.|}i..l....$..| +00000020 88 ba da f6 02 20 2c 62 2d ba 26 91 2b 22 bf 7f |..... ,b-.&.+"..| +00000030 d8 ea d8 10 27 73 d0 90 65 35 6b ee 5b 02 d3 5d |....'s..e5k.[..]| +00000040 9c 0b 44 15 33 38 |..D.38|" +"2019-04-22 06:17:36.121 UTC [msp.identity] Verify -> DEBU 2b6f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:36.121 UTC [msp.identity] Verify -> DEBU 2b70 Verify: sig = 00000000 30 45 02 21 00 85 3b 41 99 f4 b1 f0 db 1f b1 a5 |0E.!..;A........| +00000010 9a 32 33 36 d2 52 ee 5b aa 4c 3a d4 c2 36 42 00 |.236.R.[.L:..6B.| +00000020 bf 92 df 7f 0b 02 20 0c 1f 0e 1f d2 d0 25 de 9f |...... ......%..| +00000030 a3 22 fb 56 f2 5f 9c 45 f9 14 77 e7 b7 91 68 8d |.".V._.E..w...h.| +00000040 6e a4 f4 60 4c d2 98 |n..`L..|" +"2019-04-22 06:17:36.124 UTC [gossip.comm] func1 -> DEBU 2b71 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.124 UTC [gossip.gossip] handleMessage -> DEBU 2b72 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.124 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b73 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:36.125 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b74 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:36.126 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b75 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 " +"2019-04-22 06:17:36.126 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b76 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 " +"2019-04-22 06:17:36.126 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b77 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:36.127 UTC [gossip.discovery] learnExistingMembers -> DEBU 2b78 Exiting" +"2019-04-22 06:17:36.127 UTC [gossip.discovery] handleAliveMessage -> DEBU 2b79 Exiting" +"2019-04-22 06:17:36.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7a Exiting" +"2019-04-22 06:17:36.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b7d Exiting" +"2019-04-22 06:17:36.128 UTC [gossip.gossip] handleMessage -> DEBU 2b7c Exiting" +"2019-04-22 06:17:36.130 UTC [gossip.gossip] handleMessage -> DEBU 2b7e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.131 UTC [gossip.gossip] handleMessage -> DEBU 2b7f Exiting" +"2019-04-22 06:17:36.131 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.131 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2b81 Exiting" +"2019-04-22 06:17:36.132 UTC [msp] DeserializeIdentity -> DEBU 2b82 Obtaining identity" +"2019-04-22 06:17:36.132 UTC [msp] DeserializeIdentity -> DEBU 2b83 Obtaining identity" +"2019-04-22 06:17:36.132 UTC [msp] DeserializeIdentity -> DEBU 2b84 Obtaining identity" +"2019-04-22 06:17:36.132 UTC [gossip.comm] Send -> DEBU 2b85 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:36.133 UTC [msp] DeserializeIdentity -> DEBU 2b86 Obtaining identity" +"2019-04-22 06:17:36.133 UTC [gossip.comm] Send -> DEBU 2b87 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b88 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b89 Exiting" +"2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.133 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8b Exiting" +"2019-04-22 06:17:36.390 UTC [msp] DeserializeIdentity -> DEBU 2b8c Obtaining identity" +"2019-04-22 06:17:36.390 UTC [msp] DeserializeIdentity -> DEBU 2b8d Obtaining identity" +"2019-04-22 06:17:36.390 UTC [gossip.comm] Send -> DEBU 2b8e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:36.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2b90 Exiting" +"2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b91 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b92 Exiting" +"2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b93 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2b94 Exiting" +"2019-04-22 06:17:36.394 UTC [gossip.gossip] handleMessage -> DEBU 2b95 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.394 UTC [msp] DeserializeIdentity -> DEBU 2b96 Obtaining identity" +"2019-04-22 06:17:36.394 UTC [msp] DeserializeIdentity -> DEBU 2b97 Obtaining identity" +"2019-04-22 06:17:36.394 UTC [msp] DeserializeIdentity -> DEBU 2b98 Obtaining identity" +"2019-04-22 06:17:36.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2b99 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2b9b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.394 UTC [policies] Evaluate -> DEBU 2b9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.394 UTC [policies] Evaluate -> DEBU 2b9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2b9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.395 UTC [cauthdsl] func1 -> DEBU 2b9f 0xc003d15470 gate 1555913856395109600 evaluation starts" +"2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba0 0xc003d15470 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba1 0xc003d15470 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba2 0xc003d15470 principal matched by identity 0" +"2019-04-22 06:17:36.395 UTC [msp.identity] Verify -> DEBU 2ba3 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:36.395 UTC [msp.identity] Verify -> DEBU 2ba4 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:36.395 UTC [cauthdsl] func2 -> DEBU 2ba5 0xc003d15470 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.395 UTC [cauthdsl] func1 -> DEBU 2ba6 0xc003d15470 gate 1555913856395109600 evaluation succeeds" +"2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2ba7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2ba8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2ba9 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.395 UTC [policies] Evaluate -> DEBU 2baa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.396 UTC [msp] DeserializeIdentity -> DEBU 2bab Obtaining identity" +"2019-04-22 06:17:36.396 UTC [msp] DeserializeIdentity -> DEBU 2bac Obtaining identity" +"2019-04-22 06:17:36.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bad Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bae Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2baf Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.396 UTC [policies] Evaluate -> DEBU 2bb0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.396 UTC [policies] Evaluate -> DEBU 2bb1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.396 UTC [policies] Evaluate -> DEBU 2bb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.396 UTC [cauthdsl] func1 -> DEBU 2bb3 0xc003a9cc90 gate 1555913856396666400 evaluation starts" +"2019-04-22 06:17:36.396 UTC [cauthdsl] func2 -> DEBU 2bb4 0xc003a9cc90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.396 UTC [cauthdsl] func2 -> DEBU 2bb5 0xc003a9cc90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.396 UTC [cauthdsl] func2 -> DEBU 2bb6 0xc003a9cc90 principal matched by identity 0" +"2019-04-22 06:17:36.396 UTC [msp.identity] Verify -> DEBU 2bb7 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:36.396 UTC [msp.identity] Verify -> DEBU 2bb8 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:36.397 UTC [cauthdsl] func2 -> DEBU 2bb9 0xc003a9cc90 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.397 UTC [cauthdsl] func1 -> DEBU 2bba 0xc003a9cc90 gate 1555913856396666400 evaluation succeeds" +"2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbd Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.397 UTC [policies] Evaluate -> DEBU 2bbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.397 UTC [msp.identity] Verify -> DEBU 2bbf Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:36.397 UTC [msp.identity] Verify -> DEBU 2bc0 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc1 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc2 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:36.398 UTC [gossip.gossip] handleMessage -> DEBU 2bc3 Exiting" +"2019-04-22 06:17:36.398 UTC [gossip.comm] func1 -> DEBU 2bc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.398 UTC [gossip.gossip] handleMessage -> DEBU 2bc5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc6 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:36.398 UTC [msp.identity] Verify -> DEBU 2bc8 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:36.399 UTC [msp] DeserializeIdentity -> DEBU 2bc9 Obtaining identity" +"2019-04-22 06:17:36.399 UTC [msp] DeserializeIdentity -> DEBU 2bca Obtaining identity" +"2019-04-22 06:17:36.399 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bcb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.399 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcc Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.399 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bcd Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.399 UTC [policies] Evaluate -> DEBU 2bce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.399 UTC [policies] Evaluate -> DEBU 2bcf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.399 UTC [policies] Evaluate -> DEBU 2bd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.399 UTC [cauthdsl] func1 -> DEBU 2bd1 0xc0039adec0 gate 1555913856399781500 evaluation starts" +"2019-04-22 06:17:36.399 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc0039adec0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.399 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc0039adec0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.398 UTC [gossip.comm] func1 -> DEBU 2bc7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.402 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc0039adec0 principal matched by identity 0" +"2019-04-22 06:17:36.403 UTC [msp.identity] Verify -> DEBU 2bd5 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:36.403 UTC [msp.identity] Verify -> DEBU 2bd6 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:36.404 UTC [cauthdsl] func2 -> DEBU 2bd7 0xc0039adec0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.404 UTC [cauthdsl] func1 -> DEBU 2bd8 0xc0039adec0 gate 1555913856399781500 evaluation succeeds" +"2019-04-22 06:17:36.404 UTC [policies] Evaluate -> DEBU 2bd9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.405 UTC [policies] Evaluate -> DEBU 2bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.405 UTC [policies] Evaluate -> DEBU 2bdb Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.406 UTC [policies] Evaluate -> DEBU 2bdc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.406 UTC [msp.identity] Verify -> DEBU 2bdd Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:36.407 UTC [msp.identity] Verify -> DEBU 2bde Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:36.407 UTC [msp] DeserializeIdentity -> DEBU 2bdf Obtaining identity" +"2019-04-22 06:17:36.408 UTC [msp] DeserializeIdentity -> DEBU 2be0 Obtaining identity" +"2019-04-22 06:17:36.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2be1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2be3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.410 UTC [policies] Evaluate -> DEBU 2be4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.410 UTC [policies] Evaluate -> DEBU 2be5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.410 UTC [policies] Evaluate -> DEBU 2be6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.411 UTC [cauthdsl] func1 -> DEBU 2be7 0xc0039a3e00 gate 1555913856411121600 evaluation starts" +"2019-04-22 06:17:36.411 UTC [cauthdsl] func2 -> DEBU 2be8 0xc0039a3e00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.412 UTC [cauthdsl] func2 -> DEBU 2be9 0xc0039a3e00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.412 UTC [cauthdsl] func2 -> DEBU 2bea 0xc0039a3e00 principal matched by identity 0" +"2019-04-22 06:17:36.412 UTC [msp.identity] Verify -> DEBU 2beb Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:36.413 UTC [msp.identity] Verify -> DEBU 2bec Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:36.413 UTC [cauthdsl] func2 -> DEBU 2bed 0xc0039a3e00 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.417 UTC [cauthdsl] func1 -> DEBU 2bee 0xc0039a3e00 gate 1555913856411121600 evaluation succeeds" +"2019-04-22 06:17:36.419 UTC [policies] Evaluate -> DEBU 2bef Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.420 UTC [policies] Evaluate -> DEBU 2bf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.420 UTC [policies] Evaluate -> DEBU 2bf1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.423 UTC [policies] Evaluate -> DEBU 2bf2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.424 UTC [gossip.gossip] handleMessage -> DEBU 2bf3 Exiting" +"2019-04-22 06:17:36.428 UTC [gossip.gossip] handleMessage -> DEBU 2bf4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.429 UTC [msp] DeserializeIdentity -> DEBU 2bf5 Obtaining identity" +"2019-04-22 06:17:36.431 UTC [msp] DeserializeIdentity -> DEBU 2bf6 Obtaining identity" +"2019-04-22 06:17:36.432 UTC [msp] DeserializeIdentity -> DEBU 2bf7 Obtaining identity" +"2019-04-22 06:17:36.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bf8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bf9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.433 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bfa Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.433 UTC [policies] Evaluate -> DEBU 2bfb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.433 UTC [policies] Evaluate -> DEBU 2bfc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.433 UTC [policies] Evaluate -> DEBU 2bfd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.433 UTC [cauthdsl] func1 -> DEBU 2bfe 0xc003899a50 gate 1555913856433188500 evaluation starts" +"2019-04-22 06:17:36.435 UTC [cauthdsl] func2 -> DEBU 2bff 0xc003899a50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.438 UTC [cauthdsl] func2 -> DEBU 2c00 0xc003899a50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.438 UTC [cauthdsl] func2 -> DEBU 2c01 0xc003899a50 principal matched by identity 0" +"2019-04-22 06:17:36.438 UTC [msp.identity] Verify -> DEBU 2c02 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:36.438 UTC [msp.identity] Verify -> DEBU 2c03 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:36.438 UTC [cauthdsl] func2 -> DEBU 2c04 0xc003899a50 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.438 UTC [cauthdsl] func1 -> DEBU 2c05 0xc003899a50 gate 1555913856433188500 evaluation succeeds" +"2019-04-22 06:17:36.438 UTC [policies] Evaluate -> DEBU 2c06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.440 UTC [policies] Evaluate -> DEBU 2c07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.440 UTC [policies] Evaluate -> DEBU 2c08 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.440 UTC [policies] Evaluate -> DEBU 2c09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.440 UTC [msp] DeserializeIdentity -> DEBU 2c0a Obtaining identity" +"2019-04-22 06:17:36.440 UTC [msp] DeserializeIdentity -> DEBU 2c0b Obtaining identity" +"2019-04-22 06:17:36.440 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.440 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.441 UTC [cauthdsl] func1 -> DEBU 2c12 0xc00340b2a0 gate 1555913856441166900 evaluation starts" +"2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c13 0xc00340b2a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c14 0xc00340b2a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c15 0xc00340b2a0 principal matched by identity 0" +"2019-04-22 06:17:36.441 UTC [msp.identity] Verify -> DEBU 2c16 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:36.441 UTC [msp.identity] Verify -> DEBU 2c17 Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:36.441 UTC [cauthdsl] func2 -> DEBU 2c18 0xc00340b2a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.441 UTC [cauthdsl] func1 -> DEBU 2c19 0xc00340b2a0 gate 1555913856441166900 evaluation succeeds" +"2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.441 UTC [policies] Evaluate -> DEBU 2c1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.441 UTC [msp.identity] Verify -> DEBU 2c1e Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:36.442 UTC [msp.identity] Verify -> DEBU 2c1f Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:36.442 UTC [msp.identity] Verify -> DEBU 2c20 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:36.442 UTC [msp.identity] Verify -> DEBU 2c21 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:36.442 UTC [gossip.gossip] handleMessage -> DEBU 2c22 Exiting" +"2019-04-22 06:17:36.454 UTC [gossip.election] waitForInterrupt -> DEBU 2c23 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:36.454 UTC [gossip.election] IsLeader -> DEBU 2c24 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:36.454 UTC [msp.identity] Sign -> DEBU 2c25 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100C1801 " +"2019-04-22 06:17:36.454 UTC [msp.identity] Sign -> DEBU 2c26 Sign: digest: 3D281FFF2AB53FBFA1CC5CBC611709229B5EC6811E5489B278685443B3F6CC78 " +"2019-04-22 06:17:36.455 UTC [gossip.election] waitForInterrupt -> DEBU 2c27 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:36.456 UTC [msp] DeserializeIdentity -> DEBU 2c28 Obtaining identity" +"2019-04-22 06:17:36.456 UTC [msp] DeserializeIdentity -> DEBU 2c29 Obtaining identity" +"2019-04-22 06:17:36.457 UTC [msp] DeserializeIdentity -> DEBU 2c2a Obtaining identity" +"2019-04-22 06:17:36.457 UTC [msp] DeserializeIdentity -> DEBU 2c2b Obtaining identity" +"2019-04-22 06:17:36.458 UTC [gossip.comm] Send -> DEBU 2c2c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:36.459 UTC [msp] DeserializeIdentity -> DEBU 2c2d Obtaining identity" +"2019-04-22 06:17:36.459 UTC [msp] DeserializeIdentity -> DEBU 2c2e Obtaining identity" +"2019-04-22 06:17:36.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2c2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:12 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:17:36.459 UTC [gossip.comm] sendToEndpoint -> DEBU 2c30 Exiting" +"2019-04-22 06:17:36.479 UTC [msp] DeserializeIdentity -> DEBU 2c31 Obtaining identity" +"2019-04-22 06:17:36.487 UTC [msp] DeserializeIdentity -> DEBU 2c32 Obtaining identity" +"2019-04-22 06:17:36.488 UTC [gossip.pull] Hello -> DEBU 2c33 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:36.488 UTC [msp] DeserializeIdentity -> DEBU 2c34 Obtaining identity" +"2019-04-22 06:17:36.488 UTC [msp] DeserializeIdentity -> DEBU 2c35 Obtaining identity" +"2019-04-22 06:17:36.488 UTC [gossip.comm] Send -> DEBU 2c36 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:36.488 UTC [gossip.comm] sendToEndpoint -> DEBU 2c37 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.488 UTC [gossip.comm] sendToEndpoint -> DEBU 2c38 Exiting" +"2019-04-22 06:17:36.489 UTC [gossip.comm] func1 -> DEBU 2c39 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4236186856040757481 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.489 UTC [gossip.gossip] handleMessage -> DEBU 2c3a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4236186856040757481 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.490 UTC [gossip.pull] HandleMessage -> DEBU 2c3b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 4236186856040757481 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5], Envelope: 48 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.490 UTC [gossip.gossip] handleMessage -> DEBU 2c3c Exiting" +"2019-04-22 06:17:36.501 UTC [dockercontroller] deployImage -> DEBU 2c3d Created image: dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c" +"2019-04-22 06:17:36.501 UTC [dockercontroller] createContainer -> DEBU 2c3e create container" imageID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c containerID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-04-22 06:17:36.592 UTC [dockercontroller] createContainer -> DEBU 2c3f created container" imageID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b-b4a749f11ae174de7cc5dddd1c92ed5aa587c478d34f95ebff228fcf8965ed7c containerID=dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b +"2019-04-22 06:17:36.603 UTC [gossip.comm] func1 -> DEBU 2c40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.603 UTC [gossip.gossip] handleMessage -> DEBU 2c41 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.603 UTC [gossip.gossip] handleMessage -> DEBU 2c42 Exiting" +"2019-04-22 06:17:36.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.604 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c44 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:36.604 UTC [msp] DeserializeIdentity -> DEBU 2c45 Obtaining identity" +"2019-04-22 06:17:36.605 UTC [gossip.comm] func1 -> DEBU 2c46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.604 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:36.605 UTC [gossip.gossip] handleMessage -> DEBU 2c48 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c49 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.606 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c4a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:36.606 UTC [policies] Evaluate -> DEBU 2c4b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:36.606 UTC [policies] Evaluate -> DEBU 2c4c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:36.606 UTC [policies] Evaluate -> DEBU 2c4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:36.608 UTC [cauthdsl] func1 -> DEBU 2c4e 0xc003218d80 gate 1555913856608054800 evaluation starts" +"2019-04-22 06:17:36.608 UTC [cauthdsl] func2 -> DEBU 2c4f 0xc003218d80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:36.608 UTC [cauthdsl] func2 -> DEBU 2c50 0xc003218d80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:36.609 UTC [cauthdsl] func2 -> DEBU 2c51 0xc003218d80 principal matched by identity 0" +"2019-04-22 06:17:36.609 UTC [msp.identity] Verify -> DEBU 2c52 Verify: digest = 00000000 bb c0 6b ca 5d ef 2a 45 07 a4 02 45 8f 86 e1 b2 |..k.].*E...E....| +00000010 4f c8 66 69 e3 8a ef ef 71 a7 a4 0f 6f 7a e1 f1 |O.fi....q...oz..|" +"2019-04-22 06:17:36.610 UTC [msp.identity] Verify -> DEBU 2c53 Verify: sig = 00000000 30 44 02 20 1c 24 93 61 45 4b cf c0 16 0b 71 73 |0D. .$.aEK....qs| +00000010 14 44 bc 29 99 a8 68 5d 39 5d 30 bb b5 ed 8e a8 |.D.)..h]9]0.....| +00000020 c4 ad 3e 72 02 20 79 50 cc 85 6b 97 ae d5 fa 08 |..>r. yP..k.....| +00000030 8c 99 23 c5 d5 2f de 5d 14 de de 19 6e 85 c5 a0 |..#../.]....n...| +00000040 1a c9 e7 a5 97 4c |.....L|" +"2019-04-22 06:17:36.615 UTC [cauthdsl] func2 -> DEBU 2c54 0xc003218d80 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:36.616 UTC [cauthdsl] func1 -> DEBU 2c55 0xc003218d80 gate 1555913856608054800 evaluation succeeds" +"2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c56 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c58 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:36.616 UTC [policies] Evaluate -> DEBU 2c59 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:36.617 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c5a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 " +"2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 " +"2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:36.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c5f Exiting" +"2019-04-22 06:17:36.622 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c60 Exiting" +"2019-04-22 06:17:36.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c61 Exiting" +"2019-04-22 06:17:36.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c63 Exiting" +"2019-04-22 06:17:36.622 UTC [gossip.gossip] handleMessage -> DEBU 2c64 Exiting" +"2019-04-22 06:17:36.622 UTC [gossip.gossip] handleMessage -> DEBU 2c65 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.623 UTC [gossip.gossip] handleMessage -> DEBU 2c66 Exiting" +"2019-04-22 06:17:36.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c68 Exiting" +"2019-04-22 06:17:36.630 UTC [msp] DeserializeIdentity -> DEBU 2c69 Obtaining identity" +"2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6a Obtaining identity" +"2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6b Obtaining identity" +"2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6c Obtaining identity" +"2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6d Obtaining identity" +"2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c6e Obtaining identity" +"2019-04-22 06:17:36.631 UTC [gossip.comm] Send -> DEBU 2c6f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c70 Obtaining identity" +"2019-04-22 06:17:36.631 UTC [msp] DeserializeIdentity -> DEBU 2c71 Obtaining identity" +"2019-04-22 06:17:36.631 UTC [gossip.comm] Send -> DEBU 2c72 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c73 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c74 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c75 Exiting" +"2019-04-22 06:17:36.631 UTC [gossip.comm] sendToEndpoint -> DEBU 2c76 Exiting" +"2019-04-22 06:17:36.652 UTC [gossip.comm] func1 -> DEBU 2c77 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.652 UTC [gossip.gossip] handleMessage -> DEBU 2c78 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.652 UTC [msp] DeserializeIdentity -> DEBU 2c79 Obtaining identity" +"2019-04-22 06:17:36.653 UTC [msp] DeserializeIdentity -> DEBU 2c7a Obtaining identity" +"2019-04-22 06:17:36.654 UTC [gossip.gossip] handleMessage -> DEBU 2c7b Exiting" +"2019-04-22 06:17:36.682 UTC [gossip.comm] func1 -> DEBU 2c7c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.682 UTC [gossip.gossip] handleMessage -> DEBU 2c7d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.683 UTC [gossip.pull] HandleMessage -> DEBU 2c7e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.683 UTC [gossip.pull] SendDigest -> DEBU 2c7f Sending BLOCK_MSG digest: [1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:36.683 UTC [gossip.gossip] handleMessage -> DEBU 2c80 Exiting" +"2019-04-22 06:17:36.871 UTC [gossip.gossip] handleMessage -> DEBU 2c81 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:36.871 UTC [msp] DeserializeIdentity -> DEBU 2c82 Obtaining identity" +"2019-04-22 06:17:36.871 UTC [msp] DeserializeIdentity -> DEBU 2c83 Obtaining identity" +"2019-04-22 06:17:36.871 UTC [msp] DeserializeIdentity -> DEBU 2c84 Obtaining identity" +"2019-04-22 06:17:36.871 UTC [gossip.gossip] handleMessage -> DEBU 2c85 Exiting" +"2019-04-22 06:17:37.019 UTC [gossip.gossip] handleMessage -> DEBU 2c86 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.019 UTC [gossip.gossip] handleMessage -> DEBU 2c87 Exiting" +"2019-04-22 06:17:37.019 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2c88 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.019 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2c89 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:37.019 UTC [msp] DeserializeIdentity -> DEBU 2c8a Obtaining identity" +"2019-04-22 06:17:37.019 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:37.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:37.019 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c8d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:37.019 UTC [policies] Evaluate -> DEBU 2c8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:37.019 UTC [policies] Evaluate -> DEBU 2c8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:37.019 UTC [policies] Evaluate -> DEBU 2c90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:37.019 UTC [cauthdsl] func1 -> DEBU 2c91 0xc003209ea0 gate 1555913857019917300 evaluation starts" +"2019-04-22 06:17:37.019 UTC [cauthdsl] func2 -> DEBU 2c92 0xc003209ea0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:37.020 UTC [cauthdsl] func2 -> DEBU 2c93 0xc003209ea0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:37.020 UTC [cauthdsl] func2 -> DEBU 2c94 0xc003209ea0 principal matched by identity 0" +"2019-04-22 06:17:37.020 UTC [msp.identity] Verify -> DEBU 2c95 Verify: digest = 00000000 a4 e7 78 57 d2 50 2b 77 28 10 30 c4 ba 5e 84 e7 |..xW.P+w(.0..^..| +00000010 56 5d 09 8a bd e5 e3 fa 7d 6c 05 7d d4 c3 e7 e8 |V]......}l.}....|" +"2019-04-22 06:17:37.020 UTC [msp.identity] Verify -> DEBU 2c96 Verify: sig = 00000000 30 44 02 20 33 c7 8f e7 2d bb 59 68 c3 a2 b4 d8 |0D. 3...-.Yh....| +00000010 7a 3c 90 8f 94 d5 c3 7b 66 5c cd 98 3a 3f 52 fe |z<.....{f\..:?R.| +00000020 71 d4 32 af 02 20 2c 9a 2c 2f a3 8a dd e8 6d ad |q.2.. ,.,/....m.| +00000030 29 47 9b 58 08 d0 81 5b 00 61 04 ab 1b ea 06 1b |)G.X...[.a......| +00000040 4d a8 c3 b6 79 51 |M...yQ|" +"2019-04-22 06:17:37.020 UTC [cauthdsl] func2 -> DEBU 2c97 0xc003209ea0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:37.020 UTC [cauthdsl] func1 -> DEBU 2c98 0xc003209ea0 gate 1555913857019917300 evaluation succeeds" +"2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c99 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c9a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c9b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:37.020 UTC [policies] Evaluate -> DEBU 2c9c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:37.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2c9d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2c9f updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 " +"2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ca0 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 " +"2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ca1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:39 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:37.020 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ca2 Exiting" +"2019-04-22 06:17:37.020 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ca3 Exiting" +"2019-04-22 06:17:37.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ca4 Exiting" +"2019-04-22 06:17:37.027 UTC [msp] DeserializeIdentity -> DEBU 2ca5 Obtaining identity" +"2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca6 Obtaining identity" +"2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca7 Obtaining identity" +"2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca8 Obtaining identity" +"2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2ca9 Obtaining identity" +"2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2caa Obtaining identity" +"2019-04-22 06:17:37.028 UTC [gossip.comm] Send -> DEBU 2cab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2cac Obtaining identity" +"2019-04-22 06:17:37.028 UTC [msp] DeserializeIdentity -> DEBU 2cad Obtaining identity" +"2019-04-22 06:17:37.028 UTC [gossip.comm] Send -> DEBU 2cae Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2caf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb1 Exiting" +"2019-04-22 06:17:37.028 UTC [gossip.comm] sendToEndpoint -> DEBU 2cb2 Exiting" +"2019-04-22 06:17:37.032 UTC [gossip.comm] func1 -> DEBU 2cb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.032 UTC [gossip.gossip] handleMessage -> DEBU 2cb4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.032 UTC [gossip.gossip] handleMessage -> DEBU 2cb5 Exiting" +"2019-04-22 06:17:37.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cb6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.033 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cb7 Exiting" +"2019-04-22 06:17:37.034 UTC [gossip.comm] func1 -> DEBU 2cb8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.034 UTC [gossip.gossip] handleMessage -> DEBU 2cb9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.034 UTC [gossip.gossip] handleMessage -> DEBU 2cba Exiting" +"2019-04-22 06:17:37.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:37.034 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2cbc Exiting" +"2019-04-22 06:17:37.085 UTC [gossip.comm] func1 -> DEBU 2cbd Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:37.085 UTC [gossip.gossip] handleMessage -> DEBU 2cbe Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:37.085 UTC [msp] DeserializeIdentity -> DEBU 2cbf Obtaining identity" +"2019-04-22 06:17:37.085 UTC [msp] DeserializeIdentity -> DEBU 2cc0 Obtaining identity" +"2019-04-22 06:17:37.085 UTC [msp] DeserializeIdentity -> DEBU 2cc1 Obtaining identity" +"2019-04-22 06:17:37.085 UTC [gossip.gossip] handleMessage -> DEBU 2cc2 Exiting" +"2019-04-22 06:17:37.492 UTC [dockercontroller] Start -> DEBU 2cc3 Started container dev-peer0.org1.example.com-exp02_1.0-1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-04-22 06:17:37.492 UTC [container] unlockContainer -> DEBU 2cc4 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +"2019-04-22 06:17:37.492 UTC [container] lockContainer -> DEBU 2cc5 waiting for container(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-04-22 06:17:37.492 UTC [container] lockContainer -> DEBU 2cc6 got container (exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b) lock" +"2019-04-22 06:17:37.492 UTC [container] unlockContainer -> DEBU 2cc7 container lock deleted(exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b)" +"2019-04-22 06:17:37.547 UTC [chaincode.accesscontrol] authenticate -> DEBU 2cc8 Chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b 's authentication is authorized" +"2019-04-22 06:17:37.547 UTC [chaincode] handleMessage -> DEBU 2cc9 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-04-22 06:17:37.548 UTC [chaincode] HandleRegister -> DEBU 2cca Received REGISTER in state created" +"2019-04-22 06:17:37.548 UTC [chaincode] Register -> DEBU 2ccb registered handler complete for chaincode exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" +"2019-04-22 06:17:37.549 UTC [chaincode] HandleRegister -> DEBU 2ccc Got REGISTER for chaincodeID = name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" , sending back REGISTERED" +"2019-04-22 06:17:37.550 UTC [chaincode] HandleRegister -> DEBU 2ccd Changed state to established for name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +"2019-04-22 06:17:37.551 UTC [chaincode] sendReady -> DEBU 2cce sending READY for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +"2019-04-22 06:17:37.551 UTC [chaincode] sendReady -> DEBU 2ccf Changed to state ready for chaincode name:"exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b" " +"2019-04-22 06:17:37.552 UTC [chaincode] Launch -> DEBU 2cd0 launch complete" +"2019-04-22 06:17:37.552 UTC [stateleveldb] GetState -> DEBU 2cd1 GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:37.552 UTC [chaincode] Execute -> DEBU 2cd2 Entry" +"2019-04-22 06:17:37.554 UTC [chaincode] handleMessage -> DEBU 2cd3 [b6035b01] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:17:37.555 UTC [chaincode] HandleTransaction -> DEBU 2cd4 [b6035b01] handling PUT_STATE from chaincode" +"2019-04-22 06:17:37.555 UTC [chaincode] HandleTransaction -> DEBU 2cd5 [b6035b01] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:17:37.556 UTC [chaincode] handleMessage -> DEBU 2cd6 [b6035b01] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:17:37.556 UTC [chaincode] HandleTransaction -> DEBU 2cd7 [b6035b01] handling PUT_STATE from chaincode" +"2019-04-22 06:17:37.557 UTC [chaincode] HandleTransaction -> DEBU 2cd8 [b6035b01] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:17:37.558 UTC [chaincode] handleMessage -> DEBU 2cd9 [b6035b01] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:37.558 UTC [chaincode] Notify -> DEBU 2cda [b6035b01] notifying Txid:b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, channelID:businesschannel" +"2019-04-22 06:17:37.559 UTC [chaincode] Execute -> DEBU 2cdb Exit" +"2019-04-22 06:17:37.559 UTC [endorser] callChaincode -> INFO 2cdc [businesschannel][b6035b01] Exit chaincode: name:"exp02" (35201ms)" +"2019-04-22 06:17:37.559 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2cdd Simulation completed, getting simulation results" +"2019-04-22 06:17:37.560 UTC [lockbasedtxmgr] Done -> DEBU 2cde Done with transaction simulation / query execution [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +"2019-04-22 06:17:37.560 UTC [endorser] SimulateProposal -> DEBU 2cdf [businesschannel][b6035b01] Exit" +"2019-04-22 06:17:37.561 UTC [endorser] endorseProposal -> DEBU 2ce0 [businesschannel][b6035b01] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:37.561 UTC [endorser] endorseProposal -> DEBU 2ce1 [businesschannel][b6035b01] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:37.562 UTC [endorser] EndorseWithPlugin -> DEBU 2ce2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, chaincode: exp02}" +"2019-04-22 06:17:37.562 UTC [msp.identity] Sign -> DEBU 2ce3 Sign: plaintext: 0A205E62A0FB99A6AA398DACDA12BED5...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:37.562 UTC [msp.identity] Sign -> DEBU 2ce4 Sign: digest: BBF6BDA18E30A74FFD497A3AD2FE2E5BD2D360FCA88D569361E164C546735233 " +"2019-04-22 06:17:37.563 UTC [endorser] EndorseWithPlugin -> DEBU 2ce5 Exiting {plugin: escc, channel: businesschannel, tx: b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, chaincode: exp02}" +"2019-04-22 06:17:37.563 UTC [endorser] endorseProposal -> DEBU 2ce6 [businesschannel][b6035b01] Exit" +"2019-04-22 06:17:37.564 UTC [lockbasedtxmgr] Done -> DEBU 2ce7 Done with transaction simulation / query execution [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +"2019-04-22 06:17:37.564 UTC [endorser] func1 -> DEBU 2ce8 Exit: request from 192.168.224.9:49288" +"2019-04-22 06:17:37.564 UTC [comm.grpc.server] 1 -> INFO 2ce9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49288 grpc.code=OK grpc.call_duration=35.2168799s +"2019-04-22 06:17:37.585 UTC [grpc] infof -> DEBU 2cea transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:37.585 UTC [grpc] infof -> DEBU 2ceb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:38.881 UTC [gossip.pull] Hello -> DEBU 2cec Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:38.881 UTC [gossip.comm] Send -> DEBU 2ced Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:38.881 UTC [gossip.pull] Hello -> DEBU 2cee Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:38.881 UTC [gossip.comm] Send -> DEBU 2cef Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:38.881 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf2 Exiting" +"2019-04-22 06:17:38.881 UTC [gossip.pull] Hello -> DEBU 2cf1 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:38.883 UTC [gossip.comm] Send -> DEBU 2cf5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:38.882 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.883 UTC [gossip.comm] func1 -> DEBU 2cf4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2440110826972685579 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.884 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.885 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf7 Exiting" +"2019-04-22 06:17:38.885 UTC [gossip.gossip] handleMessage -> DEBU 2cf8 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2440110826972685579 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.886 UTC [gossip.pull] HandleMessage -> DEBU 2cfa GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2440110826972685579 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.886 UTC [gossip.gossip] handleMessage -> DEBU 2cfb Exiting" +"2019-04-22 06:17:38.886 UTC [gossip.comm] sendToEndpoint -> DEBU 2cf9 Exiting" +"2019-04-22 06:17:38.889 UTC [gossip.comm] func1 -> DEBU 2cfc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3481237813848302782 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.889 UTC [gossip.gossip] handleMessage -> DEBU 2cfd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3481237813848302782 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.889 UTC [gossip.pull] HandleMessage -> DEBU 2cfe GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3481237813848302782 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.890 UTC [gossip.gossip] handleMessage -> DEBU 2cff Exiting" +"2019-04-22 06:17:38.891 UTC [gossip.gossip] handleMessage -> DEBU 2d00 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225688882446821864 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.891 UTC [gossip.pull] HandleMessage -> DEBU 2d01 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 225688882446821864 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.892 UTC [gossip.gossip] handleMessage -> DEBU 2d02 Exiting" +"2019-04-22 06:17:38.928 UTC [msp.identity] Sign -> DEBU 2d03 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151028 " +"2019-04-22 06:17:38.929 UTC [msp.identity] Sign -> DEBU 2d04 Sign: digest: D6BB3AEB77FBF5B91FB725DD15C5ACA1DAD253A5058AE1A4F6C8F5DAA82552DC " +"2019-04-22 06:17:38.929 UTC [msp.identity] Sign -> DEBU 2d05 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:38.929 UTC [msp.identity] Sign -> DEBU 2d06 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:38.930 UTC [gossip.comm] Send -> DEBU 2d07 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:38.930 UTC [msp] DeserializeIdentity -> DEBU 2d08 Obtaining identity" +"2019-04-22 06:17:38.931 UTC [gossip.comm] sendToEndpoint -> DEBU 2d09 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.931 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0b Exiting" +"2019-04-22 06:17:38.931 UTC [gossip.comm] Send -> DEBU 2d0a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:38.932 UTC [msp] DeserializeIdentity -> DEBU 2d0c Obtaining identity" +"2019-04-22 06:17:38.934 UTC [gossip.comm] Send -> DEBU 2d0e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:38.933 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.935 UTC [gossip.comm] sendToEndpoint -> DEBU 2d0f Exiting" +"2019-04-22 06:17:38.935 UTC [gossip.comm] sendToEndpoint -> DEBU 2d10 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.936 UTC [gossip.comm] func1 -> DEBU 2d11 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.936 UTC [gossip.gossip] handleMessage -> DEBU 2d13 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.939 UTC [gossip.gossip] handleMessage -> DEBU 2d14 Exiting" +"2019-04-22 06:17:38.940 UTC [gossip.gossip] handleMessage -> DEBU 2d15 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.940 UTC [gossip.comm] func1 -> DEBU 2d16 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.936 UTC [gossip.comm] sendToEndpoint -> DEBU 2d12 Exiting" +"2019-04-22 06:17:38.941 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d18 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:38.942 UTC [msp.identity] Verify -> DEBU 2d19 Verify: digest = 00000000 d6 bb 3a eb 77 fb f5 b9 1f b7 25 dd 15 c5 ac a1 |..:.w.....%.....| +00000010 da d2 53 a5 05 8a e1 a4 f6 c8 f5 da a8 25 52 dc |..S..........%R.|" +"2019-04-22 06:17:38.942 UTC [msp.identity] Verify -> DEBU 2d1a Verify: sig = 00000000 30 45 02 21 00 db 45 56 a5 13 cd 78 48 53 38 63 |0E.!..EV...xHS8c| +00000010 8d 7e cf f1 2e 3c ec 73 3a 1d b3 cb 6d b4 5e 05 |.~...<.s:...m.^.| +00000020 80 1f 37 0b c6 02 20 47 bc 1f 5e 51 1e 9b 3a fe |..7... G..^Q..:.| +00000030 d9 ea 75 7b ec fa f3 28 88 0f 8b 09 b1 3b e1 7e |..u{...(.....;.~| +00000040 74 dc ae c0 93 ab c2 |t......|" +"2019-04-22 06:17:38.943 UTC [msp.identity] Verify -> DEBU 2d1b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:38.943 UTC [msp.identity] Verify -> DEBU 2d1c Verify: sig = 00000000 30 45 02 21 00 80 39 49 ee 43 e1 40 81 c0 05 c8 |0E.!..9I.C.@....| +00000010 8c c6 79 ae 8c 2e 8d 06 8c 62 dc 45 00 ae ea ad |..y......b.E....| +00000020 04 1a 18 bb f3 02 20 09 2c d5 37 f1 61 5d 2f 8f |...... .,.7.a]/.| +00000030 15 2c 55 10 91 8f fe 4b 3b d8 4a b9 ff 02 08 7b |.,U....K;.J....{| +00000040 c7 ec f3 df 6f b6 c0 |....o..|" +"2019-04-22 06:17:38.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d1d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:38.945 UTC [gossip.discovery] isSentByMe -> DEBU 2d1e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:38.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d1f Exiting" +"2019-04-22 06:17:38.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d20 Exiting" +"2019-04-22 06:17:38.946 UTC [gossip.gossip] handleMessage -> DEBU 2d21 Exiting" +"2019-04-22 06:17:38.947 UTC [gossip.gossip] handleMessage -> DEBU 2d22 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.946 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d23 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d24 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:38.948 UTC [msp.identity] Verify -> DEBU 2d25 Verify: digest = 00000000 d6 bb 3a eb 77 fb f5 b9 1f b7 25 dd 15 c5 ac a1 |..:.w.....%.....| +00000010 da d2 53 a5 05 8a e1 a4 f6 c8 f5 da a8 25 52 dc |..S..........%R.|" +"2019-04-22 06:17:38.948 UTC [msp.identity] Verify -> DEBU 2d26 Verify: sig = 00000000 30 45 02 21 00 db 45 56 a5 13 cd 78 48 53 38 63 |0E.!..EV...xHS8c| +00000010 8d 7e cf f1 2e 3c ec 73 3a 1d b3 cb 6d b4 5e 05 |.~...<.s:...m.^.| +00000020 80 1f 37 0b c6 02 20 47 bc 1f 5e 51 1e 9b 3a fe |..7... G..^Q..:.| +00000030 d9 ea 75 7b ec fa f3 28 88 0f 8b 09 b1 3b e1 7e |..u{...(.....;.~| +00000040 74 dc ae c0 93 ab c2 |t......|" +"2019-04-22 06:17:38.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d27 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:38.949 UTC [gossip.discovery] isSentByMe -> DEBU 2d28 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:38.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d29 Exiting" +"2019-04-22 06:17:38.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d2a Exiting" +"2019-04-22 06:17:38.950 UTC [gossip.gossip] handleMessage -> DEBU 2d2b Exiting" +"2019-04-22 06:17:38.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d2c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:38.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d2d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:38.952 UTC [msp.identity] Verify -> DEBU 2d2e Verify: digest = 00000000 d6 bb 3a eb 77 fb f5 b9 1f b7 25 dd 15 c5 ac a1 |..:.w.....%.....| +00000010 da d2 53 a5 05 8a e1 a4 f6 c8 f5 da a8 25 52 dc |..S..........%R.|" +"2019-04-22 06:17:38.952 UTC [msp.identity] Verify -> DEBU 2d2f Verify: sig = 00000000 30 45 02 21 00 db 45 56 a5 13 cd 78 48 53 38 63 |0E.!..EV...xHS8c| +00000010 8d 7e cf f1 2e 3c ec 73 3a 1d b3 cb 6d b4 5e 05 |.~...<.s:...m.^.| +00000020 80 1f 37 0b c6 02 20 47 bc 1f 5e 51 1e 9b 3a fe |..7... G..^Q..:.| +00000030 d9 ea 75 7b ec fa f3 28 88 0f 8b 09 b1 3b e1 7e |..u{...(.....;.~| +00000040 74 dc ae c0 93 ab c2 |t......|" +"2019-04-22 06:17:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d30 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:38.953 UTC [gossip.discovery] isSentByMe -> DEBU 2d31 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:40 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d32 Exiting" +"2019-04-22 06:17:38.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d33 Exiting" +"2019-04-22 06:17:39.137 UTC [gossip.comm] func1 -> DEBU 2d34 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.139 UTC [gossip.gossip] handleMessage -> DEBU 2d35 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.139 UTC [gossip.pull] HandleMessage -> DEBU 2d36 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.140 UTC [gossip.pull] SendDigest -> DEBU 2d37 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:39.142 UTC [gossip.gossip] handleMessage -> DEBU 2d38 Exiting" +"2019-04-22 06:17:39.162 UTC [gossip.comm] func1 -> DEBU 2d39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.163 UTC [gossip.gossip] handleMessage -> DEBU 2d3a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.164 UTC [gossip.gossip] handleMessage -> DEBU 2d3b Exiting" +"2019-04-22 06:17:39.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d3c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d3d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:39.165 UTC [msp.identity] Verify -> DEBU 2d3e Verify: digest = 00000000 41 c0 e8 14 95 7a 3a ef f0 a5 8b 2b d1 f6 7c cb |A....z:....+..|.| +00000010 dd 50 77 6c 0e dd 8e 9d a4 58 53 34 dd ab de af |.Pwl.....XS4....|" +"2019-04-22 06:17:39.165 UTC [msp.identity] Verify -> DEBU 2d3f Verify: sig = 00000000 30 45 02 21 00 b3 77 5f 66 f4 38 99 05 83 b3 ad |0E.!..w_f.8.....| +00000010 da 46 f2 e2 98 46 cb 56 b4 00 52 7e 78 46 97 11 |.F...F.V..R~xF..| +00000020 5b a2 3f 9b 83 02 20 33 2b 0b 7e aa fd 9c 0a ed |[.?... 3+.~.....| +00000030 27 3c df 10 e1 af db 88 5f 92 6a 29 e3 fb 94 32 |'<......_.j)...2| +00000040 b4 fa 0d 00 15 bf 23 |......#|" +"2019-04-22 06:17:39.166 UTC [msp.identity] Verify -> DEBU 2d40 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:39.167 UTC [msp.identity] Verify -> DEBU 2d41 Verify: sig = 00000000 30 45 02 21 00 c9 c4 02 cf 20 1d 8d 88 1e de 49 |0E.!..... .....I| +00000010 4c ed 30 62 d6 3f 10 ec 26 45 46 a1 87 c1 96 51 |L.0b.?..&EF....Q| +00000020 07 83 0a 07 95 02 20 2a 61 2b 55 02 6e 88 92 1f |...... *a+U.n...| +00000030 7f 45 d9 ba 56 5e a6 01 d8 5a fd 0c 1f b6 3b de |.E..V^...Z....;.| +00000040 d3 25 9a 8f d7 0d 53 |.%....S|" +"2019-04-22 06:17:39.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d42 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d43 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d44 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 " +"2019-04-22 06:17:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d45 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 " +"2019-04-22 06:17:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d46 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d47 Exiting" +"2019-04-22 06:17:39.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d48 Exiting" +"2019-04-22 06:17:39.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d49 Exiting" +"2019-04-22 06:17:39.169 UTC [gossip.discovery] sendMemResponse -> DEBU 2d4a Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:39.170 UTC [msp] DeserializeIdentity -> DEBU 2d4b Obtaining identity" +"2019-04-22 06:17:39.170 UTC [msp] DeserializeIdentity -> DEBU 2d4c Obtaining identity" +"2019-04-22 06:17:39.171 UTC [gossip.comm] Send -> DEBU 2d4d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:39.171 UTC [gossip.discovery] sendMemResponse -> DEBU 2d4e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 2d4f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.172 UTC [gossip.comm] sendToEndpoint -> DEBU 2d50 Exiting" +"2019-04-22 06:17:39.600 UTC [gossip.comm] func1 -> DEBU 2d51 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.602 UTC [gossip.gossip] handleMessage -> DEBU 2d52 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.602 UTC [gossip.pull] HandleMessage -> DEBU 2d53 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.602 UTC [msp] DeserializeIdentity -> DEBU 2d54 Obtaining identity" +"2019-04-22 06:17:39.603 UTC [msp] DeserializeIdentity -> DEBU 2d55 Obtaining identity" +"2019-04-22 06:17:39.603 UTC [msp] DeserializeIdentity -> DEBU 2d56 Obtaining identity" +"2019-04-22 06:17:39.603 UTC [msp] DeserializeIdentity -> DEBU 2d57 Obtaining identity" +"2019-04-22 06:17:39.604 UTC [msp] DeserializeIdentity -> DEBU 2d58 Obtaining identity" +"2019-04-22 06:17:39.604 UTC [msp] DeserializeIdentity -> DEBU 2d59 Obtaining identity" +"2019-04-22 06:17:39.604 UTC [gossip.pull] SendDigest -> DEBU 2d5a Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:39.604 UTC [gossip.gossip] handleMessage -> DEBU 2d5b Exiting" +"2019-04-22 06:17:39.619 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2d5c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:39.619 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2d5d Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:39.619 UTC [policies] Evaluate -> DEBU 2d5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:17:39.619 UTC [policies] Evaluate -> DEBU 2d5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:39.619 UTC [policies] Evaluate -> DEBU 2d60 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:17:39.619 UTC [cauthdsl] func1 -> DEBU 2d61 0xc00299d680 gate 1555913859619817500 evaluation starts" +"2019-04-22 06:17:39.620 UTC [cauthdsl] func2 -> DEBU 2d62 0xc00299d680 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:39.620 UTC [cauthdsl] func2 -> DEBU 2d63 0xc00299d680 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:39.620 UTC [cauthdsl] func2 -> DEBU 2d64 0xc00299d680 principal matched by identity 0" +"2019-04-22 06:17:39.620 UTC [msp.identity] Verify -> DEBU 2d65 Verify: digest = 00000000 5a ce 71 ed e5 f5 d2 64 27 80 f3 fa fc 9c 00 90 |Z.q....d'.......| +00000010 18 fa bf 7d 5d 6b 04 d4 88 2e 59 e6 b6 f2 24 70 |...}]k....Y...$p|" +"2019-04-22 06:17:39.621 UTC [msp.identity] Verify -> DEBU 2d66 Verify: sig = 00000000 30 45 02 21 00 ed 0c bd 64 dd 7c d2 2f 0c 88 9c |0E.!....d.|./...| +00000010 52 31 3b be bb 08 33 cb 43 47 56 96 15 c2 6c 94 |R1;...3.CGV...l.| +00000020 da 19 0e a2 f9 02 20 7a b5 3b b0 f4 59 2c dc 4b |...... z.;..Y,.K| +00000030 bf 51 5f fc f7 39 c1 52 c2 38 ac c8 e2 42 69 d3 |.Q_..9.R.8...Bi.| +00000040 6e 75 49 5a 22 f0 b6 |nuIZ"..|" +"2019-04-22 06:17:39.621 UTC [cauthdsl] func2 -> DEBU 2d67 0xc00299d680 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:39.621 UTC [cauthdsl] func1 -> DEBU 2d68 0xc00299d680 gate 1555913859619817500 evaluation succeeds" +"2019-04-22 06:17:39.621 UTC [policies] Evaluate -> DEBU 2d69 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:39.621 UTC [policies] Evaluate -> DEBU 2d6a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:39.622 UTC [policies] Evaluate -> DEBU 2d6b Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:39.622 UTC [policies] Evaluate -> DEBU 2d6c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:39.622 UTC [blocksProvider] DeliverBlocks -> DEBU 2d6d [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-04-22 06:17:39.623 UTC [gossip.state] addPayload -> DEBU 2d6e [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-04-22 06:17:39.623 UTC [gossip.state] addPayload -> DEBU 2d6f Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:17:39.623 UTC [blocksProvider] DeliverBlocks -> DEBU 2d70 [businesschannel] Gossiping block [6], peers number [3]" +"2019-04-22 06:17:39.623 UTC [gossip.state] deliverPayloads -> DEBU 2d71 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +"2019-04-22 06:17:39.623 UTC [gossip.state] deliverPayloads -> DEBU 2d72 [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +"2019-04-22 06:17:39.623 UTC [gossip.privdata] StoreBlock -> INFO 2d73 [businesschannel] Received block [6] from buffer" +"2019-04-22 06:17:39.624 UTC [gossip.privdata] StoreBlock -> DEBU 2d74 [businesschannel] Validating block [6]" +"2019-04-22 06:17:39.624 UTC [committer.txvalidator] Validate -> DEBU 2d75 [businesschannel] START Block Validation for block [6]" +"2019-04-22 06:17:39.624 UTC [committer.txvalidator] Validate -> DEBU 2d76 expecting 1 block validation responses" +"2019-04-22 06:17:39.625 UTC [committer.txvalidator] validateTx -> DEBU 2d77 [businesschannel] validateTx starts for block 0xc003b14980 env 0xc0024f1cc0 txn 0" +"2019-04-22 06:17:39.625 UTC [protoutils] ValidateTransaction -> DEBU 2d78 ValidateTransactionEnvelope starts for envelope 0xc0024f1cc0" +"2019-04-22 06:17:39.625 UTC [protoutils] ValidateTransaction -> DEBU 2d79 Header is channel_header:"\010\003\032\014\010\336\270\365\345\005\020\370\334\361\265\001\"\017businesschannel*@b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----\nMIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw\nWjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv\ncmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e\ngesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ\nl85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD\nVR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI\nzj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\235\205p\301SU!7v%\365u9\370\177\005\26724\017\017HR:" " +"2019-04-22 06:17:39.625 UTC [protoutils] validateChannelHeader -> DEBU 2d7a validateChannelHeader info: header type 3" +"2019-04-22 06:17:39.625 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d7b begin" +"2019-04-22 06:17:39.626 UTC [msp] GetManagerForChain -> DEBU 2d7c Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:39.626 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d7d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:39.626 UTC [protoutils] checkSignatureFromCreator -> DEBU 2d7e creator is valid" +"2019-04-22 06:17:39.626 UTC [msp.identity] Verify -> DEBU 2d7f Verify: digest = 00000000 85 7c a1 d9 67 9c de 88 5d fb 97 8c eb 4a 43 fa |.|..g...]....JC.| +00000010 75 1a d2 7a 6c 28 ae 49 bd f7 17 83 f5 67 5f 12 |u..zl(.I.....g_.|" +"2019-04-22 06:17:39.627 UTC [msp.identity] Verify -> DEBU 2d80 Verify: sig = 00000000 30 44 02 20 79 64 5c 7c 1e dc 81 c1 b7 3b 78 d7 |0D. yd\|.....;x.| +00000010 64 4c e9 28 a7 bc f9 86 92 37 84 cf 1a 4f 83 25 |dL.(.....7...O.%| +00000020 64 3c 6d 63 02 20 39 67 37 2b 83 57 e7 ca 9b ca |d DEBU 2d81 exits successfully" +"2019-04-22 06:17:39.627 UTC [protoutils] validateEndorserTransaction -> DEBU 2d82 validateEndorserTransaction starts for data 0xc002267000, header channel_header:"\010\003\032\014\010\336\270\365\345\005\020\370\334\361\265\001\"\017businesschannel*@b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\235\205p\301SU!7v%\365u9\370\177\005\26724\017\017HR:" " +"2019-04-22 06:17:39.627 UTC [protoutils] validateEndorserTransaction -> DEBU 2d83 validateEndorserTransaction info: there are 1 actions" +"2019-04-22 06:17:39.628 UTC [protoutils] validateEndorserTransaction -> DEBU 2d84 validateEndorserTransaction info: signature header is valid" +"2019-04-22 06:17:39.628 UTC [protoutils] ValidateTransaction -> DEBU 2d85 ValidateTransactionEnvelope returns err %!s()" +"2019-04-22 06:17:39.628 UTC [gossip.channel] AddToMsgStore -> DEBU 2d87 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4072 bytes, seq: 6}, Envelope: 4102 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:17:39.629 UTC [gossip.pull] Add -> DEBU 2d88 Added 6, total items: 6" +"2019-04-22 06:17:39.629 UTC [msp] DeserializeIdentity -> DEBU 2d89 Obtaining identity" +"2019-04-22 06:17:39.629 UTC [msp] DeserializeIdentity -> DEBU 2d8a Obtaining identity" +"2019-04-22 06:17:39.629 UTC [msp] DeserializeIdentity -> DEBU 2d8b Obtaining identity" +"2019-04-22 06:17:39.630 UTC [msp] DeserializeIdentity -> DEBU 2d8c Obtaining identity" +"2019-04-22 06:17:39.631 UTC [gossip.comm] Send -> DEBU 2d8d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4072 bytes, seq: 6}, Envelope: 4102 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:39.631 UTC [msp] DeserializeIdentity -> DEBU 2d8e Obtaining identity" +"2019-04-22 06:17:39.628 UTC [committer.txvalidator] validateTx -> DEBU 2d86 Transaction is for channel businesschannel" +"2019-04-22 06:17:39.632 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2d8f retrieveTransactionByID() - txId = [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead]" +"2019-04-22 06:17:39.631 UTC [msp] DeserializeIdentity -> DEBU 2d91 Obtaining identity" +"2019-04-22 06:17:39.632 UTC [committer.txvalidator] validateTx -> DEBU 2d90 Validating transaction with plugins" +"2019-04-22 06:17:39.632 UTC [gossip.comm] sendToEndpoint -> DEBU 2d92 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4072 bytes, seq: 6}, Envelope: 4102 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.633 UTC [gossip.comm] sendToEndpoint -> DEBU 2d93 Exiting" +"2019-04-22 06:17:39.646 UTC [committer.txvalidator] Dispatch -> DEBU 2d94 [businesschannel] Dispatch starts for bytes 0xc002f88400" +"2019-04-22 06:17:39.646 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2d95 constructing new query executor txid = [7d2b0d80-a13c-47fd-9fe8-50ba530b8662]" +"2019-04-22 06:17:39.650 UTC [stateleveldb] GetState -> DEBU 2d96 GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-04-22 06:17:39.651 UTC [gossip.comm] func1 -> DEBU 2d97 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.651 UTC [gossip.gossip] handleMessage -> DEBU 2d98 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.651 UTC [gossip.gossip] handleMessage -> DEBU 2d99 Exiting" +"2019-04-22 06:17:39.651 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d9a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.652 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d9b Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:39.652 UTC [msp] DeserializeIdentity -> DEBU 2d9c Obtaining identity" +"2019-04-22 06:17:39.652 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d9d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:39.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:39.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d9f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:39.652 UTC [policies] Evaluate -> DEBU 2da0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:39.652 UTC [policies] Evaluate -> DEBU 2da1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:39.653 UTC [policies] Evaluate -> DEBU 2da2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:39.653 UTC [cauthdsl] func1 -> DEBU 2da3 0xc0026c6640 gate 1555913859653248600 evaluation starts" +"2019-04-22 06:17:39.653 UTC [cauthdsl] func2 -> DEBU 2da4 0xc0026c6640 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:39.653 UTC [cauthdsl] func2 -> DEBU 2da5 0xc0026c6640 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:39.654 UTC [cauthdsl] func2 -> DEBU 2da6 0xc0026c6640 principal matched by identity 0" +"2019-04-22 06:17:39.654 UTC [msp.identity] Verify -> DEBU 2da7 Verify: digest = 00000000 b8 6d ea 1e 98 11 99 4a c5 a7 34 ac 2a fd b8 4e |.m.....J..4.*..N| +00000010 b2 51 32 ba 34 3e 5d 20 25 1c 5e 72 3c 97 4e 17 |.Q2.4>] %.^r<.N.|" +"2019-04-22 06:17:39.654 UTC [msp.identity] Verify -> DEBU 2da8 Verify: sig = 00000000 30 45 02 21 00 9e 31 53 1a 32 1e 43 14 cf 58 4f |0E.!..1S.2.C..XO| +00000010 03 65 b1 0a ea 67 30 47 a2 d0 97 f9 67 e8 31 b3 |.e...g0G....g.1.| +00000020 04 88 a9 a3 9b 02 20 2c ec d8 51 db 2f 9d 96 44 |...... ,..Q./..D| +00000030 a0 13 9a 75 bd c4 3e a3 6b 60 65 78 d5 c6 c3 8d |...u..>.k`ex....| +00000040 98 f5 8e 48 41 68 b2 |...HAh.|" +"2019-04-22 06:17:39.655 UTC [cauthdsl] func2 -> DEBU 2da9 0xc0026c6640 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:39.655 UTC [cauthdsl] func1 -> DEBU 2daa 0xc0026c6640 gate 1555913859653248600 evaluation succeeds" +"2019-04-22 06:17:39.655 UTC [policies] Evaluate -> DEBU 2dab Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:39.655 UTC [policies] Evaluate -> DEBU 2dac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:39.656 UTC [policies] Evaluate -> DEBU 2dad Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:39.656 UTC [policies] Evaluate -> DEBU 2dae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:39.656 UTC [gossip.discovery] handleAliveMessage -> DEBU 2daf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:39.656 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:39.657 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 " +"2019-04-22 06:17:39.657 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 " +"2019-04-22 06:17:39.657 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:42 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:39.658 UTC [gossip.discovery] learnExistingMembers -> DEBU 2db5 Exiting" +"2019-04-22 06:17:39.650 UTC [stateleveldb] GetState -> DEBU 2db0 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:39.659 UTC [stateleveldb] GetState -> DEBU 2db6 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-04-22 06:17:39.659 UTC [stateleveldb] GetState -> DEBU 2db7 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-04-22 06:17:39.660 UTC [stateleveldb] GetState -> DEBU 2db8 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-04-22 06:17:39.660 UTC [lockbasedtxmgr] Done -> DEBU 2db9 Done with transaction simulation / query execution [7d2b0d80-a13c-47fd-9fe8-50ba530b8662]" +"2019-04-22 06:17:39.660 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 2dba Validating Tx b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead, seq 0 out of 1 in block 6 for channel businesschannel with validation plugin vscc with plugin" +"2019-04-22 06:17:39.661 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2dbb constructing new query executor txid = [4da783fe-5419-4ac8-adca-949188b93c00]" +"2019-04-22 06:17:39.661 UTC [lockbasedtxmgr] Done -> DEBU 2dbc Done with transaction simulation / query execution [4da783fe-5419-4ac8-adca-949188b93c00]" +"2019-04-22 06:17:39.661 UTC [cauthdsl] func1 -> DEBU 2dbd 0xc000236500 gate 1555913859661779300 evaluation starts" +"2019-04-22 06:17:39.662 UTC [cauthdsl] func2 -> DEBU 2dbe 0xc000236500 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:39.662 UTC [cauthdsl] func2 -> DEBU 2dbf 0xc000236500 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:39.662 UTC [cauthdsl] func2 -> DEBU 2dc0 0xc000236500 principal matched by identity 0" +"2019-04-22 06:17:39.662 UTC [msp.identity] Verify -> DEBU 2dc1 Verify: digest = 00000000 bb f6 bd a1 8e 30 a7 4f fd 49 7a 3a d2 fe 2e 5b |.....0.O.Iz:...[| +00000010 d2 d3 60 fc a8 8d 56 93 61 e1 64 c5 46 73 52 33 |..`...V.a.d.FsR3|" +"2019-04-22 06:17:39.662 UTC [msp.identity] Verify -> DEBU 2dc2 Verify: sig = 00000000 30 44 02 20 5b 4e a1 c7 92 57 11 e8 5d 98 45 3e |0D. [N...W..].E>| +00000010 6e f2 5e ee 4a 61 8e 41 7e fc 86 d6 8b af 4f 0a |n.^.Ja.A~.....O.| +00000020 c9 25 08 d7 02 20 59 82 69 c9 6a c3 70 47 5c c7 |.%... Y.i.j.pG\.| +00000030 9a 73 29 7d 1a 9f f9 f9 5a 84 8e 61 8e 5f 60 20 |.s)}....Z..a._` | +00000040 35 ac 80 88 4d bb |5...M.|" +"2019-04-22 06:17:39.663 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc000236500 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:39.663 UTC [cauthdsl] func2 -> DEBU 2dc4 0xc000236500 signed by 1 principal evaluation starts (used [true])" +"2019-04-22 06:17:39.663 UTC [cauthdsl] func2 -> DEBU 2dc5 0xc000236500 skipping identity 0 because it has already been used" +"2019-04-22 06:17:39.664 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc000236500 principal evaluation fails" +"2019-04-22 06:17:39.664 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc000236500 gate 1555913859661779300 evaluation succeeds" +"2019-04-22 06:17:39.664 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2dc8 constructing new query executor txid = [a79871b4-6217-4820-aefd-e8fe8b6258c4]" +"2019-04-22 06:17:39.664 UTC [lockbasedtxmgr] Done -> DEBU 2dc9 Done with transaction simulation / query execution [a79871b4-6217-4820-aefd-e8fe8b6258c4]" +"2019-04-22 06:17:39.665 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2dca constructing new query executor txid = [9b99bdf2-bacd-422d-8072-866f53ec829f]" +"2019-04-22 06:17:39.665 UTC [lockbasedtxmgr] Done -> DEBU 2dcb Done with transaction simulation / query execution [9b99bdf2-bacd-422d-8072-866f53ec829f]" +"2019-04-22 06:17:39.665 UTC [vscc] Validate -> DEBU 2dcc block 6, namespace: exp02, tx 0 validation results is: " +"2019-04-22 06:17:39.665 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2dcd Transaction b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead appears to be valid" +"2019-04-22 06:17:39.666 UTC [committer.txvalidator] Dispatch -> DEBU 2dce [businesschannel] Dispatch completes env bytes 0xc002f88400" +"2019-04-22 06:17:39.666 UTC [committer.txvalidator] validateTx -> DEBU 2dcf [businesschannel] validateTx completes for block 0xc003b14980 env 0xc0024f1cc0 txn 0" +"2019-04-22 06:17:39.666 UTC [committer.txvalidator] Validate -> DEBU 2dd0 got result for idx 0, code 0" +"2019-04-22 06:17:39.667 UTC [committer.txvalidator] Validate -> INFO 2dd1 [businesschannel] Validated block [6] in 42ms" +"2019-04-22 06:17:39.667 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2dd2 Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:17:39.667 UTC [gossip.privdata] StoreBlock -> DEBU 2dd3 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:17:39.668 UTC [kvledger] CommitWithPvtData -> DEBU 2dd4 [businesschannel] Validating state for block [6]" +"2019-04-22 06:17:39.668 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2dd5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:17:39.668 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2dd6 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:17:39.669 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2dd7 Validating new block with num trans = [1]" +"2019-04-22 06:17:39.669 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2dd8 ValidateAndPrepareBatch() for block number = [6]" +"2019-04-22 06:17:39.669 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2dd9 preprocessing ProtoBlock..." +"2019-04-22 06:17:39.669 UTC [valimpl] preprocessProtoBlock -> DEBU 2dda txType=ENDORSER_TRANSACTION" +"2019-04-22 06:17:39.670 UTC [stateleveldb] GetState -> DEBU 2ddb GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:39.670 UTC [statebasedval] validateKVRead -> DEBU 2ddc Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +"2019-04-22 06:17:39.671 UTC [stateleveldb] GetState -> DEBU 2ddd GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:39.671 UTC [statebasedval] validateKVRead -> DEBU 2dde Comparing versions for key [􏿿initialized]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-04-22 06:17:39.672 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2ddf Block [6] Transaction index [0] TxId [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-04-22 06:17:39.672 UTC [gossip.discovery] handleAliveMessage -> DEBU 2de0 Exiting" +"2019-04-22 06:17:39.675 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2de1 Exiting" +"2019-04-22 06:17:39.676 UTC [gossip.discovery] sendMemResponse -> DEBU 2de2 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:39.676 UTC [msp] DeserializeIdentity -> DEBU 2de3 Obtaining identity" +"2019-04-22 06:17:39.677 UTC [msp] DeserializeIdentity -> DEBU 2de4 Obtaining identity" +"2019-04-22 06:17:39.679 UTC [msp] DeserializeIdentity -> DEBU 2de5 Obtaining identity" +"2019-04-22 06:17:39.679 UTC [gossip.comm] Send -> DEBU 2de6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:39.679 UTC [gossip.discovery] sendMemResponse -> DEBU 2de7 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:39.680 UTC [gossip.comm] sendToEndpoint -> DEBU 2de8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:39.680 UTC [gossip.comm] sendToEndpoint -> DEBU 2de9 Exiting" +"2019-04-22 06:17:39.673 UTC [valinternal] ApplyWriteSet -> DEBU 2dea txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"\x00\U0010ffffinitialized"}:(*internal.keyOps)(0xc002957b80), internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002957bc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002957c00)}" +"2019-04-22 06:17:39.681 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2deb validating rwset..." +"2019-04-22 06:17:39.682 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2dec postprocessing ProtoBlock..." +"2019-04-22 06:17:39.682 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2ded ValidateAndPrepareBatch() complete" +"2019-04-22 06:17:39.683 UTC [kvledger] CommitWithPvtData -> DEBU 2dee [businesschannel] Committing block [6] to storage" +"2019-04-22 06:17:39.684 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2def Writing block [6] to pvt block store" +"2019-04-22 06:17:39.688 UTC [pvtdatastorage] Prepare -> DEBU 2df0 Saved 0 private data write sets for block [6]" +"2019-04-22 06:17:39.692 UTC [fsblkstorage] indexBlock -> DEBU 2df1 Indexing block [blockNum=6, blockHash=[]byte{0x89, 0x22, 0x9f, 0x2d, 0xa7, 0x77, 0x8a, 0xc2, 0xd3, 0xc7, 0xbe, 0x3a, 0x97, 0x4d, 0xd2, 0xe2, 0xa9, 0xcf, 0xa6, 0xc0, 0x51, 0xd, 0x23, 0x40, 0x9d, 0x6b, 0xd2, 0xb5, 0x3f, 0x68, 0x94, 0xfe} txOffsets= +txId=b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead locPointer=offset=70, bytesLength=3053 +]" +"2019-04-22 06:17:39.692 UTC [fsblkstorage] indexBlock -> DEBU 2df2 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx ID: [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead] to txid-index" +"2019-04-22 06:17:39.692 UTC [fsblkstorage] indexBlock -> DEBU 2df3 Adding txLoc [fileSuffixNum=0, offset=86581, bytesLength=3053] for tx number:[0] ID: [b6035b011716645d79c3f2bba936d4b44133344ff02cb91f7b8d3e73d4d75ead] to blockNumTranNum index" +"2019-04-22 06:17:39.696 UTC [fsblkstorage] updateCheckpoint -> DEBU 2df4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[90572], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-04-22 06:17:39.696 UTC [pvtdatastorage] Commit -> DEBU 2df5 Committing private data for block [6]" +"2019-04-22 06:17:39.700 UTC [pvtdatastorage] Commit -> DEBU 2df6 Committed private data for block [6]" +"2019-04-22 06:17:39.701 UTC [kvledger] CommitWithPvtData -> DEBU 2df7 [businesschannel] Committing block [6] transactions to state database" +"2019-04-22 06:17:39.701 UTC [lockbasedtxmgr] Commit -> DEBU 2df8 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:17:39.701 UTC [lockbasedtxmgr] Commit -> DEBU 2df9 Committing updates to state database" +"2019-04-22 06:17:39.702 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2dfa Building the expiry schedules based on the update batch" +"2019-04-22 06:17:39.703 UTC [lockbasedtxmgr] Commit -> DEBU 2dfb Write lock acquired for committing updates to state database" +"2019-04-22 06:17:39.703 UTC [stateleveldb] ApplyUpdates -> DEBU 2dfc Channel [businesschannel]: Applying key(string)=[exp02􏿿initialized] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x0, 0xf4, 0x8f, 0xbf, 0xbf, 0x69, 0x6e, 0x69, 0x74, 0x69, 0x61, 0x6c, 0x69, 0x7a, 0x65, 0x64}]" +"2019-04-22 06:17:39.703 UTC [stateleveldb] ApplyUpdates -> DEBU 2dfd Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-04-22 06:17:39.703 UTC [stateleveldb] ApplyUpdates -> DEBU 2dfe Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-04-22 06:17:39.708 UTC [lockbasedtxmgr] Commit -> DEBU 2dff Updates committed to state database and the write lock is released" +"2019-04-22 06:17:39.709 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2e00 Preparing potential purge list working-set for expiringAtBlk [7]" +"2019-04-22 06:17:39.710 UTC [leveldbhelper] GetIterator -> DEBU 2e01 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +"2019-04-22 06:17:39.710 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2e02 No expiry entry found for expiringAtBlk [7]" +"2019-04-22 06:17:39.710 UTC [lockbasedtxmgr] func1 -> DEBU 2e03 launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:17:39.710 UTC [kvledger] CommitWithPvtData -> DEBU 2e04 [businesschannel] Committing block [6] transactions to history database" +"2019-04-22 06:17:39.710 UTC [historyleveldb] Commit -> DEBU 2e05 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +"2019-04-22 06:17:39.713 UTC [historyleveldb] Commit -> DEBU 2e06 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +"2019-04-22 06:17:39.713 UTC [kvledger] CommitWithPvtData -> INFO 2e07 [businesschannel] Committed block [6] with 1 transaction(s) in 45ms (state_validation=15ms block_commit=17ms state_commit=9ms)" +"2019-04-22 06:17:39.714 UTC [msp.identity] Sign -> DEBU 2e08 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020807 " +"2019-04-22 06:17:39.714 UTC [msp.identity] Sign -> DEBU 2e09 Sign: digest: D77CB62BABDCB6272C86E99C782E9568767263152B3B60BA689C41A804DD718B " +"2019-04-22 06:17:39.714 UTC [gossip.state] commitBlock -> DEBU 2e0a [businesschannel] Committed block [6] with 1 transaction(s)" +"2019-04-22 06:17:40.019 UTC [gossip.gossip] handleMessage -> DEBU 2e0b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.019 UTC [gossip.pull] HandleMessage -> DEBU 2e0c GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.019 UTC [msp] DeserializeIdentity -> DEBU 2e0d Obtaining identity" +"2019-04-22 06:17:40.020 UTC [msp] DeserializeIdentity -> DEBU 2e0e Obtaining identity" +"2019-04-22 06:17:40.020 UTC [msp] DeserializeIdentity -> DEBU 2e0f Obtaining identity" +"2019-04-22 06:17:40.021 UTC [msp] DeserializeIdentity -> DEBU 2e10 Obtaining identity" +"2019-04-22 06:17:40.021 UTC [msp] DeserializeIdentity -> DEBU 2e11 Obtaining identity" +"2019-04-22 06:17:40.021 UTC [msp] DeserializeIdentity -> DEBU 2e12 Obtaining identity" +"2019-04-22 06:17:40.022 UTC [gossip.pull] SendDigest -> DEBU 2e13 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:40.022 UTC [gossip.gossip] handleMessage -> DEBU 2e14 Exiting" +"2019-04-22 06:17:40.038 UTC [gossip.gossip] handleMessage -> DEBU 2e15 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.038 UTC [gossip.gossip] handleMessage -> DEBU 2e16 Exiting" +"2019-04-22 06:17:40.039 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e17 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.039 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e18 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:40.039 UTC [msp] DeserializeIdentity -> DEBU 2e19 Obtaining identity" +"2019-04-22 06:17:40.040 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e1a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e1b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.040 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e1c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.040 UTC [policies] Evaluate -> DEBU 2e1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.041 UTC [policies] Evaluate -> DEBU 2e1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.041 UTC [policies] Evaluate -> DEBU 2e1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.041 UTC [cauthdsl] func1 -> DEBU 2e20 0xc0005e5ae0 gate 1555913860041645800 evaluation starts" +"2019-04-22 06:17:40.042 UTC [cauthdsl] func2 -> DEBU 2e21 0xc0005e5ae0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.042 UTC [cauthdsl] func2 -> DEBU 2e22 0xc0005e5ae0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.043 UTC [cauthdsl] func2 -> DEBU 2e23 0xc0005e5ae0 principal matched by identity 0" +"2019-04-22 06:17:40.043 UTC [msp.identity] Verify -> DEBU 2e24 Verify: digest = 00000000 3b 7d 93 03 12 08 77 57 ce 6d d2 75 3e 53 73 a0 |;}....wW.m.u>Ss.| +00000010 03 ce 7c 01 91 e7 1f c7 f3 c1 7f 23 81 de 6b 7b |..|........#..k{|" +"2019-04-22 06:17:40.043 UTC [msp.identity] Verify -> DEBU 2e25 Verify: sig = 00000000 30 44 02 20 71 8c 36 26 b5 7a 16 e1 ef 88 63 77 |0D. q.6&.z....cw| +00000010 77 26 50 a0 02 5a 6f 0f 2a 96 53 3b 02 f9 99 4e |w&P..Zo.*.S;...N| +00000020 82 2a 56 8d 02 20 0a 01 40 df d7 5b 05 11 a4 88 |.*V.. ..@..[....| +00000030 1c 1e c5 bc d8 a1 a6 04 52 87 aa 86 50 50 d7 2c |........R...PP.,| +00000040 88 be d5 da 55 65 |....Ue|" +"2019-04-22 06:17:40.044 UTC [cauthdsl] func2 -> DEBU 2e26 0xc0005e5ae0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.044 UTC [cauthdsl] func1 -> DEBU 2e27 0xc0005e5ae0 gate 1555913860041645800 evaluation succeeds" +"2019-04-22 06:17:40.044 UTC [policies] Evaluate -> DEBU 2e28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.045 UTC [policies] Evaluate -> DEBU 2e29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.045 UTC [policies] Evaluate -> DEBU 2e2a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.045 UTC [policies] Evaluate -> DEBU 2e2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.046 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e2c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2e updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 " +"2019-04-22 06:17:40.046 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2f Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 " +"2019-04-22 06:17:40.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e30 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:40 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:40.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e31 Exiting" +"2019-04-22 06:17:40.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e32 Exiting" +"2019-04-22 06:17:40.048 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e33 Exiting" +"2019-04-22 06:17:40.048 UTC [gossip.discovery] sendMemResponse -> DEBU 2e34 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:40.048 UTC [msp] DeserializeIdentity -> DEBU 2e35 Obtaining identity" +"2019-04-22 06:17:40.049 UTC [msp] DeserializeIdentity -> DEBU 2e36 Obtaining identity" +"2019-04-22 06:17:40.049 UTC [msp] DeserializeIdentity -> DEBU 2e37 Obtaining identity" +"2019-04-22 06:17:40.049 UTC [gossip.comm] Send -> DEBU 2e38 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:40.049 UTC [gossip.discovery] sendMemResponse -> DEBU 2e39 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:40.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.050 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3b Exiting" +"2019-04-22 06:17:40.389 UTC [msp] DeserializeIdentity -> DEBU 2e3c Obtaining identity" +"2019-04-22 06:17:40.390 UTC [msp] DeserializeIdentity -> DEBU 2e3d Obtaining identity" +"2019-04-22 06:17:40.391 UTC [gossip.comm] Send -> DEBU 2e3e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e3f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e40 Exiting" +"2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e41 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.391 UTC [gossip.comm] sendToEndpoint -> DEBU 2e42 Exiting" +"2019-04-22 06:17:40.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2e43 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.392 UTC [gossip.comm] sendToEndpoint -> DEBU 2e44 Exiting" +"2019-04-22 06:17:40.392 UTC [msp] DeserializeIdentity -> DEBU 2e45 Obtaining identity" +"2019-04-22 06:17:40.392 UTC [msp] DeserializeIdentity -> DEBU 2e46 Obtaining identity" +"2019-04-22 06:17:40.392 UTC [gossip.comm] Send -> DEBU 2e47 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +"2019-04-22 06:17:40.392 UTC [msp] DeserializeIdentity -> DEBU 2e48 Obtaining identity" +"2019-04-22 06:17:40.393 UTC [msp] DeserializeIdentity -> DEBU 2e49 Obtaining identity" +"2019-04-22 06:17:40.393 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:40.393 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4b Exiting" +"2019-04-22 06:17:40.394 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:40.395 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4d Exiting" +"2019-04-22 06:17:40.396 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913859714128500 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:40.396 UTC [gossip.comm] sendToEndpoint -> DEBU 2e4f Exiting" +"2019-04-22 06:17:40.396 UTC [gossip.gossip] handleMessage -> DEBU 2e50 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.397 UTC [msp] DeserializeIdentity -> DEBU 2e51 Obtaining identity" +"2019-04-22 06:17:40.397 UTC [msp] DeserializeIdentity -> DEBU 2e52 Obtaining identity" +"2019-04-22 06:17:40.397 UTC [msp] DeserializeIdentity -> DEBU 2e53 Obtaining identity" +"2019-04-22 06:17:40.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e55 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e56 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.397 UTC [policies] Evaluate -> DEBU 2e57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.397 UTC [policies] Evaluate -> DEBU 2e58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.398 UTC [policies] Evaluate -> DEBU 2e59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.398 UTC [cauthdsl] func1 -> DEBU 2e5a 0xc000408470 gate 1555913860398361300 evaluation starts" +"2019-04-22 06:17:40.398 UTC [cauthdsl] func2 -> DEBU 2e5b 0xc000408470 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.398 UTC [cauthdsl] func2 -> DEBU 2e5c 0xc000408470 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.399 UTC [cauthdsl] func2 -> DEBU 2e5d 0xc000408470 principal matched by identity 0" +"2019-04-22 06:17:40.399 UTC [msp.identity] Verify -> DEBU 2e5e Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:40.399 UTC [msp.identity] Verify -> DEBU 2e5f Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:40.400 UTC [cauthdsl] func2 -> DEBU 2e60 0xc000408470 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.400 UTC [gossip.comm] func1 -> DEBU 2e61 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.401 UTC [cauthdsl] func1 -> DEBU 2e62 0xc000408470 gate 1555913860398361300 evaluation succeeds" +"2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e63 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e65 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.402 UTC [policies] Evaluate -> DEBU 2e66 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.403 UTC [msp.identity] Verify -> DEBU 2e67 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:40.403 UTC [msp.identity] Verify -> DEBU 2e68 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:40.407 UTC [gossip.comm] func1 -> DEBU 2e69 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.407 UTC [msp.identity] Verify -> DEBU 2e6a Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:40.407 UTC [msp.identity] Verify -> DEBU 2e6b Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:40.407 UTC [msp] DeserializeIdentity -> DEBU 2e6c Obtaining identity" +"2019-04-22 06:17:40.408 UTC [msp] DeserializeIdentity -> DEBU 2e6d Obtaining identity" +"2019-04-22 06:17:40.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e6f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e70 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.408 UTC [policies] Evaluate -> DEBU 2e71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.408 UTC [policies] Evaluate -> DEBU 2e72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.408 UTC [policies] Evaluate -> DEBU 2e73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.408 UTC [cauthdsl] func1 -> DEBU 2e74 0xc0003596e0 gate 1555913860408542000 evaluation starts" +"2019-04-22 06:17:40.408 UTC [cauthdsl] func2 -> DEBU 2e75 0xc0003596e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.408 UTC [cauthdsl] func2 -> DEBU 2e76 0xc0003596e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.408 UTC [cauthdsl] func2 -> DEBU 2e77 0xc0003596e0 principal matched by identity 0" +"2019-04-22 06:17:40.408 UTC [msp.identity] Verify -> DEBU 2e78 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:40.408 UTC [msp.identity] Verify -> DEBU 2e79 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:40.409 UTC [cauthdsl] func2 -> DEBU 2e7a 0xc0003596e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.409 UTC [cauthdsl] func1 -> DEBU 2e7b 0xc0003596e0 gate 1555913860408542000 evaluation succeeds" +"2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e7f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.409 UTC [msp] DeserializeIdentity -> DEBU 2e80 Obtaining identity" +"2019-04-22 06:17:40.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e81 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.409 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e82 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.409 UTC [policies] Evaluate -> DEBU 2e85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.409 UTC [cauthdsl] func1 -> DEBU 2e86 0xc00049e960 gate 1555913860409829000 evaluation starts" +"2019-04-22 06:17:40.409 UTC [cauthdsl] func2 -> DEBU 2e87 0xc00049e960 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.409 UTC [cauthdsl] func2 -> DEBU 2e88 0xc00049e960 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.410 UTC [cauthdsl] func2 -> DEBU 2e89 0xc00049e960 principal matched by identity 0" +"2019-04-22 06:17:40.410 UTC [msp.identity] Verify -> DEBU 2e8a Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:40.410 UTC [msp.identity] Verify -> DEBU 2e8b Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:40.410 UTC [cauthdsl] func2 -> DEBU 2e8c 0xc00049e960 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.410 UTC [cauthdsl] func1 -> DEBU 2e8d 0xc00049e960 gate 1555913860409829000 evaluation succeeds" +"2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e8e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e8f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e90 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.410 UTC [policies] Evaluate -> DEBU 2e91 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.410 UTC [gossip.gossip] handleMessage -> DEBU 2e92 Exiting" +"2019-04-22 06:17:40.410 UTC [gossip.gossip] handleMessage -> DEBU 2e93 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 727 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.410 UTC [msp] DeserializeIdentity -> DEBU 2e94 Obtaining identity" +"2019-04-22 06:17:40.411 UTC [msp] DeserializeIdentity -> DEBU 2e95 Obtaining identity" +"2019-04-22 06:17:40.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e96 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e97 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e98 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.411 UTC [policies] Evaluate -> DEBU 2e99 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.411 UTC [policies] Evaluate -> DEBU 2e9a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.411 UTC [policies] Evaluate -> DEBU 2e9b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.411 UTC [cauthdsl] func1 -> DEBU 2e9c 0xc00021e400 gate 1555913860411519200 evaluation starts" +"2019-04-22 06:17:40.411 UTC [cauthdsl] func2 -> DEBU 2e9d 0xc00021e400 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.411 UTC [cauthdsl] func2 -> DEBU 2e9e 0xc00021e400 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.411 UTC [cauthdsl] func2 -> DEBU 2e9f 0xc00021e400 principal matched by identity 0" +"2019-04-22 06:17:40.417 UTC [msp.identity] Verify -> DEBU 2ea0 Verify: digest = 00000000 fb 68 bb 39 08 79 29 d7 bf 42 5a d4 cb 2d d4 ee |.h.9.y)..BZ..-..| +00000010 ad 2b ba a5 4c 2b e6 26 ae 60 64 47 d7 5e c1 4a |.+..L+.&.`dG.^.J|" +"2019-04-22 06:17:40.417 UTC [msp.identity] Verify -> DEBU 2ea1 Verify: sig = 00000000 30 45 02 21 00 a0 37 4c 69 1c 4a 40 11 f9 7c 56 |0E.!..7Li.J@..|V| +00000010 3a e0 f4 df 07 73 33 70 37 63 a0 fc e4 0a fb ae |:....s3p7c......| +00000020 60 51 1d 73 7b 02 20 17 61 e9 91 01 40 ba f3 e7 |`Q.s{. .a...@...| +00000030 3c 5c 24 f4 d5 ea cf 2e 10 37 c4 76 de 16 02 1d |<\$......7.v....| +00000040 eb 92 f1 12 06 e3 25 |......%|" +"2019-04-22 06:17:40.418 UTC [cauthdsl] func2 -> DEBU 2ea2 0xc00021e400 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.418 UTC [cauthdsl] func1 -> DEBU 2ea3 0xc00021e400 gate 1555913860411519200 evaluation succeeds" +"2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea6 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.418 UTC [policies] Evaluate -> DEBU 2ea7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.419 UTC [msp.identity] Verify -> DEBU 2ea8 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:40.419 UTC [msp.identity] Verify -> DEBU 2ea9 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:40.428 UTC [gossip.privdata] run -> DEBU 2eaa Start reconcile missing private info" +"2019-04-22 06:17:40.429 UTC [leveldbhelper] GetIterator -> DEBU 2eab Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xf9}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +"2019-04-22 06:17:40.429 UTC [gossip.privdata] reconcile -> DEBU 2eac Reconciliation cycle finished successfully. no items to reconcile" +"2019-04-22 06:17:40.430 UTC [msp] DeserializeIdentity -> DEBU 2ead Obtaining identity" +"2019-04-22 06:17:40.430 UTC [msp] DeserializeIdentity -> DEBU 2eae Obtaining identity" +"2019-04-22 06:17:40.431 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2eaf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.432 UTC [policies] Evaluate -> DEBU 2eb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.432 UTC [policies] Evaluate -> DEBU 2eb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.433 UTC [policies] Evaluate -> DEBU 2eb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.433 UTC [cauthdsl] func1 -> DEBU 2eb5 0xc0003e4310 gate 1555913860433676100 evaluation starts" +"2019-04-22 06:17:40.433 UTC [cauthdsl] func2 -> DEBU 2eb6 0xc0003e4310 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.434 UTC [cauthdsl] func2 -> DEBU 2eb7 0xc0003e4310 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.434 UTC [cauthdsl] func2 -> DEBU 2eb8 0xc0003e4310 principal matched by identity 0" +"2019-04-22 06:17:40.435 UTC [msp.identity] Verify -> DEBU 2eb9 Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:40.435 UTC [msp.identity] Verify -> DEBU 2eba Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:40.436 UTC [cauthdsl] func2 -> DEBU 2ebb 0xc0003e4310 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.436 UTC [cauthdsl] func1 -> DEBU 2ebc 0xc0003e4310 gate 1555913860433676100 evaluation succeeds" +"2019-04-22 06:17:40.436 UTC [policies] Evaluate -> DEBU 2ebd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.436 UTC [policies] Evaluate -> DEBU 2ebe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.437 UTC [policies] Evaluate -> DEBU 2ebf Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.437 UTC [policies] Evaluate -> DEBU 2ec0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.438 UTC [msp.identity] Verify -> DEBU 2ec1 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:40.438 UTC [msp.identity] Verify -> DEBU 2ec2 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:40.439 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ec3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.439 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ec4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.439 UTC [policies] Evaluate -> DEBU 2ec5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.439 UTC [policies] Evaluate -> DEBU 2ec6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.440 UTC [policies] Evaluate -> DEBU 2ec7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.440 UTC [cauthdsl] func1 -> DEBU 2ec8 0xc0003e5a20 gate 1555913860440572000 evaluation starts" +"2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2ec9 0xc0003e5a20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2eca 0xc0003e5a20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2ecb 0xc0003e5a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:40.441 UTC [cauthdsl] func2 -> DEBU 2ecc 0xc0003e5a20 principal evaluation fails" +"2019-04-22 06:17:40.441 UTC [cauthdsl] func1 -> DEBU 2ecd 0xc0003e5a20 gate 1555913860440572000 evaluation fails" +"2019-04-22 06:17:40.441 UTC [policies] Evaluate -> DEBU 2ece Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.442 UTC [policies] Evaluate -> DEBU 2ecf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.442 UTC [policies] Evaluate -> DEBU 2ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:40.442 UTC [cauthdsl] func1 -> DEBU 2ed1 0xc0003f4260 gate 1555913860442479800 evaluation starts" +"2019-04-22 06:17:40.442 UTC [cauthdsl] func2 -> DEBU 2ed2 0xc0003f4260 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.443 UTC [cauthdsl] func2 -> DEBU 2ed3 0xc0003f4260 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.443 UTC [cauthdsl] func2 -> DEBU 2ed4 0xc0003f4260 principal matched by identity 0" +"2019-04-22 06:17:40.444 UTC [msp.identity] Verify -> DEBU 2ed5 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:40.444 UTC [msp.identity] Verify -> DEBU 2ed6 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:40.444 UTC [cauthdsl] func2 -> DEBU 2ed7 0xc0003f4260 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.445 UTC [cauthdsl] func1 -> DEBU 2ed8 0xc0003f4260 gate 1555913860442479800 evaluation succeeds" +"2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2ed9 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2eda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2edb Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.445 UTC [policies] Evaluate -> DEBU 2edc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.446 UTC [gossip.gossip] handleMessage -> DEBU 2edd Exiting" +"2019-04-22 06:17:40.446 UTC [gossip.gossip] handleMessage -> DEBU 2ede Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.446 UTC [msp] DeserializeIdentity -> DEBU 2edf Obtaining identity" +"2019-04-22 06:17:40.447 UTC [msp] DeserializeIdentity -> DEBU 2ee0 Obtaining identity" +"2019-04-22 06:17:40.448 UTC [msp] DeserializeIdentity -> DEBU 2ee1 Obtaining identity" +"2019-04-22 06:17:40.448 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ee2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ee3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ee4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.449 UTC [policies] Evaluate -> DEBU 2ee5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.449 UTC [policies] Evaluate -> DEBU 2ee6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.450 UTC [policies] Evaluate -> DEBU 2ee7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.450 UTC [cauthdsl] func1 -> DEBU 2ee8 0xc0003f5e50 gate 1555913860450066400 evaluation starts" +"2019-04-22 06:17:40.450 UTC [cauthdsl] func2 -> DEBU 2ee9 0xc0003f5e50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.450 UTC [cauthdsl] func2 -> DEBU 2eea 0xc0003f5e50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.450 UTC [cauthdsl] func2 -> DEBU 2eeb 0xc0003f5e50 principal matched by identity 0" +"2019-04-22 06:17:40.451 UTC [msp.identity] Verify -> DEBU 2eec Verify: digest = 00000000 52 97 14 a6 33 e9 9c 20 f3 d8 95 c7 e4 4c f3 2e |R...3.. .....L..| +00000010 f1 67 69 4e 2f dd 41 77 74 06 29 2b 1a a6 01 fe |.giN/.Awt.)+....|" +"2019-04-22 06:17:40.451 UTC [msp.identity] Verify -> DEBU 2eed Verify: sig = 00000000 30 45 02 21 00 ab f2 fd b0 89 0a de 62 ec 7f 15 |0E.!........b...| +00000010 75 79 b5 a5 9d 56 d2 21 55 80 57 1c 60 d0 b4 31 |uy...V.!U.W.`..1| +00000020 5d 58 b9 5f 14 02 20 13 10 b5 ba 74 0a 0b 80 3b |]X._.. ....t...;| +00000030 1c 05 7d 29 34 01 33 a6 f1 78 96 56 d6 bc ce b7 |..})4.3..x.V....| +00000040 3a 9b 34 ab c4 83 c5 |:.4....|" +"2019-04-22 06:17:40.452 UTC [cauthdsl] func2 -> DEBU 2eee 0xc0003f5e50 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.452 UTC [cauthdsl] func1 -> DEBU 2eef 0xc0003f5e50 gate 1555913860450066400 evaluation succeeds" +"2019-04-22 06:17:40.452 UTC [policies] Evaluate -> DEBU 2ef0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.452 UTC [policies] Evaluate -> DEBU 2ef1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.452 UTC [policies] Evaluate -> DEBU 2ef2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.453 UTC [policies] Evaluate -> DEBU 2ef3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.454 UTC [msp.identity] Verify -> DEBU 2ef4 Verify: digest = 00000000 7c 72 22 af 4d 5c 42 46 f5 0c a4 3e db 77 f2 99 ||r".M\BF...>.w..| +00000010 1e 73 b1 ac db df b5 6e dc 16 ed 53 d5 1a 5d bb |.s.....n...S..].|" +"2019-04-22 06:17:40.454 UTC [msp.identity] Verify -> DEBU 2ef5 Verify: sig = 00000000 30 44 02 20 23 95 4e 25 2d 18 49 9c 94 c4 97 9e |0D. #.N%-.I.....| +00000010 e2 0c 0a e2 71 85 57 d7 52 27 5a 36 2f 00 13 86 |....q.W.R'Z6/...| +00000020 b5 64 76 71 02 20 35 f3 1a 27 c4 d1 da ff 0b 01 |.dvq. 5..'......| +00000030 10 ac e1 7c ae 76 34 a8 66 ae ff 4b 01 a5 10 6e |...|.v4.f..K...n| +00000040 15 d5 a2 f1 49 ef |....I.|" +"2019-04-22 06:17:40.454 UTC [msp.identity] Verify -> DEBU 2ef6 Verify: digest = 00000000 69 5f 95 d7 61 fe 18 43 53 a8 1e 45 1c f4 72 4d |i_..a..CS..E..rM| +00000010 33 4d f6 ec 3f 2f 5f c1 1c df 37 1d 79 e7 ac b1 |3M..?/_...7.y...|" +"2019-04-22 06:17:40.455 UTC [msp.identity] Verify -> DEBU 2ef7 Verify: sig = 00000000 30 45 02 21 00 b7 75 9d 25 6f 80 79 f3 b6 30 d0 |0E.!..u.%o.y..0.| +00000010 f7 f8 b8 3c af 65 f7 51 9b 00 20 1e 91 16 f7 35 |...<.e.Q.. ....5| +00000020 38 94 38 5c 4d 02 20 2c 17 3d c4 b1 b9 ca fa 80 |8.8\M. ,.=......| +00000030 82 41 09 82 ab 97 f5 2d c5 08 d3 78 8b a2 eb 35 |.A.....-...x...5| +00000040 09 04 73 b6 16 85 3c |..s...<|" +"2019-04-22 06:17:40.455 UTC [msp] DeserializeIdentity -> DEBU 2ef8 Obtaining identity" +"2019-04-22 06:17:40.455 UTC [msp] DeserializeIdentity -> DEBU 2ef9 Obtaining identity" +"2019-04-22 06:17:40.456 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2efa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.456 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efb Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.456 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2efc Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.456 UTC [policies] Evaluate -> DEBU 2efd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.457 UTC [policies] Evaluate -> DEBU 2efe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.457 UTC [policies] Evaluate -> DEBU 2eff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.457 UTC [cauthdsl] func1 -> DEBU 2f00 0xc0003164d0 gate 1555913860457409500 evaluation starts" +"2019-04-22 06:17:40.457 UTC [cauthdsl] func2 -> DEBU 2f01 0xc0003164d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.457 UTC [cauthdsl] func2 -> DEBU 2f02 0xc0003164d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.458 UTC [cauthdsl] func2 -> DEBU 2f03 0xc0003164d0 principal matched by identity 0" +"2019-04-22 06:17:40.458 UTC [msp.identity] Verify -> DEBU 2f04 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:40.459 UTC [msp.identity] Verify -> DEBU 2f05 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 2f06 0xc0003164d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.460 UTC [cauthdsl] func1 -> DEBU 2f07 0xc0003164d0 gate 1555913860457409500 evaluation succeeds" +"2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f08 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f0a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.460 UTC [policies] Evaluate -> DEBU 2f0b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.461 UTC [msp] DeserializeIdentity -> DEBU 2f0c Obtaining identity" +"2019-04-22 06:17:40.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.461 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f0e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.462 UTC [policies] Evaluate -> DEBU 2f0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.462 UTC [policies] Evaluate -> DEBU 2f10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.462 UTC [policies] Evaluate -> DEBU 2f11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.462 UTC [cauthdsl] func1 -> DEBU 2f12 0xc000317820 gate 1555913860462584700 evaluation starts" +"2019-04-22 06:17:40.462 UTC [cauthdsl] func2 -> DEBU 2f13 0xc000317820 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.463 UTC [cauthdsl] func2 -> DEBU 2f14 0xc000317820 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.463 UTC [cauthdsl] func2 -> DEBU 2f15 0xc000317820 principal matched by identity 0" +"2019-04-22 06:17:40.464 UTC [msp.identity] Verify -> DEBU 2f16 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:40.464 UTC [msp.identity] Verify -> DEBU 2f17 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 2f18 0xc000317820 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.464 UTC [cauthdsl] func1 -> DEBU 2f19 0xc000317820 gate 1555913860462584700 evaluation succeeds" +"2019-04-22 06:17:40.464 UTC [policies] Evaluate -> DEBU 2f1a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.465 UTC [policies] Evaluate -> DEBU 2f1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.465 UTC [policies] Evaluate -> DEBU 2f1c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.465 UTC [policies] Evaluate -> DEBU 2f1d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.466 UTC [gossip.gossip] handleMessage -> DEBU 2f1e Exiting" +"2019-04-22 06:17:40.489 UTC [msp] DeserializeIdentity -> DEBU 2f1f Obtaining identity" +"2019-04-22 06:17:40.491 UTC [msp] DeserializeIdentity -> DEBU 2f20 Obtaining identity" +"2019-04-22 06:17:40.492 UTC [gossip.pull] Hello -> DEBU 2f21 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:40.493 UTC [msp] DeserializeIdentity -> DEBU 2f22 Obtaining identity" +"2019-04-22 06:17:40.493 UTC [msp] DeserializeIdentity -> DEBU 2f23 Obtaining identity" +"2019-04-22 06:17:40.495 UTC [gossip.comm] Send -> DEBU 2f24 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:40.496 UTC [gossip.comm] sendToEndpoint -> DEBU 2f25 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.496 UTC [gossip.comm] sendToEndpoint -> DEBU 2f26 Exiting" +"2019-04-22 06:17:40.498 UTC [gossip.comm] func1 -> DEBU 2f27 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15444262703659977216 , Msg_type: BLOCK_MSG, digests: [5 6 1 2 3 4], Envelope: 52 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.498 UTC [gossip.gossip] handleMessage -> DEBU 2f28 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15444262703659977216 , Msg_type: BLOCK_MSG, digests: [5 6 1 2 3 4], Envelope: 52 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.499 UTC [gossip.pull] HandleMessage -> DEBU 2f29 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15444262703659977216 , Msg_type: BLOCK_MSG, digests: [5 6 1 2 3 4], Envelope: 52 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.499 UTC [gossip.gossip] handleMessage -> DEBU 2f2a Exiting" +"2019-04-22 06:17:40.648 UTC [gossip.comm] func1 -> DEBU 2f2b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.648 UTC [gossip.gossip] handleMessage -> DEBU 2f2c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.648 UTC [msp] DeserializeIdentity -> DEBU 2f2d Obtaining identity" +"2019-04-22 06:17:40.649 UTC [msp] DeserializeIdentity -> DEBU 2f2e Obtaining identity" +"2019-04-22 06:17:40.649 UTC [gossip.gossip] handleMessage -> DEBU 2f2f Exiting" +"2019-04-22 06:17:40.656 UTC [gossip.comm] func1 -> DEBU 2f30 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:40.657 UTC [gossip.gossip] handleMessage -> DEBU 2f31 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:40.657 UTC [msp.identity] Verify -> DEBU 2f32 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:40.657 UTC [msp.identity] Verify -> DEBU 2f33 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:40.658 UTC [gossip.gossip] handleMessage -> DEBU 2f34 Exiting" +"2019-04-22 06:17:40.661 UTC [gossip.comm] func1 -> DEBU 2f35 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:40.661 UTC [gossip.gossip] handleMessage -> DEBU 2f36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:40.662 UTC [msp.identity] Verify -> DEBU 2f37 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:40.662 UTC [msp.identity] Verify -> DEBU 2f38 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:40.662 UTC [msp] DeserializeIdentity -> DEBU 2f39 Obtaining identity" +"2019-04-22 06:17:40.662 UTC [gossip.gossip] handleMessage -> DEBU 2f3a Exiting" +"2019-04-22 06:17:40.665 UTC [gossip.gossip] handleMessage -> DEBU 2f3b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913859678701900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:40.666 UTC [msp.identity] Verify -> DEBU 2f3c Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:40.666 UTC [msp.identity] Verify -> DEBU 2f3d Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:40.666 UTC [msp] DeserializeIdentity -> DEBU 2f3e Obtaining identity" +"2019-04-22 06:17:40.667 UTC [gossip.gossip] handleMessage -> DEBU 2f3f Exiting" +"2019-04-22 06:17:40.684 UTC [gossip.comm] func1 -> DEBU 2f40 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.685 UTC [gossip.gossip] handleMessage -> DEBU 2f41 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.685 UTC [gossip.pull] HandleMessage -> DEBU 2f42 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.685 UTC [gossip.pull] SendDigest -> DEBU 2f43 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:40.685 UTC [gossip.gossip] handleMessage -> DEBU 2f44 Exiting" +"2019-04-22 06:17:40.832 UTC [msp.identity] Sign -> DEBU 2f45 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151029 " +"2019-04-22 06:17:40.832 UTC [msp.identity] Sign -> DEBU 2f46 Sign: digest: C7DB4CB6ACA35AD2049E83322D90DEEDFEDE15952AF89422F26BEB8989219041 " +"2019-04-22 06:17:40.833 UTC [msp.identity] Sign -> DEBU 2f47 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:40.835 UTC [msp.identity] Sign -> DEBU 2f48 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:40.835 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2f49 Sleeping 5s" +"2019-04-22 06:17:40.848 UTC [msp] DeserializeIdentity -> DEBU 2f4a Obtaining identity" +"2019-04-22 06:17:40.848 UTC [msp] DeserializeIdentity -> DEBU 2f4b Obtaining identity" +"2019-04-22 06:17:40.849 UTC [gossip.comm] Send -> DEBU 2f4c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:40.850 UTC [msp] DeserializeIdentity -> DEBU 2f4d Obtaining identity" +"2019-04-22 06:17:40.850 UTC [gossip.comm] sendToEndpoint -> DEBU 2f4e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:40.850 UTC [gossip.comm] sendToEndpoint -> DEBU 2f4f Exiting" +"2019-04-22 06:17:40.850 UTC [gossip.comm] Send -> DEBU 2f50 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:40.851 UTC [gossip.comm] sendToEndpoint -> DEBU 2f51 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:40.851 UTC [gossip.comm] sendToEndpoint -> DEBU 2f52 Exiting" +"2019-04-22 06:17:40.853 UTC [msp] DeserializeIdentity -> DEBU 2f53 Obtaining identity" +"2019-04-22 06:17:40.853 UTC [gossip.comm] Send -> DEBU 2f54 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:40.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2f55 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:41 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:40.854 UTC [gossip.comm] sendToEndpoint -> DEBU 2f56 Exiting" +"2019-04-22 06:17:40.872 UTC [gossip.gossip] handleMessage -> DEBU 2f57 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:40.872 UTC [msp] DeserializeIdentity -> DEBU 2f58 Obtaining identity" +"2019-04-22 06:17:40.872 UTC [msp] DeserializeIdentity -> DEBU 2f59 Obtaining identity" +"2019-04-22 06:17:40.872 UTC [msp] DeserializeIdentity -> DEBU 2f5a Obtaining identity" +"2019-04-22 06:17:40.872 UTC [gossip.gossip] handleMessage -> DEBU 2f5b Exiting" +"2019-04-22 06:17:40.877 UTC [gossip.gossip] handleMessage -> DEBU 2f5c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913859717789100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:40.877 UTC [msp] DeserializeIdentity -> DEBU 2f5d Obtaining identity" +"2019-04-22 06:17:40.878 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f5e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f5f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.878 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f60 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.878 UTC [policies] Evaluate -> DEBU 2f61 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.879 UTC [policies] Evaluate -> DEBU 2f62 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.879 UTC [policies] Evaluate -> DEBU 2f63 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.879 UTC [cauthdsl] func1 -> DEBU 2f64 0xc000337480 gate 1555913860879615600 evaluation starts" +"2019-04-22 06:17:40.879 UTC [cauthdsl] func2 -> DEBU 2f65 0xc000337480 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.879 UTC [cauthdsl] func2 -> DEBU 2f66 0xc000337480 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.882 UTC [cauthdsl] func2 -> DEBU 2f67 0xc000337480 principal matched by identity 0" +"2019-04-22 06:17:40.882 UTC [msp.identity] Verify -> DEBU 2f68 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:40.883 UTC [msp.identity] Verify -> DEBU 2f69 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:40.883 UTC [gossip.comm] func1 -> DEBU 2f6a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913859717789100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:40.884 UTC [cauthdsl] func2 -> DEBU 2f6b 0xc000337480 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.884 UTC [cauthdsl] func1 -> DEBU 2f6c 0xc000337480 gate 1555913860879615600 evaluation succeeds" +"2019-04-22 06:17:40.884 UTC [policies] Evaluate -> DEBU 2f6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.884 UTC [policies] Evaluate -> DEBU 2f6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.885 UTC [policies] Evaluate -> DEBU 2f6f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.885 UTC [policies] Evaluate -> DEBU 2f70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.885 UTC [msp] DeserializeIdentity -> DEBU 2f71 Obtaining identity" +"2019-04-22 06:17:40.886 UTC [gossip.gossip] handleMessage -> DEBU 2f72 Exiting" +"2019-04-22 06:17:40.886 UTC [gossip.gossip] handleMessage -> DEBU 2f73 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913859717789100 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:7 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:40.886 UTC [msp] DeserializeIdentity -> DEBU 2f74 Obtaining identity" +"2019-04-22 06:17:40.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f75 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:40.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f76 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.890 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f77 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:40.890 UTC [policies] Evaluate -> DEBU 2f78 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:40.891 UTC [policies] Evaluate -> DEBU 2f79 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:40.891 UTC [policies] Evaluate -> DEBU 2f7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:40.891 UTC [cauthdsl] func1 -> DEBU 2f7b 0xc000544f30 gate 1555913860891962200 evaluation starts" +"2019-04-22 06:17:40.892 UTC [cauthdsl] func2 -> DEBU 2f7c 0xc000544f30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:40.892 UTC [cauthdsl] func2 -> DEBU 2f7d 0xc000544f30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:40.892 UTC [cauthdsl] func2 -> DEBU 2f7e 0xc000544f30 principal matched by identity 0" +"2019-04-22 06:17:40.892 UTC [msp.identity] Verify -> DEBU 2f7f Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:40.893 UTC [msp.identity] Verify -> DEBU 2f80 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:40.893 UTC [cauthdsl] func2 -> DEBU 2f81 0xc000544f30 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:40.893 UTC [cauthdsl] func1 -> DEBU 2f82 0xc000544f30 gate 1555913860891962200 evaluation succeeds" +"2019-04-22 06:17:40.893 UTC [policies] Evaluate -> DEBU 2f83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.893 UTC [policies] Evaluate -> DEBU 2f84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:40.895 UTC [policies] Evaluate -> DEBU 2f85 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:40.898 UTC [policies] Evaluate -> DEBU 2f86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:40.898 UTC [msp] DeserializeIdentity -> DEBU 2f87 Obtaining identity" +"2019-04-22 06:17:40.898 UTC [gossip.gossip] handleMessage -> DEBU 2f88 Exiting" +"2019-04-22 06:17:41.089 UTC [gossip.comm] func1 -> DEBU 2f89 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:41.090 UTC [gossip.gossip] handleMessage -> DEBU 2f8a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:41.090 UTC [msp] DeserializeIdentity -> DEBU 2f8b Obtaining identity" +"2019-04-22 06:17:41.090 UTC [msp] DeserializeIdentity -> DEBU 2f8c Obtaining identity" +"2019-04-22 06:17:41.091 UTC [msp] DeserializeIdentity -> DEBU 2f8d Obtaining identity" +"2019-04-22 06:17:41.091 UTC [gossip.gossip] handleMessage -> DEBU 2f8e Exiting" +"2019-04-22 06:17:41.098 UTC [gossip.comm] func1 -> DEBU 2f8f Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913859709294700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.100 UTC [gossip.gossip] handleMessage -> DEBU 2f90 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913859709294700 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:7 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.100 UTC [msp] DeserializeIdentity -> DEBU 2f91 Obtaining identity" +"2019-04-22 06:17:41.100 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2f92 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:41.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f93 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:41.101 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2f94 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:41.101 UTC [policies] Evaluate -> DEBU 2f95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:41.102 UTC [policies] Evaluate -> DEBU 2f96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:41.102 UTC [policies] Evaluate -> DEBU 2f97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:41.103 UTC [cauthdsl] func1 -> DEBU 2f98 0xc00055f4a0 gate 1555913861103452600 evaluation starts" +"2019-04-22 06:17:41.103 UTC [cauthdsl] func2 -> DEBU 2f99 0xc00055f4a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:41.104 UTC [cauthdsl] func2 -> DEBU 2f9a 0xc00055f4a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:41.105 UTC [cauthdsl] func2 -> DEBU 2f9b 0xc00055f4a0 principal matched by identity 0" +"2019-04-22 06:17:41.105 UTC [msp.identity] Verify -> DEBU 2f9c Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:41.105 UTC [msp.identity] Verify -> DEBU 2f9d Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 2f9e 0xc00055f4a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:41.106 UTC [cauthdsl] func1 -> DEBU 2f9f 0xc00055f4a0 gate 1555913861103452600 evaluation succeeds" +"2019-04-22 06:17:41.106 UTC [policies] Evaluate -> DEBU 2fa0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:41.106 UTC [policies] Evaluate -> DEBU 2fa1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:41.107 UTC [policies] Evaluate -> DEBU 2fa2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:41.107 UTC [policies] Evaluate -> DEBU 2fa3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:41.107 UTC [msp] DeserializeIdentity -> DEBU 2fa4 Obtaining identity" +"2019-04-22 06:17:41.107 UTC [gossip.gossip] handleMessage -> DEBU 2fa5 Exiting" +"2019-04-22 06:17:41.111 UTC [gossip.comm] func1 -> DEBU 2fa6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:41.111 UTC [gossip.gossip] handleMessage -> DEBU 2fa7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:41.111 UTC [gossip.gossip] handleMessage -> DEBU 2fa8 Exiting" +"2019-04-22 06:17:41.112 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fa9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:41.112 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2faa Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:41.113 UTC [msp.identity] Verify -> DEBU 2fab Verify: digest = 00000000 07 1e 8e 77 50 78 1e ef f2 31 56 0d 7d 56 5b d3 |...wPx...1V.}V[.| +00000010 d7 83 78 16 a1 f2 8d 6f 61 57 f8 19 76 5f 29 f2 |..x....oaW..v_).|" +"2019-04-22 06:17:41.114 UTC [msp.identity] Verify -> DEBU 2fac Verify: sig = 00000000 30 44 02 20 13 4b 2a 2f f0 af 34 20 6b 96 cb ff |0D. .K*/..4 k...| +00000010 0f 5e 3b 22 af bf ee 0b c4 05 af 6c d1 37 e3 b8 |.^;".......l.7..| +00000020 48 71 0a 96 02 20 03 c2 f3 a7 41 e0 4e 1e 5a e0 |Hq... ....A.N.Z.| +00000030 91 e0 78 2d 91 df 9d 7f 38 5c 44 df ed 83 d4 30 |..x-....8\D....0| +00000040 8c 66 a9 a3 67 c6 |.f..g.|" +"2019-04-22 06:17:41.114 UTC [msp.identity] Verify -> DEBU 2fad Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:41.114 UTC [msp.identity] Verify -> DEBU 2fae Verify: sig = 00000000 30 44 02 20 30 ce 2c 7c 0a 37 f0 db c9 22 fd ff |0D. 0.,|.7..."..| +00000010 ea 56 d6 2c 68 f9 1f 63 fd 04 b8 33 34 85 fd d2 |.V.,h..c...34...| +00000020 30 0e c4 52 02 20 78 1c f4 8a 1d f9 52 2c 17 4c |0..R. x.....R,.L| +00000030 3d 63 54 67 28 09 7e f0 11 a9 5e ee 24 b6 67 44 |=cTg(.~...^.$.gD| +00000040 eb 89 fc 4f 81 e7 |...O..|" +"2019-04-22 06:17:41.115 UTC [gossip.discovery] handleAliveMessage -> DEBU 2faf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:41.115 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:41.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb1 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 " +"2019-04-22 06:17:41.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 " +"2019-04-22 06:17:41.116 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:41.117 UTC [gossip.discovery] learnExistingMembers -> DEBU 2fb4 Exiting" +"2019-04-22 06:17:41.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 2fb5 Exiting" +"2019-04-22 06:17:41.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fb6 Exiting" +"2019-04-22 06:17:41.122 UTC [gossip.comm] func1 -> DEBU 2fb7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.122 UTC [gossip.gossip] handleMessage -> DEBU 2fb8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.123 UTC [gossip.gossip] handleMessage -> DEBU 2fb9 Exiting" +"2019-04-22 06:17:41.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fba Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fbb Exiting" +"2019-04-22 06:17:41.124 UTC [msp] DeserializeIdentity -> DEBU 2fbc Obtaining identity" +"2019-04-22 06:17:41.125 UTC [msp] DeserializeIdentity -> DEBU 2fbd Obtaining identity" +"2019-04-22 06:17:41.125 UTC [msp] DeserializeIdentity -> DEBU 2fbe Obtaining identity" +"2019-04-22 06:17:41.125 UTC [gossip.comm] Send -> DEBU 2fbf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:41.126 UTC [msp] DeserializeIdentity -> DEBU 2fc0 Obtaining identity" +"2019-04-22 06:17:41.126 UTC [gossip.comm] Send -> DEBU 2fc1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.126 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc3 Exiting" +"2019-04-22 06:17:41.127 UTC [gossip.gossip] handleMessage -> DEBU 2fc4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.127 UTC [gossip.gossip] handleMessage -> DEBU 2fc5 Exiting" +"2019-04-22 06:17:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.127 UTC [gossip.comm] sendToEndpoint -> DEBU 2fc7 Exiting" +"2019-04-22 06:17:41.127 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fc8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.128 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fc9 Exiting" +"2019-04-22 06:17:41.459 UTC [gossip.election] waitForInterrupt -> DEBU 2fca c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:41.459 UTC [gossip.election] IsLeader -> DEBU 2fcb c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:41.459 UTC [msp.identity] Sign -> DEBU 2fcc Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100D1801 " +"2019-04-22 06:17:41.459 UTC [msp.identity] Sign -> DEBU 2fcd Sign: digest: 11E5496DAF4521386CA7A00C5C3C907CC1561880B32E7807199FB6E141AE2779 " +"2019-04-22 06:17:41.459 UTC [gossip.election] waitForInterrupt -> DEBU 2fce c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:41.471 UTC [msp] DeserializeIdentity -> DEBU 2fcf Obtaining identity" +"2019-04-22 06:17:41.471 UTC [msp] DeserializeIdentity -> DEBU 2fd0 Obtaining identity" +"2019-04-22 06:17:41.473 UTC [msp] DeserializeIdentity -> DEBU 2fd1 Obtaining identity" +"2019-04-22 06:17:41.473 UTC [msp] DeserializeIdentity -> DEBU 2fd2 Obtaining identity" +"2019-04-22 06:17:41.474 UTC [gossip.comm] Send -> DEBU 2fd3 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:41.474 UTC [msp] DeserializeIdentity -> DEBU 2fd4 Obtaining identity" +"2019-04-22 06:17:41.474 UTC [msp] DeserializeIdentity -> DEBU 2fd5 Obtaining identity" +"2019-04-22 06:17:41.475 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:13 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:17:41.475 UTC [gossip.comm] sendToEndpoint -> DEBU 2fd7 Exiting" +"2019-04-22 06:17:41.598 UTC [gossip.comm] func1 -> DEBU 2fd8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.598 UTC [gossip.gossip] handleMessage -> DEBU 2fd9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.599 UTC [gossip.gossip] handleMessage -> DEBU 2fda Exiting" +"2019-04-22 06:17:41.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2fdb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.600 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2fdc Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:41.600 UTC [msp] DeserializeIdentity -> DEBU 2fdd Obtaining identity" +"2019-04-22 06:17:41.601 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2fde Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:41.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fdf Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:41.601 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2fe0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:41.602 UTC [policies] Evaluate -> DEBU 2fe1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:41.602 UTC [policies] Evaluate -> DEBU 2fe2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:41.603 UTC [policies] Evaluate -> DEBU 2fe3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:41.603 UTC [cauthdsl] func1 -> DEBU 2fe4 0xc00221c9c0 gate 1555913861603848800 evaluation starts" +"2019-04-22 06:17:41.604 UTC [cauthdsl] func2 -> DEBU 2fe5 0xc00221c9c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:41.604 UTC [cauthdsl] func2 -> DEBU 2fe6 0xc00221c9c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:41.605 UTC [cauthdsl] func2 -> DEBU 2fe7 0xc00221c9c0 principal matched by identity 0" +"2019-04-22 06:17:41.605 UTC [msp.identity] Verify -> DEBU 2fe8 Verify: digest = 00000000 62 61 8d 57 5b b1 0d 39 15 b7 f1 bd 81 a5 1c 4f |ba.W[..9.......O| +00000010 7c a6 e2 89 92 f6 5a 1a f1 1b 2c 5f ee 97 16 58 ||.....Z...,_...X|" +"2019-04-22 06:17:41.606 UTC [msp.identity] Verify -> DEBU 2fe9 Verify: sig = 00000000 30 45 02 21 00 e7 e8 6c 73 8e fa 1c f3 8b cc 9a |0E.!...ls.......| +00000010 78 56 7c 87 73 d4 05 3e db 06 fd b1 fa ae ae 97 |xV|.s..>........| +00000020 48 98 0b aa bc 02 20 45 4f 1e 18 b4 31 ba 40 67 |H..... EO...1.@g| +00000030 9b 2a 2d 55 33 db c0 69 7a f5 b3 fa 96 8f 06 68 |.*-U3..iz......h| +00000040 df 78 0d 90 6e d3 0f |.x..n..|" +"2019-04-22 06:17:41.607 UTC [cauthdsl] func2 -> DEBU 2fea 0xc00221c9c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:41.607 UTC [cauthdsl] func1 -> DEBU 2feb 0xc00221c9c0 gate 1555913861603848800 evaluation succeeds" +"2019-04-22 06:17:41.609 UTC [policies] Evaluate -> DEBU 2fec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:41.610 UTC [policies] Evaluate -> DEBU 2fed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:41.610 UTC [policies] Evaluate -> DEBU 2fee Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:41.610 UTC [policies] Evaluate -> DEBU 2fef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:41.611 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ff0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.613 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:41.613 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff2 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 " +"2019-04-22 06:17:41.614 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff3 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 " +"2019-04-22 06:17:41.614 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:41.614 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ff5 Exiting" +"2019-04-22 06:17:41.614 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ff6 Exiting" +"2019-04-22 06:17:41.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ff7 Exiting" +"2019-04-22 06:17:41.615 UTC [msp] DeserializeIdentity -> DEBU 2ff8 Obtaining identity" +"2019-04-22 06:17:41.615 UTC [msp] DeserializeIdentity -> DEBU 2ff9 Obtaining identity" +"2019-04-22 06:17:41.616 UTC [msp] DeserializeIdentity -> DEBU 2ffa Obtaining identity" +"2019-04-22 06:17:41.616 UTC [msp] DeserializeIdentity -> DEBU 2ffb Obtaining identity" +"2019-04-22 06:17:41.617 UTC [msp] DeserializeIdentity -> DEBU 2ffc Obtaining identity" +"2019-04-22 06:17:41.617 UTC [msp] DeserializeIdentity -> DEBU 2ffd Obtaining identity" +"2019-04-22 06:17:41.617 UTC [gossip.comm] func1 -> DEBU 2ffe Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.617 UTC [gossip.gossip] handleMessage -> DEBU 3000 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.617 UTC [gossip.gossip] handleMessage -> DEBU 3001 Exiting" +"2019-04-22 06:17:41.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3002 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3003 Exiting" +"2019-04-22 06:17:41.617 UTC [gossip.comm] Send -> DEBU 2fff Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:41.618 UTC [msp] DeserializeIdentity -> DEBU 3004 Obtaining identity" +"2019-04-22 06:17:41.618 UTC [gossip.comm] sendToEndpoint -> DEBU 3005 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.619 UTC [gossip.comm] sendToEndpoint -> DEBU 3006 Exiting" +"2019-04-22 06:17:41.619 UTC [msp] DeserializeIdentity -> DEBU 3007 Obtaining identity" +"2019-04-22 06:17:41.619 UTC [gossip.comm] Send -> DEBU 3008 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 3009 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:41.620 UTC [gossip.comm] sendToEndpoint -> DEBU 300a Exiting" +"2019-04-22 06:17:42.024 UTC [gossip.gossip] handleMessage -> DEBU 300b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.025 UTC [gossip.gossip] handleMessage -> DEBU 300c Exiting" +"2019-04-22 06:17:42.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 300d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.025 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 300e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:42.026 UTC [msp] DeserializeIdentity -> DEBU 300f Obtaining identity" +"2019-04-22 06:17:42.026 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3010 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:42.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3011 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:42.026 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3012 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:42.026 UTC [policies] Evaluate -> DEBU 3013 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:42.026 UTC [policies] Evaluate -> DEBU 3014 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:42.027 UTC [policies] Evaluate -> DEBU 3015 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:42.027 UTC [cauthdsl] func1 -> DEBU 3016 0xc002258f80 gate 1555913862027280500 evaluation starts" +"2019-04-22 06:17:42.027 UTC [cauthdsl] func2 -> DEBU 3017 0xc002258f80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:42.027 UTC [cauthdsl] func2 -> DEBU 3018 0xc002258f80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:42.027 UTC [cauthdsl] func2 -> DEBU 3019 0xc002258f80 principal matched by identity 0" +"2019-04-22 06:17:42.027 UTC [msp.identity] Verify -> DEBU 301a Verify: digest = 00000000 12 e4 ee 31 4d d2 2c c9 af f6 7a 18 19 7a 11 0d |...1M.,...z..z..| +00000010 30 bd c8 4a 7e 53 13 0f bc cb e4 7f 98 78 6a a5 |0..J~S.......xj.|" +"2019-04-22 06:17:42.028 UTC [msp.identity] Verify -> DEBU 301b Verify: sig = 00000000 30 45 02 21 00 a9 8d 7f f6 bd 56 94 36 ca 69 f7 |0E.!......V.6.i.| +00000010 9d b8 74 29 ab 2f 43 f4 85 8e 23 4d b7 57 32 74 |..t)./C...#M.W2t| +00000020 9b ea 59 f8 41 02 20 38 7b 85 fe fa 44 a7 df 57 |..Y.A. 8{...D..W| +00000030 06 6a dc cf 8e a0 e3 8d f0 9c 13 14 e5 76 15 ce |.j...........v..| +00000040 a8 fb b8 a3 40 8f f1 |....@..|" +"2019-04-22 06:17:42.028 UTC [cauthdsl] func2 -> DEBU 301c 0xc002258f80 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:42.028 UTC [cauthdsl] func1 -> DEBU 301d 0xc002258f80 gate 1555913862027280500 evaluation succeeds" +"2019-04-22 06:17:42.028 UTC [policies] Evaluate -> DEBU 301e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:42.029 UTC [policies] Evaluate -> DEBU 301f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:42.029 UTC [policies] Evaluate -> DEBU 3020 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:42.029 UTC [policies] Evaluate -> DEBU 3021 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:42.029 UTC [gossip.discovery] handleAliveMessage -> DEBU 3022 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3023 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3024 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 " +"2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3025 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 " +"2019-04-22 06:17:42.029 UTC [gossip.discovery] learnExistingMembers -> DEBU 3026 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:41 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:42.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 3027 Exiting" +"2019-04-22 06:17:42.030 UTC [gossip.discovery] handleAliveMessage -> DEBU 3028 Exiting" +"2019-04-22 06:17:42.030 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3029 Exiting" +"2019-04-22 06:17:42.032 UTC [gossip.comm] func1 -> DEBU 302a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.033 UTC [gossip.gossip] handleMessage -> DEBU 302b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.033 UTC [gossip.gossip] handleMessage -> DEBU 302c Exiting" +"2019-04-22 06:17:42.033 UTC [msp] DeserializeIdentity -> DEBU 302d Obtaining identity" +"2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 302e Obtaining identity" +"2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 302f Obtaining identity" +"2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 3030 Obtaining identity" +"2019-04-22 06:17:42.034 UTC [msp] DeserializeIdentity -> DEBU 3031 Obtaining identity" +"2019-04-22 06:17:42.035 UTC [msp] DeserializeIdentity -> DEBU 3032 Obtaining identity" +"2019-04-22 06:17:42.035 UTC [gossip.comm] Send -> DEBU 3033 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:42.035 UTC [msp] DeserializeIdentity -> DEBU 3034 Obtaining identity" +"2019-04-22 06:17:42.036 UTC [msp] DeserializeIdentity -> DEBU 3035 Obtaining identity" +"2019-04-22 06:17:42.036 UTC [gossip.comm] Send -> DEBU 3036 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 3037 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 3038 Exiting" +"2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 3039 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.036 UTC [gossip.comm] sendToEndpoint -> DEBU 303a Exiting" +"2019-04-22 06:17:42.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 303c Exiting" +"2019-04-22 06:17:42.040 UTC [gossip.comm] func1 -> DEBU 303d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.040 UTC [gossip.gossip] handleMessage -> DEBU 303e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.040 UTC [gossip.gossip] handleMessage -> DEBU 303f Exiting" +"2019-04-22 06:17:42.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3040 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3041 Exiting" +"2019-04-22 06:17:42.806 UTC [endorser] ProcessProposal -> DEBU 3042 Entering: request from 192.168.224.9:49296" +"2019-04-22 06:17:42.806 UTC [protoutils] ValidateProposalMessage -> DEBU 3043 ValidateProposalMessage starts for signed proposal 0xc00054b4f0" +"2019-04-22 06:17:42.807 UTC [protoutils] validateChannelHeader -> DEBU 3044 validateChannelHeader info: header type 3" +"2019-04-22 06:17:42.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 3045 begin" +"2019-04-22 06:17:42.807 UTC [msp] GetManagerForChain -> DEBU 3046 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:42.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 3047 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:42.807 UTC [protoutils] checkSignatureFromCreator -> DEBU 3048 creator is valid" +"2019-04-22 06:17:42.808 UTC [msp.identity] Verify -> DEBU 3049 Verify: digest = 00000000 cb a4 84 16 ac b2 06 02 61 08 12 d9 c0 41 65 12 |........a....Ae.| +00000010 35 3e 09 cf 8f 8d 7e be a9 85 4e 2d e2 9c 37 c9 |5>....~...N-..7.|" +"2019-04-22 06:17:42.808 UTC [msp.identity] Verify -> DEBU 304a Verify: sig = 00000000 30 45 02 21 00 c5 32 7e 8d 92 bd 28 35 d0 65 95 |0E.!..2~...(5.e.| +00000010 a7 a5 f3 2b f9 f8 1d a3 fa fe 9b 06 71 28 8c f7 |...+........q(..| +00000020 7d 97 8e 9c be 02 20 24 83 61 0b 9e 7c 95 1e 0f |}..... $.a..|...| +00000030 38 8c 2f 21 53 1f a2 f7 94 a4 f8 2e 34 4b 91 dc |8./!S.......4K..| +00000040 0e 70 4a a0 0f ab 8a |.pJ....|" +"2019-04-22 06:17:42.808 UTC [protoutils] checkSignatureFromCreator -> DEBU 304b exits successfully" +"2019-04-22 06:17:42.808 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304c validateChaincodeProposalMessage starts for proposal 0xc002485f10, header 0xc00054b9f0" +"2019-04-22 06:17:42.808 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:42.809 UTC [endorser] preProcess -> DEBU 304e [businesschannel][328ba5a2] processing txid: 328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f" +"2019-04-22 06:17:42.809 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 304f retrieveTransactionByID() - txId = [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +"2019-04-22 06:17:42.809 UTC [aclmgmt] CheckACL -> DEBU 3050 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:42.809 UTC [aclmgmt] CheckACL -> DEBU 3051 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:42.810 UTC [policies] Evaluate -> DEBU 3052 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:42.810 UTC [policies] Evaluate -> DEBU 3053 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:42.810 UTC [policies] Evaluate -> DEBU 3054 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:42.811 UTC [cauthdsl] func1 -> DEBU 3055 0xc0022cbe20 gate 1555913862810939000 evaluation starts" +"2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3056 0xc0022cbe20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3057 0xc0022cbe20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3058 0xc0022cbe20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:42.811 UTC [cauthdsl] func2 -> DEBU 3059 0xc0022cbe20 principal evaluation fails" +"2019-04-22 06:17:42.812 UTC [cauthdsl] func1 -> DEBU 305a 0xc0022cbe20 gate 1555913862810939000 evaluation fails" +"2019-04-22 06:17:42.812 UTC [policies] Evaluate -> DEBU 305b Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:42.812 UTC [policies] Evaluate -> DEBU 305c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:42.812 UTC [policies] Evaluate -> DEBU 305d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:42.812 UTC [cauthdsl] func1 -> DEBU 305e 0xc0022d8850 gate 1555913862812880000 evaluation starts" +"2019-04-22 06:17:42.813 UTC [cauthdsl] func2 -> DEBU 305f 0xc0022d8850 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:42.813 UTC [cauthdsl] func2 -> DEBU 3060 0xc0022d8850 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:42.813 UTC [cauthdsl] func2 -> DEBU 3061 0xc0022d8850 principal matched by identity 0" +"2019-04-22 06:17:42.813 UTC [msp.identity] Verify -> DEBU 3062 Verify: digest = 00000000 cb a4 84 16 ac b2 06 02 61 08 12 d9 c0 41 65 12 |........a....Ae.| +00000010 35 3e 09 cf 8f 8d 7e be a9 85 4e 2d e2 9c 37 c9 |5>....~...N-..7.|" +"2019-04-22 06:17:42.813 UTC [msp.identity] Verify -> DEBU 3063 Verify: sig = 00000000 30 45 02 21 00 c5 32 7e 8d 92 bd 28 35 d0 65 95 |0E.!..2~...(5.e.| +00000010 a7 a5 f3 2b f9 f8 1d a3 fa fe 9b 06 71 28 8c f7 |...+........q(..| +00000020 7d 97 8e 9c be 02 20 24 83 61 0b 9e 7c 95 1e 0f |}..... $.a..|...| +00000030 38 8c 2f 21 53 1f a2 f7 94 a4 f8 2e 34 4b 91 dc |8./!S.......4K..| +00000040 0e 70 4a a0 0f ab 8a |.pJ....|" +"2019-04-22 06:17:42.814 UTC [cauthdsl] func2 -> DEBU 3064 0xc0022d8850 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:42.814 UTC [cauthdsl] func1 -> DEBU 3065 0xc0022d8850 gate 1555913862812880000 evaluation succeeds" +"2019-04-22 06:17:42.814 UTC [policies] Evaluate -> DEBU 3066 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:42.814 UTC [policies] Evaluate -> DEBU 3067 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:42.814 UTC [policies] Evaluate -> DEBU 3068 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:42.815 UTC [policies] Evaluate -> DEBU 3069 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:42.815 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 306a constructing new tx simulator" +"2019-04-22 06:17:42.815 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 306b constructing new tx simulator txid = [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +"2019-04-22 06:17:42.815 UTC [endorser] SimulateProposal -> DEBU 306c [businesschannel][328ba5a2] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:42.816 UTC [stateleveldb] GetState -> DEBU 306d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:42.816 UTC [endorser] callChaincode -> INFO 306e [businesschannel][328ba5a2] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:42.817 UTC [stateleveldb] GetState -> DEBU 306f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:42.817 UTC [stateleveldb] GetState -> DEBU 3070 GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:42.817 UTC [chaincode] Execute -> DEBU 3071 Entry" +"2019-04-22 06:17:42.819 UTC [chaincode] handleMessage -> DEBU 3072 [328ba5a2] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:42.819 UTC [chaincode] HandleTransaction -> DEBU 3073 [328ba5a2] handling GET_STATE from chaincode" +"2019-04-22 06:17:42.819 UTC [chaincode] HandleGetState -> DEBU 3074 [328ba5a2] getting state for chaincode exp02, key a, channel businesschannel" +"2019-04-22 06:17:42.820 UTC [stateleveldb] GetState -> DEBU 3075 GetState(). ns=exp02, key=a" +"2019-04-22 06:17:42.823 UTC [chaincode] HandleTransaction -> DEBU 3076 [328ba5a2] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:42.825 UTC [chaincode] handleMessage -> DEBU 3077 [328ba5a2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:42.825 UTC [chaincode] Notify -> DEBU 3078 [328ba5a2] notifying Txid:328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f, channelID:businesschannel" +"2019-04-22 06:17:42.825 UTC [chaincode] Execute -> DEBU 3079 Exit" +"2019-04-22 06:17:42.826 UTC [endorser] callChaincode -> INFO 307a [businesschannel][328ba5a2] Exit chaincode: name:"exp02" (9ms)" +"2019-04-22 06:17:42.826 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 307b Simulation completed, getting simulation results" +"2019-04-22 06:17:42.826 UTC [lockbasedtxmgr] Done -> DEBU 307c Done with transaction simulation / query execution [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +"2019-04-22 06:17:42.826 UTC [endorser] SimulateProposal -> DEBU 307d [businesschannel][328ba5a2] Exit" +"2019-04-22 06:17:42.827 UTC [endorser] endorseProposal -> DEBU 307e [businesschannel][328ba5a2] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:42.827 UTC [endorser] endorseProposal -> DEBU 307f [businesschannel][328ba5a2] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:42.827 UTC [endorser] EndorseWithPlugin -> DEBU 3080 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f, chaincode: exp02}" +"2019-04-22 06:17:42.828 UTC [msp.identity] Sign -> DEBU 3081 Sign: plaintext: 0A2043E6CACF6D471D4F801876FF6BC3...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:42.828 UTC [msp.identity] Sign -> DEBU 3082 Sign: digest: 35A1F66AE23CC468CD1BA5C50979E72D7E5F39495AEEB368D6F32B8DE0CD6D91 " +"2019-04-22 06:17:42.829 UTC [endorser] EndorseWithPlugin -> DEBU 3083 Exiting {plugin: escc, channel: businesschannel, tx: 328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f, chaincode: exp02}" +"2019-04-22 06:17:42.830 UTC [endorser] endorseProposal -> DEBU 3084 [businesschannel][328ba5a2] Exit" +"2019-04-22 06:17:42.831 UTC [lockbasedtxmgr] Done -> DEBU 3085 Done with transaction simulation / query execution [328ba5a26e64054038737aa34fe5b830a3d275aa1c8997524585553454d35e4f]" +"2019-04-22 06:17:42.832 UTC [endorser] func1 -> DEBU 3086 Exit: request from 192.168.224.9:49296" +"2019-04-22 06:17:42.833 UTC [comm.grpc.server] 1 -> INFO 3087 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49296 grpc.code=OK grpc.call_duration=27.2093ms +"2019-04-22 06:17:42.838 UTC [grpc] infof -> DEBU 3088 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:42.839 UTC [grpc] infof -> DEBU 3089 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:42.886 UTC [gossip.pull] Hello -> DEBU 308a Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:42.886 UTC [gossip.comm] Send -> DEBU 308b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:42.887 UTC [gossip.pull] Hello -> DEBU 308c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:42.887 UTC [gossip.comm] Send -> DEBU 308d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:42.887 UTC [gossip.pull] Hello -> DEBU 308e Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:42.888 UTC [gossip.comm] Send -> DEBU 308f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:42.888 UTC [gossip.comm] sendToEndpoint -> DEBU 3090 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.888 UTC [gossip.comm] sendToEndpoint -> DEBU 3091 Exiting" +"2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3092 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3093 Exiting" +"2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3094 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3095 Exiting" +"2019-04-22 06:17:42.891 UTC [gossip.gossip] handleMessage -> DEBU 3096 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4371859400708063927 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.891 UTC [gossip.pull] HandleMessage -> DEBU 3097 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4371859400708063927 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.892 UTC [gossip.gossip] handleMessage -> DEBU 3098 Exiting" +"2019-04-22 06:17:42.892 UTC [gossip.comm] func1 -> DEBU 3099 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18131995637447144871 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.893 UTC [gossip.gossip] handleMessage -> DEBU 309a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18131995637447144871 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.893 UTC [gossip.pull] HandleMessage -> DEBU 309b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18131995637447144871 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.894 UTC [gossip.gossip] handleMessage -> DEBU 309c Exiting" +"2019-04-22 06:17:42.895 UTC [gossip.comm] func1 -> DEBU 309d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15790122713230754728 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.895 UTC [gossip.gossip] handleMessage -> DEBU 309e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15790122713230754728 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.896 UTC [gossip.pull] HandleMessage -> DEBU 309f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15790122713230754728 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.896 UTC [gossip.gossip] handleMessage -> DEBU 30a0 Exiting" +"2019-04-22 06:17:42.935 UTC [msp.identity] Sign -> DEBU 30a1 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102A " +"2019-04-22 06:17:42.935 UTC [msp.identity] Sign -> DEBU 30a2 Sign: digest: 0B9F05E3DA7A10F568CD173DCCCF7C04719B624A3A6351E2A764221D7A0D5AB3 " +"2019-04-22 06:17:42.936 UTC [msp.identity] Sign -> DEBU 30a3 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:42.936 UTC [msp.identity] Sign -> DEBU 30a4 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:42.937 UTC [gossip.comm] Send -> DEBU 30a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:42.937 UTC [msp] DeserializeIdentity -> DEBU 30a6 Obtaining identity" +"2019-04-22 06:17:42.937 UTC [gossip.comm] sendToEndpoint -> DEBU 30a7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.937 UTC [gossip.comm] Send -> DEBU 30a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:42.938 UTC [gossip.comm] sendToEndpoint -> DEBU 30a9 Exiting" +"2019-04-22 06:17:42.938 UTC [msp] DeserializeIdentity -> DEBU 30aa Obtaining identity" +"2019-04-22 06:17:42.939 UTC [gossip.comm] Send -> DEBU 30ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 30ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 30ae Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.940 UTC [gossip.comm] sendToEndpoint -> DEBU 30af Exiting" +"2019-04-22 06:17:42.944 UTC [gossip.gossip] handleMessage -> DEBU 30b0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.944 UTC [gossip.gossip] handleMessage -> DEBU 30b1 Exiting" +"2019-04-22 06:17:42.944 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.944 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30b3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:42.945 UTC [gossip.comm] func1 -> DEBU 30b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.945 UTC [gossip.gossip] handleMessage -> DEBU 30b6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.945 UTC [msp.identity] Verify -> DEBU 30b5 Verify: digest = 00000000 0b 9f 05 e3 da 7a 10 f5 68 cd 17 3d cc cf 7c 04 |.....z..h..=..|.| +00000010 71 9b 62 4a 3a 63 51 e2 a7 64 22 1d 7a 0d 5a b3 |q.bJ:cQ..d".z.Z.|" +"2019-04-22 06:17:42.946 UTC [msp.identity] Verify -> DEBU 30b7 Verify: sig = 00000000 30 45 02 21 00 a9 49 8c 99 9a c1 40 cb d8 ae 1f |0E.!..I....@....| +00000010 80 61 2c 36 65 18 f0 68 2a cb 6b 35 ae 3b bd 98 |.a,6e..h*.k5.;..| +00000020 96 53 e1 4f 3d 02 20 35 0b 6c 39 6a d5 17 e0 b1 |.S.O=. 5.l9j....| +00000030 bb 67 38 1e 25 09 58 11 2c 39 03 c1 66 1e 36 30 |.g8.%.X.,9..f.60| +00000040 66 fd 01 d7 24 a8 1a |f...$..|" +"2019-04-22 06:17:42.946 UTC [gossip.discovery] handleAliveMessage -> DEBU 30b8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.946 UTC [gossip.discovery] isSentByMe -> DEBU 30b9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ba Exiting" +"2019-04-22 06:17:42.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bb Exiting" +"2019-04-22 06:17:42.947 UTC [gossip.comm] func1 -> DEBU 30bc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30bd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 30ad Exiting" +"2019-04-22 06:17:42.948 UTC [gossip.gossip] handleMessage -> DEBU 30be Exiting" +"2019-04-22 06:17:42.949 UTC [gossip.gossip] handleMessage -> DEBU 30c0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30bf Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:42.949 UTC [msp.identity] Verify -> DEBU 30c1 Verify: digest = 00000000 0b 9f 05 e3 da 7a 10 f5 68 cd 17 3d cc cf 7c 04 |.....z..h..=..|.| +00000010 71 9b 62 4a 3a 63 51 e2 a7 64 22 1d 7a 0d 5a b3 |q.bJ:cQ..d".z.Z.|" +"2019-04-22 06:17:42.950 UTC [msp.identity] Verify -> DEBU 30c2 Verify: sig = 00000000 30 45 02 21 00 a9 49 8c 99 9a c1 40 cb d8 ae 1f |0E.!..I....@....| +00000010 80 61 2c 36 65 18 f0 68 2a cb 6b 35 ae 3b bd 98 |.a,6e..h*.k5.;..| +00000020 96 53 e1 4f 3d 02 20 35 0b 6c 39 6a d5 17 e0 b1 |.S.O=. 5.l9j....| +00000030 bb 67 38 1e 25 09 58 11 2c 39 03 c1 66 1e 36 30 |.g8.%.X.,9..f.60| +00000040 66 fd 01 d7 24 a8 1a |f...$..|" +"2019-04-22 06:17:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.951 UTC [gossip.discovery] isSentByMe -> DEBU 30c4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 30c5 Exiting" +"2019-04-22 06:17:42.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30c6 Exiting" +"2019-04-22 06:17:42.952 UTC [gossip.gossip] handleMessage -> DEBU 30c7 Exiting" +"2019-04-22 06:17:42.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:42.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 30c9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:42.955 UTC [msp.identity] Verify -> DEBU 30ca Verify: digest = 00000000 0b 9f 05 e3 da 7a 10 f5 68 cd 17 3d cc cf 7c 04 |.....z..h..=..|.| +00000010 71 9b 62 4a 3a 63 51 e2 a7 64 22 1d 7a 0d 5a b3 |q.bJ:cQ..d".z.Z.|" +"2019-04-22 06:17:42.955 UTC [msp.identity] Verify -> DEBU 30cb Verify: sig = 00000000 30 45 02 21 00 a9 49 8c 99 9a c1 40 cb d8 ae 1f |0E.!..I....@....| +00000010 80 61 2c 36 65 18 f0 68 2a cb 6b 35 ae 3b bd 98 |.a,6e..h*.k5.;..| +00000020 96 53 e1 4f 3d 02 20 35 0b 6c 39 6a d5 17 e0 b1 |.S.O=. 5.l9j....| +00000030 bb 67 38 1e 25 09 58 11 2c 39 03 c1 66 1e 36 30 |.g8.%.X.,9..f.60| +00000040 66 fd 01 d7 24 a8 1a |f...$..|" +"2019-04-22 06:17:42.956 UTC [msp.identity] Verify -> DEBU 30cc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:42.957 UTC [msp.identity] Verify -> DEBU 30cd Verify: sig = 00000000 30 45 02 21 00 89 f6 ae 63 da 90 d2 73 62 6e f0 |0E.!....c...sbn.| +00000010 b2 59 0d 4f 59 43 7b f7 c9 a9 f3 48 49 b1 e5 69 |.Y.OYC{....HI..i| +00000020 fb e3 b3 74 ed 02 20 02 d1 5a 79 21 9d 4a cc c4 |...t.. ..Zy!.J..| +00000030 98 60 0a 40 a7 5c 1d 1b 19 4e c1 8b 5f f0 14 a8 |.`.@.\...N.._...| +00000040 9a 17 a2 6e 33 78 1e |...n3x.|" +"2019-04-22 06:17:42.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 30ce Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:42.958 UTC [gossip.discovery] isSentByMe -> DEBU 30cf Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:42.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 30d0 Exiting" +"2019-04-22 06:17:42.959 UTC [gossip.discovery] handleMsgFromComm -> DEBU 30d1 Exiting" +"2019-04-22 06:17:43.045 UTC [endorser] ProcessProposal -> DEBU 30d2 Entering: request from 192.168.224.9:49300" +"2019-04-22 06:17:43.046 UTC [protoutils] ValidateProposalMessage -> DEBU 30d3 ValidateProposalMessage starts for signed proposal 0xc00224cff0" +"2019-04-22 06:17:43.046 UTC [protoutils] validateChannelHeader -> DEBU 30d4 validateChannelHeader info: header type 3" +"2019-04-22 06:17:43.046 UTC [protoutils] checkSignatureFromCreator -> DEBU 30d5 begin" +"2019-04-22 06:17:43.046 UTC [msp] GetManagerForChain -> DEBU 30d6 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:43.046 UTC [protoutils] checkSignatureFromCreator -> DEBU 30d7 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:43.046 UTC [protoutils] checkSignatureFromCreator -> DEBU 30d8 creator is valid" +"2019-04-22 06:17:43.047 UTC [msp.identity] Verify -> DEBU 30d9 Verify: digest = 00000000 d6 14 76 92 e9 44 ac c4 80 39 71 2a 56 e6 fe 2c |..v..D...9q*V..,| +00000010 00 30 76 e1 0b 18 aa b6 96 f4 53 6c 47 36 0e 00 |.0v.......SlG6..|" +"2019-04-22 06:17:43.047 UTC [msp.identity] Verify -> DEBU 30da Verify: sig = 00000000 30 45 02 21 00 cf b7 96 e1 df 6f 4a 86 71 2f a1 |0E.!......oJ.q/.| +00000010 f3 06 13 d3 21 a7 9a 02 e8 c7 9e 4d 17 89 0f a1 |....!......M....| +00000020 03 49 ad 37 7a 02 20 32 e5 90 73 fc 80 fc 6a 22 |.I.7z. 2..s...j"| +00000030 89 85 6c 61 ec be 64 ed 80 3b 0a 80 75 fd 86 db |..la..d..;..u...| +00000040 f8 de 9f ba 2c fa 4f |....,.O|" +"2019-04-22 06:17:43.047 UTC [protoutils] checkSignatureFromCreator -> DEBU 30db exits successfully" +"2019-04-22 06:17:43.048 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30dc validateChaincodeProposalMessage starts for proposal 0xc002609260, header 0xc00224d450" +"2019-04-22 06:17:43.048 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30dd validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:43.048 UTC [endorser] preProcess -> DEBU 30de [businesschannel][1b5e9432] processing txid: 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a" +"2019-04-22 06:17:43.048 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 30df retrieveTransactionByID() - txId = [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +"2019-04-22 06:17:43.048 UTC [aclmgmt] CheckACL -> DEBU 30e0 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:43.048 UTC [aclmgmt] CheckACL -> DEBU 30e1 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:43.048 UTC [policies] Evaluate -> DEBU 30e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:43.048 UTC [policies] Evaluate -> DEBU 30e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:43.049 UTC [policies] Evaluate -> DEBU 30e4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:43.049 UTC [cauthdsl] func1 -> DEBU 30e5 0xc0024d3630 gate 1555913863049435200 evaluation starts" +"2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e6 0xc0024d3630 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e7 0xc0024d3630 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e8 0xc0024d3630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:43.049 UTC [cauthdsl] func2 -> DEBU 30e9 0xc0024d3630 principal evaluation fails" +"2019-04-22 06:17:43.050 UTC [cauthdsl] func1 -> DEBU 30ea 0xc0024d3630 gate 1555913863049435200 evaluation fails" +"2019-04-22 06:17:43.050 UTC [policies] Evaluate -> DEBU 30eb Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:43.050 UTC [policies] Evaluate -> DEBU 30ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:43.050 UTC [policies] Evaluate -> DEBU 30ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:43.051 UTC [cauthdsl] func1 -> DEBU 30ee 0xc0024d3e70 gate 1555913863051004600 evaluation starts" +"2019-04-22 06:17:43.051 UTC [cauthdsl] func2 -> DEBU 30ef 0xc0024d3e70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:43.051 UTC [cauthdsl] func2 -> DEBU 30f0 0xc0024d3e70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:43.051 UTC [cauthdsl] func2 -> DEBU 30f1 0xc0024d3e70 principal matched by identity 0" +"2019-04-22 06:17:43.051 UTC [msp.identity] Verify -> DEBU 30f2 Verify: digest = 00000000 d6 14 76 92 e9 44 ac c4 80 39 71 2a 56 e6 fe 2c |..v..D...9q*V..,| +00000010 00 30 76 e1 0b 18 aa b6 96 f4 53 6c 47 36 0e 00 |.0v.......SlG6..|" +"2019-04-22 06:17:43.052 UTC [msp.identity] Verify -> DEBU 30f3 Verify: sig = 00000000 30 45 02 21 00 cf b7 96 e1 df 6f 4a 86 71 2f a1 |0E.!......oJ.q/.| +00000010 f3 06 13 d3 21 a7 9a 02 e8 c7 9e 4d 17 89 0f a1 |....!......M....| +00000020 03 49 ad 37 7a 02 20 32 e5 90 73 fc 80 fc 6a 22 |.I.7z. 2..s...j"| +00000030 89 85 6c 61 ec be 64 ed 80 3b 0a 80 75 fd 86 db |..la..d..;..u...| +00000040 f8 de 9f ba 2c fa 4f |....,.O|" +"2019-04-22 06:17:43.052 UTC [cauthdsl] func2 -> DEBU 30f4 0xc0024d3e70 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:43.052 UTC [cauthdsl] func1 -> DEBU 30f5 0xc0024d3e70 gate 1555913863051004600 evaluation succeeds" +"2019-04-22 06:17:43.052 UTC [policies] Evaluate -> DEBU 30f6 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:43.052 UTC [policies] Evaluate -> DEBU 30f7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:43.053 UTC [policies] Evaluate -> DEBU 30f8 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:43.053 UTC [policies] Evaluate -> DEBU 30f9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:43.053 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 30fa constructing new tx simulator" +"2019-04-22 06:17:43.053 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 30fb constructing new tx simulator txid = [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +"2019-04-22 06:17:43.053 UTC [endorser] SimulateProposal -> DEBU 30fc [businesschannel][1b5e9432] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:43.053 UTC [stateleveldb] GetState -> DEBU 30fd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:43.054 UTC [endorser] callChaincode -> INFO 30fe [businesschannel][1b5e9432] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:43.054 UTC [stateleveldb] GetState -> DEBU 30ff GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:43.055 UTC [stateleveldb] GetState -> DEBU 3100 GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:43.055 UTC [chaincode] Execute -> DEBU 3101 Entry" +"2019-04-22 06:17:43.056 UTC [chaincode] handleMessage -> DEBU 3102 [1b5e9432] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:43.056 UTC [chaincode] HandleTransaction -> DEBU 3103 [1b5e9432] handling GET_STATE from chaincode" +"2019-04-22 06:17:43.057 UTC [chaincode] HandleGetState -> DEBU 3104 [1b5e9432] getting state for chaincode exp02, key a, channel businesschannel" +"2019-04-22 06:17:43.057 UTC [stateleveldb] GetState -> DEBU 3105 GetState(). ns=exp02, key=a" +"2019-04-22 06:17:43.057 UTC [chaincode] HandleTransaction -> DEBU 3106 [1b5e9432] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:43.058 UTC [chaincode] handleMessage -> DEBU 3107 [1b5e9432] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:43.058 UTC [chaincode] HandleTransaction -> DEBU 3108 [1b5e9432] handling GET_STATE from chaincode" +"2019-04-22 06:17:43.059 UTC [chaincode] HandleGetState -> DEBU 3109 [1b5e9432] getting state for chaincode exp02, key b, channel businesschannel" +"2019-04-22 06:17:43.059 UTC [stateleveldb] GetState -> DEBU 310a GetState(). ns=exp02, key=b" +"2019-04-22 06:17:43.059 UTC [chaincode] HandleTransaction -> DEBU 310b [1b5e9432] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:43.060 UTC [chaincode] handleMessage -> DEBU 310c [1b5e9432] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:17:43.060 UTC [chaincode] HandleTransaction -> DEBU 310d [1b5e9432] handling PUT_STATE from chaincode" +"2019-04-22 06:17:43.061 UTC [chaincode] HandleTransaction -> DEBU 310e [1b5e9432] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:17:43.062 UTC [chaincode] handleMessage -> DEBU 310f [1b5e9432] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:17:43.062 UTC [chaincode] HandleTransaction -> DEBU 3110 [1b5e9432] handling PUT_STATE from chaincode" +"2019-04-22 06:17:43.062 UTC [chaincode] HandleTransaction -> DEBU 3111 [1b5e9432] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:17:43.064 UTC [chaincode] handleMessage -> DEBU 3112 [1b5e9432] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:43.064 UTC [chaincode] Notify -> DEBU 3113 [1b5e9432] notifying Txid:1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, channelID:businesschannel" +"2019-04-22 06:17:43.064 UTC [chaincode] Execute -> DEBU 3114 Exit" +"2019-04-22 06:17:43.064 UTC [endorser] callChaincode -> INFO 3115 [businesschannel][1b5e9432] Exit chaincode: name:"exp02" (10ms)" +"2019-04-22 06:17:43.064 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3116 Simulation completed, getting simulation results" +"2019-04-22 06:17:43.065 UTC [lockbasedtxmgr] Done -> DEBU 3117 Done with transaction simulation / query execution [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +"2019-04-22 06:17:43.065 UTC [endorser] SimulateProposal -> DEBU 3118 [businesschannel][1b5e9432] Exit" +"2019-04-22 06:17:43.066 UTC [endorser] endorseProposal -> DEBU 3119 [businesschannel][1b5e9432] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:43.066 UTC [endorser] endorseProposal -> DEBU 311a [businesschannel][1b5e9432] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:43.066 UTC [endorser] EndorseWithPlugin -> DEBU 311b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, chaincode: exp02}" +"2019-04-22 06:17:43.066 UTC [msp.identity] Sign -> DEBU 311c Sign: plaintext: 0A20209914F07F86B5B5D8DEE92C4C99...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:43.066 UTC [msp.identity] Sign -> DEBU 311d Sign: digest: BAABF0CCC09984755C158322502DF7C5BCC3BD0F116F0600A17215225553BB78 " +"2019-04-22 06:17:43.067 UTC [endorser] EndorseWithPlugin -> DEBU 311e Exiting {plugin: escc, channel: businesschannel, tx: 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, chaincode: exp02}" +"2019-04-22 06:17:43.067 UTC [endorser] endorseProposal -> DEBU 311f [businesschannel][1b5e9432] Exit" +"2019-04-22 06:17:43.067 UTC [lockbasedtxmgr] Done -> DEBU 3120 Done with transaction simulation / query execution [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +"2019-04-22 06:17:43.067 UTC [endorser] func1 -> DEBU 3121 Exit: request from 192.168.224.9:49300" +"2019-04-22 06:17:43.067 UTC [comm.grpc.server] 1 -> INFO 3122 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49300 grpc.code=OK grpc.call_duration=22.2728ms +"2019-04-22 06:17:43.082 UTC [grpc] infof -> DEBU 3123 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:43.083 UTC [grpc] infof -> DEBU 3124 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:43.138 UTC [gossip.comm] func1 -> DEBU 3125 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.139 UTC [gossip.gossip] handleMessage -> DEBU 3126 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.139 UTC [gossip.pull] HandleMessage -> DEBU 3127 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.140 UTC [gossip.pull] SendDigest -> DEBU 3128 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:43.140 UTC [gossip.gossip] handleMessage -> DEBU 3129 Exiting" +"2019-04-22 06:17:43.159 UTC [gossip.comm] func1 -> DEBU 312a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.159 UTC [gossip.gossip] handleMessage -> DEBU 312b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.159 UTC [gossip.gossip] handleMessage -> DEBU 312c Exiting" +"2019-04-22 06:17:43.159 UTC [gossip.discovery] handleMsgFromComm -> DEBU 312d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.160 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 312e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:43.160 UTC [msp.identity] Verify -> DEBU 312f Verify: digest = 00000000 c4 8d 78 67 33 2d 7a 2f f6 52 42 7d e9 34 c5 02 |..xg3-z/.RB}.4..| +00000010 ab 84 d6 5c 89 03 84 c2 bd fe 2e 4d 67 6c 98 2d |...\.......Mgl.-|" +"2019-04-22 06:17:43.161 UTC [msp.identity] Verify -> DEBU 3130 Verify: sig = 00000000 30 45 02 21 00 e6 dc 8b 25 41 3d 30 b8 2d 1b 05 |0E.!....%A=0.-..| +00000010 76 24 b3 0b 81 f0 ea 11 e4 2d 49 d4 8e 57 b4 c1 |v$.......-I..W..| +00000020 41 74 54 b6 8b 02 20 76 bb 4f 93 ea a9 ee ca 0d |AtT... v.O......| +00000030 de de 58 00 2c 0c c3 f1 05 58 01 4e f4 eb c8 4d |..X.,....X.N...M| +00000040 6e 79 84 12 e3 b6 90 |ny.....|" +"2019-04-22 06:17:43.162 UTC [msp.identity] Verify -> DEBU 3131 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:43.162 UTC [msp.identity] Verify -> DEBU 3132 Verify: sig = 00000000 30 44 02 20 11 ae 6d e8 a7 84 22 83 ad fe 9b c4 |0D. ..m...".....| +00000010 ad 01 5a 0d d6 6e de 4b e0 94 86 83 ca e1 37 6d |..Z..n.K......7m| +00000020 ea 8a 57 00 02 20 58 73 1a f7 d9 46 cf 49 9b a8 |..W.. Xs...F.I..| +00000030 3c dd 04 c4 c6 4d ad 45 b3 58 a9 ff 3a 37 c7 5e |<....M.E.X..:7.^| +00000040 2a e7 9e fc b8 3c |*....<|" +"2019-04-22 06:17:43.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3133 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:43.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3134 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:43.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3135 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 " +"2019-04-22 06:17:43.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 3136 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 " +"2019-04-22 06:17:43.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 3137 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:43.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 3138 Exiting" +"2019-04-22 06:17:43.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 3139 Exiting" +"2019-04-22 06:17:43.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 313a Exiting" +"2019-04-22 06:17:43.165 UTC [gossip.discovery] sendMemResponse -> DEBU 313b Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:43.165 UTC [msp] DeserializeIdentity -> DEBU 313c Obtaining identity" +"2019-04-22 06:17:43.165 UTC [msp] DeserializeIdentity -> DEBU 313d Obtaining identity" +"2019-04-22 06:17:43.166 UTC [gossip.comm] Send -> DEBU 313e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:43.166 UTC [gossip.discovery] sendMemResponse -> DEBU 313f Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:43.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3140 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3141 Exiting" +"2019-04-22 06:17:43.295 UTC [endorser] ProcessProposal -> DEBU 3142 Entering: request from 192.168.224.9:49306" +"2019-04-22 06:17:43.295 UTC [protoutils] ValidateProposalMessage -> DEBU 3143 ValidateProposalMessage starts for signed proposal 0xc0023022d0" +"2019-04-22 06:17:43.295 UTC [protoutils] validateChannelHeader -> DEBU 3144 validateChannelHeader info: header type 3" +"2019-04-22 06:17:43.295 UTC [protoutils] checkSignatureFromCreator -> DEBU 3145 begin" +"2019-04-22 06:17:43.295 UTC [msp] GetManagerForChain -> DEBU 3146 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:43.296 UTC [protoutils] checkSignatureFromCreator -> DEBU 3147 creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-04-22 06:17:43.296 UTC [protoutils] checkSignatureFromCreator -> DEBU 3148 creator is valid" +"2019-04-22 06:17:43.296 UTC [msp.identity] Verify -> DEBU 3149 Verify: digest = 00000000 03 65 4e dd 86 2f c9 b3 c2 49 1a cf ca 09 97 97 |.eN../...I......| +00000010 85 ac 79 5e 00 ea 77 b4 fc 3b 35 00 6a d8 26 68 |..y^..w..;5.j.&h|" +"2019-04-22 06:17:43.297 UTC [msp.identity] Verify -> DEBU 314a Verify: sig = 00000000 30 44 02 20 29 9a 0a 99 dc a4 38 61 ed 1c 56 21 |0D. ).....8a..V!| +00000010 fa f2 8d 8c 0a 34 30 c1 36 43 00 f8 85 6c 4e 57 |.....40.6C...lNW| +00000020 75 8b 50 5e 02 20 46 ca 67 f6 1e 52 00 a9 f5 fc |u.P^. F.g..R....| +00000030 aa ba 46 e7 a3 d1 6e b5 62 4f 45 3b b1 d3 e5 fc |..F...n.bOE;....| +00000040 44 b3 6b 32 86 cf |D.k2..|" +"2019-04-22 06:17:43.297 UTC [protoutils] checkSignatureFromCreator -> DEBU 314b exits successfully" +"2019-04-22 06:17:43.297 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 314c validateChaincodeProposalMessage starts for proposal 0xc002609ab0, header 0xc0023026e0" +"2019-04-22 06:17:43.298 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 314d validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:43.298 UTC [endorser] preProcess -> DEBU 314e [businesschannel][482c2518] processing txid: 482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b" +"2019-04-22 06:17:43.298 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 314f retrieveTransactionByID() - txId = [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +"2019-04-22 06:17:43.298 UTC [aclmgmt] CheckACL -> DEBU 3150 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:43.298 UTC [aclmgmt] CheckACL -> DEBU 3151 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:43.299 UTC [policies] Evaluate -> DEBU 3152 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:43.299 UTC [policies] Evaluate -> DEBU 3153 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:43.299 UTC [policies] Evaluate -> DEBU 3154 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:43.299 UTC [cauthdsl] func1 -> DEBU 3155 0xc0026657e0 gate 1555913863299601200 evaluation starts" +"2019-04-22 06:17:43.299 UTC [cauthdsl] func2 -> DEBU 3156 0xc0026657e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:43.300 UTC [cauthdsl] func2 -> DEBU 3157 0xc0026657e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:43.300 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3158 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:17:43.300 UTC [msp] Validate -> DEBU 3159 MSP Org2MSP validating identity" +"2019-04-22 06:17:43.300 UTC [msp] getCertificationChain -> DEBU 315a MSP Org2MSP getting certification chain" +"2019-04-22 06:17:43.301 UTC [cauthdsl] func2 -> DEBU 315b 0xc0026657e0 principal matched by identity 0" +"2019-04-22 06:17:43.301 UTC [msp.identity] Verify -> DEBU 315c Verify: digest = 00000000 03 65 4e dd 86 2f c9 b3 c2 49 1a cf ca 09 97 97 |.eN../...I......| +00000010 85 ac 79 5e 00 ea 77 b4 fc 3b 35 00 6a d8 26 68 |..y^..w..;5.j.&h|" +"2019-04-22 06:17:43.301 UTC [msp.identity] Verify -> DEBU 315d Verify: sig = 00000000 30 44 02 20 29 9a 0a 99 dc a4 38 61 ed 1c 56 21 |0D. ).....8a..V!| +00000010 fa f2 8d 8c 0a 34 30 c1 36 43 00 f8 85 6c 4e 57 |.....40.6C...lNW| +00000020 75 8b 50 5e 02 20 46 ca 67 f6 1e 52 00 a9 f5 fc |u.P^. F.g..R....| +00000030 aa ba 46 e7 a3 d1 6e b5 62 4f 45 3b b1 d3 e5 fc |..F...n.bOE;....| +00000040 44 b3 6b 32 86 cf |D.k2..|" +"2019-04-22 06:17:43.302 UTC [cauthdsl] func2 -> DEBU 315e 0xc0026657e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:43.302 UTC [cauthdsl] func1 -> DEBU 315f 0xc0026657e0 gate 1555913863299601200 evaluation succeeds" +"2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3160 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3161 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3162 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:43.302 UTC [policies] Evaluate -> DEBU 3163 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:43.303 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3164 constructing new tx simulator" +"2019-04-22 06:17:43.303 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3165 constructing new tx simulator txid = [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +"2019-04-22 06:17:43.303 UTC [endorser] SimulateProposal -> DEBU 3166 [businesschannel][482c2518] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:43.303 UTC [stateleveldb] GetState -> DEBU 3167 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:43.304 UTC [endorser] callChaincode -> INFO 3168 [businesschannel][482c2518] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:43.304 UTC [stateleveldb] GetState -> DEBU 3169 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:43.304 UTC [stateleveldb] GetState -> DEBU 316a GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:43.305 UTC [chaincode] Execute -> DEBU 316b Entry" +"2019-04-22 06:17:43.306 UTC [chaincode] handleMessage -> DEBU 316c [482c2518] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:43.306 UTC [chaincode] HandleTransaction -> DEBU 316d [482c2518] handling GET_STATE from chaincode" +"2019-04-22 06:17:43.307 UTC [chaincode] HandleGetState -> DEBU 316e [482c2518] getting state for chaincode exp02, key a, channel businesschannel" +"2019-04-22 06:17:43.307 UTC [stateleveldb] GetState -> DEBU 316f GetState(). ns=exp02, key=a" +"2019-04-22 06:17:43.307 UTC [chaincode] HandleTransaction -> DEBU 3170 [482c2518] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:43.308 UTC [chaincode] handleMessage -> DEBU 3171 [482c2518] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:43.308 UTC [chaincode] Notify -> DEBU 3172 [482c2518] notifying Txid:482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b, channelID:businesschannel" +"2019-04-22 06:17:43.309 UTC [chaincode] Execute -> DEBU 3173 Exit" +"2019-04-22 06:17:43.309 UTC [endorser] callChaincode -> INFO 3174 [businesschannel][482c2518] Exit chaincode: name:"exp02" (5ms)" +"2019-04-22 06:17:43.309 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3175 Simulation completed, getting simulation results" +"2019-04-22 06:17:43.310 UTC [lockbasedtxmgr] Done -> DEBU 3176 Done with transaction simulation / query execution [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +"2019-04-22 06:17:43.310 UTC [endorser] SimulateProposal -> DEBU 3177 [businesschannel][482c2518] Exit" +"2019-04-22 06:17:43.310 UTC [endorser] endorseProposal -> DEBU 3178 [businesschannel][482c2518] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:43.310 UTC [endorser] endorseProposal -> DEBU 3179 [businesschannel][482c2518] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:43.310 UTC [endorser] EndorseWithPlugin -> DEBU 317a Entering endorsement for {plugin: escc, channel: businesschannel, tx: 482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b, chaincode: exp02}" +"2019-04-22 06:17:43.310 UTC [msp.identity] Sign -> DEBU 317b Sign: plaintext: 0A201D2092FBC4647FC53411571FD381...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:43.311 UTC [msp.identity] Sign -> DEBU 317c Sign: digest: D7E7D9E5AAF8784BA38B3D625301A724F15968F9CA95B74C3051EB113D921975 " +"2019-04-22 06:17:43.311 UTC [endorser] EndorseWithPlugin -> DEBU 317d Exiting {plugin: escc, channel: businesschannel, tx: 482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b, chaincode: exp02}" +"2019-04-22 06:17:43.311 UTC [endorser] endorseProposal -> DEBU 317e [businesschannel][482c2518] Exit" +"2019-04-22 06:17:43.311 UTC [lockbasedtxmgr] Done -> DEBU 317f Done with transaction simulation / query execution [482c2518a9287f3474cf85d5844722d0379daf6e8723bcfde38da9a79aa9b62b]" +"2019-04-22 06:17:43.312 UTC [endorser] func1 -> DEBU 3180 Exit: request from 192.168.224.9:49306" +"2019-04-22 06:17:43.312 UTC [comm.grpc.server] 1 -> INFO 3181 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49306 grpc.code=OK grpc.call_duration=17.7781ms +"2019-04-22 06:17:43.316 UTC [grpc] warningf -> DEBU 3182 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49306: read: connection reset by peer" +"2019-04-22 06:17:43.316 UTC [grpc] infof -> DEBU 3183 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:43.317 UTC [grpc] infof -> DEBU 3184 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:43.604 UTC [gossip.comm] func1 -> DEBU 3185 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.605 UTC [gossip.gossip] handleMessage -> DEBU 3186 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.606 UTC [gossip.pull] HandleMessage -> DEBU 3187 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.606 UTC [msp] DeserializeIdentity -> DEBU 3188 Obtaining identity" +"2019-04-22 06:17:43.606 UTC [msp] DeserializeIdentity -> DEBU 3189 Obtaining identity" +"2019-04-22 06:17:43.606 UTC [msp] DeserializeIdentity -> DEBU 318a Obtaining identity" +"2019-04-22 06:17:43.607 UTC [msp] DeserializeIdentity -> DEBU 318b Obtaining identity" +"2019-04-22 06:17:43.607 UTC [msp] DeserializeIdentity -> DEBU 318c Obtaining identity" +"2019-04-22 06:17:43.608 UTC [msp] DeserializeIdentity -> DEBU 318d Obtaining identity" +"2019-04-22 06:17:43.608 UTC [gossip.pull] SendDigest -> DEBU 318e Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:43.610 UTC [gossip.gossip] handleMessage -> DEBU 318f Exiting" +"2019-04-22 06:17:43.638 UTC [gossip.comm] func1 -> DEBU 3190 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.639 UTC [gossip.gossip] handleMessage -> DEBU 3191 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.639 UTC [gossip.gossip] handleMessage -> DEBU 3192 Exiting" +"2019-04-22 06:17:43.640 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3193 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.640 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3194 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:43.640 UTC [msp] DeserializeIdentity -> DEBU 3195 Obtaining identity" +"2019-04-22 06:17:43.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3196 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:43.642 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3197 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:43.642 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3198 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:43.642 UTC [policies] Evaluate -> DEBU 3199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:43.643 UTC [policies] Evaluate -> DEBU 319a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:43.643 UTC [policies] Evaluate -> DEBU 319b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:43.644 UTC [cauthdsl] func1 -> DEBU 319c 0xc0026dd530 gate 1555913863644144900 evaluation starts" +"2019-04-22 06:17:43.644 UTC [cauthdsl] func2 -> DEBU 319d 0xc0026dd530 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:43.644 UTC [cauthdsl] func2 -> DEBU 319e 0xc0026dd530 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:43.645 UTC [cauthdsl] func2 -> DEBU 319f 0xc0026dd530 principal matched by identity 0" +"2019-04-22 06:17:43.645 UTC [msp.identity] Verify -> DEBU 31a0 Verify: digest = 00000000 44 2d 06 d8 5f d4 3e fa e6 5e be 2d 46 62 ee 0d |D-.._.>..^.-Fb..| +00000010 a8 85 b4 7e e0 a2 c9 bd 04 8b 1b 83 16 8d 7a 81 |...~..........z.|" +"2019-04-22 06:17:43.646 UTC [msp.identity] Verify -> DEBU 31a1 Verify: sig = 00000000 30 44 02 20 32 b8 82 5c 2a bf 80 30 06 17 39 d5 |0D. 2..\*..0..9.| +00000010 2b 43 fa 48 4a dc 41 ef 21 c6 9b ce 38 d0 b8 b6 |+C.HJ.A.!...8...| +00000020 21 df ed 12 02 20 2b b0 3a 78 a6 a0 67 9f 28 25 |!.... +.:x..g.(%| +00000030 9f 67 00 32 dc d8 92 be 77 47 40 f5 fe 32 21 72 |.g.2....wG@..2!r| +00000040 32 d1 d9 ba 5c 6c |2...\l|" +"2019-04-22 06:17:43.647 UTC [cauthdsl] func2 -> DEBU 31a2 0xc0026dd530 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:43.647 UTC [cauthdsl] func1 -> DEBU 31a3 0xc0026dd530 gate 1555913863644144900 evaluation succeeds" +"2019-04-22 06:17:43.647 UTC [policies] Evaluate -> DEBU 31a4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:43.648 UTC [policies] Evaluate -> DEBU 31a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:43.648 UTC [policies] Evaluate -> DEBU 31a6 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:43.649 UTC [policies] Evaluate -> DEBU 31a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:43.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 31a8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:43.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 31a9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:43.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 31aa updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 " +"2019-04-22 06:17:43.650 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ab Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 " +"2019-04-22 06:17:43.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ac Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:43.651 UTC [gossip.discovery] learnExistingMembers -> DEBU 31ad Exiting" +"2019-04-22 06:17:43.651 UTC [gossip.discovery] handleAliveMessage -> DEBU 31ae Exiting" +"2019-04-22 06:17:43.652 UTC [gossip.discovery] sendMemResponse -> DEBU 31af Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:43.652 UTC [msp] DeserializeIdentity -> DEBU 31b0 Obtaining identity" +"2019-04-22 06:17:43.652 UTC [msp] DeserializeIdentity -> DEBU 31b1 Obtaining identity" +"2019-04-22 06:17:43.653 UTC [msp] DeserializeIdentity -> DEBU 31b2 Obtaining identity" +"2019-04-22 06:17:43.653 UTC [gossip.comm] Send -> DEBU 31b3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:43.654 UTC [gossip.discovery] sendMemResponse -> DEBU 31b4 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:43.654 UTC [gossip.comm] sendToEndpoint -> DEBU 31b5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:43.654 UTC [gossip.comm] sendToEndpoint -> DEBU 31b6 Exiting" +"2019-04-22 06:17:43.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31b7 Exiting" +"2019-04-22 06:17:44.020 UTC [gossip.gossip] handleMessage -> DEBU 31b8 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.020 UTC [gossip.pull] HandleMessage -> DEBU 31b9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.020 UTC [msp] DeserializeIdentity -> DEBU 31ba Obtaining identity" +"2019-04-22 06:17:44.021 UTC [msp] DeserializeIdentity -> DEBU 31bb Obtaining identity" +"2019-04-22 06:17:44.022 UTC [msp] DeserializeIdentity -> DEBU 31bc Obtaining identity" +"2019-04-22 06:17:44.023 UTC [msp] DeserializeIdentity -> DEBU 31bd Obtaining identity" +"2019-04-22 06:17:44.023 UTC [msp] DeserializeIdentity -> DEBU 31be Obtaining identity" +"2019-04-22 06:17:44.024 UTC [msp] DeserializeIdentity -> DEBU 31bf Obtaining identity" +"2019-04-22 06:17:44.024 UTC [gossip.pull] SendDigest -> DEBU 31c0 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:44.024 UTC [gossip.gossip] handleMessage -> DEBU 31c1 Exiting" +"2019-04-22 06:17:44.039 UTC [gossip.gossip] handleMessage -> DEBU 31c2 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.040 UTC [gossip.gossip] handleMessage -> DEBU 31c3 Exiting" +"2019-04-22 06:17:44.040 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31c4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.040 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 31c5 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:44.041 UTC [msp] DeserializeIdentity -> DEBU 31c6 Obtaining identity" +"2019-04-22 06:17:44.041 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31c7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:44.041 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31c8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.042 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31c9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.042 UTC [policies] Evaluate -> DEBU 31ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:44.042 UTC [policies] Evaluate -> DEBU 31cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:44.042 UTC [policies] Evaluate -> DEBU 31cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:44.043 UTC [cauthdsl] func1 -> DEBU 31cd 0xc002769c30 gate 1555913864042998900 evaluation starts" +"2019-04-22 06:17:44.043 UTC [cauthdsl] func2 -> DEBU 31ce 0xc002769c30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:44.043 UTC [cauthdsl] func2 -> DEBU 31cf 0xc002769c30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:44.043 UTC [cauthdsl] func2 -> DEBU 31d0 0xc002769c30 principal matched by identity 0" +"2019-04-22 06:17:44.044 UTC [msp.identity] Verify -> DEBU 31d1 Verify: digest = 00000000 c5 03 28 5b b1 c4 79 e0 6e 5b 64 2a a2 b1 91 97 |..([..y.n[d*....| +00000010 04 89 f4 9a b4 7a 81 d9 37 d4 a3 5e a7 ac e7 a2 |.....z..7..^....|" +"2019-04-22 06:17:44.044 UTC [msp.identity] Verify -> DEBU 31d2 Verify: sig = 00000000 30 45 02 21 00 81 4b 28 ef fa d2 54 5f 3d 89 29 |0E.!..K(...T_=.)| +00000010 ba c9 ac 9e bc 84 0c 75 02 79 e5 96 bd c4 d0 50 |.......u.y.....P| +00000020 2b 4d b8 41 18 02 20 78 47 10 cb 00 bd 99 f8 c4 |+M.A.. xG.......| +00000030 44 89 b4 01 43 75 f1 d3 93 8d b6 71 e6 f8 72 d3 |D...Cu.....q..r.| +00000040 6c 26 a0 92 57 dd 70 |l&..W.p|" +"2019-04-22 06:17:44.045 UTC [cauthdsl] func2 -> DEBU 31d3 0xc002769c30 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:44.045 UTC [cauthdsl] func1 -> DEBU 31d4 0xc002769c30 gate 1555913864042998900 evaluation succeeds" +"2019-04-22 06:17:44.045 UTC [policies] Evaluate -> DEBU 31d5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.045 UTC [policies] Evaluate -> DEBU 31d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.046 UTC [policies] Evaluate -> DEBU 31d7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:44.046 UTC [policies] Evaluate -> DEBU 31d8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:44.047 UTC [gossip.discovery] handleAliveMessage -> DEBU 31d9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:44.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 31da Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:44.047 UTC [gossip.discovery] learnExistingMembers -> DEBU 31db updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 " +"2019-04-22 06:17:44.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 31dc Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 " +"2019-04-22 06:17:44.048 UTC [gossip.discovery] learnExistingMembers -> DEBU 31dd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:42 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:44.049 UTC [gossip.discovery] learnExistingMembers -> DEBU 31de Exiting" +"2019-04-22 06:17:44.049 UTC [gossip.discovery] handleAliveMessage -> DEBU 31df Exiting" +"2019-04-22 06:17:44.050 UTC [gossip.discovery] sendMemResponse -> DEBU 31e0 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:44.050 UTC [msp] DeserializeIdentity -> DEBU 31e1 Obtaining identity" +"2019-04-22 06:17:44.051 UTC [msp] DeserializeIdentity -> DEBU 31e2 Obtaining identity" +"2019-04-22 06:17:44.051 UTC [msp] DeserializeIdentity -> DEBU 31e3 Obtaining identity" +"2019-04-22 06:17:44.052 UTC [gossip.comm] Send -> DEBU 31e4 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:44.052 UTC [gossip.discovery] sendMemResponse -> DEBU 31e5 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:44.053 UTC [gossip.comm] sendToEndpoint -> DEBU 31e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.053 UTC [gossip.comm] sendToEndpoint -> DEBU 31e7 Exiting" +"2019-04-22 06:17:44.049 UTC [gossip.discovery] handleMsgFromComm -> DEBU 31e8 Exiting" +"2019-04-22 06:17:44.389 UTC [msp] DeserializeIdentity -> DEBU 31e9 Obtaining identity" +"2019-04-22 06:17:44.389 UTC [msp] DeserializeIdentity -> DEBU 31ea Obtaining identity" +"2019-04-22 06:17:44.389 UTC [gossip.comm] Send -> DEBU 31eb Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ef Exiting" +"2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31f0 Exiting" +"2019-04-22 06:17:44.390 UTC [gossip.comm] sendToEndpoint -> DEBU 31ed Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.391 UTC [gossip.comm] sendToEndpoint -> DEBU 31f1 Exiting" +"2019-04-22 06:17:44.393 UTC [gossip.comm] func1 -> DEBU 31f2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.394 UTC [gossip.gossip] handleMessage -> DEBU 31f3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.394 UTC [msp.identity] Verify -> DEBU 31f4 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:44.394 UTC [msp.identity] Verify -> DEBU 31f5 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:44.395 UTC [msp.identity] Verify -> DEBU 31f6 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +"2019-04-22 06:17:44.395 UTC [msp.identity] Verify -> DEBU 31f7 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +00000040 8d f6 86 08 00 13 |......|" +"2019-04-22 06:17:44.396 UTC [msp] DeserializeIdentity -> DEBU 31f8 Obtaining identity" +"2019-04-22 06:17:44.396 UTC [msp] DeserializeIdentity -> DEBU 31f9 Obtaining identity" +"2019-04-22 06:17:44.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31fa Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:44.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31fb Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31fc Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.397 UTC [policies] Evaluate -> DEBU 31fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:44.397 UTC [policies] Evaluate -> DEBU 31fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:44.397 UTC [policies] Evaluate -> DEBU 31ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:44.400 UTC [cauthdsl] func1 -> DEBU 3200 0xc002e79380 gate 1555913864400169200 evaluation starts" +"2019-04-22 06:17:44.400 UTC [cauthdsl] func2 -> DEBU 3201 0xc002e79380 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:44.400 UTC [cauthdsl] func2 -> DEBU 3202 0xc002e79380 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:44.401 UTC [cauthdsl] func2 -> DEBU 3203 0xc002e79380 principal matched by identity 0" +"2019-04-22 06:17:44.401 UTC [msp.identity] Verify -> DEBU 3204 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:44.403 UTC [msp.identity] Verify -> DEBU 3205 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:44.403 UTC [cauthdsl] func2 -> DEBU 3206 0xc002e79380 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:44.403 UTC [cauthdsl] func1 -> DEBU 3207 0xc002e79380 gate 1555913864400169200 evaluation succeeds" +"2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 3208 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 3209 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 320a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:44.404 UTC [policies] Evaluate -> DEBU 320b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:44.406 UTC [gossip.comm] func1 -> DEBU 320c Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.404 UTC [msp] DeserializeIdentity -> DEBU 320d Obtaining identity" +"2019-04-22 06:17:44.407 UTC [msp] DeserializeIdentity -> DEBU 320e Obtaining identity" +"2019-04-22 06:17:44.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 320f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:44.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3210 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3211 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.408 UTC [policies] Evaluate -> DEBU 3212 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:44.408 UTC [policies] Evaluate -> DEBU 3213 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:44.408 UTC [policies] Evaluate -> DEBU 3214 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:44.408 UTC [cauthdsl] func1 -> DEBU 3215 0xc002ec0b70 gate 1555913864408895400 evaluation starts" +"2019-04-22 06:17:44.408 UTC [cauthdsl] func2 -> DEBU 3216 0xc002ec0b70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:44.409 UTC [cauthdsl] func2 -> DEBU 3217 0xc002ec0b70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:44.409 UTC [cauthdsl] func2 -> DEBU 3218 0xc002ec0b70 principal matched by identity 0" +"2019-04-22 06:17:44.409 UTC [msp.identity] Verify -> DEBU 3219 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:44.410 UTC [msp.identity] Verify -> DEBU 321a Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 321b 0xc002ec0b70 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:44.411 UTC [cauthdsl] func1 -> DEBU 321c 0xc002ec0b70 gate 1555913864408895400 evaluation succeeds" +"2019-04-22 06:17:44.411 UTC [policies] Evaluate -> DEBU 321d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.411 UTC [policies] Evaluate -> DEBU 321e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.412 UTC [policies] Evaluate -> DEBU 321f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:44.412 UTC [policies] Evaluate -> DEBU 3220 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:44.412 UTC [gossip.gossip] handleMessage -> DEBU 3221 Exiting" +"2019-04-22 06:17:44.412 UTC [gossip.gossip] handleMessage -> DEBU 3222 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.413 UTC [msp] DeserializeIdentity -> DEBU 3223 Obtaining identity" +"2019-04-22 06:17:44.413 UTC [msp] DeserializeIdentity -> DEBU 3224 Obtaining identity" +"2019-04-22 06:17:44.414 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" +"2019-04-22 06:17:44.414 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3226 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:44.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3227 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3228 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.415 UTC [policies] Evaluate -> DEBU 3229 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:44.416 UTC [policies] Evaluate -> DEBU 322a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:44.416 UTC [policies] Evaluate -> DEBU 322b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:44.417 UTC [cauthdsl] func1 -> DEBU 322c 0xc002ee4750 gate 1555913864417037000 evaluation starts" +"2019-04-22 06:17:44.417 UTC [cauthdsl] func2 -> DEBU 322d 0xc002ee4750 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:44.417 UTC [cauthdsl] func2 -> DEBU 322e 0xc002ee4750 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:44.417 UTC [cauthdsl] func2 -> DEBU 322f 0xc002ee4750 principal matched by identity 0" +"2019-04-22 06:17:44.417 UTC [msp.identity] Verify -> DEBU 3230 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:44.418 UTC [msp.identity] Verify -> DEBU 3231 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:44.418 UTC [cauthdsl] func2 -> DEBU 3232 0xc002ee4750 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:44.418 UTC [cauthdsl] func1 -> DEBU 3233 0xc002ee4750 gate 1555913864417037000 evaluation succeeds" +"2019-04-22 06:17:44.418 UTC [policies] Evaluate -> DEBU 3234 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.418 UTC [policies] Evaluate -> DEBU 3235 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.419 UTC [policies] Evaluate -> DEBU 3236 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:44.419 UTC [policies] Evaluate -> DEBU 3237 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:44.420 UTC [msp.identity] Verify -> DEBU 3238 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +"2019-04-22 06:17:44.420 UTC [msp.identity] Verify -> DEBU 3239 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +00000040 8d f6 86 08 00 13 |......|" +"2019-04-22 06:17:44.421 UTC [msp.identity] Verify -> DEBU 323a Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:44.421 UTC [msp.identity] Verify -> DEBU 323b Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:44.422 UTC [msp] DeserializeIdentity -> DEBU 323c Obtaining identity" +"2019-04-22 06:17:44.422 UTC [msp] DeserializeIdentity -> DEBU 323d Obtaining identity" +"2019-04-22 06:17:44.422 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 323e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:44.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 323f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3240 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.422 UTC [policies] Evaluate -> DEBU 3241 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:44.423 UTC [policies] Evaluate -> DEBU 3242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:44.423 UTC [policies] Evaluate -> DEBU 3243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:44.423 UTC [cauthdsl] func1 -> DEBU 3244 0xc002efad60 gate 1555913864423594500 evaluation starts" +"2019-04-22 06:17:44.424 UTC [cauthdsl] func2 -> DEBU 3245 0xc002efad60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:44.424 UTC [cauthdsl] func2 -> DEBU 3246 0xc002efad60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:44.424 UTC [cauthdsl] func2 -> DEBU 3247 0xc002efad60 principal matched by identity 0" +"2019-04-22 06:17:44.424 UTC [msp.identity] Verify -> DEBU 3248 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:44.424 UTC [msp.identity] Verify -> DEBU 3249 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 324a 0xc002efad60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:44.425 UTC [cauthdsl] func1 -> DEBU 324b 0xc002efad60 gate 1555913864423594500 evaluation succeeds" +"2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:44.425 UTC [policies] Evaluate -> DEBU 324f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:44.425 UTC [gossip.gossip] handleMessage -> DEBU 3250 Exiting" +"2019-04-22 06:17:44.425 UTC [gossip.gossip] handleMessage -> DEBU 3251 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.425 UTC [msp] DeserializeIdentity -> DEBU 3252 Obtaining identity" +"2019-04-22 06:17:44.426 UTC [msp] DeserializeIdentity -> DEBU 3253 Obtaining identity" +"2019-04-22 06:17:44.427 UTC [msp] DeserializeIdentity -> DEBU 3254 Obtaining identity" +"2019-04-22 06:17:44.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3255 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:44.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3256 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3257 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.427 UTC [policies] Evaluate -> DEBU 3258 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:44.428 UTC [policies] Evaluate -> DEBU 3259 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:44.428 UTC [policies] Evaluate -> DEBU 325a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:44.428 UTC [cauthdsl] func1 -> DEBU 325b 0xc002f008a0 gate 1555913864428301200 evaluation starts" +"2019-04-22 06:17:44.428 UTC [cauthdsl] func2 -> DEBU 325c 0xc002f008a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:44.428 UTC [cauthdsl] func2 -> DEBU 325d 0xc002f008a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:44.428 UTC [cauthdsl] func2 -> DEBU 325e 0xc002f008a0 principal matched by identity 0" +"2019-04-22 06:17:44.428 UTC [msp.identity] Verify -> DEBU 325f Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:44.429 UTC [msp.identity] Verify -> DEBU 3260 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 3261 0xc002f008a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:44.429 UTC [cauthdsl] func1 -> DEBU 3262 0xc002f008a0 gate 1555913864428301200 evaluation succeeds" +"2019-04-22 06:17:44.429 UTC [policies] Evaluate -> DEBU 3263 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.429 UTC [policies] Evaluate -> DEBU 3264 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.429 UTC [policies] Evaluate -> DEBU 3265 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:44.430 UTC [policies] Evaluate -> DEBU 3266 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 3267 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +"2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 3268 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +00000040 8d f6 86 08 00 13 |......|" +"2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 3269 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:44.431 UTC [msp.identity] Verify -> DEBU 326a Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:44.432 UTC [msp] DeserializeIdentity -> DEBU 326b Obtaining identity" +"2019-04-22 06:17:44.432 UTC [msp] DeserializeIdentity -> DEBU 326c Obtaining identity" +"2019-04-22 06:17:44.432 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 326d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:44.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326e Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.432 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 326f Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:44.432 UTC [policies] Evaluate -> DEBU 3270 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:44.432 UTC [policies] Evaluate -> DEBU 3271 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:44.433 UTC [policies] Evaluate -> DEBU 3272 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:44.433 UTC [cauthdsl] func1 -> DEBU 3273 0xc002f45050 gate 1555913864433551200 evaluation starts" +"2019-04-22 06:17:44.433 UTC [cauthdsl] func2 -> DEBU 3274 0xc002f45050 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:44.433 UTC [cauthdsl] func2 -> DEBU 3275 0xc002f45050 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:44.433 UTC [cauthdsl] func2 -> DEBU 3276 0xc002f45050 principal matched by identity 0" +"2019-04-22 06:17:44.433 UTC [msp.identity] Verify -> DEBU 3277 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:44.434 UTC [msp.identity] Verify -> DEBU 3278 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:44.434 UTC [cauthdsl] func2 -> DEBU 3279 0xc002f45050 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:44.434 UTC [cauthdsl] func1 -> DEBU 327a 0xc002f45050 gate 1555913864433551200 evaluation succeeds" +"2019-04-22 06:17:44.434 UTC [policies] Evaluate -> DEBU 327b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.434 UTC [policies] Evaluate -> DEBU 327c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:44.435 UTC [policies] Evaluate -> DEBU 327d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:44.435 UTC [policies] Evaluate -> DEBU 327e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:44.435 UTC [gossip.gossip] handleMessage -> DEBU 327f Exiting" +"2019-04-22 06:17:44.496 UTC [msp] DeserializeIdentity -> DEBU 3280 Obtaining identity" +"2019-04-22 06:17:44.496 UTC [msp] DeserializeIdentity -> DEBU 3281 Obtaining identity" +"2019-04-22 06:17:44.497 UTC [gossip.pull] Hello -> DEBU 3282 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:44.498 UTC [msp] DeserializeIdentity -> DEBU 3283 Obtaining identity" +"2019-04-22 06:17:44.499 UTC [msp] DeserializeIdentity -> DEBU 3284 Obtaining identity" +"2019-04-22 06:17:44.499 UTC [gossip.comm] Send -> DEBU 3285 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:44.500 UTC [gossip.comm] sendToEndpoint -> DEBU 3286 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.500 UTC [gossip.comm] sendToEndpoint -> DEBU 3287 Exiting" +"2019-04-22 06:17:44.501 UTC [gossip.comm] func1 -> DEBU 3288 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1512285266503218228 , Msg_type: BLOCK_MSG, digests: [6 1 2 3 4 5], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.501 UTC [gossip.gossip] handleMessage -> DEBU 3289 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1512285266503218228 , Msg_type: BLOCK_MSG, digests: [6 1 2 3 4 5], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.502 UTC [gossip.pull] HandleMessage -> DEBU 328a GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 1512285266503218228 , Msg_type: BLOCK_MSG, digests: [6 1 2 3 4 5], Envelope: 51 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.502 UTC [gossip.gossip] handleMessage -> DEBU 328b Exiting" +"2019-04-22 06:17:44.649 UTC [gossip.comm] func1 -> DEBU 328c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.649 UTC [gossip.gossip] handleMessage -> DEBU 328d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.650 UTC [msp] DeserializeIdentity -> DEBU 328e Obtaining identity" +"2019-04-22 06:17:44.650 UTC [msp] DeserializeIdentity -> DEBU 328f Obtaining identity" +"2019-04-22 06:17:44.650 UTC [gossip.gossip] handleMessage -> DEBU 3290 Exiting" +"2019-04-22 06:17:44.686 UTC [gossip.comm] func1 -> DEBU 3291 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.686 UTC [gossip.gossip] handleMessage -> DEBU 3292 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.686 UTC [gossip.pull] HandleMessage -> DEBU 3293 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.686 UTC [gossip.pull] SendDigest -> DEBU 3294 Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:44.687 UTC [gossip.gossip] handleMessage -> DEBU 3295 Exiting" +"2019-04-22 06:17:44.872 UTC [gossip.gossip] handleMessage -> DEBU 3296 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:44.872 UTC [msp] DeserializeIdentity -> DEBU 3297 Obtaining identity" +"2019-04-22 06:17:44.872 UTC [msp] DeserializeIdentity -> DEBU 3298 Obtaining identity" +"2019-04-22 06:17:44.873 UTC [msp] DeserializeIdentity -> DEBU 3299 Obtaining identity" +"2019-04-22 06:17:44.873 UTC [gossip.gossip] handleMessage -> DEBU 329a Exiting" +"2019-04-22 06:17:45.090 UTC [gossip.comm] func1 -> DEBU 329b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:45.091 UTC [gossip.gossip] handleMessage -> DEBU 329c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:45.092 UTC [msp] DeserializeIdentity -> DEBU 329d Obtaining identity" +"2019-04-22 06:17:45.097 UTC [msp] DeserializeIdentity -> DEBU 329e Obtaining identity" +"2019-04-22 06:17:45.098 UTC [msp] DeserializeIdentity -> DEBU 329f Obtaining identity" +"2019-04-22 06:17:45.100 UTC [gossip.gossip] handleMessage -> DEBU 32a0 Exiting" +"2019-04-22 06:17:45.114 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 32a1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:45.114 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 32a2 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:45.114 UTC [policies] Evaluate -> DEBU 32a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:17:45.115 UTC [policies] Evaluate -> DEBU 32a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:45.115 UTC [policies] Evaluate -> DEBU 32a5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:17:45.115 UTC [cauthdsl] func1 -> DEBU 32a6 0xc00301e530 gate 1555913865115929800 evaluation starts" +"2019-04-22 06:17:45.116 UTC [cauthdsl] func2 -> DEBU 32a7 0xc00301e530 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.116 UTC [cauthdsl] func2 -> DEBU 32a8 0xc00301e530 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:45.117 UTC [cauthdsl] func2 -> DEBU 32a9 0xc00301e530 principal matched by identity 0" +"2019-04-22 06:17:45.117 UTC [msp.identity] Verify -> DEBU 32aa Verify: digest = 00000000 34 87 83 a2 de 32 ba e9 35 7c d2 c0 56 09 e6 4c |4....2..5|..V..L| +00000010 96 22 13 19 d5 bb 3f 96 3f 14 fe 13 16 b3 74 46 |."....?.?.....tF|" +"2019-04-22 06:17:45.117 UTC [msp.identity] Verify -> DEBU 32ab Verify: sig = 00000000 30 44 02 20 25 c6 04 68 71 e3 9e da 48 01 a5 17 |0D. %..hq...H...| +00000010 bf ac 7d f0 e5 97 2e b9 dc 93 34 0e d9 4e 42 6c |..}.......4..NBl| +00000020 49 3c 5d 3b 02 20 09 78 22 b8 e2 99 83 8e 9d a9 |I<];. .x".......| +00000030 85 05 76 87 6f fb 64 f5 a6 2a a3 37 b5 0b 64 32 |..v.o.d..*.7..d2| +00000040 01 0f 28 58 fe 22 |..(X."|" +"2019-04-22 06:17:45.118 UTC [cauthdsl] func2 -> DEBU 32ac 0xc00301e530 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:45.118 UTC [cauthdsl] func1 -> DEBU 32ad 0xc00301e530 gate 1555913865115929800 evaluation succeeds" +"2019-04-22 06:17:45.119 UTC [policies] Evaluate -> DEBU 32ae Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:45.119 UTC [policies] Evaluate -> DEBU 32af == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:45.120 UTC [policies] Evaluate -> DEBU 32b0 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:45.121 UTC [policies] Evaluate -> DEBU 32b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:45.122 UTC [blocksProvider] DeliverBlocks -> DEBU 32b2 [businesschannel] Adding payload to local buffer, blockNum = [7]" +"2019-04-22 06:17:45.123 UTC [gossip.state] addPayload -> DEBU 32b3 [businesschannel] Adding payload to local buffer, blockNum = [7]" +"2019-04-22 06:17:45.124 UTC [gossip.state] addPayload -> DEBU 32b4 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:17:45.124 UTC [blocksProvider] DeliverBlocks -> DEBU 32b6 [businesschannel] Gossiping block [7], peers number [3]" +"2019-04-22 06:17:45.125 UTC [gossip.channel] AddToMsgStore -> DEBU 32b7 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:17:45.125 UTC [gossip.pull] Add -> DEBU 32b8 Added 7, total items: 7" +"2019-04-22 06:17:45.124 UTC [gossip.state] deliverPayloads -> DEBU 32b5 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [7]" +"2019-04-22 06:17:45.126 UTC [gossip.state] deliverPayloads -> DEBU 32b9 [businesschannel] Transferring block [7] with 1 transaction(s) to the ledger" +"2019-04-22 06:17:45.127 UTC [gossip.privdata] StoreBlock -> INFO 32ba [businesschannel] Received block [7] from buffer" +"2019-04-22 06:17:45.127 UTC [gossip.privdata] StoreBlock -> DEBU 32bb [businesschannel] Validating block [7]" +"2019-04-22 06:17:45.127 UTC [committer.txvalidator] Validate -> DEBU 32bc [businesschannel] START Block Validation for block [7]" +"2019-04-22 06:17:45.128 UTC [committer.txvalidator] Validate -> DEBU 32bd expecting 1 block validation responses" +"2019-04-22 06:17:45.128 UTC [committer.txvalidator] validateTx -> DEBU 32be [businesschannel] validateTx starts for block 0xc00335e600 env 0xc002490320 txn 0" +"2019-04-22 06:17:45.129 UTC [protoutils] ValidateTransaction -> DEBU 32bf ValidateTransactionEnvelope starts for envelope 0xc002490320" +"2019-04-22 06:17:45.130 UTC [protoutils] ValidateTransaction -> DEBU 32c0 Header is channel_header:"\010\003\032\013\010\207\271\365\345\005\020\264\332\266\025\"\017businesschannel*@1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\327\302!\223;\212\321\332\244L&\305h\270\003\001c\204\360g\031\347\326\254" " +"2019-04-22 06:17:45.131 UTC [protoutils] validateChannelHeader -> DEBU 32c1 validateChannelHeader info: header type 3" +"2019-04-22 06:17:45.131 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c2 begin" +"2019-04-22 06:17:45.131 UTC [msp] GetManagerForChain -> DEBU 32c3 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:45.132 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c4 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:45.132 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c5 creator is valid" +"2019-04-22 06:17:45.132 UTC [msp.identity] Verify -> DEBU 32c6 Verify: digest = 00000000 48 8d bd 48 0c 7c ca e2 08 87 5c 32 af 4e e3 c5 |H..H.|....\2.N..| +00000010 bb b1 a5 1f 70 06 8e 72 99 02 e4 10 7c 98 c6 2e |....p..r....|...|" +"2019-04-22 06:17:45.133 UTC [msp.identity] Verify -> DEBU 32c7 Verify: sig = 00000000 30 45 02 21 00 90 08 0c 73 59 fc ff da 6e 8f f2 |0E.!....sY...n..| +00000010 40 56 fe 2e 8d 7e 9f 7a ee 87 d3 6c 8e 9d a1 c3 |@V...~.z...l....| +00000020 ca 6c 03 e5 fa 02 20 00 c6 c0 c6 15 55 e1 47 3e |.l.... .....U.G>| +00000030 a7 41 71 4f ae bf 1a cd 91 6d d6 c4 f4 65 06 4f |.AqO.....m...e.O| +00000040 87 e3 04 18 9f 65 ab |.....e.|" +"2019-04-22 06:17:45.134 UTC [protoutils] checkSignatureFromCreator -> DEBU 32c8 exits successfully" +"2019-04-22 06:17:45.134 UTC [protoutils] validateEndorserTransaction -> DEBU 32c9 validateEndorserTransaction starts for data 0xc002579000, header channel_header:"\010\003\032\013\010\207\271\365\345\005\020\264\332\266\025\"\017businesschannel*@1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org1MSP\022\256\006-----BEGIN CERTIFICATE-----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\n1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg==\n-----END CERTIFICATE-----\n\022\030\327\302!\223;\212\321\332\244L&\305h\270\003\001c\204\360g\031\347\326\254" " +"2019-04-22 06:17:45.135 UTC [protoutils] validateEndorserTransaction -> DEBU 32ca validateEndorserTransaction info: there are 1 actions" +"2019-04-22 06:17:45.136 UTC [protoutils] validateEndorserTransaction -> DEBU 32cc validateEndorserTransaction info: signature header is valid" +"2019-04-22 06:17:45.135 UTC [msp] DeserializeIdentity -> DEBU 32cb Obtaining identity" +"2019-04-22 06:17:45.137 UTC [msp] DeserializeIdentity -> DEBU 32cd Obtaining identity" +"2019-04-22 06:17:45.138 UTC [msp] DeserializeIdentity -> DEBU 32ce Obtaining identity" +"2019-04-22 06:17:45.139 UTC [msp] DeserializeIdentity -> DEBU 32cf Obtaining identity" +"2019-04-22 06:17:45.140 UTC [gossip.comm] Send -> DEBU 32d0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:45.140 UTC [msp] DeserializeIdentity -> DEBU 32d1 Obtaining identity" +"2019-04-22 06:17:45.141 UTC [msp] DeserializeIdentity -> DEBU 32d2 Obtaining identity" +"2019-04-22 06:17:45.141 UTC [gossip.comm] sendToEndpoint -> DEBU 32d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4062 bytes, seq: 7}, Envelope: 4092 bytes, Signature: 0 bytes" +"2019-04-22 06:17:45.141 UTC [gossip.comm] sendToEndpoint -> DEBU 32d4 Exiting" +"2019-04-22 06:17:45.136 UTC [protoutils] ValidateTransaction -> DEBU 32d5 ValidateTransactionEnvelope returns err %!s()" +"2019-04-22 06:17:45.143 UTC [committer.txvalidator] validateTx -> DEBU 32d6 Transaction is for channel businesschannel" +"2019-04-22 06:17:45.144 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 32d7 retrieveTransactionByID() - txId = [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a]" +"2019-04-22 06:17:45.144 UTC [committer.txvalidator] validateTx -> DEBU 32d8 Validating transaction with plugins" +"2019-04-22 06:17:45.145 UTC [committer.txvalidator] Dispatch -> DEBU 32d9 [businesschannel] Dispatch starts for bytes 0xc0002f4c00" +"2019-04-22 06:17:45.146 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 32da constructing new query executor txid = [33c74b9d-ce34-44a8-9f39-9e166e187c5c]" +"2019-04-22 06:17:45.146 UTC [stateleveldb] GetState -> DEBU 32db GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-04-22 06:17:45.147 UTC [stateleveldb] GetState -> DEBU 32dc GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.148 UTC [stateleveldb] GetState -> DEBU 32dd GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-04-22 06:17:45.149 UTC [stateleveldb] GetState -> DEBU 32de GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-04-22 06:17:45.149 UTC [stateleveldb] GetState -> DEBU 32df GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-04-22 06:17:45.150 UTC [lockbasedtxmgr] Done -> DEBU 32e0 Done with transaction simulation / query execution [33c74b9d-ce34-44a8-9f39-9e166e187c5c]" +"2019-04-22 06:17:45.151 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 32e1 Validating Tx 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a, seq 0 out of 1 in block 7 for channel businesschannel with validation plugin vscc with plugin" +"2019-04-22 06:17:45.151 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 32e2 constructing new query executor txid = [e3d4b353-13a3-4ccd-86ee-6f9036430864]" +"2019-04-22 06:17:45.152 UTC [lockbasedtxmgr] Done -> DEBU 32e3 Done with transaction simulation / query execution [e3d4b353-13a3-4ccd-86ee-6f9036430864]" +"2019-04-22 06:17:45.152 UTC [cauthdsl] func1 -> DEBU 32e4 0xc003052790 gate 1555913865152586900 evaluation starts" +"2019-04-22 06:17:45.152 UTC [cauthdsl] func2 -> DEBU 32e5 0xc003052790 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.153 UTC [cauthdsl] func2 -> DEBU 32e6 0xc003052790 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:45.153 UTC [cauthdsl] func2 -> DEBU 32e7 0xc003052790 principal matched by identity 0" +"2019-04-22 06:17:45.154 UTC [msp.identity] Verify -> DEBU 32e8 Verify: digest = 00000000 ba ab f0 cc c0 99 84 75 5c 15 83 22 50 2d f7 c5 |.......u\.."P-..| +00000010 bc c3 bd 0f 11 6f 06 00 a1 72 15 22 55 53 bb 78 |.....o...r."US.x|" +"2019-04-22 06:17:45.154 UTC [msp.identity] Verify -> DEBU 32e9 Verify: sig = 00000000 30 45 02 21 00 e7 f4 08 1f 14 0f af 93 a5 f7 5d |0E.!...........]| +00000010 42 72 63 5e 32 ab 98 99 c0 e3 d1 17 04 2c c3 9b |Brc^2........,..| +00000020 d4 5e 39 a2 a8 02 20 70 b5 af 86 df bc 3d 27 2a |.^9... p.....='*| +00000030 e9 78 5d 94 b4 ae 88 62 de 6e de cf 0b 42 f5 9d |.x]....b.n...B..| +00000040 96 43 e6 c2 e0 04 ed |.C.....|" +"2019-04-22 06:17:45.155 UTC [cauthdsl] func2 -> DEBU 32ea 0xc003052790 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:45.155 UTC [cauthdsl] func2 -> DEBU 32eb 0xc003052790 signed by 1 principal evaluation starts (used [true])" +"2019-04-22 06:17:45.155 UTC [cauthdsl] func2 -> DEBU 32ec 0xc003052790 skipping identity 0 because it has already been used" +"2019-04-22 06:17:45.156 UTC [cauthdsl] func2 -> DEBU 32ed 0xc003052790 principal evaluation fails" +"2019-04-22 06:17:45.156 UTC [cauthdsl] func1 -> DEBU 32ee 0xc003052790 gate 1555913865152586900 evaluation succeeds" +"2019-04-22 06:17:45.157 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 32ef constructing new query executor txid = [10b45eeb-3cb4-4bcd-85cb-5f10fd22e108]" +"2019-04-22 06:17:45.158 UTC [lockbasedtxmgr] Done -> DEBU 32f0 Done with transaction simulation / query execution [10b45eeb-3cb4-4bcd-85cb-5f10fd22e108]" +"2019-04-22 06:17:45.159 UTC [vscc] Validate -> DEBU 32f1 block 7, namespace: exp02, tx 0 validation results is: " +"2019-04-22 06:17:45.159 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 32f2 Transaction 1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a appears to be valid" +"2019-04-22 06:17:45.159 UTC [committer.txvalidator] Dispatch -> DEBU 32f3 [businesschannel] Dispatch completes env bytes 0xc0002f4c00" +"2019-04-22 06:17:45.160 UTC [committer.txvalidator] validateTx -> DEBU 32f4 [businesschannel] validateTx completes for block 0xc00335e600 env 0xc002490320 txn 0" +"2019-04-22 06:17:45.160 UTC [committer.txvalidator] Validate -> DEBU 32f5 got result for idx 0, code 0" +"2019-04-22 06:17:45.161 UTC [committer.txvalidator] Validate -> INFO 32f6 [businesschannel] Validated block [7] in 33ms" +"2019-04-22 06:17:45.162 UTC [gossip.privdata] listMissingPrivateData -> DEBU 32f7 Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:17:45.162 UTC [gossip.privdata] StoreBlock -> DEBU 32f8 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:17:45.163 UTC [kvledger] CommitWithPvtData -> DEBU 32f9 [businesschannel] Validating state for block [7]" +"2019-04-22 06:17:45.163 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 32fa Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:17:45.164 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 32fb lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:17:45.164 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 32fc Validating new block with num trans = [1]" +"2019-04-22 06:17:45.165 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 32fd ValidateAndPrepareBatch() for block number = [7]" +"2019-04-22 06:17:45.165 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 32fe preprocessing ProtoBlock..." +"2019-04-22 06:17:45.166 UTC [valimpl] preprocessProtoBlock -> DEBU 32ff txType=ENDORSER_TRANSACTION" +"2019-04-22 06:17:45.166 UTC [stateleveldb] GetState -> DEBU 3300 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.167 UTC [statebasedval] validateKVRead -> DEBU 3301 Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +"2019-04-22 06:17:45.167 UTC [stateleveldb] GetState -> DEBU 3302 GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:45.168 UTC [statebasedval] validateKVRead -> DEBU 3303 Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-04-22 06:17:45.168 UTC [stateleveldb] GetState -> DEBU 3304 GetState(). ns=exp02, key=a" +"2019-04-22 06:17:45.169 UTC [statebasedval] validateKVRead -> DEBU 3305 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-04-22 06:17:45.169 UTC [stateleveldb] GetState -> DEBU 3306 GetState(). ns=exp02, key=b" +"2019-04-22 06:17:45.170 UTC [statebasedval] validateKVRead -> DEBU 3307 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-04-22 06:17:45.171 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3308 Block [7] Transaction index [0] TxId [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-04-22 06:17:45.171 UTC [valinternal] ApplyWriteSet -> DEBU 3309 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0033e6380), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0033e63c0)}" +"2019-04-22 06:17:45.172 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 330a validating rwset..." +"2019-04-22 06:17:45.172 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 330b postprocessing ProtoBlock..." +"2019-04-22 06:17:45.172 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 330c ValidateAndPrepareBatch() complete" +"2019-04-22 06:17:45.173 UTC [kvledger] CommitWithPvtData -> DEBU 330d [businesschannel] Committing block [7] to storage" +"2019-04-22 06:17:45.174 UTC [ledgerstorage] CommitWithPvtData -> DEBU 330e Writing block [7] to pvt block store" +"2019-04-22 06:17:45.177 UTC [pvtdatastorage] Prepare -> DEBU 330f Saved 0 private data write sets for block [7]" +"2019-04-22 06:17:45.181 UTC [fsblkstorage] indexBlock -> DEBU 3310 Indexing block [blockNum=7, blockHash=[]byte{0xd7, 0x34, 0x1e, 0x62, 0x39, 0xbe, 0xee, 0x16, 0x6f, 0xda, 0xea, 0x22, 0xab, 0x75, 0xfa, 0xd, 0x35, 0x82, 0x21, 0x40, 0xe, 0x98, 0xb1, 0x94, 0xf5, 0x18, 0xa4, 0x3, 0xb3, 0x41, 0xea, 0x27} txOffsets= +txId=1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a locPointer=offset=70, bytesLength=3044 +]" +"2019-04-22 06:17:45.181 UTC [fsblkstorage] indexBlock -> DEBU 3311 Adding txLoc [fileSuffixNum=0, offset=90642, bytesLength=3044] for tx ID: [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a] to txid-index" +"2019-04-22 06:17:45.181 UTC [fsblkstorage] indexBlock -> DEBU 3312 Adding txLoc [fileSuffixNum=0, offset=90642, bytesLength=3044] for tx number:[0] ID: [1b5e943277106073a5f78be122b975026331e53d3ae3c2af845123d2cbc8ae9a] to blockNumTranNum index" +"2019-04-22 06:17:45.184 UTC [fsblkstorage] updateCheckpoint -> DEBU 3313 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[94623], isChainEmpty=[false], lastBlockNumber=[7]" +"2019-04-22 06:17:45.184 UTC [pvtdatastorage] Commit -> DEBU 3314 Committing private data for block [7]" +"2019-04-22 06:17:45.187 UTC [pvtdatastorage] Commit -> DEBU 3315 Committed private data for block [7]" +"2019-04-22 06:17:45.188 UTC [kvledger] CommitWithPvtData -> DEBU 3316 [businesschannel] Committing block [7] transactions to state database" +"2019-04-22 06:17:45.188 UTC [lockbasedtxmgr] Commit -> DEBU 3317 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:17:45.189 UTC [lockbasedtxmgr] Commit -> DEBU 3318 Committing updates to state database" +"2019-04-22 06:17:45.190 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3319 Building the expiry schedules based on the update batch" +"2019-04-22 06:17:45.190 UTC [lockbasedtxmgr] Commit -> DEBU 331a Write lock acquired for committing updates to state database" +"2019-04-22 06:17:45.191 UTC [stateleveldb] ApplyUpdates -> DEBU 331b Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-04-22 06:17:45.191 UTC [stateleveldb] ApplyUpdates -> DEBU 331c Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-04-22 06:17:45.193 UTC [lockbasedtxmgr] Commit -> DEBU 331d Updates committed to state database and the write lock is released" +"2019-04-22 06:17:45.194 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 331e Preparing potential purge list working-set for expiringAtBlk [8]" +"2019-04-22 06:17:45.195 UTC [leveldbhelper] GetIterator -> DEBU 3320 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}]" +"2019-04-22 06:17:45.194 UTC [lockbasedtxmgr] func1 -> DEBU 331f launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:17:45.196 UTC [kvledger] CommitWithPvtData -> DEBU 3321 [businesschannel] Committing block [7] transactions to history database" +"2019-04-22 06:17:45.196 UTC [historyleveldb] Commit -> DEBU 3322 Channel [businesschannel]: Updating history database for blockNo [7] with [1] transactions" +"2019-04-22 06:17:45.195 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3323 No expiry entry found for expiringAtBlk [8]" +"2019-04-22 06:17:45.201 UTC [historyleveldb] Commit -> DEBU 3324 Channel [businesschannel]: Updates committed to history database for blockNo [7]" +"2019-04-22 06:17:45.201 UTC [kvledger] CommitWithPvtData -> INFO 3325 [businesschannel] Committed block [7] with 1 transaction(s) in 38ms (state_validation=9ms block_commit=14ms state_commit=7ms)" +"2019-04-22 06:17:45.203 UTC [msp.identity] Sign -> DEBU 3326 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020808 " +"2019-04-22 06:17:45.203 UTC [msp.identity] Sign -> DEBU 3327 Sign: digest: 185FBEDF2C9CB0967553BB6D6B9BE4BB7F0BBCEA20A00FB90F6D5E49418CC391 " +"2019-04-22 06:17:45.204 UTC [gossip.state] commitBlock -> DEBU 3328 [businesschannel] Committed block [7] with 1 transaction(s)" +"2019-04-22 06:17:45.531 UTC [endorser] ProcessProposal -> DEBU 3329 Entering: request from 192.168.224.9:49310" +"2019-04-22 06:17:45.532 UTC [protoutils] ValidateProposalMessage -> DEBU 332a ValidateProposalMessage starts for signed proposal 0xc0024ca5a0" +"2019-04-22 06:17:45.532 UTC [protoutils] validateChannelHeader -> DEBU 332b validateChannelHeader info: header type 3" +"2019-04-22 06:17:45.532 UTC [protoutils] checkSignatureFromCreator -> DEBU 332c begin" +"2019-04-22 06:17:45.532 UTC [msp] GetManagerForChain -> DEBU 332d Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:45.532 UTC [protoutils] checkSignatureFromCreator -> DEBU 332e creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-04-22 06:17:45.532 UTC [protoutils] checkSignatureFromCreator -> DEBU 332f creator is valid" +"2019-04-22 06:17:45.532 UTC [msp.identity] Verify -> DEBU 3330 Verify: digest = 00000000 e9 d0 2d a9 64 8d 19 ab 19 79 e8 d8 b2 e2 33 64 |..-.d....y....3d| +00000010 1b 8b b1 ed a3 f7 91 63 6b 65 f3 73 4d 35 ba fc |.......cke.sM5..|" +"2019-04-22 06:17:45.532 UTC [msp.identity] Verify -> DEBU 3331 Verify: sig = 00000000 30 44 02 20 6a 3e ed a1 f4 c2 76 49 1e d1 b7 33 |0D. j>....vI...3| +00000010 db f9 b4 86 85 9d 1b b0 ea 34 b3 8d 34 0b c9 38 |.........4..4..8| +00000020 93 3c 49 41 02 20 02 c5 e4 c6 52 da 35 31 9c 4d |. DEBU 3332 exits successfully" +"2019-04-22 06:17:45.532 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3333 validateChaincodeProposalMessage starts for proposal 0xc002f4a540, header 0xc0024ca9b0" +"2019-04-22 06:17:45.532 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3334 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:45.532 UTC [endorser] preProcess -> DEBU 3335 [businesschannel][0c0932d9] processing txid: 0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a" +"2019-04-22 06:17:45.532 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3336 retrieveTransactionByID() - txId = [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +"2019-04-22 06:17:45.532 UTC [aclmgmt] CheckACL -> DEBU 3337 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:45.532 UTC [aclmgmt] CheckACL -> DEBU 3338 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:45.532 UTC [policies] Evaluate -> DEBU 3339 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 333a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 333b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:45.533 UTC [cauthdsl] func1 -> DEBU 333c 0xc003069ea0 gate 1555913865533115100 evaluation starts" +"2019-04-22 06:17:45.533 UTC [cauthdsl] func2 -> DEBU 333d 0xc003069ea0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.533 UTC [cauthdsl] func2 -> DEBU 333e 0xc003069ea0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:45.533 UTC [cauthdsl] func2 -> DEBU 333f 0xc003069ea0 principal matched by identity 0" +"2019-04-22 06:17:45.533 UTC [msp.identity] Verify -> DEBU 3340 Verify: digest = 00000000 e9 d0 2d a9 64 8d 19 ab 19 79 e8 d8 b2 e2 33 64 |..-.d....y....3d| +00000010 1b 8b b1 ed a3 f7 91 63 6b 65 f3 73 4d 35 ba fc |.......cke.sM5..|" +"2019-04-22 06:17:45.533 UTC [msp.identity] Verify -> DEBU 3341 Verify: sig = 00000000 30 44 02 20 6a 3e ed a1 f4 c2 76 49 1e d1 b7 33 |0D. j>....vI...3| +00000010 db f9 b4 86 85 9d 1b b0 ea 34 b3 8d 34 0b c9 38 |.........4..4..8| +00000020 93 3c 49 41 02 20 02 c5 e4 c6 52 da 35 31 9c 4d |. DEBU 3342 0xc003069ea0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:45.533 UTC [cauthdsl] func1 -> DEBU 3343 0xc003069ea0 gate 1555913865533115100 evaluation succeeds" +"2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3344 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3345 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3346 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:45.533 UTC [policies] Evaluate -> DEBU 3347 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:45.533 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3348 constructing new tx simulator" +"2019-04-22 06:17:45.533 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3349 constructing new tx simulator txid = [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +"2019-04-22 06:17:45.534 UTC [endorser] SimulateProposal -> DEBU 334a [businesschannel][0c0932d9] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.534 UTC [stateleveldb] GetState -> DEBU 334b GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.534 UTC [endorser] callChaincode -> INFO 334c [businesschannel][0c0932d9] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.534 UTC [stateleveldb] GetState -> DEBU 334d GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.534 UTC [stateleveldb] GetState -> DEBU 334e GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:45.534 UTC [chaincode] Execute -> DEBU 334f Entry" +"2019-04-22 06:17:45.538 UTC [chaincode] handleMessage -> DEBU 3350 [0c0932d9] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:45.538 UTC [chaincode] HandleTransaction -> DEBU 3351 [0c0932d9] handling GET_STATE from chaincode" +"2019-04-22 06:17:45.538 UTC [chaincode] HandleGetState -> DEBU 3352 [0c0932d9] getting state for chaincode exp02, key a, channel businesschannel" +"2019-04-22 06:17:45.538 UTC [stateleveldb] GetState -> DEBU 3353 GetState(). ns=exp02, key=a" +"2019-04-22 06:17:45.538 UTC [chaincode] HandleTransaction -> DEBU 3354 [0c0932d9] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:45.540 UTC [chaincode] handleMessage -> DEBU 3355 [0c0932d9] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:45.540 UTC [chaincode] Notify -> DEBU 3356 [0c0932d9] notifying Txid:0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a, channelID:businesschannel" +"2019-04-22 06:17:45.540 UTC [chaincode] Execute -> DEBU 3357 Exit" +"2019-04-22 06:17:45.540 UTC [endorser] callChaincode -> INFO 3358 [businesschannel][0c0932d9] Exit chaincode: name:"exp02" (6ms)" +"2019-04-22 06:17:45.540 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3359 Simulation completed, getting simulation results" +"2019-04-22 06:17:45.540 UTC [lockbasedtxmgr] Done -> DEBU 335a Done with transaction simulation / query execution [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +"2019-04-22 06:17:45.540 UTC [endorser] SimulateProposal -> DEBU 335b [businesschannel][0c0932d9] Exit" +"2019-04-22 06:17:45.541 UTC [endorser] endorseProposal -> DEBU 335c [businesschannel][0c0932d9] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.541 UTC [endorser] endorseProposal -> DEBU 335d [businesschannel][0c0932d9] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:45.541 UTC [endorser] EndorseWithPlugin -> DEBU 335e Entering endorsement for {plugin: escc, channel: businesschannel, tx: 0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a, chaincode: exp02}" +"2019-04-22 06:17:45.541 UTC [msp.identity] Sign -> DEBU 335f Sign: plaintext: 0A2039BE34286EA67528832DC6CFEEE8...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:45.541 UTC [msp.identity] Sign -> DEBU 3360 Sign: digest: 4A21B99832B2AE5FBF7841741A20DDDB7548358CD960EE16CB0F3B7AEBCD9472 " +"2019-04-22 06:17:45.541 UTC [endorser] EndorseWithPlugin -> DEBU 3361 Exiting {plugin: escc, channel: businesschannel, tx: 0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a, chaincode: exp02}" +"2019-04-22 06:17:45.541 UTC [endorser] endorseProposal -> DEBU 3362 [businesschannel][0c0932d9] Exit" +"2019-04-22 06:17:45.541 UTC [lockbasedtxmgr] Done -> DEBU 3363 Done with transaction simulation / query execution [0c0932d959c491be3058430ed7082a7850cb27a32b4a26b827aa5705e458c85a]" +"2019-04-22 06:17:45.541 UTC [endorser] func1 -> DEBU 3364 Exit: request from 192.168.224.9:49310" +"2019-04-22 06:17:45.541 UTC [comm.grpc.server] 1 -> INFO 3365 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49310 grpc.code=OK grpc.call_duration=10.26ms +"2019-04-22 06:17:45.545 UTC [grpc] infof -> DEBU 3366 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:45.545 UTC [grpc] infof -> DEBU 3367 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:45.732 UTC [endorser] ProcessProposal -> DEBU 3368 Entering: request from 192.168.224.9:49314" +"2019-04-22 06:17:45.732 UTC [protoutils] ValidateProposalMessage -> DEBU 3369 ValidateProposalMessage starts for signed proposal 0xc0024cb630" +"2019-04-22 06:17:45.732 UTC [protoutils] validateChannelHeader -> DEBU 336a validateChannelHeader info: header type 3" +"2019-04-22 06:17:45.733 UTC [protoutils] checkSignatureFromCreator -> DEBU 336b begin" +"2019-04-22 06:17:45.733 UTC [msp] GetManagerForChain -> DEBU 336c Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:45.734 UTC [protoutils] checkSignatureFromCreator -> DEBU 336d creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-04-22 06:17:45.734 UTC [protoutils] checkSignatureFromCreator -> DEBU 336e creator is valid" +"2019-04-22 06:17:45.734 UTC [msp.identity] Verify -> DEBU 336f Verify: digest = 00000000 11 4f eb 7d 45 0d 83 ba 52 c4 ee 39 4d e7 9e cc |.O.}E...R..9M...| +00000010 d7 99 3b 71 57 5f ec db eb 73 4a 4e 6b bd f8 2f |..;qW_...sJNk../|" +"2019-04-22 06:17:45.735 UTC [msp.identity] Verify -> DEBU 3370 Verify: sig = 00000000 30 45 02 21 00 a4 7c 30 ef 94 45 de ba c2 94 1d |0E.!..|0..E.....| +00000010 d9 9f 6a 16 10 fe 16 ab ca b9 e4 88 af f9 32 28 |..j...........2(| +00000020 ea 90 9c db bb 02 20 09 ac 89 a6 1b b3 f1 aa 6e |...... ........n| +00000030 19 7e 3b 46 70 99 a6 62 3a 1d fa c9 a4 41 b5 16 |.~;Fp..b:....A..| +00000040 f3 41 6b 2b 92 31 82 |.Ak+.1.|" +"2019-04-22 06:17:45.735 UTC [protoutils] checkSignatureFromCreator -> DEBU 3371 exits successfully" +"2019-04-22 06:17:45.736 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3372 validateChaincodeProposalMessage starts for proposal 0xc002f4af50, header 0xc0024cbae0" +"2019-04-22 06:17:45.736 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3373 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:45.737 UTC [endorser] preProcess -> DEBU 3374 [businesschannel][8d9f968d] processing txid: 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff" +"2019-04-22 06:17:45.737 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3375 retrieveTransactionByID() - txId = [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +"2019-04-22 06:17:45.738 UTC [aclmgmt] CheckACL -> DEBU 3376 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:45.738 UTC [aclmgmt] CheckACL -> DEBU 3377 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:45.740 UTC [policies] Evaluate -> DEBU 3378 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:45.740 UTC [policies] Evaluate -> DEBU 3379 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:45.741 UTC [policies] Evaluate -> DEBU 337a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:45.741 UTC [cauthdsl] func1 -> DEBU 337b 0xc00311d690 gate 1555913865741407200 evaluation starts" +"2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 337c 0xc00311d690 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 337d 0xc00311d690 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 337e 0xc00311d690 principal matched by identity 0" +"2019-04-22 06:17:45.742 UTC [msp.identity] Verify -> DEBU 337f Verify: digest = 00000000 11 4f eb 7d 45 0d 83 ba 52 c4 ee 39 4d e7 9e cc |.O.}E...R..9M...| +00000010 d7 99 3b 71 57 5f ec db eb 73 4a 4e 6b bd f8 2f |..;qW_...sJNk../|" +"2019-04-22 06:17:45.742 UTC [msp.identity] Verify -> DEBU 3380 Verify: sig = 00000000 30 45 02 21 00 a4 7c 30 ef 94 45 de ba c2 94 1d |0E.!..|0..E.....| +00000010 d9 9f 6a 16 10 fe 16 ab ca b9 e4 88 af f9 32 28 |..j...........2(| +00000020 ea 90 9c db bb 02 20 09 ac 89 a6 1b b3 f1 aa 6e |...... ........n| +00000030 19 7e 3b 46 70 99 a6 62 3a 1d fa c9 a4 41 b5 16 |.~;Fp..b:....A..| +00000040 f3 41 6b 2b 92 31 82 |.Ak+.1.|" +"2019-04-22 06:17:45.742 UTC [cauthdsl] func2 -> DEBU 3381 0xc00311d690 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:45.742 UTC [cauthdsl] func1 -> DEBU 3382 0xc00311d690 gate 1555913865741407200 evaluation succeeds" +"2019-04-22 06:17:45.742 UTC [policies] Evaluate -> DEBU 3383 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.742 UTC [policies] Evaluate -> DEBU 3384 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.743 UTC [policies] Evaluate -> DEBU 3385 Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:45.743 UTC [policies] Evaluate -> DEBU 3386 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:45.743 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3387 constructing new tx simulator" +"2019-04-22 06:17:45.743 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3388 constructing new tx simulator txid = [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +"2019-04-22 06:17:45.743 UTC [endorser] SimulateProposal -> DEBU 3389 [businesschannel][8d9f968d] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.743 UTC [stateleveldb] GetState -> DEBU 338a GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.743 UTC [endorser] callChaincode -> INFO 338b [businesschannel][8d9f968d] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.743 UTC [stateleveldb] GetState -> DEBU 338c GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.743 UTC [stateleveldb] GetState -> DEBU 338d GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:45.743 UTC [chaincode] Execute -> DEBU 338e Entry" +"2019-04-22 06:17:45.744 UTC [chaincode] handleMessage -> DEBU 338f [8d9f968d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:45.744 UTC [chaincode] HandleTransaction -> DEBU 3390 [8d9f968d] handling GET_STATE from chaincode" +"2019-04-22 06:17:45.744 UTC [chaincode] HandleGetState -> DEBU 3391 [8d9f968d] getting state for chaincode exp02, key a, channel businesschannel" +"2019-04-22 06:17:45.744 UTC [stateleveldb] GetState -> DEBU 3392 GetState(). ns=exp02, key=a" +"2019-04-22 06:17:45.744 UTC [chaincode] HandleTransaction -> DEBU 3393 [8d9f968d] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:45.745 UTC [chaincode] handleMessage -> DEBU 3394 [8d9f968d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:45.745 UTC [chaincode] HandleTransaction -> DEBU 3395 [8d9f968d] handling GET_STATE from chaincode" +"2019-04-22 06:17:45.745 UTC [chaincode] HandleGetState -> DEBU 3396 [8d9f968d] getting state for chaincode exp02, key b, channel businesschannel" +"2019-04-22 06:17:45.745 UTC [stateleveldb] GetState -> DEBU 3397 GetState(). ns=exp02, key=b" +"2019-04-22 06:17:45.746 UTC [chaincode] HandleTransaction -> DEBU 3398 [8d9f968d] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:45.746 UTC [chaincode] handleMessage -> DEBU 3399 [8d9f968d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:17:45.747 UTC [chaincode] HandleTransaction -> DEBU 339a [8d9f968d] handling PUT_STATE from chaincode" +"2019-04-22 06:17:45.748 UTC [chaincode] HandleTransaction -> DEBU 339b [8d9f968d] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:17:45.749 UTC [chaincode] handleMessage -> DEBU 339c [8d9f968d] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-04-22 06:17:45.749 UTC [chaincode] HandleTransaction -> DEBU 339d [8d9f968d] handling PUT_STATE from chaincode" +"2019-04-22 06:17:45.750 UTC [chaincode] HandleTransaction -> DEBU 339e [8d9f968d] Completed PUT_STATE. Sending RESPONSE" +"2019-04-22 06:17:45.750 UTC [chaincode] handleMessage -> DEBU 339f [8d9f968d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:45.750 UTC [chaincode] Notify -> DEBU 33a0 [8d9f968d] notifying Txid:8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, channelID:businesschannel" +"2019-04-22 06:17:45.750 UTC [chaincode] Execute -> DEBU 33a1 Exit" +"2019-04-22 06:17:45.750 UTC [endorser] callChaincode -> INFO 33a2 [businesschannel][8d9f968d] Exit chaincode: name:"exp02" (7ms)" +"2019-04-22 06:17:45.750 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 33a3 Simulation completed, getting simulation results" +"2019-04-22 06:17:45.750 UTC [lockbasedtxmgr] Done -> DEBU 33a4 Done with transaction simulation / query execution [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +"2019-04-22 06:17:45.751 UTC [endorser] SimulateProposal -> DEBU 33a5 [businesschannel][8d9f968d] Exit" +"2019-04-22 06:17:45.751 UTC [endorser] endorseProposal -> DEBU 33a6 [businesschannel][8d9f968d] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.751 UTC [endorser] endorseProposal -> DEBU 33a7 [businesschannel][8d9f968d] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:45.751 UTC [endorser] EndorseWithPlugin -> DEBU 33a8 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, chaincode: exp02}" +"2019-04-22 06:17:45.751 UTC [msp.identity] Sign -> DEBU 33a9 Sign: plaintext: 0A20A03153EAD516AABDE9D71F0BFE42...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:45.751 UTC [msp.identity] Sign -> DEBU 33aa Sign: digest: F10D3F5688393771B821297F88C7FAB3D5AF400E4D667BCF8C177F74E2145803 " +"2019-04-22 06:17:45.751 UTC [endorser] EndorseWithPlugin -> DEBU 33ab Exiting {plugin: escc, channel: businesschannel, tx: 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, chaincode: exp02}" +"2019-04-22 06:17:45.751 UTC [endorser] endorseProposal -> DEBU 33ac [businesschannel][8d9f968d] Exit" +"2019-04-22 06:17:45.751 UTC [lockbasedtxmgr] Done -> DEBU 33ad Done with transaction simulation / query execution [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +"2019-04-22 06:17:45.751 UTC [endorser] func1 -> DEBU 33ae Exit: request from 192.168.224.9:49314" +"2019-04-22 06:17:45.751 UTC [comm.grpc.server] 1 -> INFO 33af unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49314 grpc.code=OK grpc.call_duration=19.7693ms +"2019-04-22 06:17:45.768 UTC [grpc] warningf -> DEBU 33b0 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49314: read: connection reset by peer" +"2019-04-22 06:17:45.768 UTC [grpc] infof -> DEBU 33b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:45.768 UTC [grpc] infof -> DEBU 33b2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:45.806 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 33b3 Sleeping 25s" +"2019-04-22 06:17:45.836 UTC [msp.identity] Sign -> DEBU 33b4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102B " +"2019-04-22 06:17:45.837 UTC [msp.identity] Sign -> DEBU 33b5 Sign: digest: BC6BAF102A835524E730545EA07764ED5AE5673EF8D95E5D3069464F2F015B30 " +"2019-04-22 06:17:45.838 UTC [msp.identity] Sign -> DEBU 33b6 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:45.838 UTC [msp.identity] Sign -> DEBU 33b7 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:45.838 UTC [gossip.discovery] periodicalSendAlive -> DEBU 33b8 Sleeping 5s" +"2019-04-22 06:17:45.843 UTC [msp] DeserializeIdentity -> DEBU 33b9 Obtaining identity" +"2019-04-22 06:17:45.844 UTC [msp] DeserializeIdentity -> DEBU 33ba Obtaining identity" +"2019-04-22 06:17:45.844 UTC [msp] DeserializeIdentity -> DEBU 33bb Obtaining identity" +"2019-04-22 06:17:45.844 UTC [gossip.comm] Send -> DEBU 33bc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:45.845 UTC [gossip.comm] sendToEndpoint -> DEBU 33bd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:45.845 UTC [gossip.comm] sendToEndpoint -> DEBU 33be Exiting" +"2019-04-22 06:17:45.846 UTC [gossip.comm] Send -> DEBU 33bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:45.847 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" +"2019-04-22 06:17:45.847 UTC [gossip.comm] Send -> DEBU 33c2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:45.848 UTC [gossip.comm] sendToEndpoint -> DEBU 33c3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:45.848 UTC [gossip.comm] sendToEndpoint -> DEBU 33c4 Exiting" +"2019-04-22 06:17:45.847 UTC [gossip.comm] sendToEndpoint -> DEBU 33c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:43 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:45.849 UTC [gossip.comm] sendToEndpoint -> DEBU 33c5 Exiting" +"2019-04-22 06:17:45.952 UTC [endorser] ProcessProposal -> DEBU 33c6 Entering: request from 192.168.224.9:49320" +"2019-04-22 06:17:45.953 UTC [protoutils] ValidateProposalMessage -> DEBU 33c7 ValidateProposalMessage starts for signed proposal 0xc0025ba5a0" +"2019-04-22 06:17:45.953 UTC [protoutils] validateChannelHeader -> DEBU 33c8 validateChannelHeader info: header type 3" +"2019-04-22 06:17:45.954 UTC [protoutils] checkSignatureFromCreator -> DEBU 33c9 begin" +"2019-04-22 06:17:45.954 UTC [msp] GetManagerForChain -> DEBU 33ca Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:45.955 UTC [protoutils] checkSignatureFromCreator -> DEBU 33cb creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:45.955 UTC [protoutils] checkSignatureFromCreator -> DEBU 33cc creator is valid" +"2019-04-22 06:17:45.955 UTC [msp.identity] Verify -> DEBU 33cd Verify: digest = 00000000 42 42 78 03 07 fc 59 4d d4 4e 27 d4 95 0a 6e b6 |BBx...YM.N'...n.| +00000010 90 71 93 50 b1 f5 2f 19 65 a8 12 0e 71 5a ad 17 |.q.P../.e...qZ..|" +"2019-04-22 06:17:45.956 UTC [msp.identity] Verify -> DEBU 33ce Verify: sig = 00000000 30 44 02 20 33 32 f8 90 d0 85 d4 4a f4 4e a9 6a |0D. 32.....J.N.j| +00000010 d5 b7 c1 32 bb 0a 9a b2 5b 17 24 fe a5 b4 6e 13 |...2....[.$...n.| +00000020 d6 be c6 91 02 20 71 ca 9b 81 ca 39 73 d6 fb 43 |..... q....9s..C| +00000030 09 1b 49 79 ce 5a c8 eb 25 d9 07 5f 41 19 57 52 |..Iy.Z..%.._A.WR| +00000040 ac 8d 0f 4b 0e 51 |...K.Q|" +"2019-04-22 06:17:45.956 UTC [protoutils] checkSignatureFromCreator -> DEBU 33cf exits successfully" +"2019-04-22 06:17:45.957 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33d0 validateChaincodeProposalMessage starts for proposal 0xc00277ba40, header 0xc0025baaa0" +"2019-04-22 06:17:45.957 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 33d1 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:45.958 UTC [endorser] preProcess -> DEBU 33d2 [businesschannel][712f3a97] processing txid: 712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064" +"2019-04-22 06:17:45.958 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 33d3 retrieveTransactionByID() - txId = [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +"2019-04-22 06:17:45.958 UTC [aclmgmt] CheckACL -> DEBU 33d4 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:45.959 UTC [aclmgmt] CheckACL -> DEBU 33d5 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:45.959 UTC [policies] Evaluate -> DEBU 33d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:45.960 UTC [policies] Evaluate -> DEBU 33d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:45.960 UTC [policies] Evaluate -> DEBU 33d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:45.960 UTC [cauthdsl] func1 -> DEBU 33d9 0xc0033b0120 gate 1555913865960587800 evaluation starts" +"2019-04-22 06:17:45.960 UTC [cauthdsl] func2 -> DEBU 33da 0xc0033b0120 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.961 UTC [cauthdsl] func2 -> DEBU 33db 0xc0033b0120 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:45.961 UTC [cauthdsl] func2 -> DEBU 33dc 0xc0033b0120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:45.961 UTC [cauthdsl] func2 -> DEBU 33dd 0xc0033b0120 principal evaluation fails" +"2019-04-22 06:17:45.962 UTC [cauthdsl] func1 -> DEBU 33de 0xc0033b0120 gate 1555913865960587800 evaluation fails" +"2019-04-22 06:17:45.962 UTC [policies] Evaluate -> DEBU 33df Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.962 UTC [policies] Evaluate -> DEBU 33e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:45.963 UTC [policies] Evaluate -> DEBU 33e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:45.963 UTC [cauthdsl] func1 -> DEBU 33e2 0xc0033b09a0 gate 1555913865963453200 evaluation starts" +"2019-04-22 06:17:45.963 UTC [cauthdsl] func2 -> DEBU 33e3 0xc0033b09a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:45.964 UTC [cauthdsl] func2 -> DEBU 33e4 0xc0033b09a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:45.964 UTC [cauthdsl] func2 -> DEBU 33e5 0xc0033b09a0 principal matched by identity 0" +"2019-04-22 06:17:45.964 UTC [msp.identity] Verify -> DEBU 33e6 Verify: digest = 00000000 42 42 78 03 07 fc 59 4d d4 4e 27 d4 95 0a 6e b6 |BBx...YM.N'...n.| +00000010 90 71 93 50 b1 f5 2f 19 65 a8 12 0e 71 5a ad 17 |.q.P../.e...qZ..|" +"2019-04-22 06:17:45.965 UTC [msp.identity] Verify -> DEBU 33e7 Verify: sig = 00000000 30 44 02 20 33 32 f8 90 d0 85 d4 4a f4 4e a9 6a |0D. 32.....J.N.j| +00000010 d5 b7 c1 32 bb 0a 9a b2 5b 17 24 fe a5 b4 6e 13 |...2....[.$...n.| +00000020 d6 be c6 91 02 20 71 ca 9b 81 ca 39 73 d6 fb 43 |..... q....9s..C| +00000030 09 1b 49 79 ce 5a c8 eb 25 d9 07 5f 41 19 57 52 |..Iy.Z..%.._A.WR| +00000040 ac 8d 0f 4b 0e 51 |...K.Q|" +"2019-04-22 06:17:45.965 UTC [cauthdsl] func2 -> DEBU 33e8 0xc0033b09a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:45.965 UTC [cauthdsl] func1 -> DEBU 33e9 0xc0033b09a0 gate 1555913865963453200 evaluation succeeds" +"2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33ea Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33ec Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:45.965 UTC [policies] Evaluate -> DEBU 33ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:45.965 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 33ee constructing new tx simulator" +"2019-04-22 06:17:45.965 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 33ef constructing new tx simulator txid = [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +"2019-04-22 06:17:45.965 UTC [endorser] SimulateProposal -> DEBU 33f0 [businesschannel][712f3a97] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.965 UTC [stateleveldb] GetState -> DEBU 33f1 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.965 UTC [endorser] callChaincode -> INFO 33f2 [businesschannel][712f3a97] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.965 UTC [stateleveldb] GetState -> DEBU 33f3 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:45.965 UTC [stateleveldb] GetState -> DEBU 33f4 GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:45.965 UTC [chaincode] Execute -> DEBU 33f5 Entry" +"2019-04-22 06:17:45.967 UTC [chaincode] handleMessage -> DEBU 33f6 [712f3a97] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:45.968 UTC [chaincode] HandleTransaction -> DEBU 33f7 [712f3a97] handling GET_STATE from chaincode" +"2019-04-22 06:17:45.968 UTC [chaincode] HandleGetState -> DEBU 33f8 [712f3a97] getting state for chaincode exp02, key a, channel businesschannel" +"2019-04-22 06:17:45.969 UTC [stateleveldb] GetState -> DEBU 33f9 GetState(). ns=exp02, key=a" +"2019-04-22 06:17:45.969 UTC [chaincode] HandleTransaction -> DEBU 33fa [712f3a97] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:45.971 UTC [chaincode] handleMessage -> DEBU 33fb [712f3a97] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:45.971 UTC [chaincode] Notify -> DEBU 33fc [712f3a97] notifying Txid:712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064, channelID:businesschannel" +"2019-04-22 06:17:45.971 UTC [chaincode] Execute -> DEBU 33fd Exit" +"2019-04-22 06:17:45.971 UTC [endorser] callChaincode -> INFO 33fe [businesschannel][712f3a97] Exit chaincode: name:"exp02" (6ms)" +"2019-04-22 06:17:45.972 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 33ff Simulation completed, getting simulation results" +"2019-04-22 06:17:45.972 UTC [lockbasedtxmgr] Done -> DEBU 3400 Done with transaction simulation / query execution [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +"2019-04-22 06:17:45.972 UTC [endorser] SimulateProposal -> DEBU 3401 [businesschannel][712f3a97] Exit" +"2019-04-22 06:17:45.973 UTC [endorser] endorseProposal -> DEBU 3402 [businesschannel][712f3a97] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:45.973 UTC [endorser] endorseProposal -> DEBU 3403 [businesschannel][712f3a97] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:45.973 UTC [endorser] EndorseWithPlugin -> DEBU 3404 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064, chaincode: exp02}" +"2019-04-22 06:17:45.973 UTC [msp.identity] Sign -> DEBU 3405 Sign: plaintext: 0A20CAAE120FBB15FA307BBA3E6F11AC...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:45.973 UTC [msp.identity] Sign -> DEBU 3406 Sign: digest: B35022629B1913E61011FA4DFF6C94D3781B2EDC504A32BF9364B92CCC3CD1FC " +"2019-04-22 06:17:45.974 UTC [endorser] EndorseWithPlugin -> DEBU 3407 Exiting {plugin: escc, channel: businesschannel, tx: 712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064, chaincode: exp02}" +"2019-04-22 06:17:45.974 UTC [endorser] endorseProposal -> DEBU 3408 [businesschannel][712f3a97] Exit" +"2019-04-22 06:17:45.974 UTC [lockbasedtxmgr] Done -> DEBU 3409 Done with transaction simulation / query execution [712f3a97b6409f2c1788e6f9b289bfdaa787e39279c80341a5262474b6b15064]" +"2019-04-22 06:17:45.974 UTC [endorser] func1 -> DEBU 340a Exit: request from 192.168.224.9:49320" +"2019-04-22 06:17:45.974 UTC [comm.grpc.server] 1 -> INFO 340b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49320 grpc.code=OK grpc.call_duration=21.6968ms +"2019-04-22 06:17:45.979 UTC [grpc] infof -> DEBU 340c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:45.980 UTC [grpc] infof -> DEBU 340d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:46.116 UTC [gossip.comm] func1 -> DEBU 340e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:46.116 UTC [gossip.gossip] handleMessage -> DEBU 340f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:46.116 UTC [gossip.gossip] handleMessage -> DEBU 3410 Exiting" +"2019-04-22 06:17:46.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3411 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:46.116 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3412 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3413 Verify: digest = 00000000 05 c3 c7 b9 f0 f8 3c d5 39 65 1a b1 ed 64 b5 19 |......<.9e...d..| +00000010 43 d2 0a dd 0a bb 4a a9 24 86 ac 12 31 da 50 a7 |C.....J.$...1.P.|" +"2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3414 Verify: sig = 00000000 30 44 02 20 4b c7 64 3d c4 62 c2 38 2a cc 6e 2f |0D. K.d=.b.8*.n/| +00000010 6b 42 a9 16 f8 10 28 92 2c 5a ee 78 65 3b 66 b7 |kB....(.,Z.xe;f.| +00000020 1f 6e c1 5d 02 20 10 7b 6a 49 58 a9 b1 c7 0e db |.n.]. .{jIX.....| +00000030 7d b5 0e 23 fb 7c ca 9f a9 47 7e 89 e0 a8 a0 77 |}..#.|...G~....w| +00000040 25 09 e4 5e 59 9d |%..^Y.|" +"2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3415 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:46.117 UTC [msp.identity] Verify -> DEBU 3416 Verify: sig = 00000000 30 45 02 21 00 85 d9 8b cb 67 35 71 fd 0d 28 d3 |0E.!.....g5q..(.| +00000010 5b 5c 45 74 70 6e 11 2f 6a 7d 4f 23 f4 5c 44 1f |[\Etpn./j}O#.\D.| +00000020 7b be 65 0e b7 02 20 3d 27 3a bd 86 cd 6b e5 b4 |{.e... =':...k..| +00000030 be 47 96 f3 62 39 57 b8 13 b2 32 6d 9c 96 28 11 |.G..b9W...2m..(.| +00000040 34 1c a8 8c e3 bb f8 |4......|" +"2019-04-22 06:17:46.118 UTC [gossip.discovery] handleAliveMessage -> DEBU 3417 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3418 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 3419 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 " +"2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 341a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 " +"2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 341b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:46.118 UTC [gossip.discovery] learnExistingMembers -> DEBU 341c Exiting" +"2019-04-22 06:17:46.119 UTC [gossip.discovery] handleAliveMessage -> DEBU 341d Exiting" +"2019-04-22 06:17:46.119 UTC [gossip.discovery] handleMsgFromComm -> DEBU 341e Exiting" +"2019-04-22 06:17:46.125 UTC [msp] DeserializeIdentity -> DEBU 341f Obtaining identity" +"2019-04-22 06:17:46.127 UTC [msp] DeserializeIdentity -> DEBU 3420 Obtaining identity" +"2019-04-22 06:17:46.128 UTC [msp] DeserializeIdentity -> DEBU 3421 Obtaining identity" +"2019-04-22 06:17:46.128 UTC [gossip.comm] Send -> DEBU 3422 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:46.129 UTC [msp] DeserializeIdentity -> DEBU 3423 Obtaining identity" +"2019-04-22 06:17:46.129 UTC [gossip.comm] Send -> DEBU 3424 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3425 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3426 Exiting" +"2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3427 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.130 UTC [gossip.comm] sendToEndpoint -> DEBU 3428 Exiting" +"2019-04-22 06:17:46.132 UTC [gossip.gossip] handleMessage -> DEBU 3429 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.132 UTC [gossip.gossip] handleMessage -> DEBU 342a Exiting" +"2019-04-22 06:17:46.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 342b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.132 UTC [gossip.discovery] handleMsgFromComm -> DEBU 342c Exiting" +"2019-04-22 06:17:46.133 UTC [gossip.comm] func1 -> DEBU 342d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.133 UTC [gossip.gossip] handleMessage -> DEBU 342e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.133 UTC [gossip.gossip] handleMessage -> DEBU 342f Exiting" +"2019-04-22 06:17:46.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3430 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.134 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3431 Exiting" +"2019-04-22 06:17:46.462 UTC [gossip.election] waitForInterrupt -> DEBU 3432 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:46.462 UTC [gossip.election] IsLeader -> DEBU 3433 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:46.463 UTC [msp.identity] Sign -> DEBU 3434 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100E1801 " +"2019-04-22 06:17:46.463 UTC [msp.identity] Sign -> DEBU 3435 Sign: digest: FB461425A732562E10E66A946BC4934FDD4418C08235B9225556954F31EA9994 " +"2019-04-22 06:17:46.464 UTC [gossip.election] waitForInterrupt -> DEBU 3436 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:46.466 UTC [msp] DeserializeIdentity -> DEBU 3437 Obtaining identity" +"2019-04-22 06:17:46.466 UTC [msp] DeserializeIdentity -> DEBU 3438 Obtaining identity" +"2019-04-22 06:17:46.467 UTC [msp] DeserializeIdentity -> DEBU 3439 Obtaining identity" +"2019-04-22 06:17:46.467 UTC [msp] DeserializeIdentity -> DEBU 343a Obtaining identity" +"2019-04-22 06:17:46.467 UTC [gossip.comm] Send -> DEBU 343b Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:46.468 UTC [msp] DeserializeIdentity -> DEBU 343c Obtaining identity" +"2019-04-22 06:17:46.468 UTC [gossip.comm] sendToEndpoint -> DEBU 343d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:14 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:17:46.468 UTC [gossip.comm] sendToEndpoint -> DEBU 343e Exiting" +"2019-04-22 06:17:46.468 UTC [msp] DeserializeIdentity -> DEBU 343f Obtaining identity" +"2019-04-22 06:17:46.611 UTC [gossip.comm] func1 -> DEBU 3440 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.611 UTC [gossip.gossip] handleMessage -> DEBU 3441 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.611 UTC [gossip.gossip] handleMessage -> DEBU 3442 Exiting" +"2019-04-22 06:17:46.612 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3443 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.612 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3444 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:46.612 UTC [msp] DeserializeIdentity -> DEBU 3445 Obtaining identity" +"2019-04-22 06:17:46.612 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3446 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:46.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3447 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:46.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3448 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:46.613 UTC [policies] Evaluate -> DEBU 3449 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:46.613 UTC [policies] Evaluate -> DEBU 344a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:46.613 UTC [policies] Evaluate -> DEBU 344b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:46.613 UTC [cauthdsl] func1 -> DEBU 344c 0xc003641760 gate 1555913866613754300 evaluation starts" +"2019-04-22 06:17:46.614 UTC [cauthdsl] func2 -> DEBU 344d 0xc003641760 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:46.614 UTC [cauthdsl] func2 -> DEBU 344e 0xc003641760 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:46.614 UTC [cauthdsl] func2 -> DEBU 344f 0xc003641760 principal matched by identity 0" +"2019-04-22 06:17:46.614 UTC [msp.identity] Verify -> DEBU 3450 Verify: digest = 00000000 1f 29 8b c3 95 7c cf df a5 50 4b dd 2c 8a 66 8e |.)...|...PK.,.f.| +00000010 f3 9f ee 64 a1 4f cc dd 13 ba bc 48 7d e4 1a 70 |...d.O.....H}..p|" +"2019-04-22 06:17:46.614 UTC [msp.identity] Verify -> DEBU 3451 Verify: sig = 00000000 30 45 02 21 00 c6 e4 36 05 5c f1 c3 91 88 65 73 |0E.!...6.\....es| +00000010 06 29 42 f8 a2 54 32 9f 0c a3 30 0e c8 85 76 c5 |.)B..T2...0...v.| +00000020 0c 2a b6 b8 7b 02 20 07 5b 4e b0 84 25 50 7a 8a |.*..{. .[N..%Pz.| +00000030 40 05 bd 03 7f 96 2f b0 0e 47 fb 82 8d 5a 83 6b |@...../..G...Z.k| +00000040 46 37 43 33 6b e9 a7 |F7C3k..|" +"2019-04-22 06:17:46.615 UTC [cauthdsl] func2 -> DEBU 3452 0xc003641760 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:46.615 UTC [cauthdsl] func1 -> DEBU 3453 0xc003641760 gate 1555913866613754300 evaluation succeeds" +"2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3454 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3455 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3456 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:46.615 UTC [policies] Evaluate -> DEBU 3457 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:46.616 UTC [gossip.discovery] handleAliveMessage -> DEBU 3458 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 3459 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 345a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 " +"2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 345b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 " +"2019-04-22 06:17:46.616 UTC [gossip.discovery] learnExistingMembers -> DEBU 345c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:46.617 UTC [gossip.discovery] learnExistingMembers -> DEBU 345d Exiting" +"2019-04-22 06:17:46.617 UTC [gossip.discovery] handleAliveMessage -> DEBU 345e Exiting" +"2019-04-22 06:17:46.617 UTC [gossip.discovery] handleMsgFromComm -> DEBU 345f Exiting" +"2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3460 Obtaining identity" +"2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3461 Obtaining identity" +"2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3462 Obtaining identity" +"2019-04-22 06:17:46.620 UTC [msp] DeserializeIdentity -> DEBU 3463 Obtaining identity" +"2019-04-22 06:17:46.621 UTC [msp] DeserializeIdentity -> DEBU 3464 Obtaining identity" +"2019-04-22 06:17:46.621 UTC [msp] DeserializeIdentity -> DEBU 3465 Obtaining identity" +"2019-04-22 06:17:46.621 UTC [msp] DeserializeIdentity -> DEBU 3466 Obtaining identity" +"2019-04-22 06:17:46.621 UTC [gossip.comm] Send -> DEBU 3467 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:46.622 UTC [msp] DeserializeIdentity -> DEBU 3468 Obtaining identity" +"2019-04-22 06:17:46.622 UTC [gossip.comm] Send -> DEBU 3469 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:46.622 UTC [gossip.comm] sendToEndpoint -> DEBU 346a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.623 UTC [gossip.comm] sendToEndpoint -> DEBU 346b Exiting" +"2019-04-22 06:17:46.623 UTC [gossip.comm] sendToEndpoint -> DEBU 346c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.623 UTC [gossip.comm] sendToEndpoint -> DEBU 346d Exiting" +"2019-04-22 06:17:46.626 UTC [gossip.comm] func1 -> DEBU 346e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.627 UTC [gossip.gossip] handleMessage -> DEBU 346f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.627 UTC [gossip.gossip] handleMessage -> DEBU 3470 Exiting" +"2019-04-22 06:17:46.627 UTC [gossip.gossip] handleMessage -> DEBU 3471 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3472 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3473 Exiting" +"2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3474 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.628 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3476 Exiting" +"2019-04-22 06:17:46.628 UTC [gossip.gossip] handleMessage -> DEBU 3475 Exiting" +"2019-04-22 06:17:46.889 UTC [gossip.pull] Hello -> DEBU 3477 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:46.889 UTC [gossip.comm] Send -> DEBU 3478 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:46.890 UTC [gossip.pull] Hello -> DEBU 3479 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:46.890 UTC [gossip.comm] Send -> DEBU 347a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:46.891 UTC [gossip.pull] Hello -> DEBU 347b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:46.891 UTC [gossip.comm] Send -> DEBU 347c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:46.891 UTC [gossip.comm] sendToEndpoint -> DEBU 347d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 347f Exiting" +"2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 3480 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 3481 Exiting" +"2019-04-22 06:17:46.891 UTC [gossip.comm] sendToEndpoint -> DEBU 347e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 3482 Exiting" +"2019-04-22 06:17:46.894 UTC [gossip.gossip] handleMessage -> DEBU 3483 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 930328961521754731 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.895 UTC [gossip.pull] HandleMessage -> DEBU 3484 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 930328961521754731 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.895 UTC [gossip.gossip] handleMessage -> DEBU 3485 Exiting" +"2019-04-22 06:17:46.895 UTC [gossip.comm] func1 -> DEBU 3486 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11920708010404410007 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.896 UTC [gossip.gossip] handleMessage -> DEBU 3487 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11920708010404410007 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.896 UTC [gossip.pull] HandleMessage -> DEBU 3488 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11920708010404410007 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.896 UTC [gossip.gossip] handleMessage -> DEBU 348a Exiting" +"2019-04-22 06:17:46.895 UTC [gossip.comm] func1 -> DEBU 3489 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11284758355672084754 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.896 UTC [gossip.gossip] handleMessage -> DEBU 348b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11284758355672084754 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.897 UTC [gossip.pull] HandleMessage -> DEBU 348c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 11284758355672084754 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.897 UTC [gossip.gossip] handleMessage -> DEBU 348d Exiting" +"2019-04-22 06:17:46.940 UTC [msp.identity] Sign -> DEBU 348e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102C " +"2019-04-22 06:17:46.940 UTC [msp.identity] Sign -> DEBU 348f Sign: digest: 3C12306F00110699A9FF86FF0777B77A3EB9CDC6E16C8B510661D8062E29B38F " +"2019-04-22 06:17:46.940 UTC [msp.identity] Sign -> DEBU 3490 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:46.941 UTC [msp.identity] Sign -> DEBU 3491 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:46.941 UTC [msp] DeserializeIdentity -> DEBU 3492 Obtaining identity" +"2019-04-22 06:17:46.941 UTC [gossip.comm] Send -> DEBU 3493 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:46.942 UTC [gossip.comm] Send -> DEBU 3494 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:46.942 UTC [msp] DeserializeIdentity -> DEBU 3495 Obtaining identity" +"2019-04-22 06:17:46.943 UTC [gossip.comm] Send -> DEBU 3496 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:46.943 UTC [gossip.comm] sendToEndpoint -> DEBU 3497 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.944 UTC [gossip.comm] sendToEndpoint -> DEBU 3499 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.943 UTC [gossip.comm] sendToEndpoint -> DEBU 349a Exiting" +"2019-04-22 06:17:46.944 UTC [gossip.comm] sendToEndpoint -> DEBU 349b Exiting" +"2019-04-22 06:17:46.943 UTC [gossip.comm] sendToEndpoint -> DEBU 3498 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.945 UTC [gossip.comm] sendToEndpoint -> DEBU 349c Exiting" +"2019-04-22 06:17:46.950 UTC [gossip.gossip] handleMessage -> DEBU 349d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.951 UTC [gossip.gossip] handleMessage -> DEBU 349e Exiting" +"2019-04-22 06:17:46.951 UTC [gossip.discovery] handleMsgFromComm -> DEBU 349f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34a0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:46.951 UTC [msp.identity] Verify -> DEBU 34a1 Verify: digest = 00000000 3c 12 30 6f 00 11 06 99 a9 ff 86 ff 07 77 b7 7a |<.0o.........w.z| +00000010 3e b9 cd c6 e1 6c 8b 51 06 61 d8 06 2e 29 b3 8f |>....l.Q.a...)..|" +"2019-04-22 06:17:46.951 UTC [msp.identity] Verify -> DEBU 34a2 Verify: sig = 00000000 30 45 02 21 00 93 70 8d a2 3e 0b 03 e0 09 6b 60 |0E.!..p..>....k`| +00000010 c0 2a a0 b5 0b 13 5f 2f d2 5b b3 cd 31 64 20 26 |.*...._/.[..1d &| +00000020 c0 2d 4d 65 e4 02 20 03 10 19 17 e9 0e 74 81 11 |.-Me.. ......t..| +00000030 27 33 1d 03 30 66 a4 4b 46 38 b8 45 8c 47 39 0c |'3..0f.KF8.E.G9.| +00000040 02 1b 93 76 5e ab af |...v^..|" +"2019-04-22 06:17:46.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.952 UTC [gossip.discovery] isSentByMe -> DEBU 34a4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a5 Exiting" +"2019-04-22 06:17:46.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a6 Exiting" +"2019-04-22 06:17:46.953 UTC [gossip.comm] func1 -> DEBU 34a7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.953 UTC [gossip.gossip] handleMessage -> DEBU 34a8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.953 UTC [gossip.gossip] handleMessage -> DEBU 34a9 Exiting" +"2019-04-22 06:17:46.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34aa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34ab Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:46.954 UTC [msp.identity] Verify -> DEBU 34ac Verify: digest = 00000000 3c 12 30 6f 00 11 06 99 a9 ff 86 ff 07 77 b7 7a |<.0o.........w.z| +00000010 3e b9 cd c6 e1 6c 8b 51 06 61 d8 06 2e 29 b3 8f |>....l.Q.a...)..|" +"2019-04-22 06:17:46.954 UTC [msp.identity] Verify -> DEBU 34ad Verify: sig = 00000000 30 45 02 21 00 93 70 8d a2 3e 0b 03 e0 09 6b 60 |0E.!..p..>....k`| +00000010 c0 2a a0 b5 0b 13 5f 2f d2 5b b3 cd 31 64 20 26 |.*...._/.[..1d &| +00000020 c0 2d 4d 65 e4 02 20 03 10 19 17 e9 0e 74 81 11 |.-Me.. ......t..| +00000030 27 33 1d 03 30 66 a4 4b 46 38 b8 45 8c 47 39 0c |'3..0f.KF8.E.G9.| +00000040 02 1b 93 76 5e ab af |...v^..|" +"2019-04-22 06:17:46.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ae Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.958 UTC [gossip.discovery] isSentByMe -> DEBU 34af Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 34b0 Exiting" +"2019-04-22 06:17:46.958 UTC [gossip.comm] func1 -> DEBU 34b1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.958 UTC [gossip.gossip] handleMessage -> DEBU 34b2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34b3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:46.959 UTC [msp] DeserializeIdentity -> DEBU 34b4 Obtaining identity" +"2019-04-22 06:17:46.960 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:46.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:46.960 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:46.960 UTC [policies] Evaluate -> DEBU 34b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:46.960 UTC [policies] Evaluate -> DEBU 34b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:46.961 UTC [policies] Evaluate -> DEBU 34ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:46.961 UTC [cauthdsl] func1 -> DEBU 34bb 0xc0024c21c0 gate 1555913866961490200 evaluation starts" +"2019-04-22 06:17:46.961 UTC [cauthdsl] func2 -> DEBU 34bc 0xc0024c21c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:46.962 UTC [cauthdsl] func2 -> DEBU 34bd 0xc0024c21c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:46.962 UTC [cauthdsl] func2 -> DEBU 34be 0xc0024c21c0 principal matched by identity 0" +"2019-04-22 06:17:46.963 UTC [msp.identity] Verify -> DEBU 34bf Verify: digest = 00000000 c5 03 28 5b b1 c4 79 e0 6e 5b 64 2a a2 b1 91 97 |..([..y.n[d*....| +00000010 04 89 f4 9a b4 7a 81 d9 37 d4 a3 5e a7 ac e7 a2 |.....z..7..^....|" +"2019-04-22 06:17:46.963 UTC [msp.identity] Verify -> DEBU 34c0 Verify: sig = 00000000 30 45 02 21 00 81 4b 28 ef fa d2 54 5f 3d 89 29 |0E.!..K(...T_=.)| +00000010 ba c9 ac 9e bc 84 0c 75 02 79 e5 96 bd c4 d0 50 |.......u.y.....P| +00000020 2b 4d b8 41 18 02 20 78 47 10 cb 00 bd 99 f8 c4 |+M.A.. xG.......| +00000030 44 89 b4 01 43 75 f1 d3 93 8d b6 71 e6 f8 72 d3 |D...Cu.....q..r.| +00000040 6c 26 a0 92 57 dd 70 |l&..W.p|" +"2019-04-22 06:17:46.964 UTC [cauthdsl] func2 -> DEBU 34c1 0xc0024c21c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:46.964 UTC [cauthdsl] func1 -> DEBU 34c2 0xc0024c21c0 gate 1555913866961490200 evaluation succeeds" +"2019-04-22 06:17:46.964 UTC [policies] Evaluate -> DEBU 34c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:46.965 UTC [policies] Evaluate -> DEBU 34c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:46.965 UTC [policies] Evaluate -> DEBU 34c5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:46.965 UTC [policies] Evaluate -> DEBU 34c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:46.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 34c7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:46.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 34c8 Exiting" +"2019-04-22 06:17:46.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34c9 Exiting" +"2019-04-22 06:17:46.966 UTC [gossip.gossip] handleMessage -> DEBU 34ca Exiting" +"2019-04-22 06:17:46.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34cb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:46.966 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34cc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:46.967 UTC [msp.identity] Verify -> DEBU 34cd Verify: digest = 00000000 3c 12 30 6f 00 11 06 99 a9 ff 86 ff 07 77 b7 7a |<.0o.........w.z| +00000010 3e b9 cd c6 e1 6c 8b 51 06 61 d8 06 2e 29 b3 8f |>....l.Q.a...)..|" +"2019-04-22 06:17:46.967 UTC [msp.identity] Verify -> DEBU 34ce Verify: sig = 00000000 30 45 02 21 00 93 70 8d a2 3e 0b 03 e0 09 6b 60 |0E.!..p..>....k`| +00000010 c0 2a a0 b5 0b 13 5f 2f d2 5b b3 cd 31 64 20 26 |.*...._/.[..1d &| +00000020 c0 2d 4d 65 e4 02 20 03 10 19 17 e9 0e 74 81 11 |.-Me.. ......t..| +00000030 27 33 1d 03 30 66 a4 4b 46 38 b8 45 8c 47 39 0c |'3..0f.KF8.E.G9.| +00000040 02 1b 93 76 5e ab af |...v^..|" +"2019-04-22 06:17:46.968 UTC [msp.identity] Verify -> DEBU 34cf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:46.969 UTC [msp.identity] Verify -> DEBU 34d0 Verify: sig = 00000000 30 44 02 20 7c cc 7a 74 3f 79 8e 87 c9 d7 4d 94 |0D. |.zt?y....M.| +00000010 d2 d2 37 58 bf a4 2c 5a ac 71 96 01 55 51 82 b0 |..7X..,Z.q..UQ..| +00000020 68 52 4e c4 02 20 4e ec 90 ad 28 e7 88 b1 1b e5 |hRN.. N...(.....| +00000030 18 7a da 3e e1 26 54 a8 11 91 78 19 7d ee d5 c4 |.z.>.&T...x.}...| +00000040 79 99 ae 7c d9 8e |y..|..|" +"2019-04-22 06:17:46.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 34d1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:46.970 UTC [gossip.discovery] isSentByMe -> DEBU 34d2 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:44 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:46.970 UTC [gossip.discovery] handleAliveMessage -> DEBU 34d3 Exiting" +"2019-04-22 06:17:46.970 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d4 Exiting" +"2019-04-22 06:17:47.029 UTC [gossip.gossip] handleMessage -> DEBU 34d5 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.029 UTC [gossip.gossip] handleMessage -> DEBU 34d6 Exiting" +"2019-04-22 06:17:47.029 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.030 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34d8 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:47.030 UTC [msp] DeserializeIdentity -> DEBU 34d9 Obtaining identity" +"2019-04-22 06:17:47.031 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34da Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:47.031 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34db Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:47.031 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34dc Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:47.031 UTC [policies] Evaluate -> DEBU 34dd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:47.031 UTC [policies] Evaluate -> DEBU 34de This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:47.032 UTC [policies] Evaluate -> DEBU 34df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:47.032 UTC [cauthdsl] func1 -> DEBU 34e0 0xc0039dde60 gate 1555913867032369400 evaluation starts" +"2019-04-22 06:17:47.032 UTC [cauthdsl] func2 -> DEBU 34e1 0xc0039dde60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:47.032 UTC [cauthdsl] func2 -> DEBU 34e2 0xc0039dde60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:47.032 UTC [cauthdsl] func2 -> DEBU 34e3 0xc0039dde60 principal matched by identity 0" +"2019-04-22 06:17:47.032 UTC [msp.identity] Verify -> DEBU 34e4 Verify: digest = 00000000 db f3 cc 6a 4c 39 95 76 79 c4 8b 23 59 11 57 d2 |...jL9.vy..#Y.W.| +00000010 e5 77 79 fb 45 47 74 b4 ed ef ed 6d 94 19 40 ee |.wy.EGt....m..@.|" +"2019-04-22 06:17:47.033 UTC [msp.identity] Verify -> DEBU 34e5 Verify: sig = 00000000 30 44 02 20 21 f5 5f d7 cc 6c a3 35 d0 26 cb 80 |0D. !._..l.5.&..| +00000010 7f c0 e8 ab fc c7 da 7a 7d 9f 45 5c d8 85 1e 6e |.......z}.E\...n| +00000020 82 77 b7 19 02 20 1b d3 0d fb ea be d6 f3 be 14 |.w... ..........| +00000030 07 b0 46 4f 09 d3 65 1d ef 27 0f 81 b4 6b 0a b9 |..FO..e..'...k..| +00000040 c8 05 c7 78 94 f9 |...x..|" +"2019-04-22 06:17:47.033 UTC [cauthdsl] func2 -> DEBU 34e6 0xc0039dde60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:47.033 UTC [cauthdsl] func1 -> DEBU 34e7 0xc0039dde60 gate 1555913867032369400 evaluation succeeds" +"2019-04-22 06:17:47.033 UTC [policies] Evaluate -> DEBU 34e8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:47.034 UTC [policies] Evaluate -> DEBU 34e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:47.034 UTC [policies] Evaluate -> DEBU 34ea Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:47.034 UTC [policies] Evaluate -> DEBU 34eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:47.035 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ec Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 34ed Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:47.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 34ee updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 " +"2019-04-22 06:17:47.037 UTC [gossip.discovery] learnExistingMembers -> DEBU 34ef Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 " +"2019-04-22 06:17:47.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 34f0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:43 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:47.038 UTC [gossip.discovery] learnExistingMembers -> DEBU 34f1 Exiting" +"2019-04-22 06:17:47.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 34f2 Exiting" +"2019-04-22 06:17:47.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34f3 Exiting" +"2019-04-22 06:17:47.038 UTC [msp] DeserializeIdentity -> DEBU 34f4 Obtaining identity" +"2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f5 Obtaining identity" +"2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f6 Obtaining identity" +"2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f7 Obtaining identity" +"2019-04-22 06:17:47.039 UTC [msp] DeserializeIdentity -> DEBU 34f8 Obtaining identity" +"2019-04-22 06:17:47.040 UTC [msp] DeserializeIdentity -> DEBU 34f9 Obtaining identity" +"2019-04-22 06:17:47.040 UTC [msp] DeserializeIdentity -> DEBU 34fa Obtaining identity" +"2019-04-22 06:17:47.040 UTC [gossip.comm] Send -> DEBU 34fb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:47.040 UTC [msp] DeserializeIdentity -> DEBU 34fc Obtaining identity" +"2019-04-22 06:17:47.040 UTC [gossip.comm] Send -> DEBU 34fd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 34fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 34ff Exiting" +"2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3500 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3501 Exiting" +"2019-04-22 06:17:47.042 UTC [gossip.comm] func1 -> DEBU 3502 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.042 UTC [gossip.gossip] handleMessage -> DEBU 3503 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.042 UTC [gossip.gossip] handleMessage -> DEBU 3504 Exiting" +"2019-04-22 06:17:47.042 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3505 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3506 Exiting" +"2019-04-22 06:17:47.043 UTC [gossip.comm] func1 -> DEBU 3507 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.043 UTC [gossip.gossip] handleMessage -> DEBU 3508 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.044 UTC [gossip.gossip] handleMessage -> DEBU 3509 Exiting" +"2019-04-22 06:17:47.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 350a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:47.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 350b Exiting" +"2019-04-22 06:17:47.141 UTC [gossip.comm] func1 -> DEBU 350c Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.141 UTC [gossip.gossip] handleMessage -> DEBU 350d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.141 UTC [gossip.pull] HandleMessage -> DEBU 350e GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.142 UTC [gossip.pull] SendDigest -> DEBU 350f Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:47.142 UTC [gossip.gossip] handleMessage -> DEBU 3510 Exiting" +"2019-04-22 06:17:47.165 UTC [gossip.comm] func1 -> DEBU 3511 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.165 UTC [gossip.gossip] handleMessage -> DEBU 3512 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3513 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.166 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3514 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:47.165 UTC [gossip.gossip] handleMessage -> DEBU 3515 Exiting" +"2019-04-22 06:17:47.167 UTC [msp.identity] Verify -> DEBU 3516 Verify: digest = 00000000 2b b1 63 6e 73 d8 c5 ee aa d2 82 9b 6f 99 a7 4d |+.cns.......o..M| +00000010 fe c9 bf 86 c9 7f 47 8e fd 35 38 7b 19 26 e6 1d |......G..58{.&..|" +"2019-04-22 06:17:47.167 UTC [msp.identity] Verify -> DEBU 3517 Verify: sig = 00000000 30 45 02 21 00 a5 fe 1f aa f0 5b cc 3f 73 c1 05 |0E.!......[.?s..| +00000010 a2 f6 40 94 7e b5 35 00 ce de 68 f8 b2 df 3c 77 |..@.~.5...h... DEBU 3518 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:47.168 UTC [msp.identity] Verify -> DEBU 3519 Verify: sig = 00000000 30 44 02 20 2c 03 2f 05 26 2f 6c f3 a9 05 e5 fb |0D. ,./.&/l.....| +00000010 97 d8 19 2e 3a d9 9d e4 31 5f d0 b5 10 6b 66 20 |....:...1_...kf | +00000020 41 29 87 56 02 20 34 0d f1 ed bd 19 90 57 1e 4f |A).V. 4......W.O| +00000030 c5 80 f3 2e f7 58 94 b9 df c7 ce e5 89 0f 4e d8 |.....X........N.| +00000040 4e 0c 00 c6 1e 1f |N.....|" +"2019-04-22 06:17:47.168 UTC [gossip.discovery] handleAliveMessage -> DEBU 351a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:47.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 351b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:47.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 351c updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 " +"2019-04-22 06:17:47.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 351d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 " +"2019-04-22 06:17:47.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 351e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:47.170 UTC [gossip.discovery] learnExistingMembers -> DEBU 351f Exiting" +"2019-04-22 06:17:47.171 UTC [gossip.discovery] handleAliveMessage -> DEBU 3520 Exiting" +"2019-04-22 06:17:47.172 UTC [gossip.discovery] sendMemResponse -> DEBU 3521 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:47.172 UTC [msp] DeserializeIdentity -> DEBU 3522 Obtaining identity" +"2019-04-22 06:17:47.172 UTC [msp] DeserializeIdentity -> DEBU 3523 Obtaining identity" +"2019-04-22 06:17:47.173 UTC [gossip.comm] Send -> DEBU 3524 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:47.173 UTC [gossip.discovery] sendMemResponse -> DEBU 3525 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:47.173 UTC [gossip.comm] sendToEndpoint -> DEBU 3526 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.174 UTC [gossip.comm] sendToEndpoint -> DEBU 3527 Exiting" +"2019-04-22 06:17:47.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3528 Exiting" +"2019-04-22 06:17:47.606 UTC [gossip.comm] func1 -> DEBU 3529 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.606 UTC [gossip.gossip] handleMessage -> DEBU 352a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.608 UTC [gossip.pull] HandleMessage -> DEBU 352b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.609 UTC [msp] DeserializeIdentity -> DEBU 352c Obtaining identity" +"2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 352d Obtaining identity" +"2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 352e Obtaining identity" +"2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 352f Obtaining identity" +"2019-04-22 06:17:47.610 UTC [msp] DeserializeIdentity -> DEBU 3530 Obtaining identity" +"2019-04-22 06:17:47.611 UTC [msp] DeserializeIdentity -> DEBU 3531 Obtaining identity" +"2019-04-22 06:17:47.611 UTC [gossip.pull] SendDigest -> DEBU 3532 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:47.611 UTC [gossip.gossip] handleMessage -> DEBU 3533 Exiting" +"2019-04-22 06:17:47.642 UTC [gossip.comm] func1 -> DEBU 3534 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.642 UTC [gossip.gossip] handleMessage -> DEBU 3535 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.642 UTC [gossip.gossip] handleMessage -> DEBU 3536 Exiting" +"2019-04-22 06:17:47.642 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3537 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.643 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3538 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:47.643 UTC [msp] DeserializeIdentity -> DEBU 3539 Obtaining identity" +"2019-04-22 06:17:47.644 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 353a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:47.644 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 353b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:47.644 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 353c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:47.644 UTC [policies] Evaluate -> DEBU 353d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:47.644 UTC [policies] Evaluate -> DEBU 353e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:47.645 UTC [policies] Evaluate -> DEBU 353f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:47.645 UTC [cauthdsl] func1 -> DEBU 3540 0xc003205a70 gate 1555913867645307900 evaluation starts" +"2019-04-22 06:17:47.645 UTC [cauthdsl] func2 -> DEBU 3541 0xc003205a70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:47.645 UTC [cauthdsl] func2 -> DEBU 3542 0xc003205a70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:47.646 UTC [cauthdsl] func2 -> DEBU 3543 0xc003205a70 principal matched by identity 0" +"2019-04-22 06:17:47.646 UTC [msp.identity] Verify -> DEBU 3544 Verify: digest = 00000000 ae a5 a9 8f ea 8d 5d d3 33 2a de 80 86 54 36 87 |......].3*...T6.| +00000010 1b 36 4c 92 a6 76 93 49 0d c4 77 47 28 3c 3b e5 |.6L..v.I..wG(<;.|" +"2019-04-22 06:17:47.646 UTC [msp.identity] Verify -> DEBU 3545 Verify: sig = 00000000 30 45 02 21 00 80 33 4e 3a 4d d8 73 bc e7 b7 64 |0E.!..3N:M.s...d| +00000010 35 f1 07 3e 86 a4 4d 3b 7e 4c cd 90 ff 14 22 32 |5..>..M;~L...."2| +00000020 5c 4e 9e e3 fa 02 20 45 53 7c 0d e2 2a 43 c1 52 |\N.... ES|..*C.R| +00000030 e2 8d 5a 26 64 07 bc 74 be a9 9d 11 1b ef 9b a6 |..Z&d..t........| +00000040 01 74 1c b6 21 55 0b |.t..!U.|" +"2019-04-22 06:17:47.646 UTC [cauthdsl] func2 -> DEBU 3546 0xc003205a70 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:47.647 UTC [cauthdsl] func1 -> DEBU 3547 0xc003205a70 gate 1555913867645307900 evaluation succeeds" +"2019-04-22 06:17:47.647 UTC [policies] Evaluate -> DEBU 3548 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:47.647 UTC [policies] Evaluate -> DEBU 3549 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:47.647 UTC [policies] Evaluate -> DEBU 354a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:47.648 UTC [policies] Evaluate -> DEBU 354b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:47.648 UTC [gossip.discovery] handleAliveMessage -> DEBU 354c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:47.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 354d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:47.648 UTC [gossip.discovery] learnExistingMembers -> DEBU 354e updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 " +"2019-04-22 06:17:47.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 354f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 " +"2019-04-22 06:17:47.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 3550 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:47.649 UTC [gossip.discovery] learnExistingMembers -> DEBU 3551 Exiting" +"2019-04-22 06:17:47.649 UTC [gossip.discovery] handleAliveMessage -> DEBU 3552 Exiting" +"2019-04-22 06:17:47.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3553 Exiting" +"2019-04-22 06:17:47.650 UTC [gossip.discovery] sendMemResponse -> DEBU 3554 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:47.650 UTC [msp] DeserializeIdentity -> DEBU 3555 Obtaining identity" +"2019-04-22 06:17:47.651 UTC [msp] DeserializeIdentity -> DEBU 3556 Obtaining identity" +"2019-04-22 06:17:47.651 UTC [msp] DeserializeIdentity -> DEBU 3557 Obtaining identity" +"2019-04-22 06:17:47.652 UTC [gossip.comm] Send -> DEBU 3558 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:47.652 UTC [gossip.discovery] sendMemResponse -> DEBU 3559 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:47.652 UTC [gossip.comm] sendToEndpoint -> DEBU 355a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.652 UTC [gossip.comm] sendToEndpoint -> DEBU 355b Exiting" +"2019-04-22 06:17:47.788 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 355c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:47.789 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 355d Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:47.789 UTC [policies] Evaluate -> DEBU 355e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:17:47.789 UTC [policies] Evaluate -> DEBU 355f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:47.789 UTC [policies] Evaluate -> DEBU 3560 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:17:47.790 UTC [cauthdsl] func1 -> DEBU 3561 0xc003202af0 gate 1555913867790120300 evaluation starts" +"2019-04-22 06:17:47.790 UTC [cauthdsl] func2 -> DEBU 3562 0xc003202af0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:47.790 UTC [cauthdsl] func2 -> DEBU 3563 0xc003202af0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:47.790 UTC [cauthdsl] func2 -> DEBU 3564 0xc003202af0 principal matched by identity 0" +"2019-04-22 06:17:47.790 UTC [msp.identity] Verify -> DEBU 3565 Verify: digest = 00000000 be eb af ee eb 74 1a 6d d5 30 75 8b f0 28 39 57 |.....t.m.0u..(9W| +00000010 0b 84 ef 8c 35 09 6f 99 19 fb c3 c6 9b b3 d0 04 |....5.o.........|" +"2019-04-22 06:17:47.791 UTC [msp.identity] Verify -> DEBU 3566 Verify: sig = 00000000 30 44 02 20 30 f5 e7 e5 68 e9 76 74 63 35 af 33 |0D. 0...h.vtc5.3| +00000010 70 ea 8f d7 5c 3e 8e 1e 3d 37 0d 19 72 0e fe de |p...\>..=7..r...| +00000020 63 af 00 15 02 20 04 40 9c 09 8e 39 b9 c5 2b 54 |c.... .@...9..+T| +00000030 31 5c fe c0 41 be a3 77 76 f5 47 56 ca 80 2c a5 |1\..A..wv.GV..,.| +00000040 12 31 22 91 69 1f |.1".i.|" +"2019-04-22 06:17:47.791 UTC [cauthdsl] func2 -> DEBU 3567 0xc003202af0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:47.791 UTC [cauthdsl] func1 -> DEBU 3568 0xc003202af0 gate 1555913867790120300 evaluation succeeds" +"2019-04-22 06:17:47.791 UTC [policies] Evaluate -> DEBU 3569 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:47.792 UTC [policies] Evaluate -> DEBU 356a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:17:47.792 UTC [policies] Evaluate -> DEBU 356b Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:47.792 UTC [policies] Evaluate -> DEBU 356c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:17:47.792 UTC [blocksProvider] DeliverBlocks -> DEBU 356d [businesschannel] Adding payload to local buffer, blockNum = [8]" +"2019-04-22 06:17:47.793 UTC [gossip.state] addPayload -> DEBU 356e [businesschannel] Adding payload to local buffer, blockNum = [8]" +"2019-04-22 06:17:47.793 UTC [gossip.state] addPayload -> DEBU 356f Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:17:47.793 UTC [blocksProvider] DeliverBlocks -> DEBU 3571 [businesschannel] Gossiping block [8], peers number [3]" +"2019-04-22 06:17:47.793 UTC [gossip.channel] AddToMsgStore -> DEBU 3572 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 8}, Envelope: 4093 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:17:47.794 UTC [gossip.pull] Add -> DEBU 3573 Added 8, total items: 8" +"2019-04-22 06:17:47.793 UTC [gossip.state] deliverPayloads -> DEBU 3570 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [8]" +"2019-04-22 06:17:47.794 UTC [gossip.state] deliverPayloads -> DEBU 3574 [businesschannel] Transferring block [8] with 1 transaction(s) to the ledger" +"2019-04-22 06:17:47.794 UTC [gossip.privdata] StoreBlock -> INFO 3575 [businesschannel] Received block [8] from buffer" +"2019-04-22 06:17:47.795 UTC [gossip.privdata] StoreBlock -> DEBU 3576 [businesschannel] Validating block [8]" +"2019-04-22 06:17:47.795 UTC [committer.txvalidator] Validate -> DEBU 3577 [businesschannel] START Block Validation for block [8]" +"2019-04-22 06:17:47.795 UTC [committer.txvalidator] Validate -> DEBU 3578 expecting 1 block validation responses" +"2019-04-22 06:17:47.796 UTC [committer.txvalidator] validateTx -> DEBU 3579 [businesschannel] validateTx starts for block 0xc0036ab840 env 0xc002ed6370 txn 0" +"2019-04-22 06:17:47.796 UTC [protoutils] ValidateTransaction -> DEBU 357a ValidateTransactionEnvelope starts for envelope 0xc002ed6370" +"2019-04-22 06:17:47.796 UTC [protoutils] ValidateTransaction -> DEBU 357b Header is channel_header:"\010\003\032\014\010\211\271\365\345\005\020\344\233\310\334\002\"\017businesschannel*@8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030{\017\353\347U\030\214\n\200\262z\315\026\036\277vu(:\204\023\177\000t" " +"2019-04-22 06:17:47.796 UTC [protoutils] validateChannelHeader -> DEBU 357c validateChannelHeader info: header type 3" +"2019-04-22 06:17:47.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 357d begin" +"2019-04-22 06:17:47.797 UTC [msp] GetManagerForChain -> DEBU 357e Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:47.797 UTC [protoutils] checkSignatureFromCreator -> DEBU 357f creator is &{Org2MSP 2ca43972f9c78ac8635f4e9fc3447402a2f66ab7579989ed85aa39bfe725ea12}" +"2019-04-22 06:17:47.797 UTC [protoutils] checkSignatureFromCreator -> DEBU 3580 creator is valid" +"2019-04-22 06:17:47.797 UTC [msp.identity] Verify -> DEBU 3581 Verify: digest = 00000000 f2 d4 db 3b b3 ca 9f 40 f7 11 6c 72 45 c4 67 85 |...;...@..lrE.g.| +00000010 0b 4a 90 ec e8 56 ba 7e 04 cd 72 b3 ed 52 98 aa |.J...V.~..r..R..|" +"2019-04-22 06:17:47.797 UTC [msp.identity] Verify -> DEBU 3582 Verify: sig = 00000000 30 45 02 21 00 d0 3d 02 05 ea 88 3c 8e 0f 48 f1 |0E.!..=....<..H.| +00000010 1e 84 5c ad 57 64 5d b7 51 d6 68 d5 a7 77 f3 c7 |..\.Wd].Q.h..w..| +00000020 6c 95 c1 fb 3a 02 20 69 6d 41 17 6a c3 75 f0 a8 |l...:. imA.j.u..| +00000030 9a 3a 16 27 b5 75 34 43 2f e8 04 c2 fd 9a 2f c1 |.:.'.u4C/...../.| +00000040 39 6c be 0b 61 f4 aa |9l..a..|" +"2019-04-22 06:17:47.798 UTC [protoutils] checkSignatureFromCreator -> DEBU 3583 exits successfully" +"2019-04-22 06:17:47.798 UTC [protoutils] validateEndorserTransaction -> DEBU 3584 validateEndorserTransaction starts for data 0xc003b0e000, header channel_header:"\010\003\032\014\010\211\271\365\345\005\020\344\233\310\334\002\"\017businesschannel*@8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff:\t\022\007\022\005exp02" signature_header:"\n\272\006\n\007Org2MSP\022\256\006-----BEGIN CERTIFICATE-----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\nTN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg==\n-----END CERTIFICATE-----\n\022\030{\017\353\347U\030\214\n\200\262z\315\026\036\277vu(:\204\023\177\000t" " +"2019-04-22 06:17:47.800 UTC [protoutils] validateEndorserTransaction -> DEBU 3585 validateEndorserTransaction info: there are 1 actions" +"2019-04-22 06:17:47.800 UTC [protoutils] validateEndorserTransaction -> DEBU 3586 validateEndorserTransaction info: signature header is valid" +"2019-04-22 06:17:47.800 UTC [protoutils] ValidateTransaction -> DEBU 3587 ValidateTransactionEnvelope returns err %!s()" +"2019-04-22 06:17:47.800 UTC [committer.txvalidator] validateTx -> DEBU 3588 Transaction is for channel businesschannel" +"2019-04-22 06:17:47.800 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3589 retrieveTransactionByID() - txId = [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff]" +"2019-04-22 06:17:47.801 UTC [committer.txvalidator] validateTx -> DEBU 358a Validating transaction with plugins" +"2019-04-22 06:17:47.801 UTC [committer.txvalidator] Dispatch -> DEBU 358b [businesschannel] Dispatch starts for bytes 0xc0039cc000" +"2019-04-22 06:17:47.801 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 358c constructing new query executor txid = [e64f6d81-a11f-4dee-a3d1-a7601285a5b3]" +"2019-04-22 06:17:47.801 UTC [stateleveldb] GetState -> DEBU 358d GetState(). ns=_lifecycle, key=namespaces/metadata/exp02" +"2019-04-22 06:17:47.801 UTC [stateleveldb] GetState -> DEBU 358e GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:47.801 UTC [stateleveldb] GetState -> DEBU 358f GetState(). ns=_lifecycle, key=namespaces/fields/exp02/EndorsementInfo" +"2019-04-22 06:17:47.802 UTC [stateleveldb] GetState -> DEBU 3590 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/ValidationInfo" +"2019-04-22 06:17:47.802 UTC [stateleveldb] GetState -> DEBU 3591 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Collections" +"2019-04-22 06:17:47.802 UTC [lockbasedtxmgr] Done -> DEBU 3592 Done with transaction simulation / query execution [e64f6d81-a11f-4dee-a3d1-a7601285a5b3]" +"2019-04-22 06:17:47.802 UTC [committer.txvalidator] invokeValidationPlugin -> DEBU 3593 Validating Tx 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff, seq 0 out of 1 in block 8 for channel businesschannel with validation plugin vscc with plugin" +"2019-04-22 06:17:47.803 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 3594 constructing new query executor txid = [74ee2544-f5bc-4bf8-a4f1-0c74a8c69741]" +"2019-04-22 06:17:47.803 UTC [lockbasedtxmgr] Done -> DEBU 3595 Done with transaction simulation / query execution [74ee2544-f5bc-4bf8-a4f1-0c74a8c69741]" +"2019-04-22 06:17:47.803 UTC [cauthdsl] func1 -> DEBU 3596 0xc003d075b0 gate 1555913867803417800 evaluation starts" +"2019-04-22 06:17:47.803 UTC [cauthdsl] func2 -> DEBU 3597 0xc003d075b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:47.803 UTC [cauthdsl] func2 -> DEBU 3598 0xc003d075b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:47.805 UTC [cauthdsl] func2 -> DEBU 3599 0xc003d075b0 principal matched by identity 0" +"2019-04-22 06:17:47.805 UTC [msp.identity] Verify -> DEBU 359a Verify: digest = 00000000 f1 0d 3f 56 88 39 37 71 b8 21 29 7f 88 c7 fa b3 |..?V.97q.!).....| +00000010 d5 af 40 0e 4d 66 7b cf 8c 17 7f 74 e2 14 58 03 |..@.Mf{....t..X.|" +"2019-04-22 06:17:47.806 UTC [msp.identity] Verify -> DEBU 359b Verify: sig = 00000000 30 45 02 21 00 dd e8 91 11 ca 7c 77 bd 7a 9f 87 |0E.!......|w.z..| +00000010 70 f9 6c 03 92 5c 52 bc 28 34 62 3a ed 41 35 64 |p.l..\R.(4b:.A5d| +00000020 e2 c6 17 87 8f 02 20 1c 29 c7 2b 40 fa 40 86 90 |...... .).+@.@..| +00000030 7d 85 a8 ba a0 0f ca c3 81 a8 a9 6a 31 7b b2 eb |}..........j1{..| +00000040 bf e7 68 47 87 b0 08 |..hG...|" +"2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359c 0xc003d075b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359d 0xc003d075b0 signed by 1 principal evaluation starts (used [true])" +"2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359e 0xc003d075b0 skipping identity 0 because it has already been used" +"2019-04-22 06:17:47.806 UTC [cauthdsl] func2 -> DEBU 359f 0xc003d075b0 principal evaluation fails" +"2019-04-22 06:17:47.807 UTC [cauthdsl] func1 -> DEBU 35a0 0xc003d075b0 gate 1555913867803417800 evaluation succeeds" +"2019-04-22 06:17:47.807 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 35a1 constructing new query executor txid = [9dd9a316-5635-4d81-b90a-d78530152db1]" +"2019-04-22 06:17:47.809 UTC [lockbasedtxmgr] Done -> DEBU 35a2 Done with transaction simulation / query execution [9dd9a316-5635-4d81-b90a-d78530152db1]" +"2019-04-22 06:17:47.809 UTC [msp] DeserializeIdentity -> DEBU 35a3 Obtaining identity" +"2019-04-22 06:17:47.810 UTC [msp] DeserializeIdentity -> DEBU 35a4 Obtaining identity" +"2019-04-22 06:17:47.810 UTC [msp] DeserializeIdentity -> DEBU 35a5 Obtaining identity" +"2019-04-22 06:17:47.810 UTC [msp] DeserializeIdentity -> DEBU 35a6 Obtaining identity" +"2019-04-22 06:17:47.811 UTC [gossip.comm] Send -> DEBU 35a7 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 8}, Envelope: 4093 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:47.812 UTC [msp] DeserializeIdentity -> DEBU 35a8 Obtaining identity" +"2019-04-22 06:17:47.812 UTC [msp] DeserializeIdentity -> DEBU 35a9 Obtaining identity" +"2019-04-22 06:17:47.812 UTC [gossip.comm] sendToEndpoint -> DEBU 35aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4063 bytes, seq: 8}, Envelope: 4093 bytes, Signature: 0 bytes" +"2019-04-22 06:17:47.813 UTC [gossip.comm] sendToEndpoint -> DEBU 35ab Exiting" +"2019-04-22 06:17:47.811 UTC [vscc] Validate -> DEBU 35ac block 8, namespace: exp02, tx 0 validation results is: " +"2019-04-22 06:17:47.825 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 35ad Transaction 8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff appears to be valid" +"2019-04-22 06:17:47.826 UTC [committer.txvalidator] Dispatch -> DEBU 35ae [businesschannel] Dispatch completes env bytes 0xc0039cc000" +"2019-04-22 06:17:47.827 UTC [committer.txvalidator] validateTx -> DEBU 35af [businesschannel] validateTx completes for block 0xc0036ab840 env 0xc002ed6370 txn 0" +"2019-04-22 06:17:47.827 UTC [committer.txvalidator] Validate -> DEBU 35b0 got result for idx 0, code 0" +"2019-04-22 06:17:47.832 UTC [committer.txvalidator] Validate -> INFO 35b1 [businesschannel] Validated block [8] in 31ms" +"2019-04-22 06:17:47.839 UTC [gossip.privdata] listMissingPrivateData -> DEBU 35b2 Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:17:47.840 UTC [gossip.privdata] StoreBlock -> DEBU 35b3 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:17:47.842 UTC [kvledger] CommitWithPvtData -> DEBU 35b4 [businesschannel] Validating state for block [8]" +"2019-04-22 06:17:47.844 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 35b5 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:17:47.844 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 35b6 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:17:47.849 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 35b7 Validating new block with num trans = [1]" +"2019-04-22 06:17:47.850 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35b8 ValidateAndPrepareBatch() for block number = [8]" +"2019-04-22 06:17:47.850 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35b9 preprocessing ProtoBlock..." +"2019-04-22 06:17:47.851 UTC [valimpl] preprocessProtoBlock -> DEBU 35ba txType=ENDORSER_TRANSACTION" +"2019-04-22 06:17:47.851 UTC [stateleveldb] GetState -> DEBU 35bb GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:47.852 UTC [statebasedval] validateKVRead -> DEBU 35bc Comparing versions for key [namespaces/fields/exp02/Sequence]: committed version=&version.Height{BlockNum:0x5, TxNum:0x0} and read version=&version.Height{BlockNum:0x5, TxNum:0x0}" +"2019-04-22 06:17:47.852 UTC [stateleveldb] GetState -> DEBU 35bd GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:47.852 UTC [statebasedval] validateKVRead -> DEBU 35be Comparing versions for key [􏿿initialized]: committed version=&version.Height{BlockNum:0x6, TxNum:0x0} and read version=&version.Height{BlockNum:0x6, TxNum:0x0}" +"2019-04-22 06:17:47.852 UTC [stateleveldb] GetState -> DEBU 35bf GetState(). ns=exp02, key=a" +"2019-04-22 06:17:47.852 UTC [statebasedval] validateKVRead -> DEBU 35c0 Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +"2019-04-22 06:17:47.853 UTC [stateleveldb] GetState -> DEBU 35c1 GetState(). ns=exp02, key=b" +"2019-04-22 06:17:47.853 UTC [statebasedval] validateKVRead -> DEBU 35c2 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x7, TxNum:0x0} and read version=&version.Height{BlockNum:0x7, TxNum:0x0}" +"2019-04-22 06:17:47.853 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 35c3 Block [8] Transaction index [0] TxId [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff] marked as valid by state validator. ContainsPostOrderWrites [false]" +"2019-04-22 06:17:47.854 UTC [valinternal] ApplyWriteSet -> DEBU 35c4 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00254a0c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00254a100)}" +"2019-04-22 06:17:47.855 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35c5 validating rwset..." +"2019-04-22 06:17:47.856 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35c6 postprocessing ProtoBlock..." +"2019-04-22 06:17:47.856 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 35c7 ValidateAndPrepareBatch() complete" +"2019-04-22 06:17:47.857 UTC [kvledger] CommitWithPvtData -> DEBU 35c8 [businesschannel] Committing block [8] to storage" +"2019-04-22 06:17:47.857 UTC [ledgerstorage] CommitWithPvtData -> DEBU 35c9 Writing block [8] to pvt block store" +"2019-04-22 06:17:47.861 UTC [pvtdatastorage] Prepare -> DEBU 35ca Saved 0 private data write sets for block [8]" +"2019-04-22 06:17:47.864 UTC [fsblkstorage] indexBlock -> DEBU 35cb Indexing block [blockNum=8, blockHash=[]byte{0x87, 0x28, 0x3f, 0xd, 0x8c, 0x94, 0xcd, 0x21, 0x3f, 0x1, 0x49, 0xc1, 0xa, 0x2c, 0x32, 0xd1, 0x8, 0xa0, 0xc4, 0x5, 0x90, 0x89, 0x28, 0x51, 0x8e, 0x5a, 0xbc, 0x5, 0xe0, 0x40, 0x4d, 0xbb} txOffsets= +txId=8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff locPointer=offset=70, bytesLength=3045 +]" +"2019-04-22 06:17:47.864 UTC [fsblkstorage] indexBlock -> DEBU 35cc Adding txLoc [fileSuffixNum=0, offset=94693, bytesLength=3045] for tx ID: [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff] to txid-index" +"2019-04-22 06:17:47.864 UTC [fsblkstorage] indexBlock -> DEBU 35cd Adding txLoc [fileSuffixNum=0, offset=94693, bytesLength=3045] for tx number:[0] ID: [8d9f968dff5960206d85d61b045eb3be9ed627672cef5a6a50d28bde348380ff] to blockNumTranNum index" +"2019-04-22 06:17:47.866 UTC [fsblkstorage] updateCheckpoint -> DEBU 35ce Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[98675], isChainEmpty=[false], lastBlockNumber=[8]" +"2019-04-22 06:17:47.866 UTC [pvtdatastorage] Commit -> DEBU 35cf Committing private data for block [8]" +"2019-04-22 06:17:47.869 UTC [pvtdatastorage] Commit -> DEBU 35d0 Committed private data for block [8]" +"2019-04-22 06:17:47.869 UTC [kvledger] CommitWithPvtData -> DEBU 35d1 [businesschannel] Committing block [8] transactions to state database" +"2019-04-22 06:17:47.869 UTC [lockbasedtxmgr] Commit -> DEBU 35d2 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:17:47.869 UTC [lockbasedtxmgr] Commit -> DEBU 35d3 Committing updates to state database" +"2019-04-22 06:17:47.870 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 35d4 Building the expiry schedules based on the update batch" +"2019-04-22 06:17:47.870 UTC [lockbasedtxmgr] Commit -> DEBU 35d5 Write lock acquired for committing updates to state database" +"2019-04-22 06:17:47.870 UTC [stateleveldb] ApplyUpdates -> DEBU 35d6 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-04-22 06:17:47.870 UTC [stateleveldb] ApplyUpdates -> DEBU 35d7 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-04-22 06:17:47.873 UTC [lockbasedtxmgr] Commit -> DEBU 35d8 Updates committed to state database and the write lock is released" +"2019-04-22 06:17:47.873 UTC [lockbasedtxmgr] func1 -> DEBU 35d9 launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:17:47.874 UTC [kvledger] CommitWithPvtData -> DEBU 35da [businesschannel] Committing block [8] transactions to history database" +"2019-04-22 06:17:47.874 UTC [historyleveldb] Commit -> DEBU 35db Channel [businesschannel]: Updating history database for blockNo [8] with [1] transactions" +"2019-04-22 06:17:47.873 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 35dc Preparing potential purge list working-set for expiringAtBlk [9]" +"2019-04-22 06:17:47.875 UTC [leveldbhelper] GetIterator -> DEBU 35dd Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x9, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}]" +"2019-04-22 06:17:47.877 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 35df No expiry entry found for expiringAtBlk [9]" +"2019-04-22 06:17:47.876 UTC [historyleveldb] Commit -> DEBU 35de Channel [businesschannel]: Updates committed to history database for blockNo [8]" +"2019-04-22 06:17:47.877 UTC [kvledger] CommitWithPvtData -> INFO 35e0 [businesschannel] Committed block [8] with 1 transaction(s) in 34ms (state_validation=14ms block_commit=12ms state_commit=4ms)" +"2019-04-22 06:17:47.877 UTC [msp.identity] Sign -> DEBU 35e1 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A020809 " +"2019-04-22 06:17:47.877 UTC [msp.identity] Sign -> DEBU 35e2 Sign: digest: 8FBD7B7C6DD38FFE3D79529E4BD3470D8157671C1F438D19BB316B85AB3FC46F " +"2019-04-22 06:17:47.878 UTC [gossip.state] commitBlock -> DEBU 35e3 [businesschannel] Committed block [8] with 1 transaction(s)" +"2019-04-22 06:17:48.023 UTC [gossip.gossip] handleMessage -> DEBU 35e4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.024 UTC [gossip.pull] HandleMessage -> DEBU 35e5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.025 UTC [msp] DeserializeIdentity -> DEBU 35e6 Obtaining identity" +"2019-04-22 06:17:48.029 UTC [msp] DeserializeIdentity -> DEBU 35e7 Obtaining identity" +"2019-04-22 06:17:48.031 UTC [msp] DeserializeIdentity -> DEBU 35e8 Obtaining identity" +"2019-04-22 06:17:48.033 UTC [msp] DeserializeIdentity -> DEBU 35e9 Obtaining identity" +"2019-04-22 06:17:48.033 UTC [msp] DeserializeIdentity -> DEBU 35ea Obtaining identity" +"2019-04-22 06:17:48.034 UTC [msp] DeserializeIdentity -> DEBU 35eb Obtaining identity" +"2019-04-22 06:17:48.035 UTC [gossip.pull] SendDigest -> DEBU 35ec Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:48.035 UTC [gossip.gossip] handleMessage -> DEBU 35ed Exiting" +"2019-04-22 06:17:48.042 UTC [gossip.gossip] handleMessage -> DEBU 35ee Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.043 UTC [gossip.gossip] handleMessage -> DEBU 35ef Exiting" +"2019-04-22 06:17:48.044 UTC [gossip.discovery] handleMsgFromComm -> DEBU 35f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.044 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 35f1 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:48.045 UTC [msp] DeserializeIdentity -> DEBU 35f2 Obtaining identity" +"2019-04-22 06:17:48.046 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35f4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.047 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35f5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.047 UTC [policies] Evaluate -> DEBU 35f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.048 UTC [policies] Evaluate -> DEBU 35f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.048 UTC [policies] Evaluate -> DEBU 35f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.049 UTC [cauthdsl] func1 -> DEBU 35f9 0xc002f988f0 gate 1555913868049073700 evaluation starts" +"2019-04-22 06:17:48.049 UTC [cauthdsl] func2 -> DEBU 35fa 0xc002f988f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.049 UTC [cauthdsl] func2 -> DEBU 35fb 0xc002f988f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.050 UTC [cauthdsl] func2 -> DEBU 35fc 0xc002f988f0 principal matched by identity 0" +"2019-04-22 06:17:48.050 UTC [msp.identity] Verify -> DEBU 35fd Verify: digest = 00000000 b1 b5 c5 a8 63 a6 93 2f 94 b8 9c 74 1f 81 af 63 |....c../...t...c| +00000010 a7 8e fe 70 6a d7 ff 16 70 64 51 91 ea 4b b3 2b |...pj...pdQ..K.+|" +"2019-04-22 06:17:48.050 UTC [msp.identity] Verify -> DEBU 35fe Verify: sig = 00000000 30 44 02 20 19 0e 41 2f ec f4 9a 3e 66 81 f2 67 |0D. ..A/...>f..g| +00000010 d0 a8 ae 62 b9 97 cf 97 e2 1f 8a ec 44 f6 e6 71 |...b........D..q| +00000020 9d df 27 1e 02 20 36 a7 d9 2b 1d 52 11 59 ca 21 |..'.. 6..+.R.Y.!| +00000030 be 06 0e 62 b0 8d e9 80 5b 14 9a 59 72 d4 b2 2e |...b....[..Yr...| +00000040 7e 50 8b cd c0 3f |~P...?|" +"2019-04-22 06:17:48.051 UTC [cauthdsl] func2 -> DEBU 35ff 0xc002f988f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.051 UTC [cauthdsl] func1 -> DEBU 3600 0xc002f988f0 gate 1555913868049073700 evaluation succeeds" +"2019-04-22 06:17:48.052 UTC [policies] Evaluate -> DEBU 3601 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.052 UTC [policies] Evaluate -> DEBU 3602 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.052 UTC [policies] Evaluate -> DEBU 3603 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.053 UTC [policies] Evaluate -> DEBU 3604 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 3605 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3606 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 3607 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 " +"2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 3608 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 " +"2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 3609 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:44 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:48.057 UTC [gossip.discovery] learnExistingMembers -> DEBU 360a Exiting" +"2019-04-22 06:17:48.058 UTC [gossip.discovery] handleAliveMessage -> DEBU 360b Exiting" +"2019-04-22 06:17:48.058 UTC [gossip.discovery] handleMsgFromComm -> DEBU 360c Exiting" +"2019-04-22 06:17:48.058 UTC [gossip.discovery] sendMemResponse -> DEBU 360d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:48.058 UTC [msp] DeserializeIdentity -> DEBU 360e Obtaining identity" +"2019-04-22 06:17:48.059 UTC [msp] DeserializeIdentity -> DEBU 360f Obtaining identity" +"2019-04-22 06:17:48.059 UTC [msp] DeserializeIdentity -> DEBU 3610 Obtaining identity" +"2019-04-22 06:17:48.059 UTC [gossip.comm] Send -> DEBU 3611 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:48.060 UTC [gossip.discovery] sendMemResponse -> DEBU 3612 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:48.060 UTC [gossip.comm] sendToEndpoint -> DEBU 3613 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.060 UTC [gossip.comm] sendToEndpoint -> DEBU 3614 Exiting" +"2019-04-22 06:17:48.187 UTC [endorser] ProcessProposal -> DEBU 3615 Entering: request from 192.168.224.9:49324" +"2019-04-22 06:17:48.187 UTC [protoutils] ValidateProposalMessage -> DEBU 3616 ValidateProposalMessage starts for signed proposal 0xc002f3f270" +"2019-04-22 06:17:48.187 UTC [protoutils] validateChannelHeader -> DEBU 3617 validateChannelHeader info: header type 3" +"2019-04-22 06:17:48.188 UTC [protoutils] checkSignatureFromCreator -> DEBU 3618 begin" +"2019-04-22 06:17:48.188 UTC [msp] GetManagerForChain -> DEBU 3619 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:48.188 UTC [protoutils] checkSignatureFromCreator -> DEBU 361a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:48.188 UTC [protoutils] checkSignatureFromCreator -> DEBU 361b creator is valid" +"2019-04-22 06:17:48.189 UTC [msp.identity] Verify -> DEBU 361c Verify: digest = 00000000 ce b7 e1 64 61 d2 0a 38 ae ec 01 be d3 52 37 aa |...da..8.....R7.| +00000010 36 a8 ed ab 70 e6 ee fb 36 1d e4 dc 72 83 45 1a |6...p...6...r.E.|" +"2019-04-22 06:17:48.189 UTC [msp.identity] Verify -> DEBU 361d Verify: sig = 00000000 30 44 02 20 04 ec 21 d6 cc 12 ab 93 98 fb 81 d6 |0D. ..!.........| +00000010 d0 74 e9 a5 a8 30 2b 63 fa 34 3b eb 04 9e 26 26 |.t...0+c.4;...&&| +00000020 34 95 86 c0 02 20 48 73 4b 77 0e 8b c1 5a 74 9c |4.... HsKw...Zt.| +00000030 29 9d f3 f5 cf cd cd 40 cb c0 c6 90 48 1b 45 4a |)......@....H.EJ| +00000040 03 34 41 e9 7d 60 |.4A.}`|" +"2019-04-22 06:17:48.190 UTC [protoutils] checkSignatureFromCreator -> DEBU 361e exits successfully" +"2019-04-22 06:17:48.190 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 361f validateChaincodeProposalMessage starts for proposal 0xc0030ef650, header 0xc002f3f680" +"2019-04-22 06:17:48.191 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3620 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-04-22 06:17:48.191 UTC [endorser] preProcess -> DEBU 3621 [businesschannel][fd3e8c7d] processing txid: fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95" +"2019-04-22 06:17:48.192 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3622 retrieveTransactionByID() - txId = [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +"2019-04-22 06:17:48.192 UTC [aclmgmt] CheckACL -> DEBU 3623 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-04-22 06:17:48.192 UTC [aclmgmt] CheckACL -> DEBU 3624 acl check(/Channel/Application/Writers)" +"2019-04-22 06:17:48.193 UTC [policies] Evaluate -> DEBU 3625 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-04-22 06:17:48.193 UTC [policies] Evaluate -> DEBU 3626 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.194 UTC [policies] Evaluate -> DEBU 3627 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-04-22 06:17:48.194 UTC [cauthdsl] func1 -> DEBU 3628 0xc00369be20 gate 1555913868194370400 evaluation starts" +"2019-04-22 06:17:48.194 UTC [cauthdsl] func2 -> DEBU 3629 0xc00369be20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.194 UTC [cauthdsl] func2 -> DEBU 362a 0xc00369be20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.195 UTC [cauthdsl] func2 -> DEBU 362b 0xc00369be20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:48.195 UTC [cauthdsl] func2 -> DEBU 362c 0xc00369be20 principal evaluation fails" +"2019-04-22 06:17:48.196 UTC [cauthdsl] func1 -> DEBU 362d 0xc00369be20 gate 1555913868194370400 evaluation fails" +"2019-04-22 06:17:48.196 UTC [policies] Evaluate -> DEBU 362e Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:48.196 UTC [policies] Evaluate -> DEBU 362f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:17:48.196 UTC [policies] Evaluate -> DEBU 3630 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-04-22 06:17:48.197 UTC [cauthdsl] func1 -> DEBU 3631 0xc0025b4660 gate 1555913868197362100 evaluation starts" +"2019-04-22 06:17:48.197 UTC [cauthdsl] func2 -> DEBU 3632 0xc0025b4660 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.198 UTC [cauthdsl] func2 -> DEBU 3633 0xc0025b4660 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.198 UTC [cauthdsl] func2 -> DEBU 3634 0xc0025b4660 principal matched by identity 0" +"2019-04-22 06:17:48.198 UTC [msp.identity] Verify -> DEBU 3635 Verify: digest = 00000000 ce b7 e1 64 61 d2 0a 38 ae ec 01 be d3 52 37 aa |...da..8.....R7.| +00000010 36 a8 ed ab 70 e6 ee fb 36 1d e4 dc 72 83 45 1a |6...p...6...r.E.|" +"2019-04-22 06:17:48.199 UTC [msp.identity] Verify -> DEBU 3636 Verify: sig = 00000000 30 44 02 20 04 ec 21 d6 cc 12 ab 93 98 fb 81 d6 |0D. ..!.........| +00000010 d0 74 e9 a5 a8 30 2b 63 fa 34 3b eb 04 9e 26 26 |.t...0+c.4;...&&| +00000020 34 95 86 c0 02 20 48 73 4b 77 0e 8b c1 5a 74 9c |4.... HsKw...Zt.| +00000030 29 9d f3 f5 cf cd cd 40 cb c0 c6 90 48 1b 45 4a |)......@....H.EJ| +00000040 03 34 41 e9 7d 60 |.4A.}`|" +"2019-04-22 06:17:48.199 UTC [cauthdsl] func2 -> DEBU 3637 0xc0025b4660 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.200 UTC [cauthdsl] func1 -> DEBU 3638 0xc0025b4660 gate 1555913868197362100 evaluation succeeds" +"2019-04-22 06:17:48.200 UTC [policies] Evaluate -> DEBU 3639 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:48.200 UTC [policies] Evaluate -> DEBU 363a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:17:48.201 UTC [policies] Evaluate -> DEBU 363b Signature set satisfies policy /Channel/Application/Writers" +"2019-04-22 06:17:48.201 UTC [policies] Evaluate -> DEBU 363c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-04-22 06:17:48.201 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 363d constructing new tx simulator" +"2019-04-22 06:17:48.201 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 363e constructing new tx simulator txid = [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +"2019-04-22 06:17:48.202 UTC [endorser] SimulateProposal -> DEBU 363f [businesschannel][fd3e8c7d] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:48.202 UTC [stateleveldb] GetState -> DEBU 3640 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:48.202 UTC [endorser] callChaincode -> INFO 3641 [businesschannel][fd3e8c7d] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:48.202 UTC [stateleveldb] GetState -> DEBU 3642 GetState(). ns=_lifecycle, key=namespaces/fields/exp02/Sequence" +"2019-04-22 06:17:48.203 UTC [stateleveldb] GetState -> DEBU 3643 GetState(). ns=exp02, key=􏿿initialized" +"2019-04-22 06:17:48.203 UTC [chaincode] Execute -> DEBU 3644 Entry" +"2019-04-22 06:17:48.204 UTC [chaincode] handleMessage -> DEBU 3645 [fd3e8c7d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-04-22 06:17:48.204 UTC [chaincode] HandleTransaction -> DEBU 3646 [fd3e8c7d] handling GET_STATE from chaincode" +"2019-04-22 06:17:48.205 UTC [chaincode] HandleGetState -> DEBU 3647 [fd3e8c7d] getting state for chaincode exp02, key a, channel businesschannel" +"2019-04-22 06:17:48.205 UTC [stateleveldb] GetState -> DEBU 3648 GetState(). ns=exp02, key=a" +"2019-04-22 06:17:48.205 UTC [chaincode] HandleTransaction -> DEBU 3649 [fd3e8c7d] Completed GET_STATE. Sending RESPONSE" +"2019-04-22 06:17:48.206 UTC [chaincode] handleMessage -> DEBU 364a [fd3e8c7d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:48.207 UTC [chaincode] Notify -> DEBU 364b [fd3e8c7d] notifying Txid:fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95, channelID:businesschannel" +"2019-04-22 06:17:48.207 UTC [chaincode] Execute -> DEBU 364c Exit" +"2019-04-22 06:17:48.207 UTC [endorser] callChaincode -> INFO 364d [businesschannel][fd3e8c7d] Exit chaincode: name:"exp02" (4ms)" +"2019-04-22 06:17:48.207 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 364e Simulation completed, getting simulation results" +"2019-04-22 06:17:48.208 UTC [lockbasedtxmgr] Done -> DEBU 364f Done with transaction simulation / query execution [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +"2019-04-22 06:17:48.208 UTC [endorser] SimulateProposal -> DEBU 3650 [businesschannel][fd3e8c7d] Exit" +"2019-04-22 06:17:48.208 UTC [endorser] endorseProposal -> DEBU 3651 [businesschannel][fd3e8c7d] Entry chaincode: name:"exp02" " +"2019-04-22 06:17:48.209 UTC [endorser] endorseProposal -> DEBU 3652 [businesschannel][fd3e8c7d] escc for chaincode name:"exp02" is escc" +"2019-04-22 06:17:48.209 UTC [endorser] EndorseWithPlugin -> DEBU 3653 Entering endorsement for {plugin: escc, channel: businesschannel, tx: fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95, chaincode: exp02}" +"2019-04-22 06:17:48.209 UTC [msp.identity] Sign -> DEBU 3654 Sign: plaintext: 0A200568AD21C981682AB679F268FAB9...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:48.210 UTC [msp.identity] Sign -> DEBU 3655 Sign: digest: 931B896186FA9CDD3F3217664435BC4D8F59AA8F94AD2295BDC78740B82FFE6D " +"2019-04-22 06:17:48.210 UTC [endorser] EndorseWithPlugin -> DEBU 3656 Exiting {plugin: escc, channel: businesschannel, tx: fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95, chaincode: exp02}" +"2019-04-22 06:17:48.210 UTC [endorser] endorseProposal -> DEBU 3657 [businesschannel][fd3e8c7d] Exit" +"2019-04-22 06:17:48.211 UTC [lockbasedtxmgr] Done -> DEBU 3658 Done with transaction simulation / query execution [fd3e8c7df66763925b611c0f03c5da406f4b1c8ddf3e1addef3fac25b3614e95]" +"2019-04-22 06:17:48.211 UTC [endorser] func1 -> DEBU 3659 Exit: request from 192.168.224.9:49324" +"2019-04-22 06:17:48.212 UTC [comm.grpc.server] 1 -> INFO 365a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49324 grpc.code=OK grpc.call_duration=25.3071ms +"2019-04-22 06:17:48.216 UTC [grpc] infof -> DEBU 365b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:48.217 UTC [grpc] infof -> DEBU 365c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:48.388 UTC [msp] DeserializeIdentity -> DEBU 365d Obtaining identity" +"2019-04-22 06:17:48.388 UTC [msp] DeserializeIdentity -> DEBU 365e Obtaining identity" +"2019-04-22 06:17:48.389 UTC [gossip.comm] Send -> DEBU 365f Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3660 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3661 Exiting" +"2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3662 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3663 Exiting" +"2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3664 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.389 UTC [gossip.comm] sendToEndpoint -> DEBU 3665 Exiting" +"2019-04-22 06:17:48.390 UTC [gossip.comm] func1 -> DEBU 3666 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.390 UTC [gossip.gossip] handleMessage -> DEBU 3667 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.390 UTC [msp] DeserializeIdentity -> DEBU 3668 Obtaining identity" +"2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 3669 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +"2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 366a Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +00000040 8d f6 86 08 00 13 |......|" +"2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 366b Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:48.391 UTC [msp.identity] Verify -> DEBU 366c Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:48.392 UTC [msp] DeserializeIdentity -> DEBU 366d Obtaining identity" +"2019-04-22 06:17:48.392 UTC [msp] DeserializeIdentity -> DEBU 366e Obtaining identity" +"2019-04-22 06:17:48.392 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 366f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.392 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3670 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.392 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3671 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.392 UTC [policies] Evaluate -> DEBU 3672 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.392 UTC [policies] Evaluate -> DEBU 3673 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.392 UTC [policies] Evaluate -> DEBU 3674 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.392 UTC [cauthdsl] func1 -> DEBU 3675 0xc003600aa0 gate 1555913868392605500 evaluation starts" +"2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 3676 0xc003600aa0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 3677 0xc003600aa0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 3678 0xc003600aa0 principal matched by identity 0" +"2019-04-22 06:17:48.392 UTC [msp.identity] Verify -> DEBU 3679 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:48.392 UTC [msp.identity] Verify -> DEBU 367a Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:48.392 UTC [cauthdsl] func2 -> DEBU 367b 0xc003600aa0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.392 UTC [cauthdsl] func1 -> DEBU 367c 0xc003600aa0 gate 1555913868392605500 evaluation succeeds" +"2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 367d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 367e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 367f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.393 UTC [policies] Evaluate -> DEBU 3680 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.393 UTC [msp] DeserializeIdentity -> DEBU 3681 Obtaining identity" +"2019-04-22 06:17:48.393 UTC [msp] DeserializeIdentity -> DEBU 3682 Obtaining identity" +"2019-04-22 06:17:48.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3683 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3684 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.394 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3685 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.394 UTC [policies] Evaluate -> DEBU 3686 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.395 UTC [policies] Evaluate -> DEBU 3687 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.395 UTC [policies] Evaluate -> DEBU 3688 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.395 UTC [cauthdsl] func1 -> DEBU 3689 0xc003336270 gate 1555913868395362900 evaluation starts" +"2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368a 0xc003336270 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368b 0xc003336270 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368c 0xc003336270 principal matched by identity 0" +"2019-04-22 06:17:48.395 UTC [msp.identity] Verify -> DEBU 368d Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:48.395 UTC [msp.identity] Verify -> DEBU 368e Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:48.395 UTC [cauthdsl] func2 -> DEBU 368f 0xc003336270 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.395 UTC [cauthdsl] func1 -> DEBU 3690 0xc003336270 gate 1555913868395362900 evaluation succeeds" +"2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3691 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3692 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3693 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3694 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.396 UTC [msp] DeserializeIdentity -> DEBU 3695 Obtaining identity" +"2019-04-22 06:17:48.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3696 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.396 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3697 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3698 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 3699 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.396 UTC [policies] Evaluate -> DEBU 369a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.396 UTC [cauthdsl] func1 -> DEBU 369b 0xc003337350 gate 1555913868396636700 evaluation starts" +"2019-04-22 06:17:48.396 UTC [cauthdsl] func2 -> DEBU 369c 0xc003337350 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.396 UTC [cauthdsl] func2 -> DEBU 369d 0xc003337350 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.396 UTC [cauthdsl] func2 -> DEBU 369e 0xc003337350 principal matched by identity 0" +"2019-04-22 06:17:48.396 UTC [msp.identity] Verify -> DEBU 369f Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:48.396 UTC [msp.identity] Verify -> DEBU 36a0 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:48.398 UTC [gossip.comm] func1 -> DEBU 36a1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.400 UTC [cauthdsl] func2 -> DEBU 36a2 0xc003337350 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.404 UTC [msp] DeserializeIdentity -> DEBU 36a3 Obtaining identity" +"2019-04-22 06:17:48.405 UTC [msp] DeserializeIdentity -> DEBU 36a4 Obtaining identity" +"2019-04-22 06:17:48.405 UTC [gossip.comm] Send -> DEBU 36a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +"2019-04-22 06:17:48.405 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" +"2019-04-22 06:17:48.405 UTC [msp] DeserializeIdentity -> DEBU 36a7 Obtaining identity" +"2019-04-22 06:17:48.406 UTC [gossip.comm] sendToEndpoint -> DEBU 36a8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.409 UTC [gossip.comm] sendToEndpoint -> DEBU 36a9 Exiting" +"2019-04-22 06:17:48.409 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.409 UTC [gossip.comm] sendToEndpoint -> DEBU 36ab Exiting" +"2019-04-22 06:17:48.410 UTC [gossip.comm] sendToEndpoint -> DEBU 36ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.410 UTC [gossip.comm] sendToEndpoint -> DEBU 36ad Exiting" +"2019-04-22 06:17:48.405 UTC [cauthdsl] func1 -> DEBU 36ae 0xc003337350 gate 1555913868396636700 evaluation succeeds" +"2019-04-22 06:17:48.413 UTC [policies] Evaluate -> DEBU 36af Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.415 UTC [policies] Evaluate -> DEBU 36b0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.416 UTC [policies] Evaluate -> DEBU 36b1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.416 UTC [policies] Evaluate -> DEBU 36b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.417 UTC [gossip.gossip] handleMessage -> DEBU 36b3 Exiting" +"2019-04-22 06:17:48.418 UTC [gossip.gossip] handleMessage -> DEBU 36b4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.420 UTC [msp.identity] Verify -> DEBU 36b5 Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +"2019-04-22 06:17:48.421 UTC [msp.identity] Verify -> DEBU 36b6 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +00000040 8d f6 86 08 00 13 |......|" +"2019-04-22 06:17:48.423 UTC [msp] DeserializeIdentity -> DEBU 36b7 Obtaining identity" +"2019-04-22 06:17:48.423 UTC [msp] DeserializeIdentity -> DEBU 36b8 Obtaining identity" +"2019-04-22 06:17:48.430 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36b9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ba Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.431 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36bb Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.432 UTC [policies] Evaluate -> DEBU 36bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.433 UTC [gossip.comm] func1 -> DEBU 36bd Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.432 UTC [policies] Evaluate -> DEBU 36be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.435 UTC [policies] Evaluate -> DEBU 36bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.435 UTC [cauthdsl] func1 -> DEBU 36c0 0xc003739480 gate 1555913868435597400 evaluation starts" +"2019-04-22 06:17:48.436 UTC [cauthdsl] func2 -> DEBU 36c1 0xc003739480 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.436 UTC [cauthdsl] func2 -> DEBU 36c2 0xc003739480 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.436 UTC [cauthdsl] func2 -> DEBU 36c3 0xc003739480 principal matched by identity 0" +"2019-04-22 06:17:48.436 UTC [msp.identity] Verify -> DEBU 36c4 Verify: digest = 00000000 3b 44 a7 81 0f 9e 65 9e 06 57 6e 91 f0 05 a7 d5 |;D....e..Wn.....| +00000010 68 bc 66 5b d1 a5 88 a8 1d 17 64 bf b8 22 b7 46 |h.f[......d..".F|" +"2019-04-22 06:17:48.436 UTC [msp.identity] Verify -> DEBU 36c5 Verify: sig = 00000000 30 44 02 20 19 b7 95 2f fe 84 f1 f4 b7 7c fb 24 |0D. .../.....|.$| +00000010 d6 77 62 9a 34 1a dc d1 c6 78 26 18 ce 41 63 c3 |.wb.4....x&..Ac.| +00000020 b1 e5 6b c8 02 20 20 15 a8 97 0a 71 56 1b 8f 32 |..k.. ....qV..2| +00000030 f8 a7 14 c8 2d 2f 81 fb 53 c6 cb 64 ce 7c 59 c7 |....-/..S..d.|Y.| +00000040 f0 ce c7 ec 43 95 |....C.|" +"2019-04-22 06:17:48.437 UTC [cauthdsl] func2 -> DEBU 36c6 0xc003739480 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.438 UTC [cauthdsl] func1 -> DEBU 36c7 0xc003739480 gate 1555913868435597400 evaluation succeeds" +"2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36c8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36ca Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.438 UTC [policies] Evaluate -> DEBU 36cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.438 UTC [msp] DeserializeIdentity -> DEBU 36cc Obtaining identity" +"2019-04-22 06:17:48.438 UTC [msp] DeserializeIdentity -> DEBU 36cd Obtaining identity" +"2019-04-22 06:17:48.438 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36ce Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36cf Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36d0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.439 UTC [policies] Evaluate -> DEBU 36d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.439 UTC [policies] Evaluate -> DEBU 36d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.439 UTC [policies] Evaluate -> DEBU 36d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.439 UTC [cauthdsl] func1 -> DEBU 36d4 0xc0029c6c50 gate 1555913868439149800 evaluation starts" +"2019-04-22 06:17:48.439 UTC [cauthdsl] func2 -> DEBU 36d5 0xc0029c6c50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.439 UTC [cauthdsl] func2 -> DEBU 36d6 0xc0029c6c50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.439 UTC [cauthdsl] func2 -> DEBU 36d7 0xc0029c6c50 principal matched by identity 0" +"2019-04-22 06:17:48.439 UTC [msp.identity] Verify -> DEBU 36d8 Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:48.439 UTC [msp.identity] Verify -> DEBU 36d9 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 36da 0xc0029c6c50 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.440 UTC [cauthdsl] func1 -> DEBU 36db 0xc0029c6c50 gate 1555913868439149800 evaluation succeeds" +"2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36dc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36de Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.440 UTC [policies] Evaluate -> DEBU 36df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.441 UTC [msp.identity] Verify -> DEBU 36e0 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:48.441 UTC [msp.identity] Verify -> DEBU 36e1 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:48.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36e2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.441 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36e3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.441 UTC [policies] Evaluate -> DEBU 36e4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.441 UTC [policies] Evaluate -> DEBU 36e5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.441 UTC [policies] Evaluate -> DEBU 36e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func1 -> DEBU 36e7 0xc00267a350 gate 1555913868442990400 evaluation starts" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36e8 0xc00267a350 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36e9 0xc00267a350 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36ea 0xc00267a350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36eb 0xc00267a350 principal evaluation fails" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func1 -> DEBU 36ec 0xc00267a350 gate 1555913868442990400 evaluation fails" +"2019-04-22 06:17:48.443 UTC [policies] Evaluate -> DEBU 36ed Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.443 UTC [policies] Evaluate -> DEBU 36ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.443 UTC [policies] Evaluate -> DEBU 36ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func1 -> DEBU 36f0 0xc00267ab90 gate 1555913868443463800 evaluation starts" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36f1 0xc00267ab90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36f2 0xc00267ab90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.443 UTC [cauthdsl] func2 -> DEBU 36f3 0xc00267ab90 principal matched by identity 0" +"2019-04-22 06:17:48.443 UTC [msp.identity] Verify -> DEBU 36f4 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:48.443 UTC [msp.identity] Verify -> DEBU 36f5 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:48.444 UTC [cauthdsl] func2 -> DEBU 36f6 0xc00267ab90 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.444 UTC [cauthdsl] func1 -> DEBU 36f7 0xc00267ab90 gate 1555913868443463800 evaluation succeeds" +"2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36f8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36fa Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.444 UTC [policies] Evaluate -> DEBU 36fb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.444 UTC [gossip.gossip] handleMessage -> DEBU 36fc Exiting" +"2019-04-22 06:17:48.444 UTC [gossip.gossip] handleMessage -> DEBU 36fd Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.444 UTC [msp] DeserializeIdentity -> DEBU 36fe Obtaining identity" +"2019-04-22 06:17:48.444 UTC [msp.identity] Verify -> DEBU 36ff Verify: digest = 00000000 d7 7c b6 2b ab dc b6 27 2c 86 e9 9c 78 2e 95 68 |.|.+...',...x..h| +00000010 76 72 63 15 2b 3b 60 ba 68 9c 41 a8 04 dd 71 8b |vrc.+;`.h.A...q.|" +"2019-04-22 06:17:48.444 UTC [msp.identity] Verify -> DEBU 3700 Verify: sig = 00000000 30 44 02 20 1a 64 94 ec 5a 68 e3 68 99 41 89 82 |0D. .d..Zh.h.A..| +00000010 33 13 8d cd e3 8c ac c4 98 f4 2c f5 c1 fd 1c 53 |3.........,....S| +00000020 58 c2 75 a3 02 20 20 7b 9b c7 f3 30 cb d2 4d e7 |X.u.. {...0..M.| +00000030 be 2e fc 0a cb 09 7b 55 e9 cb be fe 86 7e 40 08 |......{U.....~@.| +00000040 8d f6 86 08 00 13 |......|" +"2019-04-22 06:17:48.445 UTC [msp.identity] Verify -> DEBU 3701 Verify: digest = 00000000 ae 4d ce ff 1a 64 e8 cf 14 f2 82 35 5e 82 29 66 |.M...d.....5^.)f| +00000010 02 4a ad 65 45 e6 c6 42 89 3b 1a 7f 29 68 0c 16 |.J.eE..B.;..)h..|" +"2019-04-22 06:17:48.445 UTC [msp.identity] Verify -> DEBU 3702 Verify: sig = 00000000 30 45 02 21 00 b3 b5 3f 0a a8 3c 0b 71 fb 91 18 |0E.!...?..<.q...| +00000010 b0 3a fa 9d 2c c8 92 f8 44 bd b1 a4 36 f8 a2 fb |.:..,...D...6...| +00000020 92 10 9d 67 6e 02 20 66 43 68 0b 4a b3 c8 78 0b |...gn. fCh.J..x.| +00000030 c2 c3 c6 eb e9 cb fd 54 d3 ac 5a 7a a2 7a b0 f1 |.......T..Zz.z..| +00000040 f3 fe 83 6e 2e f1 6f |...n..o|" +"2019-04-22 06:17:48.445 UTC [msp] DeserializeIdentity -> DEBU 3703 Obtaining identity" +"2019-04-22 06:17:48.445 UTC [msp] DeserializeIdentity -> DEBU 3704 Obtaining identity" +"2019-04-22 06:17:48.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3705 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3706 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3707 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3708 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3709 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 370a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.446 UTC [cauthdsl] func1 -> DEBU 370b 0xc00393b4e0 gate 1555913868446317000 evaluation starts" +"2019-04-22 06:17:48.446 UTC [cauthdsl] func2 -> DEBU 370c 0xc00393b4e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.446 UTC [cauthdsl] func2 -> DEBU 370d 0xc00393b4e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.446 UTC [cauthdsl] func2 -> DEBU 370e 0xc00393b4e0 principal matched by identity 0" +"2019-04-22 06:17:48.446 UTC [msp.identity] Verify -> DEBU 370f Verify: digest = 00000000 27 fd f8 90 e3 fb 5b 15 82 60 66 51 85 11 37 d3 |'.....[..`fQ..7.| +00000010 c7 37 e0 7c 85 da 9a 7a 6d c3 31 4f 3c 30 6f 41 |.7.|...zm.1O<0oA|" +"2019-04-22 06:17:48.446 UTC [msp.identity] Verify -> DEBU 3710 Verify: sig = 00000000 30 45 02 21 00 db 18 9c e6 73 37 ab d3 7e 21 8d |0E.!.....s7..~!.| +00000010 ab cf c8 d3 e2 2b 6f 39 e2 b7 68 28 c9 49 07 d6 |.....+o9..h(.I..| +00000020 f6 e4 dc 0b e9 02 20 26 b9 57 d4 72 07 8e 14 e2 |...... &.W.r....| +00000030 93 1b 3c 4d 62 da 19 98 50 f2 f6 88 6a 4e 2b b8 |.. DEBU 3711 0xc00393b4e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.446 UTC [cauthdsl] func1 -> DEBU 3712 0xc00393b4e0 gate 1555913868446317000 evaluation succeeds" +"2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3713 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.446 UTC [policies] Evaluate -> DEBU 3714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.447 UTC [policies] Evaluate -> DEBU 3715 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.447 UTC [policies] Evaluate -> DEBU 3716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.448 UTC [msp] DeserializeIdentity -> DEBU 3717 Obtaining identity" +"2019-04-22 06:17:48.448 UTC [msp] DeserializeIdentity -> DEBU 3718 Obtaining identity" +"2019-04-22 06:17:48.449 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3719 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.449 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 371b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.449 UTC [policies] Evaluate -> DEBU 371c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.449 UTC [policies] Evaluate -> DEBU 371d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.449 UTC [policies] Evaluate -> DEBU 371e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.449 UTC [cauthdsl] func1 -> DEBU 371f 0xc0039b4cb0 gate 1555913868449759800 evaluation starts" +"2019-04-22 06:17:48.449 UTC [cauthdsl] func2 -> DEBU 3720 0xc0039b4cb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.449 UTC [cauthdsl] func2 -> DEBU 3721 0xc0039b4cb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.449 UTC [cauthdsl] func2 -> DEBU 3722 0xc0039b4cb0 principal matched by identity 0" +"2019-04-22 06:17:48.449 UTC [msp.identity] Verify -> DEBU 3723 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:48.450 UTC [msp.identity] Verify -> DEBU 3724 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:48.453 UTC [cauthdsl] func2 -> DEBU 3725 0xc0039b4cb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.454 UTC [cauthdsl] func1 -> DEBU 3726 0xc0039b4cb0 gate 1555913868449759800 evaluation succeeds" +"2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 3727 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 3728 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 3729 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 372a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.454 UTC [msp] DeserializeIdentity -> DEBU 372b Obtaining identity" +"2019-04-22 06:17:48.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.454 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 372d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 372e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.454 UTC [policies] Evaluate -> DEBU 372f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.455 UTC [policies] Evaluate -> DEBU 3730 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.455 UTC [cauthdsl] func1 -> DEBU 3731 0xc0039b5d90 gate 1555913868455149200 evaluation starts" +"2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3732 0xc0039b5d90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3733 0xc0039b5d90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3734 0xc0039b5d90 principal matched by identity 0" +"2019-04-22 06:17:48.455 UTC [msp.identity] Verify -> DEBU 3735 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:48.455 UTC [msp.identity] Verify -> DEBU 3736 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:48.455 UTC [cauthdsl] func2 -> DEBU 3737 0xc0039b5d90 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.455 UTC [cauthdsl] func1 -> DEBU 3738 0xc0039b5d90 gate 1555913868455149200 evaluation succeeds" +"2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 3739 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 373a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 373b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.456 UTC [policies] Evaluate -> DEBU 373c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.456 UTC [gossip.gossip] handleMessage -> DEBU 373d Exiting" +"2019-04-22 06:17:48.456 UTC [gossip.gossip] handleMessage -> DEBU 373e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913867877738300 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.456 UTC [msp.identity] Verify -> DEBU 373f Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:17:48.456 UTC [msp.identity] Verify -> DEBU 3740 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:17:48.457 UTC [gossip.gossip] handleMessage -> DEBU 3741 Exiting" +"2019-04-22 06:17:48.500 UTC [msp] DeserializeIdentity -> DEBU 3742 Obtaining identity" +"2019-04-22 06:17:48.500 UTC [msp] DeserializeIdentity -> DEBU 3743 Obtaining identity" +"2019-04-22 06:17:48.501 UTC [gossip.pull] Hello -> DEBU 3744 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:48.501 UTC [msp] DeserializeIdentity -> DEBU 3745 Obtaining identity" +"2019-04-22 06:17:48.502 UTC [msp] DeserializeIdentity -> DEBU 3746 Obtaining identity" +"2019-04-22 06:17:48.502 UTC [gossip.comm] Send -> DEBU 3747 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:48.502 UTC [gossip.comm] sendToEndpoint -> DEBU 3748 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.503 UTC [gossip.comm] sendToEndpoint -> DEBU 3749 Exiting" +"2019-04-22 06:17:48.506 UTC [gossip.comm] func1 -> DEBU 374a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17073940157176406821 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.506 UTC [gossip.gossip] handleMessage -> DEBU 374b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17073940157176406821 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.506 UTC [gossip.pull] HandleMessage -> DEBU 374c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 17073940157176406821 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 8 1 2 3], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.507 UTC [gossip.gossip] handleMessage -> DEBU 374d Exiting" +"2019-04-22 06:17:48.647 UTC [gossip.comm] func1 -> DEBU 374e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.647 UTC [gossip.gossip] handleMessage -> DEBU 374f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.648 UTC [msp] DeserializeIdentity -> DEBU 3750 Obtaining identity" +"2019-04-22 06:17:48.648 UTC [msp] DeserializeIdentity -> DEBU 3751 Obtaining identity" +"2019-04-22 06:17:48.649 UTC [gossip.gossip] handleMessage -> DEBU 3752 Exiting" +"2019-04-22 06:17:48.661 UTC [gossip.comm] func1 -> DEBU 3753 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.661 UTC [gossip.gossip] handleMessage -> DEBU 3754 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.662 UTC [msp.identity] Verify -> DEBU 3755 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:48.662 UTC [msp.identity] Verify -> DEBU 3756 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:48.663 UTC [gossip.gossip] handleMessage -> DEBU 3757 Exiting" +"2019-04-22 06:17:48.668 UTC [gossip.comm] func1 -> DEBU 3758 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.669 UTC [gossip.gossip] handleMessage -> DEBU 3759 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.670 UTC [msp.identity] Verify -> DEBU 375a Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:48.670 UTC [msp.identity] Verify -> DEBU 375b Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:48.671 UTC [msp] DeserializeIdentity -> DEBU 375c Obtaining identity" +"2019-04-22 06:17:48.671 UTC [gossip.gossip] handleMessage -> DEBU 375d Exiting" +"2019-04-22 06:17:48.672 UTC [gossip.gossip] handleMessage -> DEBU 375e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913867836330300 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.672 UTC [msp.identity] Verify -> DEBU 375f Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:48.673 UTC [msp.identity] Verify -> DEBU 3760 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:48.673 UTC [msp] DeserializeIdentity -> DEBU 3761 Obtaining identity" +"2019-04-22 06:17:48.673 UTC [gossip.gossip] handleMessage -> DEBU 3762 Exiting" +"2019-04-22 06:17:48.686 UTC [gossip.comm] func1 -> DEBU 3763 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.687 UTC [gossip.gossip] handleMessage -> DEBU 3764 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.687 UTC [gossip.pull] HandleMessage -> DEBU 3765 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.688 UTC [gossip.pull] SendDigest -> DEBU 3766 Sending BLOCK_MSG digest: [3 4 5 6 7 8 1 2] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:48.688 UTC [gossip.gossip] handleMessage -> DEBU 3767 Exiting" +"2019-04-22 06:17:48.796 UTC [endorser] ProcessProposal -> DEBU 3768 Entering: request from 192.168.224.9:49328" +"2019-04-22 06:17:48.796 UTC [protoutils] ValidateProposalMessage -> DEBU 3769 ValidateProposalMessage starts for signed proposal 0xc0030b7950" +"2019-04-22 06:17:48.796 UTC [protoutils] validateChannelHeader -> DEBU 376a validateChannelHeader info: header type 3" +"2019-04-22 06:17:48.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 376b begin" +"2019-04-22 06:17:48.796 UTC [msp] GetManagerForChain -> DEBU 376c Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:48.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 376d creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:48.796 UTC [protoutils] checkSignatureFromCreator -> DEBU 376e creator is valid" +"2019-04-22 06:17:48.796 UTC [msp.identity] Verify -> DEBU 376f Verify: digest = 00000000 fc 1f c6 af f1 09 c1 d0 4a b5 09 e6 5c df 77 2d |........J...\.w-| +00000010 1f 22 26 da 6b 8d d8 07 0d 40 31 43 d3 cd 49 ed |."&.k....@1C..I.|" +"2019-04-22 06:17:48.797 UTC [msp.identity] Verify -> DEBU 3770 Verify: sig = 00000000 30 45 02 21 00 8d 7a b1 90 ff 9c de 83 62 34 49 |0E.!..z......b4I| +00000010 b3 ef b5 73 13 02 8d 3c be ba 91 19 74 ae 47 76 |...s...<....t.Gv| +00000020 df 99 7e 40 e9 02 20 2f fc 5a 8f d9 8b a5 87 d6 |..~@.. /.Z......| +00000030 0f 7a dc bb 37 05 94 34 95 f8 24 b8 ab e9 89 7d |.z..7..4..$....}| +00000040 03 12 6c 71 a7 c3 0c |..lq...|" +"2019-04-22 06:17:48.798 UTC [protoutils] checkSignatureFromCreator -> DEBU 3771 exits successfully" +"2019-04-22 06:17:48.798 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3772 validateChaincodeProposalMessage starts for proposal 0xc003475880, header 0xc0030b7d60" +"2019-04-22 06:17:48.798 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3773 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-04-22 06:17:48.798 UTC [endorser] preProcess -> DEBU 3774 [businesschannel][41633219] processing txid: 416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196" +"2019-04-22 06:17:48.799 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3775 retrieveTransactionByID() - txId = [416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196]" +"2019-04-22 06:17:48.799 UTC [endorser] SimulateProposal -> DEBU 3776 [businesschannel][41633219] Entry chaincode: name:"qscc" " +"2019-04-22 06:17:48.799 UTC [endorser] callChaincode -> INFO 3777 [businesschannel][41633219] Entry chaincode: name:"qscc" " +"2019-04-22 06:17:48.800 UTC [chaincode] Execute -> DEBU 3778 Entry" +"2019-04-22 06:17:48.801 UTC [qscc] Invoke -> DEBU 3779 Invoke function: GetChainInfo on chain: businesschannel" +"2019-04-22 06:17:48.801 UTC [aclmgmt] CheckACL -> DEBU 377a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-04-22 06:17:48.801 UTC [aclmgmt] CheckACL -> DEBU 377b acl check(/Channel/Application/Readers)" +"2019-04-22 06:17:48.801 UTC [policies] Evaluate -> DEBU 377c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.801 UTC [policies] Evaluate -> DEBU 377d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.801 UTC [policies] Evaluate -> DEBU 377e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.802 UTC [cauthdsl] func1 -> DEBU 377f 0xc003e44ef0 gate 1555913868802382900 evaluation starts" +"2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3780 0xc003e44ef0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3781 0xc003e44ef0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3782 0xc003e44ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:48.802 UTC [cauthdsl] func2 -> DEBU 3783 0xc003e44ef0 principal evaluation fails" +"2019-04-22 06:17:48.803 UTC [cauthdsl] func1 -> DEBU 3784 0xc003e44ef0 gate 1555913868802382900 evaluation fails" +"2019-04-22 06:17:48.803 UTC [policies] Evaluate -> DEBU 3785 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.803 UTC [policies] Evaluate -> DEBU 3786 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.803 UTC [policies] Evaluate -> DEBU 3787 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:48.804 UTC [cauthdsl] func1 -> DEBU 3788 0xc003e45730 gate 1555913868804255500 evaluation starts" +"2019-04-22 06:17:48.804 UTC [cauthdsl] func2 -> DEBU 3789 0xc003e45730 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.804 UTC [cauthdsl] func2 -> DEBU 378a 0xc003e45730 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.804 UTC [cauthdsl] func2 -> DEBU 378b 0xc003e45730 principal matched by identity 0" +"2019-04-22 06:17:48.804 UTC [msp.identity] Verify -> DEBU 378c Verify: digest = 00000000 fc 1f c6 af f1 09 c1 d0 4a b5 09 e6 5c df 77 2d |........J...\.w-| +00000010 1f 22 26 da 6b 8d d8 07 0d 40 31 43 d3 cd 49 ed |."&.k....@1C..I.|" +"2019-04-22 06:17:48.805 UTC [msp.identity] Verify -> DEBU 378d Verify: sig = 00000000 30 45 02 21 00 8d 7a b1 90 ff 9c de 83 62 34 49 |0E.!..z......b4I| +00000010 b3 ef b5 73 13 02 8d 3c be ba 91 19 74 ae 47 76 |...s...<....t.Gv| +00000020 df 99 7e 40 e9 02 20 2f fc 5a 8f d9 8b a5 87 d6 |..~@.. /.Z......| +00000030 0f 7a dc bb 37 05 94 34 95 f8 24 b8 ab e9 89 7d |.z..7..4..$....}| +00000040 03 12 6c 71 a7 c3 0c |..lq...|" +"2019-04-22 06:17:48.805 UTC [cauthdsl] func2 -> DEBU 378e 0xc003e45730 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.805 UTC [cauthdsl] func1 -> DEBU 378f 0xc003e45730 gate 1555913868804255500 evaluation succeeds" +"2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3790 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3791 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3792 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.805 UTC [policies] Evaluate -> DEBU 3793 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.806 UTC [chaincode] handleMessage -> DEBU 3794 [41633219] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:48.806 UTC [chaincode] Notify -> DEBU 3795 [41633219] notifying Txid:416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196, channelID:businesschannel" +"2019-04-22 06:17:48.806 UTC [chaincode] Execute -> DEBU 3796 Exit" +"2019-04-22 06:17:48.806 UTC [endorser] callChaincode -> INFO 3797 [businesschannel][41633219] Exit chaincode: name:"qscc" (7ms)" +"2019-04-22 06:17:48.807 UTC [endorser] SimulateProposal -> DEBU 3798 [businesschannel][41633219] Exit" +"2019-04-22 06:17:48.807 UTC [endorser] endorseProposal -> DEBU 3799 [businesschannel][41633219] Entry chaincode: name:"qscc" " +"2019-04-22 06:17:48.807 UTC [endorser] endorseProposal -> DEBU 379a [businesschannel][41633219] escc for chaincode name:"qscc" is escc" +"2019-04-22 06:17:48.807 UTC [endorser] EndorseWithPlugin -> DEBU 379b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196, chaincode: qscc}" +"2019-04-22 06:17:48.807 UTC [msp.identity] Sign -> DEBU 379c Sign: plaintext: 0A20BD521112063463736C11B375B6AA...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:48.807 UTC [msp.identity] Sign -> DEBU 379d Sign: digest: 9F8C8C903E0231FC09B86AFB3CDE2D37193D92ACA8C6E789AF5902A17D0F13BF " +"2019-04-22 06:17:48.807 UTC [endorser] EndorseWithPlugin -> DEBU 379e Exiting {plugin: escc, channel: businesschannel, tx: 416332190033144e1aee1b9c4ddb52f0989782b84a289844d7219c3d8f420196, chaincode: qscc}" +"2019-04-22 06:17:48.808 UTC [endorser] endorseProposal -> DEBU 379f [businesschannel][41633219] Exit" +"2019-04-22 06:17:48.808 UTC [endorser] func1 -> DEBU 37a0 Exit: request from 192.168.224.9:49328" +"2019-04-22 06:17:48.808 UTC [comm.grpc.server] 1 -> INFO 37a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49328 grpc.code=OK grpc.call_duration=12.7052ms +"2019-04-22 06:17:48.812 UTC [grpc] infof -> DEBU 37a2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:48.813 UTC [grpc] infof -> DEBU 37a3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:48.871 UTC [gossip.gossip] handleMessage -> DEBU 37a4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:48.872 UTC [msp] DeserializeIdentity -> DEBU 37a5 Obtaining identity" +"2019-04-22 06:17:48.873 UTC [msp] DeserializeIdentity -> DEBU 37a6 Obtaining identity" +"2019-04-22 06:17:48.876 UTC [msp] DeserializeIdentity -> DEBU 37a7 Obtaining identity" +"2019-04-22 06:17:48.876 UTC [gossip.gossip] handleMessage -> DEBU 37a8 Exiting" +"2019-04-22 06:17:48.884 UTC [gossip.gossip] handleMessage -> DEBU 37a9 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913867850368300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.884 UTC [msp] DeserializeIdentity -> DEBU 37aa Obtaining identity" +"2019-04-22 06:17:48.884 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ac Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.884 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37ad Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.884 UTC [policies] Evaluate -> DEBU 37ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.885 UTC [policies] Evaluate -> DEBU 37af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.885 UTC [policies] Evaluate -> DEBU 37b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.886 UTC [cauthdsl] func1 -> DEBU 37b1 0xc002f0d990 gate 1555913868886218100 evaluation starts" +"2019-04-22 06:17:48.886 UTC [cauthdsl] func2 -> DEBU 37b2 0xc002f0d990 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.886 UTC [cauthdsl] func2 -> DEBU 37b3 0xc002f0d990 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.886 UTC [cauthdsl] func2 -> DEBU 37b4 0xc002f0d990 principal matched by identity 0" +"2019-04-22 06:17:48.886 UTC [msp.identity] Verify -> DEBU 37b5 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:48.887 UTC [msp.identity] Verify -> DEBU 37b6 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:48.888 UTC [gossip.comm] func1 -> DEBU 37b7 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913867850368300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.890 UTC [cauthdsl] func2 -> DEBU 37b8 0xc002f0d990 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.890 UTC [cauthdsl] func1 -> DEBU 37b9 0xc002f0d990 gate 1555913868886218100 evaluation succeeds" +"2019-04-22 06:17:48.890 UTC [policies] Evaluate -> DEBU 37ba Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.890 UTC [policies] Evaluate -> DEBU 37bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.891 UTC [policies] Evaluate -> DEBU 37bc Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.891 UTC [policies] Evaluate -> DEBU 37bd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.891 UTC [msp] DeserializeIdentity -> DEBU 37be Obtaining identity" +"2019-04-22 06:17:48.892 UTC [gossip.gossip] handleMessage -> DEBU 37bf Exiting" +"2019-04-22 06:17:48.892 UTC [gossip.gossip] handleMessage -> DEBU 37c0 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913867850368300 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:9 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:17:48.892 UTC [msp] DeserializeIdentity -> DEBU 37c1 Obtaining identity" +"2019-04-22 06:17:48.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:48.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37c3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37c4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:48.893 UTC [policies] Evaluate -> DEBU 37c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:48.893 UTC [policies] Evaluate -> DEBU 37c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:48.893 UTC [policies] Evaluate -> DEBU 37c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:48.894 UTC [cauthdsl] func1 -> DEBU 37c8 0xc0026433a0 gate 1555913868893977600 evaluation starts" +"2019-04-22 06:17:48.894 UTC [cauthdsl] func2 -> DEBU 37c9 0xc0026433a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:48.894 UTC [cauthdsl] func2 -> DEBU 37ca 0xc0026433a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:48.894 UTC [cauthdsl] func2 -> DEBU 37cb 0xc0026433a0 principal matched by identity 0" +"2019-04-22 06:17:48.894 UTC [msp.identity] Verify -> DEBU 37cc Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:48.895 UTC [msp.identity] Verify -> DEBU 37cd Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:48.896 UTC [cauthdsl] func2 -> DEBU 37ce 0xc0026433a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:48.896 UTC [cauthdsl] func1 -> DEBU 37cf 0xc0026433a0 gate 1555913868893977600 evaluation succeeds" +"2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:48.896 UTC [policies] Evaluate -> DEBU 37d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:48.896 UTC [msp] DeserializeIdentity -> DEBU 37d4 Obtaining identity" +"2019-04-22 06:17:48.897 UTC [gossip.gossip] handleMessage -> DEBU 37d5 Exiting" +"2019-04-22 06:17:49.036 UTC [endorser] ProcessProposal -> DEBU 37d6 Entering: request from 192.168.224.9:49332" +"2019-04-22 06:17:49.037 UTC [protoutils] ValidateProposalMessage -> DEBU 37d7 ValidateProposalMessage starts for signed proposal 0xc0031d9400" +"2019-04-22 06:17:49.037 UTC [protoutils] validateChannelHeader -> DEBU 37d8 validateChannelHeader info: header type 3" +"2019-04-22 06:17:49.037 UTC [protoutils] checkSignatureFromCreator -> DEBU 37d9 begin" +"2019-04-22 06:17:49.038 UTC [msp] GetManagerForChain -> DEBU 37da Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:49.038 UTC [protoutils] checkSignatureFromCreator -> DEBU 37db creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:49.038 UTC [protoutils] checkSignatureFromCreator -> DEBU 37dc creator is valid" +"2019-04-22 06:17:49.038 UTC [msp.identity] Verify -> DEBU 37dd Verify: digest = 00000000 a6 07 04 5b b6 eb b2 0d 88 fd 0c 22 1a f3 a8 d6 |...[......."....| +00000010 9a b9 36 af 51 05 f4 8c e5 0d c7 b3 b8 e8 e7 23 |..6.Q..........#|" +"2019-04-22 06:17:49.039 UTC [msp.identity] Verify -> DEBU 37de Verify: sig = 00000000 30 44 02 20 48 b8 3e fc 84 ef 9c a3 16 05 85 97 |0D. H.>.........| +00000010 cc 31 88 3a 0c b6 b2 86 ee b5 32 2a 77 11 74 87 |.1.:......2*w.t.| +00000020 37 1d ef d8 02 20 48 bb 70 68 95 b4 89 07 c1 74 |7.... H.ph.....t| +00000030 63 b4 44 11 e9 99 b1 6c 38 a0 68 a2 13 83 d9 9b |c.D....l8.h.....| +00000040 2f 14 d7 9a 94 2c |/....,|" +"2019-04-22 06:17:49.039 UTC [protoutils] checkSignatureFromCreator -> DEBU 37df exits successfully" +"2019-04-22 06:17:49.040 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 37e0 validateChaincodeProposalMessage starts for proposal 0xc000180c40, header 0xc0031d9860" +"2019-04-22 06:17:49.040 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 37e1 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-04-22 06:17:49.040 UTC [endorser] preProcess -> DEBU 37e2 [businesschannel][c26bd59b] processing txid: c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d" +"2019-04-22 06:17:49.040 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 37e3 retrieveTransactionByID() - txId = [c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d]" +"2019-04-22 06:17:49.041 UTC [endorser] SimulateProposal -> DEBU 37e4 [businesschannel][c26bd59b] Entry chaincode: name:"qscc" " +"2019-04-22 06:17:49.041 UTC [endorser] callChaincode -> INFO 37e5 [businesschannel][c26bd59b] Entry chaincode: name:"qscc" " +"2019-04-22 06:17:49.041 UTC [chaincode] Execute -> DEBU 37e6 Entry" +"2019-04-22 06:17:49.042 UTC [qscc] Invoke -> DEBU 37e7 Invoke function: GetBlockByNumber on chain: businesschannel" +"2019-04-22 06:17:49.042 UTC [aclmgmt] CheckACL -> DEBU 37e8 acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +"2019-04-22 06:17:49.042 UTC [aclmgmt] CheckACL -> DEBU 37e9 acl check(/Channel/Application/Readers)" +"2019-04-22 06:17:49.043 UTC [policies] Evaluate -> DEBU 37ea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:49.043 UTC [policies] Evaluate -> DEBU 37eb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:49.044 UTC [policies] Evaluate -> DEBU 37ec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:49.044 UTC [cauthdsl] func1 -> DEBU 37ed 0xc00360fd90 gate 1555913869044479000 evaluation starts" +"2019-04-22 06:17:49.044 UTC [cauthdsl] func2 -> DEBU 37ee 0xc00360fd90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:49.044 UTC [cauthdsl] func2 -> DEBU 37ef 0xc00360fd90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:49.045 UTC [cauthdsl] func2 -> DEBU 37f0 0xc00360fd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:49.045 UTC [cauthdsl] func2 -> DEBU 37f1 0xc00360fd90 principal evaluation fails" +"2019-04-22 06:17:49.045 UTC [cauthdsl] func1 -> DEBU 37f2 0xc00360fd90 gate 1555913869044479000 evaluation fails" +"2019-04-22 06:17:49.045 UTC [policies] Evaluate -> DEBU 37f3 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:49.045 UTC [policies] Evaluate -> DEBU 37f4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:49.046 UTC [policies] Evaluate -> DEBU 37f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:49.046 UTC [cauthdsl] func1 -> DEBU 37f6 0xc0027065d0 gate 1555913869046665400 evaluation starts" +"2019-04-22 06:17:49.046 UTC [cauthdsl] func2 -> DEBU 37f7 0xc0027065d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:49.046 UTC [cauthdsl] func2 -> DEBU 37f8 0xc0027065d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:49.047 UTC [cauthdsl] func2 -> DEBU 37f9 0xc0027065d0 principal matched by identity 0" +"2019-04-22 06:17:49.047 UTC [msp.identity] Verify -> DEBU 37fa Verify: digest = 00000000 a6 07 04 5b b6 eb b2 0d 88 fd 0c 22 1a f3 a8 d6 |...[......."....| +00000010 9a b9 36 af 51 05 f4 8c e5 0d c7 b3 b8 e8 e7 23 |..6.Q..........#|" +"2019-04-22 06:17:49.048 UTC [msp.identity] Verify -> DEBU 37fb Verify: sig = 00000000 30 44 02 20 48 b8 3e fc 84 ef 9c a3 16 05 85 97 |0D. H.>.........| +00000010 cc 31 88 3a 0c b6 b2 86 ee b5 32 2a 77 11 74 87 |.1.:......2*w.t.| +00000020 37 1d ef d8 02 20 48 bb 70 68 95 b4 89 07 c1 74 |7.... H.ph.....t| +00000030 63 b4 44 11 e9 99 b1 6c 38 a0 68 a2 13 83 d9 9b |c.D....l8.h.....| +00000040 2f 14 d7 9a 94 2c |/....,|" +"2019-04-22 06:17:49.048 UTC [cauthdsl] func2 -> DEBU 37fc 0xc0027065d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:49.048 UTC [cauthdsl] func1 -> DEBU 37fd 0xc0027065d0 gate 1555913869046665400 evaluation succeeds" +"2019-04-22 06:17:49.049 UTC [policies] Evaluate -> DEBU 37fe Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:49.049 UTC [policies] Evaluate -> DEBU 37ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:49.050 UTC [policies] Evaluate -> DEBU 3800 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:49.050 UTC [policies] Evaluate -> DEBU 3801 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:49.050 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 3802 retrieveBlockByNumber() - blockNum = [2]" +"2019-04-22 06:17:49.050 UTC [fsblkstorage] newBlockfileStream -> DEBU 3803 newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[47629]" +"2019-04-22 06:17:49.051 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 3804 Remaining bytes=[51046], Going to peek [8] bytes" +"2019-04-22 06:17:49.051 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 3805 Returning blockbytes - length=[23743], placementInfo={fileNum=[0], startOffset=[47629], bytesOffset=[47632]}" +"2019-04-22 06:17:49.051 UTC [chaincode] handleMessage -> DEBU 3806 [c26bd59b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:49.052 UTC [chaincode] Notify -> DEBU 3807 [c26bd59b] notifying Txid:c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d, channelID:businesschannel" +"2019-04-22 06:17:49.052 UTC [chaincode] Execute -> DEBU 3808 Exit" +"2019-04-22 06:17:49.052 UTC [endorser] callChaincode -> INFO 3809 [businesschannel][c26bd59b] Exit chaincode: name:"qscc" (11ms)" +"2019-04-22 06:17:49.052 UTC [endorser] SimulateProposal -> DEBU 380a [businesschannel][c26bd59b] Exit" +"2019-04-22 06:17:49.053 UTC [endorser] endorseProposal -> DEBU 380b [businesschannel][c26bd59b] Entry chaincode: name:"qscc" " +"2019-04-22 06:17:49.053 UTC [endorser] endorseProposal -> DEBU 380c [businesschannel][c26bd59b] escc for chaincode name:"qscc" is escc" +"2019-04-22 06:17:49.053 UTC [endorser] EndorseWithPlugin -> DEBU 380d Entering endorsement for {plugin: escc, channel: businesschannel, tx: c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d, chaincode: qscc}" +"2019-04-22 06:17:49.054 UTC [msp.identity] Sign -> DEBU 380e Sign: plaintext: 0A20F222D9CD97ADC98EB20A33DE5951...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:49.054 UTC [msp.identity] Sign -> DEBU 380f Sign: digest: A0881B2A45EA0D1E55B948650541B204BEAE70D11D33D2177373BF0B11606539 " +"2019-04-22 06:17:49.055 UTC [endorser] EndorseWithPlugin -> DEBU 3810 Exiting {plugin: escc, channel: businesschannel, tx: c26bd59bced4589f44a16c7aa5bbd16e70052b5e61ff716ef417adbdccbfc68d, chaincode: qscc}" +"2019-04-22 06:17:49.055 UTC [endorser] endorseProposal -> DEBU 3811 [businesschannel][c26bd59b] Exit" +"2019-04-22 06:17:49.056 UTC [endorser] func1 -> DEBU 3812 Exit: request from 192.168.224.9:49332" +"2019-04-22 06:17:49.056 UTC [comm.grpc.server] 1 -> INFO 3813 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49332 grpc.code=OK grpc.call_duration=20.8717ms +"2019-04-22 06:17:49.062 UTC [grpc] infof -> DEBU 3814 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:49.063 UTC [grpc] infof -> DEBU 3815 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:50.089 UTC [gossip.comm] func1 -> DEBU 3816 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.098 UTC [gossip.gossip] handleMessage -> DEBU 3817 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.098 UTC [msp] DeserializeIdentity -> DEBU 3818 Obtaining identity" +"2019-04-22 06:17:50.099 UTC [msp] DeserializeIdentity -> DEBU 3819 Obtaining identity" +"2019-04-22 06:17:50.100 UTC [msp] DeserializeIdentity -> DEBU 381a Obtaining identity" +"2019-04-22 06:17:50.100 UTC [gossip.gossip] handleMessage -> DEBU 381b Exiting" +"2019-04-22 06:17:50.126 UTC [gossip.comm] func1 -> DEBU 381c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913867848776500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:50.127 UTC [gossip.gossip] handleMessage -> DEBU 381d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913867848776500 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:9 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:17:50.127 UTC [msp] DeserializeIdentity -> DEBU 381e Obtaining identity" +"2019-04-22 06:17:50.127 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 381f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:50.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3820 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:50.127 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3821 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:50.127 UTC [policies] Evaluate -> DEBU 3822 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:50.127 UTC [policies] Evaluate -> DEBU 3823 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:50.127 UTC [policies] Evaluate -> DEBU 3824 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:50.127 UTC [cauthdsl] func1 -> DEBU 3825 0xc003a27a70 gate 1555913870127748100 evaluation starts" +"2019-04-22 06:17:50.127 UTC [cauthdsl] func2 -> DEBU 3826 0xc003a27a70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:50.127 UTC [cauthdsl] func2 -> DEBU 3827 0xc003a27a70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:50.127 UTC [cauthdsl] func2 -> DEBU 3828 0xc003a27a70 principal matched by identity 0" +"2019-04-22 06:17:50.127 UTC [msp.identity] Verify -> DEBU 3829 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:50.128 UTC [msp.identity] Verify -> DEBU 382a Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:50.128 UTC [cauthdsl] func2 -> DEBU 382b 0xc003a27a70 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:50.128 UTC [cauthdsl] func1 -> DEBU 382c 0xc003a27a70 gate 1555913870127748100 evaluation succeeds" +"2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 382d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 382e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 382f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:50.128 UTC [policies] Evaluate -> DEBU 3830 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:50.128 UTC [msp] DeserializeIdentity -> DEBU 3831 Obtaining identity" +"2019-04-22 06:17:50.128 UTC [gossip.gossip] handleMessage -> DEBU 3832 Exiting" +"2019-04-22 06:17:50.654 UTC [endorser] ProcessProposal -> DEBU 3833 Entering: request from 192.168.224.9:49336" +"2019-04-22 06:17:50.654 UTC [protoutils] ValidateProposalMessage -> DEBU 3834 ValidateProposalMessage starts for signed proposal 0xc003356550" +"2019-04-22 06:17:50.654 UTC [protoutils] validateChannelHeader -> DEBU 3835 validateChannelHeader info: header type 3" +"2019-04-22 06:17:50.654 UTC [protoutils] checkSignatureFromCreator -> DEBU 3836 begin" +"2019-04-22 06:17:50.654 UTC [msp] GetManagerForChain -> DEBU 3837 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:50.655 UTC [protoutils] checkSignatureFromCreator -> DEBU 3838 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:50.655 UTC [protoutils] checkSignatureFromCreator -> DEBU 3839 creator is valid" +"2019-04-22 06:17:50.655 UTC [msp.identity] Verify -> DEBU 383a Verify: digest = 00000000 d4 ee 40 c1 7d af 9a f3 d2 91 32 65 93 44 bc 5b |..@.}.....2e.D.[| +00000010 8e cf 06 50 a4 aa b2 9d cc 56 0a a9 17 92 f7 f4 |...P.....V......|" +"2019-04-22 06:17:50.656 UTC [msp.identity] Verify -> DEBU 383b Verify: sig = 00000000 30 45 02 21 00 fa 99 2b 79 a6 bf c2 3b 82 c7 61 |0E.!...+y...;..a| +00000010 5f cc 32 af ac 65 ca 35 29 76 bc ea 01 4c 7f c9 |_.2..e.5)v...L..| +00000020 ac bc 40 ba c4 02 20 03 e3 65 34 15 6c 62 ef f1 |..@... ..e4.lb..| +00000030 d1 11 07 32 9f 36 54 6a 05 4c 30 a7 96 ab 9e b6 |...2.6Tj.L0.....| +00000040 53 1d 31 5a 52 c4 2b |S.1ZR.+|" +"2019-04-22 06:17:50.657 UTC [protoutils] checkSignatureFromCreator -> DEBU 383c exits successfully" +"2019-04-22 06:17:50.657 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 383d validateChaincodeProposalMessage starts for proposal 0xc0001d0770, header 0xc0033569b0" +"2019-04-22 06:17:50.657 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 383e validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-04-22 06:17:50.657 UTC [endorser] preProcess -> DEBU 383f [businesschannel][a5dbf721] processing txid: a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94" +"2019-04-22 06:17:50.658 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3840 retrieveTransactionByID() - txId = [a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94]" +"2019-04-22 06:17:50.658 UTC [endorser] SimulateProposal -> DEBU 3841 [businesschannel][a5dbf721] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:50.658 UTC [endorser] callChaincode -> INFO 3842 [businesschannel][a5dbf721] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:50.658 UTC [chaincode] Execute -> DEBU 3843 Entry" +"2019-04-22 06:17:50.659 UTC [cscc] Invoke -> DEBU 3844 Invoke function: GetConfigBlock" +"2019-04-22 06:17:50.659 UTC [aclmgmt] CheckACL -> DEBU 3845 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +"2019-04-22 06:17:50.659 UTC [aclmgmt] CheckACL -> DEBU 3846 acl check(/Channel/Application/Readers)" +"2019-04-22 06:17:50.660 UTC [policies] Evaluate -> DEBU 3847 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:50.660 UTC [policies] Evaluate -> DEBU 3848 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:50.660 UTC [policies] Evaluate -> DEBU 3849 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:50.660 UTC [cauthdsl] func1 -> DEBU 384a 0xc0024a8b80 gate 1555913870660922200 evaluation starts" +"2019-04-22 06:17:50.661 UTC [cauthdsl] func2 -> DEBU 384b 0xc0024a8b80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:50.661 UTC [cauthdsl] func2 -> DEBU 384c 0xc0024a8b80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:50.662 UTC [cauthdsl] func2 -> DEBU 384d 0xc0024a8b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:50.662 UTC [cauthdsl] func2 -> DEBU 384e 0xc0024a8b80 principal evaluation fails" +"2019-04-22 06:17:50.662 UTC [cauthdsl] func1 -> DEBU 384f 0xc0024a8b80 gate 1555913870660922200 evaluation fails" +"2019-04-22 06:17:50.663 UTC [policies] Evaluate -> DEBU 3850 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:50.663 UTC [policies] Evaluate -> DEBU 3851 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:50.664 UTC [policies] Evaluate -> DEBU 3852 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:50.664 UTC [cauthdsl] func1 -> DEBU 3853 0xc0024a93c0 gate 1555913870664332700 evaluation starts" +"2019-04-22 06:17:50.664 UTC [cauthdsl] func2 -> DEBU 3854 0xc0024a93c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:50.664 UTC [cauthdsl] func2 -> DEBU 3855 0xc0024a93c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:50.665 UTC [cauthdsl] func2 -> DEBU 3856 0xc0024a93c0 principal matched by identity 0" +"2019-04-22 06:17:50.665 UTC [msp.identity] Verify -> DEBU 3857 Verify: digest = 00000000 d4 ee 40 c1 7d af 9a f3 d2 91 32 65 93 44 bc 5b |..@.}.....2e.D.[| +00000010 8e cf 06 50 a4 aa b2 9d cc 56 0a a9 17 92 f7 f4 |...P.....V......|" +"2019-04-22 06:17:50.665 UTC [msp.identity] Verify -> DEBU 3858 Verify: sig = 00000000 30 45 02 21 00 fa 99 2b 79 a6 bf c2 3b 82 c7 61 |0E.!...+y...;..a| +00000010 5f cc 32 af ac 65 ca 35 29 76 bc ea 01 4c 7f c9 |_.2..e.5)v...L..| +00000020 ac bc 40 ba c4 02 20 03 e3 65 34 15 6c 62 ef f1 |..@... ..e4.lb..| +00000030 d1 11 07 32 9f 36 54 6a 05 4c 30 a7 96 ab 9e b6 |...2.6Tj.L0.....| +00000040 53 1d 31 5a 52 c4 2b |S.1ZR.+|" +"2019-04-22 06:17:50.666 UTC [cauthdsl] func2 -> DEBU 3859 0xc0024a93c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:50.666 UTC [cauthdsl] func1 -> DEBU 385a 0xc0024a93c0 gate 1555913870664332700 evaluation succeeds" +"2019-04-22 06:17:50.666 UTC [policies] Evaluate -> DEBU 385b Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:50.666 UTC [policies] Evaluate -> DEBU 385c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:50.666 UTC [policies] Evaluate -> DEBU 385d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:50.667 UTC [policies] Evaluate -> DEBU 385e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:50.667 UTC [chaincode] handleMessage -> DEBU 385f [a5dbf721] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:50.667 UTC [chaincode] Notify -> DEBU 3860 [a5dbf721] notifying Txid:a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94, channelID:businesschannel" +"2019-04-22 06:17:50.667 UTC [chaincode] Execute -> DEBU 3861 Exit" +"2019-04-22 06:17:50.668 UTC [endorser] callChaincode -> INFO 3862 [businesschannel][a5dbf721] Exit chaincode: name:"cscc" (9ms)" +"2019-04-22 06:17:50.668 UTC [endorser] SimulateProposal -> DEBU 3863 [businesschannel][a5dbf721] Exit" +"2019-04-22 06:17:50.668 UTC [endorser] endorseProposal -> DEBU 3864 [businesschannel][a5dbf721] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:50.668 UTC [endorser] endorseProposal -> DEBU 3865 [businesschannel][a5dbf721] escc for chaincode name:"cscc" is escc" +"2019-04-22 06:17:50.669 UTC [endorser] EndorseWithPlugin -> DEBU 3866 Entering endorsement for {plugin: escc, channel: businesschannel, tx: a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94, chaincode: cscc}" +"2019-04-22 06:17:50.669 UTC [msp.identity] Sign -> DEBU 3867 Sign: plaintext: 0A2000C9C74D2BA5F0BD1036F64C3E43...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:50.669 UTC [msp.identity] Sign -> DEBU 3868 Sign: digest: 291B739EBA8880793484A994C2EF1BDB0773A1764E354C17140143F31A775E63 " +"2019-04-22 06:17:50.670 UTC [endorser] EndorseWithPlugin -> DEBU 3869 Exiting {plugin: escc, channel: businesschannel, tx: a5dbf7215157dc2d7b2d8ccaed25651a0a0a55768ed0d7c17fd6b1f407715a94, chaincode: cscc}" +"2019-04-22 06:17:50.670 UTC [endorser] endorseProposal -> DEBU 386a [businesschannel][a5dbf721] Exit" +"2019-04-22 06:17:50.670 UTC [endorser] func1 -> DEBU 386b Exit: request from 192.168.224.9:49336" +"2019-04-22 06:17:50.670 UTC [comm.grpc.server] 1 -> INFO 386c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49336 grpc.code=OK grpc.call_duration=16.7963ms +"2019-04-22 06:17:50.675 UTC [grpc] infof -> DEBU 386d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:50.677 UTC [grpc] warningf -> DEBU 386e transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49336: read: connection reset by peer" +"2019-04-22 06:17:50.678 UTC [grpc] infof -> DEBU 386f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3870 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102D " +"2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3871 Sign: digest: 6E41605A885339006ED7A54E4F06BBC90432C06381507F1BB7BA3E340B385B20 " +"2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3872 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:50.840 UTC [msp.identity] Sign -> DEBU 3873 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:50.841 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3874 Sleeping 5s" +"2019-04-22 06:17:50.846 UTC [msp] DeserializeIdentity -> DEBU 3875 Obtaining identity" +"2019-04-22 06:17:50.846 UTC [msp] DeserializeIdentity -> DEBU 3876 Obtaining identity" +"2019-04-22 06:17:50.847 UTC [msp] DeserializeIdentity -> DEBU 3877 Obtaining identity" +"2019-04-22 06:17:50.848 UTC [gossip.comm] Send -> DEBU 3878 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 3879 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:50.852 UTC [gossip.comm] sendToEndpoint -> DEBU 387b Exiting" +"2019-04-22 06:17:50.849 UTC [msp] DeserializeIdentity -> DEBU 387a Obtaining identity" +"2019-04-22 06:17:50.855 UTC [gossip.comm] Send -> DEBU 387c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:50.855 UTC [gossip.comm] Send -> DEBU 387d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:50.855 UTC [gossip.comm] sendToEndpoint -> DEBU 387e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:50.856 UTC [gossip.comm] sendToEndpoint -> DEBU 387f Exiting" +"2019-04-22 06:17:50.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3880 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:45 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:50.856 UTC [gossip.comm] sendToEndpoint -> DEBU 3881 Exiting" +"2019-04-22 06:17:50.892 UTC [gossip.pull] Hello -> DEBU 3882 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:50.892 UTC [gossip.comm] Send -> DEBU 3883 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:50.893 UTC [gossip.pull] Hello -> DEBU 3884 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:50.893 UTC [gossip.comm] Send -> DEBU 3885 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:50.893 UTC [gossip.pull] Hello -> DEBU 3886 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:50.893 UTC [gossip.comm] Send -> DEBU 3887 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 3888 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 3889 Exiting" +"2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388b Exiting" +"2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 388d Exiting" +"2019-04-22 06:17:50.899 UTC [gossip.gossip] handleMessage -> DEBU 388e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 415901031012235375 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.899 UTC [gossip.pull] HandleMessage -> DEBU 3890 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 415901031012235375 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.899 UTC [gossip.comm] func1 -> DEBU 388f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13283693601951021668 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.899 UTC [gossip.comm] func1 -> DEBU 3891 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10887226070778160143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.900 UTC [gossip.gossip] handleMessage -> DEBU 3892 Exiting" +"2019-04-22 06:17:50.901 UTC [gossip.gossip] handleMessage -> DEBU 3893 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13283693601951021668 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.901 UTC [gossip.pull] HandleMessage -> DEBU 3894 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 13283693601951021668 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.902 UTC [gossip.gossip] handleMessage -> DEBU 3895 Exiting" +"2019-04-22 06:17:50.902 UTC [gossip.gossip] handleMessage -> DEBU 3896 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10887226070778160143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.903 UTC [gossip.pull] HandleMessage -> DEBU 3897 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10887226070778160143 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.903 UTC [gossip.gossip] handleMessage -> DEBU 3898 Exiting" +"2019-04-22 06:17:50.944 UTC [msp.identity] Sign -> DEBU 3899 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102E " +"2019-04-22 06:17:50.945 UTC [msp.identity] Sign -> DEBU 389a Sign: digest: 37A6BC74A66636F82D1579C60CBF3400CEAA49D7B6629D3C2B78F90B07A8659F " +"2019-04-22 06:17:50.945 UTC [msp.identity] Sign -> DEBU 389b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:50.945 UTC [msp.identity] Sign -> DEBU 389c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:50.946 UTC [gossip.comm] Send -> DEBU 389d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:50.946 UTC [msp] DeserializeIdentity -> DEBU 389e Obtaining identity" +"2019-04-22 06:17:50.946 UTC [gossip.comm] Send -> DEBU 389f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:50.947 UTC [msp] DeserializeIdentity -> DEBU 38a0 Obtaining identity" +"2019-04-22 06:17:50.947 UTC [gossip.comm] Send -> DEBU 38a1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:50.947 UTC [gossip.comm] sendToEndpoint -> DEBU 38a2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.948 UTC [gossip.comm] sendToEndpoint -> DEBU 38a3 Exiting" +"2019-04-22 06:17:50.948 UTC [gossip.comm] sendToEndpoint -> DEBU 38a4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.948 UTC [gossip.comm] sendToEndpoint -> DEBU 38a5 Exiting" +"2019-04-22 06:17:50.949 UTC [gossip.comm] sendToEndpoint -> DEBU 38a6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.949 UTC [gossip.comm] sendToEndpoint -> DEBU 38a7 Exiting" +"2019-04-22 06:17:50.952 UTC [gossip.comm] func1 -> DEBU 38a8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.953 UTC [gossip.gossip] handleMessage -> DEBU 38a9 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.954 UTC [gossip.gossip] handleMessage -> DEBU 38aa Exiting" +"2019-04-22 06:17:50.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38ac Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:50.955 UTC [msp.identity] Verify -> DEBU 38ad Verify: digest = 00000000 37 a6 bc 74 a6 66 36 f8 2d 15 79 c6 0c bf 34 00 |7..t.f6.-.y...4.| +00000010 ce aa 49 d7 b6 62 9d 3c 2b 78 f9 0b 07 a8 65 9f |..I..b.<+x....e.|" +"2019-04-22 06:17:50.955 UTC [msp.identity] Verify -> DEBU 38ae Verify: sig = 00000000 30 44 02 20 4c 80 3c e8 d9 71 ae 1d 86 4f 5e 61 |0D. L.<..q...O^a| +00000010 a6 cc 83 35 6b c9 b3 e1 47 a1 14 68 9c 82 25 e1 |...5k...G..h..%.| +00000020 2c ef 52 a2 02 20 16 24 a6 43 4e eb 96 a3 76 01 |,.R.. .$.CN...v.| +00000030 e9 06 88 53 04 26 eb 79 d2 f6 71 ea f0 05 e6 0b |...S.&.y..q.....| +00000040 9d 54 75 f2 e3 63 |.Tu..c|" +"2019-04-22 06:17:50.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 38af Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:50.956 UTC [gossip.discovery] isSentByMe -> DEBU 38b0 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:50.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 38b1 Exiting" +"2019-04-22 06:17:50.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38b2 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:50.957 UTC [msp] DeserializeIdentity -> DEBU 38b3 Obtaining identity" +"2019-04-22 06:17:50.957 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:50.957 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:50.958 UTC [policies] Evaluate -> DEBU 38b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:50.958 UTC [policies] Evaluate -> DEBU 38b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:50.958 UTC [policies] Evaluate -> DEBU 38b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:50.958 UTC [cauthdsl] func1 -> DEBU 38ba 0xc0031a1a00 gate 1555913870958488600 evaluation starts" +"2019-04-22 06:17:50.958 UTC [cauthdsl] func2 -> DEBU 38bb 0xc0031a1a00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:50.958 UTC [cauthdsl] func2 -> DEBU 38bc 0xc0031a1a00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:50.959 UTC [cauthdsl] func2 -> DEBU 38bd 0xc0031a1a00 principal matched by identity 0" +"2019-04-22 06:17:50.959 UTC [msp.identity] Verify -> DEBU 38be Verify: digest = 00000000 b1 b5 c5 a8 63 a6 93 2f 94 b8 9c 74 1f 81 af 63 |....c../...t...c| +00000010 a7 8e fe 70 6a d7 ff 16 70 64 51 91 ea 4b b3 2b |...pj...pdQ..K.+|" +"2019-04-22 06:17:50.959 UTC [msp.identity] Verify -> DEBU 38bf Verify: sig = 00000000 30 44 02 20 19 0e 41 2f ec f4 9a 3e 66 81 f2 67 |0D. ..A/...>f..g| +00000010 d0 a8 ae 62 b9 97 cf 97 e2 1f 8a ec 44 f6 e6 71 |...b........D..q| +00000020 9d df 27 1e 02 20 36 a7 d9 2b 1d 52 11 59 ca 21 |..'.. 6..+.R.Y.!| +00000030 be 06 0e 62 b0 8d e9 80 5b 14 9a 59 72 d4 b2 2e |...b....[..Yr...| +00000040 7e 50 8b cd c0 3f |~P...?|" +"2019-04-22 06:17:50.960 UTC [cauthdsl] func2 -> DEBU 38c0 0xc0031a1a00 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:50.960 UTC [cauthdsl] func1 -> DEBU 38c1 0xc0031a1a00 gate 1555913870958488600 evaluation succeeds" +"2019-04-22 06:17:50.960 UTC [policies] Evaluate -> DEBU 38c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:50.960 UTC [policies] Evaluate -> DEBU 38c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:50.961 UTC [policies] Evaluate -> DEBU 38c4 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:50.961 UTC [policies] Evaluate -> DEBU 38c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:50.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 38c6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:50.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 38c7 Exiting" +"2019-04-22 06:17:50.962 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38c8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:50.961 UTC [gossip.comm] func1 -> DEBU 38c9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.963 UTC [gossip.gossip] handleMessage -> DEBU 38cb Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.962 UTC [msp.identity] Verify -> DEBU 38ca Verify: digest = 00000000 2b b1 63 6e 73 d8 c5 ee aa d2 82 9b 6f 99 a7 4d |+.cns.......o..M| +00000010 fe c9 bf 86 c9 7f 47 8e fd 35 38 7b 19 26 e6 1d |......G..58{.&..|" +"2019-04-22 06:17:50.964 UTC [msp.identity] Verify -> DEBU 38cc Verify: sig = 00000000 30 45 02 21 00 a5 fe 1f aa f0 5b cc 3f 73 c1 05 |0E.!......[.?s..| +00000010 a2 f6 40 94 7e b5 35 00 ce de 68 f8 b2 df 3c 77 |..@.~.5...h... DEBU 38cd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:50.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 38ce Exiting" +"2019-04-22 06:17:50.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38cf Exiting" +"2019-04-22 06:17:50.966 UTC [gossip.gossip] handleMessage -> DEBU 38d0 Exiting" +"2019-04-22 06:17:50.967 UTC [gossip.gossip] handleMessage -> DEBU 38d1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.966 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.967 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38d3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:50.967 UTC [msp.identity] Verify -> DEBU 38d4 Verify: digest = 00000000 37 a6 bc 74 a6 66 36 f8 2d 15 79 c6 0c bf 34 00 |7..t.f6.-.y...4.| +00000010 ce aa 49 d7 b6 62 9d 3c 2b 78 f9 0b 07 a8 65 9f |..I..b.<+x....e.|" +"2019-04-22 06:17:50.968 UTC [msp.identity] Verify -> DEBU 38d5 Verify: sig = 00000000 30 44 02 20 4c 80 3c e8 d9 71 ae 1d 86 4f 5e 61 |0D. L.<..q...O^a| +00000010 a6 cc 83 35 6b c9 b3 e1 47 a1 14 68 9c 82 25 e1 |...5k...G..h..%.| +00000020 2c ef 52 a2 02 20 16 24 a6 43 4e eb 96 a3 76 01 |,.R.. .$.CN...v.| +00000030 e9 06 88 53 04 26 eb 79 d2 f6 71 ea f0 05 e6 0b |...S.&.y..q.....| +00000040 9d 54 75 f2 e3 63 |.Tu..c|" +"2019-04-22 06:17:50.969 UTC [msp.identity] Verify -> DEBU 38d6 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:50.970 UTC [msp.identity] Verify -> DEBU 38d7 Verify: sig = 00000000 30 45 02 21 00 cb ea 59 2a cf fa e4 d3 8f fe eb |0E.!...Y*.......| +00000010 cc 10 bd 8d 92 4d 5b 61 f1 82 05 89 03 69 be 32 |.....M[a.....i.2| +00000020 00 da e4 f9 3d 02 20 2f c0 67 de 50 c0 98 6c a3 |....=. /.g.P..l.| +00000030 0b 10 2b 93 4b 43 6e 7b 59 30 aa 73 08 b7 4c 72 |..+.KCn{Y0.s..Lr| +00000040 0f 75 01 c8 ce bc cb |.u.....|" +"2019-04-22 06:17:50.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 38d8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:50.977 UTC [gossip.discovery] isSentByMe -> DEBU 38d9 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:50.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 38da Exiting" +"2019-04-22 06:17:50.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38db Exiting" +"2019-04-22 06:17:50.980 UTC [gossip.gossip] handleMessage -> DEBU 38dc Exiting" +"2019-04-22 06:17:50.979 UTC [gossip.discovery] handleMsgFromComm -> DEBU 38dd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:50.982 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38de Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:50.982 UTC [msp.identity] Verify -> DEBU 38df Verify: digest = 00000000 2b b1 63 6e 73 d8 c5 ee aa d2 82 9b 6f 99 a7 4d |+.cns.......o..M| +00000010 fe c9 bf 86 c9 7f 47 8e fd 35 38 7b 19 26 e6 1d |......G..58{.&..|" +"2019-04-22 06:17:50.983 UTC [msp.identity] Verify -> DEBU 38e0 Verify: sig = 00000000 30 45 02 21 00 a5 fe 1f aa f0 5b cc 3f 73 c1 05 |0E.!......[.?s..| +00000010 a2 f6 40 94 7e b5 35 00 ce de 68 f8 b2 df 3c 77 |..@.~.5...h... DEBU 38e1 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:50.983 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e2 Exiting" +"2019-04-22 06:17:50.984 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e3 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:50.986 UTC [msp.identity] Verify -> DEBU 38e4 Verify: digest = 00000000 37 a6 bc 74 a6 66 36 f8 2d 15 79 c6 0c bf 34 00 |7..t.f6.-.y...4.| +00000010 ce aa 49 d7 b6 62 9d 3c 2b 78 f9 0b 07 a8 65 9f |..I..b.<+x....e.|" +"2019-04-22 06:17:50.986 UTC [msp.identity] Verify -> DEBU 38e5 Verify: sig = 00000000 30 44 02 20 4c 80 3c e8 d9 71 ae 1d 86 4f 5e 61 |0D. L.<..q...O^a| +00000010 a6 cc 83 35 6b c9 b3 e1 47 a1 14 68 9c 82 25 e1 |...5k...G..h..%.| +00000020 2c ef 52 a2 02 20 16 24 a6 43 4e eb 96 a3 76 01 |,.R.. .$.CN...v.| +00000030 e9 06 88 53 04 26 eb 79 d2 f6 71 ea f0 05 e6 0b |...S.&.y..q.....| +00000040 9d 54 75 f2 e3 63 |.Tu..c|" +"2019-04-22 06:17:50.988 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:50.993 UTC [gossip.discovery] isSentByMe -> DEBU 38e7 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:46 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:50.994 UTC [gossip.discovery] handleAliveMessage -> DEBU 38e8 Exiting" +"2019-04-22 06:17:50.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 38e9 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:50.996 UTC [msp] DeserializeIdentity -> DEBU 38ea Obtaining identity" +"2019-04-22 06:17:50.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38eb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:50.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ec Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:50.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ed Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:50.999 UTC [endorser] ProcessProposal -> DEBU 38ee Entering: request from 192.168.224.9:49340" +"2019-04-22 06:17:50.999 UTC [protoutils] ValidateProposalMessage -> DEBU 38ef ValidateProposalMessage starts for signed proposal 0xc003dd00a0" +"2019-04-22 06:17:50.999 UTC [protoutils] validateChannelHeader -> DEBU 38f0 validateChannelHeader info: header type 3" +"2019-04-22 06:17:51.000 UTC [protoutils] checkSignatureFromCreator -> DEBU 38f1 begin" +"2019-04-22 06:17:51.000 UTC [msp] GetManagerForChain -> DEBU 38f2 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:51.001 UTC [protoutils] checkSignatureFromCreator -> DEBU 38f3 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:51.001 UTC [protoutils] checkSignatureFromCreator -> DEBU 38f4 creator is valid" +"2019-04-22 06:17:51.001 UTC [msp.identity] Verify -> DEBU 38f5 Verify: digest = 00000000 65 ca 6a 2d b4 87 ba 2a c6 2e 31 e2 6e cc b6 7b |e.j-...*..1.n..{| +00000010 9c 0d d7 3f 83 34 af e2 62 68 2b 13 83 79 25 89 |...?.4..bh+..y%.|" +"2019-04-22 06:17:51.001 UTC [msp.identity] Verify -> DEBU 38f6 Verify: sig = 00000000 30 45 02 21 00 f1 1d 55 13 84 a1 39 b0 30 1b 7c |0E.!...U...9.0.|| +00000010 a1 a1 df 2a fc 3c 63 42 43 4c 38 99 ae 43 e7 c6 |...*. DEBU 38f7 exits successfully" +"2019-04-22 06:17:51.002 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 38f8 validateChaincodeProposalMessage starts for proposal 0xc000154770, header 0xc003dd04b0" +"2019-04-22 06:17:51.002 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 38f9 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-04-22 06:17:51.002 UTC [endorser] preProcess -> DEBU 38fa [businesschannel][7bea3458] processing txid: 7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea" +"2019-04-22 06:17:51.003 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 38fb retrieveTransactionByID() - txId = [7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea]" +"2019-04-22 06:17:51.003 UTC [endorser] SimulateProposal -> DEBU 38fc [businesschannel][7bea3458] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:51.003 UTC [endorser] callChaincode -> INFO 38fd [businesschannel][7bea3458] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:51.003 UTC [chaincode] Execute -> DEBU 38fe Entry" +"2019-04-22 06:17:51.004 UTC [cscc] Invoke -> DEBU 38ff Invoke function: GetChannels" +"2019-04-22 06:17:51.004 UTC [msp.identity] Verify -> DEBU 3900 Verify: digest = 00000000 65 ca 6a 2d b4 87 ba 2a c6 2e 31 e2 6e cc b6 7b |e.j-...*..1.n..{| +00000010 9c 0d d7 3f 83 34 af e2 62 68 2b 13 83 79 25 89 |...?.4..bh+..y%.|" +"2019-04-22 06:17:51.005 UTC [msp.identity] Verify -> DEBU 3901 Verify: sig = 00000000 30 45 02 21 00 f1 1d 55 13 84 a1 39 b0 30 1b 7c |0E.!...U...9.0.|| +00000010 a1 a1 df 2a fc 3c 63 42 43 4c 38 99 ae 43 e7 c6 |...*. DEBU 3902 [7bea3458] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:51.006 UTC [chaincode] Notify -> DEBU 3903 [7bea3458] notifying Txid:7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea, channelID:businesschannel" +"2019-04-22 06:17:51.006 UTC [chaincode] Execute -> DEBU 3904 Exit" +"2019-04-22 06:17:51.006 UTC [endorser] callChaincode -> INFO 3905 [businesschannel][7bea3458] Exit chaincode: name:"cscc" (3ms)" +"2019-04-22 06:17:51.007 UTC [endorser] SimulateProposal -> DEBU 3906 [businesschannel][7bea3458] Exit" +"2019-04-22 06:17:51.007 UTC [endorser] endorseProposal -> DEBU 3907 [businesschannel][7bea3458] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:51.007 UTC [endorser] endorseProposal -> DEBU 3908 [businesschannel][7bea3458] escc for chaincode name:"cscc" is escc" +"2019-04-22 06:17:51.007 UTC [endorser] EndorseWithPlugin -> DEBU 3909 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea, chaincode: cscc}" +"2019-04-22 06:17:51.008 UTC [msp.identity] Sign -> DEBU 390a Sign: plaintext: 0A2049D50BDCD47ECC35185A8278470B...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:51.008 UTC [msp.identity] Sign -> DEBU 390b Sign: digest: EB336AB5DF20494F74831E248A653D482037D0E7D17DC601E5904D8EE6D4C962 " +"2019-04-22 06:17:51.008 UTC [endorser] EndorseWithPlugin -> DEBU 390c Exiting {plugin: escc, channel: businesschannel, tx: 7bea34580c8f8a80e0a8fdafd79c791d9545109ada2fb2ff4f3786be81ea51ea, chaincode: cscc}" +"2019-04-22 06:17:51.008 UTC [endorser] endorseProposal -> DEBU 390d [businesschannel][7bea3458] Exit" +"2019-04-22 06:17:51.008 UTC [endorser] func1 -> DEBU 390e Exit: request from 192.168.224.9:49340" +"2019-04-22 06:17:51.008 UTC [comm.grpc.server] 1 -> INFO 390f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49340 grpc.code=OK grpc.call_duration=9.6855ms +"2019-04-22 06:17:50.998 UTC [policies] Evaluate -> DEBU 3910 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:51.009 UTC [policies] Evaluate -> DEBU 3911 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:51.009 UTC [policies] Evaluate -> DEBU 3912 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:51.009 UTC [cauthdsl] func1 -> DEBU 3913 0xc003d22490 gate 1555913871009964300 evaluation starts" +"2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3914 0xc003d22490 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3915 0xc003d22490 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3916 0xc003d22490 principal matched by identity 0" +"2019-04-22 06:17:51.010 UTC [msp.identity] Verify -> DEBU 3917 Verify: digest = 00000000 ae a5 a9 8f ea 8d 5d d3 33 2a de 80 86 54 36 87 |......].3*...T6.| +00000010 1b 36 4c 92 a6 76 93 49 0d c4 77 47 28 3c 3b e5 |.6L..v.I..wG(<;.|" +"2019-04-22 06:17:51.010 UTC [msp.identity] Verify -> DEBU 3918 Verify: sig = 00000000 30 45 02 21 00 80 33 4e 3a 4d d8 73 bc e7 b7 64 |0E.!..3N:M.s...d| +00000010 35 f1 07 3e 86 a4 4d 3b 7e 4c cd 90 ff 14 22 32 |5..>..M;~L...."2| +00000020 5c 4e 9e e3 fa 02 20 45 53 7c 0d e2 2a 43 c1 52 |\N.... ES|..*C.R| +00000030 e2 8d 5a 26 64 07 bc 74 be a9 9d 11 1b ef 9b a6 |..Z&d..t........| +00000040 01 74 1c b6 21 55 0b |.t..!U.|" +"2019-04-22 06:17:51.010 UTC [cauthdsl] func2 -> DEBU 3919 0xc003d22490 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:51.010 UTC [cauthdsl] func1 -> DEBU 391a 0xc003d22490 gate 1555913871009964300 evaluation succeeds" +"2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:51.010 UTC [policies] Evaluate -> DEBU 391e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:51.011 UTC [gossip.discovery] handleAliveMessage -> DEBU 391f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.011 UTC [gossip.discovery] handleAliveMessage -> DEBU 3920 Exiting" +"2019-04-22 06:17:51.012 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3921 Exiting" +"2019-04-22 06:17:51.017 UTC [grpc] infof -> DEBU 3922 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:51.017 UTC [grpc] infof -> DEBU 3923 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:51.122 UTC [gossip.comm] func1 -> DEBU 3924 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:51.122 UTC [gossip.gossip] handleMessage -> DEBU 3925 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:51.124 UTC [gossip.gossip] handleMessage -> DEBU 3926 Exiting" +"2019-04-22 06:17:51.124 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3927 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:51.125 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3928 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:51.125 UTC [msp.identity] Verify -> DEBU 3929 Verify: digest = 00000000 b1 f6 17 03 8a 8a 86 a8 e7 78 e8 a8 99 83 7a ab |.........x....z.| +00000010 fe 9b 7c 17 62 67 ab bd c3 a8 11 95 f9 53 8e 68 |..|.bg.......S.h|" +"2019-04-22 06:17:51.125 UTC [msp.identity] Verify -> DEBU 392a Verify: sig = 00000000 30 45 02 21 00 8a f4 ea a4 da 2a b9 ea 1f 8c 5c |0E.!......*....\| +00000010 a1 9b fe 0d 2d 68 87 d4 45 a4 d4 f6 1a 85 8d ac |....-h..E.......| +00000020 a4 b8 c4 e1 08 02 20 30 e8 9c 0b 79 89 7c 73 7e |...... 0...y.|s~| +00000030 ef 25 f1 d2 10 fc d0 22 e4 73 46 bf 19 d9 c6 61 |.%.....".sF....a| +00000040 8e e3 54 40 7c 76 ab |..T@|v.|" +"2019-04-22 06:17:51.126 UTC [msp.identity] Verify -> DEBU 392b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:51.126 UTC [msp.identity] Verify -> DEBU 392c Verify: sig = 00000000 30 45 02 21 00 c1 61 b7 39 6e 98 44 5f 5e 53 03 |0E.!..a.9n.D_^S.| +00000010 3c af 18 ca 84 65 96 e9 58 d9 5c a1 33 db c0 c3 |<....e..X.\.3...| +00000020 dd e7 88 00 75 02 20 7f b6 57 72 6e 61 61 e3 97 |....u. ..Wrnaa..| +00000030 e9 2a 12 91 10 8c d9 00 00 c4 40 22 6a 52 f9 47 |.*........@"jR.G| +00000040 b7 e7 f7 ef bd a7 2e |.......|" +"2019-04-22 06:17:51.127 UTC [gossip.discovery] handleAliveMessage -> DEBU 392d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:51.128 UTC [gossip.discovery] learnExistingMembers -> DEBU 392e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:51.130 UTC [gossip.discovery] learnExistingMembers -> DEBU 392f updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 " +"2019-04-22 06:17:51.130 UTC [gossip.discovery] learnExistingMembers -> DEBU 3930 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 " +"2019-04-22 06:17:51.131 UTC [gossip.discovery] learnExistingMembers -> DEBU 3931 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:51.131 UTC [gossip.discovery] learnExistingMembers -> DEBU 3932 Exiting" +"2019-04-22 06:17:51.131 UTC [gossip.discovery] handleAliveMessage -> DEBU 3933 Exiting" +"2019-04-22 06:17:51.131 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3934 Exiting" +"2019-04-22 06:17:51.133 UTC [gossip.comm] func1 -> DEBU 3935 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.133 UTC [gossip.gossip] handleMessage -> DEBU 3936 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.133 UTC [gossip.gossip] handleMessage -> DEBU 3937 Exiting" +"2019-04-22 06:17:51.134 UTC [msp] DeserializeIdentity -> DEBU 3938 Obtaining identity" +"2019-04-22 06:17:51.134 UTC [msp] DeserializeIdentity -> DEBU 3939 Obtaining identity" +"2019-04-22 06:17:51.135 UTC [msp] DeserializeIdentity -> DEBU 393a Obtaining identity" +"2019-04-22 06:17:51.135 UTC [gossip.comm] Send -> DEBU 393b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:51.136 UTC [msp] DeserializeIdentity -> DEBU 393c Obtaining identity" +"2019-04-22 06:17:51.136 UTC [gossip.comm] Send -> DEBU 393d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:51.137 UTC [gossip.comm] sendToEndpoint -> DEBU 393e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.140 UTC [gossip.comm] sendToEndpoint -> DEBU 393f Exiting" +"2019-04-22 06:17:51.141 UTC [gossip.gossip] handleMessage -> DEBU 3940 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3941 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3942 Exiting" +"2019-04-22 06:17:51.143 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3943 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3947 Exiting" +"2019-04-22 06:17:51.144 UTC [gossip.gossip] handleMessage -> DEBU 3944 Exiting" +"2019-04-22 06:17:51.144 UTC [gossip.comm] sendToEndpoint -> DEBU 3945 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.145 UTC [gossip.comm] func1 -> DEBU 3946 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.147 UTC [gossip.gossip] handleMessage -> DEBU 3949 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.148 UTC [gossip.pull] HandleMessage -> DEBU 394a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.146 UTC [gossip.comm] sendToEndpoint -> DEBU 3948 Exiting" +"2019-04-22 06:17:51.149 UTC [gossip.pull] SendDigest -> DEBU 394b Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:51.150 UTC [gossip.gossip] handleMessage -> DEBU 394c Exiting" +"2019-04-22 06:17:51.167 UTC [gossip.comm] func1 -> DEBU 394d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.168 UTC [gossip.gossip] handleMessage -> DEBU 394e Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.169 UTC [gossip.gossip] handleMessage -> DEBU 394f Exiting" +"2019-04-22 06:17:51.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3950 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3951 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:51.172 UTC [msp.identity] Verify -> DEBU 3952 Verify: digest = 00000000 37 97 30 9b 46 bc db ea 6a 7f f2 81 88 00 fb b7 |7.0.F...j.......| +00000010 2e 47 8b a0 17 d2 c6 88 c0 76 c6 13 88 55 77 5b |.G.......v...Uw[|" +"2019-04-22 06:17:51.173 UTC [msp.identity] Verify -> DEBU 3953 Verify: sig = 00000000 30 44 02 20 5a 02 57 a9 ab 04 2a c5 11 e8 04 92 |0D. Z.W...*.....| +00000010 c1 21 de 47 b6 1c 3a 46 a7 0d 5a 42 17 e7 47 96 |.!.G..:F..ZB..G.| +00000020 f7 9e 20 53 02 20 1b 70 ee ee 0c 8f 4e 60 de 02 |.. S. .p....N`..| +00000030 42 f6 39 6b 53 fd b7 4e e3 33 57 58 51 19 f8 f2 |B.9kS..N.3WXQ...| +00000040 cf fd 19 5a 65 8e |...Ze.|" +"2019-04-22 06:17:51.175 UTC [msp.identity] Verify -> DEBU 3954 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:51.175 UTC [msp.identity] Verify -> DEBU 3955 Verify: sig = 00000000 30 44 02 20 52 44 17 a3 c1 44 a8 15 3a 24 1f 0d |0D. RD...D..:$..| +00000010 55 89 96 7a 0d b8 d9 aa 47 5a 1c 62 3b 63 6b ab |U..z....GZ.b;ck.| +00000020 c2 77 48 9b 02 20 3c dc 2f f5 05 a2 6b 27 61 4a |.wH.. <./...k'aJ| +00000030 4b 2e 4d 3d 96 56 1a 94 20 d4 59 bb 93 9e 2b 49 |K.M=.V.. .Y...+I| +00000040 20 42 62 9f cc 95 | Bb...|" +"2019-04-22 06:17:51.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 3956 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:51.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 3957 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:17:51.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 3958 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 " +"2019-04-22 06:17:51.179 UTC [gossip.discovery] learnExistingMembers -> DEBU 3959 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 " +"2019-04-22 06:17:51.179 UTC [gossip.discovery] learnExistingMembers -> DEBU 395a Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:51.180 UTC [gossip.discovery] learnExistingMembers -> DEBU 395b Exiting" +"2019-04-22 06:17:51.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 395c Exiting" +"2019-04-22 06:17:51.181 UTC [gossip.discovery] sendMemResponse -> DEBU 395d Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:51.182 UTC [msp] DeserializeIdentity -> DEBU 395e Obtaining identity" +"2019-04-22 06:17:51.182 UTC [msp] DeserializeIdentity -> DEBU 395f Obtaining identity" +"2019-04-22 06:17:51.182 UTC [gossip.comm] Send -> DEBU 3960 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:51.183 UTC [gossip.discovery] sendMemResponse -> DEBU 3961 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:51.184 UTC [gossip.comm] sendToEndpoint -> DEBU 3962 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.184 UTC [gossip.comm] sendToEndpoint -> DEBU 3963 Exiting" +"2019-04-22 06:17:51.181 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3964 Exiting" +"2019-04-22 06:17:51.290 UTC [endorser] ProcessProposal -> DEBU 3965 Entering: request from 192.168.224.9:49344" +"2019-04-22 06:17:51.290 UTC [protoutils] ValidateProposalMessage -> DEBU 3966 ValidateProposalMessage starts for signed proposal 0xc003e387d0" +"2019-04-22 06:17:51.290 UTC [protoutils] validateChannelHeader -> DEBU 3967 validateChannelHeader info: header type 3" +"2019-04-22 06:17:51.290 UTC [protoutils] checkSignatureFromCreator -> DEBU 3968 begin" +"2019-04-22 06:17:51.290 UTC [msp] GetManagerForChain -> DEBU 3969 Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:17:51.291 UTC [protoutils] checkSignatureFromCreator -> DEBU 396a creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:17:51.291 UTC [protoutils] checkSignatureFromCreator -> DEBU 396b creator is valid" +"2019-04-22 06:17:51.291 UTC [msp.identity] Verify -> DEBU 396c Verify: digest = 00000000 ed a9 31 ea b2 fe 10 05 31 bc 4b 11 ec ce a2 2b |..1.....1.K....+| +00000010 ac ea 84 57 f8 7c 6b 00 85 b1 2f 00 8e d7 c2 5d |...W.|k.../....]|" +"2019-04-22 06:17:51.291 UTC [msp.identity] Verify -> DEBU 396d Verify: sig = 00000000 30 44 02 20 5b 41 dc fe 68 ca 1f cc 0a 3b 2f b8 |0D. [A..h....;/.| +00000010 53 5e 62 b4 82 42 b5 8d 0e 3d 90 07 ad 5b 1a 89 |S^b..B...=...[..| +00000020 a6 29 e2 8d 02 20 42 94 81 a2 1b 15 e2 c8 e1 9f |.)... B.........| +00000030 13 ef d7 e1 39 3a 41 c0 c4 72 14 45 76 68 b1 a0 |....9:A..r.Evh..| +00000040 84 f2 6d 50 74 c0 |..mPt.|" +"2019-04-22 06:17:51.292 UTC [protoutils] checkSignatureFromCreator -> DEBU 396e exits successfully" +"2019-04-22 06:17:51.292 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 396f validateChaincodeProposalMessage starts for proposal 0xc0004630a0, header 0xc003e38be0" +"2019-04-22 06:17:51.292 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3970 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-04-22 06:17:51.292 UTC [endorser] preProcess -> DEBU 3971 [businesschannel][4bfa0d04] processing txid: 4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5" +"2019-04-22 06:17:51.293 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3972 retrieveTransactionByID() - txId = [4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5]" +"2019-04-22 06:17:51.293 UTC [endorser] SimulateProposal -> DEBU 3973 [businesschannel][4bfa0d04] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:51.293 UTC [endorser] callChaincode -> INFO 3974 [businesschannel][4bfa0d04] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:51.294 UTC [chaincode] Execute -> DEBU 3975 Entry" +"2019-04-22 06:17:51.294 UTC [cscc] Invoke -> DEBU 3976 Invoke function: GetConfigTree" +"2019-04-22 06:17:51.294 UTC [aclmgmt] CheckACL -> DEBU 3977 acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigTree" +"2019-04-22 06:17:51.294 UTC [aclmgmt] CheckACL -> DEBU 3978 acl check(/Channel/Application/Readers)" +"2019-04-22 06:17:51.295 UTC [policies] Evaluate -> DEBU 3979 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:51.295 UTC [policies] Evaluate -> DEBU 397a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:51.295 UTC [policies] Evaluate -> DEBU 397b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:51.296 UTC [cauthdsl] func1 -> DEBU 397c 0xc0041f3560 gate 1555913871295840500 evaluation starts" +"2019-04-22 06:17:51.296 UTC [cauthdsl] func2 -> DEBU 397d 0xc0041f3560 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.296 UTC [cauthdsl] func2 -> DEBU 397e 0xc0041f3560 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:51.296 UTC [cauthdsl] func2 -> DEBU 397f 0xc0041f3560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:17:51.297 UTC [cauthdsl] func2 -> DEBU 3980 0xc0041f3560 principal evaluation fails" +"2019-04-22 06:17:51.297 UTC [cauthdsl] func1 -> DEBU 3981 0xc0041f3560 gate 1555913871295840500 evaluation fails" +"2019-04-22 06:17:51.297 UTC [policies] Evaluate -> DEBU 3982 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.297 UTC [policies] Evaluate -> DEBU 3983 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.297 UTC [policies] Evaluate -> DEBU 3984 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:17:51.297 UTC [cauthdsl] func1 -> DEBU 3985 0xc0041f3da0 gate 1555913871297647400 evaluation starts" +"2019-04-22 06:17:51.298 UTC [cauthdsl] func2 -> DEBU 3986 0xc0041f3da0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.298 UTC [cauthdsl] func2 -> DEBU 3987 0xc0041f3da0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:51.298 UTC [cauthdsl] func2 -> DEBU 3988 0xc0041f3da0 principal matched by identity 0" +"2019-04-22 06:17:51.298 UTC [msp.identity] Verify -> DEBU 3989 Verify: digest = 00000000 ed a9 31 ea b2 fe 10 05 31 bc 4b 11 ec ce a2 2b |..1.....1.K....+| +00000010 ac ea 84 57 f8 7c 6b 00 85 b1 2f 00 8e d7 c2 5d |...W.|k.../....]|" +"2019-04-22 06:17:51.298 UTC [msp.identity] Verify -> DEBU 398a Verify: sig = 00000000 30 44 02 20 5b 41 dc fe 68 ca 1f cc 0a 3b 2f b8 |0D. [A..h....;/.| +00000010 53 5e 62 b4 82 42 b5 8d 0e 3d 90 07 ad 5b 1a 89 |S^b..B...=...[..| +00000020 a6 29 e2 8d 02 20 42 94 81 a2 1b 15 e2 c8 e1 9f |.)... B.........| +00000030 13 ef d7 e1 39 3a 41 c0 c4 72 14 45 76 68 b1 a0 |....9:A..r.Evh..| +00000040 84 f2 6d 50 74 c0 |..mPt.|" +"2019-04-22 06:17:51.299 UTC [cauthdsl] func2 -> DEBU 398b 0xc0041f3da0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:51.299 UTC [cauthdsl] func1 -> DEBU 398c 0xc0041f3da0 gate 1555913871297647400 evaluation succeeds" +"2019-04-22 06:17:51.299 UTC [policies] Evaluate -> DEBU 398d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:51.300 UTC [policies] Evaluate -> DEBU 398e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:17:51.300 UTC [policies] Evaluate -> DEBU 398f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:51.300 UTC [policies] Evaluate -> DEBU 3990 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:51.301 UTC [chaincode] handleMessage -> DEBU 3991 [4bfa0d04] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:17:51.301 UTC [chaincode] Notify -> DEBU 3992 [4bfa0d04] notifying Txid:4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5, channelID:businesschannel" +"2019-04-22 06:17:51.302 UTC [chaincode] Execute -> DEBU 3993 Exit" +"2019-04-22 06:17:51.302 UTC [endorser] callChaincode -> INFO 3994 [businesschannel][4bfa0d04] Exit chaincode: name:"cscc" (8ms)" +"2019-04-22 06:17:51.302 UTC [endorser] SimulateProposal -> DEBU 3995 [businesschannel][4bfa0d04] Exit" +"2019-04-22 06:17:51.302 UTC [endorser] endorseProposal -> DEBU 3996 [businesschannel][4bfa0d04] Entry chaincode: name:"cscc" " +"2019-04-22 06:17:51.302 UTC [endorser] endorseProposal -> DEBU 3997 [businesschannel][4bfa0d04] escc for chaincode name:"cscc" is escc" +"2019-04-22 06:17:51.303 UTC [endorser] EndorseWithPlugin -> DEBU 3998 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5, chaincode: cscc}" +"2019-04-22 06:17:51.303 UTC [msp.identity] Sign -> DEBU 3999 Sign: plaintext: 0A201A8DD06510F54473E470969985FF...455254494649434154452D2D2D2D2D0A " +"2019-04-22 06:17:51.303 UTC [msp.identity] Sign -> DEBU 399a Sign: digest: BD67CD9DA9CEEADAA7489AD5700B34387B0EA60717712B24B4D1FCE1F5389501 " +"2019-04-22 06:17:51.304 UTC [endorser] EndorseWithPlugin -> DEBU 399b Exiting {plugin: escc, channel: businesschannel, tx: 4bfa0d042b9722f8fc0a3df9bb53e45467e69e5ab20222b0c98c79d43ae383e5, chaincode: cscc}" +"2019-04-22 06:17:51.304 UTC [endorser] endorseProposal -> DEBU 399c [businesschannel][4bfa0d04] Exit" +"2019-04-22 06:17:51.304 UTC [endorser] func1 -> DEBU 399d Exit: request from 192.168.224.9:49344" +"2019-04-22 06:17:51.304 UTC [comm.grpc.server] 1 -> INFO 399e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49344 grpc.code=OK grpc.call_duration=15.6478ms +"2019-04-22 06:17:51.309 UTC [grpc] warningf -> DEBU 399f transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49344: read: connection reset by peer" +"2019-04-22 06:17:51.310 UTC [grpc] infof -> DEBU 39a0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:51.311 UTC [grpc] infof -> DEBU 39a1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:17:51.466 UTC [gossip.election] waitForInterrupt -> DEBU 39a2 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:51.466 UTC [gossip.election] IsLeader -> DEBU 39a3 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:51.467 UTC [msp.identity] Sign -> DEBU 39a4 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB15100F1801 " +"2019-04-22 06:17:51.467 UTC [msp.identity] Sign -> DEBU 39a5 Sign: digest: F39F5BAEE65B09138668FDE26D86B30A489DFD540185ADF6B25051D7795C387F " +"2019-04-22 06:17:51.467 UTC [gossip.election] waitForInterrupt -> DEBU 39a6 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39a7 Obtaining identity" +"2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39a8 Obtaining identity" +"2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39a9 Obtaining identity" +"2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39aa Obtaining identity" +"2019-04-22 06:17:51.474 UTC [gossip.comm] Send -> DEBU 39ab Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:51.474 UTC [msp] DeserializeIdentity -> DEBU 39ac Obtaining identity" +"2019-04-22 06:17:51.475 UTC [msp] DeserializeIdentity -> DEBU 39ad Obtaining identity" +"2019-04-22 06:17:51.475 UTC [gossip.comm] sendToEndpoint -> DEBU 39ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:15 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.475 UTC [gossip.comm] sendToEndpoint -> DEBU 39af Exiting" +"2019-04-22 06:17:51.598 UTC [gossip.comm] func1 -> DEBU 39b0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.598 UTC [gossip.gossip] handleMessage -> DEBU 39b1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.598 UTC [gossip.gossip] handleMessage -> DEBU 39b2 Exiting" +"2019-04-22 06:17:51.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39b3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.598 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39b4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:51.598 UTC [msp] DeserializeIdentity -> DEBU 39b5 Obtaining identity" +"2019-04-22 06:17:51.598 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:51.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:51.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39b8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:51.599 UTC [cauthdsl] func1 -> DEBU 39bc 0xc00293a430 gate 1555913871599293500 evaluation starts" +"2019-04-22 06:17:51.599 UTC [cauthdsl] func2 -> DEBU 39bd 0xc00293a430 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.599 UTC [cauthdsl] func2 -> DEBU 39be 0xc00293a430 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:51.599 UTC [cauthdsl] func2 -> DEBU 39bf 0xc00293a430 principal matched by identity 0" +"2019-04-22 06:17:51.599 UTC [msp.identity] Verify -> DEBU 39c0 Verify: digest = 00000000 3f 1c db 0f 86 8f 8b be 26 03 72 43 3e 5b 00 93 |?.......&.rC>[..| +00000010 0b ae 0a d3 03 ba 87 88 c7 51 3b 5f 25 7a 3c c7 |.........Q;_%z<.|" +"2019-04-22 06:17:51.599 UTC [msp.identity] Verify -> DEBU 39c1 Verify: sig = 00000000 30 44 02 20 61 7a b2 ac 6f 00 4e 52 36 e1 3a 12 |0D. az..o.NR6.:.| +00000010 1b 96 e9 fe 4f 7d 46 5d 1b 7b de d7 b0 ba 5e 6b |....O}F].{....^k| +00000020 99 e9 c2 b7 02 20 45 f1 49 e3 bc bb ba 7f 2d f1 |..... E.I.....-.| +00000030 a5 69 e5 16 12 9e e2 67 45 3c 65 09 a0 af ed 88 |.i.....gE DEBU 39c2 0xc00293a430 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:51.599 UTC [cauthdsl] func1 -> DEBU 39c3 0xc00293a430 gate 1555913871599293500 evaluation succeeds" +"2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c6 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:51.599 UTC [policies] Evaluate -> DEBU 39c7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:51.600 UTC [gossip.discovery] handleAliveMessage -> DEBU 39c8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39c9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39ca updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 " +"2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39cb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 " +"2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39cc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:51.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 39cd Exiting" +"2019-04-22 06:17:51.600 UTC [gossip.discovery] handleAliveMessage -> DEBU 39ce Exiting" +"2019-04-22 06:17:51.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39cf Exiting" +"2019-04-22 06:17:51.600 UTC [msp] DeserializeIdentity -> DEBU 39d0 Obtaining identity" +"2019-04-22 06:17:51.600 UTC [msp] DeserializeIdentity -> DEBU 39d1 Obtaining identity" +"2019-04-22 06:17:51.600 UTC [msp] DeserializeIdentity -> DEBU 39d2 Obtaining identity" +"2019-04-22 06:17:51.601 UTC [msp] DeserializeIdentity -> DEBU 39d3 Obtaining identity" +"2019-04-22 06:17:51.601 UTC [msp] DeserializeIdentity -> DEBU 39d4 Obtaining identity" +"2019-04-22 06:17:51.602 UTC [msp] DeserializeIdentity -> DEBU 39d5 Obtaining identity" +"2019-04-22 06:17:51.602 UTC [msp] DeserializeIdentity -> DEBU 39d6 Obtaining identity" +"2019-04-22 06:17:51.602 UTC [gossip.comm] Send -> DEBU 39d7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:51.602 UTC [msp] DeserializeIdentity -> DEBU 39d8 Obtaining identity" +"2019-04-22 06:17:51.603 UTC [gossip.comm] sendToEndpoint -> DEBU 39d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.603 UTC [gossip.comm] sendToEndpoint -> DEBU 39da Exiting" +"2019-04-22 06:17:51.604 UTC [gossip.comm] Send -> DEBU 39db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:51.604 UTC [gossip.comm] sendToEndpoint -> DEBU 39dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.604 UTC [gossip.comm] sendToEndpoint -> DEBU 39dd Exiting" +"2019-04-22 06:17:51.615 UTC [gossip.comm] func1 -> DEBU 39de Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.615 UTC [gossip.gossip] handleMessage -> DEBU 39df Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.616 UTC [gossip.pull] HandleMessage -> DEBU 39e0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.616 UTC [msp] DeserializeIdentity -> DEBU 39e1 Obtaining identity" +"2019-04-22 06:17:51.616 UTC [msp] DeserializeIdentity -> DEBU 39e2 Obtaining identity" +"2019-04-22 06:17:51.617 UTC [msp] DeserializeIdentity -> DEBU 39e3 Obtaining identity" +"2019-04-22 06:17:51.617 UTC [gossip.comm] func1 -> DEBU 39e4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.618 UTC [msp] DeserializeIdentity -> DEBU 39e5 Obtaining identity" +"2019-04-22 06:17:51.618 UTC [msp] DeserializeIdentity -> DEBU 39e6 Obtaining identity" +"2019-04-22 06:17:51.618 UTC [msp] DeserializeIdentity -> DEBU 39e7 Obtaining identity" +"2019-04-22 06:17:51.618 UTC [gossip.pull] SendDigest -> DEBU 39e8 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:51.618 UTC [gossip.gossip] handleMessage -> DEBU 39e9 Exiting" +"2019-04-22 06:17:51.618 UTC [gossip.gossip] handleMessage -> DEBU 39ea Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.618 UTC [gossip.gossip] handleMessage -> DEBU 39eb Exiting" +"2019-04-22 06:17:51.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ec Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.618 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ed Exiting" +"2019-04-22 06:17:51.619 UTC [gossip.gossip] handleMessage -> DEBU 39ee Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.619 UTC [gossip.gossip] handleMessage -> DEBU 39ef Exiting" +"2019-04-22 06:17:51.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:51.619 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f1 Exiting" +"2019-04-22 06:17:51.644 UTC [gossip.comm] func1 -> DEBU 39f2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.644 UTC [gossip.gossip] handleMessage -> DEBU 39f3 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.644 UTC [gossip.gossip] handleMessage -> DEBU 39f4 Exiting" +"2019-04-22 06:17:51.644 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39f5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.645 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39f6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:51.645 UTC [msp] DeserializeIdentity -> DEBU 39f7 Obtaining identity" +"2019-04-22 06:17:51.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:51.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39f9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:51.645 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39fa Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:51.645 UTC [policies] Evaluate -> DEBU 39fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:51.645 UTC [policies] Evaluate -> DEBU 39fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:51.645 UTC [policies] Evaluate -> DEBU 39fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:51.645 UTC [cauthdsl] func1 -> DEBU 39fe 0xc003537e60 gate 1555913871645581300 evaluation starts" +"2019-04-22 06:17:51.645 UTC [cauthdsl] func2 -> DEBU 39ff 0xc003537e60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:51.645 UTC [cauthdsl] func2 -> DEBU 3a00 0xc003537e60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:51.645 UTC [cauthdsl] func2 -> DEBU 3a01 0xc003537e60 principal matched by identity 0" +"2019-04-22 06:17:51.645 UTC [msp.identity] Verify -> DEBU 3a02 Verify: digest = 00000000 a1 1b 96 59 77 77 5c 2a 5b 57 d1 98 43 05 34 63 |...Yww\*[W..C.4c| +00000010 dd 72 54 77 c3 7a d5 2f ed 63 a0 9f 94 e2 79 f7 |.rTw.z./.c....y.|" +"2019-04-22 06:17:51.645 UTC [msp.identity] Verify -> DEBU 3a03 Verify: sig = 00000000 30 45 02 21 00 ed 6f 91 74 e0 7f af 0c 16 1a 82 |0E.!..o.t.......| +00000010 b8 3a e2 f4 aa 18 eb ec cd e9 cb 9c 36 43 99 ea |.:..........6C..| +00000020 f1 fd 51 c0 f6 02 20 4f 32 00 ec af c4 51 b5 ef |..Q... O2....Q..| +00000030 46 1f 6b b3 07 1f 02 3c d1 91 f5 38 23 58 8e e4 |F.k....<...8#X..| +00000040 88 73 78 4c 54 3a a5 |.sxLT:.|" +"2019-04-22 06:17:51.646 UTC [cauthdsl] func2 -> DEBU 3a04 0xc003537e60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:51.646 UTC [cauthdsl] func1 -> DEBU 3a05 0xc003537e60 gate 1555913871645581300 evaluation succeeds" +"2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a08 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:51.646 UTC [policies] Evaluate -> DEBU 3a09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:51.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a0a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 " +"2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 " +"2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:51.646 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0f Exiting" +"2019-04-22 06:17:51.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a10 Exiting" +"2019-04-22 06:17:51.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a11 Exiting" +"2019-04-22 06:17:51.646 UTC [gossip.discovery] sendMemResponse -> DEBU 3a12 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:51.646 UTC [msp] DeserializeIdentity -> DEBU 3a13 Obtaining identity" +"2019-04-22 06:17:51.647 UTC [msp] DeserializeIdentity -> DEBU 3a14 Obtaining identity" +"2019-04-22 06:17:51.649 UTC [msp] DeserializeIdentity -> DEBU 3a15 Obtaining identity" +"2019-04-22 06:17:51.649 UTC [gossip.comm] Send -> DEBU 3a16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:51.649 UTC [gossip.discovery] sendMemResponse -> DEBU 3a17 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:51.650 UTC [gossip.comm] sendToEndpoint -> DEBU 3a18 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:51.650 UTC [gossip.comm] sendToEndpoint -> DEBU 3a19 Exiting" +"2019-04-22 06:17:52.021 UTC [gossip.gossip] handleMessage -> DEBU 3a1a Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.024 UTC [gossip.gossip] handleMessage -> DEBU 3a1b Exiting" +"2019-04-22 06:17:52.025 UTC [gossip.gossip] handleMessage -> DEBU 3a1d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.025 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a1e Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:52.027 UTC [msp] DeserializeIdentity -> DEBU 3a1f Obtaining identity" +"2019-04-22 06:17:52.027 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a22 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a23 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.028 UTC [gossip.comm] func1 -> DEBU 3a24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.028 UTC [policies] Evaluate -> DEBU 3a25 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.029 UTC [policies] Evaluate -> DEBU 3a26 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.029 UTC [policies] Evaluate -> DEBU 3a27 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.025 UTC [gossip.pull] HandleMessage -> DEBU 3a21 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.029 UTC [cauthdsl] func1 -> DEBU 3a28 0xc00390feb0 gate 1555913872029490900 evaluation starts" +"2019-04-22 06:17:52.029 UTC [msp] DeserializeIdentity -> DEBU 3a29 Obtaining identity" +"2019-04-22 06:17:52.030 UTC [msp] DeserializeIdentity -> DEBU 3a2a Obtaining identity" +"2019-04-22 06:17:52.030 UTC [cauthdsl] func2 -> DEBU 3a2b 0xc00390feb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.030 UTC [cauthdsl] func2 -> DEBU 3a2c 0xc00390feb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.030 UTC [msp] DeserializeIdentity -> DEBU 3a2d Obtaining identity" +"2019-04-22 06:17:52.030 UTC [cauthdsl] func2 -> DEBU 3a2e 0xc00390feb0 principal matched by identity 0" +"2019-04-22 06:17:52.031 UTC [msp.identity] Verify -> DEBU 3a2f Verify: digest = 00000000 19 cc e7 8d d2 b6 7d 16 e6 4f 36 d3 50 0c 0a 30 |......}..O6.P..0| +00000010 64 37 ee df d1 9f 03 a6 1b a0 19 d2 d6 34 cf df |d7...........4..|" +"2019-04-22 06:17:52.031 UTC [msp] DeserializeIdentity -> DEBU 3a30 Obtaining identity" +"2019-04-22 06:17:52.031 UTC [msp] DeserializeIdentity -> DEBU 3a31 Obtaining identity" +"2019-04-22 06:17:52.031 UTC [msp.identity] Verify -> DEBU 3a32 Verify: sig = 00000000 30 45 02 21 00 cb 0f c7 e3 8c e0 d9 22 85 48 ca |0E.!........".H.| +00000010 6d ef 22 bd 0b 75 52 ac 76 8f fb 06 34 b5 8b 12 |m."..uR.v...4...| +00000020 7c 8d 73 84 68 02 20 65 f3 95 d1 1c 44 b2 29 5d ||.s.h. e....D.)]| +00000030 6f a3 77 6f aa f5 14 1c cd d9 ad 51 19 3b bd 6d |o.wo.......Q.;.m| +00000040 78 87 e4 c4 08 60 93 |x....`.|" +"2019-04-22 06:17:52.031 UTC [msp] DeserializeIdentity -> DEBU 3a33 Obtaining identity" +"2019-04-22 06:17:52.032 UTC [gossip.pull] SendDigest -> DEBU 3a34 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:52.032 UTC [gossip.gossip] handleMessage -> DEBU 3a35 Exiting" +"2019-04-22 06:17:52.033 UTC [gossip.gossip] handleMessage -> DEBU 3a36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.034 UTC [cauthdsl] func2 -> DEBU 3a37 0xc00390feb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.034 UTC [cauthdsl] func1 -> DEBU 3a38 0xc00390feb0 gate 1555913872029490900 evaluation succeeds" +"2019-04-22 06:17:52.034 UTC [gossip.comm] func1 -> DEBU 3a39 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.034 UTC [policies] Evaluate -> DEBU 3a3a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.035 UTC [policies] Evaluate -> DEBU 3a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.035 UTC [policies] Evaluate -> DEBU 3a3c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.035 UTC [policies] Evaluate -> DEBU 3a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.036 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a3e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a3f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a40 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 " +"2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a41 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 " +"2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a42 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:45 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:52.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a43 Exiting" +"2019-04-22 06:17:52.037 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a44 Exiting" +"2019-04-22 06:17:52.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a45 Exiting" +"2019-04-22 06:17:52.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.037 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a47 Exiting" +"2019-04-22 06:17:52.037 UTC [gossip.gossip] handleMessage -> DEBU 3a48 Exiting" +"2019-04-22 06:17:52.037 UTC [gossip.gossip] handleMessage -> DEBU 3a49 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.038 UTC [gossip.gossip] handleMessage -> DEBU 3a4a Exiting" +"2019-04-22 06:17:52.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.038 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4c Exiting" +"2019-04-22 06:17:52.043 UTC [gossip.gossip] handleMessage -> DEBU 3a4d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.043 UTC [gossip.gossip] handleMessage -> DEBU 3a4e Exiting" +"2019-04-22 06:17:52.043 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a4f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.044 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a50 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:52.044 UTC [msp] DeserializeIdentity -> DEBU 3a51 Obtaining identity" +"2019-04-22 06:17:52.045 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a53 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a54 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.044 UTC [msp] DeserializeIdentity -> DEBU 3a52 Obtaining identity" +"2019-04-22 06:17:52.045 UTC [msp] DeserializeIdentity -> DEBU 3a55 Obtaining identity" +"2019-04-22 06:17:52.045 UTC [msp] DeserializeIdentity -> DEBU 3a56 Obtaining identity" +"2019-04-22 06:17:52.046 UTC [msp] DeserializeIdentity -> DEBU 3a57 Obtaining identity" +"2019-04-22 06:17:52.046 UTC [msp] DeserializeIdentity -> DEBU 3a58 Obtaining identity" +"2019-04-22 06:17:52.046 UTC [msp] DeserializeIdentity -> DEBU 3a59 Obtaining identity" +"2019-04-22 06:17:52.047 UTC [msp] DeserializeIdentity -> DEBU 3a5a Obtaining identity" +"2019-04-22 06:17:52.047 UTC [gossip.comm] Send -> DEBU 3a5b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:52.047 UTC [msp] DeserializeIdentity -> DEBU 3a5c Obtaining identity" +"2019-04-22 06:17:52.047 UTC [gossip.comm] Send -> DEBU 3a5d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a5e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a5f Exiting" +"2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a60 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:52.048 UTC [gossip.comm] sendToEndpoint -> DEBU 3a61 Exiting" +"2019-04-22 06:17:52.045 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a62 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.051 UTC [policies] Evaluate -> DEBU 3a63 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.051 UTC [policies] Evaluate -> DEBU 3a64 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.051 UTC [policies] Evaluate -> DEBU 3a65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.051 UTC [cauthdsl] func1 -> DEBU 3a66 0xc003a78070 gate 1555913872051679500 evaluation starts" +"2019-04-22 06:17:52.052 UTC [cauthdsl] func2 -> DEBU 3a67 0xc003a78070 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.052 UTC [cauthdsl] func2 -> DEBU 3a68 0xc003a78070 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.052 UTC [cauthdsl] func2 -> DEBU 3a69 0xc003a78070 principal matched by identity 0" +"2019-04-22 06:17:52.052 UTC [msp.identity] Verify -> DEBU 3a6a Verify: digest = 00000000 1d cd 97 46 85 f9 82 99 03 b7 d1 cb 93 54 81 73 |...F.........T.s| +00000010 4a 11 f5 d1 99 7a 5b eb 51 aa 8e 59 e4 29 77 b8 |J....z[.Q..Y.)w.|" +"2019-04-22 06:17:52.052 UTC [msp.identity] Verify -> DEBU 3a6b Verify: sig = 00000000 30 44 02 20 3e fe 44 17 f1 35 d4 68 c4 15 9b c3 |0D. >.D..5.h....| +00000010 7c 6a 08 cb 0d a8 6f da b9 cb df 5d 5a db 69 9b ||j....o....]Z.i.| +00000020 89 6e de 77 02 20 68 f2 39 76 ce a0 ca c5 ff 51 |.n.w. h.9v.....Q| +00000030 ca cd 2e 0c 21 b0 fe 97 d9 66 68 c7 5b 2f 93 74 |....!....fh.[/.t| +00000040 98 07 e7 43 a6 ff |...C..|" +"2019-04-22 06:17:52.053 UTC [cauthdsl] func2 -> DEBU 3a6c 0xc003a78070 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.053 UTC [cauthdsl] func1 -> DEBU 3a6d 0xc003a78070 gate 1555913872051679500 evaluation succeeds" +"2019-04-22 06:17:52.054 UTC [policies] Evaluate -> DEBU 3a6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.054 UTC [policies] Evaluate -> DEBU 3a6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.054 UTC [policies] Evaluate -> DEBU 3a70 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.055 UTC [policies] Evaluate -> DEBU 3a71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.055 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a72 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:52.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a73 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:52.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a74 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 " +"2019-04-22 06:17:52.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a75 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 " +"2019-04-22 06:17:52.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a76 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:46 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:52.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a77 Exiting" +"2019-04-22 06:17:52.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a78 Exiting" +"2019-04-22 06:17:52.056 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a79 Exiting" +"2019-04-22 06:17:52.056 UTC [gossip.discovery] sendMemResponse -> DEBU 3a7a Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:52.057 UTC [msp] DeserializeIdentity -> DEBU 3a7b Obtaining identity" +"2019-04-22 06:17:52.057 UTC [msp] DeserializeIdentity -> DEBU 3a7c Obtaining identity" +"2019-04-22 06:17:52.057 UTC [msp] DeserializeIdentity -> DEBU 3a7d Obtaining identity" +"2019-04-22 06:17:52.058 UTC [gossip.comm] Send -> DEBU 3a7e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:52.058 UTC [gossip.discovery] sendMemResponse -> DEBU 3a7f Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:52.058 UTC [gossip.comm] sendToEndpoint -> DEBU 3a80 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.059 UTC [gossip.comm] sendToEndpoint -> DEBU 3a81 Exiting" +"2019-04-22 06:17:52.394 UTC [msp] DeserializeIdentity -> DEBU 3a82 Obtaining identity" +"2019-04-22 06:17:52.394 UTC [msp] DeserializeIdentity -> DEBU 3a83 Obtaining identity" +"2019-04-22 06:17:52.395 UTC [gossip.comm] Send -> DEBU 3a84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:52.395 UTC [gossip.comm] sendToEndpoint -> DEBU 3a85 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.395 UTC [gossip.comm] sendToEndpoint -> DEBU 3a86 Exiting" +"2019-04-22 06:17:52.396 UTC [gossip.comm] sendToEndpoint -> DEBU 3a87 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.399 UTC [gossip.comm] sendToEndpoint -> DEBU 3a88 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.400 UTC [gossip.comm] sendToEndpoint -> DEBU 3a89 Exiting" +"2019-04-22 06:17:52.396 UTC [gossip.comm] sendToEndpoint -> DEBU 3a8a Exiting" +"2019-04-22 06:17:52.406 UTC [gossip.comm] func1 -> DEBU 3a8b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.406 UTC [gossip.gossip] handleMessage -> DEBU 3a8c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.407 UTC [msp.identity] Verify -> DEBU 3a8d Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:52.407 UTC [msp.identity] Verify -> DEBU 3a8e Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:52.408 UTC [msp.identity] Verify -> DEBU 3a8f Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:17:52.408 UTC [msp.identity] Verify -> DEBU 3a91 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:17:52.409 UTC [msp] DeserializeIdentity -> DEBU 3a92 Obtaining identity" +"2019-04-22 06:17:52.409 UTC [msp] DeserializeIdentity -> DEBU 3a93 Obtaining identity" +"2019-04-22 06:17:52.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a94 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.412 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a95 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.407 UTC [gossip.comm] func1 -> DEBU 3a90 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.413 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a96 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.413 UTC [policies] Evaluate -> DEBU 3a97 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.414 UTC [policies] Evaluate -> DEBU 3a98 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.414 UTC [policies] Evaluate -> DEBU 3a99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.414 UTC [cauthdsl] func1 -> DEBU 3a9a 0xc00370f3f0 gate 1555913872414958700 evaluation starts" +"2019-04-22 06:17:52.415 UTC [cauthdsl] func2 -> DEBU 3a9b 0xc00370f3f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.415 UTC [cauthdsl] func2 -> DEBU 3a9c 0xc00370f3f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.416 UTC [cauthdsl] func2 -> DEBU 3a9d 0xc00370f3f0 principal matched by identity 0" +"2019-04-22 06:17:52.416 UTC [msp.identity] Verify -> DEBU 3a9e Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:52.417 UTC [msp.identity] Verify -> DEBU 3a9f Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:52.418 UTC [cauthdsl] func2 -> DEBU 3aa0 0xc00370f3f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.418 UTC [cauthdsl] func1 -> DEBU 3aa1 0xc00370f3f0 gate 1555913872414958700 evaluation succeeds" +"2019-04-22 06:17:52.419 UTC [policies] Evaluate -> DEBU 3aa2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.419 UTC [policies] Evaluate -> DEBU 3aa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.419 UTC [policies] Evaluate -> DEBU 3aa4 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.420 UTC [policies] Evaluate -> DEBU 3aa5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.420 UTC [msp] DeserializeIdentity -> DEBU 3aa6 Obtaining identity" +"2019-04-22 06:17:52.421 UTC [msp] DeserializeIdentity -> DEBU 3aa7 Obtaining identity" +"2019-04-22 06:17:52.421 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3aa8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aa9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aaa Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.422 UTC [policies] Evaluate -> DEBU 3aab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.422 UTC [policies] Evaluate -> DEBU 3aac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.423 UTC [policies] Evaluate -> DEBU 3aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.423 UTC [cauthdsl] func1 -> DEBU 3aae 0xc0026b2bc0 gate 1555913872423781500 evaluation starts" +"2019-04-22 06:17:52.424 UTC [cauthdsl] func2 -> DEBU 3aaf 0xc0026b2bc0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.424 UTC [cauthdsl] func2 -> DEBU 3ab0 0xc0026b2bc0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.424 UTC [cauthdsl] func2 -> DEBU 3ab1 0xc0026b2bc0 principal matched by identity 0" +"2019-04-22 06:17:52.424 UTC [msp.identity] Verify -> DEBU 3ab2 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:52.425 UTC [msp.identity] Verify -> DEBU 3ab3 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:52.425 UTC [cauthdsl] func2 -> DEBU 3ab4 0xc0026b2bc0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.425 UTC [cauthdsl] func1 -> DEBU 3ab5 0xc0026b2bc0 gate 1555913872423781500 evaluation succeeds" +"2019-04-22 06:17:52.425 UTC [policies] Evaluate -> DEBU 3ab6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.426 UTC [policies] Evaluate -> DEBU 3ab7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.426 UTC [policies] Evaluate -> DEBU 3ab8 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.426 UTC [policies] Evaluate -> DEBU 3ab9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.426 UTC [gossip.gossip] handleMessage -> DEBU 3aba Exiting" +"2019-04-22 06:17:52.426 UTC [gossip.gossip] handleMessage -> DEBU 3abb Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.427 UTC [msp] DeserializeIdentity -> DEBU 3abc Obtaining identity" +"2019-04-22 06:17:52.427 UTC [msp] DeserializeIdentity -> DEBU 3abd Obtaining identity" +"2019-04-22 06:17:52.427 UTC [msp] DeserializeIdentity -> DEBU 3abe Obtaining identity" +"2019-04-22 06:17:52.428 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3abf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.428 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.428 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ac1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.429 UTC [policies] Evaluate -> DEBU 3ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.429 UTC [policies] Evaluate -> DEBU 3ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.429 UTC [policies] Evaluate -> DEBU 3ac4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.429 UTC [cauthdsl] func1 -> DEBU 3ac5 0xc0026c26d0 gate 1555913872429807300 evaluation starts" +"2019-04-22 06:17:52.430 UTC [cauthdsl] func2 -> DEBU 3ac6 0xc0026c26d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.430 UTC [cauthdsl] func2 -> DEBU 3ac7 0xc0026c26d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.430 UTC [cauthdsl] func2 -> DEBU 3ac8 0xc0026c26d0 principal matched by identity 0" +"2019-04-22 06:17:52.430 UTC [msp.identity] Verify -> DEBU 3ac9 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:52.431 UTC [msp.identity] Verify -> DEBU 3aca Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:52.431 UTC [cauthdsl] func2 -> DEBU 3acb 0xc0026c26d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.432 UTC [cauthdsl] func1 -> DEBU 3acc 0xc0026c26d0 gate 1555913872429807300 evaluation succeeds" +"2019-04-22 06:17:52.432 UTC [policies] Evaluate -> DEBU 3acd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.432 UTC [policies] Evaluate -> DEBU 3ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.432 UTC [policies] Evaluate -> DEBU 3acf Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.433 UTC [policies] Evaluate -> DEBU 3ad0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.452 UTC [msp.identity] Verify -> DEBU 3ad1 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:17:52.453 UTC [msp.identity] Verify -> DEBU 3ad2 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:17:52.454 UTC [msp.identity] Verify -> DEBU 3ad3 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:52.455 UTC [msp.identity] Verify -> DEBU 3ad4 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:52.456 UTC [msp] DeserializeIdentity -> DEBU 3ad5 Obtaining identity" +"2019-04-22 06:17:52.456 UTC [msp] DeserializeIdentity -> DEBU 3ad6 Obtaining identity" +"2019-04-22 06:17:52.457 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ad7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.457 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.457 UTC [policies] Evaluate -> DEBU 3ada == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.458 UTC [policies] Evaluate -> DEBU 3adb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.458 UTC [policies] Evaluate -> DEBU 3adc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.458 UTC [cauthdsl] func1 -> DEBU 3add 0xc0024decf0 gate 1555913872458481000 evaluation starts" +"2019-04-22 06:17:52.458 UTC [cauthdsl] func2 -> DEBU 3ade 0xc0024decf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.459 UTC [cauthdsl] func2 -> DEBU 3adf 0xc0024decf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.459 UTC [cauthdsl] func2 -> DEBU 3ae0 0xc0024decf0 principal matched by identity 0" +"2019-04-22 06:17:52.459 UTC [msp.identity] Verify -> DEBU 3ae1 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:52.459 UTC [msp.identity] Verify -> DEBU 3ae2 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:52.460 UTC [cauthdsl] func2 -> DEBU 3ae3 0xc0024decf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.460 UTC [cauthdsl] func1 -> DEBU 3ae4 0xc0024decf0 gate 1555913872458481000 evaluation succeeds" +"2019-04-22 06:17:52.461 UTC [policies] Evaluate -> DEBU 3ae5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.461 UTC [policies] Evaluate -> DEBU 3ae6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.461 UTC [policies] Evaluate -> DEBU 3ae7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.462 UTC [policies] Evaluate -> DEBU 3ae8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.462 UTC [gossip.gossip] handleMessage -> DEBU 3ae9 Exiting" +"2019-04-22 06:17:52.462 UTC [gossip.gossip] handleMessage -> DEBU 3aea Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.463 UTC [msp] DeserializeIdentity -> DEBU 3aeb Obtaining identity" +"2019-04-22 06:17:52.464 UTC [msp] DeserializeIdentity -> DEBU 3aec Obtaining identity" +"2019-04-22 06:17:52.465 UTC [msp] DeserializeIdentity -> DEBU 3aed Obtaining identity" +"2019-04-22 06:17:52.466 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3aee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.466 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3aef Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.467 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3af0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.467 UTC [policies] Evaluate -> DEBU 3af1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.468 UTC [policies] Evaluate -> DEBU 3af2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.469 UTC [policies] Evaluate -> DEBU 3af3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.469 UTC [cauthdsl] func1 -> DEBU 3af4 0xc0028f2810 gate 1555913872469456100 evaluation starts" +"2019-04-22 06:17:52.469 UTC [cauthdsl] func2 -> DEBU 3af5 0xc0028f2810 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.469 UTC [cauthdsl] func2 -> DEBU 3af6 0xc0028f2810 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.470 UTC [cauthdsl] func2 -> DEBU 3af7 0xc0028f2810 principal matched by identity 0" +"2019-04-22 06:17:52.471 UTC [msp.identity] Verify -> DEBU 3af8 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:52.471 UTC [msp.identity] Verify -> DEBU 3af9 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:52.473 UTC [cauthdsl] func2 -> DEBU 3afa 0xc0028f2810 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.473 UTC [cauthdsl] func1 -> DEBU 3afb 0xc0028f2810 gate 1555913872469456100 evaluation succeeds" +"2019-04-22 06:17:52.474 UTC [policies] Evaluate -> DEBU 3afc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.475 UTC [policies] Evaluate -> DEBU 3afd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.476 UTC [policies] Evaluate -> DEBU 3afe Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.476 UTC [policies] Evaluate -> DEBU 3aff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.477 UTC [msp.identity] Verify -> DEBU 3b00 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:17:52.477 UTC [msp.identity] Verify -> DEBU 3b01 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:17:52.478 UTC [msp.identity] Verify -> DEBU 3b02 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:52.478 UTC [msp.identity] Verify -> DEBU 3b03 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:52.485 UTC [msp] DeserializeIdentity -> DEBU 3b04 Obtaining identity" +"2019-04-22 06:17:52.486 UTC [msp] DeserializeIdentity -> DEBU 3b05 Obtaining identity" +"2019-04-22 06:17:52.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:52.488 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b07 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.495 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b08 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:52.496 UTC [policies] Evaluate -> DEBU 3b09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:52.498 UTC [policies] Evaluate -> DEBU 3b0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:52.498 UTC [policies] Evaluate -> DEBU 3b0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:52.499 UTC [cauthdsl] func1 -> DEBU 3b0c 0xc003ba4e70 gate 1555913872498928200 evaluation starts" +"2019-04-22 06:17:52.499 UTC [cauthdsl] func2 -> DEBU 3b0d 0xc003ba4e70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:52.499 UTC [cauthdsl] func2 -> DEBU 3b0e 0xc003ba4e70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:52.500 UTC [cauthdsl] func2 -> DEBU 3b0f 0xc003ba4e70 principal matched by identity 0" +"2019-04-22 06:17:52.500 UTC [msp.identity] Verify -> DEBU 3b10 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:52.500 UTC [msp.identity] Verify -> DEBU 3b11 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:52.501 UTC [cauthdsl] func2 -> DEBU 3b12 0xc003ba4e70 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:52.502 UTC [cauthdsl] func1 -> DEBU 3b13 0xc003ba4e70 gate 1555913872498928200 evaluation succeeds" +"2019-04-22 06:17:52.502 UTC [policies] Evaluate -> DEBU 3b14 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.502 UTC [policies] Evaluate -> DEBU 3b15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:52.503 UTC [policies] Evaluate -> DEBU 3b17 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:52.503 UTC [msp] DeserializeIdentity -> DEBU 3b16 Obtaining identity" +"2019-04-22 06:17:52.504 UTC [msp] DeserializeIdentity -> DEBU 3b18 Obtaining identity" +"2019-04-22 06:17:52.505 UTC [gossip.pull] Hello -> DEBU 3b19 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:52.505 UTC [msp] DeserializeIdentity -> DEBU 3b1a Obtaining identity" +"2019-04-22 06:17:52.506 UTC [msp] DeserializeIdentity -> DEBU 3b1b Obtaining identity" +"2019-04-22 06:17:52.506 UTC [gossip.comm] Send -> DEBU 3b1c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:52.506 UTC [gossip.comm] sendToEndpoint -> DEBU 3b1d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.507 UTC [gossip.comm] sendToEndpoint -> DEBU 3b1e Exiting" +"2019-04-22 06:17:52.503 UTC [policies] Evaluate -> DEBU 3b1f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:52.508 UTC [gossip.gossip] handleMessage -> DEBU 3b20 Exiting" +"2019-04-22 06:17:52.509 UTC [gossip.comm] func1 -> DEBU 3b21 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15732855136372787225 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.509 UTC [gossip.gossip] handleMessage -> DEBU 3b22 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15732855136372787225 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.510 UTC [gossip.pull] HandleMessage -> DEBU 3b23 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 15732855136372787225 , Msg_type: BLOCK_MSG, digests: [8 1 2 3 4 5 6 7], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.510 UTC [gossip.gossip] handleMessage -> DEBU 3b24 Exiting" +"2019-04-22 06:17:52.648 UTC [gossip.comm] func1 -> DEBU 3b25 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.648 UTC [gossip.gossip] handleMessage -> DEBU 3b26 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.650 UTC [msp] DeserializeIdentity -> DEBU 3b27 Obtaining identity" +"2019-04-22 06:17:52.650 UTC [msp] DeserializeIdentity -> DEBU 3b28 Obtaining identity" +"2019-04-22 06:17:52.651 UTC [gossip.gossip] handleMessage -> DEBU 3b29 Exiting" +"2019-04-22 06:17:52.698 UTC [gossip.comm] func1 -> DEBU 3b2a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.698 UTC [gossip.gossip] handleMessage -> DEBU 3b2b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.699 UTC [gossip.pull] HandleMessage -> DEBU 3b2c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.699 UTC [gossip.pull] SendDigest -> DEBU 3b2d Sending BLOCK_MSG digest: [2 3 4 5 6 7 8 1] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:52.700 UTC [gossip.gossip] handleMessage -> DEBU 3b2e Exiting" +"2019-04-22 06:17:52.871 UTC [gossip.gossip] handleMessage -> DEBU 3b2f Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:52.872 UTC [msp] DeserializeIdentity -> DEBU 3b30 Obtaining identity" +"2019-04-22 06:17:52.873 UTC [msp] DeserializeIdentity -> DEBU 3b31 Obtaining identity" +"2019-04-22 06:17:52.874 UTC [msp] DeserializeIdentity -> DEBU 3b32 Obtaining identity" +"2019-04-22 06:17:52.874 UTC [gossip.gossip] handleMessage -> DEBU 3b33 Exiting" +"2019-04-22 06:17:53.087 UTC [gossip.comm] func1 -> DEBU 3b34 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:53.087 UTC [gossip.gossip] handleMessage -> DEBU 3b35 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:53.088 UTC [msp] DeserializeIdentity -> DEBU 3b36 Obtaining identity" +"2019-04-22 06:17:53.089 UTC [msp] DeserializeIdentity -> DEBU 3b37 Obtaining identity" +"2019-04-22 06:17:53.089 UTC [msp] DeserializeIdentity -> DEBU 3b38 Obtaining identity" +"2019-04-22 06:17:53.090 UTC [gossip.gossip] handleMessage -> DEBU 3b39 Exiting" +"2019-04-22 06:17:54.859 UTC [gossip.pull] Hello -> DEBU 3b3a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:54.860 UTC [gossip.comm] Send -> DEBU 3b3b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:54.861 UTC [gossip.pull] Hello -> DEBU 3b3c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:54.861 UTC [gossip.comm] Send -> DEBU 3b3d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:54.862 UTC [gossip.pull] Hello -> DEBU 3b3e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:54.862 UTC [gossip.comm] Send -> DEBU 3b3f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:54.862 UTC [gossip.comm] sendToEndpoint -> DEBU 3b40 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.863 UTC [gossip.comm] sendToEndpoint -> DEBU 3b41 Exiting" +"2019-04-22 06:17:54.863 UTC [gossip.comm] sendToEndpoint -> DEBU 3b42 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.863 UTC [gossip.comm] sendToEndpoint -> DEBU 3b43 Exiting" +"2019-04-22 06:17:54.864 UTC [gossip.comm] sendToEndpoint -> DEBU 3b44 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.864 UTC [gossip.comm] sendToEndpoint -> DEBU 3b45 Exiting" +"2019-04-22 06:17:54.866 UTC [gossip.comm] func1 -> DEBU 3b46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3378671504501492866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.866 UTC [gossip.gossip] handleMessage -> DEBU 3b47 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3378671504501492866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.867 UTC [gossip.pull] HandleMessage -> DEBU 3b48 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3378671504501492866 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.867 UTC [gossip.gossip] handleMessage -> DEBU 3b49 Exiting" +"2019-04-22 06:17:54.868 UTC [gossip.comm] func1 -> DEBU 3b4a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2875119863636552133 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.869 UTC [gossip.gossip] handleMessage -> DEBU 3b4b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2875119863636552133 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.869 UTC [gossip.pull] HandleMessage -> DEBU 3b4c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2875119863636552133 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.869 UTC [gossip.gossip] handleMessage -> DEBU 3b4d Exiting" +"2019-04-22 06:17:54.870 UTC [gossip.gossip] handleMessage -> DEBU 3b4e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8754125043664015702 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.870 UTC [gossip.pull] HandleMessage -> DEBU 3b4f GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8754125043664015702 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.870 UTC [gossip.gossip] handleMessage -> DEBU 3b50 Exiting" +"2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b51 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15102F " +"2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b52 Sign: digest: 3E99B8956234215CEB859365E646D75B53FEC64025D19573FBE3555D90B33515 " +"2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b53 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:54.913 UTC [msp.identity] Sign -> DEBU 3b54 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:54.914 UTC [gossip.comm] Send -> DEBU 3b55 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:54.914 UTC [msp] DeserializeIdentity -> DEBU 3b56 Obtaining identity" +"2019-04-22 06:17:54.915 UTC [gossip.comm] Send -> DEBU 3b58 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:54.915 UTC [gossip.comm] sendToEndpoint -> DEBU 3b57 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.915 UTC [gossip.comm] sendToEndpoint -> DEBU 3b59 Exiting" +"2019-04-22 06:17:54.918 UTC [gossip.comm] func1 -> DEBU 3b5a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.919 UTC [gossip.gossip] handleMessage -> DEBU 3b5b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.919 UTC [gossip.gossip] handleMessage -> DEBU 3b5c Exiting" +"2019-04-22 06:17:54.915 UTC [msp] DeserializeIdentity -> DEBU 3b5e Obtaining identity" +"2019-04-22 06:17:54.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b5d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b5f Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:54.921 UTC [gossip.comm] Send -> DEBU 3b60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:54.921 UTC [gossip.comm] sendToEndpoint -> DEBU 3b61 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.921 UTC [gossip.comm] sendToEndpoint -> DEBU 3b62 Exiting" +"2019-04-22 06:17:54.922 UTC [msp.identity] Verify -> DEBU 3b63 Verify: digest = 00000000 3e 99 b8 95 62 34 21 5c eb 85 93 65 e6 46 d7 5b |>...b4!\...e.F.[| +00000010 53 fe c6 40 25 d1 95 73 fb e3 55 5d 90 b3 35 15 |S..@%..s..U]..5.|" +"2019-04-22 06:17:54.922 UTC [msp.identity] Verify -> DEBU 3b64 Verify: sig = 00000000 30 45 02 21 00 bd 52 0c 42 c3 70 cf 31 60 53 59 |0E.!..R.B.p.1`SY| +00000010 6d ea 6e e2 64 18 44 c8 86 c9 2d 64 24 2e dc e5 |m.n.d.D...-d$...| +00000020 6f df 2c 70 7c 02 20 1c c0 23 7b d5 68 73 05 67 |o.,p|. ..#{.hs.g| +00000030 4c 2a d0 5f bc f9 db 89 2d 61 9f b2 32 c8 3a 84 |L*._....-a..2.:.| +00000040 bc a3 cf c6 a1 3d 64 |.....=d|" +"2019-04-22 06:17:54.922 UTC [gossip.comm] sendToEndpoint -> DEBU 3b65 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.922 UTC [gossip.comm] sendToEndpoint -> DEBU 3b66 Exiting" +"2019-04-22 06:17:54.925 UTC [msp.identity] Verify -> DEBU 3b67 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:54.925 UTC [msp.identity] Verify -> DEBU 3b68 Verify: sig = 00000000 30 44 02 20 54 c5 92 e1 6f f2 47 25 00 2e 7e 60 |0D. T...o.G%..~`| +00000010 ca 38 12 53 7b 04 0c 17 74 b7 28 16 a3 98 b8 89 |.8.S{...t.(.....| +00000020 34 4f 5d 01 02 20 3b 1e 1e 3f 3c 50 0b f6 cd ed |4O].. ;..? DEBU 3b69 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.927 UTC [gossip.gossip] handleMessage -> DEBU 3b6a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b6b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:54.929 UTC [gossip.discovery] isSentByMe -> DEBU 3b6c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:54.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b6d Exiting" +"2019-04-22 06:17:54.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b6e Exiting" +"2019-04-22 06:17:54.932 UTC [gossip.gossip] handleMessage -> DEBU 3b6f Exiting" +"2019-04-22 06:17:54.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b72 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:54.933 UTC [gossip.gossip] handleMessage -> DEBU 3b71 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.934 UTC [msp.identity] Verify -> DEBU 3b73 Verify: digest = 00000000 3e 99 b8 95 62 34 21 5c eb 85 93 65 e6 46 d7 5b |>...b4!\...e.F.[| +00000010 53 fe c6 40 25 d1 95 73 fb e3 55 5d 90 b3 35 15 |S..@%..s..U]..5.|" +"2019-04-22 06:17:54.934 UTC [msp.identity] Verify -> DEBU 3b74 Verify: sig = 00000000 30 45 02 21 00 bd 52 0c 42 c3 70 cf 31 60 53 59 |0E.!..R.B.p.1`SY| +00000010 6d ea 6e e2 64 18 44 c8 86 c9 2d 64 24 2e dc e5 |m.n.d.D...-d$...| +00000020 6f df 2c 70 7c 02 20 1c c0 23 7b d5 68 73 05 67 |o.,p|. ..#{.hs.g| +00000030 4c 2a d0 5f bc f9 db 89 2d 61 9f b2 32 c8 3a 84 |L*._....-a..2.:.| +00000040 bc a3 cf c6 a1 3d 64 |.....=d|" +"2019-04-22 06:17:54.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b75 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:54.935 UTC [gossip.discovery] isSentByMe -> DEBU 3b76 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:54.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b77 Exiting" +"2019-04-22 06:17:54.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b78 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:54.936 UTC [msp] DeserializeIdentity -> DEBU 3b79 Obtaining identity" +"2019-04-22 06:17:54.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:54.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b7b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:54.939 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b7c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:54.940 UTC [policies] Evaluate -> DEBU 3b7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:54.940 UTC [policies] Evaluate -> DEBU 3b7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.941 UTC [policies] Evaluate -> DEBU 3b7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:54.941 UTC [cauthdsl] func1 -> DEBU 3b80 0xc00354bcf0 gate 1555913874941423600 evaluation starts" +"2019-04-22 06:17:54.942 UTC [cauthdsl] func2 -> DEBU 3b81 0xc00354bcf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.942 UTC [cauthdsl] func2 -> DEBU 3b82 0xc00354bcf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:54.943 UTC [cauthdsl] func2 -> DEBU 3b83 0xc00354bcf0 principal matched by identity 0" +"2019-04-22 06:17:54.943 UTC [msp.identity] Verify -> DEBU 3b84 Verify: digest = 00000000 1d cd 97 46 85 f9 82 99 03 b7 d1 cb 93 54 81 73 |...F.........T.s| +00000010 4a 11 f5 d1 99 7a 5b eb 51 aa 8e 59 e4 29 77 b8 |J....z[.Q..Y.)w.|" +"2019-04-22 06:17:54.943 UTC [msp.identity] Verify -> DEBU 3b85 Verify: sig = 00000000 30 44 02 20 3e fe 44 17 f1 35 d4 68 c4 15 9b c3 |0D. >.D..5.h....| +00000010 7c 6a 08 cb 0d a8 6f da b9 cb df 5d 5a db 69 9b ||j....o....]Z.i.| +00000020 89 6e de 77 02 20 68 f2 39 76 ce a0 ca c5 ff 51 |.n.w. h.9v.....Q| +00000030 ca cd 2e 0c 21 b0 fe 97 d9 66 68 c7 5b 2f 93 74 |....!....fh.[/.t| +00000040 98 07 e7 43 a6 ff |...C..|" +"2019-04-22 06:17:54.944 UTC [cauthdsl] func2 -> DEBU 3b86 0xc00354bcf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:54.944 UTC [cauthdsl] func1 -> DEBU 3b87 0xc00354bcf0 gate 1555913874941423600 evaluation succeeds" +"2019-04-22 06:17:54.944 UTC [policies] Evaluate -> DEBU 3b88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:54.945 UTC [policies] Evaluate -> DEBU 3b89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:54.945 UTC [policies] Evaluate -> DEBU 3b8a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:54.945 UTC [policies] Evaluate -> DEBU 3b8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:54.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b8c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:54.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b8d Exiting" +"2019-04-22 06:17:54.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b8e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:54.950 UTC [msp.identity] Verify -> DEBU 3b8f Verify: digest = 00000000 37 97 30 9b 46 bc db ea 6a 7f f2 81 88 00 fb b7 |7.0.F...j.......| +00000010 2e 47 8b a0 17 d2 c6 88 c0 76 c6 13 88 55 77 5b |.G.......v...Uw[|" +"2019-04-22 06:17:54.951 UTC [msp.identity] Verify -> DEBU 3b90 Verify: sig = 00000000 30 44 02 20 5a 02 57 a9 ab 04 2a c5 11 e8 04 92 |0D. Z.W...*.....| +00000010 c1 21 de 47 b6 1c 3a 46 a7 0d 5a 42 17 e7 47 96 |.!.G..:F..ZB..G.| +00000020 f7 9e 20 53 02 20 1b 70 ee ee 0c 8f 4e 60 de 02 |.. S. .p....N`..| +00000030 42 f6 39 6b 53 fd b7 4e e3 33 57 58 51 19 f8 f2 |B.9kS..N.3WXQ...| +00000040 cf fd 19 5a 65 8e |...Ze.|" +"2019-04-22 06:17:54.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b91 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:54.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b92 Exiting" +"2019-04-22 06:17:54.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b93 Exiting" +"2019-04-22 06:17:54.953 UTC [gossip.gossip] handleMessage -> DEBU 3b94 Exiting" +"2019-04-22 06:17:54.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3b95 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:54.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b96 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:54.955 UTC [msp.identity] Verify -> DEBU 3b97 Verify: digest = 00000000 37 97 30 9b 46 bc db ea 6a 7f f2 81 88 00 fb b7 |7.0.F...j.......| +00000010 2e 47 8b a0 17 d2 c6 88 c0 76 c6 13 88 55 77 5b |.G.......v...Uw[|" +"2019-04-22 06:17:54.955 UTC [msp.identity] Verify -> DEBU 3b98 Verify: sig = 00000000 30 44 02 20 5a 02 57 a9 ab 04 2a c5 11 e8 04 92 |0D. Z.W...*.....| +00000010 c1 21 de 47 b6 1c 3a 46 a7 0d 5a 42 17 e7 47 96 |.!.G..:F..ZB..G.| +00000020 f7 9e 20 53 02 20 1b 70 ee ee 0c 8f 4e 60 de 02 |.. S. .p....N`..| +00000030 42 f6 39 6b 53 fd b7 4e e3 33 57 58 51 19 f8 f2 |B.9kS..N.3WXQ...| +00000040 cf fd 19 5a 65 8e |...Ze.|" +"2019-04-22 06:17:54.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b99 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:54.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b9a Exiting" +"2019-04-22 06:17:54.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3b9b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:54.957 UTC [msp.identity] Verify -> DEBU 3b9c Verify: digest = 00000000 3e 99 b8 95 62 34 21 5c eb 85 93 65 e6 46 d7 5b |>...b4!\...e.F.[| +00000010 53 fe c6 40 25 d1 95 73 fb e3 55 5d 90 b3 35 15 |S..@%..s..U]..5.|" +"2019-04-22 06:17:54.957 UTC [msp.identity] Verify -> DEBU 3b9d Verify: sig = 00000000 30 45 02 21 00 bd 52 0c 42 c3 70 cf 31 60 53 59 |0E.!..R.B.p.1`SY| +00000010 6d ea 6e e2 64 18 44 c8 86 c9 2d 64 24 2e dc e5 |m.n.d.D...-d$...| +00000020 6f df 2c 70 7c 02 20 1c c0 23 7b d5 68 73 05 67 |o.,p|. ..#{.hs.g| +00000030 4c 2a d0 5f bc f9 db 89 2d 61 9f b2 32 c8 3a 84 |L*._....-a..2.:.| +00000040 bc a3 cf c6 a1 3d 64 |.....=d|" +"2019-04-22 06:17:54.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 3b9e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:54.958 UTC [gossip.discovery] isSentByMe -> DEBU 3b9f Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:47 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:54.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ba0 Exiting" +"2019-04-22 06:17:54.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ba1 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:54.958 UTC [msp] DeserializeIdentity -> DEBU 3ba2 Obtaining identity" +"2019-04-22 06:17:54.958 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ba3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:54.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:54.959 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ba5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:54.959 UTC [policies] Evaluate -> DEBU 3ba6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:54.959 UTC [policies] Evaluate -> DEBU 3ba7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:54.959 UTC [policies] Evaluate -> DEBU 3ba8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:54.960 UTC [cauthdsl] func1 -> DEBU 3ba9 0xc00337ff30 gate 1555913874960030800 evaluation starts" +"2019-04-22 06:17:54.960 UTC [cauthdsl] func2 -> DEBU 3baa 0xc00337ff30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:54.961 UTC [cauthdsl] func2 -> DEBU 3bab 0xc00337ff30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:54.961 UTC [cauthdsl] func2 -> DEBU 3bac 0xc00337ff30 principal matched by identity 0" +"2019-04-22 06:17:54.961 UTC [msp.identity] Verify -> DEBU 3bad Verify: digest = 00000000 a1 1b 96 59 77 77 5c 2a 5b 57 d1 98 43 05 34 63 |...Yww\*[W..C.4c| +00000010 dd 72 54 77 c3 7a d5 2f ed 63 a0 9f 94 e2 79 f7 |.rTw.z./.c....y.|" +"2019-04-22 06:17:54.961 UTC [msp.identity] Verify -> DEBU 3bae Verify: sig = 00000000 30 45 02 21 00 ed 6f 91 74 e0 7f af 0c 16 1a 82 |0E.!..o.t.......| +00000010 b8 3a e2 f4 aa 18 eb ec cd e9 cb 9c 36 43 99 ea |.:..........6C..| +00000020 f1 fd 51 c0 f6 02 20 4f 32 00 ec af c4 51 b5 ef |..Q... O2....Q..| +00000030 46 1f 6b b3 07 1f 02 3c d1 91 f5 38 23 58 8e e4 |F.k....<...8#X..| +00000040 88 73 78 4c 54 3a a5 |.sxLT:.|" +"2019-04-22 06:17:54.962 UTC [cauthdsl] func2 -> DEBU 3baf 0xc00337ff30 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:54.962 UTC [cauthdsl] func1 -> DEBU 3bb0 0xc00337ff30 gate 1555913874960030800 evaluation succeeds" +"2019-04-22 06:17:54.963 UTC [policies] Evaluate -> DEBU 3bb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:54.963 UTC [policies] Evaluate -> DEBU 3bb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:54.963 UTC [policies] Evaluate -> DEBU 3bb3 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:54.964 UTC [policies] Evaluate -> DEBU 3bb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:54.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bb5 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:54.964 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bb6 Exiting" +"2019-04-22 06:17:54.965 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bb7 Exiting" +"2019-04-22 06:17:55.108 UTC [gossip.comm] func1 -> DEBU 3bb8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.109 UTC [gossip.gossip] handleMessage -> DEBU 3bb9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.110 UTC [gossip.pull] HandleMessage -> DEBU 3bba GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.111 UTC [gossip.pull] SendDigest -> DEBU 3bbb Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:55.112 UTC [gossip.gossip] handleMessage -> DEBU 3bbc Exiting" +"2019-04-22 06:17:55.157 UTC [gossip.comm] func1 -> DEBU 3bbd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.157 UTC [gossip.gossip] handleMessage -> DEBU 3bbe Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.158 UTC [gossip.gossip] handleMessage -> DEBU 3bbf Exiting" +"2019-04-22 06:17:55.158 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bc0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.158 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bc1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:55.159 UTC [msp.identity] Verify -> DEBU 3bc2 Verify: digest = 00000000 79 ef be f8 49 d7 c8 3a 9d f9 91 73 fc c7 50 45 |y...I..:...s..PE| +00000010 7a 06 4e ab 51 f6 f0 1d 21 dc 3d 5e 85 04 75 e7 |z.N.Q...!.=^..u.|" +"2019-04-22 06:17:55.159 UTC [msp.identity] Verify -> DEBU 3bc3 Verify: sig = 00000000 30 45 02 21 00 a8 53 4e 46 59 8f eb 9f 69 39 f9 |0E.!..SNFY...i9.| +00000010 e7 5c a5 33 0a c1 12 4d b2 a7 13 f8 9e 80 cd 7e |.\.3...M.......~| +00000020 b2 85 be af 54 02 20 18 83 a6 b0 8c 8e 7e 52 2d |....T. ......~R-| +00000030 c4 7a 4b 0c 3c 49 f5 63 14 59 ef 29 9a 27 64 2a |.zK. DEBU 3bc4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:55.160 UTC [msp.identity] Verify -> DEBU 3bc5 Verify: sig = 00000000 30 45 02 21 00 f9 b1 ad 9d 8e 65 33 48 c1 7e 12 |0E.!......e3H.~.| +00000010 76 3c 61 d4 25 da 04 c5 80 d1 d7 59 28 0f 08 6a |v DEBU 3bc6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:55.160 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 " +"2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bc9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 " +"2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bca Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:55.161 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bcb Exiting" +"2019-04-22 06:17:55.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bcc Exiting" +"2019-04-22 06:17:55.162 UTC [gossip.discovery] sendMemResponse -> DEBU 3bcd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:55.162 UTC [msp] DeserializeIdentity -> DEBU 3bce Obtaining identity" +"2019-04-22 06:17:55.163 UTC [msp] DeserializeIdentity -> DEBU 3bcf Obtaining identity" +"2019-04-22 06:17:55.163 UTC [gossip.comm] Send -> DEBU 3bd0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:55.163 UTC [gossip.discovery] sendMemResponse -> DEBU 3bd1 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:55.164 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.164 UTC [gossip.comm] sendToEndpoint -> DEBU 3bd3 Exiting" +"2019-04-22 06:17:55.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bd4 Exiting" +"2019-04-22 06:17:55.594 UTC [gossip.comm] func1 -> DEBU 3bd5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.594 UTC [gossip.gossip] handleMessage -> DEBU 3bd6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.594 UTC [gossip.pull] HandleMessage -> DEBU 3bd7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bd8 Obtaining identity" +"2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bd9 Obtaining identity" +"2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bda Obtaining identity" +"2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bdb Obtaining identity" +"2019-04-22 06:17:55.594 UTC [msp] DeserializeIdentity -> DEBU 3bdc Obtaining identity" +"2019-04-22 06:17:55.595 UTC [msp] DeserializeIdentity -> DEBU 3bdd Obtaining identity" +"2019-04-22 06:17:55.595 UTC [gossip.pull] SendDigest -> DEBU 3bde Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:55.595 UTC [gossip.gossip] handleMessage -> DEBU 3bdf Exiting" +"2019-04-22 06:17:55.608 UTC [gossip.comm] func1 -> DEBU 3be0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.608 UTC [gossip.gossip] handleMessage -> DEBU 3be1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.608 UTC [gossip.gossip] handleMessage -> DEBU 3be2 Exiting" +"2019-04-22 06:17:55.608 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3be3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.608 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3be4 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:55.609 UTC [msp] DeserializeIdentity -> DEBU 3be5 Obtaining identity" +"2019-04-22 06:17:55.609 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3be6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:55.609 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:55.609 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:55.609 UTC [policies] Evaluate -> DEBU 3be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:55.609 UTC [policies] Evaluate -> DEBU 3bea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:55.609 UTC [policies] Evaluate -> DEBU 3beb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:55.609 UTC [cauthdsl] func1 -> DEBU 3bec 0xc0030b4740 gate 1555913875609659900 evaluation starts" +"2019-04-22 06:17:55.609 UTC [cauthdsl] func2 -> DEBU 3bed 0xc0030b4740 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:55.609 UTC [cauthdsl] func2 -> DEBU 3bee 0xc0030b4740 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:55.609 UTC [cauthdsl] func2 -> DEBU 3bef 0xc0030b4740 principal matched by identity 0" +"2019-04-22 06:17:55.609 UTC [msp.identity] Verify -> DEBU 3bf0 Verify: digest = 00000000 8e b0 09 cb 52 a6 01 60 8c 6e 24 d0 0b 6e 12 1a |....R..`.n$..n..| +00000010 5f 81 39 ab 79 f4 b5 e4 0b 0f aa 63 87 25 c0 9c |_.9.y......c.%..|" +"2019-04-22 06:17:55.610 UTC [msp.identity] Verify -> DEBU 3bf1 Verify: sig = 00000000 30 44 02 20 01 d9 89 9b c5 60 23 fd e8 85 8b d3 |0D. .....`#.....| +00000010 8c ce 7a ae a4 52 71 1a 79 9b 90 f3 ce 82 d5 e3 |..z..Rq.y.......| +00000020 89 3b fd 3f 02 20 2a 2e a9 72 99 61 d5 12 e5 04 |.;.?. *..r.a....| +00000030 d4 f8 a3 68 b0 c0 be af 82 4c c0 cd f7 2e 78 a7 |...h.....L....x.| +00000040 7f 2a 5d 23 aa da |.*]#..|" +"2019-04-22 06:17:55.610 UTC [cauthdsl] func2 -> DEBU 3bf2 0xc0030b4740 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:55.610 UTC [cauthdsl] func1 -> DEBU 3bf3 0xc0030b4740 gate 1555913875609659900 evaluation succeeds" +"2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf6 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:55.610 UTC [policies] Evaluate -> DEBU 3bf7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:55.610 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bf8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bf9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfa updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 " +"2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 " +"2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:55.610 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bfd Exiting" +"2019-04-22 06:17:55.610 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bfe Exiting" +"2019-04-22 06:17:55.611 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bff Exiting" +"2019-04-22 06:17:55.611 UTC [gossip.discovery] sendMemResponse -> DEBU 3c00 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:55.611 UTC [msp] DeserializeIdentity -> DEBU 3c01 Obtaining identity" +"2019-04-22 06:17:55.611 UTC [msp] DeserializeIdentity -> DEBU 3c02 Obtaining identity" +"2019-04-22 06:17:55.611 UTC [msp] DeserializeIdentity -> DEBU 3c03 Obtaining identity" +"2019-04-22 06:17:55.611 UTC [gossip.comm] Send -> DEBU 3c04 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:55.611 UTC [gossip.discovery] sendMemResponse -> DEBU 3c05 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:55.611 UTC [gossip.comm] sendToEndpoint -> DEBU 3c06 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.611 UTC [gossip.comm] sendToEndpoint -> DEBU 3c07 Exiting" +"2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c08 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151030 " +"2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c09 Sign: digest: 5FA4B15977FDB3140D6B208745E52888AE367E61E7A5C9CB68F91D758B608558 " +"2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c0a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:55.806 UTC [msp.identity] Sign -> DEBU 3c0b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:55.807 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3c0c Sleeping 5s" +"2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c0d Obtaining identity" +"2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c0e Obtaining identity" +"2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c0f Obtaining identity" +"2019-04-22 06:17:55.807 UTC [gossip.comm] Send -> DEBU 3c10 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:55.807 UTC [msp] DeserializeIdentity -> DEBU 3c11 Obtaining identity" +"2019-04-22 06:17:55.807 UTC [gossip.comm] Send -> DEBU 3c12 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:55.808 UTC [gossip.comm] Send -> DEBU 3c13 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c14 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c15 Exiting" +"2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c16 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c17 Exiting" +"2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c18 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:48 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:55.808 UTC [gossip.comm] sendToEndpoint -> DEBU 3c19 Exiting" +"2019-04-22 06:17:55.995 UTC [gossip.gossip] handleMessage -> DEBU 3c1a Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.995 UTC [gossip.pull] HandleMessage -> DEBU 3c1b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:55.996 UTC [msp] DeserializeIdentity -> DEBU 3c1c Obtaining identity" +"2019-04-22 06:17:55.997 UTC [msp] DeserializeIdentity -> DEBU 3c1d Obtaining identity" +"2019-04-22 06:17:55.998 UTC [msp] DeserializeIdentity -> DEBU 3c1e Obtaining identity" +"2019-04-22 06:17:55.998 UTC [msp] DeserializeIdentity -> DEBU 3c1f Obtaining identity" +"2019-04-22 06:17:55.999 UTC [msp] DeserializeIdentity -> DEBU 3c20 Obtaining identity" +"2019-04-22 06:17:55.999 UTC [msp] DeserializeIdentity -> DEBU 3c21 Obtaining identity" +"2019-04-22 06:17:55.999 UTC [gossip.pull] SendDigest -> DEBU 3c22 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:56.000 UTC [gossip.gossip] handleMessage -> DEBU 3c23 Exiting" +"2019-04-22 06:17:56.014 UTC [gossip.gossip] handleMessage -> DEBU 3c24 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.015 UTC [gossip.gossip] handleMessage -> DEBU 3c25 Exiting" +"2019-04-22 06:17:56.015 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.016 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c27 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:56.017 UTC [msp] DeserializeIdentity -> DEBU 3c28 Obtaining identity" +"2019-04-22 06:17:56.018 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c2a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.018 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c2b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.019 UTC [policies] Evaluate -> DEBU 3c2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.019 UTC [policies] Evaluate -> DEBU 3c2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.019 UTC [policies] Evaluate -> DEBU 3c2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.020 UTC [cauthdsl] func1 -> DEBU 3c2f 0xc003068e40 gate 1555913876020372000 evaluation starts" +"2019-04-22 06:17:56.020 UTC [cauthdsl] func2 -> DEBU 3c30 0xc003068e40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.021 UTC [cauthdsl] func2 -> DEBU 3c31 0xc003068e40 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.021 UTC [cauthdsl] func2 -> DEBU 3c32 0xc003068e40 principal matched by identity 0" +"2019-04-22 06:17:56.022 UTC [msp.identity] Verify -> DEBU 3c33 Verify: digest = 00000000 f5 53 67 ee 66 97 40 2d 90 93 2e bb 43 cc 06 f3 |.Sg.f.@-....C...| +00000010 b0 2d 2a b1 b3 cd de 4f 8f a7 70 a7 7e 45 bc d9 |.-*....O..p.~E..|" +"2019-04-22 06:17:56.023 UTC [msp.identity] Verify -> DEBU 3c34 Verify: sig = 00000000 30 44 02 20 64 cf 3c 65 47 e0 2b c0 70 16 77 95 |0D. d. DEBU 3c35 0xc003068e40 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.025 UTC [cauthdsl] func1 -> DEBU 3c36 0xc003068e40 gate 1555913876020372000 evaluation succeeds" +"2019-04-22 06:17:56.025 UTC [policies] Evaluate -> DEBU 3c37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.026 UTC [policies] Evaluate -> DEBU 3c38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.028 UTC [policies] Evaluate -> DEBU 3c39 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.028 UTC [policies] Evaluate -> DEBU 3c3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c3b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3c Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:56.034 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3d updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 " +"2019-04-22 06:17:56.035 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3e Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 " +"2019-04-22 06:17:56.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c3f Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:47 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:56.036 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c40 Exiting" +"2019-04-22 06:17:56.038 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c41 Exiting" +"2019-04-22 06:17:56.039 UTC [gossip.discovery] sendMemResponse -> DEBU 3c42 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:56.039 UTC [msp] DeserializeIdentity -> DEBU 3c43 Obtaining identity" +"2019-04-22 06:17:56.039 UTC [msp] DeserializeIdentity -> DEBU 3c44 Obtaining identity" +"2019-04-22 06:17:56.040 UTC [msp] DeserializeIdentity -> DEBU 3c45 Obtaining identity" +"2019-04-22 06:17:56.040 UTC [gossip.comm] Send -> DEBU 3c46 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:56.040 UTC [gossip.discovery] sendMemResponse -> DEBU 3c47 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:56.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3c48 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.041 UTC [gossip.comm] sendToEndpoint -> DEBU 3c49 Exiting" +"2019-04-22 06:17:56.039 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c4a Exiting" +"2019-04-22 06:17:56.086 UTC [gossip.gossip] handleMessage -> DEBU 3c4b Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.086 UTC [gossip.gossip] handleMessage -> DEBU 3c4c Exiting" +"2019-04-22 06:17:56.086 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c4d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.087 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c4e Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:56.088 UTC [msp.identity] Verify -> DEBU 3c4f Verify: digest = 00000000 3f 49 f7 db 41 95 f7 e9 67 58 b0 6e ae 11 2c 12 |?I..A...gX.n..,.| +00000010 e5 bb f9 36 41 07 b9 fa 6a bb 4d e2 f0 e7 b4 51 |...6A...j.M....Q|" +"2019-04-22 06:17:56.088 UTC [msp.identity] Verify -> DEBU 3c50 Verify: sig = 00000000 30 44 02 20 4b 81 9d f8 37 bd 37 9c de 0c fc 14 |0D. K...7.7.....| +00000010 2a 94 2b 98 c1 7e 18 2b 7a 58 61 6e 07 f4 6a 73 |*.+..~.+zXan..js| +00000020 8a de ce 4e 02 20 5e 8c 2e 1d fa e1 69 0a a3 28 |...N. ^.....i..(| +00000030 e5 aa f1 5c 84 dd 05 e5 68 78 33 3c f6 b0 ac 0d |...\....hx3<....| +00000040 2a 23 95 d4 d9 d2 |*#....|" +"2019-04-22 06:17:56.089 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c51 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.089 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c52 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c53 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 " +"2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c54 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 " +"2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c55 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:51 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:17:56.090 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c56 Exiting" +"2019-04-22 06:17:56.093 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c57 Exiting" +"2019-04-22 06:17:56.093 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c58 Exiting" +"2019-04-22 06:17:56.094 UTC [gossip.comm] func1 -> DEBU 3c59 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:56.094 UTC [gossip.gossip] handleMessage -> DEBU 3c5a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:56.095 UTC [gossip.gossip] handleMessage -> DEBU 3c5b Exiting" +"2019-04-22 06:17:56.096 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:56.097 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c5d Exiting" +"2019-04-22 06:17:56.099 UTC [msp] DeserializeIdentity -> DEBU 3c5e Obtaining identity" +"2019-04-22 06:17:56.100 UTC [msp] DeserializeIdentity -> DEBU 3c5f Obtaining identity" +"2019-04-22 06:17:56.101 UTC [gossip.comm] Send -> DEBU 3c60 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:56.101 UTC [msp] DeserializeIdentity -> DEBU 3c61 Obtaining identity" +"2019-04-22 06:17:56.102 UTC [gossip.comm] Send -> DEBU 3c62 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:56.102 UTC [gossip.comm] sendToEndpoint -> DEBU 3c63 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.102 UTC [gossip.comm] sendToEndpoint -> DEBU 3c64 Exiting" +"2019-04-22 06:17:56.104 UTC [gossip.comm] func1 -> DEBU 3c65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.104 UTC [gossip.gossip] handleMessage -> DEBU 3c66 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.105 UTC [gossip.gossip] handleMessage -> DEBU 3c67 Exiting" +"2019-04-22 06:17:56.105 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c69 Exiting" +"2019-04-22 06:17:56.106 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.106 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Exiting" +"2019-04-22 06:17:56.353 UTC [msp] DeserializeIdentity -> DEBU 3c6c Obtaining identity" +"2019-04-22 06:17:56.354 UTC [msp] DeserializeIdentity -> DEBU 3c6d Obtaining identity" +"2019-04-22 06:17:56.354 UTC [gossip.comm] Send -> DEBU 3c6e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c70 Exiting" +"2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c71 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c72 Exiting" +"2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c73 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3c74 Exiting" +"2019-04-22 06:17:56.357 UTC [gossip.comm] func1 -> DEBU 3c75 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.357 UTC [gossip.gossip] handleMessage -> DEBU 3c76 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.358 UTC [msp.identity] Verify -> DEBU 3c77 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:56.358 UTC [msp.identity] Verify -> DEBU 3c78 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:56.364 UTC [msp.identity] Verify -> DEBU 3c79 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:17:56.364 UTC [msp.identity] Verify -> DEBU 3c7a Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:17:56.364 UTC [msp] DeserializeIdentity -> DEBU 3c7b Obtaining identity" +"2019-04-22 06:17:56.365 UTC [msp] DeserializeIdentity -> DEBU 3c7c Obtaining identity" +"2019-04-22 06:17:56.374 UTC [gossip.comm] func1 -> DEBU 3c7d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c7e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c7f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c80 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.377 UTC [policies] Evaluate -> DEBU 3c81 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.377 UTC [policies] Evaluate -> DEBU 3c82 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.377 UTC [policies] Evaluate -> DEBU 3c83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.377 UTC [cauthdsl] func1 -> DEBU 3c84 0xc00301e590 gate 1555913876377783400 evaluation starts" +"2019-04-22 06:17:56.377 UTC [cauthdsl] func2 -> DEBU 3c85 0xc00301e590 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.378 UTC [cauthdsl] func2 -> DEBU 3c86 0xc00301e590 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.378 UTC [cauthdsl] func2 -> DEBU 3c87 0xc00301e590 principal matched by identity 0" +"2019-04-22 06:17:56.378 UTC [msp.identity] Verify -> DEBU 3c88 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:56.378 UTC [msp.identity] Verify -> DEBU 3c89 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:56.378 UTC [cauthdsl] func2 -> DEBU 3c8a 0xc00301e590 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.379 UTC [cauthdsl] func1 -> DEBU 3c8b 0xc00301e590 gate 1555913876377783400 evaluation succeeds" +"2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.379 UTC [policies] Evaluate -> DEBU 3c8f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.379 UTC [msp] DeserializeIdentity -> DEBU 3c90 Obtaining identity" +"2019-04-22 06:17:56.379 UTC [msp] DeserializeIdentity -> DEBU 3c91 Obtaining identity" +"2019-04-22 06:17:56.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3c92 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c93 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3c94 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.380 UTC [policies] Evaluate -> DEBU 3c95 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.380 UTC [policies] Evaluate -> DEBU 3c96 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.380 UTC [policies] Evaluate -> DEBU 3c97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.380 UTC [cauthdsl] func1 -> DEBU 3c98 0xc00301fdb0 gate 1555913876380619600 evaluation starts" +"2019-04-22 06:17:56.380 UTC [cauthdsl] func2 -> DEBU 3c99 0xc00301fdb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.380 UTC [cauthdsl] func2 -> DEBU 3c9a 0xc00301fdb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.380 UTC [cauthdsl] func2 -> DEBU 3c9b 0xc00301fdb0 principal matched by identity 0" +"2019-04-22 06:17:56.381 UTC [msp.identity] Verify -> DEBU 3c9c Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:56.381 UTC [msp.identity] Verify -> DEBU 3c9d Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:56.381 UTC [cauthdsl] func2 -> DEBU 3c9e 0xc00301fdb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.381 UTC [cauthdsl] func1 -> DEBU 3c9f 0xc00301fdb0 gate 1555913876380619600 evaluation succeeds" +"2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.381 UTC [policies] Evaluate -> DEBU 3ca3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.381 UTC [gossip.gossip] handleMessage -> DEBU 3ca4 Exiting" +"2019-04-22 06:17:56.382 UTC [gossip.gossip] handleMessage -> DEBU 3ca5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.382 UTC [msp] DeserializeIdentity -> DEBU 3ca6 Obtaining identity" +"2019-04-22 06:17:56.382 UTC [msp] DeserializeIdentity -> DEBU 3ca7 Obtaining identity" +"2019-04-22 06:17:56.382 UTC [msp] DeserializeIdentity -> DEBU 3ca8 Obtaining identity" +"2019-04-22 06:17:56.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ca9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.383 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3caa Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.383 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cab Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.383 UTC [cauthdsl] func1 -> DEBU 3caf 0xc002fb1960 gate 1555913876383330500 evaluation starts" +"2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb0 0xc002fb1960 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb1 0xc002fb1960 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb2 0xc002fb1960 principal matched by identity 0" +"2019-04-22 06:17:56.383 UTC [msp.identity] Verify -> DEBU 3cb3 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:56.383 UTC [msp.identity] Verify -> DEBU 3cb4 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:56.383 UTC [cauthdsl] func2 -> DEBU 3cb5 0xc002fb1960 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.383 UTC [cauthdsl] func1 -> DEBU 3cb6 0xc002fb1960 gate 1555913876383330500 evaluation succeeds" +"2019-04-22 06:17:56.383 UTC [policies] Evaluate -> DEBU 3cb7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.384 UTC [policies] Evaluate -> DEBU 3cb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.384 UTC [policies] Evaluate -> DEBU 3cb9 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.384 UTC [policies] Evaluate -> DEBU 3cba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.393 UTC [msp.identity] Verify -> DEBU 3cbb Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:17:56.393 UTC [msp.identity] Verify -> DEBU 3cbc Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:17:56.394 UTC [msp.identity] Verify -> DEBU 3cbd Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:56.395 UTC [msp.identity] Verify -> DEBU 3cbe Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:56.395 UTC [msp] DeserializeIdentity -> DEBU 3cbf Obtaining identity" +"2019-04-22 06:17:56.396 UTC [msp] DeserializeIdentity -> DEBU 3cc0 Obtaining identity" +"2019-04-22 06:17:56.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cc1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cc2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cc3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.397 UTC [policies] Evaluate -> DEBU 3cc4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.397 UTC [policies] Evaluate -> DEBU 3cc5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.398 UTC [policies] Evaluate -> DEBU 3cc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.403 UTC [cauthdsl] func1 -> DEBU 3cc7 0xc002f45f90 gate 1555913876398283100 evaluation starts" +"2019-04-22 06:17:56.403 UTC [cauthdsl] func2 -> DEBU 3cc8 0xc002f45f90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.404 UTC [cauthdsl] func2 -> DEBU 3cc9 0xc002f45f90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.404 UTC [cauthdsl] func2 -> DEBU 3cca 0xc002f45f90 principal matched by identity 0" +"2019-04-22 06:17:56.404 UTC [msp.identity] Verify -> DEBU 3ccb Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:56.404 UTC [msp.identity] Verify -> DEBU 3ccc Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:56.405 UTC [cauthdsl] func2 -> DEBU 3ccd 0xc002f45f90 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.405 UTC [cauthdsl] func1 -> DEBU 3cce 0xc002f45f90 gate 1555913876398283100 evaluation succeeds" +"2019-04-22 06:17:56.405 UTC [policies] Evaluate -> DEBU 3ccf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.405 UTC [policies] Evaluate -> DEBU 3cd0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.405 UTC [policies] Evaluate -> DEBU 3cd1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.406 UTC [policies] Evaluate -> DEBU 3cd2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.406 UTC [gossip.gossip] handleMessage -> DEBU 3cd3 Exiting" +"2019-04-22 06:17:56.406 UTC [gossip.gossip] handleMessage -> DEBU 3cd4 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.406 UTC [msp] DeserializeIdentity -> DEBU 3cd5 Obtaining identity" +"2019-04-22 06:17:56.407 UTC [msp] DeserializeIdentity -> DEBU 3cd6 Obtaining identity" +"2019-04-22 06:17:56.407 UTC [msp] DeserializeIdentity -> DEBU 3cd7 Obtaining identity" +"2019-04-22 06:17:56.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cd8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cd9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.407 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cda Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.407 UTC [policies] Evaluate -> DEBU 3cdb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.408 UTC [policies] Evaluate -> DEBU 3cdc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.408 UTC [policies] Evaluate -> DEBU 3cdd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.408 UTC [cauthdsl] func1 -> DEBU 3cde 0xc002f01c30 gate 1555913876408261700 evaluation starts" +"2019-04-22 06:17:56.408 UTC [cauthdsl] func2 -> DEBU 3cdf 0xc002f01c30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.408 UTC [cauthdsl] func2 -> DEBU 3ce0 0xc002f01c30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.408 UTC [cauthdsl] func2 -> DEBU 3ce1 0xc002f01c30 principal matched by identity 0" +"2019-04-22 06:17:56.408 UTC [msp.identity] Verify -> DEBU 3ce2 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:17:56.414 UTC [msp.identity] Verify -> DEBU 3ce3 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:17:56.414 UTC [cauthdsl] func2 -> DEBU 3ce4 0xc002f01c30 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.414 UTC [cauthdsl] func1 -> DEBU 3ce5 0xc002f01c30 gate 1555913876408261700 evaluation succeeds" +"2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce8 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.414 UTC [policies] Evaluate -> DEBU 3ce9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.414 UTC [msp.identity] Verify -> DEBU 3cea Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:17:56.415 UTC [msp.identity] Verify -> DEBU 3ceb Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:17:56.415 UTC [msp.identity] Verify -> DEBU 3cec Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:17:56.415 UTC [msp.identity] Verify -> DEBU 3ced Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:17:56.415 UTC [msp] DeserializeIdentity -> DEBU 3cee Obtaining identity" +"2019-04-22 06:17:56.415 UTC [msp] DeserializeIdentity -> DEBU 3cef Obtaining identity" +"2019-04-22 06:17:56.416 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3cf0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.416 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cf1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.416 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3cf2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.416 UTC [policies] Evaluate -> DEBU 3cf3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.416 UTC [policies] Evaluate -> DEBU 3cf4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.416 UTC [policies] Evaluate -> DEBU 3cf5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.416 UTC [cauthdsl] func1 -> DEBU 3cf6 0xc002ee42d0 gate 1555913876416351000 evaluation starts" +"2019-04-22 06:17:56.416 UTC [cauthdsl] func2 -> DEBU 3cf7 0xc002ee42d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.416 UTC [cauthdsl] func2 -> DEBU 3cf8 0xc002ee42d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.416 UTC [cauthdsl] func2 -> DEBU 3cf9 0xc002ee42d0 principal matched by identity 0" +"2019-04-22 06:17:56.416 UTC [msp.identity] Verify -> DEBU 3cfa Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:17:56.416 UTC [msp.identity] Verify -> DEBU 3cfb Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:17:56.417 UTC [cauthdsl] func2 -> DEBU 3cfc 0xc002ee42d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.417 UTC [cauthdsl] func1 -> DEBU 3cfd 0xc002ee42d0 gate 1555913876416351000 evaluation succeeds" +"2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3cfe Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3cff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3d00 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.417 UTC [policies] Evaluate -> DEBU 3d01 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.417 UTC [gossip.gossip] handleMessage -> DEBU 3d02 Exiting" +"2019-04-22 06:17:56.432 UTC [gossip.election] waitForInterrupt -> DEBU 3d03 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:17:56.433 UTC [gossip.election] IsLeader -> DEBU 3d04 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:17:56.434 UTC [msp.identity] Sign -> DEBU 3d05 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510101801 " +"2019-04-22 06:17:56.435 UTC [msp.identity] Sign -> DEBU 3d06 Sign: digest: ACBC7824C74D6CFE8E81F94BFE09A007582C1EF6963C933F181CA8E8FADDD4F5 " +"2019-04-22 06:17:56.435 UTC [gossip.election] waitForInterrupt -> DEBU 3d07 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:17:56.435 UTC [msp] DeserializeIdentity -> DEBU 3d08 Obtaining identity" +"2019-04-22 06:17:56.435 UTC [msp] DeserializeIdentity -> DEBU 3d09 Obtaining identity" +"2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0a Obtaining identity" +"2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0b Obtaining identity" +"2019-04-22 06:17:56.436 UTC [gossip.comm] Send -> DEBU 3d0c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" +"2019-04-22 06:17:56.436 UTC [msp] DeserializeIdentity -> DEBU 3d0e Obtaining identity" +"2019-04-22 06:17:56.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3d0f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:16 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.436 UTC [gossip.comm] sendToEndpoint -> DEBU 3d10 Exiting" +"2019-04-22 06:17:56.472 UTC [msp] DeserializeIdentity -> DEBU 3d11 Obtaining identity" +"2019-04-22 06:17:56.472 UTC [msp] DeserializeIdentity -> DEBU 3d12 Obtaining identity" +"2019-04-22 06:17:56.473 UTC [gossip.pull] Hello -> DEBU 3d13 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:56.474 UTC [msp] DeserializeIdentity -> DEBU 3d14 Obtaining identity" +"2019-04-22 06:17:56.474 UTC [msp] DeserializeIdentity -> DEBU 3d15 Obtaining identity" +"2019-04-22 06:17:56.475 UTC [gossip.comm] Send -> DEBU 3d16 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:56.476 UTC [gossip.comm] sendToEndpoint -> DEBU 3d17 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.476 UTC [gossip.comm] sendToEndpoint -> DEBU 3d18 Exiting" +"2019-04-22 06:17:56.479 UTC [gossip.comm] func1 -> DEBU 3d19 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9793289068570394303 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.479 UTC [gossip.gossip] handleMessage -> DEBU 3d1a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9793289068570394303 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.480 UTC [gossip.pull] HandleMessage -> DEBU 3d1b GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 9793289068570394303 , Msg_type: BLOCK_MSG, digests: [5 6 7 8 1 2 3 4], Envelope: 58 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.481 UTC [gossip.gossip] handleMessage -> DEBU 3d1c Exiting" +"2019-04-22 06:17:56.589 UTC [gossip.gossip] handleMessage -> DEBU 3d1d Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.592 UTC [gossip.gossip] handleMessage -> DEBU 3d1e Exiting" +"2019-04-22 06:17:56.593 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.593 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d20 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:56.594 UTC [msp] DeserializeIdentity -> DEBU 3d21 Obtaining identity" +"2019-04-22 06:17:56.601 UTC [gossip.comm] func1 -> DEBU 3d22 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.603 UTC [gossip.gossip] handleMessage -> DEBU 3d23 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.605 UTC [gossip.comm] func1 -> DEBU 3d24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.595 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d25 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d26 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.620 UTC [gossip.comm] func1 -> DEBU 3d27 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d28 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.620 UTC [policies] Evaluate -> DEBU 3d29 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.620 UTC [policies] Evaluate -> DEBU 3d2a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.620 UTC [policies] Evaluate -> DEBU 3d2b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.620 UTC [cauthdsl] func1 -> DEBU 3d2c 0xc002ec1210 gate 1555913876620698700 evaluation starts" +"2019-04-22 06:17:56.620 UTC [cauthdsl] func2 -> DEBU 3d2d 0xc002ec1210 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.620 UTC [cauthdsl] func2 -> DEBU 3d2e 0xc002ec1210 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.620 UTC [cauthdsl] func2 -> DEBU 3d2f 0xc002ec1210 principal matched by identity 0" +"2019-04-22 06:17:56.620 UTC [msp.identity] Verify -> DEBU 3d30 Verify: digest = 00000000 e8 a2 fb 6d 55 31 1d d6 31 6f e1 71 00 21 28 25 |...mU1..1o.q.!(%| +00000010 6c b5 83 ba 04 23 7d d3 84 f7 df e1 4f 04 45 71 |l....#}.....O.Eq|" +"2019-04-22 06:17:56.621 UTC [msp.identity] Verify -> DEBU 3d31 Verify: sig = 00000000 30 44 02 20 0a 15 e8 03 94 7d 58 1a f4 f7 9c 52 |0D. .....}X....R| +00000010 d3 98 63 70 fa 07 4b 41 d3 93 50 d4 ee 16 64 f8 |..cp..KA..P...d.| +00000020 5e 66 b9 57 02 20 4a 62 69 ed fa 0c e8 22 c2 57 |^f.W. Jbi....".W| +00000030 cb 08 bf c5 52 94 a8 a3 f2 ec a8 19 35 96 7f 58 |....R.......5..X| +00000040 66 33 a2 11 7e da |f3..~.|" +"2019-04-22 06:17:56.621 UTC [cauthdsl] func2 -> DEBU 3d32 0xc002ec1210 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.621 UTC [cauthdsl] func1 -> DEBU 3d33 0xc002ec1210 gate 1555913876620698700 evaluation succeeds" +"2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d34 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d36 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.621 UTC [policies] Evaluate -> DEBU 3d37 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d38 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d39 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 " +"2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 " +"2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:50 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:56.622 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d3d Exiting" +"2019-04-22 06:17:56.622 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d3e Exiting" +"2019-04-22 06:17:56.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d3f Exiting" +"2019-04-22 06:17:56.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d40 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d41 Exiting" +"2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d42 Exiting" +"2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d43 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d44 Exiting" +"2019-04-22 06:17:56.622 UTC [gossip.gossip] handleMessage -> DEBU 3d45 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.623 UTC [msp] DeserializeIdentity -> DEBU 3d46 Obtaining identity" +"2019-04-22 06:17:56.623 UTC [msp] DeserializeIdentity -> DEBU 3d47 Obtaining identity" +"2019-04-22 06:17:56.623 UTC [gossip.gossip] handleMessage -> DEBU 3d48 Exiting" +"2019-04-22 06:17:56.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.623 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d4a Exiting" +"2019-04-22 06:17:56.631 UTC [msp] DeserializeIdentity -> DEBU 3d4b Obtaining identity" +"2019-04-22 06:17:56.631 UTC [msp] DeserializeIdentity -> DEBU 3d4c Obtaining identity" +"2019-04-22 06:17:56.632 UTC [msp] DeserializeIdentity -> DEBU 3d4d Obtaining identity" +"2019-04-22 06:17:56.632 UTC [msp] DeserializeIdentity -> DEBU 3d4e Obtaining identity" +"2019-04-22 06:17:56.632 UTC [msp] DeserializeIdentity -> DEBU 3d4f Obtaining identity" +"2019-04-22 06:17:56.633 UTC [msp] DeserializeIdentity -> DEBU 3d50 Obtaining identity" +"2019-04-22 06:17:56.633 UTC [gossip.comm] Send -> DEBU 3d51 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:56.633 UTC [msp] DeserializeIdentity -> DEBU 3d52 Obtaining identity" +"2019-04-22 06:17:56.634 UTC [msp] DeserializeIdentity -> DEBU 3d54 Obtaining identity" +"2019-04-22 06:17:56.634 UTC [gossip.comm] Send -> DEBU 3d55 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:56.633 UTC [gossip.comm] sendToEndpoint -> DEBU 3d53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.640 UTC [gossip.comm] sendToEndpoint -> DEBU 3d56 Exiting" +"2019-04-22 06:17:56.634 UTC [gossip.comm] sendToEndpoint -> DEBU 3d57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.642 UTC [gossip.comm] sendToEndpoint -> DEBU 3d58 Exiting" +"2019-04-22 06:17:56.664 UTC [gossip.comm] func1 -> DEBU 3d59 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.664 UTC [gossip.gossip] handleMessage -> DEBU 3d5a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.665 UTC [gossip.pull] HandleMessage -> DEBU 3d5b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.665 UTC [gossip.pull] SendDigest -> DEBU 3d5c Sending BLOCK_MSG digest: [6 7 8 1 2 3 4 5] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:56.665 UTC [gossip.gossip] handleMessage -> DEBU 3d5d Exiting" +"2019-04-22 06:17:56.836 UTC [gossip.gossip] handleMessage -> DEBU 3d5e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:56.836 UTC [msp] DeserializeIdentity -> DEBU 3d5f Obtaining identity" +"2019-04-22 06:17:56.836 UTC [msp] DeserializeIdentity -> DEBU 3d60 Obtaining identity" +"2019-04-22 06:17:56.836 UTC [msp] DeserializeIdentity -> DEBU 3d61 Obtaining identity" +"2019-04-22 06:17:56.836 UTC [gossip.gossip] handleMessage -> DEBU 3d62 Exiting" +"2019-04-22 06:17:56.989 UTC [gossip.gossip] handleMessage -> DEBU 3d63 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.989 UTC [gossip.gossip] handleMessage -> DEBU 3d64 Exiting" +"2019-04-22 06:17:56.989 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.989 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3d66 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:17:56.989 UTC [msp] DeserializeIdentity -> DEBU 3d67 Obtaining identity" +"2019-04-22 06:17:56.990 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:56.990 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d69 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.990 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d6a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:56.990 UTC [policies] Evaluate -> DEBU 3d6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:56.990 UTC [policies] Evaluate -> DEBU 3d6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:56.990 UTC [policies] Evaluate -> DEBU 3d6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:56.990 UTC [cauthdsl] func1 -> DEBU 3d6e 0xc002a1ed60 gate 1555913876990437300 evaluation starts" +"2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d6f 0xc002a1ed60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d70 0xc002a1ed60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d71 0xc002a1ed60 principal matched by identity 0" +"2019-04-22 06:17:56.990 UTC [msp.identity] Verify -> DEBU 3d72 Verify: digest = 00000000 10 83 4e 82 8b e6 39 dc 9e 06 78 8a 8d 5f 20 40 |..N...9...x.._ @| +00000010 19 09 aa e2 d3 ae 4e a7 a2 44 e6 25 d1 8d ef 26 |......N..D.%...&|" +"2019-04-22 06:17:56.990 UTC [msp.identity] Verify -> DEBU 3d73 Verify: sig = 00000000 30 44 02 20 22 0e 8e 2e 9e 85 0d 88 17 3b 1d 05 |0D. "........;..| +00000010 f4 76 c4 a5 f2 80 57 4a 90 d9 67 b1 18 6e da 62 |.v....WJ..g..n.b| +00000020 5d 05 58 fe 02 20 48 3f 00 4d a3 74 a6 c2 0b 5d |].X.. H?.M.t...]| +00000030 55 82 ac 6c 03 31 1b ea 6a 4c 82 ea 97 a7 a1 2c |U..l.1..jL.....,| +00000040 ab e8 f5 da c8 4c |.....L|" +"2019-04-22 06:17:56.990 UTC [cauthdsl] func2 -> DEBU 3d74 0xc002a1ed60 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:56.991 UTC [cauthdsl] func1 -> DEBU 3d75 0xc002a1ed60 gate 1555913876990437300 evaluation succeeds" +"2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d76 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d78 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:56.991 UTC [policies] Evaluate -> DEBU 3d79 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:56.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d7a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7c updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 " +"2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7d Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 " +"2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:48 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:56.991 UTC [gossip.discovery] learnExistingMembers -> DEBU 3d7f Exiting" +"2019-04-22 06:17:56.991 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d80 Exiting" +"2019-04-22 06:17:56.991 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d81 Exiting" +"2019-04-22 06:17:56.996 UTC [gossip.comm] func1 -> DEBU 3d82 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.996 UTC [gossip.gossip] handleMessage -> DEBU 3d83 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.996 UTC [gossip.gossip] handleMessage -> DEBU 3d84 Exiting" +"2019-04-22 06:17:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d85 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d86 Exiting" +"2019-04-22 06:17:56.998 UTC [gossip.comm] func1 -> DEBU 3d87 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:56.999 UTC [gossip.gossip] handleMessage -> DEBU 3d88 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:57.001 UTC [msp] DeserializeIdentity -> DEBU 3d89 Obtaining identity" +"2019-04-22 06:17:57.002 UTC [msp] DeserializeIdentity -> DEBU 3d8a Obtaining identity" +"2019-04-22 06:17:57.002 UTC [msp] DeserializeIdentity -> DEBU 3d8b Obtaining identity" +"2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8c Obtaining identity" +"2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8d Obtaining identity" +"2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8e Obtaining identity" +"2019-04-22 06:17:57.003 UTC [msp] DeserializeIdentity -> DEBU 3d8f Obtaining identity" +"2019-04-22 06:17:57.003 UTC [gossip.comm] Send -> DEBU 3d90 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:57.004 UTC [msp] DeserializeIdentity -> DEBU 3d91 Obtaining identity" +"2019-04-22 06:17:57.004 UTC [gossip.comm] Send -> DEBU 3d92 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d93 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d94 Exiting" +"2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d95 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:57.004 UTC [gossip.comm] sendToEndpoint -> DEBU 3d96 Exiting" +"2019-04-22 06:17:57.005 UTC [gossip.gossip] handleMessage -> DEBU 3d97 Exiting" +"2019-04-22 06:17:57.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d98 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:17:57.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d99 Exiting" +"2019-04-22 06:17:57.052 UTC [gossip.comm] func1 -> DEBU 3d9a Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:57.052 UTC [gossip.gossip] handleMessage -> DEBU 3d9b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:17:57.052 UTC [msp] DeserializeIdentity -> DEBU 3d9c Obtaining identity" +"2019-04-22 06:17:57.053 UTC [msp] DeserializeIdentity -> DEBU 3d9d Obtaining identity" +"2019-04-22 06:17:57.053 UTC [msp] DeserializeIdentity -> DEBU 3d9e Obtaining identity" +"2019-04-22 06:17:57.053 UTC [gossip.gossip] handleMessage -> DEBU 3d9f Exiting" +"2019-04-22 06:17:58.865 UTC [gossip.pull] Hello -> DEBU 3da0 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:17:58.866 UTC [gossip.comm] Send -> DEBU 3da1 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:58.866 UTC [gossip.pull] Hello -> DEBU 3da2 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:17:58.866 UTC [gossip.comm] sendToEndpoint -> DEBU 3da3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.866 UTC [gossip.comm] sendToEndpoint -> DEBU 3da4 Exiting" +"2019-04-22 06:17:58.866 UTC [gossip.comm] Send -> DEBU 3da5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:58.867 UTC [gossip.pull] Hello -> DEBU 3da6 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:17:58.867 UTC [gossip.comm] Send -> DEBU 3da7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3da8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3da9 Exiting" +"2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3daa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.868 UTC [gossip.comm] func1 -> DEBU 3dab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14536065550433317564 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.868 UTC [gossip.gossip] handleMessage -> DEBU 3dac Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14536065550433317564 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.868 UTC [gossip.pull] HandleMessage -> DEBU 3dad GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 14536065550433317564 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.868 UTC [gossip.gossip] handleMessage -> DEBU 3daf Exiting" +"2019-04-22 06:17:58.868 UTC [gossip.comm] sendToEndpoint -> DEBU 3dae Exiting" +"2019-04-22 06:17:58.871 UTC [gossip.gossip] handleMessage -> DEBU 3db0 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9247242812469167990 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.871 UTC [gossip.pull] HandleMessage -> DEBU 3db1 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 9247242812469167990 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.872 UTC [gossip.gossip] handleMessage -> DEBU 3db2 Exiting" +"2019-04-22 06:17:58.872 UTC [gossip.comm] func1 -> DEBU 3db3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 145740337483397912 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.872 UTC [gossip.gossip] handleMessage -> DEBU 3db4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 145740337483397912 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.872 UTC [gossip.pull] HandleMessage -> DEBU 3db5 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 145740337483397912 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.873 UTC [gossip.gossip] handleMessage -> DEBU 3db6 Exiting" +"2019-04-22 06:17:58.923 UTC [msp.identity] Sign -> DEBU 3db7 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151031 " +"2019-04-22 06:17:58.924 UTC [msp.identity] Sign -> DEBU 3db8 Sign: digest: B4E3523E60C185686A358A28D765B9C20EBBAD6E1A7590F25559A1677C2DF8EA " +"2019-04-22 06:17:58.924 UTC [msp.identity] Sign -> DEBU 3db9 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:17:58.925 UTC [msp.identity] Sign -> DEBU 3dba Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:17:58.925 UTC [msp] DeserializeIdentity -> DEBU 3dbb Obtaining identity" +"2019-04-22 06:17:58.925 UTC [gossip.comm] Send -> DEBU 3dbc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:58.926 UTC [gossip.comm] Send -> DEBU 3dbd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:58.926 UTC [msp] DeserializeIdentity -> DEBU 3dbe Obtaining identity" +"2019-04-22 06:17:58.926 UTC [gossip.comm] Send -> DEBU 3dbf Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:58.926 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.926 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc3 Exiting" +"2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc5 Exiting" +"2019-04-22 06:17:58.927 UTC [gossip.comm] sendToEndpoint -> DEBU 3dc2 Exiting" +"2019-04-22 06:17:58.934 UTC [gossip.comm] func1 -> DEBU 3dc6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.935 UTC [gossip.gossip] handleMessage -> DEBU 3dc7 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.935 UTC [gossip.gossip] handleMessage -> DEBU 3dc8 Exiting" +"2019-04-22 06:17:58.935 UTC [gossip.gossip] handleMessage -> DEBU 3dca Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.935 UTC [gossip.comm] func1 -> DEBU 3dc9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dcb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dcc Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:58.937 UTC [msp.identity] Verify -> DEBU 3dcd Verify: digest = 00000000 b4 e3 52 3e 60 c1 85 68 6a 35 8a 28 d7 65 b9 c2 |..R>`..hj5.(.e..| +00000010 0e bb ad 6e 1a 75 90 f2 55 59 a1 67 7c 2d f8 ea |...n.u..UY.g|-..|" +"2019-04-22 06:17:58.937 UTC [msp.identity] Verify -> DEBU 3dce Verify: sig = 00000000 30 45 02 21 00 9c f0 51 c3 48 5d 97 2c b3 47 1a |0E.!...Q.H].,.G.| +00000010 92 0c aa d0 6d 4a 56 5b 11 18 35 62 bd f8 16 22 |....mJV[..5b..."| +00000020 c0 f1 a4 06 a0 02 20 65 10 67 9e 63 16 0d 7c af |...... e.g.c..|.| +00000030 57 fc f8 15 5c 87 18 aa 54 b0 6d f6 07 2d 50 50 |W...\...T.m..-PP| +00000040 c1 53 bb 3a 2e 22 2e |.S.:.".|" +"2019-04-22 06:17:58.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dcf Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:58.938 UTC [gossip.discovery] isSentByMe -> DEBU 3dd0 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:58.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd1 Exiting" +"2019-04-22 06:17:58.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dd2 Exiting" +"2019-04-22 06:17:58.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3dd3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.939 UTC [gossip.gossip] handleMessage -> DEBU 3dd4 Exiting" +"2019-04-22 06:17:58.939 UTC [gossip.gossip] handleMessage -> DEBU 3dd5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.939 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dd6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:58.940 UTC [msp.identity] Verify -> DEBU 3dd7 Verify: digest = 00000000 b4 e3 52 3e 60 c1 85 68 6a 35 8a 28 d7 65 b9 c2 |..R>`..hj5.(.e..| +00000010 0e bb ad 6e 1a 75 90 f2 55 59 a1 67 7c 2d f8 ea |...n.u..UY.g|-..|" +"2019-04-22 06:17:58.940 UTC [msp.identity] Verify -> DEBU 3dd8 Verify: sig = 00000000 30 45 02 21 00 9c f0 51 c3 48 5d 97 2c b3 47 1a |0E.!...Q.H].,.G.| +00000010 92 0c aa d0 6d 4a 56 5b 11 18 35 62 bd f8 16 22 |....mJV[..5b..."| +00000020 c0 f1 a4 06 a0 02 20 65 10 67 9e 63 16 0d 7c af |...... e.g.c..|.| +00000030 57 fc f8 15 5c 87 18 aa 54 b0 6d f6 07 2d 50 50 |W...\...T.m..-PP| +00000040 c1 53 bb 3a 2e 22 2e |.S.:.".|" +"2019-04-22 06:17:58.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dd9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:58.941 UTC [gossip.discovery] isSentByMe -> DEBU 3dda Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:58.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ddb Exiting" +"2019-04-22 06:17:58.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ddc Exiting" +"2019-04-22 06:17:58.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ddd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:17:58.942 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3dde Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:17:58.942 UTC [msp.identity] Verify -> DEBU 3de0 Verify: digest = 00000000 b4 e3 52 3e 60 c1 85 68 6a 35 8a 28 d7 65 b9 c2 |..R>`..hj5.(.e..| +00000010 0e bb ad 6e 1a 75 90 f2 55 59 a1 67 7c 2d f8 ea |...n.u..UY.g|-..|" +"2019-04-22 06:17:58.942 UTC [msp.identity] Verify -> DEBU 3de1 Verify: sig = 00000000 30 45 02 21 00 9c f0 51 c3 48 5d 97 2c b3 47 1a |0E.!...Q.H].,.G.| +00000010 92 0c aa d0 6d 4a 56 5b 11 18 35 62 bd f8 16 22 |....mJV[..5b..."| +00000020 c0 f1 a4 06 a0 02 20 65 10 67 9e 63 16 0d 7c af |...... e.g.c..|.| +00000030 57 fc f8 15 5c 87 18 aa 54 b0 6d f6 07 2d 50 50 |W...\...T.m..-PP| +00000040 c1 53 bb 3a 2e 22 2e |.S.:.".|" +"2019-04-22 06:17:58.942 UTC [gossip.gossip] handleMessage -> DEBU 3ddf Exiting" +"2019-04-22 06:17:58.943 UTC [msp.identity] Verify -> DEBU 3de2 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:17:58.943 UTC [msp.identity] Verify -> DEBU 3de3 Verify: sig = 00000000 30 44 02 20 2b 41 65 bc 2e c0 e9 97 64 79 e1 30 |0D. +Ae.....dy.0| +00000010 97 9c 11 f7 a8 27 28 35 ba d3 bd 36 4d 3a 06 fc |.....'(5...6M:..| +00000020 fa 1e 4f 88 02 20 0f 6e 82 1d 8f 7b 4d c8 d6 fe |..O.. .n...{M...| +00000030 21 11 46 e7 7c 98 6f 4e c1 9f 17 d8 e3 47 ef 0a |!.F.|.oN.....G..| +00000040 4a 1e 15 0b b0 36 |J....6|" +"2019-04-22 06:17:58.944 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:58.944 UTC [gossip.discovery] isSentByMe -> DEBU 3de5 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:49 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:17:58.945 UTC [gossip.discovery] handleAliveMessage -> DEBU 3de6 Exiting" +"2019-04-22 06:17:58.945 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3de7 Exiting" +"2019-04-22 06:17:59.110 UTC [gossip.comm] func1 -> DEBU 3de8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.111 UTC [gossip.gossip] handleMessage -> DEBU 3de9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.112 UTC [gossip.pull] HandleMessage -> DEBU 3dea GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.112 UTC [gossip.pull] SendDigest -> DEBU 3deb Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:59.112 UTC [gossip.gossip] handleMessage -> DEBU 3dec Exiting" +"2019-04-22 06:17:59.181 UTC [gossip.comm] func1 -> DEBU 3ded Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.182 UTC [gossip.gossip] handleMessage -> DEBU 3dee Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.182 UTC [gossip.gossip] handleMessage -> DEBU 3def Exiting" +"2019-04-22 06:17:59.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3df0 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.183 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3df1 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:17:59.183 UTC [msp.identity] Verify -> DEBU 3df2 Verify: digest = 00000000 78 71 36 5b c7 e3 28 fc ab 6d 5c 89 a9 a9 fe 26 |xq6[..(..m\....&| +00000010 ba f3 84 72 2c c2 f6 37 7b 87 5d a0 4f 8a 56 d7 |...r,..7{.].O.V.|" +"2019-04-22 06:17:59.184 UTC [msp.identity] Verify -> DEBU 3df3 Verify: sig = 00000000 30 45 02 21 00 c7 2a 09 a6 fa 8f 75 ea 4a aa b8 |0E.!..*....u.J..| +00000010 d7 cd 66 40 ee 44 70 e3 e5 d4 06 23 fe 1f 26 50 |..f@.Dp....#..&P| +00000020 65 18 dd 09 3a 02 20 1a b1 65 ce 82 90 85 c8 40 |e...:. ..e.....@| +00000030 d7 de 94 7e 78 4b f0 1c d3 c9 0e 90 49 f6 41 90 |...~xK......I.A.| +00000040 ff 9a 12 a3 d4 d8 42 |......B|" +"2019-04-22 06:17:59.184 UTC [msp.identity] Verify -> DEBU 3df4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:17:59.185 UTC [msp.identity] Verify -> DEBU 3df5 Verify: sig = 00000000 30 43 02 20 27 2e fd 0f ae 56 a2 1d e7 53 85 e1 |0C. '....V...S..| +00000010 64 95 d3 91 a5 1c 89 b8 05 2e a7 20 35 1e d3 1f |d.......... 5...| +00000020 96 46 8b 8f 02 1f 72 c1 63 e8 a8 d4 c9 c7 61 b7 |.F....r.c.....a.| +00000030 cd 3e 7b 94 00 87 ec b4 f5 8d e2 79 d0 7a 6a 9f |.>{........y.zj.| +00000040 2e df cf d2 d0 |.....|" +"2019-04-22 06:17:59.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 3df6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes" +"2019-04-22 06:17:59.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df7 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes]}" +"2019-04-22 06:17:59.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df8 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 " +"2019-04-22 06:17:59.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 3df9 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 " +"2019-04-22 06:17:59.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dfa Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:52 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:59.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3dfb Exiting" +"2019-04-22 06:17:59.187 UTC [gossip.discovery] handleAliveMessage -> DEBU 3dfc Exiting" +"2019-04-22 06:17:59.188 UTC [gossip.discovery] sendMemResponse -> DEBU 3dfd Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:17:59.188 UTC [msp] DeserializeIdentity -> DEBU 3dfe Obtaining identity" +"2019-04-22 06:17:59.189 UTC [msp] DeserializeIdentity -> DEBU 3dff Obtaining identity" +"2019-04-22 06:17:59.189 UTC [gossip.comm] Send -> DEBU 3e00 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:59.189 UTC [gossip.discovery] sendMemResponse -> DEBU 3e01 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:17:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 3e02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.190 UTC [gossip.comm] sendToEndpoint -> DEBU 3e03 Exiting" +"2019-04-22 06:17:59.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e04 Exiting" +"2019-04-22 06:17:59.586 UTC [gossip.comm] func1 -> DEBU 3e05 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.586 UTC [gossip.gossip] handleMessage -> DEBU 3e06 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.586 UTC [gossip.pull] HandleMessage -> DEBU 3e07 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e08 Obtaining identity" +"2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e09 Obtaining identity" +"2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0a Obtaining identity" +"2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0b Obtaining identity" +"2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0c Obtaining identity" +"2019-04-22 06:17:59.586 UTC [msp] DeserializeIdentity -> DEBU 3e0d Obtaining identity" +"2019-04-22 06:17:59.586 UTC [gossip.pull] SendDigest -> DEBU 3e0e Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:59.586 UTC [gossip.gossip] handleMessage -> DEBU 3e0f Exiting" +"2019-04-22 06:17:59.609 UTC [gossip.comm] func1 -> DEBU 3e10 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.609 UTC [gossip.gossip] handleMessage -> DEBU 3e11 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.609 UTC [gossip.gossip] handleMessage -> DEBU 3e12 Exiting" +"2019-04-22 06:17:59.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e13 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.611 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e14 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:17:59.611 UTC [msp] DeserializeIdentity -> DEBU 3e15 Obtaining identity" +"2019-04-22 06:17:59.611 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e16 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:17:59.612 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e17 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:59.612 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e18 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:17:59.612 UTC [policies] Evaluate -> DEBU 3e19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:17:59.614 UTC [policies] Evaluate -> DEBU 3e1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:17:59.614 UTC [policies] Evaluate -> DEBU 3e1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:17:59.614 UTC [cauthdsl] func1 -> DEBU 3e1c 0xc002536f10 gate 1555913879614767100 evaluation starts" +"2019-04-22 06:17:59.615 UTC [cauthdsl] func2 -> DEBU 3e1d 0xc002536f10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:17:59.615 UTC [cauthdsl] func2 -> DEBU 3e1e 0xc002536f10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:17:59.616 UTC [cauthdsl] func2 -> DEBU 3e1f 0xc002536f10 principal matched by identity 0" +"2019-04-22 06:17:59.617 UTC [msp.identity] Verify -> DEBU 3e20 Verify: digest = 00000000 d5 0d 3e 7e 25 d9 62 34 ce 99 d4 3e 67 36 e4 17 |..>~%.b4...>g6..| +00000010 6e 77 7c c3 76 3b dc dc 47 af 42 e1 0f 81 f7 0d |nw|.v;..G.B.....|" +"2019-04-22 06:17:59.618 UTC [msp.identity] Verify -> DEBU 3e21 Verify: sig = 00000000 30 45 02 21 00 e6 2f 35 eb c7 df 18 82 f6 e3 76 |0E.!../5.......v| +00000010 fd bd 1f ed 48 b5 10 92 8d 22 81 78 81 69 21 60 |....H....".x.i!`| +00000020 09 19 76 4a fa 02 20 5c 9c d5 4c c0 9b 08 cd 9f |..vJ.. \..L.....| +00000030 fb f0 3d 90 8d 3f 8e c3 6d 45 f8 81 e4 04 55 d0 |..=..?..mE....U.| +00000040 56 2e 90 cd 19 3b 95 |V....;.|" +"2019-04-22 06:17:59.618 UTC [cauthdsl] func2 -> DEBU 3e22 0xc002536f10 principal evaluation succeeds for identity 0" +"2019-04-22 06:17:59.619 UTC [cauthdsl] func1 -> DEBU 3e23 0xc002536f10 gate 1555913879614767100 evaluation succeeds" +"2019-04-22 06:17:59.619 UTC [policies] Evaluate -> DEBU 3e24 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:59.619 UTC [policies] Evaluate -> DEBU 3e25 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:17:59.619 UTC [policies] Evaluate -> DEBU 3e26 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:17:59.620 UTC [policies] Evaluate -> DEBU 3e27 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:17:59.620 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e28 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:17:59.620 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e29 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:17:59.620 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2a updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 " +"2019-04-22 06:17:59.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2b Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 " +"2019-04-22 06:17:59.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2c Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:17:59.621 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e2d Exiting" +"2019-04-22 06:17:59.621 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e2e Exiting" +"2019-04-22 06:17:59.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e2f Exiting" +"2019-04-22 06:17:59.622 UTC [gossip.discovery] sendMemResponse -> DEBU 3e30 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:17:59.622 UTC [msp] DeserializeIdentity -> DEBU 3e31 Obtaining identity" +"2019-04-22 06:17:59.623 UTC [msp] DeserializeIdentity -> DEBU 3e32 Obtaining identity" +"2019-04-22 06:17:59.623 UTC [msp] DeserializeIdentity -> DEBU 3e33 Obtaining identity" +"2019-04-22 06:17:59.623 UTC [gossip.comm] Send -> DEBU 3e34 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:17:59.624 UTC [gossip.discovery] sendMemResponse -> DEBU 3e35 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:17:59.624 UTC [gossip.comm] sendToEndpoint -> DEBU 3e36 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.625 UTC [gossip.comm] sendToEndpoint -> DEBU 3e37 Exiting" +"2019-04-22 06:17:59.993 UTC [gossip.gossip] handleMessage -> DEBU 3e38 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.993 UTC [gossip.pull] HandleMessage -> DEBU 3e39 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:17:59.993 UTC [msp] DeserializeIdentity -> DEBU 3e3a Obtaining identity" +"2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3b Obtaining identity" +"2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3c Obtaining identity" +"2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3d Obtaining identity" +"2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3e Obtaining identity" +"2019-04-22 06:17:59.994 UTC [msp] DeserializeIdentity -> DEBU 3e3f Obtaining identity" +"2019-04-22 06:17:59.994 UTC [gossip.pull] SendDigest -> DEBU 3e40 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:17:59.996 UTC [gossip.gossip] handleMessage -> DEBU 3e41 Exiting" +"2019-04-22 06:18:00.013 UTC [gossip.gossip] handleMessage -> DEBU 3e42 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.014 UTC [gossip.gossip] handleMessage -> DEBU 3e43 Exiting" +"2019-04-22 06:18:00.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e44 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.015 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e45 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:00.015 UTC [msp] DeserializeIdentity -> DEBU 3e46 Obtaining identity" +"2019-04-22 06:18:00.038 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:00.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e48 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.038 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e49 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.038 UTC [policies] Evaluate -> DEBU 3e4a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:00.039 UTC [policies] Evaluate -> DEBU 3e4b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:00.039 UTC [policies] Evaluate -> DEBU 3e4c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:00.039 UTC [cauthdsl] func1 -> DEBU 3e4d 0xc0024867c0 gate 1555913880039188500 evaluation starts" +"2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e4e 0xc0024867c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e4f 0xc0024867c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e50 0xc0024867c0 principal matched by identity 0" +"2019-04-22 06:18:00.039 UTC [msp.identity] Verify -> DEBU 3e51 Verify: digest = 00000000 3a f7 c5 54 4e ef 80 18 2e 38 fc d7 63 42 cd 7f |:..TN....8..cB..| +00000010 9d 7a 6e 6b 7c 86 98 17 a0 c8 4e d8 6e 78 e9 e3 |.znk|.....N.nx..|" +"2019-04-22 06:18:00.039 UTC [msp.identity] Verify -> DEBU 3e52 Verify: sig = 00000000 30 45 02 21 00 de 44 d1 43 e7 2d 8b d0 17 34 db |0E.!..D.C.-...4.| +00000010 87 17 e9 6d 5b f0 de dc dd 51 4c af a0 93 84 fa |...m[....QL.....| +00000020 04 e9 59 03 20 02 20 03 1a c9 64 53 42 7a 0c c9 |..Y. . ...dSBz..| +00000030 21 08 a5 7d f4 d6 7e 8c 5b 95 96 57 7a 4f 01 da |!..}..~.[..WzO..| +00000040 f8 c5 c6 5f 79 5f 7e |..._y_~|" +"2019-04-22 06:18:00.039 UTC [cauthdsl] func2 -> DEBU 3e53 0xc0024867c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:00.039 UTC [cauthdsl] func1 -> DEBU 3e54 0xc0024867c0 gate 1555913880039188500 evaluation succeeds" +"2019-04-22 06:18:00.039 UTC [policies] Evaluate -> DEBU 3e55 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.040 UTC [policies] Evaluate -> DEBU 3e56 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.040 UTC [policies] Evaluate -> DEBU 3e57 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:00.040 UTC [policies] Evaluate -> DEBU 3e58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:00.040 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e59 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 " +"2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 " +"2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:49 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:00.040 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e5e Exiting" +"2019-04-22 06:18:00.041 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e5f Exiting" +"2019-04-22 06:18:00.041 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e60 Exiting" +"2019-04-22 06:18:00.041 UTC [gossip.discovery] sendMemResponse -> DEBU 3e61 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:00.041 UTC [msp] DeserializeIdentity -> DEBU 3e62 Obtaining identity" +"2019-04-22 06:18:00.041 UTC [msp] DeserializeIdentity -> DEBU 3e63 Obtaining identity" +"2019-04-22 06:18:00.042 UTC [msp] DeserializeIdentity -> DEBU 3e64 Obtaining identity" +"2019-04-22 06:18:00.042 UTC [gossip.comm] Send -> DEBU 3e65 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:00.042 UTC [gossip.discovery] sendMemResponse -> DEBU 3e66 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:00.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e67 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.042 UTC [gossip.comm] sendToEndpoint -> DEBU 3e68 Exiting" +"2019-04-22 06:18:00.354 UTC [msp] DeserializeIdentity -> DEBU 3e69 Obtaining identity" +"2019-04-22 06:18:00.354 UTC [msp] DeserializeIdentity -> DEBU 3e6a Obtaining identity" +"2019-04-22 06:18:00.354 UTC [gossip.comm] Send -> DEBU 3e6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6d Exiting" +"2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e6f Exiting" +"2019-04-22 06:18:00.354 UTC [gossip.comm] sendToEndpoint -> DEBU 3e70 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.355 UTC [gossip.comm] sendToEndpoint -> DEBU 3e71 Exiting" +"2019-04-22 06:18:00.358 UTC [gossip.comm] func1 -> DEBU 3e72 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.358 UTC [gossip.gossip] handleMessage -> DEBU 3e73 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.359 UTC [msp.identity] Verify -> DEBU 3e74 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:18:00.359 UTC [msp.identity] Verify -> DEBU 3e75 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:18:00.361 UTC [msp.identity] Verify -> DEBU 3e76 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:18:00.361 UTC [msp.identity] Verify -> DEBU 3e77 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:18:00.361 UTC [msp] DeserializeIdentity -> DEBU 3e78 Obtaining identity" +"2019-04-22 06:18:00.361 UTC [msp] DeserializeIdentity -> DEBU 3e79 Obtaining identity" +"2019-04-22 06:18:00.362 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e7a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:00.362 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.362 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e7c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.362 UTC [policies] Evaluate -> DEBU 3e7d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:00.362 UTC [policies] Evaluate -> DEBU 3e7e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:00.362 UTC [policies] Evaluate -> DEBU 3e7f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:00.362 UTC [cauthdsl] func1 -> DEBU 3e80 0xc0023d6d50 gate 1555913880362441500 evaluation starts" +"2019-04-22 06:18:00.362 UTC [cauthdsl] func2 -> DEBU 3e81 0xc0023d6d50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:00.362 UTC [cauthdsl] func2 -> DEBU 3e82 0xc0023d6d50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:00.362 UTC [cauthdsl] func2 -> DEBU 3e83 0xc0023d6d50 principal matched by identity 0" +"2019-04-22 06:18:00.362 UTC [msp.identity] Verify -> DEBU 3e84 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:18:00.362 UTC [msp.identity] Verify -> DEBU 3e85 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:18:00.363 UTC [cauthdsl] func2 -> DEBU 3e86 0xc0023d6d50 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:00.363 UTC [cauthdsl] func1 -> DEBU 3e87 0xc0023d6d50 gate 1555913880362441500 evaluation succeeds" +"2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e88 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e8a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e8b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:00.363 UTC [msp] DeserializeIdentity -> DEBU 3e8c Obtaining identity" +"2019-04-22 06:18:00.363 UTC [msp] DeserializeIdentity -> DEBU 3e8d Obtaining identity" +"2019-04-22 06:18:00.363 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e8e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:00.363 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e8f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.363 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e90 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e91 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:00.363 UTC [policies] Evaluate -> DEBU 3e92 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:00.364 UTC [cauthdsl] func1 -> DEBU 3e94 0xc00236e570 gate 1555913880364134200 evaluation starts" +"2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e95 0xc00236e570 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e96 0xc00236e570 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e97 0xc00236e570 principal matched by identity 0" +"2019-04-22 06:18:00.364 UTC [msp.identity] Verify -> DEBU 3e98 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:18:00.364 UTC [msp.identity] Verify -> DEBU 3e99 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:18:00.364 UTC [cauthdsl] func2 -> DEBU 3e9a 0xc00236e570 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:00.364 UTC [cauthdsl] func1 -> DEBU 3e9b 0xc00236e570 gate 1555913880364134200 evaluation succeeds" +"2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:00.364 UTC [policies] Evaluate -> DEBU 3e9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:00.364 UTC [gossip.gossip] handleMessage -> DEBU 3ea0 Exiting" +"2019-04-22 06:18:00.365 UTC [gossip.gossip] handleMessage -> DEBU 3ea1 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.365 UTC [msp] DeserializeIdentity -> DEBU 3ea2 Obtaining identity" +"2019-04-22 06:18:00.365 UTC [msp] DeserializeIdentity -> DEBU 3ea3 Obtaining identity" +"2019-04-22 06:18:00.365 UTC [msp] DeserializeIdentity -> DEBU 3ea4 Obtaining identity" +"2019-04-22 06:18:00.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ea5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:00.365 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ea6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.365 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ea7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.365 UTC [policies] Evaluate -> DEBU 3ea8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:00.365 UTC [policies] Evaluate -> DEBU 3ea9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:00.365 UTC [policies] Evaluate -> DEBU 3eaa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:00.365 UTC [cauthdsl] func1 -> DEBU 3eab 0xc00230c100 gate 1555913880365897900 evaluation starts" +"2019-04-22 06:18:00.365 UTC [cauthdsl] func2 -> DEBU 3eac 0xc00230c100 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:00.366 UTC [cauthdsl] func2 -> DEBU 3ead 0xc00230c100 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:00.366 UTC [cauthdsl] func2 -> DEBU 3eae 0xc00230c100 principal matched by identity 0" +"2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eaf Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eb0 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:18:00.366 UTC [cauthdsl] func2 -> DEBU 3eb1 0xc00230c100 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:00.366 UTC [cauthdsl] func1 -> DEBU 3eb2 0xc00230c100 gate 1555913880365897900 evaluation succeeds" +"2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:00.366 UTC [policies] Evaluate -> DEBU 3eb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eb7 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:18:00.366 UTC [msp.identity] Verify -> DEBU 3eb8 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:18:00.367 UTC [msp.identity] Verify -> DEBU 3eb9 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:18:00.367 UTC [msp.identity] Verify -> DEBU 3eba Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:18:00.367 UTC [msp] DeserializeIdentity -> DEBU 3ebb Obtaining identity" +"2019-04-22 06:18:00.367 UTC [msp] DeserializeIdentity -> DEBU 3ebc Obtaining identity" +"2019-04-22 06:18:00.375 UTC [gossip.comm] func1 -> DEBU 3ebd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.377 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ebe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:00.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ebf Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.377 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ec0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.377 UTC [policies] Evaluate -> DEBU 3ec1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:00.377 UTC [policies] Evaluate -> DEBU 3ec2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:00.377 UTC [policies] Evaluate -> DEBU 3ec3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:00.377 UTC [cauthdsl] func1 -> DEBU 3ec4 0xc0022d8a30 gate 1555913880377773000 evaluation starts" +"2019-04-22 06:18:00.377 UTC [cauthdsl] func2 -> DEBU 3ec5 0xc0022d8a30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:00.377 UTC [cauthdsl] func2 -> DEBU 3ec6 0xc0022d8a30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:00.377 UTC [cauthdsl] func2 -> DEBU 3ec7 0xc0022d8a30 principal matched by identity 0" +"2019-04-22 06:18:00.377 UTC [msp.identity] Verify -> DEBU 3ec8 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:18:00.377 UTC [msp.identity] Verify -> DEBU 3ec9 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:18:00.378 UTC [cauthdsl] func2 -> DEBU 3eca 0xc0022d8a30 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:00.378 UTC [cauthdsl] func1 -> DEBU 3ecb 0xc0022d8a30 gate 1555913880377773000 evaluation succeeds" +"2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ecc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ecd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ece Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:00.378 UTC [policies] Evaluate -> DEBU 3ecf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:00.378 UTC [gossip.gossip] handleMessage -> DEBU 3ed0 Exiting" +"2019-04-22 06:18:00.378 UTC [gossip.gossip] handleMessage -> DEBU 3ed1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.378 UTC [msp] DeserializeIdentity -> DEBU 3ed2 Obtaining identity" +"2019-04-22 06:18:00.378 UTC [msp] DeserializeIdentity -> DEBU 3ed3 Obtaining identity" +"2019-04-22 06:18:00.380 UTC [msp] DeserializeIdentity -> DEBU 3ed4 Obtaining identity" +"2019-04-22 06:18:00.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ed5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:00.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ed7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.380 UTC [policies] Evaluate -> DEBU 3ed8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:00.380 UTC [policies] Evaluate -> DEBU 3ed9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:00.380 UTC [policies] Evaluate -> DEBU 3eda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:00.380 UTC [cauthdsl] func1 -> DEBU 3edb 0xc00229c4a0 gate 1555913880380691400 evaluation starts" +"2019-04-22 06:18:00.380 UTC [cauthdsl] func2 -> DEBU 3edc 0xc00229c4a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:00.380 UTC [cauthdsl] func2 -> DEBU 3edd 0xc00229c4a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:00.380 UTC [cauthdsl] func2 -> DEBU 3ede 0xc00229c4a0 principal matched by identity 0" +"2019-04-22 06:18:00.380 UTC [msp.identity] Verify -> DEBU 3edf Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:18:00.381 UTC [msp.identity] Verify -> DEBU 3ee0 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:18:00.381 UTC [cauthdsl] func2 -> DEBU 3ee1 0xc00229c4a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:00.381 UTC [cauthdsl] func1 -> DEBU 3ee2 0xc00229c4a0 gate 1555913880380691400 evaluation succeeds" +"2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:00.381 UTC [policies] Evaluate -> DEBU 3ee6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:00.381 UTC [msp.identity] Verify -> DEBU 3ee7 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:18:00.381 UTC [msp.identity] Verify -> DEBU 3ee8 Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:18:00.382 UTC [msp.identity] Verify -> DEBU 3ee9 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:18:00.382 UTC [msp.identity] Verify -> DEBU 3eea Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:18:00.382 UTC [msp] DeserializeIdentity -> DEBU 3eeb Obtaining identity" +"2019-04-22 06:18:00.382 UTC [msp] DeserializeIdentity -> DEBU 3eec Obtaining identity" +"2019-04-22 06:18:00.382 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:00.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eee Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3eef Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:00.382 UTC [policies] Evaluate -> DEBU 3ef0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:00.382 UTC [policies] Evaluate -> DEBU 3ef1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:00.383 UTC [policies] Evaluate -> DEBU 3ef2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:00.383 UTC [cauthdsl] func1 -> DEBU 3ef3 0xc002264b20 gate 1555913880383121100 evaluation starts" +"2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef4 0xc002264b20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef5 0xc002264b20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef6 0xc002264b20 principal matched by identity 0" +"2019-04-22 06:18:00.383 UTC [msp.identity] Verify -> DEBU 3ef7 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:18:00.383 UTC [msp.identity] Verify -> DEBU 3ef8 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:18:00.383 UTC [cauthdsl] func2 -> DEBU 3ef9 0xc002264b20 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:00.383 UTC [cauthdsl] func1 -> DEBU 3efa 0xc002264b20 gate 1555913880383121100 evaluation succeeds" +"2019-04-22 06:18:00.383 UTC [policies] Evaluate -> DEBU 3efb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.383 UTC [policies] Evaluate -> DEBU 3efc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:00.384 UTC [policies] Evaluate -> DEBU 3efd Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:00.384 UTC [policies] Evaluate -> DEBU 3efe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:00.384 UTC [gossip.gossip] handleMessage -> DEBU 3eff Exiting" +"2019-04-22 06:18:00.476 UTC [msp] DeserializeIdentity -> DEBU 3f00 Obtaining identity" +"2019-04-22 06:18:00.476 UTC [msp] DeserializeIdentity -> DEBU 3f01 Obtaining identity" +"2019-04-22 06:18:00.477 UTC [gossip.pull] Hello -> DEBU 3f02 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:00.477 UTC [msp] DeserializeIdentity -> DEBU 3f03 Obtaining identity" +"2019-04-22 06:18:00.477 UTC [msp] DeserializeIdentity -> DEBU 3f04 Obtaining identity" +"2019-04-22 06:18:00.477 UTC [gossip.comm] Send -> DEBU 3f05 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:00.477 UTC [gossip.comm] sendToEndpoint -> DEBU 3f06 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.477 UTC [gossip.comm] sendToEndpoint -> DEBU 3f07 Exiting" +"2019-04-22 06:18:00.481 UTC [gossip.comm] func1 -> DEBU 3f08 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3280440632810648293 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.482 UTC [gossip.gossip] handleMessage -> DEBU 3f09 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3280440632810648293 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.482 UTC [gossip.pull] HandleMessage -> DEBU 3f0a GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 3280440632810648293 , Msg_type: BLOCK_MSG, digests: [1 2 3 4 5 6 7 8], Envelope: 57 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.482 UTC [gossip.gossip] handleMessage -> DEBU 3f0b Exiting" +"2019-04-22 06:18:00.622 UTC [gossip.comm] func1 -> DEBU 3f0c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.623 UTC [gossip.gossip] handleMessage -> DEBU 3f0d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.624 UTC [msp] DeserializeIdentity -> DEBU 3f0e Obtaining identity" +"2019-04-22 06:18:00.625 UTC [msp] DeserializeIdentity -> DEBU 3f0f Obtaining identity" +"2019-04-22 06:18:00.626 UTC [gossip.gossip] handleMessage -> DEBU 3f10 Exiting" +"2019-04-22 06:18:00.665 UTC [gossip.comm] func1 -> DEBU 3f11 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.665 UTC [gossip.gossip] handleMessage -> DEBU 3f12 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.666 UTC [gossip.pull] HandleMessage -> DEBU 3f13 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.666 UTC [gossip.pull] SendDigest -> DEBU 3f14 Sending BLOCK_MSG digest: [2 3 4 5 6 7 8 1] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:00.666 UTC [gossip.gossip] handleMessage -> DEBU 3f15 Exiting" +"2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f16 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151032 " +"2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f17 Sign: digest: 995334B154038195A1751F7874FA4CDB8B488AE8115BE2CA8DD984DA98A317DB " +"2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f18 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:00.807 UTC [msp.identity] Sign -> DEBU 3f19 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:00.807 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3f1a Sleeping 5s" +"2019-04-22 06:18:00.812 UTC [msp] DeserializeIdentity -> DEBU 3f1b Obtaining identity" +"2019-04-22 06:18:00.813 UTC [msp] DeserializeIdentity -> DEBU 3f1c Obtaining identity" +"2019-04-22 06:18:00.813 UTC [gossip.comm] Send -> DEBU 3f1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:00.813 UTC [msp] DeserializeIdentity -> DEBU 3f1e Obtaining identity" +"2019-04-22 06:18:00.813 UTC [gossip.comm] Send -> DEBU 3f1f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:00.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3f20 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:00.813 UTC [msp] DeserializeIdentity -> DEBU 3f21 Obtaining identity" +"2019-04-22 06:18:00.813 UTC [gossip.comm] sendToEndpoint -> DEBU 3f22 Exiting" +"2019-04-22 06:18:00.814 UTC [gossip.comm] Send -> DEBU 3f23 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f25 Exiting" +"2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f26 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:00.814 UTC [gossip.comm] sendToEndpoint -> DEBU 3f27 Exiting" +"2019-04-22 06:18:00.840 UTC [gossip.gossip] handleMessage -> DEBU 3f28 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:00.840 UTC [msp] DeserializeIdentity -> DEBU 3f29 Obtaining identity" +"2019-04-22 06:18:00.843 UTC [msp] DeserializeIdentity -> DEBU 3f2a Obtaining identity" +"2019-04-22 06:18:00.843 UTC [msp] DeserializeIdentity -> DEBU 3f2b Obtaining identity" +"2019-04-22 06:18:00.844 UTC [gossip.gossip] handleMessage -> DEBU 3f2c Exiting" +"2019-04-22 06:18:01.051 UTC [gossip.comm] func1 -> DEBU 3f2d Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:01.051 UTC [gossip.gossip] handleMessage -> DEBU 3f2e Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:01.053 UTC [msp] DeserializeIdentity -> DEBU 3f2f Obtaining identity" +"2019-04-22 06:18:01.054 UTC [msp] DeserializeIdentity -> DEBU 3f30 Obtaining identity" +"2019-04-22 06:18:01.054 UTC [msp] DeserializeIdentity -> DEBU 3f31 Obtaining identity" +"2019-04-22 06:18:01.054 UTC [gossip.gossip] handleMessage -> DEBU 3f32 Exiting" +"2019-04-22 06:18:01.099 UTC [gossip.comm] func1 -> DEBU 3f33 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:01.099 UTC [gossip.gossip] handleMessage -> DEBU 3f34 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:01.100 UTC [gossip.gossip] handleMessage -> DEBU 3f35 Exiting" +"2019-04-22 06:18:01.100 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f36 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:01.100 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f37 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f38 Verify: digest = 00000000 bf 55 74 b1 20 f5 7a 51 87 a4 82 de 27 53 25 06 |.Ut. .zQ....'S%.| +00000010 1d c4 3e 0b 6f 92 b8 83 0e 10 96 60 56 22 40 40 |..>.o......`V"@@|" +"2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f39 Verify: sig = 00000000 30 44 02 20 1f 02 57 fd 76 42 bc e5 86 bd 36 c8 |0D. ..W.vB....6.| +00000010 2b aa 94 40 99 6f e6 22 5a 45 73 d8 a5 7e c7 df |+..@.o."ZEs..~..| +00000020 e0 7f 5f b4 02 20 38 30 9d fa 33 88 b2 e1 a7 f8 |.._.. 80..3.....| +00000030 44 6b 37 c5 30 7b e2 e9 23 0a 8b 04 b4 59 a6 43 |Dk7.0{..#....Y.C| +00000040 b0 18 cd c2 46 4d |....FM|" +"2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f3a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:01.100 UTC [msp.identity] Verify -> DEBU 3f3b Verify: sig = 00000000 30 45 02 21 00 d2 dc 1f d7 11 13 32 c8 66 63 e9 |0E.!.......2.fc.| +00000010 6a be a5 b6 cb 25 b6 1f 2f 83 f6 b7 70 59 3d 6f |j....%../...pY=o| +00000020 3f 7c 56 fb aa 02 20 32 d4 36 42 f3 f9 85 01 8e |?|V... 2.6B.....| +00000030 d6 53 f3 95 52 32 bf ba 86 e5 9b 10 24 2e 19 af |.S..R2......$...| +00000040 e5 82 08 d6 86 a3 80 |.......|" +"2019-04-22 06:18:01.100 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f3c Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3d Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3e updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 " +"2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f3f Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 " +"2019-04-22 06:18:01.100 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f40 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 69 bytes in aliveMembership" +"2019-04-22 06:18:01.101 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f41 Exiting" +"2019-04-22 06:18:01.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f42 Exiting" +"2019-04-22 06:18:01.101 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f43 Exiting" +"2019-04-22 06:18:01.105 UTC [msp] DeserializeIdentity -> DEBU 3f44 Obtaining identity" +"2019-04-22 06:18:01.105 UTC [msp] DeserializeIdentity -> DEBU 3f45 Obtaining identity" +"2019-04-22 06:18:01.107 UTC [msp] DeserializeIdentity -> DEBU 3f46 Obtaining identity" +"2019-04-22 06:18:01.107 UTC [gossip.comm] Send -> DEBU 3f47 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:01.108 UTC [msp] DeserializeIdentity -> DEBU 3f48 Obtaining identity" +"2019-04-22 06:18:01.108 UTC [gossip.comm] Send -> DEBU 3f49 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:01.108 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.108 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4b Exiting" +"2019-04-22 06:18:01.110 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.110 UTC [gossip.comm] sendToEndpoint -> DEBU 3f4d Exiting" +"2019-04-22 06:18:01.112 UTC [gossip.gossip] handleMessage -> DEBU 3f4e Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.112 UTC [gossip.gossip] handleMessage -> DEBU 3f4f Exiting" +"2019-04-22 06:18:01.112 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f50 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f51 Exiting" +"2019-04-22 06:18:01.117 UTC [gossip.comm] func1 -> DEBU 3f52 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.117 UTC [gossip.gossip] handleMessage -> DEBU 3f53 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.117 UTC [gossip.gossip] handleMessage -> DEBU 3f54 Exiting" +"2019-04-22 06:18:01.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f55 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f56 Exiting" +"2019-04-22 06:18:01.435 UTC [gossip.election] waitForInterrupt -> DEBU 3f57 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:18:01.436 UTC [gossip.election] IsLeader -> DEBU 3f58 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:18:01.436 UTC [msp.identity] Sign -> DEBU 3f59 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510111801 " +"2019-04-22 06:18:01.436 UTC [msp.identity] Sign -> DEBU 3f5a Sign: digest: C86F6FBF68F4966EE1575F58C44E6900D848D1E95BCF5020A3CE5E019A7C1A42 " +"2019-04-22 06:18:01.436 UTC [gossip.election] waitForInterrupt -> DEBU 3f5b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:18:01.438 UTC [msp] DeserializeIdentity -> DEBU 3f5c Obtaining identity" +"2019-04-22 06:18:01.438 UTC [msp] DeserializeIdentity -> DEBU 3f5d Obtaining identity" +"2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f5e Obtaining identity" +"2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f5f Obtaining identity" +"2019-04-22 06:18:01.439 UTC [gossip.comm] Send -> DEBU 3f60 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f61 Obtaining identity" +"2019-04-22 06:18:01.439 UTC [msp] DeserializeIdentity -> DEBU 3f62 Obtaining identity" +"2019-04-22 06:18:01.439 UTC [gossip.comm] sendToEndpoint -> DEBU 3f63 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:17 Is Declaration true, Envelope: 72 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.439 UTC [gossip.comm] sendToEndpoint -> DEBU 3f64 Exiting" +"2019-04-22 06:18:01.570 UTC [gossip.comm] func1 -> DEBU 3f65 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.570 UTC [gossip.gossip] handleMessage -> DEBU 3f66 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.570 UTC [gossip.gossip] handleMessage -> DEBU 3f67 Exiting" +"2019-04-22 06:18:01.570 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f68 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.570 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f69 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:01.570 UTC [msp] DeserializeIdentity -> DEBU 3f6a Obtaining identity" +"2019-04-22 06:18:01.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:01.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f6c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:01.571 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f6d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:01.571 UTC [policies] Evaluate -> DEBU 3f6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:01.571 UTC [policies] Evaluate -> DEBU 3f6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:01.571 UTC [policies] Evaluate -> DEBU 3f70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:01.571 UTC [cauthdsl] func1 -> DEBU 3f71 0xc000574930 gate 1555913881571406700 evaluation starts" +"2019-04-22 06:18:01.571 UTC [cauthdsl] func2 -> DEBU 3f72 0xc000574930 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:01.571 UTC [cauthdsl] func2 -> DEBU 3f73 0xc000574930 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:01.571 UTC [cauthdsl] func2 -> DEBU 3f74 0xc000574930 principal matched by identity 0" +"2019-04-22 06:18:01.571 UTC [msp.identity] Verify -> DEBU 3f75 Verify: digest = 00000000 94 85 7d 61 18 5c d8 c7 c4 f5 0a b7 22 0b fc 1d |..}a.\......"...| +00000010 a4 59 43 a1 bb f8 a2 fc ad c2 0b d5 0c d4 a9 f6 |.YC.............|" +"2019-04-22 06:18:01.571 UTC [msp.identity] Verify -> DEBU 3f76 Verify: sig = 00000000 30 45 02 21 00 c9 49 d6 67 00 d3 66 53 72 a9 7c |0E.!..I.g..fSr.|| +00000010 77 d2 ee 94 98 cc 2d 3b f9 1f 5f 38 52 e1 74 b9 |w.....-;.._8R.t.| +00000020 d5 0f 98 3e 6c 02 20 5d 29 85 70 21 3d 71 e3 b7 |...>l. ]).p!=q..| +00000030 96 51 4e 70 b1 81 d3 a3 e9 1d f5 14 ee d6 7c 8c |.QNp..........|.| +00000040 6e d7 d3 5d 7d d0 56 |n..]}.V|" +"2019-04-22 06:18:01.592 UTC [gossip.gossip] handleMessage -> DEBU 3f77 Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.594 UTC [cauthdsl] func2 -> DEBU 3f78 0xc000574930 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:01.594 UTC [cauthdsl] func1 -> DEBU 3f79 0xc000574930 gate 1555913881571406700 evaluation succeeds" +"2019-04-22 06:18:01.596 UTC [policies] Evaluate -> DEBU 3f7a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:01.596 UTC [policies] Evaluate -> DEBU 3f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:01.596 UTC [policies] Evaluate -> DEBU 3f7c Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:01.599 UTC [gossip.comm] func1 -> DEBU 3f7d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.597 UTC [policies] Evaluate -> DEBU 3f7e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:01.600 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f7f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.600 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f80 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:01.601 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f81 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 " +"2019-04-22 06:18:01.601 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f82 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 " +"2019-04-22 06:18:01.602 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f83 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:52 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:01.602 UTC [gossip.discovery] learnExistingMembers -> DEBU 3f84 Exiting" +"2019-04-22 06:18:01.602 UTC [gossip.discovery] handleAliveMessage -> DEBU 3f85 Exiting" +"2019-04-22 06:18:01.602 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f86 Exiting" +"2019-04-22 06:18:01.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f87 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.603 UTC [gossip.gossip] handleMessage -> DEBU 3f88 Exiting" +"2019-04-22 06:18:01.603 UTC [gossip.gossip] handleMessage -> DEBU 3f89 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8a Exiting" +"2019-04-22 06:18:01.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f8c Exiting" +"2019-04-22 06:18:01.604 UTC [gossip.gossip] handleMessage -> DEBU 3f8d Exiting" +"2019-04-22 06:18:01.605 UTC [msp] DeserializeIdentity -> DEBU 3f8e Obtaining identity" +"2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f8f Obtaining identity" +"2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f90 Obtaining identity" +"2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f91 Obtaining identity" +"2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f92 Obtaining identity" +"2019-04-22 06:18:01.606 UTC [msp] DeserializeIdentity -> DEBU 3f93 Obtaining identity" +"2019-04-22 06:18:01.607 UTC [msp] DeserializeIdentity -> DEBU 3f94 Obtaining identity" +"2019-04-22 06:18:01.607 UTC [gossip.comm] Send -> DEBU 3f95 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:01.607 UTC [msp] DeserializeIdentity -> DEBU 3f96 Obtaining identity" +"2019-04-22 06:18:01.607 UTC [gossip.comm] Send -> DEBU 3f97 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:01.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f98 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.608 UTC [gossip.comm] sendToEndpoint -> DEBU 3f99 Exiting" +"2019-04-22 06:18:01.609 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:01.609 UTC [gossip.comm] sendToEndpoint -> DEBU 3f9b Exiting" +"2019-04-22 06:18:01.993 UTC [gossip.gossip] handleMessage -> DEBU 3f9c Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.994 UTC [gossip.gossip] handleMessage -> DEBU 3f9d Exiting" +"2019-04-22 06:18:01.994 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3f9e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:01.994 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3f9f Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:01.994 UTC [msp] DeserializeIdentity -> DEBU 3fa0 Obtaining identity" +"2019-04-22 06:18:01.995 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3fa1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:01.995 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:01.995 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3fa3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:01.995 UTC [policies] Evaluate -> DEBU 3fa4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:01.996 UTC [policies] Evaluate -> DEBU 3fa5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:01.996 UTC [policies] Evaluate -> DEBU 3fa6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:01.996 UTC [cauthdsl] func1 -> DEBU 3fa7 0xc0005452f0 gate 1555913881996449200 evaluation starts" +"2019-04-22 06:18:01.996 UTC [cauthdsl] func2 -> DEBU 3fa8 0xc0005452f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:01.996 UTC [cauthdsl] func2 -> DEBU 3fa9 0xc0005452f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:01.996 UTC [cauthdsl] func2 -> DEBU 3faa 0xc0005452f0 principal matched by identity 0" +"2019-04-22 06:18:01.997 UTC [msp.identity] Verify -> DEBU 3fab Verify: digest = 00000000 de ca 93 82 ab ad 75 c6 7c a7 74 04 47 64 cc f4 |......u.|.t.Gd..| +00000010 ee d1 51 ef 03 8b 1b c2 df ac ef ad df e6 d4 aa |..Q.............|" +"2019-04-22 06:18:01.997 UTC [msp.identity] Verify -> DEBU 3fac Verify: sig = 00000000 30 44 02 20 69 da 3f 03 b8 db 4d 02 87 12 02 b5 |0D. i.?...M.....| +00000010 40 b3 66 61 b3 14 89 1c ba 0a b5 04 1e f0 00 a1 |@.fa............| +00000020 07 a1 36 df 02 20 27 33 70 e3 ab 6a 6e 0e f1 48 |..6.. '3p..jn..H| +00000030 fe d9 1a f9 71 98 6b 68 82 8f 74 29 b3 12 73 0b |....q.kh..t)..s.| +00000040 9f 41 94 ab f5 10 |.A....|" +"2019-04-22 06:18:01.998 UTC [cauthdsl] func2 -> DEBU 3fad 0xc0005452f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:01.998 UTC [cauthdsl] func1 -> DEBU 3fae 0xc0005452f0 gate 1555913881996449200 evaluation succeeds" +"2019-04-22 06:18:01.998 UTC [policies] Evaluate -> DEBU 3faf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:02.004 UTC [policies] Evaluate -> DEBU 3fb0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:02.004 UTC [policies] Evaluate -> DEBU 3fb1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:02.004 UTC [policies] Evaluate -> DEBU 3fb2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:02.004 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fb3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.004 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb4 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:02.004 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb5 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 " +"2019-04-22 06:18:02.004 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb6 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 " +"2019-04-22 06:18:02.005 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb7 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:50 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:02.005 UTC [gossip.discovery] learnExistingMembers -> DEBU 3fb8 Exiting" +"2019-04-22 06:18:02.005 UTC [gossip.discovery] handleAliveMessage -> DEBU 3fb9 Exiting" +"2019-04-22 06:18:02.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fba Exiting" +"2019-04-22 06:18:02.005 UTC [gossip.comm] func1 -> DEBU 3fbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.005 UTC [gossip.gossip] handleMessage -> DEBU 3fbd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fbc Obtaining identity" +"2019-04-22 06:18:02.005 UTC [gossip.gossip] handleMessage -> DEBU 3fbe Exiting" +"2019-04-22 06:18:02.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fbf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fc0 Obtaining identity" +"2019-04-22 06:18:02.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fc1 Exiting" +"2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fc2 Obtaining identity" +"2019-04-22 06:18:02.005 UTC [msp] DeserializeIdentity -> DEBU 3fc3 Obtaining identity" +"2019-04-22 06:18:02.007 UTC [msp] DeserializeIdentity -> DEBU 3fc4 Obtaining identity" +"2019-04-22 06:18:02.008 UTC [msp] DeserializeIdentity -> DEBU 3fc5 Obtaining identity" +"2019-04-22 06:18:02.009 UTC [gossip.comm] Send -> DEBU 3fc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:02.010 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.010 UTC [gossip.comm] sendToEndpoint -> DEBU 3fc8 Exiting" +"2019-04-22 06:18:02.009 UTC [msp] DeserializeIdentity -> DEBU 3fc9 Obtaining identity" +"2019-04-22 06:18:02.012 UTC [msp] DeserializeIdentity -> DEBU 3fca Obtaining identity" +"2019-04-22 06:18:02.012 UTC [gossip.comm] Send -> DEBU 3fcb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:02.014 UTC [gossip.comm] sendToEndpoint -> DEBU 3fcd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.014 UTC [gossip.comm] sendToEndpoint -> DEBU 3fce Exiting" +"2019-04-22 06:18:02.013 UTC [gossip.comm] func1 -> DEBU 3fcc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.014 UTC [gossip.gossip] handleMessage -> DEBU 3fcf Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.014 UTC [gossip.gossip] handleMessage -> DEBU 3fd0 Exiting" +"2019-04-22 06:18:02.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fd1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fd2 Exiting" +"2019-04-22 06:18:02.868 UTC [gossip.pull] Hello -> DEBU 3fd3 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:02.868 UTC [gossip.comm] Send -> DEBU 3fd4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:02.869 UTC [gossip.pull] Hello -> DEBU 3fd5 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:18:02.869 UTC [gossip.comm] Send -> DEBU 3fd6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:02.869 UTC [gossip.pull] Hello -> DEBU 3fd7 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:18:02.869 UTC [gossip.comm] Send -> DEBU 3fd8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:02.869 UTC [gossip.comm] sendToEndpoint -> DEBU 3fd9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.870 UTC [gossip.comm] sendToEndpoint -> DEBU 3fda Exiting" +"2019-04-22 06:18:02.870 UTC [gossip.comm] sendToEndpoint -> DEBU 3fdb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.871 UTC [gossip.comm] sendToEndpoint -> DEBU 3fdc Exiting" +"2019-04-22 06:18:02.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3fdd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3fde Exiting" +"2019-04-22 06:18:02.874 UTC [gossip.gossip] handleMessage -> DEBU 3fdf Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15281605375006860163 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.874 UTC [gossip.pull] HandleMessage -> DEBU 3fe0 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 15281605375006860163 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.875 UTC [gossip.gossip] handleMessage -> DEBU 3fe1 Exiting" +"2019-04-22 06:18:02.875 UTC [gossip.comm] func1 -> DEBU 3fe2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18201895390485576267 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.876 UTC [gossip.gossip] handleMessage -> DEBU 3fe3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18201895390485576267 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.876 UTC [gossip.pull] HandleMessage -> DEBU 3fe4 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 18201895390485576267 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.876 UTC [gossip.gossip] handleMessage -> DEBU 3fe5 Exiting" +"2019-04-22 06:18:02.877 UTC [gossip.comm] func1 -> DEBU 3fe6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 672223985744247501 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.878 UTC [gossip.gossip] handleMessage -> DEBU 3fe7 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 672223985744247501 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.878 UTC [gossip.pull] HandleMessage -> DEBU 3fe8 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 672223985744247501 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.879 UTC [gossip.gossip] handleMessage -> DEBU 3fe9 Exiting" +"2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3fea Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151033 " +"2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3feb Sign: digest: 97865AB1EAFDD2593CA477AD0D241EA8CABC489E02944F79F7472DE9AA8B051D " +"2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3fec Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:02.927 UTC [msp.identity] Sign -> DEBU 3fed Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:02.928 UTC [gossip.comm] Send -> DEBU 3fee Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:02.928 UTC [gossip.comm] sendToEndpoint -> DEBU 3ff0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.928 UTC [gossip.comm] sendToEndpoint -> DEBU 3ff1 Exiting" +"2019-04-22 06:18:02.928 UTC [msp] DeserializeIdentity -> DEBU 3fef Obtaining identity" +"2019-04-22 06:18:02.931 UTC [gossip.comm] func1 -> DEBU 3ff2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.931 UTC [gossip.gossip] handleMessage -> DEBU 3ff3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.931 UTC [gossip.gossip] handleMessage -> DEBU 3ff4 Exiting" +"2019-04-22 06:18:02.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ff5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ff6 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:02.931 UTC [gossip.comm] Send -> DEBU 3ff7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:02.932 UTC [msp.identity] Verify -> DEBU 3ff8 Verify: digest = 00000000 97 86 5a b1 ea fd d2 59 3c a4 77 ad 0d 24 1e a8 |..Z....Y<.w..$..| +00000010 ca bc 48 9e 02 94 4f 79 f7 47 2d e9 aa 8b 05 1d |..H...Oy.G-.....|" +"2019-04-22 06:18:02.932 UTC [msp] DeserializeIdentity -> DEBU 3ff9 Obtaining identity" +"2019-04-22 06:18:02.932 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.933 UTC [gossip.comm] sendToEndpoint -> DEBU 3ffd Exiting" +"2019-04-22 06:18:02.932 UTC [gossip.comm] Send -> DEBU 3ffc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:02.932 UTC [msp.identity] Verify -> DEBU 3ffa Verify: sig = 00000000 30 44 02 20 68 19 e0 06 e5 fc 65 33 56 66 50 a2 |0D. h.....e3VfP.| +00000010 1a ac 7e 74 e5 30 32 95 25 a3 70 e0 70 36 52 88 |..~t.02.%.p.p6R.| +00000020 37 b3 b1 82 02 20 2d bb 1f d4 da f3 c5 ac 27 19 |7.... -.......'.| +00000030 4e e4 39 59 77 7c c9 86 1c 68 8e 21 fc 99 78 3e |N.9Yw|...h.!..x>| +00000040 b3 5f 61 38 cf b7 |._a8..|" +"2019-04-22 06:18:02.938 UTC [msp.identity] Verify -> DEBU 3fff Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:18:02.938 UTC [msp.identity] Verify -> DEBU 4000 Verify: sig = 00000000 30 44 02 20 7a d1 c6 ec 6f 3b 71 a8 55 f0 c0 ba |0D. z...o;q.U...| +00000010 1f 1a c2 c7 e2 c8 df 17 89 04 e6 ee 65 3b 80 3b |............e;.;| +00000020 3d ff 20 c3 02 20 47 6f 29 b3 cf 79 20 5e bf 07 |=. .. Go)..y ^..| +00000030 4a 20 51 48 9d 8c fe 5c 9d 82 c5 31 c2 89 cd 64 |J QH...\...1...d| +00000040 21 25 4b 3a ab 6b |!%K:.k|" +"2019-04-22 06:18:02.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4001 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:02.938 UTC [gossip.discovery] isSentByMe -> DEBU 4002 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:02.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4003 Exiting" +"2019-04-22 06:18:02.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4004 Exiting" +"2019-04-22 06:18:02.936 UTC [gossip.gossip] handleMessage -> DEBU 3ffe Entering, 192.168.224.8:55156 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.939 UTC [gossip.gossip] handleMessage -> DEBU 4005 Exiting" +"2019-04-22 06:18:02.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4006 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.940 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4007 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:02.940 UTC [msp.identity] Verify -> DEBU 4008 Verify: digest = 00000000 97 86 5a b1 ea fd d2 59 3c a4 77 ad 0d 24 1e a8 |..Z....Y<.w..$..| +00000010 ca bc 48 9e 02 94 4f 79 f7 47 2d e9 aa 8b 05 1d |..H...Oy.G-.....|" +"2019-04-22 06:18:02.940 UTC [msp.identity] Verify -> DEBU 4009 Verify: sig = 00000000 30 44 02 20 68 19 e0 06 e5 fc 65 33 56 66 50 a2 |0D. h.....e3VfP.| +00000010 1a ac 7e 74 e5 30 32 95 25 a3 70 e0 70 36 52 88 |..~t.02.%.p.p6R.| +00000020 37 b3 b1 82 02 20 2d bb 1f d4 da f3 c5 ac 27 19 |7.... -.......'.| +00000030 4e e4 39 59 77 7c c9 86 1c 68 8e 21 fc 99 78 3e |N.9Yw|...h.!..x>| +00000040 b3 5f 61 38 cf b7 |._a8..|" +"2019-04-22 06:18:02.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 400a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.941 UTC [gossip.discovery] isSentByMe -> DEBU 400b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 400c Exiting" +"2019-04-22 06:18:02.941 UTC [gossip.discovery] handleMsgFromComm -> DEBU 400d Exiting" +"2019-04-22 06:18:02.941 UTC [gossip.comm] sendToEndpoint -> DEBU 400e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.942 UTC [gossip.comm] sendToEndpoint -> DEBU 400f Exiting" +"2019-04-22 06:18:02.947 UTC [gossip.comm] func1 -> DEBU 4010 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.947 UTC [gossip.gossip] handleMessage -> DEBU 4011 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.948 UTC [gossip.gossip] handleMessage -> DEBU 4012 Exiting" +"2019-04-22 06:18:02.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4013 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:02.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4014 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:02.948 UTC [msp.identity] Verify -> DEBU 4015 Verify: digest = 00000000 97 86 5a b1 ea fd d2 59 3c a4 77 ad 0d 24 1e a8 |..Z....Y<.w..$..| +00000010 ca bc 48 9e 02 94 4f 79 f7 47 2d e9 aa 8b 05 1d |..H...Oy.G-.....|" +"2019-04-22 06:18:02.949 UTC [msp.identity] Verify -> DEBU 4016 Verify: sig = 00000000 30 44 02 20 68 19 e0 06 e5 fc 65 33 56 66 50 a2 |0D. h.....e3VfP.| +00000010 1a ac 7e 74 e5 30 32 95 25 a3 70 e0 70 36 52 88 |..~t.02.%.p.p6R.| +00000020 37 b3 b1 82 02 20 2d bb 1f d4 da f3 c5 ac 27 19 |7.... -.......'.| +00000030 4e e4 39 59 77 7c c9 86 1c 68 8e 21 fc 99 78 3e |N.9Yw|...h.!..x>| +00000040 b3 5f 61 38 cf b7 |._a8..|" +"2019-04-22 06:18:02.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4017 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.949 UTC [gossip.discovery] isSentByMe -> DEBU 4018 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:02.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4019 Exiting" +"2019-04-22 06:18:02.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 401a Exiting" +"2019-04-22 06:18:03.109 UTC [gossip.comm] func1 -> DEBU 401b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.110 UTC [gossip.gossip] handleMessage -> DEBU 401c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.110 UTC [gossip.pull] HandleMessage -> DEBU 401d GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.112 UTC [gossip.pull] SendDigest -> DEBU 401e Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:03.112 UTC [gossip.gossip] handleMessage -> DEBU 401f Exiting" +"2019-04-22 06:18:03.184 UTC [gossip.comm] func1 -> DEBU 4020 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.184 UTC [gossip.gossip] handleMessage -> DEBU 4021 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.185 UTC [gossip.gossip] handleMessage -> DEBU 4022 Exiting" +"2019-04-22 06:18:03.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4023 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.185 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4024 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4025 Verify: digest = 00000000 f9 21 e0 ca 33 86 0e 66 d4 7f 3e b2 28 ee 93 93 |.!..3..f..>.(...| +00000010 6a a4 91 42 75 0c c1 8f 54 07 6f 56 d6 6f 38 9f |j..Bu...T.oV.o8.|" +"2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4026 Verify: sig = 00000000 30 45 02 21 00 c5 f3 35 28 9a 72 57 1f 98 e3 62 |0E.!...5(.rW...b| +00000010 c4 5f 04 44 1d d4 ae 90 ee fe cc af 7f 8c 6f f4 |._.D..........o.| +00000020 3b 59 0a c0 86 02 20 33 a5 2c 24 a9 24 c6 ac 41 |;Y.... 3.,$.$..A| +00000030 c0 0c 49 09 50 3a f6 b5 fa 06 38 64 76 63 af 81 |..I.P:....8dvc..| +00000040 0e 7b 8e 99 f3 03 cc |.{.....|" +"2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4027 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:03.185 UTC [msp.identity] Verify -> DEBU 4028 Verify: sig = 00000000 30 44 02 20 63 4c b9 fb 57 01 f7 5d 57 7d 10 18 |0D. cL..W..]W}..| +00000010 67 b0 0d 8b a0 d2 a6 b0 4d cf 9b bc 12 77 1c 4e |g.......M....w.N| +00000020 3d f0 65 09 02 20 7e 46 a2 33 a1 e6 ff d7 d8 78 |=.e.. ~F.3.....x| +00000030 39 f8 1a 28 2a b0 25 cd b3 77 ce 9d 6a 5e 6c c4 |9..(*.%..w..j^l.| +00000040 ba 4f b3 c6 a7 61 |.O...a|" +"2019-04-22 06:18:03.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 4029 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402b updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 " +"2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 " +"2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:54 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:03.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 402e Exiting" +"2019-04-22 06:18:03.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 402f Exiting" +"2019-04-22 06:18:03.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4030 Exiting" +"2019-04-22 06:18:03.186 UTC [gossip.discovery] sendMemResponse -> DEBU 4031 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:03.186 UTC [msp] DeserializeIdentity -> DEBU 4032 Obtaining identity" +"2019-04-22 06:18:03.186 UTC [msp] DeserializeIdentity -> DEBU 4033 Obtaining identity" +"2019-04-22 06:18:03.186 UTC [gossip.comm] Send -> DEBU 4034 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:03.186 UTC [gossip.discovery] sendMemResponse -> DEBU 4035 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:18:03.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4036 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4037 Exiting" +"2019-04-22 06:18:03.428 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4038 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.429 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 4039 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.429 UTC [policies] Evaluate -> DEBU 403a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-04-22 06:18:03.429 UTC [policies] Evaluate -> DEBU 403b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.429 UTC [policies] Evaluate -> DEBU 403c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-04-22 06:18:03.430 UTC [cauthdsl] func1 -> DEBU 403d 0xc0003e4410 gate 1555913883430025000 evaluation starts" +"2019-04-22 06:18:03.430 UTC [cauthdsl] func2 -> DEBU 403e 0xc0003e4410 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.430 UTC [cauthdsl] func2 -> DEBU 403f 0xc0003e4410 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.430 UTC [cauthdsl] func2 -> DEBU 4040 0xc0003e4410 principal matched by identity 0" +"2019-04-22 06:18:03.430 UTC [msp.identity] Verify -> DEBU 4041 Verify: digest = 00000000 70 bf 91 5b 60 50 5e dc 48 0e 06 71 12 b3 b7 5f |p..[`P^.H..q..._| +00000010 eb 25 35 cb b0 e0 83 bd 69 77 de ac aa cd d4 84 |.%5.....iw......|" +"2019-04-22 06:18:03.431 UTC [msp.identity] Verify -> DEBU 4042 Verify: sig = 00000000 30 45 02 21 00 a7 5e 3c 18 2b 26 f2 53 65 6c 07 |0E.!..^<.+&.Sel.| +00000010 8f 32 67 f9 2b c5 f3 fa 84 90 48 c8 23 e5 a1 de |.2g.+.....H.#...| +00000020 cb 74 ed b2 a4 02 20 58 fb 7e f5 92 1c 9c 27 87 |.t.... X.~....'.| +00000030 db 68 9e be c7 98 2b 3b cd 31 97 e3 0b d6 78 75 |.h....+;.1....xu| +00000040 1d 58 8e 3c 89 21 bf |.X.<.!.|" +"2019-04-22 06:18:03.431 UTC [cauthdsl] func2 -> DEBU 4043 0xc0003e4410 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.431 UTC [cauthdsl] func1 -> DEBU 4044 0xc0003e4410 gate 1555913883430025000 evaluation succeeds" +"2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4045 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4046 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4047 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:18:03.432 UTC [policies] Evaluate -> DEBU 4048 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-04-22 06:18:03.433 UTC [blocksProvider] DeliverBlocks -> DEBU 4049 [businesschannel] Adding payload to local buffer, blockNum = [9]" +"2019-04-22 06:18:03.433 UTC [gossip.state] addPayload -> DEBU 404a [businesschannel] Adding payload to local buffer, blockNum = [9]" +"2019-04-22 06:18:03.433 UTC [gossip.state] addPayload -> DEBU 404b Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-04-22 06:18:03.433 UTC [blocksProvider] DeliverBlocks -> DEBU 404d [businesschannel] Gossiping block [9], peers number [3]" +"2019-04-22 06:18:03.433 UTC [gossip.state] deliverPayloads -> DEBU 404c [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [9]" +"2019-04-22 06:18:03.434 UTC [gossip.state] deliverPayloads -> DEBU 404f [businesschannel] Transferring block [9] with 1 transaction(s) to the ledger" +"2019-04-22 06:18:03.434 UTC [gossip.channel] AddToMsgStore -> DEBU 404e Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35013 bytes, seq: 9}, Envelope: 35046 bytes, Signature: 0 bytes to the block puller" +"2019-04-22 06:18:03.434 UTC [gossip.pull] Add -> DEBU 4051 Added 9, total items: 9" +"2019-04-22 06:18:03.434 UTC [gossip.privdata] StoreBlock -> INFO 4050 [businesschannel] Received block [9] from buffer" +"2019-04-22 06:18:03.435 UTC [gossip.privdata] StoreBlock -> DEBU 4052 [businesschannel] Validating block [9]" +"2019-04-22 06:18:03.435 UTC [committer.txvalidator] Validate -> DEBU 4053 [businesschannel] START Block Validation for block [9]" +"2019-04-22 06:18:03.436 UTC [committer.txvalidator] Validate -> DEBU 4054 expecting 1 block validation responses" +"2019-04-22 06:18:03.436 UTC [committer.txvalidator] validateTx -> DEBU 4055 [businesschannel] validateTx starts for block 0xc0032a01c0 env 0xc0024cb770 txn 0" +"2019-04-22 06:18:03.436 UTC [protoutils] ValidateTransaction -> DEBU 4056 ValidateTransactionEnvelope starts for envelope 0xc0024cb770" +"2019-04-22 06:18:03.436 UTC [protoutils] ValidateTransaction -> DEBU 4057 Header is channel_header:"\010\001\032\006\010\233\271\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\215\272\257bT\027\013\3300\221\207S\275\344\3739\373\302O\2525C3\232" " +"2019-04-22 06:18:03.436 UTC [protoutils] validateChannelHeader -> DEBU 4058 validateChannelHeader info: header type 1" +"2019-04-22 06:18:03.436 UTC [protoutils] checkSignatureFromCreator -> DEBU 4059 begin" +"2019-04-22 06:18:03.437 UTC [msp] GetManagerForChain -> DEBU 405a Returning existing manager for channel 'businesschannel'" +"2019-04-22 06:18:03.437 UTC [protoutils] checkSignatureFromCreator -> DEBU 405b creator is &{OrdererMSP c580d0f14677403edd2890f7ff8864468aef0d0d1256055eaad8f5186d6dc77e}" +"2019-04-22 06:18:03.437 UTC [msp] Validate -> DEBU 405c MSP OrdererMSP validating identity" +"2019-04-22 06:18:03.438 UTC [protoutils] checkSignatureFromCreator -> DEBU 405d creator is valid" +"2019-04-22 06:18:03.438 UTC [msp.identity] Verify -> DEBU 405e Verify: digest = 00000000 47 27 60 5d ea cc 66 7f 41 e9 38 85 27 30 21 1e |G'`]..f.A.8.'0!.| +00000010 20 b5 e0 bd 4b 22 af 9e 91 6e f8 54 70 c3 75 3c | ...K"...n.Tp.u<|" +"2019-04-22 06:18:03.439 UTC [msp.identity] Verify -> DEBU 405f Verify: sig = 00000000 30 44 02 20 31 5b e1 29 5d be 8a 00 a9 b9 6f 8b |0D. 1[.)].....o.| +00000010 06 fd 2d 3d 49 13 e4 86 ff b1 e3 7b bb 11 2f a7 |..-=I......{../.| +00000020 e8 4c 2c 00 02 20 2b 39 58 25 37 44 b6 da 79 71 |.L,.. +9X%7D..yq| +00000030 55 e6 d5 98 ff 2b be b5 48 14 67 53 8a 79 75 1d |U....+..H.gS.yu.| +00000040 aa ab fd c0 f2 f7 |......|" +"2019-04-22 06:18:03.439 UTC [protoutils] checkSignatureFromCreator -> DEBU 4060 exits successfully" +"2019-04-22 06:18:03.439 UTC [protoutils] validateConfigTransaction -> DEBU 4061 validateConfigTransaction starts for data 0xc003dbc000, header channel_header:"\010\001\032\006\010\233\271\365\345\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nQQ==\n-----END CERTIFICATE-----\n\022\030\215\272\257bT\027\013\3300\221\207S\275\344\3739\373\302O\2525C3\232" " +"2019-04-22 06:18:03.439 UTC [committer.txvalidator] validateTx -> DEBU 4062 Transaction is for channel businesschannel" +"2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4063 Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4064 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4065 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4066 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.440 UTC [common.configtx] addToMap -> DEBU 4067 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.441 UTC [common.configtx] addToMap -> DEBU 4068 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.441 UTC [common.configtx] addToMap -> DEBU 4069 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.441 UTC [common.configtx] addToMap -> DEBU 406a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406b Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406c Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406d Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406e Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 406f Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4070 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4071 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4072 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4073 Obtaining identity" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4074 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4075 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4076 Obtaining identity" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4077 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4078 Obtaining identity" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4079 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407a Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 407b Obtaining identity" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407c Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407d Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.442 UTC [gossip.comm] Send -> DEBU 407e Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35013 bytes, seq: 9}, Envelope: 35046 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 407f Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4080 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4081 Obtaining identity" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4082 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.442 UTC [msp] DeserializeIdentity -> DEBU 4083 Obtaining identity" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4084 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.442 UTC [common.configtx] addToMap -> DEBU 4085 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.442 UTC [gossip.comm] sendToEndpoint -> DEBU 4086 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 35013 bytes, seq: 9}, Envelope: 35046 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.442 UTC [common.configtx] verifyDeltaSet -> DEBU 4087 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.442 UTC [gossip.comm] sendToEndpoint -> DEBU 4088 Exiting" +"2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 4089 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 408a Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 408b Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.443 UTC [common.configtx] verifyDeltaSet -> DEBU 408c Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.456 UTC [common.configtx] verifyDeltaSet -> DEBU 408d Processing change to key: [Group] /Channel/Application" +"2019-04-22 06:18:03.457 UTC [common.configtx] policyForItem -> DEBU 408e Getting policy for item Application with mod_policy Admins" +"2019-04-22 06:18:03.458 UTC [policies] Manager -> DEBU 408f Manager Channel looking up path []" +"2019-04-22 06:18:03.458 UTC [policies] Manager -> DEBU 4090 Manager Channel has managers Application" +"2019-04-22 06:18:03.459 UTC [policies] Manager -> DEBU 4091 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.460 UTC [policies] Manager -> DEBU 4092 Manager Channel looking up path [Application]" +"2019-04-22 06:18:03.460 UTC [policies] Manager -> DEBU 4093 Manager Channel has managers Application" +"2019-04-22 06:18:03.461 UTC [policies] Manager -> DEBU 4094 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.462 UTC [policies] Manager -> DEBU 4095 Manager Channel/Application looking up path []" +"2019-04-22 06:18:03.462 UTC [policies] Manager -> DEBU 4096 Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:18:03.462 UTC [policies] Manager -> DEBU 4097 Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:18:03.463 UTC [policies] Evaluate -> DEBU 4098 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-04-22 06:18:03.463 UTC [policies] Evaluate -> DEBU 4099 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.463 UTC [policies] Evaluate -> DEBU 409a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-04-22 06:18:03.464 UTC [cauthdsl] deduplicate -> WARN 409b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:18:03.465 UTC [cauthdsl] func1 -> DEBU 409c 0xc00236c270 gate 1555913883465001600 evaluation starts" +"2019-04-22 06:18:03.466 UTC [cauthdsl] func2 -> DEBU 409d 0xc00236c270 signed by 0 principal evaluation starts (used [false false false])" +"2019-04-22 06:18:03.466 UTC [cauthdsl] func2 -> DEBU 409e 0xc00236c270 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.467 UTC [cauthdsl] func2 -> DEBU 409f 0xc00236c270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:18:03.468 UTC [cauthdsl] func2 -> DEBU 40a0 0xc00236c270 processing identity 1 with bytes of 10c48e0" +"2019-04-22 06:18:03.469 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40a1 Checking if identity satisfies ADMIN role for Org2MSP" +"2019-04-22 06:18:03.470 UTC [cauthdsl] func2 -> DEBU 40a2 0xc00236c270 principal matched by identity 1" +"2019-04-22 06:18:03.473 UTC [msp.identity] Verify -> DEBU 40a3 Verify: digest = 00000000 0c fd 1f e5 b1 9b db 02 57 c4 82 57 bc d0 0c 4b |........W..W...K| +00000010 97 87 a9 3b ca 23 a8 c2 03 3c f3 1a f8 a3 07 57 |...;.#...<.....W|" +"2019-04-22 06:18:03.473 UTC [msp.identity] Verify -> DEBU 40a4 Verify: sig = 00000000 30 45 02 21 00 d6 e0 8c 37 df 62 cb 69 f9 ca 73 |0E.!....7.b.i..s| +00000010 04 64 61 bf 99 26 93 ca 3d 45 f6 6f 0f 3d b9 61 |.da..&..=E.o.=.a| +00000020 7a af 77 b9 12 02 20 4a 16 64 bd 85 6e 43 d5 e7 |z.w... J.d..nC..| +00000030 28 07 12 4c 58 19 bf 43 c2 12 88 2a bf 28 75 09 |(..LX..C...*.(u.| +00000040 a5 e6 fa 2b 77 6d e3 |...+wm.|" +"2019-04-22 06:18:03.475 UTC [cauthdsl] func2 -> DEBU 40a5 0xc00236c270 principal evaluation succeeds for identity 1" +"2019-04-22 06:18:03.476 UTC [cauthdsl] func1 -> DEBU 40a6 0xc00236c270 gate 1555913883465001600 evaluation succeeds" +"2019-04-22 06:18:03.476 UTC [policies] Evaluate -> DEBU 40a7 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.476 UTC [policies] Evaluate -> DEBU 40a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.477 UTC [policies] Evaluate -> DEBU 40a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-04-22 06:18:03.478 UTC [cauthdsl] deduplicate -> WARN 40aa De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:18:03.478 UTC [cauthdsl] func1 -> DEBU 40ab 0xc00236cb10 gate 1555913883478586700 evaluation starts" +"2019-04-22 06:18:03.478 UTC [cauthdsl] func2 -> DEBU 40ac 0xc00236cb10 signed by 0 principal evaluation starts (used [false false false])" +"2019-04-22 06:18:03.478 UTC [cauthdsl] func2 -> DEBU 40ad 0xc00236cb10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.479 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40ae Checking if identity satisfies ADMIN role for Org1MSP" +"2019-04-22 06:18:03.479 UTC [cauthdsl] func2 -> DEBU 40af 0xc00236cb10 principal matched by identity 0" +"2019-04-22 06:18:03.479 UTC [msp.identity] Verify -> DEBU 40b0 Verify: digest = 00000000 8e 73 57 0e b7 c7 1b 71 9b 02 5f bd 37 50 74 25 |.sW....q.._.7Pt%| +00000010 06 6a 52 6c ef f6 86 21 8c 54 e2 73 5f 3d 4d 90 |.jRl...!.T.s_=M.|" +"2019-04-22 06:18:03.479 UTC [msp.identity] Verify -> DEBU 40b1 Verify: sig = 00000000 30 45 02 21 00 f2 fa 21 f5 b5 4e 2e de a8 55 bd |0E.!...!..N...U.| +00000010 a8 cc 6e 98 b5 33 37 87 be c9 27 42 cf 21 2b 5f |..n..37...'B.!+_| +00000020 54 69 eb ed 1a 02 20 0b 2a d2 c7 e1 11 a3 64 cc |Ti.... .*.....d.| +00000030 0e 42 62 c5 f0 de 23 74 4d 0c 1a 46 43 50 06 27 |.Bb...#tM..FCP.'| +00000040 0b 25 bf 2c 59 22 e1 |.%.,Y".|" +"2019-04-22 06:18:03.480 UTC [cauthdsl] func2 -> DEBU 40b2 0xc00236cb10 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.480 UTC [cauthdsl] func1 -> DEBU 40b3 0xc00236cb10 gate 1555913883478586700 evaluation succeeds" +"2019-04-22 06:18:03.481 UTC [policies] Evaluate -> DEBU 40b4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.482 UTC [policies] Evaluate -> DEBU 40b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.482 UTC [policies] Evaluate -> DEBU 40b6 Signature set satisfies policy /Channel/Application/Admins" +"2019-04-22 06:18:03.482 UTC [policies] Evaluate -> DEBU 40b7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-04-22 06:18:03.483 UTC [common.configtx] verifyDeltaSet -> DEBU 40b8 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.483 UTC [common.configtx] recurseConfigMap -> DEBU 40b9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40ba Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40bb Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40bc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.484 UTC [common.configtx] recurseConfigMap -> DEBU 40bd Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.489 UTC [common.configtx] recurseConfigMap -> DEBU 40be Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40bf Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40c0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.494 UTC [common.configtx] recurseConfigMap -> DEBU 40c2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.495 UTC [common.configtx] recurseConfigMap -> DEBU 40c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.495 UTC [common.configtx] recurseConfigMap -> DEBU 40c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.495 UTC [common.configtx] recurseConfigMap -> DEBU 40c5 Setting policy for key Admins to " +"2019-04-22 06:18:03.496 UTC [common.configtx] recurseConfigMap -> DEBU 40c6 Setting policy for key Endorsement to " +"2019-04-22 06:18:03.498 UTC [common.configtx] recurseConfigMap -> DEBU 40c7 Setting policy for key LifecycleEndorsement to " +"2019-04-22 06:18:03.498 UTC [common.configtx] recurseConfigMap -> DEBU 40c8 Setting policy for key Readers to " +"2019-04-22 06:18:03.498 UTC [common.configtx] recurseConfigMap -> DEBU 40c9 Setting policy for key Writers to " +"2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40ca Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40cb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40cc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40cd Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.499 UTC [common.configtx] recurseConfigMap -> DEBU 40ce Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40cf Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40d0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40d1 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.500 UTC [common.configtx] recurseConfigMap -> DEBU 40d2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.501 UTC [common.configtx] recurseConfigMap -> DEBU 40d3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-04-22 06:18:03.501 UTC [common.channelconfig] NewStandardValues -> DEBU 40d4 Initializing protos for *channelconfig.ChannelProtos" +"2019-04-22 06:18:03.501 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d5 Processing field: HashingAlgorithm" +"2019-04-22 06:18:03.502 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d6 Processing field: BlockDataHashingStructure" +"2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d7 Processing field: OrdererAddresses" +"2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d8 Processing field: Consortium" +"2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40d9 Processing field: Capabilities" +"2019-04-22 06:18:03.506 UTC [common.channelconfig] NewStandardValues -> DEBU 40da Initializing protos for *channelconfig.ApplicationProtos" +"2019-04-22 06:18:03.506 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40db Processing field: ACLs" +"2019-04-22 06:18:03.507 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40dc Processing field: Capabilities" +"2019-04-22 06:18:03.507 UTC [common.channelconfig] NewStandardValues -> DEBU 40dd Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.508 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40de Processing field: AnchorPeers" +"2019-04-22 06:18:03.508 UTC [common.channelconfig] NewStandardValues -> DEBU 40df Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.508 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40e0 Processing field: MSP" +"2019-04-22 06:18:03.508 UTC [common.channelconfig] Validate -> DEBU 40e1 Anchor peers for org Org3MSP are " +"2019-04-22 06:18:03.509 UTC [common.channelconfig] validateMSP -> DEBU 40e2 Setting up MSP for org Org3MSP" +"2019-04-22 06:18:03.509 UTC [msp] newBccspMsp -> DEBU 40e3 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.509 UTC [msp] New -> DEBU 40e4 Creating Cache-MSP instance" +"2019-04-22 06:18:03.510 UTC [msp] Setup -> DEBU 40e5 Setting up MSP instance Org3MSP" +"2019-04-22 06:18:03.510 UTC [msp.identity] newIdentity -> DEBU 40e6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRAIzEUYfVhX4pwcoSKxG0rb8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BA8PguROJcS9ooQ44XvuDFGkfjkdPGitYi8zAkjhlPI4h6M/WS9pF3eWwWvoXLSB +6GgTzPSGbOl9xk9zEL3n0i2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +rzSDFFjpxG4XVewWBYGjp2WyuPfxkk/jwOtoOCjnI8cwCgYIKoZIzj0EAwIDSAAw +RQIhAKQyLwxntvTAaobU7cCehGdysKZo15XBRPmTpIFbvzB1AiBdGr8c3/8T+dpc +CB8UKt+GsH3/7ADrNo7ofOg7BzMonw== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.511 UTC [msp.identity] newIdentity -> DEBU 40e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQGovioRwX4utvc/NH+gumozAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR9VvswPijr +zVN4Vnt8rdK8y7NPgDfAxy8Tw518rJvyMEtMH7SETlWGCHpZdiTSw35k/payG/ky +u8IdQ6AGB7Oeo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCvNIMUWOnEbhdV7BYFgaOnZbK49/GST+PA62g4KOcjxzAKBggqhkjO +PQQDAgNHADBEAiBWkXSdWfZkjh6ErHk/nNccGg/duvpx6ywwbNnQFtSZ8wIgftSQ +R32ma9AwrFiUefXWfU7b1w9mE3/QVVrwSdV/5pI= +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.512 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40e8 Checking if identity satisfies role [CLIENT] for Org3MSP" +"2019-04-22 06:18:03.513 UTC [msp] Validate -> DEBU 40e9 MSP Org3MSP validating identity" +"2019-04-22 06:18:03.519 UTC [msp] getCertificationChain -> DEBU 40ea MSP Org3MSP getting certification chain" +"2019-04-22 06:18:03.523 UTC [msp] hasOURole -> DEBU 40eb MSP Org3MSP checking if the identity is a client" +"2019-04-22 06:18:03.524 UTC [msp] getCertificationChain -> DEBU 40ec MSP Org3MSP getting certification chain" +"2019-04-22 06:18:03.526 UTC [common.channelconfig] NewStandardValues -> DEBU 40ed Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.529 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40ee Processing field: AnchorPeers" +"2019-04-22 06:18:03.530 UTC [common.channelconfig] NewStandardValues -> DEBU 40ef Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.530 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40f0 Processing field: MSP" +"2019-04-22 06:18:03.531 UTC [common.channelconfig] Validate -> DEBU 40f1 Anchor peers for org Org1MSP are anchor_peers: " +"2019-04-22 06:18:03.533 UTC [common.channelconfig] validateMSP -> DEBU 40f2 Setting up MSP for org Org1MSP" +"2019-04-22 06:18:03.533 UTC [msp] newBccspMsp -> DEBU 40f3 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.534 UTC [msp] New -> DEBU 40f4 Creating Cache-MSP instance" +"2019-04-22 06:18:03.535 UTC [msp] Setup -> DEBU 40f5 Setting up MSP instance Org1MSP" +"2019-04-22 06:18:03.535 UTC [msp.identity] newIdentity -> DEBU 40f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfigAwIBAgIRAKvGA3NI0AMFP5qFvX9CXmUwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB/+jMOpv7ZQI/5XRuFKES4Gurg05Qe4P5azubLevNPmqTrT0OazbCIb7ZyJHg/Y +aZVLXR1TWLGXhIGT2KcbsVyjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +a7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0EAwIDRwAw +RAIgbvS2jiN9B1rSHBu1sneDMth96sJhNY2NB8kpglDZzBoCIFtnbp+5TXoqFbl2 +N0qzbu085qQXfAXf7yy4VoSHr1A6 +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.537 UTC [msp.identity] newIdentity -> DEBU 40f7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.539 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 40f8 Checking if identity satisfies role [CLIENT] for Org1MSP" +"2019-04-22 06:18:03.539 UTC [msp] Validate -> DEBU 40f9 MSP Org1MSP validating identity" +"2019-04-22 06:18:03.549 UTC [msp] getCertificationChain -> DEBU 40fa MSP Org1MSP getting certification chain" +"2019-04-22 06:18:03.550 UTC [msp] hasOURole -> DEBU 40fb MSP Org1MSP checking if the identity is a client" +"2019-04-22 06:18:03.550 UTC [msp] getCertificationChain -> DEBU 40fc MSP Org1MSP getting certification chain" +"2019-04-22 06:18:03.551 UTC [common.channelconfig] NewStandardValues -> DEBU 40fd Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-04-22 06:18:03.551 UTC [common.channelconfig] initializeProtosStruct -> DEBU 40fe Processing field: AnchorPeers" +"2019-04-22 06:18:03.551 UTC [common.channelconfig] NewStandardValues -> DEBU 40ff Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.552 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4100 Processing field: MSP" +"2019-04-22 06:18:03.552 UTC [common.channelconfig] Validate -> DEBU 4101 Anchor peers for org Org2MSP are anchor_peers: " +"2019-04-22 06:18:03.552 UTC [common.channelconfig] validateMSP -> DEBU 4102 Setting up MSP for org Org2MSP" +"2019-04-22 06:18:03.552 UTC [comm.grpc.server] 1 -> INFO 4104 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.55Z grpc.peer_address=192.168.224.7:48424 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=292.1µs +"2019-04-22 06:18:03.553 UTC [msp] newBccspMsp -> DEBU 4103 Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.553 UTC [msp] New -> DEBU 4105 Creating Cache-MSP instance" +"2019-04-22 06:18:03.553 UTC [msp] Setup -> DEBU 4106 Setting up MSP instance Org2MSP" +"2019-04-22 06:18:03.554 UTC [msp.identity] newIdentity -> DEBU 4107 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUjCCAfigAwIBAgIRANS8zUTEjtnhimBTIZlGr84wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBzMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UE +AxMTY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA +BB2s+q6yNxepSmP1+22uosXG0DZVRUdyNN9EqbI33zJCI0jBxGiAvTb0e1DMB54O +A1CkA/CA3D/3KjweQ6sgwKGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAU +BggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQg +fBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0EAwIDSAAw +RQIhAPMo1BFmPdXHutNCfWTIC7kp+1LbXR2kEWg98c3ErO9LAiBONGAS0dtcravv +JL+uRo1TQ/8FNt95ZbF7TOHJeXqH7w== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.555 UTC [msp.identity] newIdentity -> DEBU 4108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRANEvvPCWgB32duYr7zTv9yEwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEiFrJBvRb +r69gJNoMejMrsSskUo5Bsu7ubqVlltTh5UH8+O0s8E1U97necxvKiukaTkfwMZDk +RJGhU1M9U8R0nqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZI +zj0EAwIDSAAwRQIhAIrDZ9YmtC5QxFHecPU4NaJrloXCNvNC7N23E+6iGN4IAiBw +TN8NgyCSJ5uQIGt7D9mP8TmZpWHfZOWkELRpb1dghg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.556 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4109 Checking if identity satisfies role [CLIENT] for Org2MSP" +"2019-04-22 06:18:03.556 UTC [msp] Validate -> DEBU 410a MSP Org2MSP validating identity" +"2019-04-22 06:18:03.556 UTC [msp] getCertificationChain -> DEBU 410b MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.556 UTC [msp] hasOURole -> DEBU 410c MSP Org2MSP checking if the identity is a client" +"2019-04-22 06:18:03.556 UTC [msp] getCertificationChain -> DEBU 410d MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.557 UTC [common.channelconfig] NewStandardValues -> DEBU 410e Initializing protos for *channelconfig.OrdererProtos" +"2019-04-22 06:18:03.557 UTC [msp.identity] Sign -> DEBU 410f Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:03.559 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4110 Processing field: ConsensusType" +"2019-04-22 06:18:03.559 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4111 Processing field: BatchSize" +"2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4112 Processing field: BatchTimeout" +"2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4114 Processing field: KafkaBrokers" +"2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4115 Processing field: ChannelRestrictions" +"2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4116 Processing field: Capabilities" +"2019-04-22 06:18:03.560 UTC [common.channelconfig] NewStandardValues -> DEBU 4117 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-04-22 06:18:03.560 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4118 Processing field: Endpoints" +"2019-04-22 06:18:03.561 UTC [common.channelconfig] NewStandardValues -> DEBU 4119 Initializing protos for *channelconfig.OrganizationProtos" +"2019-04-22 06:18:03.563 UTC [common.channelconfig] initializeProtosStruct -> DEBU 411a Processing field: MSP" +"2019-04-22 06:18:03.563 UTC [common.channelconfig] validateMSP -> DEBU 411b Setting up MSP for org OrdererOrg" +"2019-04-22 06:18:03.563 UTC [msp] newBccspMsp -> DEBU 411c Creating BCCSP-based MSP instance" +"2019-04-22 06:18:03.558 UTC [msp.identity] Sign -> DEBU 4113 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:03.564 UTC [msp] New -> DEBU 411d Creating Cache-MSP instance" +"2019-04-22 06:18:03.564 UTC [msp] Setup -> DEBU 411f Setting up MSP instance OrdererMSP" +"2019-04-22 06:18:03.565 UTC [msp.identity] newIdentity -> DEBU 4120 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPDCCAeOgAwIBAgIQV8vkeJtFRS4Fyudb25J9cDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowaTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGbH143EPJHAkbH781WLlU2fty68 +XFrs0GnAZYUTF8fcDrxzECSrKUbiYIHOQHdr0ZrTrmBJ8jLTIz1OUTVzoxWjbTBr +MA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEw +DwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgx3rdL1G827LZe+3oRxijy6RePZTh +b7gWtUIkL9yCeY4wCgYIKoZIzj0EAwIDRwAwRAIgNbCKxbG3q+lWyI0SgsTUZwuk +t0vFguIW/KaGYOSpdkQCIE/naesTN8h7XLrjmbUl/8QXkBcpwXyHwdfA1wDiRm2U +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.566 UTC [msp.identity] newIdentity -> DEBU 4121 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCjCCAbCgAwIBAgIQVaz8CY8+C4fKtB+rLOMCuDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDQwMTA4MTQwMFoXDTI5MDMyOTA4MTQwMFowVjELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZI +zj0DAQcDQgAEYEHkInlF+yn6yVHiOkjLryK9dd9HEXW31MZzCa84SKfHNtmSU1Tn +Jg48m//QUW2WCWFOqIEGELrtmF9f0jQRk6NNMEswDgYDVR0PAQH/BAQDAgeAMAwG +A1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgx3rdL1G827LZe+3oRxijy6RePZThb7gW +tUIkL9yCeY4wCgYIKoZIzj0EAwIDSAAwRQIhAKjgnLR1ky2/tgPEn0I/XaneJAZa +0n+W9gm6jI1K/ZECAiBafLWNfisjXlV8Q0rpcqF/FJu6IOAHLIaI1lIqn4Hswg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.564 UTC [gossip.comm] authenticateRemotePeer -> DEBU 411e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.7:48424" +"2019-04-22 06:18:03.568 UTC [msp] Validate -> DEBU 4122 MSP OrdererMSP validating identity" +"2019-04-22 06:18:03.568 UTC [msp] Setup -> DEBU 4123 Setting up the MSP manager (4 msps)" +"2019-04-22 06:18:03.569 UTC [msp] Setup -> DEBU 4124 MSP manager setup complete, setup 4 msps" +"2019-04-22 06:18:03.570 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4125 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:48424" +"2019-04-22 06:18:03.570 UTC [msp] DeserializeIdentity -> DEBU 4126 Obtaining identity" +"2019-04-22 06:18:03.569 UTC [policies] NewManagerImpl -> DEBU 4127 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.570 UTC [policies] NewManagerImpl -> DEBU 4128 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.570 UTC [policies] NewManagerImpl -> DEBU 4129 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.570 UTC [policies] NewManagerImpl -> DEBU 412a Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-04-22 06:18:03.571 UTC [policies] NewManagerImpl -> DEBU 412c Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.571 UTC [policies] NewManagerImpl -> DEBU 412d Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.573 UTC [policies] NewManagerImpl -> DEBU 412e Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.574 UTC [policies] NewManagerImpl -> DEBU 412f Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-04-22 06:18:03.574 UTC [policies] NewManagerImpl -> DEBU 4130 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.574 UTC [policies] NewManagerImpl -> DEBU 4131 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4132 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4133 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4134 Proposed new policy Readers for Channel/Application" +"2019-04-22 06:18:03.575 UTC [policies] NewManagerImpl -> DEBU 4135 Proposed new policy Writers for Channel/Application" +"2019-04-22 06:18:03.576 UTC [policies] NewManagerImpl -> DEBU 4136 Proposed new policy Admins for Channel/Application" +"2019-04-22 06:18:03.576 UTC [policies] NewManagerImpl -> DEBU 4137 Proposed new policy Endorsement for Channel/Application" +"2019-04-22 06:18:03.576 UTC [policies] NewManagerImpl -> DEBU 4138 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 4139 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 413a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 413b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.577 UTC [policies] NewManagerImpl -> DEBU 413c Proposed new policy BlockValidation for Channel/Orderer" +"2019-04-22 06:18:03.578 UTC [policies] NewManagerImpl -> DEBU 413d Proposed new policy Readers for Channel/Orderer" +"2019-04-22 06:18:03.578 UTC [policies] NewManagerImpl -> DEBU 413e Proposed new policy Writers for Channel/Orderer" +"2019-04-22 06:18:03.578 UTC [policies] NewManagerImpl -> DEBU 413f Proposed new policy Admins for Channel/Orderer" +"2019-04-22 06:18:03.579 UTC [policies] NewManagerImpl -> DEBU 4140 Proposed new policy Admins for Channel" +"2019-04-22 06:18:03.579 UTC [policies] NewManagerImpl -> DEBU 4141 Proposed new policy Readers for Channel" +"2019-04-22 06:18:03.579 UTC [policies] NewManagerImpl -> DEBU 4142 Proposed new policy Writers for Channel" +"2019-04-22 06:18:03.580 UTC [common.configtx] addToMap -> DEBU 4143 Adding to config map: [Group] /Channel" +"2019-04-22 06:18:03.580 UTC [common.configtx] addToMap -> DEBU 4144 Adding to config map: [Group] /Channel/Application" +"2019-04-22 06:18:03.580 UTC [common.configtx] addToMap -> DEBU 4145 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-04-22 06:18:03.581 UTC [common.configtx] addToMap -> DEBU 4146 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-04-22 06:18:03.581 UTC [common.configtx] addToMap -> DEBU 4147 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-04-22 06:18:03.582 UTC [common.configtx] addToMap -> DEBU 4148 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-04-22 06:18:03.583 UTC [common.configtx] addToMap -> DEBU 4149 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.583 UTC [common.configtx] addToMap -> DEBU 414a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-04-22 06:18:03.583 UTC [common.configtx] addToMap -> DEBU 414b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414c Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-04-22 06:18:03.585 UTC [common.configtx] addToMap -> DEBU 414f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-04-22 06:18:03.586 UTC [common.configtx] addToMap -> DEBU 4150 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-04-22 06:18:03.586 UTC [gossip.comm] func1 -> DEBU 4151 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.586 UTC [common.configtx] addToMap -> DEBU 4152 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-04-22 06:18:03.587 UTC [common.configtx] addToMap -> DEBU 4153 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-04-22 06:18:03.587 UTC [common.configtx] addToMap -> DEBU 4154 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-04-22 06:18:03.587 UTC [common.configtx] addToMap -> DEBU 4155 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-04-22 06:18:03.587 UTC [gossip.gossip] handleMessage -> DEBU 4156 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.591 UTC [common.configtx] addToMap -> DEBU 4158 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-04-22 06:18:03.591 UTC [gossip.pull] HandleMessage -> DEBU 4159 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.592 UTC [msp] DeserializeIdentity -> DEBU 415a Obtaining identity" +"2019-04-22 06:18:03.592 UTC [common.configtx] addToMap -> DEBU 415b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-04-22 06:18:03.592 UTC [common.configtx] addToMap -> DEBU 415c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.592 UTC [msp] DeserializeIdentity -> DEBU 415d Obtaining identity" +"2019-04-22 06:18:03.593 UTC [msp] DeserializeIdentity -> DEBU 415e Obtaining identity" +"2019-04-22 06:18:03.593 UTC [msp] DeserializeIdentity -> DEBU 415f Obtaining identity" +"2019-04-22 06:18:03.593 UTC [common.configtx] addToMap -> DEBU 4160 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-04-22 06:18:03.594 UTC [msp] DeserializeIdentity -> DEBU 4161 Obtaining identity" +"2019-04-22 06:18:03.593 UTC [common.configtx] addToMap -> DEBU 4162 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-04-22 06:18:03.600 UTC [common.configtx] addToMap -> DEBU 4164 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-04-22 06:18:03.594 UTC [msp] DeserializeIdentity -> DEBU 4163 Obtaining identity" +"2019-04-22 06:18:03.591 UTC [grpc] infof -> DEBU 4157 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.571 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 412b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.600 UTC [gossip.comm] func1 -> DEBU 4165 Got message: GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.600 UTC [common.configtx] addToMap -> DEBU 4166 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-04-22 06:18:03.601 UTC [gossip.pull] SendDigest -> DEBU 4167 Sending IDENTITY_MSG digest: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:03.602 UTC [common.configtx] addToMap -> DEBU 4169 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-04-22 06:18:03.602 UTC [gossip.gossip] handleMessage -> DEBU 416a Exiting" +"2019-04-22 06:18:03.602 UTC [common.configtx] addToMap -> DEBU 416b Adding to config map: [Policy] /Channel/Application/Readers" +"2019-04-22 06:18:03.603 UTC [gossip.gossip] handleMessage -> DEBU 416c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.603 UTC [gossip.gossip] handleMessage -> DEBU 416d Exiting" +"2019-04-22 06:18:03.603 UTC [common.configtx] addToMap -> DEBU 416e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-04-22 06:18:03.604 UTC [common.configtx] addToMap -> DEBU 4170 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-04-22 06:18:03.605 UTC [common.configtx] addToMap -> DEBU 4171 Adding to config map: [Group] /Channel/Orderer" +"2019-04-22 06:18:03.601 UTC [msp] DeserializeIdentity -> DEBU 4168 Obtaining identity" +"2019-04-22 06:18:03.604 UTC [gossip.discovery] handleMsgFromComm -> DEBU 416f Got message: GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 177 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.606 UTC [common.configtx] addToMap -> DEBU 4172 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-04-22 06:18:03.609 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4173 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:03.609 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4175 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.610 UTC [msp] DeserializeIdentity -> DEBU 4176 Obtaining identity" +"2019-04-22 06:18:03.612 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4177 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4179 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.614 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 417a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.609 UTC [msp] DeserializeIdentity -> DEBU 4178 Obtaining identity" +"2019-04-22 06:18:03.609 UTC [common.configtx] addToMap -> DEBU 4174 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-04-22 06:18:03.614 UTC [policies] Evaluate -> DEBU 417b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.615 UTC [gossip.comm] func1 -> DEBU 417c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.616 UTC [common.configtx] addToMap -> DEBU 417d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-04-22 06:18:03.617 UTC [common.configtx] addToMap -> DEBU 4181 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-04-22 06:18:03.616 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 417f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.616 UTC [policies] Evaluate -> DEBU 417e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.617 UTC [gossip.gossip] handleMessage -> DEBU 4180 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.621 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4182 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.622 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4184 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.625 UTC [policies] Evaluate -> DEBU 4185 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.625 UTC [policies] Evaluate -> DEBU 4186 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.625 UTC [policies] Evaluate -> DEBU 4187 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.625 UTC [cauthdsl] func1 -> DEBU 4188 0xc002e9cbe0 gate 1555913883625524100 evaluation starts" +"2019-04-22 06:18:03.625 UTC [cauthdsl] func2 -> DEBU 4189 0xc002e9cbe0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.626 UTC [cauthdsl] func2 -> DEBU 418a 0xc002e9cbe0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.626 UTC [cauthdsl] func2 -> DEBU 418b 0xc002e9cbe0 principal matched by identity 0" +"2019-04-22 06:18:03.626 UTC [msp.identity] Verify -> DEBU 418c Verify: digest = 00000000 8c 65 72 f6 31 6d 54 44 ae 54 e4 2f bc 79 b5 a4 |.er.1mTD.T./.y..| +00000010 63 cd 73 1f 83 d5 61 80 02 83 7d 16 57 86 e6 01 |c.s...a...}.W...|" +"2019-04-22 06:18:03.626 UTC [msp.identity] Verify -> DEBU 418d Verify: sig = 00000000 30 45 02 21 00 de f0 b6 3b 63 6d b7 c4 0c e6 64 |0E.!....;cm....d| +00000010 20 7c 28 47 b8 30 29 40 d8 86 42 19 0a 75 d2 1e | |(G.0)@..B..u..| +00000020 fe 5e ab 10 00 02 20 57 83 7b a6 4d 8a cf 86 da |.^.... W.{.M....| +00000030 b1 fb 44 47 24 ac a4 c2 af b4 28 de f5 f4 3c 73 |..DG$.....(... DEBU 418e 0xc002e9cbe0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.627 UTC [cauthdsl] func1 -> DEBU 418f 0xc002e9cbe0 gate 1555913883625524100 evaluation succeeds" +"2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4190 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4191 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4192 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.620 UTC [common.configtx] addToMap -> DEBU 4193 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-04-22 06:18:03.627 UTC [policies] Evaluate -> DEBU 4194 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.630 UTC [common.configtx] addToMap -> DEBU 4195 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-04-22 06:18:03.632 UTC [gossip.discovery] handleAliveMessage -> DEBU 4197 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:03.635 UTC [common.configtx] addToMap -> DEBU 4196 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-04-22 06:18:03.639 UTC [common.configtx] addToMap -> DEBU 4198 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-04-22 06:18:03.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 4199 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:03.641 UTC [common.configtx] addToMap -> DEBU 419a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-04-22 06:18:03.640 UTC [gossip.discovery] learnExistingMembers -> DEBU 419b updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 " +"2019-04-22 06:18:03.642 UTC [gossip.discovery] learnExistingMembers -> DEBU 419c Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 " +"2019-04-22 06:18:03.643 UTC [common.configtx] addToMap -> DEBU 419d Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-04-22 06:18:03.644 UTC [gossip.discovery] learnExistingMembers -> DEBU 419e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:53 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:03.644 UTC [gossip.discovery] learnExistingMembers -> DEBU 419f Exiting" +"2019-04-22 06:18:03.645 UTC [common.configtx] addToMap -> DEBU 41a0 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-04-22 06:18:03.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 41a1 Exiting" +"2019-04-22 06:18:03.645 UTC [common.configtx] addToMap -> DEBU 41a2 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-04-22 06:18:03.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a4 Exiting" +"2019-04-22 06:18:03.650 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41a5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.650 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 41a6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:03.651 UTC [msp] DeserializeIdentity -> DEBU 41a7 Obtaining identity" +"2019-04-22 06:18:03.652 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41a9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.647 UTC [common.configtx] addToMap -> DEBU 41a3 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-04-22 06:18:03.653 UTC [common.configtx] addToMap -> DEBU 41aa Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-04-22 06:18:03.653 UTC [common.configtx] addToMap -> DEBU 41ab Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41ac Adding to config map: [Value] /Channel/Consortium" +"2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41ad Adding to config map: [Value] /Channel/Capabilities" +"2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41ae Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-04-22 06:18:03.654 UTC [common.configtx] addToMap -> DEBU 41af Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-04-22 06:18:03.655 UTC [common.configtx] addToMap -> DEBU 41b0 Adding to config map: [Policy] /Channel/Admins" +"2019-04-22 06:18:03.655 UTC [common.configtx] addToMap -> DEBU 41b1 Adding to config map: [Policy] /Channel/Readers" +"2019-04-22 06:18:03.655 UTC [common.configtx] addToMap -> DEBU 41b2 Adding to config map: [Policy] /Channel/Writers" +"2019-04-22 06:18:03.655 UTC [common.channelconfig] LogSanityChecks -> DEBU 41b3 As expected, current configuration has policy '/Channel/Readers'" +"2019-04-22 06:18:03.655 UTC [common.channelconfig] LogSanityChecks -> DEBU 41b4 As expected, current configuration has policy '/Channel/Writers'" +"2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b5 Manager Channel looking up path [Application]" +"2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b6 Manager Channel has managers Application" +"2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b7 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.655 UTC [policies] Manager -> DEBU 41b8 Manager Channel/Application looking up path []" +"2019-04-22 06:18:03.656 UTC [policies] Manager -> DEBU 41b9 Manager Channel/Application has managers Org3MSP" +"2019-04-22 06:18:03.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ba Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.664 UTC [policies] Manager -> DEBU 41bd Manager Channel/Application has managers Org1MSP" +"2019-04-22 06:18:03.664 UTC [policies] Manager -> DEBU 41be Manager Channel/Application has managers Org2MSP" +"2019-04-22 06:18:03.664 UTC [policies] Evaluate -> DEBU 41bf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.665 UTC [policies] Evaluate -> DEBU 41c0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.665 UTC [common.channelconfig] LogSanityChecks -> DEBU 41c1 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-04-22 06:18:03.665 UTC [common.channelconfig] LogSanityChecks -> DEBU 41c2 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-04-22 06:18:03.666 UTC [common.channelconfig] LogSanityChecks -> DEBU 41c4 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-04-22 06:18:03.666 UTC [policies] Manager -> DEBU 41c5 Manager Channel looking up path [Orderer]" +"2019-04-22 06:18:03.666 UTC [policies] Evaluate -> DEBU 41c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.666 UTC [policies] Manager -> DEBU 41c6 Manager Channel has managers Application" +"2019-04-22 06:18:03.667 UTC [cauthdsl] func1 -> DEBU 41c7 0xc002eb3fe0 gate 1555913883667112600 evaluation starts" +"2019-04-22 06:18:03.667 UTC [cauthdsl] func2 -> DEBU 41c8 0xc002eb3fe0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.667 UTC [policies] Manager -> DEBU 41c9 Manager Channel has managers Orderer" +"2019-04-22 06:18:03.668 UTC [policies] Manager -> DEBU 41ca Manager Channel/Orderer looking up path []" +"2019-04-22 06:18:03.668 UTC [cauthdsl] func2 -> DEBU 41cb 0xc002eb3fe0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.668 UTC [cauthdsl] func2 -> DEBU 41cd 0xc002eb3fe0 principal matched by identity 0" +"2019-04-22 06:18:03.668 UTC [msp.identity] Verify -> DEBU 41ce Verify: digest = 00000000 52 65 b2 65 13 ad 29 fe a7 df e6 a3 fe 46 b8 5a |Re.e..)......F.Z| +00000010 51 81 8d 7b f4 c9 0c 74 d8 9c 87 80 d3 25 2d 5d |Q..{...t.....%-]|" +"2019-04-22 06:18:03.668 UTC [policies] Manager -> DEBU 41cc Manager Channel/Orderer has managers OrdererOrg" +"2019-04-22 06:18:03.669 UTC [common.channelconfig] LogSanityChecks -> DEBU 41cf As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-04-22 06:18:03.668 UTC [msp.identity] Verify -> DEBU 41d0 Verify: sig = 00000000 30 44 02 20 7d 76 45 bc 9d 3c d1 6c 7c 56 53 2d |0D. }vE..<.l|VS-| +00000010 2d e2 b9 22 e5 7d 2b a9 23 02 b5 62 93 d4 e3 c4 |-..".}+.#..b....| +00000020 d7 51 0f 9d 02 20 78 19 56 1f fb f3 c9 19 75 9d |.Q... x.V.....u.| +00000030 3a da 14 70 e3 6f 43 2a 11 74 a7 e3 f7 76 28 98 |:..p.oC*.t...v(.| +00000040 32 38 47 55 33 a3 |28GU3.|" +"2019-04-22 06:18:03.669 UTC [cauthdsl] func2 -> DEBU 41d1 0xc002eb3fe0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.670 UTC [cauthdsl] func1 -> DEBU 41d3 0xc002eb3fe0 gate 1555913883667112600 evaluation succeeds" +"2019-04-22 06:18:03.669 UTC [common.capabilities] Supported -> DEBU 41d2 Application capability V2_0 is supported and is enabled" +"2019-04-22 06:18:03.670 UTC [common.capabilities] Supported -> DEBU 41d5 Channel capability V2_0 is supported and is enabled" +"2019-04-22 06:18:03.672 UTC [gossip.service] ProcessConfigUpdate -> DEBU 41d8 Processing new config for channel businesschannel" +"2019-04-22 06:18:03.673 UTC [gossip.service] ProcessConfigUpdate -> DEBU 41d9 Calling out because config was updated for channel businesschannel" +"2019-04-22 06:18:03.670 UTC [policies] Evaluate -> DEBU 41d4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.673 UTC [policies] Evaluate -> DEBU 41da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.673 UTC [policies] Evaluate -> DEBU 41db Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.673 UTC [policies] Evaluate -> DEBU 41dc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.673 UTC [gossip.service] updateAnchors -> DEBU 41dd Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-04-22 06:18:03.674 UTC [gossip.discovery] handleAliveMessage -> DEBU 41de Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:03.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 41df Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:03.674 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e0 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 " +"2019-04-22 06:18:03.674 UTC [gossip.service] updateAnchors -> DEBU 41e1 Org3MSP anchor peers: []" +"2019-04-22 06:18:03.675 UTC [gossip.service] updateAnchors -> DEBU 41e2 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-04-22 06:18:03.675 UTC [gossip.service] updateAnchors -> DEBU 41e3 Creating state provider for chainID businesschannel" +"2019-04-22 06:18:03.675 UTC [msp] DeserializeIdentity -> DEBU 41e5 Obtaining identity" +"2019-04-22 06:18:03.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.675 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e4 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 " +"2019-04-22 06:18:03.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41e7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.677 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:03.677 UTC [gossip.discovery] learnExistingMembers -> DEBU 41e9 Exiting" +"2019-04-22 06:18:03.678 UTC [gossip.discovery] handleAliveMessage -> DEBU 41ea Exiting" +"2019-04-22 06:18:03.678 UTC [gossip.discovery] handleMsgFromComm -> DEBU 41eb Exiting" +"2019-04-22 06:18:03.678 UTC [gossip.discovery] sendMemResponse -> DEBU 41ec Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:03.677 UTC [policies] Evaluate -> DEBU 41ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.678 UTC [policies] Evaluate -> DEBU 41ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.679 UTC [msp] DeserializeIdentity -> DEBU 41ef Obtaining identity" +"2019-04-22 06:18:03.679 UTC [msp] DeserializeIdentity -> DEBU 41f1 Obtaining identity" +"2019-04-22 06:18:03.679 UTC [msp] DeserializeIdentity -> DEBU 41f2 Obtaining identity" +"2019-04-22 06:18:03.656 UTC [gossip.discovery] sendMemResponse -> DEBU 41bc Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:03.680 UTC [msp] DeserializeIdentity -> DEBU 41f3 Obtaining identity" +"2019-04-22 06:18:03.682 UTC [msp] DeserializeIdentity -> DEBU 41f4 Obtaining identity" +"2019-04-22 06:18:03.683 UTC [msp] DeserializeIdentity -> DEBU 41f5 Obtaining identity" +"2019-04-22 06:18:03.684 UTC [gossip.comm] Send -> DEBU 41f6 Entering, sending GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:03.684 UTC [gossip.discovery] sendMemResponse -> DEBU 41f7 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:03.684 UTC [gossip.comm] sendToEndpoint -> DEBU 41f8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 18023689460046226165, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.684 UTC [gossip.comm] sendToEndpoint -> DEBU 41f9 Exiting" +"2019-04-22 06:18:03.622 UTC [policies] Evaluate -> DEBU 4183 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.685 UTC [cauthdsl] func1 -> DEBU 41fa 0xc0033dd100 gate 1555913883685781500 evaluation starts" +"2019-04-22 06:18:03.686 UTC [cauthdsl] func2 -> DEBU 41fb 0xc0033dd100 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.691 UTC [cauthdsl] func2 -> DEBU 41fd 0xc0033dd100 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.679 UTC [policies] Evaluate -> DEBU 41f0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 41fe 0xc0033dd100 principal matched by identity 0" +"2019-04-22 06:18:03.692 UTC [cauthdsl] func1 -> DEBU 41ff 0xc0033c9e10 gate 1555913883692327600 evaluation starts" +"2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 4200 0xc0033c9e10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 4201 0xc0033c9e10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.692 UTC [msp.identity] Verify -> DEBU 4202 Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-04-22 06:18:03.692 UTC [cauthdsl] func2 -> DEBU 4203 0xc0033c9e10 principal matched by identity 0" +"2019-04-22 06:18:03.693 UTC [msp.identity] Verify -> DEBU 4204 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:18:03.693 UTC [msp.identity] Verify -> DEBU 4205 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:18:03.694 UTC [msp.identity] Verify -> DEBU 4206 Verify: sig = 00000000 30 44 02 20 4a fe 17 ca d5 9d 3a a1 d3 54 ad a8 |0D. J.....:..T..| +00000010 f0 1f f7 7a f5 ed 93 1f 79 13 10 4d c5 29 97 46 |...z....y..M.).F| +00000020 24 3f a1 80 02 20 6f 75 11 a4 c1 c9 9c 8d 70 f3 |$?... ou......p.| +00000030 c6 5c 37 24 13 94 41 a2 93 4b bf d7 35 60 10 2c |.\7$..A..K..5`.,| +00000040 f9 de 6c 51 f8 73 |..lQ.s|" +"2019-04-22 06:18:03.695 UTC [cauthdsl] func2 -> DEBU 4207 0xc0033c9e10 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.695 UTC [cauthdsl] func1 -> DEBU 4208 0xc0033c9e10 gate 1555913883692327600 evaluation succeeds" +"2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 4209 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 420a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 420b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.696 UTC [policies] Evaluate -> DEBU 420c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 420d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 420e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.698 UTC [policies] Evaluate -> DEBU 420f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.698 UTC [policies] Evaluate -> DEBU 4210 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.698 UTC [cauthdsl] func2 -> DEBU 4211 0xc0033dd100 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.698 UTC [cauthdsl] func1 -> DEBU 4212 0xc0033dd100 gate 1555913883685781500 evaluation succeeds" +"2019-04-22 06:18:03.699 UTC [policies] Evaluate -> DEBU 4214 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.699 UTC [policies] Evaluate -> DEBU 4215 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.699 UTC [policies] Evaluate -> DEBU 4216 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.680 UTC [gossip.comm] Send -> DEBU 41fc Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:03.698 UTC [policies] Evaluate -> DEBU 4213 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.672 UTC [comm.grpc.server] 1 -> INFO 41d7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.671Z grpc.peer_address=192.168.224.5:47712 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=94.4µs +"2019-04-22 06:18:03.656 UTC [gossip.gossip] handleMessage -> DEBU 41bb Exiting" +"2019-04-22 06:18:03.672 UTC [comm.grpc.server] 1 -> INFO 41d6 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:05.671Z grpc.peer_address=192.168.224.8:55334 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=123.2µs +"2019-04-22 06:18:03.700 UTC [policies] Evaluate -> DEBU 4217 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.700 UTC [gossip.discovery] sendMemResponse -> DEBU 4218 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:03.700 UTC [cauthdsl] func1 -> DEBU 4219 0xc00370ced0 gate 1555913883700484300 evaluation starts" +"2019-04-22 06:18:03.700 UTC [gossip.comm] sendToEndpoint -> DEBU 421a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.701 UTC [gossip.comm] authenticateRemotePeer -> DEBU 421b Authenticated 192.168.224.7:48424" +"2019-04-22 06:18:03.703 UTC [gossip.comm] GossipStream -> DEBU 421e Servicing 192.168.224.7:48424" +"2019-04-22 06:18:03.703 UTC [gossip.comm] serviceConnection -> DEBU 421f Closing reading from stream" +"2019-04-22 06:18:03.703 UTC [gossip.comm] writeToStream -> DEBU 4220 Closing writing to stream" +"2019-04-22 06:18:03.702 UTC [cauthdsl] func2 -> DEBU 421c 0xc00370ced0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.704 UTC [cauthdsl] func2 -> DEBU 4221 0xc00370ced0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.704 UTC [cauthdsl] func2 -> DEBU 4222 0xc00370ced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-04-22 06:18:03.704 UTC [cauthdsl] func2 -> DEBU 4223 0xc00370ced0 principal evaluation fails" +"2019-04-22 06:18:03.704 UTC [cauthdsl] func1 -> DEBU 4224 0xc00370ced0 gate 1555913883700484300 evaluation fails" +"2019-04-22 06:18:03.704 UTC [policies] Evaluate -> DEBU 4225 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.704 UTC [policies] Evaluate -> DEBU 4226 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.707 UTC [policies] Evaluate -> DEBU 4228 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:03.708 UTC [cauthdsl] func1 -> DEBU 4229 0xc00370ddf0 gate 1555913883708756600 evaluation starts" +"2019-04-22 06:18:03.708 UTC [cauthdsl] func2 -> DEBU 422a 0xc00370ddf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.708 UTC [cauthdsl] func2 -> DEBU 422b 0xc00370ddf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.709 UTC [cauthdsl] func2 -> DEBU 422c 0xc00370ddf0 principal matched by identity 0" +"2019-04-22 06:18:03.709 UTC [msp.identity] Verify -> DEBU 422d Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:18:03.709 UTC [msp.identity] Verify -> DEBU 422e Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:18:03.710 UTC [cauthdsl] func2 -> DEBU 422f 0xc00370ddf0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.710 UTC [cauthdsl] func1 -> DEBU 4230 0xc00370ddf0 gate 1555913883708756600 evaluation succeeds" +"2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4231 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4232 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4233 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.710 UTC [policies] Evaluate -> DEBU 4234 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.711 UTC [msp] DeserializeIdentity -> DEBU 4235 Obtaining identity" +"2019-04-22 06:18:03.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4236 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4237 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.711 UTC [policies] Evaluate -> DEBU 4238 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.712 UTC [policies] Evaluate -> DEBU 4239 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.711 UTC [grpc] infof -> DEBU 423a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.712 UTC [policies] Evaluate -> DEBU 423b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.712 UTC [cauthdsl] func1 -> DEBU 423c 0xc0031fced0 gate 1555913883712618600 evaluation starts" +"2019-04-22 06:18:03.712 UTC [cauthdsl] func2 -> DEBU 423d 0xc0031fced0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.712 UTC [cauthdsl] func2 -> DEBU 423e 0xc0031fced0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.713 UTC [cauthdsl] func2 -> DEBU 423f 0xc0031fced0 principal matched by identity 0" +"2019-04-22 06:18:03.713 UTC [msp.identity] Verify -> DEBU 4240 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:18:03.713 UTC [msp.identity] Verify -> DEBU 4241 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:18:03.714 UTC [cauthdsl] func2 -> DEBU 4242 0xc0031fced0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.714 UTC [cauthdsl] func1 -> DEBU 4243 0xc0031fced0 gate 1555913883712618600 evaluation succeeds" +"2019-04-22 06:18:03.714 UTC [policies] Evaluate -> DEBU 4244 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.715 UTC [policies] Evaluate -> DEBU 4245 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.715 UTC [policies] Evaluate -> DEBU 4246 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.715 UTC [policies] Evaluate -> DEBU 4247 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.715 UTC [gossip.gossip] JoinChan -> INFO 4248 Joining gossip network of channel businesschannel with 3 organizations" +"2019-04-22 06:18:03.715 UTC [gossip.gossip] learnAnchorPeers -> INFO 4249 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:18:03.716 UTC [gossip.discovery] Connect -> DEBU 424b Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-04-22 06:18:03.716 UTC [gossip.comm] func2 -> DEBU 424c Client 192.168.224.7:48424 disconnected" +"2019-04-22 06:18:03.716 UTC [gossip.discovery] Connect -> DEBU 424d Exiting" +"2019-04-22 06:18:03.716 UTC [gossip.gossip] learnAnchorPeers -> INFO 424e No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-04-22 06:18:03.716 UTC [gossip.gossip] learnAnchorPeers -> INFO 424f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:18:03.717 UTC [gossip.gossip] learnAnchorPeers -> INFO 4250 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:18:03.716 UTC [comm.grpc.server] 1 -> INFO 4251 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.555Z grpc.peer_address=192.168.224.7:48424 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=160.4745ms +"2019-04-22 06:18:03.717 UTC [gossip.service] updateEndpoints -> DEBU 4252 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-04-22 06:18:03.718 UTC [msp] DeserializeIdentity -> DEBU 4253 Obtaining identity" +"2019-04-22 06:18:03.718 UTC [gossip.comm] readFromStream -> DEBU 4254 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd canceling read because closing" +"2019-04-22 06:18:03.718 UTC [gossip.comm] writeToStream -> DEBU 4255 Closing writing to stream" +"2019-04-22 06:18:03.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4256 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.720 UTC [msp] DeserializeIdentity -> DEBU 4257 Obtaining identity" +"2019-04-22 06:18:03.722 UTC [grpc] DialContext -> DEBU 4258 parsed scheme: """ +"2019-04-22 06:18:03.722 UTC [grpc] DialContext -> DEBU 4259 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:18:03.722 UTC [grpc] NewAddress -> DEBU 425a ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-04-22 06:18:03.723 UTC [grpc] switchBalancer -> DEBU 425b ClientConn switching balancer to "pick_first"" +"2019-04-22 06:18:03.723 UTC [grpc] HandleSubConnStateChange -> DEBU 425c pickfirstBalancer: HandleSubConnStateChange: 0xc003514640, CONNECTING" +"2019-04-22 06:18:03.702 UTC [gossip.comm] sendToEndpoint -> DEBU 421d Exiting" +"2019-04-22 06:18:03.705 UTC [msp.identity] Sign -> DEBU 4227 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:03.723 UTC [msp.identity] Sign -> DEBU 425d Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:03.724 UTC [gossip.comm] authenticateRemotePeer -> DEBU 425e Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:47712" +"2019-04-22 06:18:03.724 UTC [gossip.comm] authenticateRemotePeer -> DEBU 425f Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47712" +"2019-04-22 06:18:03.715 UTC [gossip.comm] readFromStream -> DEBU 424a Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:03.725 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4260 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.727 UTC [peer] updateTrustedRoots -> DEBU 4261 Updating trusted root authorities for channel businesschannel" +"2019-04-22 06:18:03.734 UTC [msp.identity] Sign -> DEBU 4262 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:03.734 UTC [msp.identity] Sign -> DEBU 4263 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:03.735 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4264 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:55334" +"2019-04-22 06:18:03.735 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4265 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe\nwtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c\nUF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E\nAwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:55334" +"2019-04-22 06:18:03.736 UTC [msp] DeserializeIdentity -> DEBU 4266 Obtaining identity" +"2019-04-22 06:18:03.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4267 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.736 UTC [msp] DeserializeIdentity -> DEBU 4268 Obtaining identity" +"2019-04-22 06:18:03.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4269 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.739 UTC [msp.identity] Verify -> DEBU 426a Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:18:03.739 UTC [msp.identity] Verify -> DEBU 426b Verify: sig = 00000000 30 44 02 20 64 31 98 72 c4 1b 8d 03 dc d9 83 a4 |0D. d1.r........| +00000010 68 ee a4 e8 84 70 8e b1 80 ab c2 2a 9c 5f a4 11 |h....p.....*._..| +00000020 24 2f 84 cc 02 20 1a 7e fa a6 61 49 b0 ee fe b7 |$/... .~..aI....| +00000030 5b b1 86 5b fd f7 fb 26 80 d0 34 31 dc f7 02 78 |[..[...&..41...x| +00000040 1c 0f 42 49 01 22 |..BI."|" +"2019-04-22 06:18:03.741 UTC [gossip.comm] authenticateRemotePeer -> DEBU 426c Authenticated 192.168.224.5:47712" +"2019-04-22 06:18:03.742 UTC [gossip.comm] GossipStream -> DEBU 426d Servicing 192.168.224.5:47712" +"2019-04-22 06:18:03.742 UTC [gossip.comm] serviceConnection -> DEBU 426e Closing reading from stream" +"2019-04-22 06:18:03.750 UTC [gossip.comm] readFromStream -> DEBU 426f a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-04-22 06:18:03.751 UTC [msp] DeserializeIdentity -> DEBU 4270 Obtaining identity" +"2019-04-22 06:18:03.751 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4271 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4272 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4273 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.752 UTC [policies] Evaluate -> DEBU 4274 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.754 UTC [policies] Evaluate -> DEBU 4275 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.754 UTC [policies] Evaluate -> DEBU 4276 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.754 UTC [cauthdsl] func1 -> DEBU 4277 0xc0039a20d0 gate 1555913883754242000 evaluation starts" +"2019-04-22 06:18:03.754 UTC [cauthdsl] func2 -> DEBU 4278 0xc0039a20d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.754 UTC [cauthdsl] func2 -> DEBU 4279 0xc0039a20d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.755 UTC [cauthdsl] func2 -> DEBU 427a 0xc0039a20d0 principal matched by identity 0" +"2019-04-22 06:18:03.755 UTC [msp.identity] Verify -> DEBU 427b Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:18:03.756 UTC [msp.identity] Verify -> DEBU 427c Verify: sig = 00000000 30 45 02 21 00 b1 6c bb ae 6f f9 9f f8 bb 6e f6 |0E.!..l..o....n.| +00000010 15 af 93 c4 6d d5 a2 16 02 e7 71 35 14 16 4c 41 |....m.....q5..LA| +00000020 5c 32 61 5a f4 02 20 2c 89 dd f8 99 73 66 29 7e |\2aZ.. ,....sf)~| +00000030 a6 19 36 a8 9b f3 17 63 bf a3 ac 73 0b 75 3a bf |..6....c...s.u:.| +00000040 d7 da 4b e4 63 5b 89 |..K.c[.|" +"2019-04-22 06:18:03.757 UTC [cauthdsl] func2 -> DEBU 427d 0xc0039a20d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.757 UTC [cauthdsl] func1 -> DEBU 427e 0xc0039a20d0 gate 1555913883754242000 evaluation succeeds" +"2019-04-22 06:18:03.758 UTC [policies] Evaluate -> DEBU 427f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.760 UTC [peer] buildTrustedRootsForChain -> DEBU 4280 updating root CAs for channel [businesschannel]" +"2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4281 adding app root CAs for MSP [Org3MSP]" +"2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4282 adding app root CAs for MSP [Org1MSP]" +"2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4283 adding app root CAs for MSP [Org2MSP]" +"2019-04-22 06:18:03.761 UTC [peer] buildTrustedRootsForChain -> DEBU 4284 adding orderer root CAs for MSP [OrdererMSP]" +"2019-04-22 06:18:03.762 UTC [committer.txvalidator] validateTx -> DEBU 4285 config transaction received for chain businesschannel" +"2019-04-22 06:18:03.762 UTC [committer.txvalidator] validateTx -> DEBU 4286 [businesschannel] validateTx completes for block 0xc0032a01c0 env 0xc0024cb770 txn 0" +"2019-04-22 06:18:03.762 UTC [committer.txvalidator] Validate -> DEBU 4287 got result for idx 0, code 0" +"2019-04-22 06:18:03.762 UTC [committer.txvalidator] Validate -> INFO 4288 [businesschannel] Validated block [9] in 327ms" +"2019-04-22 06:18:03.763 UTC [gossip.privdata] listMissingPrivateData -> DEBU 4289 Retrieving private write sets for 0 transactions from transient store" +"2019-04-22 06:18:03.763 UTC [gossip.privdata] StoreBlock -> DEBU 428a [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-04-22 06:18:03.764 UTC [committer] preCommit -> DEBU 428b Received configuration update, calling CSCC ConfigUpdate" +"2019-04-22 06:18:03.764 UTC [kvledger] CommitWithPvtData -> DEBU 428c [businesschannel] Validating state for block [9]" +"2019-04-22 06:18:03.764 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 428d Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-04-22 06:18:03.764 UTC [policies] Evaluate -> DEBU 428e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.764 UTC [policies] Evaluate -> DEBU 428f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.764 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 4290 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-04-22 06:18:03.765 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 4291 Validating new block with num trans = [1]" +"2019-04-22 06:18:03.765 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 4292 ValidateAndPrepareBatch() for block number = [9]" +"2019-04-22 06:18:03.764 UTC [policies] Evaluate -> DEBU 4293 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.765 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4294 Authenticated 192.168.224.8:55334" +"2019-04-22 06:18:03.766 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 4295 preprocessing ProtoBlock..." +"2019-04-22 06:18:03.766 UTC [valimpl] preprocessProtoBlock -> DEBU 4296 txType=CONFIG" +"2019-04-22 06:18:03.765 UTC [gossip.comm] GossipStream -> DEBU 4297 Servicing 192.168.224.8:55334" +"2019-04-22 06:18:03.766 UTC [gossip.comm] writeToStream -> DEBU 4298 Closing writing to stream" +"2019-04-22 06:18:03.766 UTC [valimpl] processNonEndorserTx -> DEBU 4299 Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-04-22 06:18:03.766 UTC [valimpl] processNonEndorserTx -> DEBU 429a Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-04-22 06:18:03.766 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 429b constructing new tx simulator" +"2019-04-22 06:18:03.767 UTC [gossip.comm] writeToStream -> DEBU 429c Closing writing to stream" +"2019-04-22 06:18:03.767 UTC [gossip.comm] serviceConnection -> DEBU 429d Closing reading from stream" +"2019-04-22 06:18:03.767 UTC [gossip.comm] func2 -> DEBU 429e Client 192.168.224.8:55156 disconnected" +"2019-04-22 06:18:03.768 UTC [comm.grpc.server] 1 -> INFO 42a0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.8:55156 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m15.7782549s +"2019-04-22 06:18:03.766 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 429f constructing new tx simulator txid = []" +"2019-04-22 06:18:03.769 UTC [peer] GenerateSimulationResults -> DEBU 42a1 Processing CONFIG" +"2019-04-22 06:18:03.769 UTC [peer] processChannelConfigTx -> DEBU 42a2 channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-04-22 06:18:03.770 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 42a3 Simulation completed, getting simulation results" +"2019-04-22 06:18:03.770 UTC [lockbasedtxmgr] Done -> DEBU 42a4 Done with transaction simulation / query execution []" +"2019-04-22 06:18:03.770 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 42a5 Block [9] Transaction index [0] TxId [] marked as valid by state validator. ContainsPostOrderWrites [true]" +"2019-04-22 06:18:03.771 UTC [valinternal] ApplyWriteSet -> DEBU 42a6 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00224f8c0)}" +"2019-04-22 06:18:03.771 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 42a7 validating rwset..." +"2019-04-22 06:18:03.771 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 42a8 postprocessing ProtoBlock..." +"2019-04-22 06:18:03.771 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 42a9 ValidateAndPrepareBatch() complete" +"2019-04-22 06:18:03.772 UTC [kvledger] CommitWithPvtData -> DEBU 42aa [businesschannel] Committing block [9] to storage" +"2019-04-22 06:18:03.772 UTC [ledgerstorage] CommitWithPvtData -> DEBU 42ab Writing block [9] to pvt block store" +"2019-04-22 06:18:03.775 UTC [gossip.comm] readFromStream -> DEBU 42ac Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:18:03.776 UTC [gossip.comm] func2 -> DEBU 42ad Client 192.168.224.5:47712 disconnected" +"2019-04-22 06:18:03.777 UTC [pvtdatastorage] Prepare -> DEBU 42ae Saved 0 private data write sets for block [9]" +"2019-04-22 06:18:03.777 UTC [comm.grpc.server] 1 -> INFO 42af streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.705Z grpc.peer_address=192.168.224.5:47712 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=72.2563ms +"2019-04-22 06:18:03.778 UTC [grpc] infof -> DEBU 42b0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.779 UTC [grpc] infof -> DEBU 42b1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.779 UTC [gossip.comm] writeToStream -> DEBU 42b2 Closing writing to stream" +"2019-04-22 06:18:03.783 UTC [fsblkstorage] indexBlock -> DEBU 42b3 Indexing block [blockNum=9, blockHash=[]byte{0x78, 0x7a, 0x67, 0xb8, 0x41, 0xd5, 0x69, 0x5a, 0xe5, 0xed, 0xc7, 0x2, 0x28, 0x9c, 0x7e, 0xe2, 0xc1, 0x3a, 0x7, 0xce, 0xc4, 0xf8, 0x4f, 0x8e, 0xe3, 0x8b, 0xa5, 0x79, 0x20, 0x3, 0xac, 0xeb} txOffsets= +txId= locPointer=offset=71, bytesLength=33993 +]" +"2019-04-22 06:18:03.783 UTC [fsblkstorage] indexBlock -> DEBU 42b5 txid [] is a duplicate of a previous tx. Not indexing in txid-index" +"2019-04-22 06:18:03.783 UTC [fsblkstorage] indexBlock -> DEBU 42b6 Adding txLoc [fileSuffixNum=0, offset=98746, bytesLength=33993] for tx number:[0] ID: [] to blockNumTranNum index" +"2019-04-22 06:18:03.783 UTC [grpc] infof -> DEBU 42b4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.785 UTC [gossip.comm] serviceConnection -> DEBU 42b7 Closing reading from stream" +"2019-04-22 06:18:03.786 UTC [gossip.comm] func2 -> DEBU 42b8 Client 192.168.224.8:55334 disconnected" +"2019-04-22 06:18:03.786 UTC [fsblkstorage] updateCheckpoint -> DEBU 42b9 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[133677], isChainEmpty=[false], lastBlockNumber=[9]" +"2019-04-22 06:18:03.787 UTC [pvtdatastorage] Commit -> DEBU 42ba Committing private data for block [9]" +"2019-04-22 06:18:03.786 UTC [comm.grpc.server] 1 -> INFO 42bb streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:18:13.723Z grpc.peer_address=192.168.224.8:55334 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=52.3578ms +"2019-04-22 06:18:03.789 UTC [gossip.comm] writeToStream -> DEBU 42bc Closing writing to stream" +"2019-04-22 06:18:03.790 UTC [pvtdatastorage] Commit -> DEBU 42bd Committed private data for block [9]" +"2019-04-22 06:18:03.790 UTC [grpc] HandleSubConnStateChange -> DEBU 42bf pickfirstBalancer: HandleSubConnStateChange: 0xc003514640, READY" +"2019-04-22 06:18:03.790 UTC [kvledger] CommitWithPvtData -> DEBU 42be [businesschannel] Committing block [9] transactions to state database" +"2019-04-22 06:18:03.790 UTC [lockbasedtxmgr] Commit -> DEBU 42c0 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-04-22 06:18:03.791 UTC [lockbasedtxmgr] Commit -> DEBU 42c1 Committing updates to state database" +"2019-04-22 06:18:03.791 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 42c2 Building the expiry schedules based on the update batch" +"2019-04-22 06:18:03.791 UTC [lockbasedtxmgr] Commit -> DEBU 42c3 Write lock acquired for committing updates to state database" +"2019-04-22 06:18:03.791 UTC [stateleveldb] ApplyUpdates -> DEBU 42c4 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-04-22 06:18:03.792 UTC [gossip.comm] readFromStream -> DEBU 42c5 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 canceling read because closing" +"2019-04-22 06:18:03.795 UTC [msp.identity] Sign -> DEBU 42c6 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:03.795 UTC [msp.identity] Sign -> DEBU 42c7 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:03.796 UTC [gossip.comm] authenticateRemotePeer -> DEBU 42c8 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.8:7051" +"2019-04-22 06:18:03.796 UTC [lockbasedtxmgr] Commit -> DEBU 42c9 Updates committed to state database and the write lock is released" +"2019-04-22 06:18:03.796 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 42ca Preparing potential purge list working-set for expiringAtBlk [10]" +"2019-04-22 06:18:03.796 UTC [leveldbhelper] GetIterator -> DEBU 42cb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xa, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0xb, 0x0}]" +"2019-04-22 06:18:03.796 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 42cc No expiry entry found for expiringAtBlk [10]" +"2019-04-22 06:18:03.797 UTC [lockbasedtxmgr] func1 -> DEBU 42cd launched the background routine for preparing keys to purge with the next block" +"2019-04-22 06:18:03.797 UTC [kvledger] CommitWithPvtData -> DEBU 42ce [businesschannel] Committing block [9] transactions to history database" +"2019-04-22 06:18:03.797 UTC [historyleveldb] Commit -> DEBU 42cf Channel [businesschannel]: Updating history database for blockNo [9] with [1] transactions" +"2019-04-22 06:18:03.797 UTC [historyleveldb] Commit -> DEBU 42d0 Skipping transaction [0] since it is not an endorsement transaction" +"2019-04-22 06:18:03.800 UTC [historyleveldb] Commit -> DEBU 42d1 Channel [businesschannel]: Updates committed to history database for blockNo [9]" +"2019-04-22 06:18:03.800 UTC [kvledger] CommitWithPvtData -> INFO 42d2 [businesschannel] Committed block [9] with 1 transaction(s) in 36ms (state_validation=7ms block_commit=18ms state_commit=6ms)" +"2019-04-22 06:18:03.801 UTC [msp.identity] Sign -> DEBU 42d3 Sign: plaintext: 18057A5E12140894FB808ABAEBEDCB15...624D0F542C442AB5FE8C65C22A02080A " +"2019-04-22 06:18:03.801 UTC [msp.identity] Sign -> DEBU 42d4 Sign: digest: AEF04312DAA24B1866F1AD89D6B52F66BFA9707649778DCD638E40C34503E857 " +"2019-04-22 06:18:03.801 UTC [gossip.state] commitBlock -> DEBU 42d5 [businesschannel] Committed block [9] with 1 transaction(s)" +"2019-04-22 06:18:03.804 UTC [gossip.comm] authenticateRemotePeer -> DEBU 42d6 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +"2019-04-22 06:18:03.804 UTC [msp] DeserializeIdentity -> DEBU 42d7 Obtaining identity" +"2019-04-22 06:18:03.805 UTC [msp] DeserializeIdentity -> DEBU 42d8 Obtaining identity" +"2019-04-22 06:18:03.805 UTC [msp.identity] newIdentity -> DEBU 42d9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQc3Uzo9IX4koa2NJ+iA6PzjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEudd4+iG80zoe +wtxYSJzsBgDu0TzXlKbW7bh6AH1oOZjECX/Zo2cg4neyoJf7MdBQqJglkPrfmT2c +UF3mRdFH2aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgSaIl0s3l0L31lBEpSXCaMOy6gDzwX2aeOhXT07g4hJgCIEqK/gXI +7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.806 UTC [msp] Validate -> DEBU 42da MSP Org2MSP validating identity" +"2019-04-22 06:18:03.806 UTC [grpc] infof -> DEBU 42db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.807 UTC [msp] getCertificationChain -> DEBU 42dc MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.808 UTC [msp] DeserializeIdentity -> DEBU 42de Obtaining identity" +"2019-04-22 06:18:03.809 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42df Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.809 UTC [msp] DeserializeIdentity -> DEBU 42e0 Obtaining identity" +"2019-04-22 06:18:03.810 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42e1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42e2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.811 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42e3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.811 UTC [policies] Evaluate -> DEBU 42e4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.812 UTC [policies] Evaluate -> DEBU 42e5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.812 UTC [policies] Evaluate -> DEBU 42e6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:03.812 UTC [cauthdsl] func1 -> DEBU 42e7 0xc003ef7c00 gate 1555913883812515900 evaluation starts" +"2019-04-22 06:18:03.813 UTC [cauthdsl] func2 -> DEBU 42e8 0xc003ef7c00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.813 UTC [cauthdsl] func2 -> DEBU 42e9 0xc003ef7c00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.813 UTC [cauthdsl] func2 -> DEBU 42ea 0xc003ef7c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:03.814 UTC [cauthdsl] func2 -> DEBU 42eb 0xc003ef7c00 principal evaluation fails" +"2019-04-22 06:18:03.814 UTC [cauthdsl] func1 -> DEBU 42ec 0xc003ef7c00 gate 1555913883812515900 evaluation fails" +"2019-04-22 06:18:03.814 UTC [policies] Evaluate -> DEBU 42ed Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.814 UTC [policies] Evaluate -> DEBU 42ee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.814 UTC [policies] Evaluate -> DEBU 42ef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.815 UTC [cauthdsl] func1 -> DEBU 42f0 0xc003f76460 gate 1555913883815344100 evaluation starts" +"2019-04-22 06:18:03.815 UTC [cauthdsl] func2 -> DEBU 42f1 0xc003f76460 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.816 UTC [cauthdsl] func2 -> DEBU 42f2 0xc003f76460 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.816 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 42f3 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:18:03.817 UTC [msp] Validate -> DEBU 42f4 MSP Org2MSP validating identity" +"2019-04-22 06:18:03.817 UTC [msp] getCertificationChain -> DEBU 42f5 MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.818 UTC [cauthdsl] func2 -> DEBU 42f6 0xc003f76460 principal matched by identity 0" +"2019-04-22 06:18:03.818 UTC [msp.identity] Verify -> DEBU 42f7 Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:18:03.818 UTC [msp.identity] Verify -> DEBU 42f8 Verify: sig = 00000000 30 44 02 20 13 15 7d 47 a5 d9 51 70 49 cc fa cd |0D. ..}G..QpI...| +00000010 fe 86 7d 29 52 43 d9 7c f2 aa ec 19 4b c3 1a 61 |..})RC.|....K..a| +00000020 66 b3 8e 68 02 20 6c d7 bc 4f 83 d1 85 4c fd 77 |f..h. l..O...L.w| +00000030 a2 cb b8 7c 13 47 be 52 0a fc d2 bd 98 38 ef 9b |...|.G.R.....8..| +00000040 5c ae f4 fa 7a 9d |\...z.|" +"2019-04-22 06:18:03.819 UTC [cauthdsl] func2 -> DEBU 42f9 0xc003f76460 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.819 UTC [cauthdsl] func1 -> DEBU 42fa 0xc003f76460 gate 1555913883815344100 evaluation succeeds" +"2019-04-22 06:18:03.819 UTC [policies] Evaluate -> DEBU 42fb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.819 UTC [policies] Evaluate -> DEBU 42fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.820 UTC [policies] Evaluate -> DEBU 42fd Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.821 UTC [policies] Evaluate -> DEBU 42fe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.821 UTC [gossip.comm] authenticateRemotePeer -> DEBU 42ff Authenticated 192.168.224.8:7051" +"2019-04-22 06:18:03.822 UTC [grpc] infof -> DEBU 4300 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:03.821 UTC [msp] DeserializeIdentity -> DEBU 4301 Obtaining identity" +"2019-04-22 06:18:03.822 UTC [msp.identity] Sign -> DEBU 4302 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151038 " +"2019-04-22 06:18:03.822 UTC [msp.identity] Sign -> DEBU 4303 Sign: digest: F0C96BA5DA8FF726034B4E520A68366157B17388B79D14BC68C7E8F5729CF9F9 " +"2019-04-22 06:18:03.823 UTC [msp.identity] Sign -> DEBU 4304 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:03.823 UTC [msp.identity] Sign -> DEBU 4305 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:03.824 UTC [msp] DeserializeIdentity -> DEBU 4306 Obtaining identity" +"2019-04-22 06:18:03.825 UTC [gossip.comm] Send -> DEBU 4307 Entering, sending GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:03.825 UTC [gossip.comm] sendToEndpoint -> DEBU 4308 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 175 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.825 UTC [gossip.comm] createConnection -> DEBU 4309 Entering peer0.org2.example.com:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:03.827 UTC [grpc] DialContext -> DEBU 430a parsed scheme: """ +"2019-04-22 06:18:03.827 UTC [grpc] DialContext -> DEBU 430b scheme "" not registered, fallback to default scheme" +"2019-04-22 06:18:03.827 UTC [grpc] NewAddress -> DEBU 430c ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-04-22 06:18:03.827 UTC [grpc] switchBalancer -> DEBU 430d ClientConn switching balancer to "pick_first"" +"2019-04-22 06:18:03.828 UTC [grpc] HandleSubConnStateChange -> DEBU 430e pickfirstBalancer: HandleSubConnStateChange: 0xc003202ad0, CONNECTING" +"2019-04-22 06:18:03.834 UTC [grpc] HandleSubConnStateChange -> DEBU 430f pickfirstBalancer: HandleSubConnStateChange: 0xc003202ad0, READY" +"2019-04-22 06:18:03.838 UTC [msp.identity] Sign -> DEBU 4310 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:03.839 UTC [msp.identity] Sign -> DEBU 4311 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:03.840 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4312 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.8:7051" +"2019-04-22 06:18:03.841 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4313 Received pki_id:"\006\314\243P\375\375S\266\347Wt\033K\314\272\355\203\355\222M6a\323s)\023\215\366\032\371 0" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n7sI8+nYq72ltLnBofWRR854tjLOVpMTBZ3kL\n-----END CERTIFICATE-----\n" tls_cert_hash:"\367r3(\356-\233%}\177\374\361|\330D\324\240\240@\023u\230\226M\302\275>U :\356g" from 192.168.224.8:7051" +"2019-04-22 06:18:03.841 UTC [msp] DeserializeIdentity -> DEBU 4314 Obtaining identity" +"2019-04-22 06:18:03.842 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4315 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.843 UTC [msp] DeserializeIdentity -> DEBU 4316 Obtaining identity" +"2019-04-22 06:18:03.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4317 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.844 UTC [msp] DeserializeIdentity -> DEBU 4318 Obtaining identity" +"2019-04-22 06:18:03.845 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4319 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 431a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.845 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 431b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.845 UTC [policies] Evaluate -> DEBU 431c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.845 UTC [policies] Evaluate -> DEBU 431d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.846 UTC [policies] Evaluate -> DEBU 431e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:03.846 UTC [cauthdsl] func1 -> DEBU 431f 0xc003600790 gate 1555913883846628700 evaluation starts" +"2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4320 0xc003600790 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4321 0xc003600790 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4322 0xc003600790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:03.847 UTC [cauthdsl] func2 -> DEBU 4323 0xc003600790 principal evaluation fails" +"2019-04-22 06:18:03.848 UTC [cauthdsl] func1 -> DEBU 4324 0xc003600790 gate 1555913883846628700 evaluation fails" +"2019-04-22 06:18:03.848 UTC [policies] Evaluate -> DEBU 4325 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.849 UTC [policies] Evaluate -> DEBU 4326 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.849 UTC [policies] Evaluate -> DEBU 4327 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.850 UTC [cauthdsl] func1 -> DEBU 4328 0xc003600fd0 gate 1555913883849934600 evaluation starts" +"2019-04-22 06:18:03.850 UTC [cauthdsl] func2 -> DEBU 4329 0xc003600fd0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.851 UTC [cauthdsl] func2 -> DEBU 432a 0xc003600fd0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.851 UTC [cauthdsl] func2 -> DEBU 432b 0xc003600fd0 principal matched by identity 0" +"2019-04-22 06:18:03.852 UTC [msp.identity] Verify -> DEBU 432c Verify: digest = 00000000 84 5c e4 f0 7d 8a af db 08 d1 b7 68 6f 9c ae 70 |.\..}......ho..p| +00000010 20 d4 2d 13 7a 58 3f 1a f6 06 bd 12 ee 67 9f 95 | .-.zX?......g..|" +"2019-04-22 06:18:03.852 UTC [msp.identity] Verify -> DEBU 432d Verify: sig = 00000000 30 44 02 20 64 10 4d 3b 96 af 4c 51 75 05 65 fb |0D. d.M;..LQu.e.| +00000010 9b b4 86 3a ac 56 37 5b 3b fb d0 8e 1d a2 27 cc |...:.V7[;.....'.| +00000020 0a 5b 97 90 02 20 60 1f 0a 4d 61 44 15 ec 0a 82 |.[... `..MaD....| +00000030 0b c1 04 aa e2 14 bd 83 60 67 62 be 6a 80 da 87 |........`gb.j...| +00000040 90 cd 4a 71 6d ce |..Jqm.|" +"2019-04-22 06:18:03.853 UTC [cauthdsl] func2 -> DEBU 432e 0xc003600fd0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.853 UTC [cauthdsl] func1 -> DEBU 432f 0xc003600fd0 gate 1555913883849934600 evaluation succeeds" +"2019-04-22 06:18:03.853 UTC [policies] Evaluate -> DEBU 4330 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.853 UTC [policies] Evaluate -> DEBU 4331 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.854 UTC [policies] Evaluate -> DEBU 4332 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.854 UTC [policies] Evaluate -> DEBU 4333 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.854 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4334 Authenticated 192.168.224.8:7051" +"2019-04-22 06:18:03.855 UTC [gossip.comm] createConnection -> DEBU 4335 Exiting" +"2019-04-22 06:18:03.855 UTC [gossip.comm] sendToEndpoint -> DEBU 4336 Exiting" +"2019-04-22 06:18:03.862 UTC [gossip.comm] func1 -> DEBU 4337 Got message: GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 656 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.862 UTC [gossip.gossip] handleMessage -> DEBU 4338 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 656 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.862 UTC [gossip.gossip] handleMessage -> DEBU 4339 Exiting" +"2019-04-22 06:18:03.862 UTC [gossip.discovery] handleMsgFromComm -> DEBU 433a Got message: GossipMessage: Channel: , nonce: 5753430372673569357, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 656 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.863 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 433b Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:03.864 UTC [msp.identity] Verify -> DEBU 433c Verify: digest = 00000000 f9 21 e0 ca 33 86 0e 66 d4 7f 3e b2 28 ee 93 93 |.!..3..f..>.(...| +00000010 6a a4 91 42 75 0c c1 8f 54 07 6f 56 d6 6f 38 9f |j..Bu...T.oV.o8.|" +"2019-04-22 06:18:03.864 UTC [msp.identity] Verify -> DEBU 433d Verify: sig = 00000000 30 45 02 21 00 c5 f3 35 28 9a 72 57 1f 98 e3 62 |0E.!...5(.rW...b| +00000010 c4 5f 04 44 1d d4 ae 90 ee fe cc af 7f 8c 6f f4 |._.D..........o.| +00000020 3b 59 0a c0 86 02 20 33 a5 2c 24 a9 24 c6 ac 41 |;Y.... 3.,$.$..A| +00000030 c0 0c 49 09 50 3a f6 b5 fa 06 38 64 76 63 af 81 |..I.P:....8dvc..| +00000040 0e 7b 8e 99 f3 03 cc |.{.....|" +"2019-04-22 06:18:03.865 UTC [gossip.discovery] handleAliveMessage -> DEBU 433e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:03.866 UTC [gossip.discovery] handleAliveMessage -> DEBU 433f Exiting" +"2019-04-22 06:18:03.866 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4340 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:03.867 UTC [msp.identity] Verify -> DEBU 4341 Verify: digest = 00000000 f0 c9 6b a5 da 8f f7 26 03 4b 4e 52 0a 68 36 61 |..k....&.KNR.h6a| +00000010 57 b1 73 88 b7 9d 14 bc 68 c7 e8 f5 72 9c f9 f9 |W.s.....h...r...|" +"2019-04-22 06:18:03.867 UTC [msp.identity] Verify -> DEBU 4342 Verify: sig = 00000000 30 44 02 20 35 9a 07 d8 40 98 b7 9e 1e 7d c8 1c |0D. 5...@....}..| +00000010 18 9a 38 23 c0 20 19 5c d0 25 c2 35 4e c0 bb 4b |..8#. .\.%.5N..K| +00000020 d9 e5 9e 2f 02 20 72 4b a8 9d 95 ff 16 59 5b fa |.../. rK.....Y[.| +00000030 7c 58 2d 97 35 5f 66 60 3d 9d 40 14 ab be af 96 ||X-.5_f`=.@.....| +00000040 ea c2 89 b6 32 66 |....2f|" +"2019-04-22 06:18:03.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 4343 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:03.868 UTC [gossip.discovery] isSentByMe -> DEBU 4344 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:56 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:03.868 UTC [gossip.discovery] handleAliveMessage -> DEBU 4345 Exiting" +"2019-04-22 06:18:03.869 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4346 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:03.869 UTC [msp] DeserializeIdentity -> DEBU 4347 Obtaining identity" +"2019-04-22 06:18:03.869 UTC [msp] DeserializeIdentity -> DEBU 4348 Obtaining identity" +"2019-04-22 06:18:03.870 UTC [msp.identity] newIdentity -> DEBU 4349 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQSlyjrd/jHSQbPgBJ8PvO+jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOGPEPQfP/o8c +pf4701Cl1DvGk2qQ+U0MUjQBoIaOBKQTKDOx5+gPoZBQWcPOxYJHy3WsKh8TRldv +WnKDOxZoGqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgfBnKcFaDE/nbLKFidlfYgCNMeYxSz4H/H4DYimaq4eAwCgYIKoZIzj0E +AwIDRwAwRAIgM3bHpXw1NEmfFw7DNRcq+zD/ZT8cxS5zPRqeWsgzJxgCIGc20aMr +KKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ +-----END CERTIFICATE-----" +"2019-04-22 06:18:03.870 UTC [msp] Validate -> DEBU 434a MSP Org2MSP validating identity" +"2019-04-22 06:18:03.871 UTC [msp] getCertificationChain -> DEBU 434b MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 434c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:03.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 434d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 434e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:03.871 UTC [policies] Evaluate -> DEBU 434f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:03.872 UTC [policies] Evaluate -> DEBU 4350 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:03.872 UTC [policies] Evaluate -> DEBU 4351 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:03.872 UTC [cauthdsl] func1 -> DEBU 4352 0xc00393b1a0 gate 1555913883872412200 evaluation starts" +"2019-04-22 06:18:03.872 UTC [cauthdsl] func2 -> DEBU 4353 0xc00393b1a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.872 UTC [cauthdsl] func2 -> DEBU 4354 0xc00393b1a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.877 UTC [cauthdsl] func2 -> DEBU 4355 0xc00393b1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:03.877 UTC [cauthdsl] func2 -> DEBU 4356 0xc00393b1a0 principal evaluation fails" +"2019-04-22 06:18:03.878 UTC [cauthdsl] func1 -> DEBU 4357 0xc00393b1a0 gate 1555913883872412200 evaluation fails" +"2019-04-22 06:18:03.881 UTC [policies] Evaluate -> DEBU 4358 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.881 UTC [policies] Evaluate -> DEBU 4359 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:03.881 UTC [policies] Evaluate -> DEBU 435a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:03.883 UTC [cauthdsl] func1 -> DEBU 435b 0xc00393ba00 gate 1555913883883228700 evaluation starts" +"2019-04-22 06:18:03.884 UTC [cauthdsl] func2 -> DEBU 435c 0xc00393ba00 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:03.885 UTC [cauthdsl] func2 -> DEBU 435d 0xc00393ba00 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:03.885 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 435e Checking if identity satisfies MEMBER role for Org2MSP" +"2019-04-22 06:18:03.885 UTC [msp] Validate -> DEBU 435f MSP Org2MSP validating identity" +"2019-04-22 06:18:03.886 UTC [msp] getCertificationChain -> DEBU 4360 MSP Org2MSP getting certification chain" +"2019-04-22 06:18:03.886 UTC [cauthdsl] func2 -> DEBU 4361 0xc00393ba00 principal matched by identity 0" +"2019-04-22 06:18:03.886 UTC [msp.identity] Verify -> DEBU 4362 Verify: digest = 00000000 52 65 b2 65 13 ad 29 fe a7 df e6 a3 fe 46 b8 5a |Re.e..)......F.Z| +00000010 51 81 8d 7b f4 c9 0c 74 d8 9c 87 80 d3 25 2d 5d |Q..{...t.....%-]|" +"2019-04-22 06:18:03.886 UTC [msp.identity] Verify -> DEBU 4363 Verify: sig = 00000000 30 44 02 20 7d 76 45 bc 9d 3c d1 6c 7c 56 53 2d |0D. }vE..<.l|VS-| +00000010 2d e2 b9 22 e5 7d 2b a9 23 02 b5 62 93 d4 e3 c4 |-..".}+.#..b....| +00000020 d7 51 0f 9d 02 20 78 19 56 1f fb f3 c9 19 75 9d |.Q... x.V.....u.| +00000030 3a da 14 70 e3 6f 43 2a 11 74 a7 e3 f7 76 28 98 |:..p.oC*.t...v(.| +00000040 32 38 47 55 33 a3 |28GU3.|" +"2019-04-22 06:18:03.887 UTC [cauthdsl] func2 -> DEBU 4364 0xc00393ba00 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:03.887 UTC [cauthdsl] func1 -> DEBU 4365 0xc00393ba00 gate 1555913883883228700 evaluation succeeds" +"2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4366 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4367 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4368 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:03.887 UTC [policies] Evaluate -> DEBU 4369 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:03.887 UTC [gossip.discovery] learnNewMembers -> DEBU 436a Entering: learnedMembers={[]}, deadMembers={[]}" +"2019-04-22 06:18:03.887 UTC [gossip.discovery] learnNewMembers -> DEBU 436b Exiting" +"2019-04-22 06:18:03.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 436c Exiting" +"2019-04-22 06:18:03.997 UTC [gossip.comm] func1 -> DEBU 436d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.998 UTC [gossip.gossip] handleMessage -> DEBU 436e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.998 UTC [gossip.pull] HandleMessage -> DEBU 436f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:03.999 UTC [msp] DeserializeIdentity -> DEBU 4370 Obtaining identity" +"2019-04-22 06:18:03.999 UTC [msp] DeserializeIdentity -> DEBU 4371 Obtaining identity" +"2019-04-22 06:18:04.000 UTC [msp] DeserializeIdentity -> DEBU 4372 Obtaining identity" +"2019-04-22 06:18:04.000 UTC [msp] DeserializeIdentity -> DEBU 4373 Obtaining identity" +"2019-04-22 06:18:04.001 UTC [msp] DeserializeIdentity -> DEBU 4374 Obtaining identity" +"2019-04-22 06:18:04.001 UTC [msp] DeserializeIdentity -> DEBU 4375 Obtaining identity" +"2019-04-22 06:18:04.002 UTC [gossip.pull] SendDigest -> DEBU 4376 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:04.002 UTC [gossip.gossip] handleMessage -> DEBU 4377 Exiting" +"2019-04-22 06:18:04.013 UTC [gossip.comm] func1 -> DEBU 4378 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.013 UTC [gossip.gossip] handleMessage -> DEBU 4379 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.013 UTC [gossip.gossip] handleMessage -> DEBU 437a Exiting" +"2019-04-22 06:18:04.013 UTC [gossip.discovery] handleMsgFromComm -> DEBU 437b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.014 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 437c Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:04.014 UTC [msp] DeserializeIdentity -> DEBU 437d Obtaining identity" +"2019-04-22 06:18:04.014 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 437e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 437f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.014 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4380 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.014 UTC [policies] Evaluate -> DEBU 4381 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.015 UTC [policies] Evaluate -> DEBU 4382 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.015 UTC [policies] Evaluate -> DEBU 4383 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.015 UTC [cauthdsl] func1 -> DEBU 4384 0xc000598aa0 gate 1555913884015405200 evaluation starts" +"2019-04-22 06:18:04.015 UTC [cauthdsl] func2 -> DEBU 4385 0xc000598aa0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.015 UTC [cauthdsl] func2 -> DEBU 4386 0xc000598aa0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.016 UTC [cauthdsl] func2 -> DEBU 4387 0xc000598aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.016 UTC [cauthdsl] func2 -> DEBU 4388 0xc000598aa0 principal evaluation fails" +"2019-04-22 06:18:04.016 UTC [cauthdsl] func1 -> DEBU 4389 0xc000598aa0 gate 1555913884015405200 evaluation fails" +"2019-04-22 06:18:04.016 UTC [policies] Evaluate -> DEBU 438a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.016 UTC [policies] Evaluate -> DEBU 438b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.016 UTC [policies] Evaluate -> DEBU 438c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.017 UTC [cauthdsl] func1 -> DEBU 438d 0xc000599340 gate 1555913884017036600 evaluation starts" +"2019-04-22 06:18:04.017 UTC [cauthdsl] func2 -> DEBU 438e 0xc000599340 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.017 UTC [cauthdsl] func2 -> DEBU 438f 0xc000599340 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.017 UTC [cauthdsl] func2 -> DEBU 4390 0xc000599340 principal matched by identity 0" +"2019-04-22 06:18:04.017 UTC [msp.identity] Verify -> DEBU 4391 Verify: digest = 00000000 12 f7 10 e3 40 90 66 a3 8e 8e 33 61 d9 23 85 97 |....@.f...3a.#..| +00000010 86 a2 4d b4 12 e0 9d 33 81 1d 41 3a f9 1c bb 9a |..M....3..A:....|" +"2019-04-22 06:18:04.017 UTC [msp.identity] Verify -> DEBU 4392 Verify: sig = 00000000 30 45 02 21 00 81 f1 26 25 90 1d c5 e5 28 3d e7 |0E.!...&%....(=.| +00000010 94 75 aa d8 15 aa 91 ee c2 63 c3 34 f1 6b 0e 66 |.u.......c.4.k.f| +00000020 d5 a6 78 9c ce 02 20 3a 96 1a a0 49 d9 0d 30 4c |..x... :...I..0L| +00000030 cb 07 a0 86 84 9b de c6 42 a4 31 a7 be 54 6b e9 |........B.1..Tk.| +00000040 5c 5c 00 20 60 7e df |\\. `~.|" +"2019-04-22 06:18:04.018 UTC [cauthdsl] func2 -> DEBU 4393 0xc000599340 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.018 UTC [cauthdsl] func1 -> DEBU 4394 0xc000599340 gate 1555913884017036600 evaluation succeeds" +"2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4395 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4397 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.018 UTC [policies] Evaluate -> DEBU 4398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.019 UTC [gossip.discovery] handleAliveMessage -> DEBU 4399 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.019 UTC [gossip.discovery] learnExistingMembers -> DEBU 439a Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439b updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 " +"2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439c Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 " +"2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439d Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:51 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:04.024 UTC [gossip.discovery] learnExistingMembers -> DEBU 439e Exiting" +"2019-04-22 06:18:04.025 UTC [gossip.discovery] handleAliveMessage -> DEBU 439f Exiting" +"2019-04-22 06:18:04.025 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43a0 Exiting" +"2019-04-22 06:18:04.025 UTC [gossip.discovery] sendMemResponse -> DEBU 43a1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:04.025 UTC [msp] DeserializeIdentity -> DEBU 43a2 Obtaining identity" +"2019-04-22 06:18:04.025 UTC [msp] DeserializeIdentity -> DEBU 43a3 Obtaining identity" +"2019-04-22 06:18:04.026 UTC [msp] DeserializeIdentity -> DEBU 43a4 Obtaining identity" +"2019-04-22 06:18:04.026 UTC [gossip.comm] Send -> DEBU 43a5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:04.026 UTC [gossip.discovery] sendMemResponse -> DEBU 43a6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:04.026 UTC [gossip.comm] sendToEndpoint -> DEBU 43a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.026 UTC [gossip.comm] sendToEndpoint -> DEBU 43a8 Exiting" +"2019-04-22 06:18:04.354 UTC [msp] DeserializeIdentity -> DEBU 43a9 Obtaining identity" +"2019-04-22 06:18:04.355 UTC [msp] DeserializeIdentity -> DEBU 43aa Obtaining identity" +"2019-04-22 06:18:04.356 UTC [gossip.comm] Send -> DEBU 43ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:18:04.357 UTC [gossip.comm] sendToEndpoint -> DEBU 43ac Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.357 UTC [gossip.comm] sendToEndpoint -> DEBU 43ad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.357 UTC [gossip.comm] createConnection -> DEBU 43af Entering peer1.org2.example.com:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:04.357 UTC [gossip.comm] createConnection -> DEBU 43b0 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:04.358 UTC [grpc] DialContext -> DEBU 43b1 parsed scheme: """ +"2019-04-22 06:18:04.359 UTC [grpc] DialContext -> DEBU 43b2 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:18:04.359 UTC [grpc] NewAddress -> DEBU 43b3 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-04-22 06:18:04.359 UTC [grpc] switchBalancer -> DEBU 43b4 ClientConn switching balancer to "pick_first"" +"2019-04-22 06:18:04.359 UTC [grpc] HandleSubConnStateChange -> DEBU 43b5 pickfirstBalancer: HandleSubConnStateChange: 0xc0042a0b40, CONNECTING" +"2019-04-22 06:18:04.357 UTC [gossip.comm] sendToEndpoint -> DEBU 43ae Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.359 UTC [gossip.comm] sendToEndpoint -> DEBU 43b6 Exiting" +"2019-04-22 06:18:04.362 UTC [grpc] DialContext -> DEBU 43b7 parsed scheme: """ +"2019-04-22 06:18:04.363 UTC [grpc] DialContext -> DEBU 43b8 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:18:04.363 UTC [grpc] NewAddress -> DEBU 43b9 ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-04-22 06:18:04.364 UTC [grpc] switchBalancer -> DEBU 43bc ClientConn switching balancer to "pick_first"" +"2019-04-22 06:18:04.363 UTC [grpc] HandleSubConnStateChange -> DEBU 43ba pickfirstBalancer: HandleSubConnStateChange: 0xc0042a0b40, READY" +"2019-04-22 06:18:04.364 UTC [msp] DeserializeIdentity -> DEBU 43bb Obtaining identity" +"2019-04-22 06:18:04.365 UTC [grpc] HandleSubConnStateChange -> DEBU 43bd pickfirstBalancer: HandleSubConnStateChange: 0xc00228e0b0, CONNECTING" +"2019-04-22 06:18:04.366 UTC [msp] DeserializeIdentity -> DEBU 43be Obtaining identity" +"2019-04-22 06:18:04.366 UTC [gossip.comm] Send -> DEBU 43bf Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes to 3 peers" +"2019-04-22 06:18:04.366 UTC [msp] DeserializeIdentity -> DEBU 43c0 Obtaining identity" +"2019-04-22 06:18:04.367 UTC [msp] DeserializeIdentity -> DEBU 43c1 Obtaining identity" +"2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c3 Exiting" +"2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:18:04.367 UTC [gossip.comm] sendToEndpoint -> DEBU 43c5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:18:04.368 UTC [gossip.comm] func1 -> DEBU 43c6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.368 UTC [gossip.gossip] handleMessage -> DEBU 43c7 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.368 UTC [msp] DeserializeIdentity -> DEBU 43c8 Obtaining identity" +"2019-04-22 06:18:04.368 UTC [msp.identity] Verify -> DEBU 43c9 Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:18:04.368 UTC [msp.identity] Verify -> DEBU 43ca Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:18:04.369 UTC [msp.identity] Verify -> DEBU 43cb Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:18:04.369 UTC [msp.identity] Verify -> DEBU 43cc Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:18:04.371 UTC [msp] DeserializeIdentity -> DEBU 43cd Obtaining identity" +"2019-04-22 06:18:04.371 UTC [msp] DeserializeIdentity -> DEBU 43ce Obtaining identity" +"2019-04-22 06:18:04.371 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.371 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43d1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.371 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43d2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.371 UTC [policies] Evaluate -> DEBU 43d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.371 UTC [policies] Evaluate -> DEBU 43d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.372 UTC [policies] Evaluate -> DEBU 43d5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.372 UTC [cauthdsl] func1 -> DEBU 43d6 0xc0026d8590 gate 1555913884372101600 evaluation starts" +"2019-04-22 06:18:04.372 UTC [cauthdsl] func2 -> DEBU 43d7 0xc0026d8590 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.372 UTC [cauthdsl] func2 -> DEBU 43d8 0xc0026d8590 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.372 UTC [cauthdsl] func2 -> DEBU 43d9 0xc0026d8590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.373 UTC [cauthdsl] func2 -> DEBU 43da 0xc0026d8590 principal evaluation fails" +"2019-04-22 06:18:04.373 UTC [cauthdsl] func1 -> DEBU 43db 0xc0026d8590 gate 1555913884372101600 evaluation fails" +"2019-04-22 06:18:04.373 UTC [policies] Evaluate -> DEBU 43dc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.373 UTC [policies] Evaluate -> DEBU 43dd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.374 UTC [policies] Evaluate -> DEBU 43de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.376 UTC [cauthdsl] func1 -> DEBU 43df 0xc0026d8dd0 gate 1555913884376834000 evaluation starts" +"2019-04-22 06:18:04.376 UTC [cauthdsl] func2 -> DEBU 43e0 0xc0026d8dd0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.377 UTC [cauthdsl] func2 -> DEBU 43e1 0xc0026d8dd0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.377 UTC [cauthdsl] func2 -> DEBU 43e2 0xc0026d8dd0 principal matched by identity 0" +"2019-04-22 06:18:04.377 UTC [msp.identity] Verify -> DEBU 43e3 Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:18:04.377 UTC [msp.identity] Verify -> DEBU 43e4 Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:18:04.377 UTC [cauthdsl] func2 -> DEBU 43e5 0xc0026d8dd0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.377 UTC [cauthdsl] func1 -> DEBU 43e6 0xc0026d8dd0 gate 1555913884376834000 evaluation succeeds" +"2019-04-22 06:18:04.377 UTC [policies] Evaluate -> DEBU 43e7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.377 UTC [policies] Evaluate -> DEBU 43e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.378 UTC [policies] Evaluate -> DEBU 43e9 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.378 UTC [policies] Evaluate -> DEBU 43ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.378 UTC [msp] DeserializeIdentity -> DEBU 43eb Obtaining identity" +"2019-04-22 06:18:04.378 UTC [msp] DeserializeIdentity -> DEBU 43ec Obtaining identity" +"2019-04-22 06:18:04.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.379 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43ee Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.379 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43ef Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.379 UTC [policies] Evaluate -> DEBU 43f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.380 UTC [policies] Evaluate -> DEBU 43f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.383 UTC [policies] Evaluate -> DEBU 43f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.383 UTC [cauthdsl] func1 -> DEBU 43f3 0xc0027025a0 gate 1555913884383467600 evaluation starts" +"2019-04-22 06:18:04.383 UTC [cauthdsl] func2 -> DEBU 43f4 0xc0027025a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.384 UTC [cauthdsl] func2 -> DEBU 43f5 0xc0027025a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.385 UTC [cauthdsl] func2 -> DEBU 43f6 0xc0027025a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.386 UTC [cauthdsl] func2 -> DEBU 43f7 0xc0027025a0 principal evaluation fails" +"2019-04-22 06:18:04.386 UTC [cauthdsl] func1 -> DEBU 43f8 0xc0027025a0 gate 1555913884383467600 evaluation fails" +"2019-04-22 06:18:04.387 UTC [policies] Evaluate -> DEBU 43f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.387 UTC [policies] Evaluate -> DEBU 43fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.387 UTC [policies] Evaluate -> DEBU 43fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.388 UTC [cauthdsl] func1 -> DEBU 43fc 0xc002702de0 gate 1555913884388102600 evaluation starts" +"2019-04-22 06:18:04.388 UTC [cauthdsl] func2 -> DEBU 43fd 0xc002702de0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.388 UTC [cauthdsl] func2 -> DEBU 43fe 0xc002702de0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.389 UTC [cauthdsl] func2 -> DEBU 43ff 0xc002702de0 principal matched by identity 0" +"2019-04-22 06:18:04.389 UTC [msp.identity] Verify -> DEBU 4400 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:04.389 UTC [msp.identity] Verify -> DEBU 4401 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:04.389 UTC [cauthdsl] func2 -> DEBU 4402 0xc002702de0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.389 UTC [cauthdsl] func1 -> DEBU 4403 0xc002702de0 gate 1555913884388102600 evaluation succeeds" +"2019-04-22 06:18:04.389 UTC [policies] Evaluate -> DEBU 4404 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.389 UTC [policies] Evaluate -> DEBU 4405 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 4406 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 4407 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.390 UTC [msp] DeserializeIdentity -> DEBU 4408 Obtaining identity" +"2019-04-22 06:18:04.390 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4409 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.390 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 440a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 440b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 440c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 440d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.390 UTC [cauthdsl] func1 -> DEBU 440e 0xc002703ec0 gate 1555913884390649800 evaluation starts" +"2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 440f 0xc002703ec0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 4410 0xc002703ec0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 4411 0xc002703ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.390 UTC [cauthdsl] func2 -> DEBU 4412 0xc002703ec0 principal evaluation fails" +"2019-04-22 06:18:04.390 UTC [cauthdsl] func1 -> DEBU 4413 0xc002703ec0 gate 1555913884390649800 evaluation fails" +"2019-04-22 06:18:04.390 UTC [policies] Evaluate -> DEBU 4414 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.391 UTC [policies] Evaluate -> DEBU 4415 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.391 UTC [policies] Evaluate -> DEBU 4416 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.391 UTC [cauthdsl] func1 -> DEBU 4417 0xc00319a700 gate 1555913884391240300 evaluation starts" +"2019-04-22 06:18:04.391 UTC [cauthdsl] func2 -> DEBU 4418 0xc00319a700 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.391 UTC [cauthdsl] func2 -> DEBU 4419 0xc00319a700 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.391 UTC [cauthdsl] func2 -> DEBU 441a 0xc00319a700 principal matched by identity 0" +"2019-04-22 06:18:04.391 UTC [msp.identity] Verify -> DEBU 441b Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:04.391 UTC [msp.identity] Verify -> DEBU 441c Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:04.392 UTC [cauthdsl] func2 -> DEBU 441d 0xc00319a700 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.392 UTC [cauthdsl] func1 -> DEBU 441e 0xc00319a700 gate 1555913884391240300 evaluation succeeds" +"2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 441f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 4420 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 4421 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.392 UTC [policies] Evaluate -> DEBU 4422 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.392 UTC [gossip.gossip] handleMessage -> DEBU 4423 Exiting" +"2019-04-22 06:18:04.371 UTC [msp.identity] Sign -> DEBU 43d0 Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:04.392 UTC [msp.identity] Sign -> DEBU 4424 Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:04.393 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4425 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.7:7051" +"2019-04-22 06:18:04.394 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4426 Received pki_id:"\206?\021Y;.\232ZW\340m\323~\303\377\245\255m\326\251\205\177\334\256\001@S\260\036^u\275" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\nKKI4V8h5lGCUHz1Hru252p4DN0hqwBD7oWqQ\n-----END CERTIFICATE-----\n" tls_cert_hash:"\237\262\024\265qQ\030\266\345l\031\372\373M!\r\013\304\313\244\210\313\221\302E\345\236Y(E\367\225" from 192.168.224.7:7051" +"2019-04-22 06:18:04.395 UTC [msp] DeserializeIdentity -> DEBU 4427 Obtaining identity" +"2019-04-22 06:18:04.395 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4428 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.395 UTC [msp] DeserializeIdentity -> DEBU 4429 Obtaining identity" +"2019-04-22 06:18:04.396 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 442a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.396 UTC [msp] DeserializeIdentity -> DEBU 442b Obtaining identity" +"2019-04-22 06:18:04.397 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 442c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 442d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.397 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 442e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.397 UTC [policies] Evaluate -> DEBU 442f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.398 UTC [policies] Evaluate -> DEBU 4430 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.398 UTC [policies] Evaluate -> DEBU 4431 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.398 UTC [cauthdsl] func1 -> DEBU 4432 0xc003d50ff0 gate 1555913884398533500 evaluation starts" +"2019-04-22 06:18:04.398 UTC [cauthdsl] func2 -> DEBU 4433 0xc003d50ff0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.398 UTC [cauthdsl] func2 -> DEBU 4434 0xc003d50ff0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.399 UTC [cauthdsl] func2 -> DEBU 4435 0xc003d50ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.399 UTC [cauthdsl] func2 -> DEBU 4436 0xc003d50ff0 principal evaluation fails" +"2019-04-22 06:18:04.399 UTC [cauthdsl] func1 -> DEBU 4437 0xc003d50ff0 gate 1555913884398533500 evaluation fails" +"2019-04-22 06:18:04.400 UTC [policies] Evaluate -> DEBU 4438 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.400 UTC [policies] Evaluate -> DEBU 4439 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.400 UTC [policies] Evaluate -> DEBU 443a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.401 UTC [cauthdsl] func1 -> DEBU 443b 0xc003d51830 gate 1555913884401125600 evaluation starts" +"2019-04-22 06:18:04.401 UTC [cauthdsl] func2 -> DEBU 443c 0xc003d51830 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.401 UTC [cauthdsl] func2 -> DEBU 443d 0xc003d51830 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.401 UTC [cauthdsl] func2 -> DEBU 443e 0xc003d51830 principal matched by identity 0" +"2019-04-22 06:18:04.402 UTC [msp.identity] Verify -> DEBU 443f Verify: digest = 00000000 70 aa bc 4f bc 50 80 f5 83 96 3a 8f 18 51 da ba |p..O.P....:..Q..| +00000010 57 a3 03 77 90 3a a1 65 f1 50 d2 f2 cd 9d 79 84 |W..w.:.e.P....y.|" +"2019-04-22 06:18:04.402 UTC [msp.identity] Verify -> DEBU 4440 Verify: sig = 00000000 30 45 02 21 00 f8 1c dd ee ee 35 ed 90 e9 35 95 |0E.!......5...5.| +00000010 79 3d 23 ee ad 34 24 ef 43 b3 7f bf 9c c2 6c 28 |y=#..4$.C.....l(| +00000020 7d 03 65 dc f7 02 20 57 24 73 12 bd 3a 4b 59 ec |}.e... W$s..:KY.| +00000030 2f ee bf 16 33 7c 84 b3 19 4d 98 05 38 d8 9c 89 |/...3|...M..8...| +00000040 89 2d a4 84 db 89 3c |.-....<|" +"2019-04-22 06:18:04.403 UTC [cauthdsl] func2 -> DEBU 4441 0xc003d51830 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.403 UTC [cauthdsl] func1 -> DEBU 4442 0xc003d51830 gate 1555913884401125600 evaluation succeeds" +"2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4443 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.403 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.403 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4447 Authenticated 192.168.224.7:7051" +"2019-04-22 06:18:04.403 UTC [gossip.comm] createConnection -> DEBU 4448 Exiting" +"2019-04-22 06:18:04.404 UTC [gossip.comm] sendToEndpoint -> DEBU 4449 Exiting" +"2019-04-22 06:18:04.404 UTC [gossip.comm] sendToEndpoint -> DEBU 444a Exiting" +"2019-04-22 06:18:04.406 UTC [gossip.comm] func1 -> DEBU 444b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.407 UTC [gossip.gossip] handleMessage -> DEBU 444c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 724 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.408 UTC [msp] DeserializeIdentity -> DEBU 444d Obtaining identity" +"2019-04-22 06:18:04.409 UTC [msp.identity] Verify -> DEBU 444e Verify: digest = 00000000 8f bd 7b 7c 6d d3 8f fe 3d 79 52 9e 4b d3 47 0d |..{|m...=yR.K.G.| +00000010 81 57 67 1c 1f 43 8d 19 bb 31 6b 85 ab 3f c4 6f |.Wg..C...1k..?.o|" +"2019-04-22 06:18:04.409 UTC [msp.identity] Verify -> DEBU 444f Verify: sig = 00000000 30 44 02 20 0c d8 85 d9 10 de 97 5c ab 38 e4 26 |0D. .......\.8.&| +00000010 87 82 5a 99 29 72 c9 f3 74 f3 89 71 b4 fc 08 f0 |..Z.)r..t..q....| +00000020 84 7d ee 68 02 20 16 a7 b4 96 9f a2 d9 8a 26 48 |.}.h. ........&H| +00000030 ff 23 ee 5b dc ee fa 46 eb 5d 09 4b d4 03 53 e9 |.#.[...F.].K..S.| +00000040 25 da d5 53 c3 69 |%..S.i|" +"2019-04-22 06:18:04.409 UTC [msp.identity] Verify -> DEBU 4450 Verify: digest = 00000000 c8 35 c1 2e 36 91 4b f2 8c cd a7 2d e7 19 50 c4 |.5..6.K....-..P.| +00000010 9f e0 56 26 a2 50 0a 38 e5 4d c1 a2 aa a0 0b 42 |..V&.P.8.M.....B|" +"2019-04-22 06:18:04.410 UTC [msp.identity] Verify -> DEBU 4451 Verify: sig = 00000000 30 44 02 20 3a 26 ff 6d f1 2c aa 5f f6 a0 57 92 |0D. :&.m.,._..W.| +00000010 ae d2 f2 d0 f4 4a ce 17 2d d9 5a cc 8a 23 28 fc |.....J..-.Z..#(.| +00000020 f2 04 4b de 02 20 0f 80 19 21 2f e4 d5 e7 8c 8d |..K.. ...!/.....| +00000030 98 26 5c 40 d8 f5 97 1d 74 70 c0 d2 36 5b 0d 9e |.&\@....tp..6[..| +00000040 0e 36 62 6e f2 98 |.6bn..|" +"2019-04-22 06:18:04.410 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" +"2019-04-22 06:18:04.411 UTC [msp] DeserializeIdentity -> DEBU 4453 Obtaining identity" +"2019-04-22 06:18:04.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4454 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4455 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4456 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.411 UTC [policies] Evaluate -> DEBU 4457 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.411 UTC [policies] Evaluate -> DEBU 4458 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.411 UTC [policies] Evaluate -> DEBU 4459 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.411 UTC [cauthdsl] func1 -> DEBU 445a 0xc003d36340 gate 1555913884411894900 evaluation starts" +"2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445b 0xc003d36340 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445c 0xc003d36340 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445d 0xc003d36340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.412 UTC [cauthdsl] func2 -> DEBU 445e 0xc003d36340 principal evaluation fails" +"2019-04-22 06:18:04.412 UTC [cauthdsl] func1 -> DEBU 445f 0xc003d36340 gate 1555913884411894900 evaluation fails" +"2019-04-22 06:18:04.412 UTC [policies] Evaluate -> DEBU 4460 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.412 UTC [policies] Evaluate -> DEBU 4461 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.413 UTC [policies] Evaluate -> DEBU 4462 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.413 UTC [cauthdsl] func1 -> DEBU 4463 0xc003d36b80 gate 1555913884413059000 evaluation starts" +"2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4464 0xc003d36b80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4465 0xc003d36b80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4466 0xc003d36b80 principal matched by identity 0" +"2019-04-22 06:18:04.413 UTC [msp.identity] Verify -> DEBU 4467 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:18:04.413 UTC [msp.identity] Verify -> DEBU 4468 Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:18:04.413 UTC [cauthdsl] func2 -> DEBU 4469 0xc003d36b80 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.413 UTC [cauthdsl] func1 -> DEBU 446a 0xc003d36b80 gate 1555913884413059000 evaluation succeeds" +"2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.414 UTC [policies] Evaluate -> DEBU 446e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.414 UTC [msp] DeserializeIdentity -> DEBU 446f Obtaining identity" +"2019-04-22 06:18:04.414 UTC [msp] DeserializeIdentity -> DEBU 4470 Obtaining identity" +"2019-04-22 06:18:04.415 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4471 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4472 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.415 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4473 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.415 UTC [policies] Evaluate -> DEBU 4474 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.415 UTC [policies] Evaluate -> DEBU 4475 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.415 UTC [policies] Evaluate -> DEBU 4476 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.415 UTC [cauthdsl] func1 -> DEBU 4477 0xc003390350 gate 1555913884415738800 evaluation starts" +"2019-04-22 06:18:04.415 UTC [cauthdsl] func2 -> DEBU 4478 0xc003390350 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.415 UTC [cauthdsl] func2 -> DEBU 4479 0xc003390350 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.415 UTC [cauthdsl] func2 -> DEBU 447a 0xc003390350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.416 UTC [cauthdsl] func2 -> DEBU 447b 0xc003390350 principal evaluation fails" +"2019-04-22 06:18:04.416 UTC [cauthdsl] func1 -> DEBU 447c 0xc003390350 gate 1555913884415738800 evaluation fails" +"2019-04-22 06:18:04.416 UTC [policies] Evaluate -> DEBU 447d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.416 UTC [policies] Evaluate -> DEBU 447e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.416 UTC [policies] Evaluate -> DEBU 447f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.416 UTC [cauthdsl] func1 -> DEBU 4480 0xc003390b90 gate 1555913884416903800 evaluation starts" +"2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4481 0xc003390b90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4482 0xc003390b90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4483 0xc003390b90 principal matched by identity 0" +"2019-04-22 06:18:04.417 UTC [msp.identity] Verify -> DEBU 4484 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:04.417 UTC [msp.identity] Verify -> DEBU 4485 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:04.417 UTC [cauthdsl] func2 -> DEBU 4486 0xc003390b90 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.417 UTC [cauthdsl] func1 -> DEBU 4487 0xc003390b90 gate 1555913884416903800 evaluation succeeds" +"2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 4488 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 4489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 448a Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.418 UTC [policies] Evaluate -> DEBU 448b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.419 UTC [msp] DeserializeIdentity -> DEBU 448c Obtaining identity" +"2019-04-22 06:18:04.422 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 448d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.423 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 448e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.423 UTC [policies] Evaluate -> DEBU 448f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.427 UTC [policies] Evaluate -> DEBU 4490 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 4491 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.428 UTC [cauthdsl] func1 -> DEBU 4492 0xc003391c70 gate 1555913884428146400 evaluation starts" +"2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4493 0xc003391c70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4494 0xc003391c70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4495 0xc003391c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.428 UTC [cauthdsl] func2 -> DEBU 4496 0xc003391c70 principal evaluation fails" +"2019-04-22 06:18:04.428 UTC [cauthdsl] func1 -> DEBU 4497 0xc003391c70 gate 1555913884428146400 evaluation fails" +"2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 4498 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 4499 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.428 UTC [policies] Evaluate -> DEBU 449a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.428 UTC [cauthdsl] func1 -> DEBU 449b 0xc00353e4b0 gate 1555913884428957800 evaluation starts" +"2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 449c 0xc00353e4b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 449d 0xc00353e4b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 449e 0xc00353e4b0 principal matched by identity 0" +"2019-04-22 06:18:04.429 UTC [msp.identity] Verify -> DEBU 449f Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:04.429 UTC [msp.identity] Verify -> DEBU 44a0 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:04.429 UTC [cauthdsl] func2 -> DEBU 44a1 0xc00353e4b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.429 UTC [cauthdsl] func1 -> DEBU 44a2 0xc00353e4b0 gate 1555913884428957800 evaluation succeeds" +"2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.429 UTC [policies] Evaluate -> DEBU 44a6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.429 UTC [gossip.gossip] handleMessage -> DEBU 44a7 Exiting" +"2019-04-22 06:18:04.434 UTC [grpc] HandleSubConnStateChange -> DEBU 44a8 pickfirstBalancer: HandleSubConnStateChange: 0xc00228e0b0, READY" +"2019-04-22 06:18:04.435 UTC [comm.grpc.server] 1 -> INFO 44a9 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:18:06.435Z grpc.peer_address=192.168.224.5:47726 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.4µs +"2019-04-22 06:18:04.436 UTC [msp.identity] Sign -> DEBU 44aa Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:04.437 UTC [msp.identity] Sign -> DEBU 44ab Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:04.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44ac Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 192.168.224.5:7051" +"2019-04-22 06:18:04.437 UTC [msp.identity] Sign -> DEBU 44ad Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:04.437 UTC [msp.identity] Sign -> DEBU 44ae Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:04.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44af Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:7051" +"2019-04-22 06:18:04.437 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44b0 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:47726" +"2019-04-22 06:18:04.437 UTC [msp.identity] Verify -> DEBU 44b1 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:18:04.437 UTC [msp.identity] Verify -> DEBU 44b2 Verify: sig = 00000000 30 45 02 21 00 89 33 a6 93 94 37 0d c2 f5 d8 1e |0E.!..3...7.....| +00000010 80 16 83 b8 ac 81 b2 d6 de e8 ff 41 ed 85 58 3e |...........A..X>| +00000020 9d 70 74 a5 40 02 20 33 2c 85 06 90 49 f5 79 b3 |.pt.@. 3,...I.y.| +00000030 2c 8a 00 e5 8a 86 d8 82 0d 8b 98 a3 14 8c bb 0e |,...............| +00000040 5a 6d e0 bf 80 87 6b |Zm....k|" +"2019-04-22 06:18:04.438 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44b3 Authenticated 192.168.224.5:7051" +"2019-04-22 06:18:04.438 UTC [gossip.comm] createConnection -> DEBU 44b4 Exiting" +"2019-04-22 06:18:04.438 UTC [gossip.comm] sendToEndpoint -> DEBU 44b5 Exiting" +"2019-04-22 06:18:04.438 UTC [gossip.comm] sendToEndpoint -> DEBU 44b6 Exiting" +"2019-04-22 06:18:04.440 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44b7 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:47726" +"2019-04-22 06:18:04.441 UTC [gossip.comm] func1 -> DEBU 44b8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.441 UTC [gossip.gossip] handleMessage -> DEBU 44b9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.441 UTC [msp.identity] Verify -> DEBU 44ba Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:18:04.441 UTC [msp.identity] Verify -> DEBU 44bb Verify: sig = 00000000 30 44 02 20 7f a1 2a 89 eb 9e ac ac d6 a0 84 5e |0D. ..*........^| +00000010 55 d1 2f 7f 2c 5c 41 f5 3c 1c cc 09 f5 ed da 82 |U./.,\A.<.......| +00000020 84 67 93 03 02 20 34 ca f1 c2 4f 7b 22 e4 bf 13 |.g... 4...O{"...| +00000030 f8 27 22 01 1e cd 27 07 aa a6 3d 6a c6 48 b2 f6 |.'"...'...=j.H..| +00000040 16 eb a5 87 73 d6 |....s.|" +"2019-04-22 06:18:04.441 UTC [msp] DeserializeIdentity -> DEBU 44bc Obtaining identity" +"2019-04-22 06:18:04.442 UTC [gossip.comm] authenticateRemotePeer -> DEBU 44bd Authenticated 192.168.224.5:47726" +"2019-04-22 06:18:04.442 UTC [gossip.comm] GossipStream -> DEBU 44be Servicing 192.168.224.5:47726" +"2019-04-22 06:18:04.442 UTC [gossip.comm] writeToStream -> DEBU 44bf Closing writing to stream" +"2019-04-22 06:18:04.442 UTC [gossip.comm] serviceConnection -> DEBU 44c0 Closing reading from stream" +"2019-04-22 06:18:04.442 UTC [msp] DeserializeIdentity -> DEBU 44c1 Obtaining identity" +"2019-04-22 06:18:04.442 UTC [gossip.comm] readFromStream -> DEBU 44c2 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 canceling read because closing" +"2019-04-22 06:18:04.442 UTC [gossip.comm] readFromStream -> DEBU 44c3 Got error, aborting: EOF" +"2019-04-22 06:18:04.442 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44c4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.442 UTC [gossip.comm] func2 -> DEBU 44c5 Client 192.168.224.5:47726 disconnected" +"2019-04-22 06:18:04.442 UTC [comm.grpc.server] 1 -> INFO 44c6 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:47726 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=5.2417ms +"2019-04-22 06:18:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.442 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44c8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.442 UTC [grpc] infof -> DEBU 44c9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:04.442 UTC [policies] Evaluate -> DEBU 44ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.442 UTC [gossip.comm] writeToStream -> DEBU 44cb Closing writing to stream" +"2019-04-22 06:18:04.442 UTC [policies] Evaluate -> DEBU 44cc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.443 UTC [policies] Evaluate -> DEBU 44cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.443 UTC [grpc] infof -> DEBU 44ce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:04.443 UTC [cauthdsl] func1 -> DEBU 44cf 0xc0031cea70 gate 1555913884443534400 evaluation starts" +"2019-04-22 06:18:04.443 UTC [cauthdsl] func2 -> DEBU 44d0 0xc0031cea70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.444 UTC [cauthdsl] func2 -> DEBU 44d1 0xc0031cea70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.444 UTC [cauthdsl] func2 -> DEBU 44d2 0xc0031cea70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.444 UTC [cauthdsl] func2 -> DEBU 44d3 0xc0031cea70 principal evaluation fails" +"2019-04-22 06:18:04.444 UTC [cauthdsl] func1 -> DEBU 44d4 0xc0031cea70 gate 1555913884443534400 evaluation fails" +"2019-04-22 06:18:04.444 UTC [policies] Evaluate -> DEBU 44d5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.444 UTC [policies] Evaluate -> DEBU 44d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.444 UTC [policies] Evaluate -> DEBU 44d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.445 UTC [cauthdsl] func1 -> DEBU 44d8 0xc0031cf2b0 gate 1555913884444924600 evaluation starts" +"2019-04-22 06:18:04.445 UTC [cauthdsl] func2 -> DEBU 44d9 0xc0031cf2b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.445 UTC [cauthdsl] func2 -> DEBU 44da 0xc0031cf2b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.445 UTC [cauthdsl] func2 -> DEBU 44db 0xc0031cf2b0 principal matched by identity 0" +"2019-04-22 06:18:04.445 UTC [msp.identity] Verify -> DEBU 44dc Verify: digest = 00000000 67 30 77 24 d9 64 18 7d 85 ac cc d1 3c b7 ca e4 |g0w$.d.}....<...| +00000010 5d fb 20 50 5c 8e a7 38 28 b2 d8 64 9c dc 94 ce |]. P\..8(..d....|" +"2019-04-22 06:18:04.445 UTC [msp.identity] Verify -> DEBU 44dd Verify: sig = 00000000 30 45 02 21 00 b2 d7 88 d6 4e 91 77 6c c3 17 72 |0E.!.....N.wl..r| +00000010 d4 3e 50 57 1a f5 aa e9 bf 85 36 18 92 19 87 b4 |.>PW......6.....| +00000020 d1 a0 c6 3e 19 02 20 43 86 a0 1b d2 86 10 21 84 |...>.. C......!.| +00000030 b8 eb da 0d 64 b0 af 2e 40 9f 82 2c 06 d3 e1 e4 |....d...@..,....| +00000040 8c 28 95 a0 78 ef 3a |.(..x.:|" +"2019-04-22 06:18:04.446 UTC [cauthdsl] func2 -> DEBU 44de 0xc0031cf2b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.446 UTC [cauthdsl] func1 -> DEBU 44df 0xc0031cf2b0 gate 1555913884444924600 evaluation succeeds" +"2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.446 UTC [policies] Evaluate -> DEBU 44e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.447 UTC [msp] DeserializeIdentity -> DEBU 44e4 Obtaining identity" +"2019-04-22 06:18:04.447 UTC [msp] DeserializeIdentity -> DEBU 44e5 Obtaining identity" +"2019-04-22 06:18:04.447 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44e6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.447 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44e7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.448 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44e8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.448 UTC [policies] Evaluate -> DEBU 44e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.448 UTC [policies] Evaluate -> DEBU 44ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.448 UTC [policies] Evaluate -> DEBU 44eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.448 UTC [cauthdsl] func1 -> DEBU 44ec 0xc0030d0a80 gate 1555913884448548200 evaluation starts" +"2019-04-22 06:18:04.448 UTC [cauthdsl] func2 -> DEBU 44ed 0xc0030d0a80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.448 UTC [cauthdsl] func2 -> DEBU 44ee 0xc0030d0a80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.449 UTC [cauthdsl] func2 -> DEBU 44ef 0xc0030d0a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.449 UTC [cauthdsl] func2 -> DEBU 44f0 0xc0030d0a80 principal evaluation fails" +"2019-04-22 06:18:04.449 UTC [cauthdsl] func1 -> DEBU 44f1 0xc0030d0a80 gate 1555913884448548200 evaluation fails" +"2019-04-22 06:18:04.449 UTC [policies] Evaluate -> DEBU 44f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.449 UTC [policies] Evaluate -> DEBU 44f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.449 UTC [policies] Evaluate -> DEBU 44f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.450 UTC [cauthdsl] func1 -> DEBU 44f5 0xc0030d12c0 gate 1555913884450102900 evaluation starts" +"2019-04-22 06:18:04.450 UTC [cauthdsl] func2 -> DEBU 44f6 0xc0030d12c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.450 UTC [cauthdsl] func2 -> DEBU 44f7 0xc0030d12c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.450 UTC [cauthdsl] func2 -> DEBU 44f8 0xc0030d12c0 principal matched by identity 0" +"2019-04-22 06:18:04.450 UTC [msp.identity] Verify -> DEBU 44f9 Verify: digest = 00000000 74 3c 97 a9 d7 24 df 30 2b 96 80 17 7f 9c 2b 44 |t<...$.0+.....+D| +00000010 96 00 63 6b 87 3f fd 90 bf 91 99 2e 24 57 ac 75 |..ck.?......$W.u|" +"2019-04-22 06:18:04.450 UTC [msp.identity] Verify -> DEBU 44fa Verify: sig = 00000000 30 44 02 20 7a 94 4b ac 09 68 1c ce db 6d 6f d7 |0D. z.K..h...mo.| +00000010 3f 68 4d c7 f9 8f 23 d4 54 f4 7c 5b fe fc 95 ed |?hM...#.T.|[....| +00000020 f3 be d2 2f 02 20 6c 94 1c a2 b5 40 98 4f 74 fe |.../. l....@.Ot.| +00000030 d6 73 14 5c c2 78 8d 2b aa 32 d9 df db df c7 2f |.s.\.x.+.2...../| +00000040 2b 88 59 07 24 0f |+.Y.$.|" +"2019-04-22 06:18:04.451 UTC [cauthdsl] func2 -> DEBU 44fb 0xc0030d12c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.451 UTC [cauthdsl] func1 -> DEBU 44fc 0xc0030d12c0 gate 1555913884450102900 evaluation succeeds" +"2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 44fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 44fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 44ff Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.451 UTC [policies] Evaluate -> DEBU 4500 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.452 UTC [msp.identity] Verify -> DEBU 4501 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:04.452 UTC [msp.identity] Verify -> DEBU 4502 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:04.452 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4503 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.453 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4504 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.453 UTC [policies] Evaluate -> DEBU 4505 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.453 UTC [policies] Evaluate -> DEBU 4506 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.453 UTC [policies] Evaluate -> DEBU 4507 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.453 UTC [msp] DeserializeIdentity -> DEBU 4508 Obtaining identity" +"2019-04-22 06:18:04.453 UTC [msp.identity] newIdentity -> DEBU 4509 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI +F3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX +LlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E +AwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du +NmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA== +-----END CERTIFICATE-----" +"2019-04-22 06:18:04.453 UTC [cauthdsl] func1 -> DEBU 450a 0xc00303e9c0 gate 1555913884453661300 evaluation starts" +"2019-04-22 06:18:04.453 UTC [cauthdsl] func2 -> DEBU 450b 0xc00303e9c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.453 UTC [cauthdsl] func2 -> DEBU 450c 0xc00303e9c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.453 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 450d Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:18:04.453 UTC [msp] Validate -> DEBU 450e MSP Org1MSP validating identity" +"2019-04-22 06:18:04.454 UTC [msp] getCertificationChain -> DEBU 450f MSP Org1MSP getting certification chain" +"2019-04-22 06:18:04.454 UTC [cauthdsl] func2 -> DEBU 4510 0xc00303e9c0 principal matched by identity 0" +"2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 4511 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 4512 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:04.454 UTC [cauthdsl] func2 -> DEBU 4513 0xc00303e9c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.454 UTC [cauthdsl] func1 -> DEBU 4514 0xc00303e9c0 gate 1555913884453661300 evaluation succeeds" +"2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4515 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4516 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4517 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.454 UTC [policies] Evaluate -> DEBU 4518 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 4519 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:04.454 UTC [msp.identity] Verify -> DEBU 451a Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:04.455 UTC [gossip.gossip] handleMessage -> DEBU 451b Exiting" +"2019-04-22 06:18:04.455 UTC [gossip.gossip] handleMessage -> DEBU 451c Entering, 192.168.224.5:47726 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800455044500 seq_num:1555913883801171000 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 70 bytes" +"2019-04-22 06:18:04.455 UTC [msp.identity] Verify -> DEBU 451d Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:04.455 UTC [msp.identity] Verify -> DEBU 451e Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:04.455 UTC [gossip.gossip] handleMessage -> DEBU 451f Exiting" +"2019-04-22 06:18:04.478 UTC [msp] DeserializeIdentity -> DEBU 4520 Obtaining identity" +"2019-04-22 06:18:04.478 UTC [msp] DeserializeIdentity -> DEBU 4521 Obtaining identity" +"2019-04-22 06:18:04.479 UTC [gossip.pull] Hello -> DEBU 4522 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:04.479 UTC [msp] DeserializeIdentity -> DEBU 4523 Obtaining identity" +"2019-04-22 06:18:04.480 UTC [msp] DeserializeIdentity -> DEBU 4524 Obtaining identity" +"2019-04-22 06:18:04.480 UTC [gossip.comm] Send -> DEBU 4525 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:04.481 UTC [gossip.comm] sendToEndpoint -> DEBU 4526 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.481 UTC [gossip.comm] createConnection -> DEBU 4527 Entering peer1.org1.example.com:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:04.482 UTC [grpc] DialContext -> DEBU 4528 parsed scheme: """ +"2019-04-22 06:18:04.483 UTC [grpc] DialContext -> DEBU 4529 scheme "" not registered, fallback to default scheme" +"2019-04-22 06:18:04.483 UTC [grpc] NewAddress -> DEBU 452a ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-04-22 06:18:04.483 UTC [grpc] switchBalancer -> DEBU 452b ClientConn switching balancer to "pick_first"" +"2019-04-22 06:18:04.483 UTC [grpc] HandleSubConnStateChange -> DEBU 452c pickfirstBalancer: HandleSubConnStateChange: 0xc003166da0, CONNECTING" +"2019-04-22 06:18:04.489 UTC [grpc] HandleSubConnStateChange -> DEBU 452d pickfirstBalancer: HandleSubConnStateChange: 0xc003166da0, READY" +"2019-04-22 06:18:04.491 UTC [msp.identity] Sign -> DEBU 452e Sign: plaintext: 180172F9060A20C4503D5F6D3B9C8CC4...CA1BF55694FF3B7B7E990518A2611E21 " +"2019-04-22 06:18:04.491 UTC [msp.identity] Sign -> DEBU 452f Sign: digest: 85FEBCF2F29CD02C2D15AEC09F1C5A904702FBB4563CC2585E1BE003B314BFAE " +"2019-04-22 06:18:04.491 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4530 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 192.168.224.5:7051" +"2019-04-22 06:18:04.492 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4531 Received pki_id:"\246\242\023\017\202\212\220l\366J\311m[|\340\231\243>}\237\274\305Ad\323\212z\311Q2b\247" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQYdC7tTAyYz1Ctt8/O1TLhTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA0MDEwODE0MDBaFw0yOTAzMjkwODE0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEURtd1SqKhXKI\nF3GmxoIeA4K3mhUXKW63x9DKvmGAzD5hFNcgaoyvM7dG6vdHTINqRFu4jM+BKmWX\nLlgMNRMR1aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZIzj0E\nAwIDSAAwRQIhANaepycsojfKvgPEMR1ZUM/G2cpG+E1RjhBK6RIcg9HoAiBZh5du\nNmMp7YF8ljxJLs6ozBwnEMSHAQOzN3Ij/2GyCA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\274\223\306Oo\366\224\r\252\221%!=\tPU\000a{\237\276\033\004\344]~\330\303\3157_7" from 192.168.224.5:7051" +"2019-04-22 06:18:04.494 UTC [msp.identity] Verify -> DEBU 4532 Verify: digest = 00000000 15 e3 8d 6a 28 c6 e9 26 bd b3 37 b0 df 63 be 5b |...j(..&..7..c.[| +00000010 14 32 c4 40 ff 90 cd 9f 39 00 d2 2e a2 19 72 67 |.2.@....9.....rg|" +"2019-04-22 06:18:04.494 UTC [msp.identity] Verify -> DEBU 4533 Verify: sig = 00000000 30 44 02 20 52 a6 62 a5 6c 8f 41 25 00 cc ce ed |0D. R.b.l.A%....| +00000010 61 df 85 6f fb 15 b2 d5 43 46 a2 cd 20 e6 6b 9e |a..o....CF.. .k.| +00000020 cf 92 b0 c6 02 20 11 3c f1 62 6a 52 c1 0a 09 61 |..... .<.bjR...a| +00000030 55 f7 bc 64 28 af 15 a3 3b 61 bd 6c c9 00 4b f0 |U..d(...;a.l..K.| +00000040 4e 52 57 8c b4 20 |NRW.. |" +"2019-04-22 06:18:04.495 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4534 Authenticated 192.168.224.5:7051" +"2019-04-22 06:18:04.495 UTC [gossip.comm] createConnection -> DEBU 4535 Exiting" +"2019-04-22 06:18:04.495 UTC [gossip.comm] sendToEndpoint -> DEBU 4536 Exiting" +"2019-04-22 06:18:04.497 UTC [gossip.comm] func1 -> DEBU 4537 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2555333910633718609 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.497 UTC [gossip.gossip] handleMessage -> DEBU 4538 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2555333910633718609 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.498 UTC [gossip.pull] HandleMessage -> DEBU 4539 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 2555333910633718609 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 60 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.498 UTC [gossip.gossip] handleMessage -> DEBU 453a Exiting" +"2019-04-22 06:18:04.614 UTC [gossip.comm] func1 -> DEBU 453b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.614 UTC [gossip.gossip] handleMessage -> DEBU 453c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.615 UTC [msp] DeserializeIdentity -> DEBU 453d Obtaining identity" +"2019-04-22 06:18:04.615 UTC [msp] DeserializeIdentity -> DEBU 453e Obtaining identity" +"2019-04-22 06:18:04.615 UTC [gossip.gossip] handleMessage -> DEBU 453f Exiting" +"2019-04-22 06:18:04.623 UTC [gossip.comm] func1 -> DEBU 4540 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.623 UTC [gossip.gossip] handleMessage -> DEBU 4541 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.623 UTC [msp.identity] Verify -> DEBU 4542 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:04.624 UTC [msp.identity] Verify -> DEBU 4543 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:04.624 UTC [msp] DeserializeIdentity -> DEBU 4544 Obtaining identity" +"2019-04-22 06:18:04.624 UTC [gossip.gossip] handleMessage -> DEBU 4545 Exiting" +"2019-04-22 06:18:04.624 UTC [gossip.comm] func1 -> DEBU 4546 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.624 UTC [gossip.gossip] handleMessage -> DEBU 4547 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.624 UTC [msp.identity] Verify -> DEBU 4548 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:04.625 UTC [msp.identity] Verify -> DEBU 4549 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:04.625 UTC [gossip.gossip] handleMessage -> DEBU 454a Exiting" +"2019-04-22 06:18:04.643 UTC [gossip.comm] func1 -> DEBU 454b Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.643 UTC [gossip.gossip] handleMessage -> DEBU 454c Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800712245600 seq_num:1555913883698770400 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.644 UTC [msp.identity] Verify -> DEBU 454d Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:04.644 UTC [msp.identity] Verify -> DEBU 454e Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:04.644 UTC [msp] DeserializeIdentity -> DEBU 454f Obtaining identity" +"2019-04-22 06:18:04.645 UTC [gossip.gossip] handleMessage -> DEBU 4550 Exiting" +"2019-04-22 06:18:04.666 UTC [gossip.comm] func1 -> DEBU 4551 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.667 UTC [gossip.gossip] handleMessage -> DEBU 4552 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.667 UTC [gossip.pull] HandleMessage -> DEBU 4553 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.668 UTC [gossip.pull] SendDigest -> DEBU 4554 Sending BLOCK_MSG digest: [6 8 1 3 5 9 2 4 7] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:04.668 UTC [gossip.gossip] handleMessage -> DEBU 4555 Exiting" +"2019-04-22 06:18:04.839 UTC [gossip.comm] func1 -> DEBU 4556 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.839 UTC [gossip.gossip] handleMessage -> DEBU 4557 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:04.840 UTC [msp] DeserializeIdentity -> DEBU 4558 Obtaining identity" +"2019-04-22 06:18:04.840 UTC [msp] DeserializeIdentity -> DEBU 4559 Obtaining identity" +"2019-04-22 06:18:04.840 UTC [msp] DeserializeIdentity -> DEBU 455a Obtaining identity" +"2019-04-22 06:18:04.841 UTC [gossip.gossip] handleMessage -> DEBU 455b Exiting" +"2019-04-22 06:18:04.843 UTC [gossip.comm] func1 -> DEBU 455c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913883657070400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.843 UTC [gossip.gossip] handleMessage -> DEBU 455d Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913800936181900 seq_num:1555913883657070400 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445 properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:04.843 UTC [msp] DeserializeIdentity -> DEBU 455e Obtaining identity" +"2019-04-22 06:18:04.844 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 455f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:04.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4560 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.844 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4561 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:04.844 UTC [policies] Evaluate -> DEBU 4562 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:04.844 UTC [policies] Evaluate -> DEBU 4563 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:04.844 UTC [policies] Evaluate -> DEBU 4564 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:04.844 UTC [cauthdsl] func1 -> DEBU 4565 0xc00316e1e0 gate 1555913884844788600 evaluation starts" +"2019-04-22 06:18:04.845 UTC [cauthdsl] func2 -> DEBU 4566 0xc00316e1e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.845 UTC [cauthdsl] func2 -> DEBU 4567 0xc00316e1e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.845 UTC [cauthdsl] func2 -> DEBU 4568 0xc00316e1e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:04.846 UTC [cauthdsl] func2 -> DEBU 4569 0xc00316e1e0 principal evaluation fails" +"2019-04-22 06:18:04.846 UTC [cauthdsl] func1 -> DEBU 456a 0xc00316e1e0 gate 1555913884844788600 evaluation fails" +"2019-04-22 06:18:04.846 UTC [policies] Evaluate -> DEBU 456b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.846 UTC [policies] Evaluate -> DEBU 456c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:04.847 UTC [policies] Evaluate -> DEBU 456d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:04.847 UTC [cauthdsl] func1 -> DEBU 456e 0xc00316ea20 gate 1555913884847572000 evaluation starts" +"2019-04-22 06:18:04.847 UTC [cauthdsl] func2 -> DEBU 456f 0xc00316ea20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:04.847 UTC [cauthdsl] func2 -> DEBU 4570 0xc00316ea20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:04.847 UTC [cauthdsl] func2 -> DEBU 4571 0xc00316ea20 principal matched by identity 0" +"2019-04-22 06:18:04.847 UTC [msp.identity] Verify -> DEBU 4572 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:04.848 UTC [msp.identity] Verify -> DEBU 4573 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:04.848 UTC [cauthdsl] func2 -> DEBU 4574 0xc00316ea20 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:04.848 UTC [cauthdsl] func1 -> DEBU 4575 0xc00316ea20 gate 1555913884847572000 evaluation succeeds" +"2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4576 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4577 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4578 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:04.849 UTC [policies] Evaluate -> DEBU 4579 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:04.849 UTC [msp] DeserializeIdentity -> DEBU 457a Obtaining identity" +"2019-04-22 06:18:04.850 UTC [gossip.gossip] handleMessage -> DEBU 457b Exiting" +"2019-04-22 06:18:05.052 UTC [gossip.comm] func1 -> DEBU 457c Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:05.052 UTC [gossip.gossip] handleMessage -> DEBU 457d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:05.052 UTC [msp] DeserializeIdentity -> DEBU 457e Obtaining identity" +"2019-04-22 06:18:05.053 UTC [msp] DeserializeIdentity -> DEBU 457f Obtaining identity" +"2019-04-22 06:18:05.053 UTC [msp] DeserializeIdentity -> DEBU 4580 Obtaining identity" +"2019-04-22 06:18:05.053 UTC [gossip.gossip] handleMessage -> DEBU 4581 Exiting" +"2019-04-22 06:18:05.060 UTC [gossip.comm] func1 -> DEBU 4582 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913883569847800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:05.060 UTC [gossip.gossip] handleMessage -> DEBU 4583 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555913801151065600 seq_num:1555913883569847800 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f properties:ledger_height:10 , Envelope: 98 bytes, Signature: 71 bytes" +"2019-04-22 06:18:05.060 UTC [msp] DeserializeIdentity -> DEBU 4584 Obtaining identity" +"2019-04-22 06:18:05.060 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4585 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:05.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4586 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:05.060 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4587 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4588 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4589 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 458a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:05.060 UTC [cauthdsl] func1 -> DEBU 458b 0xc000270c70 gate 1555913885060652400 evaluation starts" +"2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458c 0xc000270c70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458d 0xc000270c70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458e 0xc000270c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:05.060 UTC [cauthdsl] func2 -> DEBU 458f 0xc000270c70 principal evaluation fails" +"2019-04-22 06:18:05.060 UTC [cauthdsl] func1 -> DEBU 4590 0xc000270c70 gate 1555913885060652400 evaluation fails" +"2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4591 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:05.060 UTC [policies] Evaluate -> DEBU 4593 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:05.061 UTC [cauthdsl] func1 -> DEBU 4594 0xc0002714b0 gate 1555913885061022400 evaluation starts" +"2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 4595 0xc0002714b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 4596 0xc0002714b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 4597 0xc0002714b0 principal matched by identity 0" +"2019-04-22 06:18:05.061 UTC [msp.identity] Verify -> DEBU 4598 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:05.061 UTC [msp.identity] Verify -> DEBU 4599 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:05.061 UTC [cauthdsl] func2 -> DEBU 459a 0xc0002714b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:05.061 UTC [cauthdsl] func1 -> DEBU 459b 0xc0002714b0 gate 1555913885061022400 evaluation succeeds" +"2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:05.061 UTC [policies] Evaluate -> DEBU 459f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:05.061 UTC [msp] DeserializeIdentity -> DEBU 45a0 Obtaining identity" +"2019-04-22 06:18:05.061 UTC [gossip.gossip] handleMessage -> DEBU 45a1 Exiting" +"2019-04-22 06:18:05.808 UTC [msp.identity] Sign -> DEBU 45a2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151039 " +"2019-04-22 06:18:05.808 UTC [msp.identity] Sign -> DEBU 45a3 Sign: digest: C82B1AA13AE800FCD423D4AC2FF8FA1DA8679EAD5E5C1EF89D7557AD82CE2D51 " +"2019-04-22 06:18:05.808 UTC [msp.identity] Sign -> DEBU 45a4 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:05.809 UTC [msp.identity] Sign -> DEBU 45a5 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:05.809 UTC [gossip.discovery] periodicalSendAlive -> DEBU 45a6 Sleeping 5s" +"2019-04-22 06:18:05.812 UTC [msp] DeserializeIdentity -> DEBU 45a7 Obtaining identity" +"2019-04-22 06:18:05.813 UTC [msp] DeserializeIdentity -> DEBU 45a8 Obtaining identity" +"2019-04-22 06:18:05.814 UTC [msp] DeserializeIdentity -> DEBU 45a9 Obtaining identity" +"2019-04-22 06:18:05.814 UTC [gossip.comm] Send -> DEBU 45aa Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:05.815 UTC [gossip.comm] Send -> DEBU 45ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:05.815 UTC [gossip.comm] sendToEndpoint -> DEBU 45ac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:05.815 UTC [gossip.comm] sendToEndpoint -> DEBU 45ae Exiting" +"2019-04-22 06:18:05.815 UTC [msp] DeserializeIdentity -> DEBU 45ad Obtaining identity" +"2019-04-22 06:18:05.816 UTC [gossip.comm] Send -> DEBU 45af Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:05.816 UTC [gossip.comm] sendToEndpoint -> DEBU 45b0 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:05.817 UTC [gossip.comm] sendToEndpoint -> DEBU 45b1 Exiting" +"2019-04-22 06:18:05.817 UTC [gossip.comm] sendToEndpoint -> DEBU 45b2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:05.825 UTC [gossip.comm] sendToEndpoint -> DEBU 45b3 Exiting" +"2019-04-22 06:18:06.104 UTC [gossip.comm] func1 -> DEBU 45b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:06.104 UTC [gossip.gossip] handleMessage -> DEBU 45b5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:06.104 UTC [gossip.gossip] handleMessage -> DEBU 45b6 Exiting" +"2019-04-22 06:18:06.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:06.104 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45b8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:06.104 UTC [msp.identity] Verify -> DEBU 45b9 Verify: digest = 00000000 bb 46 f3 2d 26 d3 7f 95 59 b8 f8 d2 ed d9 81 2b |.F.-&...Y......+| +00000010 a4 a3 1b c6 c0 8b c1 5e ff 74 ec b1 d0 9c cc 1c |.......^.t......|" +"2019-04-22 06:18:06.104 UTC [msp.identity] Verify -> DEBU 45ba Verify: sig = 00000000 30 44 02 20 04 26 59 f5 e2 0c 27 b8 48 cd f0 52 |0D. .&Y...'.H..R| +00000010 fc 21 b1 09 9a 0d e2 c2 4b 62 61 81 c4 7a 7f 3a |.!......Kba..z.:| +00000020 90 21 9f f9 02 20 09 8e 2c 9e 1e 9e f2 5a da ec |.!... ..,....Z..| +00000030 cf cd 51 bd fb c1 e2 9d cb 6e 3a 7c aa 3c 9e c3 |..Q......n:|.<..| +00000040 d3 61 d3 ad 5c 0f |.a..\.|" +"2019-04-22 06:18:06.105 UTC [msp.identity] Verify -> DEBU 45bb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:06.105 UTC [msp.identity] Verify -> DEBU 45bc Verify: sig = 00000000 30 44 02 20 6c 49 d7 65 e5 85 bb e5 95 96 65 ef |0D. lI.e......e.| +00000010 49 ee 55 5d 80 ab 6a ea c2 e1 15 de 23 45 81 3a |I.U]..j.....#E.:| +00000020 db 5a d5 d1 02 20 69 6d 30 3d ba ac a0 05 22 41 |.Z... im0=...."A| +00000030 86 df 5c e8 69 61 a0 a5 03 40 77 33 94 9d 55 df |..\.ia...@w3..U.| +00000040 b3 c8 f1 b9 f6 f8 |......|" +"2019-04-22 06:18:06.105 UTC [gossip.discovery] handleAliveMessage -> DEBU 45bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45be Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45bf updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 " +"2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45c0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 " +"2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45c1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:55 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:06.105 UTC [gossip.discovery] learnExistingMembers -> DEBU 45c2 Exiting" +"2019-04-22 06:18:06.106 UTC [gossip.discovery] handleAliveMessage -> DEBU 45c3 Exiting" +"2019-04-22 06:18:06.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c4 Exiting" +"2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" +"2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c6 Obtaining identity" +"2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c7 Obtaining identity" +"2019-04-22 06:18:06.106 UTC [gossip.comm] Send -> DEBU 45c8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:06.106 UTC [msp] DeserializeIdentity -> DEBU 45c9 Obtaining identity" +"2019-04-22 06:18:06.107 UTC [gossip.comm] Send -> DEBU 45ca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45cb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45cc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45cd Exiting" +"2019-04-22 06:18:06.107 UTC [gossip.comm] sendToEndpoint -> DEBU 45ce Exiting" +"2019-04-22 06:18:06.112 UTC [gossip.comm] func1 -> DEBU 45cf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.112 UTC [gossip.gossip] handleMessage -> DEBU 45d0 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.112 UTC [gossip.gossip] handleMessage -> DEBU 45d1 Exiting" +"2019-04-22 06:18:06.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45d2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.113 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45d3 Exiting" +"2019-04-22 06:18:06.436 UTC [gossip.election] waitForInterrupt -> DEBU 45d4 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:18:06.437 UTC [gossip.election] IsLeader -> DEBU 45d5 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:18:06.438 UTC [msp.identity] Sign -> DEBU 45d6 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510121801 " +"2019-04-22 06:18:06.439 UTC [msp.identity] Sign -> DEBU 45d7 Sign: digest: A437F6D4E4090460EF7DF557B9502CDF2DC3D2213907175C025D06D6DEA7F362 " +"2019-04-22 06:18:06.439 UTC [gossip.election] waitForInterrupt -> DEBU 45d8 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:18:06.450 UTC [msp] DeserializeIdentity -> DEBU 45d9 Obtaining identity" +"2019-04-22 06:18:06.451 UTC [msp] DeserializeIdentity -> DEBU 45da Obtaining identity" +"2019-04-22 06:18:06.451 UTC [msp] DeserializeIdentity -> DEBU 45db Obtaining identity" +"2019-04-22 06:18:06.452 UTC [msp] DeserializeIdentity -> DEBU 45dc Obtaining identity" +"2019-04-22 06:18:06.452 UTC [gossip.comm] Send -> DEBU 45dd Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:06.453 UTC [msp] DeserializeIdentity -> DEBU 45de Obtaining identity" +"2019-04-22 06:18:06.453 UTC [msp] DeserializeIdentity -> DEBU 45df Obtaining identity" +"2019-04-22 06:18:06.453 UTC [gossip.comm] sendToEndpoint -> DEBU 45e0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:18 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:18:06.454 UTC [gossip.comm] sendToEndpoint -> DEBU 45e1 Exiting" +"2019-04-22 06:18:06.582 UTC [gossip.comm] func1 -> DEBU 45e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.582 UTC [gossip.gossip] handleMessage -> DEBU 45e3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.582 UTC [gossip.gossip] handleMessage -> DEBU 45e4 Exiting" +"2019-04-22 06:18:06.582 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.583 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 45e6 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:06.583 UTC [msp] DeserializeIdentity -> DEBU 45e7 Obtaining identity" +"2019-04-22 06:18:06.585 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:06.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45e9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:06.585 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45ea Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:06.585 UTC [policies] Evaluate -> DEBU 45eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:06.585 UTC [policies] Evaluate -> DEBU 45ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:06.585 UTC [policies] Evaluate -> DEBU 45ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:06.585 UTC [cauthdsl] func1 -> DEBU 45ee 0xc003bd03a0 gate 1555913886585648300 evaluation starts" +"2019-04-22 06:18:06.586 UTC [cauthdsl] func2 -> DEBU 45ef 0xc003bd03a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.586 UTC [cauthdsl] func2 -> DEBU 45f0 0xc003bd03a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:06.586 UTC [cauthdsl] func2 -> DEBU 45f1 0xc003bd03a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:06.587 UTC [cauthdsl] func2 -> DEBU 45f2 0xc003bd03a0 principal evaluation fails" +"2019-04-22 06:18:06.587 UTC [cauthdsl] func1 -> DEBU 45f3 0xc003bd03a0 gate 1555913886585648300 evaluation fails" +"2019-04-22 06:18:06.587 UTC [policies] Evaluate -> DEBU 45f4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.587 UTC [policies] Evaluate -> DEBU 45f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:06.587 UTC [policies] Evaluate -> DEBU 45f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:06.587 UTC [cauthdsl] func1 -> DEBU 45f7 0xc003bd0be0 gate 1555913886587773300 evaluation starts" +"2019-04-22 06:18:06.588 UTC [cauthdsl] func2 -> DEBU 45f8 0xc003bd0be0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:06.588 UTC [cauthdsl] func2 -> DEBU 45f9 0xc003bd0be0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:06.588 UTC [cauthdsl] func2 -> DEBU 45fa 0xc003bd0be0 principal matched by identity 0" +"2019-04-22 06:18:06.588 UTC [msp.identity] Verify -> DEBU 45fb Verify: digest = 00000000 7f 6a 55 64 fd fe 33 c8 5e 23 25 fc fb 89 40 46 |.jUd..3.^#%...@F| +00000010 10 d0 09 84 df 8a 6a e1 46 30 e2 d5 c4 9a 22 b7 |......j.F0....".|" +"2019-04-22 06:18:06.588 UTC [msp.identity] Verify -> DEBU 45fc Verify: sig = 00000000 30 44 02 20 51 cb b1 3e 05 9b d1 ed 2c ef 2e 26 |0D. Q..>....,..&| +00000010 5a 17 2a b4 a4 bd 16 c7 be 62 df c8 80 ab c4 0f |Z.*......b......| +00000020 b9 54 0e a8 02 20 4e f1 e2 26 db 96 db 64 74 97 |.T... N..&...dt.| +00000030 3e 01 43 70 c6 8a f5 9d 57 86 3a 0a aa cd b3 49 |>.Cp....W.:....I| +00000040 86 c6 c6 f0 0a d7 |......|" +"2019-04-22 06:18:06.589 UTC [cauthdsl] func2 -> DEBU 45fd 0xc003bd0be0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:06.589 UTC [cauthdsl] func1 -> DEBU 45fe 0xc003bd0be0 gate 1555913886587773300 evaluation succeeds" +"2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 45ff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 4600 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 4601 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:06.589 UTC [policies] Evaluate -> DEBU 4602 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:06.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 4603 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 4604 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4605 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 " +"2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4606 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 " +"2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4607 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:06.591 UTC [gossip.discovery] learnExistingMembers -> DEBU 4608 Exiting" +"2019-04-22 06:18:06.591 UTC [gossip.discovery] handleAliveMessage -> DEBU 4609 Exiting" +"2019-04-22 06:18:06.591 UTC [gossip.discovery] handleMsgFromComm -> DEBU 460a Exiting" +"2019-04-22 06:18:06.592 UTC [gossip.comm] func1 -> DEBU 460b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.593 UTC [gossip.gossip] handleMessage -> DEBU 460c Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.593 UTC [gossip.gossip] handleMessage -> DEBU 460d Exiting" +"2019-04-22 06:18:06.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 460e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.594 UTC [gossip.discovery] handleMsgFromComm -> DEBU 460f Exiting" +"2019-04-22 06:18:06.596 UTC [gossip.comm] func1 -> DEBU 4610 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.597 UTC [gossip.gossip] handleMessage -> DEBU 4611 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.597 UTC [gossip.gossip] handleMessage -> DEBU 4612 Exiting" +"2019-04-22 06:18:06.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4613 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.597 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4614 Exiting" +"2019-04-22 06:18:06.601 UTC [msp] DeserializeIdentity -> DEBU 4615 Obtaining identity" +"2019-04-22 06:18:06.602 UTC [msp] DeserializeIdentity -> DEBU 4616 Obtaining identity" +"2019-04-22 06:18:06.603 UTC [msp] DeserializeIdentity -> DEBU 4617 Obtaining identity" +"2019-04-22 06:18:06.603 UTC [msp] DeserializeIdentity -> DEBU 4618 Obtaining identity" +"2019-04-22 06:18:06.603 UTC [msp] DeserializeIdentity -> DEBU 4619 Obtaining identity" +"2019-04-22 06:18:06.604 UTC [msp] DeserializeIdentity -> DEBU 461a Obtaining identity" +"2019-04-22 06:18:06.604 UTC [msp] DeserializeIdentity -> DEBU 461b Obtaining identity" +"2019-04-22 06:18:06.605 UTC [gossip.comm] Send -> DEBU 461c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:06.605 UTC [msp] DeserializeIdentity -> DEBU 461d Obtaining identity" +"2019-04-22 06:18:06.606 UTC [msp] DeserializeIdentity -> DEBU 461e Obtaining identity" +"2019-04-22 06:18:06.606 UTC [gossip.comm] Send -> DEBU 461f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:06.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4620 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.607 UTC [gossip.comm] sendToEndpoint -> DEBU 4621 Exiting" +"2019-04-22 06:18:06.609 UTC [gossip.comm] sendToEndpoint -> DEBU 4622 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.610 UTC [gossip.comm] sendToEndpoint -> DEBU 4623 Exiting" +"2019-04-22 06:18:06.870 UTC [gossip.pull] Hello -> DEBU 4624 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:06.871 UTC [gossip.comm] Send -> DEBU 4625 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:06.871 UTC [gossip.pull] Hello -> DEBU 4626 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:18:06.871 UTC [gossip.comm] Send -> DEBU 4628 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:06.872 UTC [gossip.pull] Hello -> DEBU 4629 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:18:06.872 UTC [gossip.comm] Send -> DEBU 462b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:06.872 UTC [gossip.comm] sendToEndpoint -> DEBU 462c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.873 UTC [gossip.comm] sendToEndpoint -> DEBU 462d Exiting" +"2019-04-22 06:18:06.871 UTC [gossip.comm] sendToEndpoint -> DEBU 4627 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.872 UTC [gossip.comm] sendToEndpoint -> DEBU 462a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.874 UTC [gossip.comm] func1 -> DEBU 462f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5847558899932564495 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.874 UTC [gossip.comm] sendToEndpoint -> DEBU 462e Exiting" +"2019-04-22 06:18:06.875 UTC [gossip.comm] sendToEndpoint -> DEBU 4630 Exiting" +"2019-04-22 06:18:06.875 UTC [gossip.comm] func1 -> DEBU 4631 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10190551097248945473 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.877 UTC [gossip.comm] func1 -> DEBU 4632 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2170085643431276118 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.877 UTC [gossip.gossip] handleMessage -> DEBU 4633 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5847558899932564495 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.880 UTC [gossip.pull] HandleMessage -> DEBU 4634 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 5847558899932564495 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.881 UTC [gossip.gossip] handleMessage -> DEBU 4635 Exiting" +"2019-04-22 06:18:06.882 UTC [gossip.gossip] handleMessage -> DEBU 4636 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10190551097248945473 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.882 UTC [gossip.pull] HandleMessage -> DEBU 4637 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 10190551097248945473 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 154 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.883 UTC [gossip.gossip] handleMessage -> DEBU 4638 Exiting" +"2019-04-22 06:18:06.884 UTC [gossip.gossip] handleMessage -> DEBU 4639 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2170085643431276118 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.885 UTC [gossip.pull] HandleMessage -> DEBU 463a GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2170085643431276118 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.886 UTC [gossip.gossip] handleMessage -> DEBU 463b Exiting" +"2019-04-22 06:18:06.938 UTC [msp.identity] Sign -> DEBU 463c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103A " +"2019-04-22 06:18:06.938 UTC [msp.identity] Sign -> DEBU 463d Sign: digest: 0465A2942E7DEB2E43A5FD78C55C8C234CDB2837037E9A5945923A03FC039E00 " +"2019-04-22 06:18:06.939 UTC [msp.identity] Sign -> DEBU 463e Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:06.939 UTC [msp.identity] Sign -> DEBU 463f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:06.939 UTC [gossip.comm] Send -> DEBU 4640 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:06.940 UTC [msp] DeserializeIdentity -> DEBU 4641 Obtaining identity" +"2019-04-22 06:18:06.940 UTC [gossip.comm] Send -> DEBU 4642 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:06.940 UTC [msp] DeserializeIdentity -> DEBU 4643 Obtaining identity" +"2019-04-22 06:18:06.941 UTC [gossip.comm] Send -> DEBU 4644 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:06.941 UTC [gossip.comm] sendToEndpoint -> DEBU 4645 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4646 Exiting" +"2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4647 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4648 Exiting" +"2019-04-22 06:18:06.942 UTC [gossip.comm] sendToEndpoint -> DEBU 4649 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.943 UTC [gossip.comm] sendToEndpoint -> DEBU 464a Exiting" +"2019-04-22 06:18:06.947 UTC [gossip.comm] func1 -> DEBU 464b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.947 UTC [gossip.gossip] handleMessage -> DEBU 464d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.948 UTC [gossip.gossip] handleMessage -> DEBU 464e Exiting" +"2019-04-22 06:18:06.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 464f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4650 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:06.947 UTC [gossip.comm] func1 -> DEBU 464c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.949 UTC [gossip.gossip] handleMessage -> DEBU 4652 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.948 UTC [msp.identity] Verify -> DEBU 4651 Verify: digest = 00000000 04 65 a2 94 2e 7d eb 2e 43 a5 fd 78 c5 5c 8c 23 |.e...}..C..x.\.#| +00000010 4c db 28 37 03 7e 9a 59 45 92 3a 03 fc 03 9e 00 |L.(7.~.YE.:.....|" +"2019-04-22 06:18:06.949 UTC [gossip.comm] func1 -> DEBU 4653 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.949 UTC [msp.identity] Verify -> DEBU 4654 Verify: sig = 00000000 30 44 02 20 7d 65 5a 00 88 68 72 64 a6 1b 45 4e |0D. }eZ..hrd..EN| +00000010 46 df 28 7d 39 3e 5b 66 91 9c 44 4b 63 22 e1 37 |F.(}9>[f..DKc".7| +00000020 18 f0 55 b5 02 20 6a 6f 61 17 fd c5 f3 d8 46 42 |..U.. joa.....FB| +00000030 44 9d 6d 7b d6 2c 5a 56 93 1e 6d 97 4d 8e 8c 15 |D.m{.,ZV..m.M...| +00000040 3e 8e dd 19 0d 1f |>.....|" +"2019-04-22 06:18:06.951 UTC [msp.identity] Verify -> DEBU 4655 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:18:06.952 UTC [msp.identity] Verify -> DEBU 4656 Verify: sig = 00000000 30 44 02 20 6e 1c 7d 31 ad e7 8a 6f d3 03 89 21 |0D. n.}1...o...!| +00000010 03 76 cd a9 8c 41 85 be 7c 0c 2d 5e 6d fd c8 3c |.v...A..|.-^m..<| +00000020 ff a4 6b 4f 02 20 33 f7 56 f9 7e 49 74 eb 4b 9e |..kO. 3.V.~It.K.| +00000030 64 89 77 79 dd 0f 06 52 ce 42 23 74 be 38 38 f9 |d.wy...R.B#t.88.| +00000040 ef 56 b0 9e e0 79 |.V...y|" +"2019-04-22 06:18:06.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 4657 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:06.953 UTC [gossip.discovery] isSentByMe -> DEBU 4658 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:06.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4659 Exiting" +"2019-04-22 06:18:06.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 465a Exiting" +"2019-04-22 06:18:06.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 465b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.955 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 465d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:06.954 UTC [gossip.gossip] handleMessage -> DEBU 465c Exiting" +"2019-04-22 06:18:06.955 UTC [gossip.gossip] handleMessage -> DEBU 465e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.956 UTC [msp.identity] Verify -> DEBU 465f Verify: digest = 00000000 04 65 a2 94 2e 7d eb 2e 43 a5 fd 78 c5 5c 8c 23 |.e...}..C..x.\.#| +00000010 4c db 28 37 03 7e 9a 59 45 92 3a 03 fc 03 9e 00 |L.(7.~.YE.:.....|" +"2019-04-22 06:18:06.956 UTC [msp.identity] Verify -> DEBU 4660 Verify: sig = 00000000 30 44 02 20 7d 65 5a 00 88 68 72 64 a6 1b 45 4e |0D. }eZ..hrd..EN| +00000010 46 df 28 7d 39 3e 5b 66 91 9c 44 4b 63 22 e1 37 |F.(}9>[f..DKc".7| +00000020 18 f0 55 b5 02 20 6a 6f 61 17 fd c5 f3 d8 46 42 |..U.. joa.....FB| +00000030 44 9d 6d 7b d6 2c 5a 56 93 1e 6d 97 4d 8e 8c 15 |D.m{.,ZV..m.M...| +00000040 3e 8e dd 19 0d 1f |>.....|" +"2019-04-22 06:18:06.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 4661 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.957 UTC [gossip.discovery] isSentByMe -> DEBU 4662 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 4663 Exiting" +"2019-04-22 06:18:06.957 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4664 Exiting" +"2019-04-22 06:18:06.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4665 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-04-22 06:18:06.958 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4667 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:06.958 UTC [gossip.gossip] handleMessage -> DEBU 4666 Exiting" +"2019-04-22 06:18:06.959 UTC [msp.identity] Verify -> DEBU 4668 Verify: digest = 00000000 04 65 a2 94 2e 7d eb 2e 43 a5 fd 78 c5 5c 8c 23 |.e...}..C..x.\.#| +00000010 4c db 28 37 03 7e 9a 59 45 92 3a 03 fc 03 9e 00 |L.(7.~.YE.:.....|" +"2019-04-22 06:18:06.959 UTC [msp.identity] Verify -> DEBU 4669 Verify: sig = 00000000 30 44 02 20 7d 65 5a 00 88 68 72 64 a6 1b 45 4e |0D. }eZ..hrd..EN| +00000010 46 df 28 7d 39 3e 5b 66 91 9c 44 4b 63 22 e1 37 |F.(}9>[f..DKc".7| +00000020 18 f0 55 b5 02 20 6a 6f 61 17 fd c5 f3 d8 46 42 |..U.. joa.....FB| +00000030 44 9d 6d 7b d6 2c 5a 56 93 1e 6d 97 4d 8e 8c 15 |D.m{.,ZV..m.M...| +00000040 3e 8e dd 19 0d 1f |>.....|" +"2019-04-22 06:18:06.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 466a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.960 UTC [gossip.discovery] isSentByMe -> DEBU 466b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.960 UTC [gossip.discovery] handleAliveMessage -> DEBU 466c Exiting" +"2019-04-22 06:18:06.961 UTC [gossip.discovery] handleMsgFromComm -> DEBU 466d Exiting" +"2019-04-22 06:18:06.994 UTC [gossip.comm] func1 -> DEBU 466e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.995 UTC [gossip.gossip] handleMessage -> DEBU 466f Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.995 UTC [gossip.gossip] handleMessage -> DEBU 4670 Exiting" +"2019-04-22 06:18:06.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4671 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:06.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4672 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:06.997 UTC [msp] DeserializeIdentity -> DEBU 4673 Obtaining identity" +"2019-04-22 06:18:06.998 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4674 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:06.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4675 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:06.998 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4676 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:06.999 UTC [policies] Evaluate -> DEBU 4677 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:06.999 UTC [policies] Evaluate -> DEBU 4678 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.000 UTC [policies] Evaluate -> DEBU 4679 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:07.000 UTC [cauthdsl] func1 -> DEBU 467a 0xc003871d90 gate 1555913887000416200 evaluation starts" +"2019-04-22 06:18:07.000 UTC [cauthdsl] func2 -> DEBU 467b 0xc003871d90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.000 UTC [cauthdsl] func2 -> DEBU 467c 0xc003871d90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:07.001 UTC [cauthdsl] func2 -> DEBU 467d 0xc003871d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:07.001 UTC [cauthdsl] func2 -> DEBU 467e 0xc003871d90 principal evaluation fails" +"2019-04-22 06:18:07.002 UTC [cauthdsl] func1 -> DEBU 467f 0xc003871d90 gate 1555913887000416200 evaluation fails" +"2019-04-22 06:18:07.002 UTC [policies] Evaluate -> DEBU 4680 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.002 UTC [policies] Evaluate -> DEBU 4681 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.002 UTC [policies] Evaluate -> DEBU 4682 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:07.003 UTC [cauthdsl] func1 -> DEBU 4683 0xc003db85d0 gate 1555913887003074400 evaluation starts" +"2019-04-22 06:18:07.003 UTC [cauthdsl] func2 -> DEBU 4684 0xc003db85d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.004 UTC [cauthdsl] func2 -> DEBU 4686 0xc003db85d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:07.004 UTC [gossip.comm] func1 -> DEBU 4685 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.005 UTC [gossip.comm] func1 -> DEBU 4687 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.006 UTC [cauthdsl] func2 -> DEBU 4688 0xc003db85d0 principal matched by identity 0" +"2019-04-22 06:18:07.007 UTC [msp.identity] Verify -> DEBU 468a Verify: digest = 00000000 dc f2 24 ef 17 da 4c b1 6e 26 a0 47 70 3e ca c9 |..$...L.n&.Gp>..| +00000010 ee c2 89 7b b4 dc 2a be 6d ce 94 18 37 f1 fd bf |...{..*.m...7...|" +"2019-04-22 06:18:07.006 UTC [gossip.gossip] handleMessage -> DEBU 4689 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.007 UTC [msp.identity] Verify -> DEBU 468b Verify: sig = 00000000 30 44 02 20 2f c4 07 d6 b6 7e da ff 90 3e 1e 13 |0D. /....~...>..| +00000010 df e5 34 f0 9a b1 b2 19 98 38 0b fa 3d 07 77 c5 |..4......8..=.w.| +00000020 82 b5 2d bd 02 20 42 dd 7f 7b 69 3c f0 6f 80 ae |..-.. B..{i<.o..| +00000030 10 24 20 0d 62 11 3e 18 ce 0a 4c b4 a9 ce 84 8a |.$ .b.>...L.....| +00000040 0e ad 4a 0d 8f 77 |..J..w|" +"2019-04-22 06:18:07.008 UTC [cauthdsl] func2 -> DEBU 468c 0xc003db85d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:07.008 UTC [cauthdsl] func1 -> DEBU 468d 0xc003db85d0 gate 1555913887003074400 evaluation succeeds" +"2019-04-22 06:18:07.009 UTC [policies] Evaluate -> DEBU 468e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.009 UTC [policies] Evaluate -> DEBU 468f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.009 UTC [policies] Evaluate -> DEBU 4690 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:07.010 UTC [policies] Evaluate -> DEBU 4691 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:07.010 UTC [gossip.discovery] handleAliveMessage -> DEBU 4692 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.010 UTC [gossip.discovery] learnExistingMembers -> DEBU 4693 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:07.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 4694 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 " +"2019-04-22 06:18:07.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 4695 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 " +"2019-04-22 06:18:07.011 UTC [gossip.discovery] learnExistingMembers -> DEBU 4696 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:57 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:07.012 UTC [gossip.discovery] learnExistingMembers -> DEBU 4697 Exiting" +"2019-04-22 06:18:07.012 UTC [gossip.discovery] handleAliveMessage -> DEBU 4698 Exiting" +"2019-04-22 06:18:07.013 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4699 Exiting" +"2019-04-22 06:18:07.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 469a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.014 UTC [gossip.discovery] handleMsgFromComm -> DEBU 469c Exiting" +"2019-04-22 06:18:07.014 UTC [gossip.gossip] handleMessage -> DEBU 469b Exiting" +"2019-04-22 06:18:07.016 UTC [gossip.gossip] handleMessage -> DEBU 469d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.018 UTC [msp] DeserializeIdentity -> DEBU 469e Obtaining identity" +"2019-04-22 06:18:07.018 UTC [msp] DeserializeIdentity -> DEBU 46a0 Obtaining identity" +"2019-04-22 06:18:07.019 UTC [msp] DeserializeIdentity -> DEBU 46a1 Obtaining identity" +"2019-04-22 06:18:07.019 UTC [msp] DeserializeIdentity -> DEBU 46a2 Obtaining identity" +"2019-04-22 06:18:07.018 UTC [gossip.gossip] handleMessage -> DEBU 469f Exiting" +"2019-04-22 06:18:07.020 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46a4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.020 UTC [msp] DeserializeIdentity -> DEBU 46a3 Obtaining identity" +"2019-04-22 06:18:07.021 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46a5 Exiting" +"2019-04-22 06:18:07.022 UTC [msp] DeserializeIdentity -> DEBU 46a6 Obtaining identity" +"2019-04-22 06:18:07.026 UTC [msp] DeserializeIdentity -> DEBU 46a7 Obtaining identity" +"2019-04-22 06:18:07.028 UTC [gossip.comm] Send -> DEBU 46a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:07.029 UTC [gossip.comm] sendToEndpoint -> DEBU 46a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.029 UTC [gossip.comm] sendToEndpoint -> DEBU 46aa Exiting" +"2019-04-22 06:18:07.030 UTC [msp] DeserializeIdentity -> DEBU 46ab Obtaining identity" +"2019-04-22 06:18:07.032 UTC [gossip.comm] Send -> DEBU 46ac Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:07.033 UTC [gossip.comm] sendToEndpoint -> DEBU 46ad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:07.035 UTC [gossip.comm] sendToEndpoint -> DEBU 46ae Exiting" +"2019-04-22 06:18:07.110 UTC [gossip.comm] func1 -> DEBU 46af Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.110 UTC [gossip.gossip] handleMessage -> DEBU 46b0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.111 UTC [gossip.pull] HandleMessage -> DEBU 46b1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.111 UTC [gossip.pull] SendDigest -> DEBU 46b2 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:07.111 UTC [gossip.gossip] handleMessage -> DEBU 46b3 Exiting" +"2019-04-22 06:18:07.188 UTC [gossip.comm] func1 -> DEBU 46b4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.189 UTC [gossip.gossip] handleMessage -> DEBU 46b5 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.189 UTC [gossip.gossip] handleMessage -> DEBU 46b6 Exiting" +"2019-04-22 06:18:07.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 46b8 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:07.190 UTC [msp.identity] Verify -> DEBU 46b9 Verify: digest = 00000000 83 a2 05 c2 ad 79 97 67 08 0e ce 6c 53 3c b9 e4 |.....y.g...lS<..| +00000010 e3 b1 36 f6 48 23 16 bb 82 b2 1a ed 2e ac 00 e2 |..6.H#..........|" +"2019-04-22 06:18:07.190 UTC [msp.identity] Verify -> DEBU 46ba Verify: sig = 00000000 30 44 02 20 21 b8 9a 2d 93 d6 10 cd a2 04 1c 2f |0D. !..-......./| +00000010 e2 e9 f0 b5 b8 52 58 b4 a9 a5 17 a4 25 50 1e ac |.....RX.....%P..| +00000020 da 46 37 6f 02 20 0d 78 7c 81 51 90 0d a7 5b 23 |.F7o. .x|.Q...[#| +00000030 9a 6c 2b 97 20 79 88 80 bd 2d 4b 00 ee e0 e1 0c |.l+. y...-K.....| +00000040 46 18 c9 cd 07 21 |F....!|" +"2019-04-22 06:18:07.190 UTC [msp.identity] Verify -> DEBU 46bb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:07.191 UTC [msp.identity] Verify -> DEBU 46bc Verify: sig = 00000000 30 44 02 20 68 be 72 de 29 a7 2c ef 65 5e 28 44 |0D. h.r.).,.e^(D| +00000010 2d 87 56 77 3b 01 8d d9 41 56 5e a5 51 01 57 ac |-.Vw;...AV^.Q.W.| +00000020 13 89 13 12 02 20 48 7f d0 5b 6c 67 1b fa 55 1c |..... H..[lg..U.| +00000030 07 0e ba 77 fe b5 71 b1 2d e9 a6 00 ca 17 9b 47 |...w..q.-......G| +00000040 18 61 75 4d ea 6e |.auM.n|" +"2019-04-22 06:18:07.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 46bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:07.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 46be Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:18:07.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 46bf updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 " +"2019-04-22 06:18:07.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 46c0 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 " +"2019-04-22 06:18:07.192 UTC [gossip.discovery] learnExistingMembers -> DEBU 46c1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:07.193 UTC [gossip.discovery] learnExistingMembers -> DEBU 46c2 Exiting" +"2019-04-22 06:18:07.193 UTC [gossip.discovery] handleAliveMessage -> DEBU 46c3 Exiting" +"2019-04-22 06:18:07.193 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46c4 Exiting" +"2019-04-22 06:18:07.193 UTC [gossip.discovery] sendMemResponse -> DEBU 46c5 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:07.194 UTC [msp] DeserializeIdentity -> DEBU 46c6 Obtaining identity" +"2019-04-22 06:18:07.194 UTC [msp] DeserializeIdentity -> DEBU 46c7 Obtaining identity" +"2019-04-22 06:18:07.195 UTC [gossip.comm] Send -> DEBU 46c8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:07.195 UTC [gossip.discovery] sendMemResponse -> DEBU 46c9 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:18:07.195 UTC [gossip.comm] sendToEndpoint -> DEBU 46ca Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.195 UTC [gossip.comm] sendToEndpoint -> DEBU 46cb Exiting" +"2019-04-22 06:18:07.589 UTC [gossip.comm] func1 -> DEBU 46cc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.590 UTC [gossip.gossip] handleMessage -> DEBU 46cd Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.591 UTC [gossip.pull] HandleMessage -> DEBU 46ce GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.591 UTC [msp] DeserializeIdentity -> DEBU 46cf Obtaining identity" +"2019-04-22 06:18:07.591 UTC [msp] DeserializeIdentity -> DEBU 46d0 Obtaining identity" +"2019-04-22 06:18:07.592 UTC [msp] DeserializeIdentity -> DEBU 46d1 Obtaining identity" +"2019-04-22 06:18:07.592 UTC [msp] DeserializeIdentity -> DEBU 46d2 Obtaining identity" +"2019-04-22 06:18:07.592 UTC [msp] DeserializeIdentity -> DEBU 46d3 Obtaining identity" +"2019-04-22 06:18:07.593 UTC [msp] DeserializeIdentity -> DEBU 46d4 Obtaining identity" +"2019-04-22 06:18:07.593 UTC [gossip.pull] SendDigest -> DEBU 46d5 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:07.593 UTC [gossip.gossip] handleMessage -> DEBU 46d6 Exiting" +"2019-04-22 06:18:07.621 UTC [gossip.comm] func1 -> DEBU 46d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.621 UTC [gossip.gossip] handleMessage -> DEBU 46d8 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.622 UTC [gossip.gossip] handleMessage -> DEBU 46d9 Exiting" +"2019-04-22 06:18:07.622 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46da Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.623 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 46db Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:07.623 UTC [msp] DeserializeIdentity -> DEBU 46dc Obtaining identity" +"2019-04-22 06:18:07.624 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:07.624 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:07.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46df Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:07.625 UTC [policies] Evaluate -> DEBU 46e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:07.625 UTC [policies] Evaluate -> DEBU 46e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:07.625 UTC [policies] Evaluate -> DEBU 46e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:07.626 UTC [cauthdsl] func1 -> DEBU 46e3 0xc0042a9b10 gate 1555913887626003900 evaluation starts" +"2019-04-22 06:18:07.626 UTC [cauthdsl] func2 -> DEBU 46e4 0xc0042a9b10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.626 UTC [cauthdsl] func2 -> DEBU 46e5 0xc0042a9b10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:07.627 UTC [cauthdsl] func2 -> DEBU 46e6 0xc0042a9b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:07.627 UTC [cauthdsl] func2 -> DEBU 46e7 0xc0042a9b10 principal evaluation fails" +"2019-04-22 06:18:07.628 UTC [cauthdsl] func1 -> DEBU 46e8 0xc0042a9b10 gate 1555913887626003900 evaluation fails" +"2019-04-22 06:18:07.628 UTC [policies] Evaluate -> DEBU 46e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.628 UTC [policies] Evaluate -> DEBU 46ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:07.628 UTC [policies] Evaluate -> DEBU 46eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:07.628 UTC [cauthdsl] func1 -> DEBU 46ec 0xc0038d4350 gate 1555913887628909600 evaluation starts" +"2019-04-22 06:18:07.629 UTC [cauthdsl] func2 -> DEBU 46ed 0xc0038d4350 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:07.629 UTC [cauthdsl] func2 -> DEBU 46ee 0xc0038d4350 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:07.629 UTC [cauthdsl] func2 -> DEBU 46ef 0xc0038d4350 principal matched by identity 0" +"2019-04-22 06:18:07.629 UTC [msp.identity] Verify -> DEBU 46f0 Verify: digest = 00000000 0f 4e 3e 6b b8 91 4d 79 ee 12 6e e1 8f c3 60 d4 |.N>k..My..n...`.| +00000010 31 df 29 94 6f 73 23 ee 93 12 30 ad 44 4b eb 88 |1.).os#...0.DK..|" +"2019-04-22 06:18:07.629 UTC [msp.identity] Verify -> DEBU 46f1 Verify: sig = 00000000 30 45 02 21 00 8f 7c 0f ab 39 31 55 1e d6 84 1e |0E.!..|..91U....| +00000010 c2 09 9d f9 2a 99 2f c3 30 90 8f c6 9b d3 4c 9d |....*./.0.....L.| +00000020 ae b6 b7 3e f2 02 20 11 78 c6 16 af b2 04 a8 4b |...>.. .x......K| +00000030 19 fc f4 91 cd 3c 7b e8 ae f4 9e 69 17 3b b9 17 |.....<{....i.;..| +00000040 15 fd 2a 71 7e ee bf |..*q~..|" +"2019-04-22 06:18:07.630 UTC [cauthdsl] func2 -> DEBU 46f2 0xc0038d4350 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:07.630 UTC [cauthdsl] func1 -> DEBU 46f3 0xc0038d4350 gate 1555913887628909600 evaluation succeeds" +"2019-04-22 06:18:07.631 UTC [policies] Evaluate -> DEBU 46f4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.631 UTC [policies] Evaluate -> DEBU 46f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:07.632 UTC [policies] Evaluate -> DEBU 46f6 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:07.632 UTC [policies] Evaluate -> DEBU 46f7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:07.633 UTC [gossip.discovery] handleAliveMessage -> DEBU 46f8 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:07.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 46f9 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:07.633 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fa updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 " +"2019-04-22 06:18:07.634 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fb Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 " +"2019-04-22 06:18:07.634 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fc Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:07.635 UTC [gossip.discovery] learnExistingMembers -> DEBU 46fd Exiting" +"2019-04-22 06:18:07.635 UTC [gossip.discovery] handleAliveMessage -> DEBU 46fe Exiting" +"2019-04-22 06:18:07.635 UTC [gossip.discovery] handleMsgFromComm -> DEBU 46ff Exiting" +"2019-04-22 06:18:07.635 UTC [gossip.discovery] sendMemResponse -> DEBU 4700 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:07.636 UTC [msp] DeserializeIdentity -> DEBU 4701 Obtaining identity" +"2019-04-22 06:18:07.636 UTC [msp] DeserializeIdentity -> DEBU 4702 Obtaining identity" +"2019-04-22 06:18:07.637 UTC [msp] DeserializeIdentity -> DEBU 4703 Obtaining identity" +"2019-04-22 06:18:07.638 UTC [gossip.comm] Send -> DEBU 4704 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:07.639 UTC [gossip.discovery] sendMemResponse -> DEBU 4705 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:07.639 UTC [gossip.comm] sendToEndpoint -> DEBU 4706 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:07.640 UTC [gossip.comm] sendToEndpoint -> DEBU 4707 Exiting" +"2019-04-22 06:18:07.998 UTC [gossip.comm] func1 -> DEBU 4708 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.000 UTC [gossip.gossip] handleMessage -> DEBU 4709 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.000 UTC [gossip.pull] HandleMessage -> DEBU 470a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.000 UTC [msp] DeserializeIdentity -> DEBU 470b Obtaining identity" +"2019-04-22 06:18:08.001 UTC [msp] DeserializeIdentity -> DEBU 470c Obtaining identity" +"2019-04-22 06:18:08.002 UTC [msp] DeserializeIdentity -> DEBU 470d Obtaining identity" +"2019-04-22 06:18:08.002 UTC [msp] DeserializeIdentity -> DEBU 470e Obtaining identity" +"2019-04-22 06:18:08.003 UTC [msp] DeserializeIdentity -> DEBU 470f Obtaining identity" +"2019-04-22 06:18:08.003 UTC [msp] DeserializeIdentity -> DEBU 4710 Obtaining identity" +"2019-04-22 06:18:08.003 UTC [gossip.pull] SendDigest -> DEBU 4711 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:08.004 UTC [gossip.gossip] handleMessage -> DEBU 4712 Exiting" +"2019-04-22 06:18:08.017 UTC [gossip.comm] func1 -> DEBU 4713 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.017 UTC [gossip.gossip] handleMessage -> DEBU 4714 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.018 UTC [gossip.gossip] handleMessage -> DEBU 4715 Exiting" +"2019-04-22 06:18:08.018 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4716 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.018 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4717 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:08.022 UTC [msp] DeserializeIdentity -> DEBU 4718 Obtaining identity" +"2019-04-22 06:18:08.023 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4719 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:08.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 471a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 471b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.024 UTC [policies] Evaluate -> DEBU 471c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.024 UTC [policies] Evaluate -> DEBU 471d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.024 UTC [policies] Evaluate -> DEBU 471e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.024 UTC [cauthdsl] func1 -> DEBU 471f 0xc0038c9970 gate 1555913888024772400 evaluation starts" +"2019-04-22 06:18:08.024 UTC [cauthdsl] func2 -> DEBU 4720 0xc0038c9970 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.025 UTC [cauthdsl] func2 -> DEBU 4721 0xc0038c9970 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.025 UTC [cauthdsl] func2 -> DEBU 4722 0xc0038c9970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:08.025 UTC [cauthdsl] func2 -> DEBU 4723 0xc0038c9970 principal evaluation fails" +"2019-04-22 06:18:08.025 UTC [cauthdsl] func1 -> DEBU 4724 0xc0038c9970 gate 1555913888024772400 evaluation fails" +"2019-04-22 06:18:08.026 UTC [policies] Evaluate -> DEBU 4725 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.026 UTC [policies] Evaluate -> DEBU 4726 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.026 UTC [policies] Evaluate -> DEBU 4727 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.026 UTC [cauthdsl] func1 -> DEBU 4728 0xc003e781b0 gate 1555913888026771500 evaluation starts" +"2019-04-22 06:18:08.027 UTC [cauthdsl] func2 -> DEBU 4729 0xc003e781b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.027 UTC [cauthdsl] func2 -> DEBU 472a 0xc003e781b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.027 UTC [cauthdsl] func2 -> DEBU 472b 0xc003e781b0 principal matched by identity 0" +"2019-04-22 06:18:08.027 UTC [msp.identity] Verify -> DEBU 472c Verify: digest = 00000000 d2 ac 04 7c 81 1b 99 2b 43 f6 96 3c 35 32 27 b3 |...|...+C..<52'.| +00000010 e3 59 9d 9f b2 a2 ce 27 a1 55 83 87 cc 35 8c 23 |.Y.....'.U...5.#|" +"2019-04-22 06:18:08.028 UTC [msp.identity] Verify -> DEBU 472d Verify: sig = 00000000 30 45 02 21 00 82 30 03 be 61 4a 6f 1b d6 46 0d |0E.!..0..aJo..F.| +00000010 ec 09 5d ca 86 19 93 3f 48 8b bb 3d 9a de ea 7d |..]....?H..=...}| +00000020 d0 3a f2 c0 d0 02 20 36 69 6d 8d a4 e7 5a 56 5e |.:.... 6im...ZV^| +00000030 23 6d cd 69 49 df 90 35 f9 89 18 23 08 9b 9e c6 |#m.iI..5...#....| +00000040 96 7e b7 50 c6 64 ee |.~.P.d.|" +"2019-04-22 06:18:08.028 UTC [cauthdsl] func2 -> DEBU 472e 0xc003e781b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.028 UTC [cauthdsl] func1 -> DEBU 472f 0xc003e781b0 gate 1555913888026771500 evaluation succeeds" +"2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4730 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4731 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4732 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:08.029 UTC [policies] Evaluate -> DEBU 4733 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.029 UTC [gossip.discovery] handleAliveMessage -> DEBU 4734 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4735 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4736 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 " +"2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4737 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 " +"2019-04-22 06:18:08.030 UTC [gossip.discovery] learnExistingMembers -> DEBU 4738 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:58 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:08.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4739 Exiting" +"2019-04-22 06:18:08.031 UTC [gossip.discovery] handleAliveMessage -> DEBU 473a Exiting" +"2019-04-22 06:18:08.031 UTC [gossip.discovery] handleMsgFromComm -> DEBU 473b Exiting" +"2019-04-22 06:18:08.031 UTC [gossip.discovery] sendMemResponse -> DEBU 473c Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:08.032 UTC [msp] DeserializeIdentity -> DEBU 473d Obtaining identity" +"2019-04-22 06:18:08.032 UTC [msp] DeserializeIdentity -> DEBU 473e Obtaining identity" +"2019-04-22 06:18:08.032 UTC [msp] DeserializeIdentity -> DEBU 473f Obtaining identity" +"2019-04-22 06:18:08.033 UTC [gossip.comm] Send -> DEBU 4740 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:08.034 UTC [gossip.discovery] sendMemResponse -> DEBU 4741 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:08.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4742 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4743 Exiting" +"2019-04-22 06:18:08.353 UTC [msp] DeserializeIdentity -> DEBU 4744 Obtaining identity" +"2019-04-22 06:18:08.354 UTC [msp] DeserializeIdentity -> DEBU 4745 Obtaining identity" +"2019-04-22 06:18:08.354 UTC [gossip.comm] Send -> DEBU 4746 Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:18:08.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4747 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4748 Exiting" +"2019-04-22 06:18:08.358 UTC [gossip.comm] sendToEndpoint -> DEBU 4749 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.358 UTC [gossip.comm] sendToEndpoint -> DEBU 474a Exiting" +"2019-04-22 06:18:08.359 UTC [gossip.comm] func1 -> DEBU 474b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.360 UTC [gossip.gossip] handleMessage -> DEBU 474d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.361 UTC [msp] DeserializeIdentity -> DEBU 474f Obtaining identity" +"2019-04-22 06:18:08.362 UTC [msp] DeserializeIdentity -> DEBU 4750 Obtaining identity" +"2019-04-22 06:18:08.361 UTC [gossip.comm] func1 -> DEBU 474e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.355 UTC [gossip.comm] sendToEndpoint -> DEBU 474c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.363 UTC [msp] DeserializeIdentity -> DEBU 4751 Obtaining identity" +"2019-04-22 06:18:08.363 UTC [gossip.comm] sendToEndpoint -> DEBU 4752 Exiting" +"2019-04-22 06:18:08.364 UTC [gossip.comm] func1 -> DEBU 4753 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.365 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4754 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:08.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4755 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.366 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4756 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.366 UTC [policies] Evaluate -> DEBU 4757 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.367 UTC [policies] Evaluate -> DEBU 4758 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.368 UTC [policies] Evaluate -> DEBU 4759 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.368 UTC [cauthdsl] func1 -> DEBU 475a 0xc003edf2a0 gate 1555913888368944000 evaluation starts" +"2019-04-22 06:18:08.369 UTC [cauthdsl] func2 -> DEBU 475b 0xc003edf2a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.369 UTC [cauthdsl] func2 -> DEBU 475c 0xc003edf2a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.370 UTC [cauthdsl] func2 -> DEBU 475d 0xc003edf2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:08.370 UTC [cauthdsl] func2 -> DEBU 475e 0xc003edf2a0 principal evaluation fails" +"2019-04-22 06:18:08.370 UTC [cauthdsl] func1 -> DEBU 475f 0xc003edf2a0 gate 1555913888368944000 evaluation fails" +"2019-04-22 06:18:08.371 UTC [policies] Evaluate -> DEBU 4760 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.371 UTC [policies] Evaluate -> DEBU 4761 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.371 UTC [policies] Evaluate -> DEBU 4762 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.372 UTC [cauthdsl] func1 -> DEBU 4763 0xc003edfae0 gate 1555913888372104900 evaluation starts" +"2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4764 0xc003edfae0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4765 0xc003edfae0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4766 0xc003edfae0 principal matched by identity 0" +"2019-04-22 06:18:08.373 UTC [msp.identity] Verify -> DEBU 4767 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:08.373 UTC [msp.identity] Verify -> DEBU 4768 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:08.373 UTC [cauthdsl] func2 -> DEBU 4769 0xc003edfae0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.375 UTC [cauthdsl] func1 -> DEBU 476a 0xc003edfae0 gate 1555913888372104900 evaluation succeeds" +"2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:08.375 UTC [policies] Evaluate -> DEBU 476e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.376 UTC [msp.identity] Verify -> DEBU 476f Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:08.377 UTC [msp.identity] Verify -> DEBU 4770 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:08.378 UTC [msp.identity] Verify -> DEBU 4771 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:08.380 UTC [msp.identity] Verify -> DEBU 4772 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:08.382 UTC [msp] DeserializeIdentity -> DEBU 4773 Obtaining identity" +"2019-04-22 06:18:08.384 UTC [msp] DeserializeIdentity -> DEBU 4774 Obtaining identity" +"2019-04-22 06:18:08.389 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4775 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:08.389 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4776 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.390 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4777 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.390 UTC [policies] Evaluate -> DEBU 4778 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.391 UTC [policies] Evaluate -> DEBU 4779 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.391 UTC [policies] Evaluate -> DEBU 477a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.392 UTC [cauthdsl] func1 -> DEBU 477b 0xc002f640f0 gate 1555913888392452700 evaluation starts" +"2019-04-22 06:18:08.392 UTC [cauthdsl] func2 -> DEBU 477c 0xc002f640f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.393 UTC [cauthdsl] func2 -> DEBU 477d 0xc002f640f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.394 UTC [cauthdsl] func2 -> DEBU 477e 0xc002f640f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:08.396 UTC [cauthdsl] func2 -> DEBU 477f 0xc002f640f0 principal evaluation fails" +"2019-04-22 06:18:08.397 UTC [cauthdsl] func1 -> DEBU 4780 0xc002f640f0 gate 1555913888392452700 evaluation fails" +"2019-04-22 06:18:08.397 UTC [policies] Evaluate -> DEBU 4781 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.398 UTC [policies] Evaluate -> DEBU 4782 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.399 UTC [policies] Evaluate -> DEBU 4783 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.400 UTC [cauthdsl] func1 -> DEBU 4784 0xc002f64930 gate 1555913888400075700 evaluation starts" +"2019-04-22 06:18:08.400 UTC [cauthdsl] func2 -> DEBU 4785 0xc002f64930 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.401 UTC [cauthdsl] func2 -> DEBU 4786 0xc002f64930 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.402 UTC [cauthdsl] func2 -> DEBU 4787 0xc002f64930 principal matched by identity 0" +"2019-04-22 06:18:08.404 UTC [msp.identity] Verify -> DEBU 4788 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:08.407 UTC [msp.identity] Verify -> DEBU 4789 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:08.410 UTC [cauthdsl] func2 -> DEBU 478a 0xc002f64930 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.410 UTC [cauthdsl] func1 -> DEBU 478b 0xc002f64930 gate 1555913888400075700 evaluation succeeds" +"2019-04-22 06:18:08.411 UTC [policies] Evaluate -> DEBU 478c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.411 UTC [policies] Evaluate -> DEBU 478d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.412 UTC [policies] Evaluate -> DEBU 478e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:08.412 UTC [policies] Evaluate -> DEBU 478f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.413 UTC [gossip.gossip] handleMessage -> DEBU 4790 Exiting" +"2019-04-22 06:18:08.413 UTC [gossip.gossip] handleMessage -> DEBU 4791 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.414 UTC [msp] DeserializeIdentity -> DEBU 4792 Obtaining identity" +"2019-04-22 06:18:08.414 UTC [msp] DeserializeIdentity -> DEBU 4793 Obtaining identity" +"2019-04-22 06:18:08.414 UTC [msp] DeserializeIdentity -> DEBU 4794 Obtaining identity" +"2019-04-22 06:18:08.415 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4795 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:08.418 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4796 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.419 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4797 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.420 UTC [policies] Evaluate -> DEBU 4798 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.421 UTC [policies] Evaluate -> DEBU 4799 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.421 UTC [policies] Evaluate -> DEBU 479a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.422 UTC [cauthdsl] func1 -> DEBU 479b 0xc002f72440 gate 1555913888422370000 evaluation starts" +"2019-04-22 06:18:08.423 UTC [cauthdsl] func2 -> DEBU 479c 0xc002f72440 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.423 UTC [cauthdsl] func2 -> DEBU 479d 0xc002f72440 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.424 UTC [cauthdsl] func2 -> DEBU 479e 0xc002f72440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:08.424 UTC [cauthdsl] func2 -> DEBU 479f 0xc002f72440 principal evaluation fails" +"2019-04-22 06:18:08.425 UTC [cauthdsl] func1 -> DEBU 47a0 0xc002f72440 gate 1555913888422370000 evaluation fails" +"2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47a1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.425 UTC [cauthdsl] func1 -> DEBU 47a4 0xc002f72c80 gate 1555913888425495000 evaluation starts" +"2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47a5 0xc002f72c80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47a6 0xc002f72c80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47a7 0xc002f72c80 principal matched by identity 0" +"2019-04-22 06:18:08.425 UTC [msp.identity] Verify -> DEBU 47a8 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:08.425 UTC [msp.identity] Verify -> DEBU 47a9 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:08.425 UTC [cauthdsl] func2 -> DEBU 47aa 0xc002f72c80 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.425 UTC [cauthdsl] func1 -> DEBU 47ab 0xc002f72c80 gate 1555913888425495000 evaluation succeeds" +"2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47ac Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.425 UTC [policies] Evaluate -> DEBU 47ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.426 UTC [policies] Evaluate -> DEBU 47ae Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:08.426 UTC [policies] Evaluate -> DEBU 47af == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b0 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b1 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b2 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:08.426 UTC [msp.identity] Verify -> DEBU 47b3 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:08.426 UTC [msp] DeserializeIdentity -> DEBU 47b4 Obtaining identity" +"2019-04-22 06:18:08.426 UTC [msp] DeserializeIdentity -> DEBU 47b5 Obtaining identity" +"2019-04-22 06:18:08.427 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47b6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:08.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47b7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47b8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47bb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47bc 0xc003745290 gate 1555913888427231500 evaluation starts" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47bd 0xc003745290 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47be 0xc003745290 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47bf 0xc003745290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c0 0xc003745290 principal evaluation fails" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47c1 0xc003745290 gate 1555913888427231500 evaluation fails" +"2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47c5 0xc003745ad0 gate 1555913888427575100 evaluation starts" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c6 0xc003745ad0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c7 0xc003745ad0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47c8 0xc003745ad0 principal matched by identity 0" +"2019-04-22 06:18:08.427 UTC [msp.identity] Verify -> DEBU 47c9 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:08.427 UTC [msp.identity] Verify -> DEBU 47ca Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func2 -> DEBU 47cb 0xc003745ad0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.427 UTC [cauthdsl] func1 -> DEBU 47cc 0xc003745ad0 gate 1555913888427575100 evaluation succeeds" +"2019-04-22 06:18:08.427 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.428 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.428 UTC [policies] Evaluate -> DEBU 47cf Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:08.428 UTC [policies] Evaluate -> DEBU 47d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.428 UTC [gossip.gossip] handleMessage -> DEBU 47d1 Exiting" +"2019-04-22 06:18:08.428 UTC [gossip.gossip] handleMessage -> DEBU 47d2 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.428 UTC [msp.identity] Verify -> DEBU 47d3 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:08.428 UTC [msp.identity] Verify -> DEBU 47d4 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:08.431 UTC [msp.identity] Verify -> DEBU 47d5 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:08.432 UTC [msp.identity] Verify -> DEBU 47d6 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:08.432 UTC [msp] DeserializeIdentity -> DEBU 47d7 Obtaining identity" +"2019-04-22 06:18:08.433 UTC [msp] DeserializeIdentity -> DEBU 47d8 Obtaining identity" +"2019-04-22 06:18:08.434 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47d9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:08.434 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47da Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.435 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47db Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.435 UTC [policies] Evaluate -> DEBU 47dc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.435 UTC [policies] Evaluate -> DEBU 47dd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.435 UTC [policies] Evaluate -> DEBU 47de == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.436 UTC [cauthdsl] func1 -> DEBU 47df 0xc002760320 gate 1555913888436303400 evaluation starts" +"2019-04-22 06:18:08.436 UTC [cauthdsl] func2 -> DEBU 47e0 0xc002760320 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.436 UTC [cauthdsl] func2 -> DEBU 47e1 0xc002760320 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.436 UTC [cauthdsl] func2 -> DEBU 47e2 0xc002760320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:08.437 UTC [cauthdsl] func2 -> DEBU 47e3 0xc002760320 principal evaluation fails" +"2019-04-22 06:18:08.437 UTC [cauthdsl] func1 -> DEBU 47e4 0xc002760320 gate 1555913888436303400 evaluation fails" +"2019-04-22 06:18:08.437 UTC [policies] Evaluate -> DEBU 47e5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.437 UTC [policies] Evaluate -> DEBU 47e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.437 UTC [policies] Evaluate -> DEBU 47e7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.438 UTC [cauthdsl] func1 -> DEBU 47e8 0xc002760b60 gate 1555913888438680700 evaluation starts" +"2019-04-22 06:18:08.440 UTC [cauthdsl] func2 -> DEBU 47e9 0xc002760b60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.441 UTC [cauthdsl] func2 -> DEBU 47ea 0xc002760b60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.442 UTC [cauthdsl] func2 -> DEBU 47eb 0xc002760b60 principal matched by identity 0" +"2019-04-22 06:18:08.442 UTC [msp.identity] Verify -> DEBU 47ec Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:08.443 UTC [msp.identity] Verify -> DEBU 47ed Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:08.444 UTC [cauthdsl] func2 -> DEBU 47ee 0xc002760b60 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.444 UTC [cauthdsl] func1 -> DEBU 47ef 0xc002760b60 gate 1555913888438680700 evaluation succeeds" +"2019-04-22 06:18:08.444 UTC [policies] Evaluate -> DEBU 47f0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.444 UTC [policies] Evaluate -> DEBU 47f1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.444 UTC [policies] Evaluate -> DEBU 47f2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:08.445 UTC [policies] Evaluate -> DEBU 47f3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.445 UTC [msp] DeserializeIdentity -> DEBU 47f4 Obtaining identity" +"2019-04-22 06:18:08.445 UTC [msp] DeserializeIdentity -> DEBU 47f5 Obtaining identity" +"2019-04-22 06:18:08.446 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47f6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:08.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47f7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.446 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47f8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:08.447 UTC [policies] Evaluate -> DEBU 47f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:08.448 UTC [policies] Evaluate -> DEBU 47fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:08.448 UTC [policies] Evaluate -> DEBU 47fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:08.449 UTC [cauthdsl] func1 -> DEBU 47fc 0xc0027b8330 gate 1555913888449098700 evaluation starts" +"2019-04-22 06:18:08.449 UTC [cauthdsl] func2 -> DEBU 47fd 0xc0027b8330 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.450 UTC [cauthdsl] func2 -> DEBU 47fe 0xc0027b8330 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.451 UTC [cauthdsl] func2 -> DEBU 47ff 0xc0027b8330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:08.452 UTC [cauthdsl] func2 -> DEBU 4800 0xc0027b8330 principal evaluation fails" +"2019-04-22 06:18:08.453 UTC [cauthdsl] func1 -> DEBU 4801 0xc0027b8330 gate 1555913888449098700 evaluation fails" +"2019-04-22 06:18:08.453 UTC [policies] Evaluate -> DEBU 4802 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.455 UTC [policies] Evaluate -> DEBU 4803 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:08.455 UTC [policies] Evaluate -> DEBU 4804 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:08.456 UTC [cauthdsl] func1 -> DEBU 4805 0xc0027b8b70 gate 1555913888456050300 evaluation starts" +"2019-04-22 06:18:08.456 UTC [cauthdsl] func2 -> DEBU 4806 0xc0027b8b70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:08.456 UTC [cauthdsl] func2 -> DEBU 4807 0xc0027b8b70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:08.456 UTC [cauthdsl] func2 -> DEBU 4808 0xc0027b8b70 principal matched by identity 0" +"2019-04-22 06:18:08.457 UTC [msp.identity] Verify -> DEBU 4809 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:08.457 UTC [msp.identity] Verify -> DEBU 480a Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:08.457 UTC [cauthdsl] func2 -> DEBU 480b 0xc0027b8b70 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:08.458 UTC [cauthdsl] func1 -> DEBU 480c 0xc0027b8b70 gate 1555913888456050300 evaluation succeeds" +"2019-04-22 06:18:08.458 UTC [policies] Evaluate -> DEBU 480d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.458 UTC [policies] Evaluate -> DEBU 480e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:08.459 UTC [policies] Evaluate -> DEBU 480f Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:08.459 UTC [policies] Evaluate -> DEBU 4810 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:08.459 UTC [gossip.gossip] handleMessage -> DEBU 4811 Exiting" +"2019-04-22 06:18:08.482 UTC [msp] DeserializeIdentity -> DEBU 4812 Obtaining identity" +"2019-04-22 06:18:08.482 UTC [msp] DeserializeIdentity -> DEBU 4813 Obtaining identity" +"2019-04-22 06:18:08.483 UTC [gossip.pull] Hello -> DEBU 4814 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:08.483 UTC [msp] DeserializeIdentity -> DEBU 4815 Obtaining identity" +"2019-04-22 06:18:08.484 UTC [msp] DeserializeIdentity -> DEBU 4816 Obtaining identity" +"2019-04-22 06:18:08.484 UTC [gossip.comm] Send -> DEBU 4817 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:08.485 UTC [gossip.comm] sendToEndpoint -> DEBU 4818 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.485 UTC [gossip.comm] sendToEndpoint -> DEBU 4819 Exiting" +"2019-04-22 06:18:08.487 UTC [gossip.comm] func1 -> DEBU 481a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18002325364841574706 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.487 UTC [gossip.gossip] handleMessage -> DEBU 481b Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18002325364841574706 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.487 UTC [gossip.pull] HandleMessage -> DEBU 481c GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18002325364841574706 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 9 1 2 3 8], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.488 UTC [gossip.gossip] handleMessage -> DEBU 481d Exiting" +"2019-04-22 06:18:08.612 UTC [gossip.comm] func1 -> DEBU 481e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.612 UTC [gossip.gossip] handleMessage -> DEBU 481f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.612 UTC [msp] DeserializeIdentity -> DEBU 4820 Obtaining identity" +"2019-04-22 06:18:08.612 UTC [msp] DeserializeIdentity -> DEBU 4821 Obtaining identity" +"2019-04-22 06:18:08.613 UTC [gossip.gossip] handleMessage -> DEBU 4822 Exiting" +"2019-04-22 06:18:08.667 UTC [gossip.comm] func1 -> DEBU 4823 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.667 UTC [gossip.gossip] handleMessage -> DEBU 4824 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.668 UTC [gossip.pull] HandleMessage -> DEBU 4825 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.668 UTC [gossip.pull] SendDigest -> DEBU 4826 Sending BLOCK_MSG digest: [2 4 7 9 1 3 5 6 8] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:08.668 UTC [gossip.gossip] handleMessage -> DEBU 4827 Exiting" +"2019-04-22 06:18:08.836 UTC [gossip.comm] func1 -> DEBU 4828 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.836 UTC [gossip.gossip] handleMessage -> DEBU 4829 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:08.836 UTC [msp] DeserializeIdentity -> DEBU 482a Obtaining identity" +"2019-04-22 06:18:08.836 UTC [msp] DeserializeIdentity -> DEBU 482b Obtaining identity" +"2019-04-22 06:18:08.836 UTC [msp] DeserializeIdentity -> DEBU 482c Obtaining identity" +"2019-04-22 06:18:08.836 UTC [gossip.gossip] handleMessage -> DEBU 482d Exiting" +"2019-04-22 06:18:09.051 UTC [gossip.comm] func1 -> DEBU 482e Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:09.052 UTC [gossip.gossip] handleMessage -> DEBU 482f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:09.052 UTC [msp] DeserializeIdentity -> DEBU 4830 Obtaining identity" +"2019-04-22 06:18:09.055 UTC [msp] DeserializeIdentity -> DEBU 4831 Obtaining identity" +"2019-04-22 06:18:09.056 UTC [msp] DeserializeIdentity -> DEBU 4832 Obtaining identity" +"2019-04-22 06:18:09.056 UTC [gossip.gossip] handleMessage -> DEBU 4833 Exiting" +"2019-04-22 06:18:10.772 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 4834 Sleeping 25s" +"2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4835 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103B " +"2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4836 Sign: digest: DEE35CD0CAB71E326DD0EABEFE06AC245736C23CC26BA69D22B38F01DC4E1D90 " +"2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4837 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:10.810 UTC [msp.identity] Sign -> DEBU 4838 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:10.810 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4839 Sleeping 5s" +"2019-04-22 06:18:10.816 UTC [msp] DeserializeIdentity -> DEBU 483a Obtaining identity" +"2019-04-22 06:18:10.817 UTC [msp] DeserializeIdentity -> DEBU 483b Obtaining identity" +"2019-04-22 06:18:10.817 UTC [gossip.comm] Send -> DEBU 483c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:10.817 UTC [msp] DeserializeIdentity -> DEBU 483d Obtaining identity" +"2019-04-22 06:18:10.817 UTC [gossip.comm] sendToEndpoint -> DEBU 483e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:10.817 UTC [gossip.comm] sendToEndpoint -> DEBU 4840 Exiting" +"2019-04-22 06:18:10.817 UTC [gossip.comm] Send -> DEBU 483f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:10.818 UTC [msp] DeserializeIdentity -> DEBU 4841 Obtaining identity" +"2019-04-22 06:18:10.818 UTC [gossip.comm] sendToEndpoint -> DEBU 4842 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.818 UTC [gossip.comm] sendToEndpoint -> DEBU 4843 Exiting" +"2019-04-22 06:18:10.834 UTC [gossip.comm] Send -> DEBU 4844 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:10.836 UTC [gossip.comm] sendToEndpoint -> DEBU 4845 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.836 UTC [gossip.comm] sendToEndpoint -> DEBU 4846 Exiting" +"2019-04-22 06:18:10.838 UTC [gossip.comm] func1 -> DEBU 4847 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.842 UTC [gossip.gossip] handleMessage -> DEBU 4848 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.842 UTC [gossip.gossip] handleMessage -> DEBU 4849 Exiting" +"2019-04-22 06:18:10.842 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.843 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 484b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:10.843 UTC [msp.identity] Verify -> DEBU 484c Verify: digest = 00000000 de e3 5c d0 ca b7 1e 32 6d d0 ea be fe 06 ac 24 |..\....2m......$| +00000010 57 36 c2 3c c2 6b a6 9d 22 b3 8f 01 dc 4e 1d 90 |W6.<.k.."....N..|" +"2019-04-22 06:18:10.844 UTC [msp.identity] Verify -> DEBU 484d Verify: sig = 00000000 30 45 02 21 00 d7 3c d7 a8 a0 1c a9 62 de c4 c4 |0E.!..<.....b...| +00000010 e3 5a ff 74 be 17 c7 6a 50 1b 21 5b f7 c7 7b f5 |.Z.t...jP.![..{.| +00000020 ae 25 bd b4 f2 02 20 74 f7 8c 76 5d 9e 2e fe cf |.%.... t..v]....| +00000030 df 71 57 ff 7c c9 ea 95 f2 49 ca 75 d1 cd e3 72 |.qW.|....I.u...r| +00000040 90 98 2f f4 41 bd 37 |../.A.7|" +"2019-04-22 06:18:10.844 UTC [gossip.discovery] isSentByMe -> DEBU 484e Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 484f Exiting" +"2019-04-22 06:18:10.877 UTC [gossip.pull] Hello -> DEBU 4850 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:10.877 UTC [gossip.comm] Send -> DEBU 4851 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:10.877 UTC [gossip.pull] Hello -> DEBU 4852 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:18:10.877 UTC [gossip.comm] Send -> DEBU 4853 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:10.877 UTC [gossip.pull] Hello -> DEBU 4854 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:18:10.877 UTC [gossip.comm] Send -> DEBU 4855 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4856 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4857 Exiting" +"2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4858 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 4859 Exiting" +"2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 485a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.877 UTC [gossip.comm] sendToEndpoint -> DEBU 485b Exiting" +"2019-04-22 06:18:10.879 UTC [gossip.comm] func1 -> DEBU 485c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1921362074575652060 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.879 UTC [gossip.gossip] handleMessage -> DEBU 485d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1921362074575652060 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.879 UTC [gossip.pull] HandleMessage -> DEBU 485e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1921362074575652060 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.879 UTC [gossip.gossip] handleMessage -> DEBU 485f Exiting" +"2019-04-22 06:18:10.880 UTC [gossip.comm] func1 -> DEBU 4860 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3408879253475122900 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.880 UTC [gossip.gossip] handleMessage -> DEBU 4861 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3408879253475122900 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.880 UTC [gossip.pull] HandleMessage -> DEBU 4862 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3408879253475122900 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.880 UTC [gossip.gossip] handleMessage -> DEBU 4863 Exiting" +"2019-04-22 06:18:10.882 UTC [gossip.comm] func1 -> DEBU 4864 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3702341060551438682 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.882 UTC [gossip.gossip] handleMessage -> DEBU 4865 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3702341060551438682 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.882 UTC [gossip.pull] HandleMessage -> DEBU 4866 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 3702341060551438682 , Msg_type: IDENTITY_MSG, digests: [863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.882 UTC [gossip.gossip] handleMessage -> DEBU 4867 Exiting" +"2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 4868 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103C " +"2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 4869 Sign: digest: 9B3AB46E7DD83DBA34978418BF4C28EECFA482AA295EB36F1D8853D4B08FFBDC " +"2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 486a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:10.942 UTC [msp.identity] Sign -> DEBU 486b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:10.942 UTC [gossip.comm] Send -> DEBU 486c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:10.943 UTC [msp] DeserializeIdentity -> DEBU 486d Obtaining identity" +"2019-04-22 06:18:10.943 UTC [gossip.comm] Send -> DEBU 486e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:10.943 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" +"2019-04-22 06:18:10.943 UTC [gossip.comm] Send -> DEBU 4870 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4871 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4872 Exiting" +"2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4873 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.943 UTC [gossip.comm] sendToEndpoint -> DEBU 4874 Exiting" +"2019-04-22 06:18:10.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4875 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4876 Exiting" +"2019-04-22 06:18:10.963 UTC [gossip.comm] func1 -> DEBU 4877 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.963 UTC [gossip.gossip] handleMessage -> DEBU 4878 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.963 UTC [gossip.gossip] handleMessage -> DEBU 4879 Exiting" +"2019-04-22 06:18:10.963 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.963 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 487b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:10.964 UTC [gossip.comm] func1 -> DEBU 487c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.964 UTC [gossip.gossip] handleMessage -> DEBU 487d Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.964 UTC [msp.identity] Verify -> DEBU 487e Verify: digest = 00000000 9b 3a b4 6e 7d d8 3d ba 34 97 84 18 bf 4c 28 ee |.:.n}.=.4....L(.| +00000010 cf a4 82 aa 29 5e b3 6f 1d 88 53 d4 b0 8f fb dc |....)^.o..S.....|" +"2019-04-22 06:18:10.964 UTC [msp.identity] Verify -> DEBU 487f Verify: sig = 00000000 30 45 02 21 00 ef 93 01 3e f6 06 2e 0b 8f 47 ab |0E.!....>.....G.| +00000010 f2 e0 01 fc f9 37 ab cf 6e 6b 22 a7 6e aa cc 91 |.....7..nk".n...| +00000020 0b 63 20 7a fd 02 20 06 28 1f 7d 4b 21 d6 4b b3 |.c z.. .(.}K!.K.| +00000030 6e 71 84 25 0b f0 f3 26 c7 f3 e9 8c d7 16 3d 11 |nq.%...&......=.| +00000040 5e 2c cd 9c 6d ae 71 |^,..m.q|" +"2019-04-22 06:18:10.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 4880 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.965 UTC [gossip.discovery] isSentByMe -> DEBU 4881 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.965 UTC [gossip.discovery] handleAliveMessage -> DEBU 4882 Exiting" +"2019-04-22 06:18:10.965 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4883 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:10.965 UTC [msp] DeserializeIdentity -> DEBU 4884 Obtaining identity" +"2019-04-22 06:18:10.965 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4885 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4886 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:10.965 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4887 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4888 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4889 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 488a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:10.966 UTC [cauthdsl] func1 -> DEBU 488b 0xc003c213f0 gate 1555913890966378900 evaluation starts" +"2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488c 0xc003c213f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488d 0xc003c213f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488e 0xc003c213f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:10.966 UTC [cauthdsl] func2 -> DEBU 488f 0xc003c213f0 principal evaluation fails" +"2019-04-22 06:18:10.966 UTC [cauthdsl] func1 -> DEBU 4890 0xc003c213f0 gate 1555913890966378900 evaluation fails" +"2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4891 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4892 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:10.966 UTC [policies] Evaluate -> DEBU 4893 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:10.967 UTC [cauthdsl] func1 -> DEBU 4894 0xc003c21c30 gate 1555913890967025400 evaluation starts" +"2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 4895 0xc003c21c30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 4896 0xc003c21c30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 4897 0xc003c21c30 principal matched by identity 0" +"2019-04-22 06:18:10.967 UTC [msp.identity] Verify -> DEBU 4898 Verify: digest = 00000000 d2 ac 04 7c 81 1b 99 2b 43 f6 96 3c 35 32 27 b3 |...|...+C..<52'.| +00000010 e3 59 9d 9f b2 a2 ce 27 a1 55 83 87 cc 35 8c 23 |.Y.....'.U...5.#|" +"2019-04-22 06:18:10.967 UTC [msp.identity] Verify -> DEBU 4899 Verify: sig = 00000000 30 45 02 21 00 82 30 03 be 61 4a 6f 1b d6 46 0d |0E.!..0..aJo..F.| +00000010 ec 09 5d ca 86 19 93 3f 48 8b bb 3d 9a de ea 7d |..]....?H..=...}| +00000020 d0 3a f2 c0 d0 02 20 36 69 6d 8d a4 e7 5a 56 5e |.:.... 6im...ZV^| +00000030 23 6d cd 69 49 df 90 35 f9 89 18 23 08 9b 9e c6 |#m.iI..5...#....| +00000040 96 7e b7 50 c6 64 ee |.~.P.d.|" +"2019-04-22 06:18:10.967 UTC [cauthdsl] func2 -> DEBU 489a 0xc003c21c30 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:10.967 UTC [cauthdsl] func1 -> DEBU 489b 0xc003c21c30 gate 1555913890967025400 evaluation succeeds" +"2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:10.968 UTC [policies] Evaluate -> DEBU 489f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:10.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.968 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a1 Exiting" +"2019-04-22 06:18:10.975 UTC [gossip.comm] func1 -> DEBU 48a2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.975 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48a3 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:10.975 UTC [msp.identity] Verify -> DEBU 48a4 Verify: digest = 00000000 83 a2 05 c2 ad 79 97 67 08 0e ce 6c 53 3c b9 e4 |.....y.g...lS<..| +00000010 e3 b1 36 f6 48 23 16 bb 82 b2 1a ed 2e ac 00 e2 |..6.H#..........|" +"2019-04-22 06:18:10.975 UTC [msp.identity] Verify -> DEBU 48a5 Verify: sig = 00000000 30 44 02 20 21 b8 9a 2d 93 d6 10 cd a2 04 1c 2f |0D. !..-......./| +00000010 e2 e9 f0 b5 b8 52 58 b4 a9 a5 17 a4 25 50 1e ac |.....RX.....%P..| +00000020 da 46 37 6f 02 20 0d 78 7c 81 51 90 0d a7 5b 23 |.F7o. .x|.Q...[#| +00000030 9a 6c 2b 97 20 79 88 80 bd 2d 4b 00 ee e0 e1 0c |.l+. y...-K.....| +00000040 46 18 c9 cd 07 21 |F....!|" +"2019-04-22 06:18:10.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a6 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:10.976 UTC [gossip.discovery] handleAliveMessage -> DEBU 48a7 Exiting" +"2019-04-22 06:18:10.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48a8 Exiting" +"2019-04-22 06:18:10.976 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48a9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.976 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48aa Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:10.976 UTC [msp] DeserializeIdentity -> DEBU 48ab Obtaining identity" +"2019-04-22 06:18:10.976 UTC [gossip.gossip] handleMessage -> DEBU 48ac Exiting" +"2019-04-22 06:18:10.976 UTC [gossip.gossip] handleMessage -> DEBU 48ad Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.976 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48ae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:10.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48af Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:10.976 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48b0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:10.976 UTC [policies] Evaluate -> DEBU 48b1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:10.976 UTC [policies] Evaluate -> DEBU 48b2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:10.976 UTC [policies] Evaluate -> DEBU 48b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:10.976 UTC [cauthdsl] func1 -> DEBU 48b4 0xc00417a310 gate 1555913890976784600 evaluation starts" +"2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b5 0xc00417a310 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b6 0xc00417a310 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b7 0xc00417a310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:10.976 UTC [cauthdsl] func2 -> DEBU 48b8 0xc00417a310 principal evaluation fails" +"2019-04-22 06:18:10.976 UTC [cauthdsl] func1 -> DEBU 48b9 0xc00417a310 gate 1555913890976784600 evaluation fails" +"2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48ba Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48bb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:10.977 UTC [cauthdsl] func1 -> DEBU 48bd 0xc00417ab50 gate 1555913890977131400 evaluation starts" +"2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48be 0xc00417ab50 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48bf 0xc00417ab50 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48c0 0xc00417ab50 principal matched by identity 0" +"2019-04-22 06:18:10.977 UTC [msp.identity] Verify -> DEBU 48c1 Verify: digest = 00000000 0f 4e 3e 6b b8 91 4d 79 ee 12 6e e1 8f c3 60 d4 |.N>k..My..n...`.| +00000010 31 df 29 94 6f 73 23 ee 93 12 30 ad 44 4b eb 88 |1.).os#...0.DK..|" +"2019-04-22 06:18:10.977 UTC [msp.identity] Verify -> DEBU 48c2 Verify: sig = 00000000 30 45 02 21 00 8f 7c 0f ab 39 31 55 1e d6 84 1e |0E.!..|..91U....| +00000010 c2 09 9d f9 2a 99 2f c3 30 90 8f c6 9b d3 4c 9d |....*./.0.....L.| +00000020 ae b6 b7 3e f2 02 20 11 78 c6 16 af b2 04 a8 4b |...>.. .x......K| +00000030 19 fc f4 91 cd 3c 7b e8 ae f4 9e 69 17 3b b9 17 |.....<{....i.;..| +00000040 15 fd 2a 71 7e ee bf |..*q~..|" +"2019-04-22 06:18:10.977 UTC [cauthdsl] func2 -> DEBU 48c3 0xc00417ab50 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:10.977 UTC [cauthdsl] func1 -> DEBU 48c4 0xc00417ab50 gate 1555913890977131400 evaluation succeeds" +"2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:10.977 UTC [policies] Evaluate -> DEBU 48c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:10.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 48c9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.977 UTC [gossip.discovery] handleAliveMessage -> DEBU 48ca Exiting" +"2019-04-22 06:18:10.977 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48cb Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:10.977 UTC [msp.identity] Verify -> DEBU 48cc Verify: digest = 00000000 83 a2 05 c2 ad 79 97 67 08 0e ce 6c 53 3c b9 e4 |.....y.g...lS<..| +00000010 e3 b1 36 f6 48 23 16 bb 82 b2 1a ed 2e ac 00 e2 |..6.H#..........|" +"2019-04-22 06:18:10.978 UTC [msp.identity] Verify -> DEBU 48cd Verify: sig = 00000000 30 44 02 20 21 b8 9a 2d 93 d6 10 cd a2 04 1c 2f |0D. !..-......./| +00000010 e2 e9 f0 b5 b8 52 58 b4 a9 a5 17 a4 25 50 1e ac |.....RX.....%P..| +00000020 da 46 37 6f 02 20 0d 78 7c 81 51 90 0d a7 5b 23 |.F7o. .x|.Q...[#| +00000030 9a 6c 2b 97 20 79 88 80 bd 2d 4b 00 ee e0 e1 0c |.l+. y...-K.....| +00000040 46 18 c9 cd 07 21 |F....!|" +"2019-04-22 06:18:10.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 48ce Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:10.978 UTC [gossip.discovery] handleAliveMessage -> DEBU 48cf Exiting" +"2019-04-22 06:18:10.978 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48d0 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:10.984 UTC [msp.identity] Verify -> DEBU 48d1 Verify: digest = 00000000 9b 3a b4 6e 7d d8 3d ba 34 97 84 18 bf 4c 28 ee |.:.n}.=.4....L(.| +00000010 cf a4 82 aa 29 5e b3 6f 1d 88 53 d4 b0 8f fb dc |....)^.o..S.....|" +"2019-04-22 06:18:10.985 UTC [msp.identity] Verify -> DEBU 48d2 Verify: sig = 00000000 30 45 02 21 00 ef 93 01 3e f6 06 2e 0b 8f 47 ab |0E.!....>.....G.| +00000010 f2 e0 01 fc f9 37 ab cf 6e 6b 22 a7 6e aa cc 91 |.....7..nk".n...| +00000020 0b 63 20 7a fd 02 20 06 28 1f 7d 4b 21 d6 4b b3 |.c z.. .(.}K!.K.| +00000030 6e 71 84 25 0b f0 f3 26 c7 f3 e9 8c d7 16 3d 11 |nq.%...&......=.| +00000040 5e 2c cd 9c 6d ae 71 |^,..m.q|" +"2019-04-22 06:18:10.985 UTC [gossip.discovery] handleAliveMessage -> DEBU 48d3 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.985 UTC [gossip.discovery] isSentByMe -> DEBU 48d4 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:10.985 UTC [gossip.discovery] handleAliveMessage -> DEBU 48d5 Exiting" +"2019-04-22 06:18:10.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48d6 Exiting" +"2019-04-22 06:18:10.985 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:10.985 UTC [gossip.gossip] handleMessage -> DEBU 48d8 Exiting" +"2019-04-22 06:18:10.985 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48d9 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:10.986 UTC [msp.identity] Verify -> DEBU 48da Verify: digest = 00000000 9b 3a b4 6e 7d d8 3d ba 34 97 84 18 bf 4c 28 ee |.:.n}.=.4....L(.| +00000010 cf a4 82 aa 29 5e b3 6f 1d 88 53 d4 b0 8f fb dc |....)^.o..S.....|" +"2019-04-22 06:18:10.986 UTC [msp.identity] Verify -> DEBU 48db Verify: sig = 00000000 30 45 02 21 00 ef 93 01 3e f6 06 2e 0b 8f 47 ab |0E.!....>.....G.| +00000010 f2 e0 01 fc f9 37 ab cf 6e 6b 22 a7 6e aa cc 91 |.....7..nk".n...| +00000020 0b 63 20 7a fd 02 20 06 28 1f 7d 4b 21 d6 4b b3 |.c z.. .(.}K!.K.| +00000030 6e 71 84 25 0b f0 f3 26 c7 f3 e9 8c d7 16 3d 11 |nq.%...&......=.| +00000040 5e 2c cd 9c 6d ae 71 |^,..m.q|" +"2019-04-22 06:18:10.987 UTC [msp.identity] Verify -> DEBU 48dc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:18:10.987 UTC [msp.identity] Verify -> DEBU 48dd Verify: sig = 00000000 30 44 02 20 69 b6 ba 71 3d 3b e2 01 25 ac 0e 5f |0D. i..q=;..%.._| +00000010 d1 9c a1 3d 9f 99 76 8a 9f a9 ca cc d7 4b 46 d6 |...=..v......KF.| +00000020 fa a1 2f 87 02 20 1d 2a 8c 7d 0b f6 33 ad 72 e2 |../.. .*.}..3.r.| +00000030 0f 9e ec ec b8 7a 22 d7 68 28 d2 84 e8 6b b8 81 |.....z".h(...k..| +00000040 43 dd 16 51 88 0c |C..Q..|" +"2019-04-22 06:18:10.987 UTC [gossip.discovery] handleAliveMessage -> DEBU 48de Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:10.988 UTC [gossip.discovery] isSentByMe -> DEBU 48df Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:10.988 UTC [gossip.discovery] handleAliveMessage -> DEBU 48e0 Exiting" +"2019-04-22 06:18:10.988 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e1 Exiting" +"2019-04-22 06:18:11.102 UTC [gossip.comm] func1 -> DEBU 48e2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:11.102 UTC [gossip.gossip] handleMessage -> DEBU 48e3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:11.102 UTC [gossip.gossip] handleMessage -> DEBU 48e4 Exiting" +"2019-04-22 06:18:11.102 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48e5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:11.102 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48e6 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48e7 Verify: digest = 00000000 96 7b f5 dd d0 14 af 47 0f b8 7f a3 f8 49 f7 3e |.{.....G.....I.>| +00000010 0b 5f 31 b8 79 5f 83 c6 61 a5 b6 b2 9a 94 43 2c |._1.y_..a.....C,|" +"2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48e8 Verify: sig = 00000000 30 44 02 20 5b e1 37 87 b2 b9 8c 2c 1d 0e c6 ea |0D. [.7....,....| +00000010 6e ae 20 cd dd 86 40 bd 30 2d 1b 19 f5 11 14 50 |n. ...@.0-.....P| +00000020 bc d2 72 3e 02 20 17 94 6b 68 9a 91 e8 cc 2e c5 |..r>. ..kh......| +00000030 f9 0e ae 15 83 da 7d 2f 5c dd 1b 8c 1c f2 09 70 |......}/\......p| +00000040 bf 12 fc 2b 35 94 |...+5.|" +"2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48e9 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:11.103 UTC [msp.identity] Verify -> DEBU 48ea Verify: sig = 00000000 30 45 02 21 00 84 ca 67 f7 b9 e5 f3 96 8f 60 f0 |0E.!...g......`.| +00000010 77 34 f1 14 a7 6a 5f 72 76 3b 0c e0 0e ce 07 c8 |w4...j_rv;......| +00000020 05 46 62 4a 34 02 20 5a ce d1 9c 5e 72 0a 69 53 |.FbJ4. Z...^r.iS| +00000030 4f c0 da 47 71 2a 52 56 1c 4c 31 32 1e ea df ff |O..Gq*RV.L12....| +00000040 4d ab 47 19 cc 99 94 |M.G....|" +"2019-04-22 06:18:11.103 UTC [gossip.discovery] handleAliveMessage -> DEBU 48eb Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:11.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ec Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:18:11.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ed updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 " +"2019-04-22 06:18:11.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ee Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 " +"2019-04-22 06:18:11.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ef Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:11.104 UTC [gossip.discovery] learnExistingMembers -> DEBU 48f0 Exiting" +"2019-04-22 06:18:11.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 48f1 Exiting" +"2019-04-22 06:18:11.104 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48f2 Exiting" +"2019-04-22 06:18:11.112 UTC [msp] DeserializeIdentity -> DEBU 48f3 Obtaining identity" +"2019-04-22 06:18:11.113 UTC [msp] DeserializeIdentity -> DEBU 48f4 Obtaining identity" +"2019-04-22 06:18:11.113 UTC [msp] DeserializeIdentity -> DEBU 48f5 Obtaining identity" +"2019-04-22 06:18:11.114 UTC [gossip.comm] Send -> DEBU 48f6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:11.114 UTC [msp] DeserializeIdentity -> DEBU 48f7 Obtaining identity" +"2019-04-22 06:18:11.114 UTC [gossip.comm] Send -> DEBU 48f8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48f9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48fa Exiting" +"2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.115 UTC [gossip.comm] sendToEndpoint -> DEBU 48fc Exiting" +"2019-04-22 06:18:11.116 UTC [gossip.comm] func1 -> DEBU 48fd Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 48fe Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.116 UTC [gossip.pull] HandleMessage -> DEBU 48ff GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.116 UTC [gossip.pull] SendDigest -> DEBU 4900 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 4901 Exiting" +"2019-04-22 06:18:11.116 UTC [gossip.comm] func1 -> DEBU 4902 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 4903 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.116 UTC [gossip.gossip] handleMessage -> DEBU 4904 Exiting" +"2019-04-22 06:18:11.116 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4905 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.117 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4906 Exiting" +"2019-04-22 06:18:11.124 UTC [gossip.comm] func1 -> DEBU 4907 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.124 UTC [gossip.gossip] handleMessage -> DEBU 4908 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.125 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4909 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:11.125 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490a Exiting" +"2019-04-22 06:18:11.125 UTC [gossip.gossip] handleMessage -> DEBU 490b Exiting" +"2019-04-22 06:18:11.189 UTC [gossip.comm] func1 -> DEBU 490c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.189 UTC [gossip.gossip] handleMessage -> DEBU 490d Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.189 UTC [gossip.gossip] handleMessage -> DEBU 490e Exiting" +"2019-04-22 06:18:11.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.189 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4910 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4911 Verify: digest = 00000000 1a 40 26 b7 04 2c 3b ba 13 22 90 0b 8a b3 d5 55 |.@&..,;..".....U| +00000010 f3 83 90 5b 6f 55 da 7a 2f 80 4f c6 c9 09 ce 84 |...[oU.z/.O.....|" +"2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4912 Verify: sig = 00000000 30 45 02 21 00 88 d0 6a f4 07 31 82 f2 87 ab 2d |0E.!...j..1....-| +00000010 69 50 d2 8d 31 65 4d 30 db 6d 5e e4 b3 f1 34 ad |iP..1eM0.m^...4.| +00000020 1f a4 36 c2 d0 02 20 06 c8 e2 2c 9b a0 e9 bc fc |..6... ...,.....| +00000030 db fa 5c 50 d4 07 3b ec a6 07 4f 1c 2d ef d8 41 |..\P..;...O.-..A| +00000040 20 50 6d 44 e5 c6 73 | PmD..s|" +"2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4913 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:11.190 UTC [msp.identity] Verify -> DEBU 4914 Verify: sig = 00000000 30 44 02 20 34 30 2a 73 96 b9 08 a0 f9 12 93 26 |0D. 40*s.......&| +00000010 38 d8 03 fc d8 f0 c9 6a 79 ee 98 bd 43 09 b1 5a |8......jy...C..Z| +00000020 f4 73 b9 1e 02 20 22 b6 e6 d5 cb cc 47 56 c4 95 |.s... ".....GV..| +00000030 b9 42 63 f1 ec 9b f4 cd f4 1a 1d 54 5d 06 36 68 |.Bc........T].6h| +00000040 12 ed 8c d1 66 d8 |....f.|" +"2019-04-22 06:18:11.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 4915 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:11.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 4916 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-04-22 06:18:11.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 4917 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 " +"2019-04-22 06:18:11.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 4918 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 " +"2019-04-22 06:18:11.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 4919 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:65 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:11.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 491a Exiting" +"2019-04-22 06:18:11.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 491b Exiting" +"2019-04-22 06:18:11.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 491c Exiting" +"2019-04-22 06:18:11.191 UTC [gossip.discovery] sendMemResponse -> DEBU 491d Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:11.191 UTC [msp] DeserializeIdentity -> DEBU 491e Obtaining identity" +"2019-04-22 06:18:11.191 UTC [msp] DeserializeIdentity -> DEBU 491f Obtaining identity" +"2019-04-22 06:18:11.191 UTC [gossip.comm] Send -> DEBU 4920 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:11.191 UTC [gossip.discovery] sendMemResponse -> DEBU 4921 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:18:11.191 UTC [gossip.comm] sendToEndpoint -> DEBU 4922 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.191 UTC [gossip.comm] sendToEndpoint -> DEBU 4923 Exiting" +"2019-04-22 06:18:11.440 UTC [gossip.election] waitForInterrupt -> DEBU 4924 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:18:11.440 UTC [gossip.election] IsLeader -> DEBU 4925 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:18:11.440 UTC [msp.identity] Sign -> DEBU 4926 Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510131801 " +"2019-04-22 06:18:11.440 UTC [msp.identity] Sign -> DEBU 4927 Sign: digest: EC90BBC7D8D11F94DD18BFFB944918CDA41F7AD4C45FD422B5ECD20F29539F85 " +"2019-04-22 06:18:11.440 UTC [gossip.election] waitForInterrupt -> DEBU 4928 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:18:11.448 UTC [msp] DeserializeIdentity -> DEBU 4929 Obtaining identity" +"2019-04-22 06:18:11.449 UTC [msp] DeserializeIdentity -> DEBU 492a Obtaining identity" +"2019-04-22 06:18:11.450 UTC [msp] DeserializeIdentity -> DEBU 492b Obtaining identity" +"2019-04-22 06:18:11.450 UTC [msp] DeserializeIdentity -> DEBU 492c Obtaining identity" +"2019-04-22 06:18:11.450 UTC [gossip.comm] Send -> DEBU 492d Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:11.451 UTC [msp] DeserializeIdentity -> DEBU 492e Obtaining identity" +"2019-04-22 06:18:11.451 UTC [msp] DeserializeIdentity -> DEBU 492f Obtaining identity" +"2019-04-22 06:18:11.451 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:19 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.451 UTC [gossip.comm] sendToEndpoint -> DEBU 4931 Exiting" +"2019-04-22 06:18:11.577 UTC [gossip.comm] func1 -> DEBU 4932 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.580 UTC [gossip.gossip] handleMessage -> DEBU 4933 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.580 UTC [gossip.gossip] handleMessage -> DEBU 4934 Exiting" +"2019-04-22 06:18:11.581 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4935 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.581 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4936 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:11.582 UTC [msp] DeserializeIdentity -> DEBU 4937 Obtaining identity" +"2019-04-22 06:18:11.582 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:11.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4939 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:11.583 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 493a Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:11.583 UTC [policies] Evaluate -> DEBU 493b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:11.584 UTC [policies] Evaluate -> DEBU 493c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:11.584 UTC [policies] Evaluate -> DEBU 493d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:11.585 UTC [cauthdsl] func1 -> DEBU 493e 0xc003c6f140 gate 1555913891585441400 evaluation starts" +"2019-04-22 06:18:11.585 UTC [cauthdsl] func2 -> DEBU 493f 0xc003c6f140 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:11.586 UTC [cauthdsl] func2 -> DEBU 4940 0xc003c6f140 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:11.586 UTC [cauthdsl] func2 -> DEBU 4941 0xc003c6f140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:11.586 UTC [cauthdsl] func2 -> DEBU 4942 0xc003c6f140 principal evaluation fails" +"2019-04-22 06:18:11.587 UTC [cauthdsl] func1 -> DEBU 4943 0xc003c6f140 gate 1555913891585441400 evaluation fails" +"2019-04-22 06:18:11.587 UTC [policies] Evaluate -> DEBU 4944 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:11.588 UTC [policies] Evaluate -> DEBU 4945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:11.588 UTC [policies] Evaluate -> DEBU 4946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:11.589 UTC [cauthdsl] func1 -> DEBU 4947 0xc003c6f980 gate 1555913891589466400 evaluation starts" +"2019-04-22 06:18:11.590 UTC [cauthdsl] func2 -> DEBU 4948 0xc003c6f980 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:11.590 UTC [cauthdsl] func2 -> DEBU 4949 0xc003c6f980 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:11.591 UTC [cauthdsl] func2 -> DEBU 494a 0xc003c6f980 principal matched by identity 0" +"2019-04-22 06:18:11.592 UTC [msp.identity] Verify -> DEBU 494b Verify: digest = 00000000 94 5b ec 34 be 88 28 c5 67 70 b6 bd f4 0a 61 65 |.[.4..(.gp....ae| +00000010 2f 3a c9 d4 f4 00 14 c8 2f 97 63 0b 85 c7 48 75 |/:....../.c...Hu|" +"2019-04-22 06:18:11.592 UTC [msp.identity] Verify -> DEBU 494c Verify: sig = 00000000 30 45 02 21 00 9f 72 44 ae b7 71 4a cf e0 2b 5f |0E.!..rD..qJ..+_| +00000010 bc 5e d3 16 b9 47 72 b0 ca 0f 76 a3 f2 85 2f b0 |.^...Gr...v.../.| +00000020 18 1c 3a 8f c7 02 20 3e 92 e7 c8 f8 14 03 b1 c8 |..:... >........| +00000030 15 03 39 92 a4 5d 5c 7a a8 51 62 8f 49 6a d2 48 |..9..]\z.Qb.Ij.H| +00000040 df e1 69 20 86 60 d8 |..i .`.|" +"2019-04-22 06:18:11.593 UTC [cauthdsl] func2 -> DEBU 494d 0xc003c6f980 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:11.594 UTC [cauthdsl] func1 -> DEBU 494e 0xc003c6f980 gate 1555913891589466400 evaluation succeeds" +"2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 494f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 4950 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 4951 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:11.594 UTC [policies] Evaluate -> DEBU 4952 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:11.595 UTC [gossip.discovery] handleAliveMessage -> DEBU 4953 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4954 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4955 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 " +"2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4956 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 " +"2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4957 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:11.595 UTC [gossip.discovery] learnExistingMembers -> DEBU 4958 Exiting" +"2019-04-22 06:18:11.595 UTC [gossip.discovery] handleAliveMessage -> DEBU 4959 Exiting" +"2019-04-22 06:18:11.595 UTC [gossip.discovery] handleMsgFromComm -> DEBU 495a Exiting" +"2019-04-22 06:18:11.595 UTC [msp] DeserializeIdentity -> DEBU 495b Obtaining identity" +"2019-04-22 06:18:11.595 UTC [msp] DeserializeIdentity -> DEBU 495c Obtaining identity" +"2019-04-22 06:18:11.595 UTC [msp] DeserializeIdentity -> DEBU 495d Obtaining identity" +"2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 495e Obtaining identity" +"2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 495f Obtaining identity" +"2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 4960 Obtaining identity" +"2019-04-22 06:18:11.596 UTC [gossip.comm] Send -> DEBU 4961 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 4962 Obtaining identity" +"2019-04-22 06:18:11.596 UTC [msp] DeserializeIdentity -> DEBU 4963 Obtaining identity" +"2019-04-22 06:18:11.596 UTC [gossip.comm] Send -> DEBU 4964 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:11.596 UTC [gossip.comm] sendToEndpoint -> DEBU 4965 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.596 UTC [gossip.comm] sendToEndpoint -> DEBU 4966 Exiting" +"2019-04-22 06:18:11.597 UTC [gossip.comm] sendToEndpoint -> DEBU 4967 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.597 UTC [gossip.comm] sendToEndpoint -> DEBU 4968 Exiting" +"2019-04-22 06:18:11.597 UTC [gossip.comm] func1 -> DEBU 4969 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.597 UTC [gossip.gossip] handleMessage -> DEBU 496a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.598 UTC [gossip.gossip] handleMessage -> DEBU 496b Exiting" +"2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 496c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 496d Exiting" +"2019-04-22 06:18:11.598 UTC [gossip.comm] func1 -> DEBU 496e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.598 UTC [gossip.gossip] handleMessage -> DEBU 496f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.598 UTC [gossip.gossip] handleMessage -> DEBU 4970 Exiting" +"2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4971 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4972 Exiting" +"2019-04-22 06:18:11.620 UTC [gossip.comm] func1 -> DEBU 4973 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.620 UTC [gossip.gossip] handleMessage -> DEBU 4974 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.620 UTC [gossip.pull] HandleMessage -> DEBU 4975 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.620 UTC [msp] DeserializeIdentity -> DEBU 4976 Obtaining identity" +"2019-04-22 06:18:11.622 UTC [msp] DeserializeIdentity -> DEBU 4977 Obtaining identity" +"2019-04-22 06:18:11.622 UTC [msp] DeserializeIdentity -> DEBU 4978 Obtaining identity" +"2019-04-22 06:18:11.622 UTC [msp] DeserializeIdentity -> DEBU 4979 Obtaining identity" +"2019-04-22 06:18:11.623 UTC [msp] DeserializeIdentity -> DEBU 497a Obtaining identity" +"2019-04-22 06:18:11.623 UTC [msp] DeserializeIdentity -> DEBU 497b Obtaining identity" +"2019-04-22 06:18:11.624 UTC [gossip.pull] SendDigest -> DEBU 497c Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:11.625 UTC [gossip.gossip] handleMessage -> DEBU 497d Exiting" +"2019-04-22 06:18:11.651 UTC [gossip.comm] func1 -> DEBU 497e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.652 UTC [gossip.gossip] handleMessage -> DEBU 497f Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.652 UTC [gossip.gossip] handleMessage -> DEBU 4980 Exiting" +"2019-04-22 06:18:11.652 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4981 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.652 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4982 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:11.652 UTC [msp] DeserializeIdentity -> DEBU 4983 Obtaining identity" +"2019-04-22 06:18:11.653 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4984 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4985 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:11.653 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4986 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:11.653 UTC [policies] Evaluate -> DEBU 4987 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:11.653 UTC [policies] Evaluate -> DEBU 4988 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:11.654 UTC [policies] Evaluate -> DEBU 4989 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:11.654 UTC [cauthdsl] func1 -> DEBU 498a 0xc003586930 gate 1555913891654219500 evaluation starts" +"2019-04-22 06:18:11.654 UTC [cauthdsl] func2 -> DEBU 498b 0xc003586930 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:11.654 UTC [cauthdsl] func2 -> DEBU 498c 0xc003586930 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:11.654 UTC [cauthdsl] func2 -> DEBU 498d 0xc003586930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:11.656 UTC [cauthdsl] func2 -> DEBU 498e 0xc003586930 principal evaluation fails" +"2019-04-22 06:18:11.656 UTC [cauthdsl] func1 -> DEBU 498f 0xc003586930 gate 1555913891654219500 evaluation fails" +"2019-04-22 06:18:11.656 UTC [policies] Evaluate -> DEBU 4990 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:11.657 UTC [policies] Evaluate -> DEBU 4991 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:11.657 UTC [policies] Evaluate -> DEBU 4992 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:11.658 UTC [cauthdsl] func1 -> DEBU 4993 0xc003587170 gate 1555913891658661900 evaluation starts" +"2019-04-22 06:18:11.659 UTC [cauthdsl] func2 -> DEBU 4994 0xc003587170 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:11.659 UTC [cauthdsl] func2 -> DEBU 4995 0xc003587170 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:11.661 UTC [cauthdsl] func2 -> DEBU 4996 0xc003587170 principal matched by identity 0" +"2019-04-22 06:18:11.661 UTC [msp.identity] Verify -> DEBU 4997 Verify: digest = 00000000 4a 0c 64 7f 73 2e 71 9b 2b 17 55 08 0b 47 42 f3 |J.d.s.q.+.U..GB.| +00000010 76 6a e0 96 17 ac 0a 8e fa 33 c4 54 78 f6 0f b3 |vj.......3.Tx...|" +"2019-04-22 06:18:11.662 UTC [msp.identity] Verify -> DEBU 4998 Verify: sig = 00000000 30 45 02 21 00 b2 f1 2f c7 01 38 fc 90 e2 82 3b |0E.!.../..8....;| +00000010 c6 f1 a1 29 16 2a 59 dd b4 78 38 8d 69 01 fb 2e |...).*Y..x8.i...| +00000020 53 06 ff d4 86 02 20 2b ec 12 04 dd 4c 96 22 46 |S..... +....L."F| +00000030 dd a6 6e b0 a0 ab 5c d8 3a 07 be 3d 9f ae fc d1 |..n...\.:..=....| +00000040 bf e4 90 0d 2b d3 59 |....+.Y|" +"2019-04-22 06:18:11.666 UTC [cauthdsl] func2 -> DEBU 4999 0xc003587170 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:11.666 UTC [cauthdsl] func1 -> DEBU 499a 0xc003587170 gate 1555913891658661900 evaluation succeeds" +"2019-04-22 06:18:11.667 UTC [policies] Evaluate -> DEBU 499b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:11.667 UTC [policies] Evaluate -> DEBU 499c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:11.670 UTC [policies] Evaluate -> DEBU 499d Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:11.670 UTC [policies] Evaluate -> DEBU 499e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:11.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 499f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a0 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a1 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 " +"2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a2 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 " +"2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a3 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:11.670 UTC [gossip.discovery] learnExistingMembers -> DEBU 49a4 Exiting" +"2019-04-22 06:18:11.670 UTC [gossip.discovery] handleAliveMessage -> DEBU 49a5 Exiting" +"2019-04-22 06:18:11.670 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49a6 Exiting" +"2019-04-22 06:18:11.670 UTC [gossip.discovery] sendMemResponse -> DEBU 49a7 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:11.670 UTC [msp] DeserializeIdentity -> DEBU 49a8 Obtaining identity" +"2019-04-22 06:18:11.671 UTC [msp] DeserializeIdentity -> DEBU 49a9 Obtaining identity" +"2019-04-22 06:18:11.671 UTC [msp] DeserializeIdentity -> DEBU 49aa Obtaining identity" +"2019-04-22 06:18:11.671 UTC [gossip.comm] Send -> DEBU 49ab Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:11.671 UTC [gossip.comm] sendToEndpoint -> DEBU 49ac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-04-22 06:18:11.671 UTC [gossip.comm] sendToEndpoint -> DEBU 49ad Exiting" +"2019-04-22 06:18:11.671 UTC [gossip.discovery] sendMemResponse -> DEBU 49ae Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:11.996 UTC [gossip.comm] func1 -> DEBU 49af Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.996 UTC [gossip.gossip] handleMessage -> DEBU 49b0 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.996 UTC [gossip.gossip] handleMessage -> DEBU 49b1 Exiting" +"2019-04-22 06:18:11.996 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49b2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49b3 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:11.997 UTC [msp] DeserializeIdentity -> DEBU 49b4 Obtaining identity" +"2019-04-22 06:18:11.997 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49b5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:11.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:11.997 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func1 -> DEBU 49bb 0xc003e52ab0 gate 1555913891997393000 evaluation starts" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49bc 0xc003e52ab0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49bd 0xc003e52ab0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49be 0xc003e52ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49bf 0xc003e52ab0 principal evaluation fails" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func1 -> DEBU 49c0 0xc003e52ab0 gate 1555913891997393000 evaluation fails" +"2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49c1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:11.997 UTC [policies] Evaluate -> DEBU 49c3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func1 -> DEBU 49c4 0xc003e532f0 gate 1555913891997724700 evaluation starts" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49c5 0xc003e532f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49c6 0xc003e532f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:11.997 UTC [cauthdsl] func2 -> DEBU 49c7 0xc003e532f0 principal matched by identity 0" +"2019-04-22 06:18:11.997 UTC [msp.identity] Verify -> DEBU 49c8 Verify: digest = 00000000 09 7b b5 a1 07 ba 00 a3 27 cc fd 0e 0a 42 4e c2 |.{......'....BN.| +00000010 36 77 b6 e4 93 80 99 c5 5e e4 c3 83 72 71 3f 4c |6w......^...rq?L|" +"2019-04-22 06:18:11.998 UTC [msp.identity] Verify -> DEBU 49c9 Verify: sig = 00000000 30 45 02 21 00 9e 9c d3 75 ee 8d 4b f4 74 67 b0 |0E.!....u..K.tg.| +00000010 a8 15 25 7e a5 1c 96 f5 00 80 e2 7a a2 f6 30 5b |..%~.......z..0[| +00000020 34 70 d5 20 2e 02 20 33 bc 7e 2a 6b ec 31 60 7f |4p. .. 3.~*k.1`.| +00000030 fb 9b 98 7c 60 55 f9 84 26 41 dd 05 bb 86 c3 7b |...|`U..&A.....{| +00000040 6c 35 7b 41 96 ed aa |l5{A...|" +"2019-04-22 06:18:11.998 UTC [cauthdsl] func2 -> DEBU 49ca 0xc003e532f0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:11.998 UTC [cauthdsl] func1 -> DEBU 49cb 0xc003e532f0 gate 1555913891997724700 evaluation succeeds" +"2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49cc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49ce Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:11.998 UTC [policies] Evaluate -> DEBU 49cf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:11.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 49d0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d1 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d2 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 " +"2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d3 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 " +"2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d4 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:59 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:11.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 49d5 Exiting" +"2019-04-22 06:18:11.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 49d6 Exiting" +"2019-04-22 06:18:11.998 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49d7 Exiting" +"2019-04-22 06:18:12.000 UTC [gossip.comm] func1 -> DEBU 49d8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.000 UTC [gossip.gossip] handleMessage -> DEBU 49d9 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.001 UTC [gossip.pull] HandleMessage -> DEBU 49da GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49db Obtaining identity" +"2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49dc Obtaining identity" +"2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49dd Obtaining identity" +"2019-04-22 06:18:12.001 UTC [msp] DeserializeIdentity -> DEBU 49de Obtaining identity" +"2019-04-22 06:18:12.002 UTC [msp] DeserializeIdentity -> DEBU 49df Obtaining identity" +"2019-04-22 06:18:12.002 UTC [msp] DeserializeIdentity -> DEBU 49e0 Obtaining identity" +"2019-04-22 06:18:12.002 UTC [gossip.pull] SendDigest -> DEBU 49e1 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:12.002 UTC [gossip.gossip] handleMessage -> DEBU 49e2 Exiting" +"2019-04-22 06:18:12.004 UTC [gossip.comm] func1 -> DEBU 49e3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.005 UTC [gossip.gossip] handleMessage -> DEBU 49e4 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.005 UTC [gossip.gossip] handleMessage -> DEBU 49e5 Exiting" +"2019-04-22 06:18:12.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49e6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.006 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49e7 Exiting" +"2019-04-22 06:18:12.008 UTC [msp] DeserializeIdentity -> DEBU 49e8 Obtaining identity" +"2019-04-22 06:18:12.008 UTC [msp] DeserializeIdentity -> DEBU 49e9 Obtaining identity" +"2019-04-22 06:18:12.009 UTC [msp] DeserializeIdentity -> DEBU 49ea Obtaining identity" +"2019-04-22 06:18:12.009 UTC [msp] DeserializeIdentity -> DEBU 49eb Obtaining identity" +"2019-04-22 06:18:12.010 UTC [msp] DeserializeIdentity -> DEBU 49ec Obtaining identity" +"2019-04-22 06:18:12.010 UTC [msp] DeserializeIdentity -> DEBU 49ed Obtaining identity" +"2019-04-22 06:18:12.010 UTC [msp] DeserializeIdentity -> DEBU 49ee Obtaining identity" +"2019-04-22 06:18:12.011 UTC [gossip.comm] Send -> DEBU 49ef Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:12.011 UTC [msp] DeserializeIdentity -> DEBU 49f0 Obtaining identity" +"2019-04-22 06:18:12.011 UTC [gossip.comm] Send -> DEBU 49f1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:12.012 UTC [gossip.comm] sendToEndpoint -> DEBU 49f2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.012 UTC [gossip.comm] sendToEndpoint -> DEBU 49f3 Exiting" +"2019-04-22 06:18:12.012 UTC [gossip.comm] sendToEndpoint -> DEBU 49f4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.013 UTC [gossip.comm] sendToEndpoint -> DEBU 49f5 Exiting" +"2019-04-22 06:18:12.015 UTC [gossip.comm] func1 -> DEBU 49f6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.015 UTC [gossip.gossip] handleMessage -> DEBU 49f7 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.016 UTC [gossip.gossip] handleMessage -> DEBU 49f8 Exiting" +"2019-04-22 06:18:12.016 UTC [gossip.discovery] handleMsgFromComm -> DEBU 49f9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.017 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 49fa Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:12.017 UTC [msp] DeserializeIdentity -> DEBU 49fb Obtaining identity" +"2019-04-22 06:18:12.018 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49fc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:12.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49fd Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.023 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49fe Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.023 UTC [policies] Evaluate -> DEBU 49ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:12.023 UTC [policies] Evaluate -> DEBU 4a00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:12.023 UTC [policies] Evaluate -> DEBU 4a01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:12.024 UTC [cauthdsl] func1 -> DEBU 4a02 0xc0027f0b60 gate 1555913892023806400 evaluation starts" +"2019-04-22 06:18:12.024 UTC [cauthdsl] func2 -> DEBU 4a03 0xc0027f0b60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.024 UTC [cauthdsl] func2 -> DEBU 4a04 0xc0027f0b60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.025 UTC [cauthdsl] func2 -> DEBU 4a05 0xc0027f0b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:12.025 UTC [cauthdsl] func2 -> DEBU 4a06 0xc0027f0b60 principal evaluation fails" +"2019-04-22 06:18:12.025 UTC [cauthdsl] func1 -> DEBU 4a07 0xc0027f0b60 gate 1555913892023806400 evaluation fails" +"2019-04-22 06:18:12.029 UTC [policies] Evaluate -> DEBU 4a08 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.029 UTC [policies] Evaluate -> DEBU 4a09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.029 UTC [policies] Evaluate -> DEBU 4a0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:12.029 UTC [cauthdsl] func1 -> DEBU 4a0b 0xc0027f13a0 gate 1555913892029612800 evaluation starts" +"2019-04-22 06:18:12.029 UTC [cauthdsl] func2 -> DEBU 4a0c 0xc0027f13a0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.030 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc0027f13a0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.030 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc0027f13a0 principal matched by identity 0" +"2019-04-22 06:18:12.030 UTC [msp.identity] Verify -> DEBU 4a0f Verify: digest = 00000000 67 1e b8 9b 6f 31 3e cf 99 d8 9a c5 b3 81 87 98 |g...o1>.........| +00000010 9c c5 2c 2f 8e 8e 0a 7a cf b3 01 d9 21 c2 74 ab |..,/...z....!.t.|" +"2019-04-22 06:18:12.030 UTC [msp.identity] Verify -> DEBU 4a10 Verify: sig = 00000000 30 45 02 21 00 a5 3c 43 11 ba dd dd a8 0d a9 2d |0E.!.. DEBU 4a11 0xc0027f13a0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:12.031 UTC [cauthdsl] func1 -> DEBU 4a12 0xc0027f13a0 gate 1555913892029612800 evaluation succeeds" +"2019-04-22 06:18:12.031 UTC [policies] Evaluate -> DEBU 4a13 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.031 UTC [policies] Evaluate -> DEBU 4a14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.032 UTC [policies] Evaluate -> DEBU 4a15 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:12.032 UTC [policies] Evaluate -> DEBU 4a16 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:12.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a17 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a18 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a19 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 " +"2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a1a Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 " +"2019-04-22 06:18:12.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a1b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:12.033 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a1c Exiting" +"2019-04-22 06:18:12.033 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a1d Exiting" +"2019-04-22 06:18:12.033 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a1e Exiting" +"2019-04-22 06:18:12.033 UTC [gossip.discovery] sendMemResponse -> DEBU 4a1f Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:12.033 UTC [msp] DeserializeIdentity -> DEBU 4a20 Obtaining identity" +"2019-04-22 06:18:12.033 UTC [msp] DeserializeIdentity -> DEBU 4a21 Obtaining identity" +"2019-04-22 06:18:12.033 UTC [msp] DeserializeIdentity -> DEBU 4a22 Obtaining identity" +"2019-04-22 06:18:12.034 UTC [gossip.comm] Send -> DEBU 4a23 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:12.034 UTC [gossip.discovery] sendMemResponse -> DEBU 4a24 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:12.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4a25 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.034 UTC [gossip.comm] sendToEndpoint -> DEBU 4a26 Exiting" +"2019-04-22 06:18:12.047 UTC [gossip.comm] func1 -> DEBU 4a27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.048 UTC [gossip.gossip] handleMessage -> DEBU 4a28 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.049 UTC [gossip.gossip] handleMessage -> DEBU 4a29 Exiting" +"2019-04-22 06:18:12.049 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a2a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:60 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:12.050 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a2b Exiting" +"2019-04-22 06:18:12.353 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +"2019-04-22 06:18:12.354 UTC [msp] DeserializeIdentity -> DEBU 4a2d Obtaining identity" +"2019-04-22 06:18:12.354 UTC [gossip.comm] Send -> DEBU 4a2e Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a2f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a30 Exiting" +"2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a31 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a32 Exiting" +"2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a33 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.354 UTC [gossip.comm] sendToEndpoint -> DEBU 4a34 Exiting" +"2019-04-22 06:18:12.357 UTC [gossip.comm] func1 -> DEBU 4a35 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.357 UTC [gossip.gossip] handleMessage -> DEBU 4a36 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.357 UTC [msp] DeserializeIdentity -> DEBU 4a37 Obtaining identity" +"2019-04-22 06:18:12.357 UTC [msp] DeserializeIdentity -> DEBU 4a38 Obtaining identity" +"2019-04-22 06:18:12.357 UTC [msp] DeserializeIdentity -> DEBU 4a39 Obtaining identity" +"2019-04-22 06:18:12.357 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a3a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:12.357 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a3b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.357 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a3c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:12.358 UTC [cauthdsl] func1 -> DEBU 4a40 0xc00279fbf0 gate 1555913892358236700 evaluation starts" +"2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a41 0xc00279fbf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a42 0xc00279fbf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a43 0xc00279fbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:12.358 UTC [cauthdsl] func2 -> DEBU 4a44 0xc00279fbf0 principal evaluation fails" +"2019-04-22 06:18:12.358 UTC [cauthdsl] func1 -> DEBU 4a45 0xc00279fbf0 gate 1555913892358236700 evaluation fails" +"2019-04-22 06:18:12.358 UTC [policies] Evaluate -> DEBU 4a46 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:12.359 UTC [cauthdsl] func1 -> DEBU 4a49 0xc0037ec430 gate 1555913892359268100 evaluation starts" +"2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4a 0xc0037ec430 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4b 0xc0037ec430 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4c 0xc0037ec430 principal matched by identity 0" +"2019-04-22 06:18:12.359 UTC [msp.identity] Verify -> DEBU 4a4d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:12.359 UTC [msp.identity] Verify -> DEBU 4a4e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:12.359 UTC [cauthdsl] func2 -> DEBU 4a4f 0xc0037ec430 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:12.359 UTC [cauthdsl] func1 -> DEBU 4a50 0xc0037ec430 gate 1555913892359268100 evaluation succeeds" +"2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a51 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.359 UTC [policies] Evaluate -> DEBU 4a53 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:12.360 UTC [policies] Evaluate -> DEBU 4a54 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a55 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a56 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a57 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:12.360 UTC [msp.identity] Verify -> DEBU 4a58 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:12.360 UTC [msp] DeserializeIdentity -> DEBU 4a59 Obtaining identity" +"2019-04-22 06:18:12.361 UTC [msp] DeserializeIdentity -> DEBU 4a5a Obtaining identity" +"2019-04-22 06:18:12.361 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a5b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:12.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a5c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a5d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a5e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a5f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a60 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:12.361 UTC [cauthdsl] func1 -> DEBU 4a61 0xc003ad8a40 gate 1555913892361666100 evaluation starts" +"2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a62 0xc003ad8a40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a63 0xc003ad8a40 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a64 0xc003ad8a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:12.361 UTC [cauthdsl] func2 -> DEBU 4a65 0xc003ad8a40 principal evaluation fails" +"2019-04-22 06:18:12.361 UTC [cauthdsl] func1 -> DEBU 4a66 0xc003ad8a40 gate 1555913892361666100 evaluation fails" +"2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a67 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.361 UTC [policies] Evaluate -> DEBU 4a69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:12.362 UTC [cauthdsl] func1 -> DEBU 4a6a 0xc003ad9280 gate 1555913892362026000 evaluation starts" +"2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a6b 0xc003ad9280 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a6c 0xc003ad9280 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a6d 0xc003ad9280 principal matched by identity 0" +"2019-04-22 06:18:12.362 UTC [msp.identity] Verify -> DEBU 4a6e Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:12.362 UTC [msp.identity] Verify -> DEBU 4a6f Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:12.362 UTC [gossip.comm] func1 -> DEBU 4a70 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.362 UTC [cauthdsl] func2 -> DEBU 4a71 0xc003ad9280 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:12.363 UTC [cauthdsl] func1 -> DEBU 4a72 0xc003ad9280 gate 1555913892362026000 evaluation succeeds" +"2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a73 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a75 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:12.363 UTC [policies] Evaluate -> DEBU 4a76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:12.364 UTC [gossip.gossip] handleMessage -> DEBU 4a77 Exiting" +"2019-04-22 06:18:12.364 UTC [gossip.gossip] handleMessage -> DEBU 4a78 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.364 UTC [msp] DeserializeIdentity -> DEBU 4a79 Obtaining identity" +"2019-04-22 06:18:12.364 UTC [msp] DeserializeIdentity -> DEBU 4a7a Obtaining identity" +"2019-04-22 06:18:12.364 UTC [msp] DeserializeIdentity -> DEBU 4a7b Obtaining identity" +"2019-04-22 06:18:12.364 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:12.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a7d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a7e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.364 UTC [policies] Evaluate -> DEBU 4a7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:12.364 UTC [policies] Evaluate -> DEBU 4a80 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:12.364 UTC [policies] Evaluate -> DEBU 4a81 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:12.364 UTC [cauthdsl] func1 -> DEBU 4a82 0xc003af0d90 gate 1555913892364876100 evaluation starts" +"2019-04-22 06:18:12.364 UTC [cauthdsl] func2 -> DEBU 4a83 0xc003af0d90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.365 UTC [cauthdsl] func2 -> DEBU 4a84 0xc003af0d90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.365 UTC [cauthdsl] func2 -> DEBU 4a85 0xc003af0d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:12.365 UTC [cauthdsl] func2 -> DEBU 4a86 0xc003af0d90 principal evaluation fails" +"2019-04-22 06:18:12.365 UTC [cauthdsl] func1 -> DEBU 4a87 0xc003af0d90 gate 1555913892364876100 evaluation fails" +"2019-04-22 06:18:12.365 UTC [policies] Evaluate -> DEBU 4a88 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.365 UTC [policies] Evaluate -> DEBU 4a89 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.365 UTC [policies] Evaluate -> DEBU 4a8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:12.365 UTC [gossip.comm] func1 -> DEBU 4a8b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.365 UTC [cauthdsl] func1 -> DEBU 4a8c 0xc003af15d0 gate 1555913892365405700 evaluation starts" +"2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a8d 0xc003af15d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a8e 0xc003af15d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a8f 0xc003af15d0 principal matched by identity 0" +"2019-04-22 06:18:12.366 UTC [msp.identity] Verify -> DEBU 4a90 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:12.366 UTC [msp.identity] Verify -> DEBU 4a91 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:12.366 UTC [cauthdsl] func2 -> DEBU 4a92 0xc003af15d0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:12.366 UTC [cauthdsl] func1 -> DEBU 4a93 0xc003af15d0 gate 1555913892365405700 evaluation succeeds" +"2019-04-22 06:18:12.366 UTC [policies] Evaluate -> DEBU 4a94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.367 UTC [policies] Evaluate -> DEBU 4a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.367 UTC [policies] Evaluate -> DEBU 4a96 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:12.367 UTC [policies] Evaluate -> DEBU 4a97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:12.367 UTC [msp.identity] Verify -> DEBU 4a98 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:12.367 UTC [msp.identity] Verify -> DEBU 4a99 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:12.367 UTC [msp.identity] Verify -> DEBU 4a9a Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:12.368 UTC [msp.identity] Verify -> DEBU 4a9b Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:12.368 UTC [msp] DeserializeIdentity -> DEBU 4a9c Obtaining identity" +"2019-04-22 06:18:12.368 UTC [msp] DeserializeIdentity -> DEBU 4a9d Obtaining identity" +"2019-04-22 06:18:12.368 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:12.368 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a9f Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.368 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4aa0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aa1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aa2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aa3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func1 -> DEBU 4aa4 0xc004145be0 gate 1555913892369218600 evaluation starts" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa5 0xc004145be0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa6 0xc004145be0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa7 0xc004145be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aa8 0xc004145be0 principal evaluation fails" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func1 -> DEBU 4aa9 0xc004145be0 gate 1555913892369218600 evaluation fails" +"2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aaa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.369 UTC [policies] Evaluate -> DEBU 4aac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func1 -> DEBU 4aad 0xc00415a420 gate 1555913892369810300 evaluation starts" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aae 0xc00415a420 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4aaf 0xc00415a420 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.369 UTC [cauthdsl] func2 -> DEBU 4ab0 0xc00415a420 principal matched by identity 0" +"2019-04-22 06:18:12.369 UTC [msp.identity] Verify -> DEBU 4ab1 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:12.370 UTC [msp.identity] Verify -> DEBU 4ab2 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:12.370 UTC [cauthdsl] func2 -> DEBU 4ab3 0xc00415a420 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:12.370 UTC [cauthdsl] func1 -> DEBU 4ab4 0xc00415a420 gate 1555913892369810300 evaluation succeeds" +"2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:12.370 UTC [policies] Evaluate -> DEBU 4ab8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:12.370 UTC [gossip.gossip] handleMessage -> DEBU 4ab9 Exiting" +"2019-04-22 06:18:12.370 UTC [gossip.gossip] handleMessage -> DEBU 4aba Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abb Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abc Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abd Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:12.371 UTC [msp.identity] Verify -> DEBU 4abe Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:12.371 UTC [msp] DeserializeIdentity -> DEBU 4abf Obtaining identity" +"2019-04-22 06:18:12.371 UTC [msp] DeserializeIdentity -> DEBU 4ac0 Obtaining identity" +"2019-04-22 06:18:12.372 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ac1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:12.372 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ac2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.372 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ac3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.372 UTC [policies] Evaluate -> DEBU 4ac4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:12.372 UTC [policies] Evaluate -> DEBU 4ac5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:12.372 UTC [policies] Evaluate -> DEBU 4ac6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:12.372 UTC [cauthdsl] func1 -> DEBU 4ac7 0xc00258cc70 gate 1555913892372550300 evaluation starts" +"2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4ac8 0xc00258cc70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4ac9 0xc00258cc70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4aca 0xc00258cc70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:12.372 UTC [cauthdsl] func2 -> DEBU 4acb 0xc00258cc70 principal evaluation fails" +"2019-04-22 06:18:12.373 UTC [cauthdsl] func1 -> DEBU 4acc 0xc00258cc70 gate 1555913892372550300 evaluation fails" +"2019-04-22 06:18:12.373 UTC [policies] Evaluate -> DEBU 4acd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.373 UTC [policies] Evaluate -> DEBU 4ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.373 UTC [policies] Evaluate -> DEBU 4acf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:12.373 UTC [cauthdsl] func1 -> DEBU 4ad0 0xc00258d4b0 gate 1555913892373219200 evaluation starts" +"2019-04-22 06:18:12.373 UTC [cauthdsl] func2 -> DEBU 4ad1 0xc00258d4b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.373 UTC [cauthdsl] func2 -> DEBU 4ad2 0xc00258d4b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.373 UTC [cauthdsl] func2 -> DEBU 4ad3 0xc00258d4b0 principal matched by identity 0" +"2019-04-22 06:18:12.373 UTC [msp.identity] Verify -> DEBU 4ad4 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:12.374 UTC [msp.identity] Verify -> DEBU 4ad5 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:12.374 UTC [cauthdsl] func2 -> DEBU 4ad6 0xc00258d4b0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:12.374 UTC [cauthdsl] func1 -> DEBU 4ad7 0xc00258d4b0 gate 1555913892373219200 evaluation succeeds" +"2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4ad8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4ad9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4ada Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:12.374 UTC [policies] Evaluate -> DEBU 4adb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:12.374 UTC [msp] DeserializeIdentity -> DEBU 4adc Obtaining identity" +"2019-04-22 06:18:12.374 UTC [msp] DeserializeIdentity -> DEBU 4add Obtaining identity" +"2019-04-22 06:18:12.375 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ade Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:12.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4adf Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ae0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:12.375 UTC [policies] Evaluate -> DEBU 4ae1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:12.375 UTC [policies] Evaluate -> DEBU 4ae2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:12.375 UTC [policies] Evaluate -> DEBU 4ae3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:12.375 UTC [cauthdsl] func1 -> DEBU 4ae4 0xc003c76c80 gate 1555913892375458200 evaluation starts" +"2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae5 0xc003c76c80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae6 0xc003c76c80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae7 0xc003c76c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:12.375 UTC [cauthdsl] func2 -> DEBU 4ae8 0xc003c76c80 principal evaluation fails" +"2019-04-22 06:18:12.376 UTC [cauthdsl] func1 -> DEBU 4ae9 0xc003c76c80 gate 1555913892375458200 evaluation fails" +"2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4aea Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4aeb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4aec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:12.376 UTC [cauthdsl] func1 -> DEBU 4aed 0xc003c774c0 gate 1555913892376196100 evaluation starts" +"2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4aee 0xc003c774c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4aef 0xc003c774c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4af0 0xc003c774c0 principal matched by identity 0" +"2019-04-22 06:18:12.376 UTC [msp.identity] Verify -> DEBU 4af1 Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:12.376 UTC [msp.identity] Verify -> DEBU 4af2 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:12.376 UTC [cauthdsl] func2 -> DEBU 4af3 0xc003c774c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:12.376 UTC [cauthdsl] func1 -> DEBU 4af4 0xc003c774c0 gate 1555913892376196100 evaluation succeeds" +"2019-04-22 06:18:12.376 UTC [policies] Evaluate -> DEBU 4af5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.377 UTC [policies] Evaluate -> DEBU 4af6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:12.377 UTC [policies] Evaluate -> DEBU 4af7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:12.377 UTC [policies] Evaluate -> DEBU 4af8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:12.377 UTC [gossip.gossip] handleMessage -> DEBU 4af9 Exiting" +"2019-04-22 06:18:12.486 UTC [msp] DeserializeIdentity -> DEBU 4afa Obtaining identity" +"2019-04-22 06:18:12.487 UTC [msp] DeserializeIdentity -> DEBU 4afb Obtaining identity" +"2019-04-22 06:18:12.487 UTC [gossip.pull] Hello -> DEBU 4afc Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:12.487 UTC [msp] DeserializeIdentity -> DEBU 4afd Obtaining identity" +"2019-04-22 06:18:12.488 UTC [msp] DeserializeIdentity -> DEBU 4afe Obtaining identity" +"2019-04-22 06:18:12.489 UTC [gossip.comm] Send -> DEBU 4aff Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:12.490 UTC [gossip.comm] sendToEndpoint -> DEBU 4b00 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.490 UTC [gossip.comm] sendToEndpoint -> DEBU 4b01 Exiting" +"2019-04-22 06:18:12.492 UTC [gossip.comm] func1 -> DEBU 4b02 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18356046123090285597 , Msg_type: BLOCK_MSG, digests: [3 8 9 1 2 6 7 4 5], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.492 UTC [gossip.gossip] handleMessage -> DEBU 4b03 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18356046123090285597 , Msg_type: BLOCK_MSG, digests: [3 8 9 1 2 6 7 4 5], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.492 UTC [gossip.pull] HandleMessage -> DEBU 4b04 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 18356046123090285597 , Msg_type: BLOCK_MSG, digests: [3 8 9 1 2 6 7 4 5], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.492 UTC [gossip.gossip] handleMessage -> DEBU 4b05 Exiting" +"2019-04-22 06:18:12.613 UTC [gossip.comm] func1 -> DEBU 4b06 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.613 UTC [gossip.gossip] handleMessage -> DEBU 4b07 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.614 UTC [msp] DeserializeIdentity -> DEBU 4b08 Obtaining identity" +"2019-04-22 06:18:12.614 UTC [msp] DeserializeIdentity -> DEBU 4b09 Obtaining identity" +"2019-04-22 06:18:12.614 UTC [gossip.gossip] handleMessage -> DEBU 4b0a Exiting" +"2019-04-22 06:18:12.669 UTC [gossip.comm] func1 -> DEBU 4b0b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.670 UTC [gossip.gossip] handleMessage -> DEBU 4b0c Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.670 UTC [gossip.pull] HandleMessage -> DEBU 4b0d GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.671 UTC [gossip.pull] SendDigest -> DEBU 4b0e Sending BLOCK_MSG digest: [2 4 7 9 1 3 5 6 8] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:12.671 UTC [gossip.gossip] handleMessage -> DEBU 4b0f Exiting" +"2019-04-22 06:18:12.836 UTC [gossip.comm] func1 -> DEBU 4b10 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.837 UTC [gossip.gossip] handleMessage -> DEBU 4b11 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:12.837 UTC [msp] DeserializeIdentity -> DEBU 4b12 Obtaining identity" +"2019-04-22 06:18:12.838 UTC [msp] DeserializeIdentity -> DEBU 4b13 Obtaining identity" +"2019-04-22 06:18:12.838 UTC [msp] DeserializeIdentity -> DEBU 4b14 Obtaining identity" +"2019-04-22 06:18:12.838 UTC [gossip.gossip] handleMessage -> DEBU 4b15 Exiting" +"2019-04-22 06:18:13.052 UTC [gossip.comm] func1 -> DEBU 4b16 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:13.052 UTC [gossip.gossip] handleMessage -> DEBU 4b17 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:13.052 UTC [msp] DeserializeIdentity -> DEBU 4b18 Obtaining identity" +"2019-04-22 06:18:13.053 UTC [msp] DeserializeIdentity -> DEBU 4b19 Obtaining identity" +"2019-04-22 06:18:13.053 UTC [msp] DeserializeIdentity -> DEBU 4b1a Obtaining identity" +"2019-04-22 06:18:13.053 UTC [gossip.gossip] handleMessage -> DEBU 4b1b Exiting" +"2019-04-22 06:18:14.878 UTC [gossip.pull] Hello -> DEBU 4b1c Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:14.878 UTC [gossip.comm] Send -> DEBU 4b1d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:14.878 UTC [gossip.pull] Hello -> DEBU 4b1e Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:18:14.878 UTC [gossip.comm] Send -> DEBU 4b1f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:14.878 UTC [gossip.pull] Hello -> DEBU 4b20 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:18:14.878 UTC [gossip.comm] Send -> DEBU 4b21 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b22 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b23 Exiting" +"2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b24 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b25 Exiting" +"2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b26 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.878 UTC [gossip.comm] sendToEndpoint -> DEBU 4b27 Exiting" +"2019-04-22 06:18:14.881 UTC [gossip.comm] func1 -> DEBU 4b28 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1288460362703616860 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1288460362703616860 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.881 UTC [gossip.pull] HandleMessage -> DEBU 4b2b GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 1288460362703616860 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2c Exiting" +"2019-04-22 06:18:14.881 UTC [gossip.comm] func1 -> DEBU 4b29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4534385695869609483 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2d Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4534385695869609483 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.881 UTC [gossip.pull] HandleMessage -> DEBU 4b2e GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 4534385695869609483 , Msg_type: IDENTITY_MSG, digests: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.881 UTC [gossip.gossip] handleMessage -> DEBU 4b2f Exiting" +"2019-04-22 06:18:14.882 UTC [gossip.comm] func1 -> DEBU 4b30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7096727527193406498 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.882 UTC [gossip.gossip] handleMessage -> DEBU 4b31 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7096727527193406498 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.882 UTC [gossip.pull] HandleMessage -> DEBU 4b32 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7096727527193406498 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.882 UTC [gossip.gossip] handleMessage -> DEBU 4b33 Exiting" +"2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b34 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103D " +"2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b35 Sign: digest: 016D9736476045572B6AEBBE10A7303CD28832561DAD78F2DEB1E227D6EB711A " +"2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b36 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:14.943 UTC [msp.identity] Sign -> DEBU 4b37 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:14.944 UTC [gossip.comm] Send -> DEBU 4b38 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:14.944 UTC [msp] DeserializeIdentity -> DEBU 4b39 Obtaining identity" +"2019-04-22 06:18:14.944 UTC [gossip.comm] Send -> DEBU 4b3a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:14.944 UTC [msp] DeserializeIdentity -> DEBU 4b3b Obtaining identity" +"2019-04-22 06:18:14.944 UTC [gossip.comm] Send -> DEBU 4b3c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b3f Exiting" +"2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b40 Exiting" +"2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b41 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.944 UTC [gossip.comm] sendToEndpoint -> DEBU 4b42 Exiting" +"2019-04-22 06:18:14.947 UTC [gossip.comm] func1 -> DEBU 4b43 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.947 UTC [gossip.gossip] handleMessage -> DEBU 4b44 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.947 UTC [gossip.gossip] handleMessage -> DEBU 4b45 Exiting" +"2019-04-22 06:18:14.947 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b47 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:14.947 UTC [msp.identity] Verify -> DEBU 4b48 Verify: digest = 00000000 01 6d 97 36 47 60 45 57 2b 6a eb be 10 a7 30 3c |.m.6G`EW+j....0<| +00000010 d2 88 32 56 1d ad 78 f2 de b1 e2 27 d6 eb 71 1a |..2V..x....'..q.|" +"2019-04-22 06:18:14.947 UTC [msp.identity] Verify -> DEBU 4b49 Verify: sig = 00000000 30 44 02 20 29 f7 4a c9 b2 fc db 37 2a e5 60 91 |0D. ).J....7*.`.| +00000010 6b 3f 24 c0 cb 65 31 6a 09 b9 14 a6 cb 88 d2 22 |k?$..e1j......."| +00000020 8d 8e 36 3d 02 20 38 b2 39 82 68 c5 54 93 fa b1 |..6=. 8.9.h.T...| +00000030 3c df 2b d0 1d cb 67 12 bf c5 9f 4a 81 7a b1 00 |<.+...g....J.z..| +00000040 89 d1 1c 0c 2e c3 |......|" +"2019-04-22 06:18:14.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b4a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:14.948 UTC [gossip.discovery] isSentByMe -> DEBU 4b4b Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:14.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b4c Exiting" +"2019-04-22 06:18:14.948 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b4d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:14.948 UTC [msp] DeserializeIdentity -> DEBU 4b4e Obtaining identity" +"2019-04-22 06:18:14.948 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b4f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:14.948 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b50 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:14.948 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b51 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b52 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b53 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b54 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:14.948 UTC [cauthdsl] func1 -> DEBU 4b55 0xc00419f3f0 gate 1555913894948672100 evaluation starts" +"2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b56 0xc00419f3f0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b57 0xc00419f3f0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b58 0xc00419f3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:14.948 UTC [cauthdsl] func2 -> DEBU 4b59 0xc00419f3f0 principal evaluation fails" +"2019-04-22 06:18:14.948 UTC [cauthdsl] func1 -> DEBU 4b5a 0xc00419f3f0 gate 1555913894948672100 evaluation fails" +"2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b5b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b5c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:14.948 UTC [policies] Evaluate -> DEBU 4b5d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:14.949 UTC [cauthdsl] func1 -> DEBU 4b5e 0xc00419fc30 gate 1555913894949007400 evaluation starts" +"2019-04-22 06:18:14.949 UTC [cauthdsl] func2 -> DEBU 4b5f 0xc00419fc30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:14.949 UTC [cauthdsl] func2 -> DEBU 4b60 0xc00419fc30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:14.949 UTC [cauthdsl] func2 -> DEBU 4b61 0xc00419fc30 principal matched by identity 0" +"2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b62 Verify: digest = 00000000 67 1e b8 9b 6f 31 3e cf 99 d8 9a c5 b3 81 87 98 |g...o1>.........| +00000010 9c c5 2c 2f 8e 8e 0a 7a cf b3 01 d9 21 c2 74 ab |..,/...z....!.t.|" +"2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b63 Verify: sig = 00000000 30 45 02 21 00 a5 3c 43 11 ba dd dd a8 0d a9 2d |0E.!.. DEBU 4b64 0xc00419fc30 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:14.949 UTC [cauthdsl] func1 -> DEBU 4b65 0xc00419fc30 gate 1555913894949007400 evaluation succeeds" +"2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b66 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b67 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b68 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:14.949 UTC [policies] Evaluate -> DEBU 4b69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b6a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b6b Exiting" +"2019-04-22 06:18:14.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b6c Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b6d Verify: digest = 00000000 1a 40 26 b7 04 2c 3b ba 13 22 90 0b 8a b3 d5 55 |.@&..,;..".....U| +00000010 f3 83 90 5b 6f 55 da 7a 2f 80 4f c6 c9 09 ce 84 |...[oU.z/.O.....|" +"2019-04-22 06:18:14.949 UTC [msp.identity] Verify -> DEBU 4b6e Verify: sig = 00000000 30 45 02 21 00 88 d0 6a f4 07 31 82 f2 87 ab 2d |0E.!...j..1....-| +00000010 69 50 d2 8d 31 65 4d 30 db 6d 5e e4 b3 f1 34 ad |iP..1eM0.m^...4.| +00000020 1f a4 36 c2 d0 02 20 06 c8 e2 2c 9b a0 e9 bc fc |..6... ...,.....| +00000030 db fa 5c 50 d4 07 3b ec a6 07 4f 1c 2d ef d8 41 |..\P..;...O.-..A| +00000040 20 50 6d 44 e5 c6 73 | PmD..s|" +"2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b6f Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:14.949 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b70 Exiting" +"2019-04-22 06:18:14.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b71 Exiting" +"2019-04-22 06:18:14.950 UTC [gossip.comm] func1 -> DEBU 4b72 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.950 UTC [gossip.gossip] handleMessage -> DEBU 4b73 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.950 UTC [gossip.gossip] handleMessage -> DEBU 4b74 Exiting" +"2019-04-22 06:18:14.950 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b76 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:14.950 UTC [msp.identity] Verify -> DEBU 4b77 Verify: digest = 00000000 1a 40 26 b7 04 2c 3b ba 13 22 90 0b 8a b3 d5 55 |.@&..,;..".....U| +00000010 f3 83 90 5b 6f 55 da 7a 2f 80 4f c6 c9 09 ce 84 |...[oU.z/.O.....|" +"2019-04-22 06:18:14.950 UTC [msp.identity] Verify -> DEBU 4b78 Verify: sig = 00000000 30 45 02 21 00 88 d0 6a f4 07 31 82 f2 87 ab 2d |0E.!...j..1....-| +00000010 69 50 d2 8d 31 65 4d 30 db 6d 5e e4 b3 f1 34 ad |iP..1eM0.m^...4.| +00000020 1f a4 36 c2 d0 02 20 06 c8 e2 2c 9b a0 e9 bc fc |..6... ...,.....| +00000030 db fa 5c 50 d4 07 3b ec a6 07 4f 1c 2d ef d8 41 |..\P..;...O.-..A| +00000040 20 50 6d 44 e5 c6 73 | PmD..s|" +"2019-04-22 06:18:14.950 UTC [gossip.comm] func1 -> DEBU 4b79 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.950 UTC [gossip.gossip] handleMessage -> DEBU 4b7a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b7b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:14.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b7c Exiting" +"2019-04-22 06:18:14.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b7d Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:14.950 UTC [msp.identity] Verify -> DEBU 4b7e Verify: digest = 00000000 01 6d 97 36 47 60 45 57 2b 6a eb be 10 a7 30 3c |.m.6G`EW+j....0<| +00000010 d2 88 32 56 1d ad 78 f2 de b1 e2 27 d6 eb 71 1a |..2V..x....'..q.|" +"2019-04-22 06:18:14.951 UTC [msp.identity] Verify -> DEBU 4b7f Verify: sig = 00000000 30 44 02 20 29 f7 4a c9 b2 fc db 37 2a e5 60 91 |0D. ).J....7*.`.| +00000010 6b 3f 24 c0 cb 65 31 6a 09 b9 14 a6 cb 88 d2 22 |k?$..e1j......."| +00000020 8d 8e 36 3d 02 20 38 b2 39 82 68 c5 54 93 fa b1 |..6=. 8.9.h.T...| +00000030 3c df 2b d0 1d cb 67 12 bf c5 9f 4a 81 7a b1 00 |<.+...g....J.z..| +00000040 89 d1 1c 0c 2e c3 |......|" +"2019-04-22 06:18:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b80 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:14.951 UTC [gossip.discovery] isSentByMe -> DEBU 4b81 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b82 Exiting" +"2019-04-22 06:18:14.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b83 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:14.951 UTC [msp] DeserializeIdentity -> DEBU 4b84 Obtaining identity" +"2019-04-22 06:18:14.951 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:14.951 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b86 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:14.952 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b87 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b8b 0xc003be3cf0 gate 1555913894952204500 evaluation starts" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8c 0xc003be3cf0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8d 0xc003be3cf0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8e 0xc003be3cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b8f 0xc003be3cf0 principal evaluation fails" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b90 0xc003be3cf0 gate 1555913894952204500 evaluation fails" +"2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b91 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:14.952 UTC [policies] Evaluate -> DEBU 4b93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b94 0xc003bf2530 gate 1555913894952592600 evaluation starts" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b95 0xc003bf2530 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b96 0xc003bf2530 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b97 0xc003bf2530 principal matched by identity 0" +"2019-04-22 06:18:14.952 UTC [msp.identity] Verify -> DEBU 4b98 Verify: digest = 00000000 4a 0c 64 7f 73 2e 71 9b 2b 17 55 08 0b 47 42 f3 |J.d.s.q.+.U..GB.| +00000010 76 6a e0 96 17 ac 0a 8e fa 33 c4 54 78 f6 0f b3 |vj.......3.Tx...|" +"2019-04-22 06:18:14.952 UTC [msp.identity] Verify -> DEBU 4b99 Verify: sig = 00000000 30 45 02 21 00 b2 f1 2f c7 01 38 fc 90 e2 82 3b |0E.!.../..8....;| +00000010 c6 f1 a1 29 16 2a 59 dd b4 78 38 8d 69 01 fb 2e |...).*Y..x8.i...| +00000020 53 06 ff d4 86 02 20 2b ec 12 04 dd 4c 96 22 46 |S..... +....L."F| +00000030 dd a6 6e b0 a0 ab 5c d8 3a 07 be 3d 9f ae fc d1 |..n...\.:..=....| +00000040 bf e4 90 0d 2b d3 59 |....+.Y|" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func2 -> DEBU 4b9a 0xc003bf2530 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:14.952 UTC [cauthdsl] func1 -> DEBU 4b9b 0xc003bf2530 gate 1555913894952592600 evaluation succeeds" +"2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:14.953 UTC [policies] Evaluate -> DEBU 4b9f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:14.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ba0 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:14.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ba1 Exiting" +"2019-04-22 06:18:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba2 Exiting" +"2019-04-22 06:18:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-04-22 06:18:14.953 UTC [gossip.gossip] handleMessage -> DEBU 4ba4 Exiting" +"2019-04-22 06:18:14.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ba5 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba6 Verify: digest = 00000000 01 6d 97 36 47 60 45 57 2b 6a eb be 10 a7 30 3c |.m.6G`EW+j....0<| +00000010 d2 88 32 56 1d ad 78 f2 de b1 e2 27 d6 eb 71 1a |..2V..x....'..q.|" +"2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba7 Verify: sig = 00000000 30 44 02 20 29 f7 4a c9 b2 fc db 37 2a e5 60 91 |0D. ).J....7*.`.| +00000010 6b 3f 24 c0 cb 65 31 6a 09 b9 14 a6 cb 88 d2 22 |k?$..e1j......."| +00000020 8d 8e 36 3d 02 20 38 b2 39 82 68 c5 54 93 fa b1 |..6=. 8.9.h.T...| +00000030 3c df 2b d0 1d cb 67 12 bf c5 9f 4a 81 7a b1 00 |<.+...g....J.z..| +00000040 89 d1 1c 0c 2e c3 |......|" +"2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba8 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:18:14.953 UTC [msp.identity] Verify -> DEBU 4ba9 Verify: sig = 00000000 30 45 02 21 00 b8 21 cb 18 fa e4 3e 9d 17 6a 24 |0E.!..!....>..j$| +00000010 9c 94 67 63 ae 39 8e d9 7e de a7 3e 1c 93 12 1a |..gc.9..~..>....| +00000020 46 52 5e cc b3 02 20 7b 90 8c 63 80 61 d7 0a 4c |FR^... {..c.a..L| +00000030 32 67 5f 51 59 0f 2b 27 70 cb ad b5 d2 21 79 ab |2g_QY.+'p....!y.| +00000040 8c 01 83 31 e6 09 d9 |...1...|" +"2019-04-22 06:18:14.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4baa Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:14.954 UTC [gossip.discovery] isSentByMe -> DEBU 4bab Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:61 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:14.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bac Exiting" +"2019-04-22 06:18:14.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bad Exiting" +"2019-04-22 06:18:15.114 UTC [gossip.comm] func1 -> DEBU 4bae Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.114 UTC [gossip.gossip] handleMessage -> DEBU 4baf Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.114 UTC [gossip.pull] HandleMessage -> DEBU 4bb0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.114 UTC [gossip.pull] SendDigest -> DEBU 4bb1 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:15.114 UTC [gossip.gossip] handleMessage -> DEBU 4bb2 Exiting" +"2019-04-22 06:18:15.191 UTC [gossip.comm] func1 -> DEBU 4bb3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.194 UTC [gossip.gossip] handleMessage -> DEBU 4bb4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.194 UTC [gossip.gossip] handleMessage -> DEBU 4bb5 Exiting" +"2019-04-22 06:18:15.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bb6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 272 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.195 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bb7 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:15.195 UTC [msp.identity] Verify -> DEBU 4bb8 Verify: digest = 00000000 c1 f3 46 42 2a 5a 21 96 fc 52 ed 7b da 85 62 5f |..FB*Z!..R.{..b_| +00000010 ba 31 b1 f7 60 b4 93 b2 a9 c0 19 3f a1 26 00 1f |.1..`......?.&..|" +"2019-04-22 06:18:15.195 UTC [msp.identity] Verify -> DEBU 4bb9 Verify: sig = 00000000 30 45 02 21 00 db 15 cd 75 10 c1 64 81 8c 9f a3 |0E.!....u..d....| +00000010 11 94 b6 af 74 49 47 7f ec 40 c7 4d ea fc 2a e4 |....tIG..@.M..*.| +00000020 a4 ae a4 f9 04 02 20 17 37 e6 02 b2 d4 ea 21 80 |...... .7.....!.| +00000030 72 d5 23 d2 93 9d 3b f2 c6 c2 f2 f9 9c 05 b4 6e |r.#...;........n| +00000040 c0 a3 31 a6 20 f5 8a |..1. ..|" +"2019-04-22 06:18:15.196 UTC [msp.identity] Verify -> DEBU 4bba Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:15.196 UTC [msp.identity] Verify -> DEBU 4bbb Verify: sig = 00000000 30 45 02 21 00 bf 87 11 26 21 74 d4 5f 12 49 43 |0E.!....&!t._.IC| +00000010 cb 48 b3 1c 8f 4a 91 ae 70 48 e6 65 5e 5f d7 6c |.H...J..pH.e^_.l| +00000020 41 fd 54 2e 29 02 20 52 26 e5 ea 93 2e fc f3 49 |A.T.). R&......I| +00000030 46 63 e1 46 73 a3 b3 06 45 a3 05 84 ec 06 16 ff |Fc.Fs...E.......| +00000040 67 b9 2c 0d 27 5e e6 |g.,.'^.|" +"2019-04-22 06:18:15.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bbc Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:15.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bbd Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:18:15.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bbe updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 " +"2019-04-22 06:18:15.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bbf Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 " +"2019-04-22 06:18:15.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc0 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:66 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:15.197 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bc1 Exiting" +"2019-04-22 06:18:15.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bc2 Exiting" +"2019-04-22 06:18:15.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bc3 Exiting" +"2019-04-22 06:18:15.198 UTC [gossip.discovery] sendMemResponse -> DEBU 4bc4 Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:15.198 UTC [msp] DeserializeIdentity -> DEBU 4bc5 Obtaining identity" +"2019-04-22 06:18:15.198 UTC [msp] DeserializeIdentity -> DEBU 4bc6 Obtaining identity" +"2019-04-22 06:18:15.199 UTC [gossip.comm] Send -> DEBU 4bc7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:15.199 UTC [gossip.discovery] sendMemResponse -> DEBU 4bc8 Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:18:15.199 UTC [gossip.comm] sendToEndpoint -> DEBU 4bc9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 539 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.200 UTC [gossip.comm] sendToEndpoint -> DEBU 4bca Exiting" +"2019-04-22 06:18:15.621 UTC [gossip.comm] func1 -> DEBU 4bcb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.622 UTC [gossip.gossip] handleMessage -> DEBU 4bcc Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.622 UTC [gossip.pull] HandleMessage -> DEBU 4bcd GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bce Obtaining identity" +"2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bcf Obtaining identity" +"2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd0 Obtaining identity" +"2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd1 Obtaining identity" +"2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd2 Obtaining identity" +"2019-04-22 06:18:15.622 UTC [msp] DeserializeIdentity -> DEBU 4bd3 Obtaining identity" +"2019-04-22 06:18:15.622 UTC [gossip.pull] SendDigest -> DEBU 4bd4 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:15.622 UTC [gossip.gossip] handleMessage -> DEBU 4bd5 Exiting" +"2019-04-22 06:18:15.637 UTC [gossip.comm] func1 -> DEBU 4bd6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.637 UTC [gossip.gossip] handleMessage -> DEBU 4bd7 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.637 UTC [gossip.gossip] handleMessage -> DEBU 4bd8 Exiting" +"2019-04-22 06:18:15.637 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bd9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.637 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bda Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:15.637 UTC [msp] DeserializeIdentity -> DEBU 4bdb Obtaining identity" +"2019-04-22 06:18:15.638 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4bdc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:15.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bdd Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:15.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bde Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4bdf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:15.638 UTC [cauthdsl] func1 -> DEBU 4be2 0xc003b22fa0 gate 1555913895638436200 evaluation starts" +"2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be3 0xc003b22fa0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be4 0xc003b22fa0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be5 0xc003b22fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:15.638 UTC [cauthdsl] func2 -> DEBU 4be6 0xc003b22fa0 principal evaluation fails" +"2019-04-22 06:18:15.638 UTC [cauthdsl] func1 -> DEBU 4be7 0xc003b22fa0 gate 1555913895638436200 evaluation fails" +"2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4be9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:15.638 UTC [policies] Evaluate -> DEBU 4bea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:15.639 UTC [cauthdsl] func1 -> DEBU 4beb 0xc003b237e0 gate 1555913895639029600 evaluation starts" +"2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bec 0xc003b237e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bed 0xc003b237e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bee 0xc003b237e0 principal matched by identity 0" +"2019-04-22 06:18:15.639 UTC [msp.identity] Verify -> DEBU 4bef Verify: digest = 00000000 40 f0 92 62 89 b7 b3 33 fc af 40 97 c6 82 1e a7 |@..b...3..@.....| +00000010 ad 37 4e 41 3a 71 21 56 bd 71 b9 f9 18 1c 1b 13 |.7NA:q!V.q......|" +"2019-04-22 06:18:15.639 UTC [msp.identity] Verify -> DEBU 4bf0 Verify: sig = 00000000 30 44 02 20 5a e2 98 1f c0 3b d1 a3 88 68 4f e9 |0D. Z....;...hO.| +00000010 0e 72 b9 fc a7 84 80 8f 9f e5 69 78 cc c3 a3 ff |.r........ix....| +00000020 0e fc f5 b7 02 20 48 15 78 6e ae 83 09 39 7f 8f |..... H.xn...9..| +00000030 f6 5d 50 f8 19 9d 38 4c 4f 14 06 da 79 fb 9c c0 |.]P...8LO...y...| +00000040 40 de 2b ec 34 eb |@.+.4.|" +"2019-04-22 06:18:15.639 UTC [cauthdsl] func2 -> DEBU 4bf1 0xc003b237e0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:15.639 UTC [cauthdsl] func1 -> DEBU 4bf2 0xc003b237e0 gate 1555913895639029600 evaluation succeeds" +"2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf5 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:15.639 UTC [policies] Evaluate -> DEBU 4bf6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:15.639 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bf7 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:15.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bf8 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:15.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bf9 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 " +"2019-04-22 06:18:15.639 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bfa Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 " +"2019-04-22 06:18:15.643 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bfb Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:15.643 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bfc Exiting" +"2019-04-22 06:18:15.644 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bfd Exiting" +"2019-04-22 06:18:15.644 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bfe Exiting" +"2019-04-22 06:18:15.644 UTC [gossip.discovery] sendMemResponse -> DEBU 4bff Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:15.644 UTC [msp] DeserializeIdentity -> DEBU 4c00 Obtaining identity" +"2019-04-22 06:18:15.644 UTC [msp] DeserializeIdentity -> DEBU 4c01 Obtaining identity" +"2019-04-22 06:18:15.650 UTC [msp] DeserializeIdentity -> DEBU 4c02 Obtaining identity" +"2019-04-22 06:18:15.651 UTC [gossip.comm] Send -> DEBU 4c03 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:15.654 UTC [gossip.comm] sendToEndpoint -> DEBU 4c04 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-04-22 06:18:15.654 UTC [gossip.comm] sendToEndpoint -> DEBU 4c05 Exiting" +"2019-04-22 06:18:15.653 UTC [gossip.discovery] sendMemResponse -> DEBU 4c06 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c07 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103E " +"2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c08 Sign: digest: 6FA5A45D2F253067B483AAC0660681B9B57F8463BA7455BA1DF65398C4140A5A " +"2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c09 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:15.811 UTC [msp.identity] Sign -> DEBU 4c0a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:15.811 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4c0b Sleeping 5s" +"2019-04-22 06:18:15.822 UTC [msp] DeserializeIdentity -> DEBU 4c0c Obtaining identity" +"2019-04-22 06:18:15.823 UTC [msp] DeserializeIdentity -> DEBU 4c0d Obtaining identity" +"2019-04-22 06:18:15.823 UTC [msp] DeserializeIdentity -> DEBU 4c0e Obtaining identity" +"2019-04-22 06:18:15.823 UTC [gossip.comm] Send -> DEBU 4c0f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:15.823 UTC [msp] DeserializeIdentity -> DEBU 4c10 Obtaining identity" +"2019-04-22 06:18:15.823 UTC [gossip.comm] Send -> DEBU 4c11 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c12 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c13 Exiting" +"2019-04-22 06:18:15.824 UTC [gossip.comm] Send -> DEBU 4c14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c15 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c16 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c17 Exiting" +"2019-04-22 06:18:15.824 UTC [gossip.comm] sendToEndpoint -> DEBU 4c18 Exiting" +"2019-04-22 06:18:16.004 UTC [gossip.comm] func1 -> DEBU 4c19 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.004 UTC [gossip.gossip] handleMessage -> DEBU 4c1a Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.004 UTC [gossip.pull] HandleMessage -> DEBU 4c1b GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1c Obtaining identity" +"2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1d Obtaining identity" +"2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1e Obtaining identity" +"2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c1f Obtaining identity" +"2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c20 Obtaining identity" +"2019-04-22 06:18:16.004 UTC [msp] DeserializeIdentity -> DEBU 4c21 Obtaining identity" +"2019-04-22 06:18:16.004 UTC [gossip.pull] SendDigest -> DEBU 4c22 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:16.004 UTC [gossip.gossip] handleMessage -> DEBU 4c23 Exiting" +"2019-04-22 06:18:16.027 UTC [gossip.comm] func1 -> DEBU 4c24 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.027 UTC [gossip.gossip] handleMessage -> DEBU 4c25 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.027 UTC [gossip.gossip] handleMessage -> DEBU 4c26 Exiting" +"2019-04-22 06:18:16.027 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.027 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c28 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:16.028 UTC [msp] DeserializeIdentity -> DEBU 4c29 Obtaining identity" +"2019-04-22 06:18:16.028 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c2a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.028 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c2b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c2c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.029 UTC [policies] Evaluate -> DEBU 4c2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.029 UTC [policies] Evaluate -> DEBU 4c2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.029 UTC [policies] Evaluate -> DEBU 4c2f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.029 UTC [cauthdsl] func1 -> DEBU 4c30 0xc00291b550 gate 1555913896029664100 evaluation starts" +"2019-04-22 06:18:16.029 UTC [cauthdsl] func2 -> DEBU 4c31 0xc00291b550 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.030 UTC [cauthdsl] func2 -> DEBU 4c32 0xc00291b550 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.030 UTC [cauthdsl] func2 -> DEBU 4c33 0xc00291b550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.030 UTC [cauthdsl] func2 -> DEBU 4c34 0xc00291b550 principal evaluation fails" +"2019-04-22 06:18:16.030 UTC [cauthdsl] func1 -> DEBU 4c35 0xc00291b550 gate 1555913896029664100 evaluation fails" +"2019-04-22 06:18:16.030 UTC [policies] Evaluate -> DEBU 4c36 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.030 UTC [policies] Evaluate -> DEBU 4c37 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.030 UTC [policies] Evaluate -> DEBU 4c38 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.031 UTC [cauthdsl] func1 -> DEBU 4c39 0xc00291bd90 gate 1555913896031101600 evaluation starts" +"2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3a 0xc00291bd90 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3b 0xc00291bd90 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3c 0xc00291bd90 principal matched by identity 0" +"2019-04-22 06:18:16.031 UTC [msp.identity] Verify -> DEBU 4c3d Verify: digest = 00000000 f1 e0 4d a8 06 9d 78 cc 31 05 d5 2c e5 6a 86 f9 |..M...x.1..,.j..| +00000010 52 fa 3d db 1b 75 54 53 dc 27 b5 51 0a 5e 51 50 |R.=..uTS.'.Q.^QP|" +"2019-04-22 06:18:16.031 UTC [msp.identity] Verify -> DEBU 4c3e Verify: sig = 00000000 30 44 02 20 1c 6d b2 da d6 4e b9 fe 67 06 bd 2d |0D. .m...N..g..-| +00000010 53 68 54 83 5e 1d cc c1 22 2d 6d 15 b0 8e d3 57 |ShT.^..."-m....W| +00000020 da cf 45 34 02 20 32 79 6f 84 fc a5 c7 15 af 4e |..E4. 2yo......N| +00000030 83 cf df 9c ec ac 1a 9f a0 ef c0 d4 be e5 03 a6 |................| +00000040 da 7a 72 0f 1b 69 |.zr..i|" +"2019-04-22 06:18:16.031 UTC [cauthdsl] func2 -> DEBU 4c3f 0xc00291bd90 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.049 UTC [cauthdsl] func1 -> DEBU 4c40 0xc00291bd90 gate 1555913896031101600 evaluation succeeds" +"2019-04-22 06:18:16.050 UTC [policies] Evaluate -> DEBU 4c41 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.051 UTC [policies] Evaluate -> DEBU 4c42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.053 UTC [policies] Evaluate -> DEBU 4c43 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.054 UTC [policies] Evaluate -> DEBU 4c44 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.054 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c45 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c46 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:16.055 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c47 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 " +"2019-04-22 06:18:16.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c48 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 " +"2019-04-22 06:18:16.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c49 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:61 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:16.056 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c4a Exiting" +"2019-04-22 06:18:16.056 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c4b Exiting" +"2019-04-22 06:18:16.057 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c4c Exiting" +"2019-04-22 06:18:16.057 UTC [gossip.discovery] sendMemResponse -> DEBU 4c4d Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:16.057 UTC [msp] DeserializeIdentity -> DEBU 4c4e Obtaining identity" +"2019-04-22 06:18:16.081 UTC [msp] DeserializeIdentity -> DEBU 4c4f Obtaining identity" +"2019-04-22 06:18:16.081 UTC [msp] DeserializeIdentity -> DEBU 4c50 Obtaining identity" +"2019-04-22 06:18:16.081 UTC [gossip.comm] Send -> DEBU 4c51 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:16.081 UTC [gossip.discovery] sendMemResponse -> DEBU 4c52 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:16.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4c53 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.081 UTC [gossip.comm] sendToEndpoint -> DEBU 4c54 Exiting" +"2019-04-22 06:18:16.106 UTC [gossip.comm] func1 -> DEBU 4c55 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:16.107 UTC [gossip.gossip] handleMessage -> DEBU 4c56 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:16.107 UTC [gossip.gossip] handleMessage -> DEBU 4c57 Exiting" +"2019-04-22 06:18:16.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c58 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:16.107 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c59 Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5a Verify: digest = 00000000 87 9a 97 1e 9e a1 0b 26 90 c5 1d db b4 45 fb 83 |.......&.....E..| +00000010 5b e9 e8 28 32 3c 33 b5 ee 9d bb 85 91 d2 39 e7 |[..(2<3.......9.|" +"2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5b Verify: sig = 00000000 30 44 02 20 2d b2 12 dd 42 8e 1c 1a e4 25 76 a0 |0D. -...B....%v.| +00000010 45 00 12 63 94 c7 91 bc 4f 64 4e 85 b4 1f dd 7f |E..c....OdN.....| +00000020 e5 53 a3 b8 02 20 30 e4 4b 71 b0 d0 12 61 5f cd |.S... 0.Kq...a_.| +00000030 e9 a5 96 e8 b1 e0 7c da f1 16 5b 4e 1e f7 c5 e0 |......|...[N....| +00000040 d4 66 cc fc 83 51 |.f...Q|" +"2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5c Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:16.107 UTC [msp.identity] Verify -> DEBU 4c5d Verify: sig = 00000000 30 45 02 21 00 d3 20 1e 64 4c dd 32 2a a3 78 de |0E.!.. .dL.2*.x.| +00000010 28 b5 1c b5 96 05 d8 f0 f5 78 6b db 7d 94 0b eb |(........xk.}...| +00000020 36 46 4f e0 05 02 20 70 46 49 52 f2 e0 6f 34 15 |6FO... pFIR..o4.| +00000030 da 5b 15 93 87 01 89 72 23 c3 92 7f 02 5e 2d b6 |.[.....r#....^-.| +00000040 6b 7d e3 14 7d 94 ed |k}..}..|" +"2019-04-22 06:18:16.107 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c5e Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c5f Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c60 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 " +"2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c61 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 " +"2019-04-22 06:18:16.107 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c62 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:67 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:16.108 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c63 Exiting" +"2019-04-22 06:18:16.108 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c64 Exiting" +"2019-04-22 06:18:16.108 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c65 Exiting" +"2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c66 Obtaining identity" +"2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c67 Obtaining identity" +"2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c68 Obtaining identity" +"2019-04-22 06:18:16.109 UTC [gossip.comm] Send -> DEBU 4c69 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:16.109 UTC [msp] DeserializeIdentity -> DEBU 4c6a Obtaining identity" +"2019-04-22 06:18:16.109 UTC [gossip.comm] Send -> DEBU 4c6b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6d Exiting" +"2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.109 UTC [gossip.comm] sendToEndpoint -> DEBU 4c6f Exiting" +"2019-04-22 06:18:16.117 UTC [gossip.comm] func1 -> DEBU 4c70 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.117 UTC [gossip.gossip] handleMessage -> DEBU 4c71 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.117 UTC [gossip.gossip] handleMessage -> DEBU 4c72 Exiting" +"2019-04-22 06:18:16.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c73 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.118 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c74 Exiting" +"2019-04-22 06:18:16.123 UTC [gossip.comm] func1 -> DEBU 4c75 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.123 UTC [gossip.gossip] handleMessage -> DEBU 4c76 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.123 UTC [gossip.gossip] handleMessage -> DEBU 4c77 Exiting" +"2019-04-22 06:18:16.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c78 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.123 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c79 Exiting" +"2019-04-22 06:18:16.354 UTC [msp] DeserializeIdentity -> DEBU 4c7a Obtaining identity" +"2019-04-22 06:18:16.355 UTC [msp] DeserializeIdentity -> DEBU 4c7b Obtaining identity" +"2019-04-22 06:18:16.355 UTC [gossip.comm] Send -> DEBU 4c7c Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:18:16.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4c7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4c7e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4c7f Exiting" +"2019-04-22 06:18:16.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4c80 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4c81 Exiting" +"2019-04-22 06:18:16.359 UTC [gossip.comm] func1 -> DEBU 4c82 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.359 UTC [gossip.gossip] handleMessage -> DEBU 4c83 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.360 UTC [msp] DeserializeIdentity -> DEBU 4c84 Obtaining identity" +"2019-04-22 06:18:16.360 UTC [msp] DeserializeIdentity -> DEBU 4c85 Obtaining identity" +"2019-04-22 06:18:16.360 UTC [msp] DeserializeIdentity -> DEBU 4c86 Obtaining identity" +"2019-04-22 06:18:16.360 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c87 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c88 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.361 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c89 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.361 UTC [cauthdsl] func1 -> DEBU 4c8d 0xc003792f30 gate 1555913896361435900 evaluation starts" +"2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c8e 0xc003792f30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c8f 0xc003792f30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c90 0xc003792f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.361 UTC [cauthdsl] func2 -> DEBU 4c91 0xc003792f30 principal evaluation fails" +"2019-04-22 06:18:16.361 UTC [cauthdsl] func1 -> DEBU 4c92 0xc003792f30 gate 1555913896361435900 evaluation fails" +"2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c93 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.361 UTC [policies] Evaluate -> DEBU 4c95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.362 UTC [cauthdsl] func1 -> DEBU 4c96 0xc003793770 gate 1555913896361988800 evaluation starts" +"2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c97 0xc003793770 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c98 0xc003793770 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c99 0xc003793770 principal matched by identity 0" +"2019-04-22 06:18:16.362 UTC [msp.identity] Verify -> DEBU 4c9a Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:16.362 UTC [msp.identity] Verify -> DEBU 4c9b Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:16.362 UTC [cauthdsl] func2 -> DEBU 4c9c 0xc003793770 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.362 UTC [cauthdsl] func1 -> DEBU 4c9d 0xc003793770 gate 1555913896361988800 evaluation succeeds" +"2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4c9e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4c9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4ca0 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.362 UTC [policies] Evaluate -> DEBU 4ca1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.363 UTC [msp.identity] Verify -> DEBU 4ca2 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:16.363 UTC [msp.identity] Verify -> DEBU 4ca3 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:16.363 UTC [msp.identity] Verify -> DEBU 4ca4 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:16.364 UTC [msp.identity] Verify -> DEBU 4ca5 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:16.364 UTC [msp] DeserializeIdentity -> DEBU 4ca6 Obtaining identity" +"2019-04-22 06:18:16.364 UTC [msp] DeserializeIdentity -> DEBU 4ca7 Obtaining identity" +"2019-04-22 06:18:16.364 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ca8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ca9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4caa Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.364 UTC [policies] Evaluate -> DEBU 4cab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.364 UTC [policies] Evaluate -> DEBU 4cac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.364 UTC [policies] Evaluate -> DEBU 4cad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.364 UTC [cauthdsl] func1 -> DEBU 4cae 0xc0037a5d80 gate 1555913896364947400 evaluation starts" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4caf 0xc0037a5d80 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb0 0xc0037a5d80 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb1 0xc0037a5d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb2 0xc0037a5d80 principal evaluation fails" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func1 -> DEBU 4cb3 0xc0037a5d80 gate 1555913896364947400 evaluation fails" +"2019-04-22 06:18:16.365 UTC [policies] Evaluate -> DEBU 4cb4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.365 UTC [policies] Evaluate -> DEBU 4cb5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.365 UTC [policies] Evaluate -> DEBU 4cb6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func1 -> DEBU 4cb7 0xc0037be5c0 gate 1555913896365410100 evaluation starts" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb8 0xc0037be5c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cb9 0xc0037be5c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cba 0xc0037be5c0 principal matched by identity 0" +"2019-04-22 06:18:16.365 UTC [msp.identity] Verify -> DEBU 4cbb Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:16.365 UTC [msp.identity] Verify -> DEBU 4cbc Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func2 -> DEBU 4cbd 0xc0037be5c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.365 UTC [cauthdsl] func1 -> DEBU 4cbe 0xc0037be5c0 gate 1555913896365410100 evaluation succeeds" +"2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cbf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cc0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cc1 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.366 UTC [policies] Evaluate -> DEBU 4cc2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.366 UTC [gossip.gossip] handleMessage -> DEBU 4cc3 Exiting" +"2019-04-22 06:18:16.366 UTC [gossip.comm] func1 -> DEBU 4cc4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.366 UTC [gossip.gossip] handleMessage -> DEBU 4cc5 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.366 UTC [msp] DeserializeIdentity -> DEBU 4cc6 Obtaining identity" +"2019-04-22 06:18:16.366 UTC [msp] DeserializeIdentity -> DEBU 4cc7 Obtaining identity" +"2019-04-22 06:18:16.367 UTC [msp] DeserializeIdentity -> DEBU 4cc8 Obtaining identity" +"2019-04-22 06:18:16.367 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4cc9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.367 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cca Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.367 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ccb Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.367 UTC [policies] Evaluate -> DEBU 4ccc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.367 UTC [policies] Evaluate -> DEBU 4ccd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.367 UTC [policies] Evaluate -> DEBU 4cce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.367 UTC [cauthdsl] func1 -> DEBU 4ccf 0xc003f30230 gate 1555913896367612800 evaluation starts" +"2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd0 0xc003f30230 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd1 0xc003f30230 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd2 0xc003f30230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.367 UTC [cauthdsl] func2 -> DEBU 4cd3 0xc003f30230 principal evaluation fails" +"2019-04-22 06:18:16.368 UTC [cauthdsl] func1 -> DEBU 4cd4 0xc003f30230 gate 1555913896367612800 evaluation fails" +"2019-04-22 06:18:16.368 UTC [policies] Evaluate -> DEBU 4cd5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.368 UTC [policies] Evaluate -> DEBU 4cd6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.368 UTC [policies] Evaluate -> DEBU 4cd7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.368 UTC [cauthdsl] func1 -> DEBU 4cd8 0xc003f30a70 gate 1555913896368285000 evaluation starts" +"2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cd9 0xc003f30a70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cda 0xc003f30a70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cdb 0xc003f30a70 principal matched by identity 0" +"2019-04-22 06:18:16.368 UTC [msp.identity] Verify -> DEBU 4cdc Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:16.368 UTC [msp.identity] Verify -> DEBU 4cdd Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:16.368 UTC [cauthdsl] func2 -> DEBU 4cde 0xc003f30a70 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.369 UTC [cauthdsl] func1 -> DEBU 4cdf 0xc003f30a70 gate 1555913896368285000 evaluation succeeds" +"2019-04-22 06:18:16.369 UTC [policies] Evaluate -> DEBU 4ce0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.369 UTC [policies] Evaluate -> DEBU 4ce1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.369 UTC [policies] Evaluate -> DEBU 4ce2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.370 UTC [policies] Evaluate -> DEBU 4ce3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.370 UTC [msp.identity] Verify -> DEBU 4ce4 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:16.370 UTC [msp.identity] Verify -> DEBU 4ce5 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:16.372 UTC [msp.identity] Verify -> DEBU 4ce6 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:16.372 UTC [msp.identity] Verify -> DEBU 4ce7 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:16.373 UTC [msp] DeserializeIdentity -> DEBU 4ce8 Obtaining identity" +"2019-04-22 06:18:16.374 UTC [msp] DeserializeIdentity -> DEBU 4ce9 Obtaining identity" +"2019-04-22 06:18:16.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4cea Exiting" +"2019-04-22 06:18:16.375 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ceb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cec Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.375 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ced Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.375 UTC [policies] Evaluate -> DEBU 4cee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.375 UTC [gossip.comm] func1 -> DEBU 4cef Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.375 UTC [policies] Evaluate -> DEBU 4cf0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.375 UTC [policies] Evaluate -> DEBU 4cf1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.375 UTC [cauthdsl] func1 -> DEBU 4cf2 0xc003f47080 gate 1555913896375698400 evaluation starts" +"2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf3 0xc003f47080 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf4 0xc003f47080 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf5 0xc003f47080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.375 UTC [cauthdsl] func2 -> DEBU 4cf6 0xc003f47080 principal evaluation fails" +"2019-04-22 06:18:16.375 UTC [cauthdsl] func1 -> DEBU 4cf7 0xc003f47080 gate 1555913896375698400 evaluation fails" +"2019-04-22 06:18:16.376 UTC [policies] Evaluate -> DEBU 4cf8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.376 UTC [policies] Evaluate -> DEBU 4cf9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.376 UTC [policies] Evaluate -> DEBU 4cfa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.376 UTC [cauthdsl] func1 -> DEBU 4cfb 0xc003f478c0 gate 1555913896376564900 evaluation starts" +"2019-04-22 06:18:16.376 UTC [cauthdsl] func2 -> DEBU 4cfc 0xc003f478c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.376 UTC [cauthdsl] func2 -> DEBU 4cfd 0xc003f478c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.376 UTC [cauthdsl] func2 -> DEBU 4cfe 0xc003f478c0 principal matched by identity 0" +"2019-04-22 06:18:16.376 UTC [msp.identity] Verify -> DEBU 4cff Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:16.376 UTC [msp.identity] Verify -> DEBU 4d00 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:16.377 UTC [cauthdsl] func2 -> DEBU 4d01 0xc003f478c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.377 UTC [cauthdsl] func1 -> DEBU 4d02 0xc003f478c0 gate 1555913896376564900 evaluation succeeds" +"2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d05 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.377 UTC [policies] Evaluate -> DEBU 4d06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.377 UTC [gossip.gossip] handleMessage -> DEBU 4d07 Exiting" +"2019-04-22 06:18:16.377 UTC [gossip.gossip] handleMessage -> DEBU 4d08 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.378 UTC [msp.identity] Verify -> DEBU 4d09 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:16.378 UTC [msp.identity] Verify -> DEBU 4d0a Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:16.379 UTC [msp.identity] Verify -> DEBU 4d0b Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:16.379 UTC [msp.identity] Verify -> DEBU 4d0c Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:16.379 UTC [msp] DeserializeIdentity -> DEBU 4d0d Obtaining identity" +"2019-04-22 06:18:16.379 UTC [msp] DeserializeIdentity -> DEBU 4d0e Obtaining identity" +"2019-04-22 06:18:16.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d0f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d10 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.380 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d11 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func1 -> DEBU 4d15 0xc003958110 gate 1555913896380318400 evaluation starts" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d16 0xc003958110 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d17 0xc003958110 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d18 0xc003958110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d19 0xc003958110 principal evaluation fails" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func1 -> DEBU 4d1a 0xc003958110 gate 1555913896380318400 evaluation fails" +"2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d1b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d1c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.380 UTC [policies] Evaluate -> DEBU 4d1d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func1 -> DEBU 4d1e 0xc003958950 gate 1555913896380767800 evaluation starts" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d1f 0xc003958950 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d20 0xc003958950 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.380 UTC [cauthdsl] func2 -> DEBU 4d21 0xc003958950 principal matched by identity 0" +"2019-04-22 06:18:16.380 UTC [msp.identity] Verify -> DEBU 4d22 Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:16.381 UTC [msp.identity] Verify -> DEBU 4d23 Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:16.381 UTC [cauthdsl] func2 -> DEBU 4d24 0xc003958950 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.381 UTC [cauthdsl] func1 -> DEBU 4d25 0xc003958950 gate 1555913896380767800 evaluation succeeds" +"2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d28 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.381 UTC [policies] Evaluate -> DEBU 4d29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.381 UTC [msp] DeserializeIdentity -> DEBU 4d2a Obtaining identity" +"2019-04-22 06:18:16.381 UTC [msp] DeserializeIdentity -> DEBU 4d2b Obtaining identity" +"2019-04-22 06:18:16.381 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d2c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d2d Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.382 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d2e Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func1 -> DEBU 4d32 0xc003974120 gate 1555913896382258600 evaluation starts" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d33 0xc003974120 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d34 0xc003974120 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d35 0xc003974120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d36 0xc003974120 principal evaluation fails" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func1 -> DEBU 4d37 0xc003974120 gate 1555913896382258600 evaluation fails" +"2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d38 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.382 UTC [policies] Evaluate -> DEBU 4d3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func1 -> DEBU 4d3b 0xc003974960 gate 1555913896382859800 evaluation starts" +"2019-04-22 06:18:16.382 UTC [cauthdsl] func2 -> DEBU 4d3c 0xc003974960 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.383 UTC [cauthdsl] func2 -> DEBU 4d3d 0xc003974960 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.383 UTC [cauthdsl] func2 -> DEBU 4d3e 0xc003974960 principal matched by identity 0" +"2019-04-22 06:18:16.383 UTC [msp.identity] Verify -> DEBU 4d3f Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:16.383 UTC [msp.identity] Verify -> DEBU 4d40 Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:16.383 UTC [cauthdsl] func2 -> DEBU 4d41 0xc003974960 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.383 UTC [cauthdsl] func1 -> DEBU 4d42 0xc003974960 gate 1555913896382859800 evaluation succeeds" +"2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d43 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d45 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.383 UTC [policies] Evaluate -> DEBU 4d46 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.383 UTC [gossip.gossip] handleMessage -> DEBU 4d47 Exiting" +"2019-04-22 06:18:16.444 UTC [gossip.election] waitForInterrupt -> DEBU 4d48 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:18:16.444 UTC [gossip.election] IsLeader -> DEBU 4d49 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:18:16.444 UTC [msp.identity] Sign -> DEBU 4d4a Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510141801 " +"2019-04-22 06:18:16.444 UTC [msp.identity] Sign -> DEBU 4d4b Sign: digest: 6BA78C4951DE27327110743AE6AC3826AADF1414E348F6A69FCF32A9DF2B1F57 " +"2019-04-22 06:18:16.445 UTC [gossip.election] waitForInterrupt -> DEBU 4d4c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:18:16.455 UTC [msp] DeserializeIdentity -> DEBU 4d4d Obtaining identity" +"2019-04-22 06:18:16.455 UTC [msp] DeserializeIdentity -> DEBU 4d4e Obtaining identity" +"2019-04-22 06:18:16.455 UTC [msp] DeserializeIdentity -> DEBU 4d4f Obtaining identity" +"2019-04-22 06:18:16.456 UTC [msp] DeserializeIdentity -> DEBU 4d50 Obtaining identity" +"2019-04-22 06:18:16.459 UTC [gossip.comm] Send -> DEBU 4d51 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:16.463 UTC [gossip.comm] sendToEndpoint -> DEBU 4d52 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:20 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:18:16.467 UTC [gossip.comm] sendToEndpoint -> DEBU 4d53 Exiting" +"2019-04-22 06:18:16.469 UTC [msp] DeserializeIdentity -> DEBU 4d54 Obtaining identity" +"2019-04-22 06:18:16.469 UTC [msp] DeserializeIdentity -> DEBU 4d55 Obtaining identity" +"2019-04-22 06:18:16.501 UTC [msp] DeserializeIdentity -> DEBU 4d56 Obtaining identity" +"2019-04-22 06:18:16.502 UTC [msp] DeserializeIdentity -> DEBU 4d57 Obtaining identity" +"2019-04-22 06:18:16.502 UTC [gossip.pull] Hello -> DEBU 4d58 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:16.502 UTC [msp] DeserializeIdentity -> DEBU 4d59 Obtaining identity" +"2019-04-22 06:18:16.502 UTC [msp] DeserializeIdentity -> DEBU 4d5a Obtaining identity" +"2019-04-22 06:18:16.502 UTC [gossip.comm] Send -> DEBU 4d5b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:16.502 UTC [gossip.comm] sendToEndpoint -> DEBU 4d5c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.503 UTC [gossip.comm] sendToEndpoint -> DEBU 4d5d Exiting" +"2019-04-22 06:18:16.505 UTC [gossip.comm] func1 -> DEBU 4d5e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6022486830287658786 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.505 UTC [gossip.gossip] handleMessage -> DEBU 4d5f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6022486830287658786 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.505 UTC [gossip.pull] HandleMessage -> DEBU 4d60 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 6022486830287658786 , Msg_type: BLOCK_MSG, digests: [4 5 6 7 1 2 3 8 9], Envelope: 60 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.506 UTC [gossip.gossip] handleMessage -> DEBU 4d61 Exiting" +"2019-04-22 06:18:16.593 UTC [gossip.comm] func1 -> DEBU 4d62 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.608 UTC [gossip.gossip] handleMessage -> DEBU 4d64 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.593 UTC [gossip.comm] func1 -> DEBU 4d63 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.610 UTC [gossip.gossip] handleMessage -> DEBU 4d65 Exiting" +"2019-04-22 06:18:16.612 UTC [gossip.gossip] handleMessage -> DEBU 4d67 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.610 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d66 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.612 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4d68 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:16.612 UTC [msp] DeserializeIdentity -> DEBU 4d69 Obtaining identity" +"2019-04-22 06:18:16.613 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d6b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.613 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d6c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.613 UTC [policies] Evaluate -> DEBU 4d6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.613 UTC [policies] Evaluate -> DEBU 4d6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.613 UTC [policies] Evaluate -> DEBU 4d6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.613 UTC [cauthdsl] func1 -> DEBU 4d70 0xc003de7a30 gate 1555913896613627900 evaluation starts" +"2019-04-22 06:18:16.624 UTC [cauthdsl] func2 -> DEBU 4d71 0xc003de7a30 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.625 UTC [cauthdsl] func2 -> DEBU 4d72 0xc003de7a30 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.626 UTC [gossip.comm] func1 -> DEBU 4d73 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.633 UTC [gossip.comm] func1 -> DEBU 4d74 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.644 UTC [cauthdsl] func2 -> DEBU 4d75 0xc003de7a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.645 UTC [cauthdsl] func2 -> DEBU 4d76 0xc003de7a30 principal evaluation fails" +"2019-04-22 06:18:16.645 UTC [cauthdsl] func1 -> DEBU 4d77 0xc003de7a30 gate 1555913896613627900 evaluation fails" +"2019-04-22 06:18:16.646 UTC [policies] Evaluate -> DEBU 4d78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.647 UTC [policies] Evaluate -> DEBU 4d79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.648 UTC [policies] Evaluate -> DEBU 4d7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.649 UTC [cauthdsl] func1 -> DEBU 4d7b 0xc003ddebb0 gate 1555913896648667500 evaluation starts" +"2019-04-22 06:18:16.649 UTC [cauthdsl] func2 -> DEBU 4d7c 0xc003ddebb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.651 UTC [cauthdsl] func2 -> DEBU 4d7d 0xc003ddebb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.652 UTC [cauthdsl] func2 -> DEBU 4d7e 0xc003ddebb0 principal matched by identity 0" +"2019-04-22 06:18:16.652 UTC [msp.identity] Verify -> DEBU 4d7f Verify: digest = 00000000 04 3e 63 d2 35 0f 1a e5 8d 72 45 09 9c b9 f6 30 |.>c.5....rE....0| +00000010 69 05 75 5e ca 46 e2 18 b5 ed fe 25 73 c7 39 2a |i.u^.F.....%s.9*|" +"2019-04-22 06:18:16.661 UTC [msp.identity] Verify -> DEBU 4d80 Verify: sig = 00000000 30 44 02 20 5a cd c2 81 2a 9e b0 a2 9c b2 67 e0 |0D. Z...*.....g.| +00000010 33 af e4 4d 29 78 8c 7b 8c 7b 5a ad f8 a9 41 ee |3..M)x.{.{Z...A.| +00000020 16 cc a4 f1 02 20 3c 61 43 b8 24 15 5b 53 8c 6c |..... DEBU 4d81 0xc003ddebb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.663 UTC [cauthdsl] func1 -> DEBU 4d82 0xc003ddebb0 gate 1555913896648667500 evaluation succeeds" +"2019-04-22 06:18:16.663 UTC [policies] Evaluate -> DEBU 4d83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.663 UTC [policies] Evaluate -> DEBU 4d84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.664 UTC [policies] Evaluate -> DEBU 4d85 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.664 UTC [policies] Evaluate -> DEBU 4d86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d87 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d88 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:16.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d89 updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 " +"2019-04-22 06:18:16.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8a Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 " +"2019-04-22 06:18:16.665 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8b Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:66 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:16.666 UTC [gossip.discovery] learnExistingMembers -> DEBU 4d8c Exiting" +"2019-04-22 06:18:16.666 UTC [gossip.discovery] handleAliveMessage -> DEBU 4d8d Exiting" +"2019-04-22 06:18:16.666 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4d8e Exiting" +"2019-04-22 06:18:16.667 UTC [gossip.gossip] handleMessage -> DEBU 4d8f Exiting" +"2019-04-22 06:18:16.668 UTC [gossip.gossip] handleMessage -> DEBU 4d90 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.668 UTC [msp] DeserializeIdentity -> DEBU 4d91 Obtaining identity" +"2019-04-22 06:18:16.677 UTC [msp] DeserializeIdentity -> DEBU 4d92 Obtaining identity" +"2019-04-22 06:18:16.677 UTC [gossip.gossip] handleMessage -> DEBU 4d93 Exiting" +"2019-04-22 06:18:16.679 UTC [gossip.gossip] handleMessage -> DEBU 4d96 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.678 UTC [msp] DeserializeIdentity -> DEBU 4d94 Obtaining identity" +"2019-04-22 06:18:16.678 UTC [gossip.comm] func1 -> DEBU 4d95 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.680 UTC [msp] DeserializeIdentity -> DEBU 4d97 Obtaining identity" +"2019-04-22 06:18:16.688 UTC [msp] DeserializeIdentity -> DEBU 4d98 Obtaining identity" +"2019-04-22 06:18:16.690 UTC [msp] DeserializeIdentity -> DEBU 4d99 Obtaining identity" +"2019-04-22 06:18:16.691 UTC [msp] DeserializeIdentity -> DEBU 4d9a Obtaining identity" +"2019-04-22 06:18:16.693 UTC [msp] DeserializeIdentity -> DEBU 4d9b Obtaining identity" +"2019-04-22 06:18:16.695 UTC [msp] DeserializeIdentity -> DEBU 4d9c Obtaining identity" +"2019-04-22 06:18:16.697 UTC [gossip.comm] Send -> DEBU 4d9d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:16.698 UTC [msp] DeserializeIdentity -> DEBU 4d9e Obtaining identity" +"2019-04-22 06:18:16.701 UTC [gossip.comm] Send -> DEBU 4da0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:16.700 UTC [gossip.comm] sendToEndpoint -> DEBU 4d9f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.709 UTC [gossip.comm] sendToEndpoint -> DEBU 4da1 Exiting" +"2019-04-22 06:18:16.710 UTC [gossip.comm] sendToEndpoint -> DEBU 4da2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.710 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4da3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.715 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4da5 Exiting" +"2019-04-22 06:18:16.715 UTC [gossip.comm] sendToEndpoint -> DEBU 4da4 Exiting" +"2019-04-22 06:18:16.716 UTC [gossip.gossip] handleMessage -> DEBU 4da6 Exiting" +"2019-04-22 06:18:16.717 UTC [gossip.gossip] handleMessage -> DEBU 4da7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.717 UTC [gossip.pull] HandleMessage -> DEBU 4da8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.717 UTC [gossip.pull] SendDigest -> DEBU 4da9 Sending BLOCK_MSG digest: [8 1 3 5 6 2 4 7 9] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:16.717 UTC [gossip.gossip] handleMessage -> DEBU 4daa Exiting" +"2019-04-22 06:18:16.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4dab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:16.718 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4dac Exiting" +"2019-04-22 06:18:16.836 UTC [gossip.comm] func1 -> DEBU 4dad Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.836 UTC [gossip.gossip] handleMessage -> DEBU 4dae Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:16.837 UTC [msp] DeserializeIdentity -> DEBU 4daf Obtaining identity" +"2019-04-22 06:18:16.837 UTC [msp] DeserializeIdentity -> DEBU 4db0 Obtaining identity" +"2019-04-22 06:18:16.845 UTC [msp] DeserializeIdentity -> DEBU 4db1 Obtaining identity" +"2019-04-22 06:18:16.845 UTC [gossip.gossip] handleMessage -> DEBU 4db2 Exiting" +"2019-04-22 06:18:16.995 UTC [gossip.comm] func1 -> DEBU 4db3 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:16.995 UTC [gossip.gossip] handleMessage -> DEBU 4db4 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:16.995 UTC [gossip.gossip] handleMessage -> DEBU 4db5 Exiting" +"2019-04-22 06:18:16.995 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4db6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:16.996 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4db7 Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:16.996 UTC [msp] DeserializeIdentity -> DEBU 4db8 Obtaining identity" +"2019-04-22 06:18:16.996 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4db9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:16.996 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dba Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.996 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4dbb Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dbc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dbd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dbe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func1 -> DEBU 4dbf 0xc003e1f6b0 gate 1555913896996436600 evaluation starts" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc0 0xc003e1f6b0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc1 0xc003e1f6b0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc2 0xc003e1f6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc3 0xc003e1f6b0 principal evaluation fails" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func1 -> DEBU 4dc4 0xc003e1f6b0 gate 1555913896996436600 evaluation fails" +"2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dc5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dc6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:16.996 UTC [policies] Evaluate -> DEBU 4dc7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func1 -> DEBU 4dc8 0xc003e1fef0 gate 1555913896996859400 evaluation starts" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dc9 0xc003e1fef0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dca 0xc003e1fef0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:16.996 UTC [cauthdsl] func2 -> DEBU 4dcb 0xc003e1fef0 principal matched by identity 0" +"2019-04-22 06:18:16.997 UTC [msp.identity] Verify -> DEBU 4dcc Verify: digest = 00000000 d8 95 ce 7b 87 fc 30 52 d8 e5 ea f0 22 bc bc a4 |...{..0R...."...| +00000010 60 c8 e5 ec 6b 24 60 df 2c 5a f3 1e 0c 59 06 31 |`...k$`.,Z...Y.1|" +"2019-04-22 06:18:16.997 UTC [msp.identity] Verify -> DEBU 4dcd Verify: sig = 00000000 30 45 02 21 00 ac d4 dd c9 fa 37 41 1d 31 5e be |0E.!......7A.1^.| +00000010 d7 43 07 f9 de 5e 87 79 a0 7b 6b 48 58 f4 aa ea |.C...^.y.{kHX...| +00000020 3f 2c c3 44 97 02 20 22 d2 6c 24 75 63 5c 4f db |?,.D.. ".l$uc\O.| +00000030 a0 da f4 da 9d 3e b0 1a 41 9b 55 fa 61 c3 3b 02 |.....>..A.U.a.;.| +00000040 82 a5 a1 7a 3f bc 66 |...z?.f|" +"2019-04-22 06:18:16.997 UTC [cauthdsl] func2 -> DEBU 4dce 0xc003e1fef0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:16.997 UTC [cauthdsl] func1 -> DEBU 4dcf 0xc003e1fef0 gate 1555913896996859400 evaluation succeeds" +"2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd2 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:16.997 UTC [policies] Evaluate -> DEBU 4dd3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:16.997 UTC [gossip.discovery] handleAliveMessage -> DEBU 4dd4 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:16.997 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd5 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd6 updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 " +"2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd7 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 " +"2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd8 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:62 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:16.998 UTC [gossip.discovery] learnExistingMembers -> DEBU 4dd9 Exiting" +"2019-04-22 06:18:16.998 UTC [gossip.discovery] handleAliveMessage -> DEBU 4dda Exiting" +"2019-04-22 06:18:17.001 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ddb Exiting" +"2019-04-22 06:18:17.004 UTC [gossip.comm] func1 -> DEBU 4ddc Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.004 UTC [gossip.gossip] handleMessage -> DEBU 4ddd Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.004 UTC [gossip.gossip] handleMessage -> DEBU 4dde Exiting" +"2019-04-22 06:18:17.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ddf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.004 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4de0 Exiting" +"2019-04-22 06:18:17.005 UTC [gossip.comm] func1 -> DEBU 4de1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.005 UTC [gossip.gossip] handleMessage -> DEBU 4de2 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.005 UTC [gossip.gossip] handleMessage -> DEBU 4de3 Exiting" +"2019-04-22 06:18:17.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4de4 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.005 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4de5 Exiting" +"2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de6 Obtaining identity" +"2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de7 Obtaining identity" +"2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de8 Obtaining identity" +"2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4de9 Obtaining identity" +"2019-04-22 06:18:17.012 UTC [msp] DeserializeIdentity -> DEBU 4dea Obtaining identity" +"2019-04-22 06:18:17.013 UTC [msp] DeserializeIdentity -> DEBU 4deb Obtaining identity" +"2019-04-22 06:18:17.013 UTC [msp] DeserializeIdentity -> DEBU 4dec Obtaining identity" +"2019-04-22 06:18:17.013 UTC [gossip.comm] Send -> DEBU 4ded Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:17.013 UTC [msp] DeserializeIdentity -> DEBU 4dee Obtaining identity" +"2019-04-22 06:18:17.013 UTC [gossip.comm] Send -> DEBU 4def Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df1 Exiting" +"2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:17.013 UTC [gossip.comm] sendToEndpoint -> DEBU 4df3 Exiting" +"2019-04-22 06:18:17.050 UTC [gossip.comm] func1 -> DEBU 4df4 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:17.050 UTC [gossip.gossip] handleMessage -> DEBU 4df5 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:17.051 UTC [msp] DeserializeIdentity -> DEBU 4df6 Obtaining identity" +"2019-04-22 06:18:17.051 UTC [msp] DeserializeIdentity -> DEBU 4df7 Obtaining identity" +"2019-04-22 06:18:17.051 UTC [msp] DeserializeIdentity -> DEBU 4df8 Obtaining identity" +"2019-04-22 06:18:17.051 UTC [gossip.gossip] handleMessage -> DEBU 4df9 Exiting" +"2019-04-22 06:18:18.879 UTC [gossip.pull] Hello -> DEBU 4dfa Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:18.879 UTC [gossip.comm] Send -> DEBU 4dfb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:18.879 UTC [gossip.pull] Hello -> DEBU 4dfc Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-04-22 06:18:18.879 UTC [gossip.comm] Send -> DEBU 4dfd Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:18.879 UTC [gossip.pull] Hello -> DEBU 4dfe Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-04-22 06:18:18.879 UTC [gossip.comm] Send -> DEBU 4dff Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e00 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e01 Exiting" +"2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e02 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e03 Exiting" +"2019-04-22 06:18:18.880 UTC [gossip.comm] sendToEndpoint -> DEBU 4e04 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.880 UTC [gossip.comm] sendToEndpoint -> DEBU 4e05 Exiting" +"2019-04-22 06:18:18.882 UTC [gossip.comm] func1 -> DEBU 4e06 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7592540667956556189 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.882 UTC [gossip.gossip] handleMessage -> DEBU 4e07 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7592540667956556189 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.882 UTC [gossip.pull] HandleMessage -> DEBU 4e08 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 7592540667956556189 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.882 UTC [gossip.gossip] handleMessage -> DEBU 4e09 Exiting" +"2019-04-22 06:18:18.882 UTC [gossip.comm] func1 -> DEBU 4e0a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8116035663129203458 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e0b Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8116035663129203458 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.883 UTC [gossip.pull] HandleMessage -> DEBU 4e0c GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 8116035663129203458 , Msg_type: IDENTITY_MSG, digests: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e0d Exiting" +"2019-04-22 06:18:18.883 UTC [gossip.comm] func1 -> DEBU 4e0e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2284014064508842567 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e0f Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2284014064508842567 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.883 UTC [gossip.pull] HandleMessage -> DEBU 4e10 GossipMessage: Channel: , nonce: 0, tag: EMPTY data_dig: nonce: 2284014064508842567 , Msg_type: IDENTITY_MSG, digests: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd], Envelope: 153 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.883 UTC [gossip.gossip] handleMessage -> DEBU 4e11 Exiting" +"2019-04-22 06:18:18.945 UTC [msp.identity] Sign -> DEBU 4e12 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB15103F " +"2019-04-22 06:18:18.945 UTC [msp.identity] Sign -> DEBU 4e13 Sign: digest: 5B34AFEEE60AE670910A218497E15FBD9529E9CD957EADB9666908BECA0CB3C7 " +"2019-04-22 06:18:18.946 UTC [msp.identity] Sign -> DEBU 4e14 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:18.946 UTC [msp.identity] Sign -> DEBU 4e15 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:18.946 UTC [gossip.comm] Send -> DEBU 4e16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:18.946 UTC [msp] DeserializeIdentity -> DEBU 4e17 Obtaining identity" +"2019-04-22 06:18:18.946 UTC [gossip.comm] Send -> DEBU 4e18 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:18.946 UTC [msp] DeserializeIdentity -> DEBU 4e19 Obtaining identity" +"2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes , Envelope: 270 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1b Exiting" +"2019-04-22 06:18:18.946 UTC [gossip.comm] Send -> DEBU 4e1c Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.946 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1e Exiting" +"2019-04-22 06:18:18.947 UTC [gossip.comm] sendToEndpoint -> DEBU 4e1f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.947 UTC [gossip.comm] sendToEndpoint -> DEBU 4e20 Exiting" +"2019-04-22 06:18:18.952 UTC [gossip.comm] func1 -> DEBU 4e21 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.952 UTC [gossip.comm] func1 -> DEBU 4e22 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.952 UTC [gossip.gossip] handleMessage -> DEBU 4e23 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.952 UTC [gossip.gossip] handleMessage -> DEBU 4e24 Exiting" +"2019-04-22 06:18:18.952 UTC [gossip.gossip] handleMessage -> DEBU 4e25 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.952 UTC [gossip.comm] func1 -> DEBU 4e26 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.952 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e28 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:18.952 UTC [msp.identity] Verify -> DEBU 4e29 Verify: digest = 00000000 5b 34 af ee e6 0a e6 70 91 0a 21 84 97 e1 5f bd |[4.....p..!..._.| +00000010 95 29 e9 cd 95 7e ad b9 66 69 08 be ca 0c b3 c7 |.)...~..fi......|" +"2019-04-22 06:18:18.952 UTC [msp.identity] Verify -> DEBU 4e2a Verify: sig = 00000000 30 44 02 20 1e c2 86 b0 87 b2 c5 65 71 d7 1a e0 |0D. .......eq...| +00000010 5e bc fb b9 c9 d0 b5 96 48 14 f4 f0 23 72 b8 04 |^.......H...#r..| +00000020 d2 4a e3 d4 02 20 0f 1a 4d 3c 9c b1 38 b2 ee 7e |.J... ..M<..8..~| +00000030 7c 66 fc 4d 35 1d c1 25 d5 8b b1 8c 8b 22 a1 02 ||f.M5..%....."..| +00000040 73 71 76 6a 4b 13 |sqvjK.|" +"2019-04-22 06:18:18.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e2b Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] isSentByMe -> DEBU 4e2c Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e2d Exiting" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e2e Exiting" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e2f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e30 Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:18.953 UTC [msp.identity] Verify -> DEBU 4e31 Verify: digest = 00000000 5b 34 af ee e6 0a e6 70 91 0a 21 84 97 e1 5f bd |[4.....p..!..._.| +00000010 95 29 e9 cd 95 7e ad b9 66 69 08 be ca 0c b3 c7 |.)...~..fi......|" +"2019-04-22 06:18:18.953 UTC [msp.identity] Verify -> DEBU 4e32 Verify: sig = 00000000 30 44 02 20 1e c2 86 b0 87 b2 c5 65 71 d7 1a e0 |0D. .......eq...| +00000010 5e bc fb b9 c9 d0 b5 96 48 14 f4 f0 23 72 b8 04 |^.......H...#r..| +00000020 d2 4a e3 d4 02 20 0f 1a 4d 3c 9c b1 38 b2 ee 7e |.J... ..M<..8..~| +00000030 7c 66 fc 4d 35 1d c1 25 d5 8b b1 8c 8b 22 a1 02 ||f.M5..%....."..| +00000040 73 71 76 6a 4b 13 |sqvjK.|" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e33 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] isSentByMe -> DEBU 4e34 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e35 Exiting" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e36 Exiting" +"2019-04-22 06:18:18.953 UTC [gossip.gossip] handleMessage -> DEBU 4e37 Exiting" +"2019-04-22 06:18:18.953 UTC [gossip.gossip] handleMessage -> DEBU 4e38 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.953 UTC [gossip.gossip] handleMessage -> DEBU 4e39 Exiting" +"2019-04-22 06:18:18.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e3a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:18.954 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e3b Fetched identity of Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d from identity store" +"2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3c Verify: digest = 00000000 5b 34 af ee e6 0a e6 70 91 0a 21 84 97 e1 5f bd |[4.....p..!..._.| +00000010 95 29 e9 cd 95 7e ad b9 66 69 08 be ca 0c b3 c7 |.)...~..fi......|" +"2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3d Verify: sig = 00000000 30 44 02 20 1e c2 86 b0 87 b2 c5 65 71 d7 1a e0 |0D. .......eq...| +00000010 5e bc fb b9 c9 d0 b5 96 48 14 f4 f0 23 72 b8 04 |^.......H...#r..| +00000020 d2 4a e3 d4 02 20 0f 1a 4d 3c 9c b1 38 b2 ee 7e |.J... ..M<..8..~| +00000030 7c 66 fc 4d 35 1d c1 25 d5 8b b1 8c 8b 22 a1 02 ||f.M5..%....."..| +00000040 73 71 76 6a 4b 13 |sqvjK.|" +"2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-04-22 06:18:18.954 UTC [msp.identity] Verify -> DEBU 4e3f Verify: sig = 00000000 30 44 02 20 64 c0 60 b6 39 fe a2 c7 60 03 a1 1b |0D. d.`.9...`...| +00000010 89 98 fc a5 da fb 1e a6 45 3e 0f 15 47 b6 e6 d2 |........E>..G...| +00000020 3d d1 78 f7 02 20 79 35 e0 d6 a6 01 ba 51 b4 03 |=.x.. y5.....Q..| +00000030 f9 92 d7 c4 f1 17 ff 84 55 f1 e8 f3 fe db 6e d8 |........U.....n.| +00000040 42 28 7d b7 ff 11 |B(}...|" +"2019-04-22 06:18:18.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e40 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:18.954 UTC [gossip.discovery] isSentByMe -> DEBU 4e41 Got alive message about ourselves, GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:63 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-04-22 06:18:18.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e42 Exiting" +"2019-04-22 06:18:18.954 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e43 Exiting" +"2019-04-22 06:18:19.119 UTC [gossip.comm] func1 -> DEBU 4e44 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.119 UTC [gossip.gossip] handleMessage -> DEBU 4e45 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.119 UTC [gossip.pull] HandleMessage -> DEBU 4e46 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.119 UTC [gossip.pull] SendDigest -> DEBU 4e47 Sending IDENTITY_MSG digest: [a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:19.119 UTC [gossip.gossip] handleMessage -> DEBU 4e48 Exiting" +"2019-04-22 06:18:19.205 UTC [gossip.comm] func1 -> DEBU 4e49 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.205 UTC [gossip.gossip] handleMessage -> DEBU 4e4a Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.205 UTC [gossip.gossip] handleMessage -> DEBU 4e4b Exiting" +"2019-04-22 06:18:19.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e4c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes , Envelope: 271 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.205 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e4d Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e4e Verify: digest = 00000000 77 7a 1c 63 f0 64 e9 b2 2b f0 bf ab 11 d3 a1 ce |wz.c.d..+.......| +00000010 b9 d5 1c 82 3a d6 07 d9 f6 3a 4d 70 c2 b4 dd 8a |....:....:Mp....|" +"2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e4f Verify: sig = 00000000 30 44 02 20 7d c9 b0 ce 66 d9 64 61 15 d9 89 a5 |0D. }...f.da....| +00000010 38 7c 56 c0 70 a0 a4 66 2d 98 1b fe b9 39 f5 c2 |8|V.p..f-....9..| +00000020 e6 6a 0c 21 02 20 14 d9 bc 94 ae 70 af b2 21 88 |.j.!. .....p..!.| +00000030 49 67 ce 2e 1e a7 ac af 72 5c 55 0d aa 12 71 d9 |Ig......r\U...q.| +00000040 c4 38 3d 3e 4e 42 |.8=>NB|" +"2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e50 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:19.206 UTC [msp.identity] Verify -> DEBU 4e51 Verify: sig = 00000000 30 45 02 21 00 a2 4b 53 e3 a7 27 c1 de 52 2d 49 |0E.!..KS..'..R-I| +00000010 8c 65 51 07 70 a0 99 28 6d eb 49 93 2f 10 e7 f6 |.eQ.p..(m.I./...| +00000020 89 21 3f ad ca 02 20 05 94 1b f6 14 ee d1 4f 60 |.!?... .......O`| +00000030 fd 3b ce 52 1b 45 35 4d 10 53 43 cf 6c 44 eb 55 |.;.R.E5M.SC.lD.U| +00000040 f5 f4 3f 17 43 87 71 |..?.C.q|" +"2019-04-22 06:18:19.206 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e52 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:19.206 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e53 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:18:19.206 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e54 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 " +"2019-04-22 06:18:19.206 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e55 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 " +"2019-04-22 06:18:19.207 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e56 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:19.207 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e57 Exiting" +"2019-04-22 06:18:19.207 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e58 Exiting" +"2019-04-22 06:18:19.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e59 Exiting" +"2019-04-22 06:18:19.207 UTC [gossip.discovery] sendMemResponse -> DEBU 4e5a Entering Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:19.207 UTC [msp] DeserializeIdentity -> DEBU 4e5b Obtaining identity" +"2019-04-22 06:18:19.207 UTC [msp] DeserializeIdentity -> DEBU 4e5c Obtaining identity" +"2019-04-22 06:18:19.207 UTC [gossip.comm] Send -> DEBU 4e5d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:19.207 UTC [gossip.discovery] sendMemResponse -> DEBU 4e5e Exiting, replying with MembershipResponse with Alive: 2, Dead: 0" +"2019-04-22 06:18:19.207 UTC [gossip.comm] sendToEndpoint -> DEBU 4e5f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.207 UTC [gossip.comm] sendToEndpoint -> DEBU 4e60 Exiting" +"2019-04-22 06:18:19.622 UTC [gossip.comm] func1 -> DEBU 4e61 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.622 UTC [gossip.gossip] handleMessage -> DEBU 4e62 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.622 UTC [gossip.pull] HandleMessage -> DEBU 4e63 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.622 UTC [msp] DeserializeIdentity -> DEBU 4e64 Obtaining identity" +"2019-04-22 06:18:19.622 UTC [msp] DeserializeIdentity -> DEBU 4e65 Obtaining identity" +"2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e66 Obtaining identity" +"2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e67 Obtaining identity" +"2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e68 Obtaining identity" +"2019-04-22 06:18:19.623 UTC [msp] DeserializeIdentity -> DEBU 4e69 Obtaining identity" +"2019-04-22 06:18:19.623 UTC [gossip.pull] SendDigest -> DEBU 4e6a Sending IDENTITY_MSG digest: [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd] to 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:19.623 UTC [gossip.gossip] handleMessage -> DEBU 4e6b Exiting" +"2019-04-22 06:18:19.643 UTC [gossip.comm] func1 -> DEBU 4e6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.643 UTC [gossip.gossip] handleMessage -> DEBU 4e6d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.648 UTC [gossip.gossip] handleMessage -> DEBU 4e6e Exiting" +"2019-04-22 06:18:19.648 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e6f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes , Envelope: 165 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.648 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e70 Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:19.649 UTC [msp] DeserializeIdentity -> DEBU 4e71 Obtaining identity" +"2019-04-22 06:18:19.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:19.650 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e73 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:19.650 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e74 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:19.651 UTC [policies] Evaluate -> DEBU 4e75 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:19.651 UTC [policies] Evaluate -> DEBU 4e76 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:19.651 UTC [policies] Evaluate -> DEBU 4e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:19.651 UTC [cauthdsl] func1 -> DEBU 4e78 0xc00429c260 gate 1555913899651262600 evaluation starts" +"2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e79 0xc00429c260 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e7a 0xc00429c260 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e7b 0xc00429c260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:19.652 UTC [cauthdsl] func2 -> DEBU 4e7c 0xc00429c260 principal evaluation fails" +"2019-04-22 06:18:19.654 UTC [cauthdsl] func1 -> DEBU 4e7d 0xc00429c260 gate 1555913899651262600 evaluation fails" +"2019-04-22 06:18:19.654 UTC [policies] Evaluate -> DEBU 4e7e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:19.654 UTC [policies] Evaluate -> DEBU 4e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:19.654 UTC [policies] Evaluate -> DEBU 4e80 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:19.655 UTC [cauthdsl] func1 -> DEBU 4e81 0xc00429caa0 gate 1555913899655491100 evaluation starts" +"2019-04-22 06:18:19.655 UTC [cauthdsl] func2 -> DEBU 4e82 0xc00429caa0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:19.656 UTC [cauthdsl] func2 -> DEBU 4e83 0xc00429caa0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:19.657 UTC [cauthdsl] func2 -> DEBU 4e84 0xc00429caa0 principal matched by identity 0" +"2019-04-22 06:18:19.657 UTC [msp.identity] Verify -> DEBU 4e85 Verify: digest = 00000000 74 02 1b 4a b3 37 17 14 01 f7 75 ae c9 26 dc 6d |t..J.7....u..&.m| +00000010 6d 15 ed 47 b2 1f 81 50 33 98 37 84 1a f8 6c 04 |m..G...P3.7...l.|" +"2019-04-22 06:18:19.657 UTC [msp.identity] Verify -> DEBU 4e86 Verify: sig = 00000000 30 44 02 20 38 33 72 12 f3 06 5f b4 5c 64 c1 cf |0D. 83r..._.\d..| +00000010 37 be f6 40 e9 fe fe 11 95 af e9 ea 2e bd 97 dc |7..@............| +00000020 57 60 d7 30 02 20 13 43 cc ea bc 83 72 66 18 6a |W`.0. .C....rf.j| +00000030 25 c7 e9 a2 7e 71 78 99 3d 94 0e 28 88 d1 f3 a8 |%...~qx.=..(....| +00000040 6a c4 f3 a0 ca 9b |j.....|" +"2019-04-22 06:18:19.657 UTC [cauthdsl] func2 -> DEBU 4e87 0xc00429caa0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:19.658 UTC [cauthdsl] func1 -> DEBU 4e88 0xc00429caa0 gate 1555913899655491100 evaluation succeeds" +"2019-04-22 06:18:19.658 UTC [policies] Evaluate -> DEBU 4e89 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:19.659 UTC [policies] Evaluate -> DEBU 4e8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:19.659 UTC [policies] Evaluate -> DEBU 4e8b Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:19.659 UTC [policies] Evaluate -> DEBU 4e8c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:19.660 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e8d Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:19.660 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8e Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:19.661 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e8f updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 " +"2019-04-22 06:18:19.661 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e90 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 " +"2019-04-22 06:18:19.662 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e91 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:67 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:19.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e92 Exiting" +"2019-04-22 06:18:19.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e93 Exiting" +"2019-04-22 06:18:19.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e94 Exiting" +"2019-04-22 06:18:19.664 UTC [gossip.discovery] sendMemResponse -> DEBU 4e95 Entering Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd" +"2019-04-22 06:18:19.665 UTC [msp] DeserializeIdentity -> DEBU 4e96 Obtaining identity" +"2019-04-22 06:18:19.666 UTC [msp] DeserializeIdentity -> DEBU 4e97 Obtaining identity" +"2019-04-22 06:18:19.667 UTC [msp] DeserializeIdentity -> DEBU 4e98 Obtaining identity" +"2019-04-22 06:18:19.669 UTC [gossip.comm] Send -> DEBU 4e99 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:19.670 UTC [gossip.discovery] sendMemResponse -> DEBU 4e9a Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:19.670 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:19.671 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9c Exiting" +"2019-04-22 06:18:20.004 UTC [gossip.comm] func1 -> DEBU 4e9d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.004 UTC [gossip.gossip] handleMessage -> DEBU 4e9e Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.004 UTC [gossip.pull] HandleMessage -> DEBU 4e9f GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea0 Obtaining identity" +"2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea1 Obtaining identity" +"2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea2 Obtaining identity" +"2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea3 Obtaining identity" +"2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea4 Obtaining identity" +"2019-04-22 06:18:20.005 UTC [msp] DeserializeIdentity -> DEBU 4ea5 Obtaining identity" +"2019-04-22 06:18:20.005 UTC [gossip.pull] SendDigest -> DEBU 4ea6 Sending IDENTITY_MSG digest: [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030] to 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:20.005 UTC [gossip.gossip] handleMessage -> DEBU 4ea7 Exiting" +"2019-04-22 06:18:20.028 UTC [gossip.comm] func1 -> DEBU 4ea8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.028 UTC [gossip.gossip] handleMessage -> DEBU 4ea9 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.028 UTC [gossip.gossip] handleMessage -> DEBU 4eaa Exiting" +"2019-04-22 06:18:20.028 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4eab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Membership Request with self information of GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes , Envelope: 166 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.028 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4eac Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:20.029 UTC [msp] DeserializeIdentity -> DEBU 4ead Obtaining identity" +"2019-04-22 06:18:20.029 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4eae Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:20.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eaf Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.029 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eb0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.029 UTC [policies] Evaluate -> DEBU 4eb1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:20.029 UTC [policies] Evaluate -> DEBU 4eb2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:20.029 UTC [policies] Evaluate -> DEBU 4eb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:20.029 UTC [cauthdsl] func1 -> DEBU 4eb4 0xc00349c620 gate 1555913900029899200 evaluation starts" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb5 0xc00349c620 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb6 0xc00349c620 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb7 0xc00349c620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4eb8 0xc00349c620 principal evaluation fails" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func1 -> DEBU 4eb9 0xc00349c620 gate 1555913900029899200 evaluation fails" +"2019-04-22 06:18:20.030 UTC [policies] Evaluate -> DEBU 4eba Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.030 UTC [policies] Evaluate -> DEBU 4ebb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.030 UTC [policies] Evaluate -> DEBU 4ebc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func1 -> DEBU 4ebd 0xc00349ce60 gate 1555913900030583900 evaluation starts" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4ebe 0xc00349ce60 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4ebf 0xc00349ce60 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.030 UTC [cauthdsl] func2 -> DEBU 4ec0 0xc00349ce60 principal matched by identity 0" +"2019-04-22 06:18:20.030 UTC [msp.identity] Verify -> DEBU 4ec1 Verify: digest = 00000000 3f b8 ec fe 21 83 f2 22 95 9c ac 9a be c5 41 d7 |?...!.."......A.| +00000010 49 71 b7 bb 5e ba 29 47 e3 21 ad 7e 6a f5 55 0c |Iq..^.)G.!.~j.U.|" +"2019-04-22 06:18:20.030 UTC [msp.identity] Verify -> DEBU 4ec2 Verify: sig = 00000000 30 45 02 21 00 da da 3f bf ff e3 a4 d4 0a 08 bd |0E.!...?........| +00000010 22 c1 67 7d 09 df 2f b6 8f 72 06 de 76 b1 36 01 |".g}../..r..v.6.| +00000020 51 17 01 2e 1a 02 20 65 1e be e3 2a 2b b3 d2 5c |Q..... e...*+..\| +00000030 cc e8 55 ae 31 0f 16 c3 40 f6 aa c3 b1 5b 97 43 |..U.1...@....[.C| +00000040 f2 48 26 6b 42 da 4d |.H&kB.M|" +"2019-04-22 06:18:20.031 UTC [cauthdsl] func2 -> DEBU 4ec3 0xc00349ce60 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:20.031 UTC [cauthdsl] func1 -> DEBU 4ec4 0xc00349ce60 gate 1555913900030583900 evaluation succeeds" +"2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec7 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:20.031 UTC [policies] Evaluate -> DEBU 4ec8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:20.031 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ec9 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4eca Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ecb updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 " +"2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ecc Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 " +"2019-04-22 06:18:20.031 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ecd Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:63 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:20.032 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ece Exiting" +"2019-04-22 06:18:20.032 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ecf Exiting" +"2019-04-22 06:18:20.032 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ed0 Exiting" +"2019-04-22 06:18:20.032 UTC [gossip.discovery] sendMemResponse -> DEBU 4ed1 Entering Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030" +"2019-04-22 06:18:20.032 UTC [msp] DeserializeIdentity -> DEBU 4ed2 Obtaining identity" +"2019-04-22 06:18:20.032 UTC [msp] DeserializeIdentity -> DEBU 4ed3 Obtaining identity" +"2019-04-22 06:18:20.032 UTC [msp] DeserializeIdentity -> DEBU 4ed4 Obtaining identity" +"2019-04-22 06:18:20.032 UTC [gossip.comm] Send -> DEBU 4ed5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:20.032 UTC [gossip.discovery] sendMemResponse -> DEBU 4ed6 Exiting, replying with MembershipResponse with Alive: 4, Dead: 0" +"2019-04-22 06:18:20.033 UTC [gossip.comm] sendToEndpoint -> DEBU 4ed7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.033 UTC [gossip.comm] sendToEndpoint -> DEBU 4ed8 Exiting" +"2019-04-22 06:18:20.355 UTC [msp] DeserializeIdentity -> DEBU 4ed9 Obtaining identity" +"2019-04-22 06:18:20.355 UTC [msp] DeserializeIdentity -> DEBU 4eda Obtaining identity" +"2019-04-22 06:18:20.355 UTC [gossip.comm] Send -> DEBU 4edb Entering, sending GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-04-22 06:18:20.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4edc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.355 UTC [gossip.comm] sendToEndpoint -> DEBU 4edd Exiting" +"2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4ede Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4edf Exiting" +"2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:ef53d9925f439b5a560730cf8c561e9d1fdc181a624d0f542c442ab5fe8c65c2, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.356 UTC [gossip.comm] sendToEndpoint -> DEBU 4ee1 Exiting" +"2019-04-22 06:18:20.359 UTC [gossip.comm] func1 -> DEBU 4ee2 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.359 UTC [gossip.gossip] handleMessage -> DEBU 4ee3 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.360 UTC [msp.identity] Verify -> DEBU 4ee4 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:20.360 UTC [msp.identity] Verify -> DEBU 4ee5 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:20.361 UTC [msp.identity] Verify -> DEBU 4ee6 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:20.361 UTC [msp.identity] Verify -> DEBU 4ee7 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:20.362 UTC [msp] DeserializeIdentity -> DEBU 4ee8 Obtaining identity" +"2019-04-22 06:18:20.362 UTC [msp] DeserializeIdentity -> DEBU 4ee9 Obtaining identity" +"2019-04-22 06:18:20.363 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4eea Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:20.363 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eeb Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.364 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eec Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.364 UTC [policies] Evaluate -> DEBU 4eed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:20.364 UTC [policies] Evaluate -> DEBU 4eee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:20.364 UTC [policies] Evaluate -> DEBU 4eef == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:20.365 UTC [cauthdsl] func1 -> DEBU 4ef0 0xc0034c7380 gate 1555913900365474100 evaluation starts" +"2019-04-22 06:18:20.365 UTC [cauthdsl] func2 -> DEBU 4ef1 0xc0034c7380 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.365 UTC [cauthdsl] func2 -> DEBU 4ef2 0xc0034c7380 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.366 UTC [cauthdsl] func2 -> DEBU 4ef3 0xc0034c7380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:20.366 UTC [cauthdsl] func2 -> DEBU 4ef4 0xc0034c7380 principal evaluation fails" +"2019-04-22 06:18:20.366 UTC [cauthdsl] func1 -> DEBU 4ef5 0xc0034c7380 gate 1555913900365474100 evaluation fails" +"2019-04-22 06:18:20.366 UTC [policies] Evaluate -> DEBU 4ef6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.367 UTC [policies] Evaluate -> DEBU 4ef7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.367 UTC [policies] Evaluate -> DEBU 4ef8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:20.367 UTC [cauthdsl] func1 -> DEBU 4ef9 0xc0034c7bc0 gate 1555913900367485100 evaluation starts" +"2019-04-22 06:18:20.367 UTC [cauthdsl] func2 -> DEBU 4efa 0xc0034c7bc0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.367 UTC [cauthdsl] func2 -> DEBU 4efb 0xc0034c7bc0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.368 UTC [cauthdsl] func2 -> DEBU 4efc 0xc0034c7bc0 principal matched by identity 0" +"2019-04-22 06:18:20.368 UTC [msp.identity] Verify -> DEBU 4efd Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:20.368 UTC [msp.identity] Verify -> DEBU 4efe Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:20.369 UTC [cauthdsl] func2 -> DEBU 4eff 0xc0034c7bc0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:20.369 UTC [gossip.comm] func1 -> DEBU 4f00 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.370 UTC [gossip.comm] func1 -> DEBU 4f01 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.371 UTC [cauthdsl] func1 -> DEBU 4f02 0xc0034c7bc0 gate 1555913900367485100 evaluation succeeds" +"2019-04-22 06:18:20.371 UTC [policies] Evaluate -> DEBU 4f03 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.371 UTC [policies] Evaluate -> DEBU 4f04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.371 UTC [policies] Evaluate -> DEBU 4f05 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:20.372 UTC [policies] Evaluate -> DEBU 4f06 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:20.372 UTC [msp] DeserializeIdentity -> DEBU 4f07 Obtaining identity" +"2019-04-22 06:18:20.373 UTC [msp] DeserializeIdentity -> DEBU 4f08 Obtaining identity" +"2019-04-22 06:18:20.373 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f09 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:20.374 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f0a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.374 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f0b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.374 UTC [policies] Evaluate -> DEBU 4f0c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:20.374 UTC [policies] Evaluate -> DEBU 4f0d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:20.374 UTC [policies] Evaluate -> DEBU 4f0e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:20.375 UTC [cauthdsl] func1 -> DEBU 4f0f 0xc0034d9390 gate 1555913900375097600 evaluation starts" +"2019-04-22 06:18:20.375 UTC [cauthdsl] func2 -> DEBU 4f10 0xc0034d9390 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.375 UTC [cauthdsl] func2 -> DEBU 4f11 0xc0034d9390 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.376 UTC [cauthdsl] func2 -> DEBU 4f12 0xc0034d9390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:20.376 UTC [cauthdsl] func2 -> DEBU 4f13 0xc0034d9390 principal evaluation fails" +"2019-04-22 06:18:20.377 UTC [cauthdsl] func1 -> DEBU 4f14 0xc0034d9390 gate 1555913900375097600 evaluation fails" +"2019-04-22 06:18:20.378 UTC [policies] Evaluate -> DEBU 4f15 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.378 UTC [policies] Evaluate -> DEBU 4f16 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.378 UTC [policies] Evaluate -> DEBU 4f17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:20.378 UTC [cauthdsl] func1 -> DEBU 4f18 0xc0034d9bd0 gate 1555913900378747500 evaluation starts" +"2019-04-22 06:18:20.379 UTC [cauthdsl] func2 -> DEBU 4f19 0xc0034d9bd0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.379 UTC [cauthdsl] func2 -> DEBU 4f1a 0xc0034d9bd0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.380 UTC [cauthdsl] func2 -> DEBU 4f1b 0xc0034d9bd0 principal matched by identity 0" +"2019-04-22 06:18:20.380 UTC [msp.identity] Verify -> DEBU 4f1c Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:20.381 UTC [msp.identity] Verify -> DEBU 4f1d Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:20.382 UTC [cauthdsl] func2 -> DEBU 4f1e 0xc0034d9bd0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:20.383 UTC [cauthdsl] func1 -> DEBU 4f1f 0xc0034d9bd0 gate 1555913900378747500 evaluation succeeds" +"2019-04-22 06:18:20.383 UTC [policies] Evaluate -> DEBU 4f20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.384 UTC [policies] Evaluate -> DEBU 4f21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.384 UTC [policies] Evaluate -> DEBU 4f22 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:20.385 UTC [policies] Evaluate -> DEBU 4f23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:20.385 UTC [gossip.gossip] handleMessage -> DEBU 4f24 Exiting" +"2019-04-22 06:18:20.386 UTC [gossip.gossip] handleMessage -> DEBU 4f25 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.386 UTC [msp] DeserializeIdentity -> DEBU 4f26 Obtaining identity" +"2019-04-22 06:18:20.387 UTC [msp] DeserializeIdentity -> DEBU 4f27 Obtaining identity" +"2019-04-22 06:18:20.387 UTC [msp] DeserializeIdentity -> DEBU 4f28 Obtaining identity" +"2019-04-22 06:18:20.388 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f29 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:20.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f2a Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.388 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f2b Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.388 UTC [policies] Evaluate -> DEBU 4f2c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:20.388 UTC [policies] Evaluate -> DEBU 4f2d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:20.388 UTC [policies] Evaluate -> DEBU 4f2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func1 -> DEBU 4f2f 0xc0042dd6e0 gate 1555913900389008200 evaluation starts" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f30 0xc0042dd6e0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f31 0xc0042dd6e0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f32 0xc0042dd6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f33 0xc0042dd6e0 principal evaluation fails" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func1 -> DEBU 4f34 0xc0042dd6e0 gate 1555913900389008200 evaluation fails" +"2019-04-22 06:18:20.389 UTC [policies] Evaluate -> DEBU 4f35 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.389 UTC [policies] Evaluate -> DEBU 4f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.389 UTC [policies] Evaluate -> DEBU 4f37 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func1 -> DEBU 4f38 0xc0042ddf20 gate 1555913900389345100 evaluation starts" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f39 0xc0042ddf20 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f3a 0xc0042ddf20 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.389 UTC [cauthdsl] func2 -> DEBU 4f3b 0xc0042ddf20 principal matched by identity 0" +"2019-04-22 06:18:20.389 UTC [msp.identity] Verify -> DEBU 4f3c Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:20.389 UTC [msp.identity] Verify -> DEBU 4f3d Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:20.390 UTC [cauthdsl] func2 -> DEBU 4f3e 0xc0042ddf20 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:20.390 UTC [cauthdsl] func1 -> DEBU 4f3f 0xc0042ddf20 gate 1555913900389345100 evaluation succeeds" +"2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f40 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f41 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f42 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:20.391 UTC [policies] Evaluate -> DEBU 4f43 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:20.392 UTC [msp.identity] Verify -> DEBU 4f44 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:20.392 UTC [msp.identity] Verify -> DEBU 4f45 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:20.393 UTC [msp.identity] Verify -> DEBU 4f46 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:20.393 UTC [msp.identity] Verify -> DEBU 4f47 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:20.393 UTC [msp] DeserializeIdentity -> DEBU 4f48 Obtaining identity" +"2019-04-22 06:18:20.394 UTC [msp] DeserializeIdentity -> DEBU 4f49 Obtaining identity" +"2019-04-22 06:18:20.394 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:20.395 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f4b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.395 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f4c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.395 UTC [policies] Evaluate -> DEBU 4f4d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:20.395 UTC [policies] Evaluate -> DEBU 4f4e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:20.395 UTC [policies] Evaluate -> DEBU 4f4f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:20.395 UTC [cauthdsl] func1 -> DEBU 4f50 0xc004316530 gate 1555913900395386200 evaluation starts" +"2019-04-22 06:18:20.395 UTC [cauthdsl] func2 -> DEBU 4f51 0xc004316530 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.395 UTC [cauthdsl] func2 -> DEBU 4f52 0xc004316530 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.395 UTC [cauthdsl] func2 -> DEBU 4f53 0xc004316530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:20.396 UTC [cauthdsl] func2 -> DEBU 4f54 0xc004316530 principal evaluation fails" +"2019-04-22 06:18:20.396 UTC [cauthdsl] func1 -> DEBU 4f55 0xc004316530 gate 1555913900395386200 evaluation fails" +"2019-04-22 06:18:20.397 UTC [policies] Evaluate -> DEBU 4f56 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.397 UTC [policies] Evaluate -> DEBU 4f57 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.397 UTC [policies] Evaluate -> DEBU 4f58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:20.397 UTC [cauthdsl] func1 -> DEBU 4f59 0xc004316d70 gate 1555913900397631500 evaluation starts" +"2019-04-22 06:18:20.397 UTC [cauthdsl] func2 -> DEBU 4f5a 0xc004316d70 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.397 UTC [cauthdsl] func2 -> DEBU 4f5b 0xc004316d70 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.397 UTC [cauthdsl] func2 -> DEBU 4f5c 0xc004316d70 principal matched by identity 0" +"2019-04-22 06:18:20.397 UTC [msp.identity] Verify -> DEBU 4f5d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:20.397 UTC [msp.identity] Verify -> DEBU 4f5e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:20.398 UTC [cauthdsl] func2 -> DEBU 4f5f 0xc004316d70 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:20.398 UTC [cauthdsl] func1 -> DEBU 4f60 0xc004316d70 gate 1555913900397631500 evaluation succeeds" +"2019-04-22 06:18:20.398 UTC [policies] Evaluate -> DEBU 4f61 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.398 UTC [policies] Evaluate -> DEBU 4f62 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.399 UTC [policies] Evaluate -> DEBU 4f63 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:20.400 UTC [policies] Evaluate -> DEBU 4f64 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:20.400 UTC [gossip.gossip] handleMessage -> DEBU 4f65 Exiting" +"2019-04-22 06:18:20.401 UTC [gossip.gossip] handleMessage -> DEBU 4f66 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.402 UTC [msp] DeserializeIdentity -> DEBU 4f67 Obtaining identity" +"2019-04-22 06:18:20.402 UTC [msp] DeserializeIdentity -> DEBU 4f68 Obtaining identity" +"2019-04-22 06:18:20.402 UTC [msp] DeserializeIdentity -> DEBU 4f69 Obtaining identity" +"2019-04-22 06:18:20.403 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f6a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:20.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f6b Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.403 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f6c Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.403 UTC [policies] Evaluate -> DEBU 4f6d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:20.403 UTC [policies] Evaluate -> DEBU 4f6e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:20.403 UTC [policies] Evaluate -> DEBU 4f6f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:20.404 UTC [cauthdsl] func1 -> DEBU 4f70 0xc004324880 gate 1555913900403979600 evaluation starts" +"2019-04-22 06:18:20.406 UTC [cauthdsl] func2 -> DEBU 4f71 0xc004324880 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.407 UTC [cauthdsl] func2 -> DEBU 4f72 0xc004324880 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.408 UTC [cauthdsl] func2 -> DEBU 4f73 0xc004324880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f74 0xc004324880 principal evaluation fails" +"2019-04-22 06:18:20.409 UTC [cauthdsl] func1 -> DEBU 4f75 0xc004324880 gate 1555913900403979600 evaluation fails" +"2019-04-22 06:18:20.409 UTC [policies] Evaluate -> DEBU 4f76 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.409 UTC [policies] Evaluate -> DEBU 4f77 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.409 UTC [policies] Evaluate -> DEBU 4f78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:20.409 UTC [cauthdsl] func1 -> DEBU 4f79 0xc0043250c0 gate 1555913900409301400 evaluation starts" +"2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f7a 0xc0043250c0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f7b 0xc0043250c0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.409 UTC [cauthdsl] func2 -> DEBU 4f7c 0xc0043250c0 principal matched by identity 0" +"2019-04-22 06:18:20.409 UTC [msp.identity] Verify -> DEBU 4f7d Verify: digest = 00000000 ac 42 4e 84 18 89 7f e6 e9 6a a7 18 68 19 3f 0f |.BN......j..h.?.| +00000010 8c 54 b4 99 8e bd 69 98 59 1c 19 6b 30 27 10 db |.T....i.Y..k0'..|" +"2019-04-22 06:18:20.409 UTC [msp.identity] Verify -> DEBU 4f7e Verify: sig = 00000000 30 45 02 21 00 f6 8e 71 ee 87 ca 33 82 49 7c 14 |0E.!...q...3.I|.| +00000010 7f 7d 9c 7c 2f d5 44 61 6b 41 7c c2 ad 1f 05 e9 |.}.|/.DakA|.....| +00000020 5a d1 2b 1c 51 02 20 29 d7 c2 cb 9d 5f 73 5c 27 |Z.+.Q. )...._s\'| +00000030 32 3c 9a d9 e8 c5 ee 4f 98 fc 89 c4 80 39 61 d0 |2<.....O.....9a.| +00000040 02 82 88 47 2f e9 a9 |...G/..|" +"2019-04-22 06:18:20.412 UTC [cauthdsl] func2 -> DEBU 4f7f 0xc0043250c0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:20.412 UTC [cauthdsl] func1 -> DEBU 4f80 0xc0043250c0 gate 1555913900409301400 evaluation succeeds" +"2019-04-22 06:18:20.412 UTC [policies] Evaluate -> DEBU 4f81 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.413 UTC [policies] Evaluate -> DEBU 4f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.413 UTC [policies] Evaluate -> DEBU 4f83 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:20.413 UTC [policies] Evaluate -> DEBU 4f84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:20.414 UTC [msp.identity] Verify -> DEBU 4f85 Verify: digest = 00000000 ae f0 43 12 da a2 4b 18 66 f1 ad 89 d6 b5 2f 66 |..C...K.f...../f| +00000010 bf a9 70 76 49 77 8d cd 63 8e 40 c3 45 03 e8 57 |..pvIw..c.@.E..W|" +"2019-04-22 06:18:20.414 UTC [msp.identity] Verify -> DEBU 4f86 Verify: sig = 00000000 30 44 02 20 39 5a 2f 91 40 05 cd 1b b5 62 8d 16 |0D. 9Z/.@....b..| +00000010 ff 1a a9 44 6a a7 29 a6 9f 57 12 16 0a 39 46 46 |...Dj.)..W...9FF| +00000020 01 c6 ff b6 02 20 14 dc d1 b2 fa 20 60 78 48 c3 |..... ..... `xH.| +00000030 2d 37 d1 25 9c 32 23 16 b7 f8 e1 c5 0d e6 44 99 |-7.%.2#.......D.| +00000040 d4 bd 07 53 46 05 |...SF.|" +"2019-04-22 06:18:20.415 UTC [msp.identity] Verify -> DEBU 4f87 Verify: digest = 00000000 e1 bc d7 d3 90 01 0c 61 b4 57 b9 86 ff a7 8e ae |.......a.W......| +00000010 61 28 23 52 ab 60 35 39 7c d3 c3 d2 9a 15 d9 2a |a(#R.`59|......*|" +"2019-04-22 06:18:20.415 UTC [msp.identity] Verify -> DEBU 4f88 Verify: sig = 00000000 30 45 02 21 00 f6 26 f2 ff 21 f2 08 37 4a e5 d9 |0E.!..&..!..7J..| +00000010 d9 03 05 a3 a2 f6 99 f9 1d c7 ba 13 3c 8c 40 31 |............<.@1| +00000020 90 79 8a a7 c8 02 20 0c 44 12 b5 d8 6f e0 d4 39 |.y.... .D...o..9| +00000030 39 a6 48 4e d6 9d c7 df 00 8b 81 fb 00 db 13 50 |9.HN...........P| +00000040 9d 52 87 7c df b8 69 |.R.|..i|" +"2019-04-22 06:18:20.415 UTC [msp] DeserializeIdentity -> DEBU 4f89 Obtaining identity" +"2019-04-22 06:18:20.416 UTC [msp] DeserializeIdentity -> DEBU 4f8a Obtaining identity" +"2019-04-22 06:18:20.417 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:20.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f8c Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.417 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f8d Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:20.417 UTC [cauthdsl] func1 -> DEBU 4f91 0xc0043396d0 gate 1555913900417707300 evaluation starts" +"2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f92 0xc0043396d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f93 0xc0043396d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f94 0xc0043396d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:20.417 UTC [cauthdsl] func2 -> DEBU 4f95 0xc0043396d0 principal evaluation fails" +"2019-04-22 06:18:20.417 UTC [cauthdsl] func1 -> DEBU 4f96 0xc0043396d0 gate 1555913900417707300 evaluation fails" +"2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f97 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.417 UTC [policies] Evaluate -> DEBU 4f98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4f99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:20.418 UTC [cauthdsl] func1 -> DEBU 4f9a 0xc004339f10 gate 1555913900418046100 evaluation starts" +"2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4f9b 0xc004339f10 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4f9c 0xc004339f10 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4f9d 0xc004339f10 principal matched by identity 0" +"2019-04-22 06:18:20.418 UTC [msp.identity] Verify -> DEBU 4f9e Verify: digest = 00000000 55 0f 52 21 18 fc f7 58 22 41 59 cb 40 c7 97 24 |U.R!...X"AY.@..$| +00000010 1b 72 47 83 a6 34 2e 73 cc 0e 43 a7 b3 5a 40 34 |.rG..4.s..C..Z@4|" +"2019-04-22 06:18:20.418 UTC [msp.identity] Verify -> DEBU 4f9f Verify: sig = 00000000 30 45 02 21 00 c7 3e b5 b5 7f d0 73 80 0d c7 aa |0E.!..>....s....| +00000010 34 40 de 73 63 97 be 0f af 9a 49 d2 1e 7c b9 62 |4@.sc.....I..|.b| +00000020 42 3e da d1 85 02 20 77 96 2b c0 d7 a0 98 1d eb |B>.... w.+......| +00000030 1a 90 d1 ef 59 1c b8 70 25 dc 0c 03 72 64 88 ef |....Y..p%...rd..| +00000040 49 43 a3 0f 59 8a eb |IC..Y..|" +"2019-04-22 06:18:20.418 UTC [cauthdsl] func2 -> DEBU 4fa0 0xc004339f10 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:20.418 UTC [cauthdsl] func1 -> DEBU 4fa1 0xc004339f10 gate 1555913900418046100 evaluation succeeds" +"2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa4 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:20.418 UTC [policies] Evaluate -> DEBU 4fa5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:20.418 UTC [gossip.gossip] handleMessage -> DEBU 4fa6 Exiting" +"2019-04-22 06:18:20.503 UTC [msp] DeserializeIdentity -> DEBU 4fa7 Obtaining identity" +"2019-04-22 06:18:20.504 UTC [msp] DeserializeIdentity -> DEBU 4fa8 Obtaining identity" +"2019-04-22 06:18:20.504 UTC [gossip.pull] Hello -> DEBU 4fa9 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-04-22 06:18:20.504 UTC [msp] DeserializeIdentity -> DEBU 4faa Obtaining identity" +"2019-04-22 06:18:20.504 UTC [msp] DeserializeIdentity -> DEBU 4fab Obtaining identity" +"2019-04-22 06:18:20.504 UTC [gossip.comm] Send -> DEBU 4fac Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-04-22 06:18:20.504 UTC [gossip.comm] sendToEndpoint -> DEBU 4fad Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.505 UTC [gossip.comm] sendToEndpoint -> DEBU 4fae Exiting" +"2019-04-22 06:18:20.506 UTC [gossip.comm] func1 -> DEBU 4faf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10663997115154472173 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 8 4 5 6 7], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.507 UTC [gossip.gossip] handleMessage -> DEBU 4fb0 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10663997115154472173 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 8 4 5 6 7], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.507 UTC [gossip.pull] HandleMessage -> DEBU 4fb1 GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG data_dig: nonce: 10663997115154472173 , Msg_type: BLOCK_MSG, digests: [9 1 2 3 8 4 5 6 7], Envelope: 61 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.508 UTC [gossip.gossip] handleMessage -> DEBU 4fb2 Exiting" +"2019-04-22 06:18:20.616 UTC [gossip.comm] func1 -> DEBU 4fb3 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.616 UTC [gossip.gossip] handleMessage -> DEBU 4fb4 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.617 UTC [msp] DeserializeIdentity -> DEBU 4fb5 Obtaining identity" +"2019-04-22 06:18:20.617 UTC [msp] DeserializeIdentity -> DEBU 4fb6 Obtaining identity" +"2019-04-22 06:18:20.617 UTC [gossip.gossip] handleMessage -> DEBU 4fb7 Exiting" +"2019-04-22 06:18:20.678 UTC [gossip.comm] func1 -> DEBU 4fb8 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.678 UTC [gossip.gossip] handleMessage -> DEBU 4fb9 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.678 UTC [gossip.pull] HandleMessage -> DEBU 4fba GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.679 UTC [gossip.pull] SendDigest -> DEBU 4fbb Sending BLOCK_MSG digest: [2 4 7 9 1 3 5 6 8] to 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7" +"2019-04-22 06:18:20.679 UTC [gossip.gossip] handleMessage -> DEBU 4fbc Exiting" +"2019-04-22 06:18:20.812 UTC [msp.identity] Sign -> DEBU 4fbd Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...D32D120C08D0A5B9B096EBEDCB151040 " +"2019-04-22 06:18:20.812 UTC [msp.identity] Sign -> DEBU 4fbe Sign: digest: FC3675D4BE6D825AEA8E4403D8BC180846A597CDBADB110A3A3C6B060B2F4940 " +"2019-04-22 06:18:20.813 UTC [msp.identity] Sign -> DEBU 4fbf Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-04-22 06:18:20.813 UTC [msp.identity] Sign -> DEBU 4fc0 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-04-22 06:18:20.813 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4fc1 Sleeping 5s" +"2019-04-22 06:18:20.820 UTC [msp] DeserializeIdentity -> DEBU 4fc2 Obtaining identity" +"2019-04-22 06:18:20.821 UTC [msp] DeserializeIdentity -> DEBU 4fc3 Obtaining identity" +"2019-04-22 06:18:20.822 UTC [msp] DeserializeIdentity -> DEBU 4fc4 Obtaining identity" +"2019-04-22 06:18:20.822 UTC [gossip.comm] Send -> DEBU 4fc5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:20.823 UTC [gossip.comm] Send -> DEBU 4fc6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:20.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4fc7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:20.823 UTC [gossip.comm] sendToEndpoint -> DEBU 4fc8 Exiting" +"2019-04-22 06:18:20.824 UTC [msp] DeserializeIdentity -> DEBU 4fc9 Obtaining identity" +"2019-04-22 06:18:20.826 UTC [gossip.comm] Send -> DEBU 4fca Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:20.827 UTC [gossip.comm] sendToEndpoint -> DEBU 4fcb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:20.830 UTC [gossip.comm] sendToEndpoint -> DEBU 4fcc Exiting" +"2019-04-22 06:18:20.829 UTC [gossip.comm] sendToEndpoint -> DEBU 4fcd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org1.example.com:7051 PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32dIdentity:Timestamp:inc_num:1555913790871982800 seq_num:64 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:20.836 UTC [gossip.comm] func1 -> DEBU 4fce Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.837 UTC [gossip.gossip] handleMessage -> DEBU 4fcf Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9db4e2817d254f425e7532b36431a8b87c65c4ba55d0a400ec6b551ef02ec445, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:20.838 UTC [msp] DeserializeIdentity -> DEBU 4fd0 Obtaining identity" +"2019-04-22 06:18:20.838 UTC [msp] DeserializeIdentity -> DEBU 4fd1 Obtaining identity" +"2019-04-22 06:18:20.839 UTC [msp] DeserializeIdentity -> DEBU 4fd2 Obtaining identity" +"2019-04-22 06:18:20.839 UTC [gossip.gossip] handleMessage -> DEBU 4fd3 Exiting" +"2019-04-22 06:18:20.834 UTC [gossip.comm] sendToEndpoint -> DEBU 4fd4 Exiting" +"2019-04-22 06:18:20.977 UTC [endorser] ProcessProposal -> DEBU 4fd5 Entering: request from 192.168.224.9:49444" +"2019-04-22 06:18:20.978 UTC [protoutils] ValidateProposalMessage -> DEBU 4fd6 ValidateProposalMessage starts for signed proposal 0xc002828780" +"2019-04-22 06:18:20.978 UTC [protoutils] validateChannelHeader -> DEBU 4fd7 validateChannelHeader info: header type 3" +"2019-04-22 06:18:20.978 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fd8 begin" +"2019-04-22 06:18:20.978 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fd9 creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:18:20.978 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fda creator is valid" +"2019-04-22 06:18:20.978 UTC [msp.identity] Verify -> DEBU 4fdb Verify: digest = 00000000 d5 3f 34 b5 74 7c 49 46 70 63 9f 60 a0 e2 4b 91 |.?4.t|IFpc.`..K.| +00000010 34 06 9f 63 b6 e4 ad 56 79 fe 81 15 d6 9e b8 9a |4..c...Vy.......|" +"2019-04-22 06:18:20.978 UTC [msp.identity] Verify -> DEBU 4fdc Verify: sig = 00000000 30 45 02 21 00 aa da 5c 28 0f fc ef de 1e ed 00 |0E.!...\(.......| +00000010 c8 b0 7a 38 d3 d5 f0 0c f1 29 83 b9 27 cc ac f0 |..z8.....)..'...| +00000020 1a 97 07 d4 7c 02 20 53 59 02 29 27 4f 85 37 89 |....|. SY.)'O.7.| +00000030 39 63 d1 ac 81 c8 51 22 cf e3 6f f6 b7 71 6c bd |9c....Q"..o..ql.| +00000040 cd fb db 8e f3 bd 7a |......z|" +"2019-04-22 06:18:20.979 UTC [protoutils] checkSignatureFromCreator -> DEBU 4fdd exits successfully" +"2019-04-22 06:18:20.979 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4fde validateChaincodeProposalMessage starts for proposal 0xc003f113b0, header 0xc002828b90" +"2019-04-22 06:18:20.979 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4fdf validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-04-22 06:18:20.979 UTC [endorser] preProcess -> DEBU 4fe0 [][edd58b23] processing txid: edd58b23ab5e847144c0c1b336b8277680414504b7f73682303956fc3233f370" +"2019-04-22 06:18:20.979 UTC [endorser] SimulateProposal -> DEBU 4fe1 [][edd58b23] Entry chaincode: name:"cscc" " +"2019-04-22 06:18:20.979 UTC [endorser] callChaincode -> INFO 4fe2 [][edd58b23] Entry chaincode: name:"cscc" " +"2019-04-22 06:18:20.979 UTC [chaincode] Execute -> DEBU 4fe3 Entry" +"2019-04-22 06:18:20.980 UTC [cscc] Invoke -> DEBU 4fe4 Invoke function: GetChannels" +"2019-04-22 06:18:20.980 UTC [msp.identity] Verify -> DEBU 4fe5 Verify: digest = 00000000 d5 3f 34 b5 74 7c 49 46 70 63 9f 60 a0 e2 4b 91 |.?4.t|IFpc.`..K.| +00000010 34 06 9f 63 b6 e4 ad 56 79 fe 81 15 d6 9e b8 9a |4..c...Vy.......|" +"2019-04-22 06:18:20.980 UTC [msp.identity] Verify -> DEBU 4fe6 Verify: sig = 00000000 30 45 02 21 00 aa da 5c 28 0f fc ef de 1e ed 00 |0E.!...\(.......| +00000010 c8 b0 7a 38 d3 d5 f0 0c f1 29 83 b9 27 cc ac f0 |..z8.....)..'...| +00000020 1a 97 07 d4 7c 02 20 53 59 02 29 27 4f 85 37 89 |....|. SY.)'O.7.| +00000030 39 63 d1 ac 81 c8 51 22 cf e3 6f f6 b7 71 6c bd |9c....Q"..o..ql.| +00000040 cd fb db 8e f3 bd 7a |......z|" +"2019-04-22 06:18:20.981 UTC [chaincode] handleMessage -> DEBU 4fe7 [edd58b23] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:18:20.981 UTC [chaincode] Notify -> DEBU 4fe8 [edd58b23] notifying Txid:edd58b23ab5e847144c0c1b336b8277680414504b7f73682303956fc3233f370, channelID:" +"2019-04-22 06:18:20.981 UTC [chaincode] Execute -> DEBU 4fe9 Exit" +"2019-04-22 06:18:20.981 UTC [endorser] callChaincode -> INFO 4fea [][edd58b23] Exit chaincode: name:"cscc" (2ms)" +"2019-04-22 06:18:20.981 UTC [endorser] SimulateProposal -> DEBU 4feb [][edd58b23] Exit" +"2019-04-22 06:18:20.981 UTC [endorser] func1 -> DEBU 4fec Exit: request from 192.168.224.9:49444" +"2019-04-22 06:18:20.981 UTC [comm.grpc.server] 1 -> INFO 4fed unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49444 grpc.code=OK grpc.call_duration=4.1283ms +"2019-04-22 06:18:20.985 UTC [grpc] warningf -> DEBU 4fee transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49444: read: connection reset by peer" +"2019-04-22 06:18:20.986 UTC [grpc] infof -> DEBU 4fef transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:21.050 UTC [gossip.comm] func1 -> DEBU 4ff0 Got message: GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:21.052 UTC [gossip.gossip] handleMessage -> DEBU 4ff1 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_pull_req: Channel MAC:9183fcb8e1c389f6cb4c0a3702db62ba571dfc9f08096f15b3c9f05668cd885f, Envelope: 39 bytes, Signature: 0 bytes" +"2019-04-22 06:18:21.052 UTC [msp] DeserializeIdentity -> DEBU 4ff2 Obtaining identity" +"2019-04-22 06:18:21.052 UTC [msp] DeserializeIdentity -> DEBU 4ff3 Obtaining identity" +"2019-04-22 06:18:21.053 UTC [msp] DeserializeIdentity -> DEBU 4ff4 Obtaining identity" +"2019-04-22 06:18:21.053 UTC [gossip.gossip] handleMessage -> DEBU 4ff5 Exiting" +"2019-04-22 06:18:21.094 UTC [gossip.comm] func1 -> DEBU 4ff6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:21.098 UTC [gossip.gossip] handleMessage -> DEBU 4ff7 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:21.098 UTC [gossip.comm] func1 -> DEBU 4ff8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.098 UTC [gossip.gossip] handleMessage -> DEBU 4ff9 Exiting" +"2019-04-22 06:18:21.098 UTC [gossip.gossip] handleMessage -> DEBU 4ffa Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.098 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ffb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:21.099 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ffc Fetched identity of Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 from identity store" +"2019-04-22 06:18:21.099 UTC [msp.identity] Verify -> DEBU 4ffd Verify: digest = 00000000 22 63 91 aa f6 69 f0 83 99 6c 11 14 38 e1 e9 55 |"c...i...l..8..U| +00000010 4c ab 4f f4 25 56 b4 2f c2 cb c8 ee 8e 8b 4f 29 |L.O.%V./......O)|" +"2019-04-22 06:18:21.100 UTC [msp.identity] Verify -> DEBU 4ffe Verify: sig = 00000000 30 45 02 21 00 bd 52 06 26 d2 eb 00 88 04 15 06 |0E.!..R.&.......| +00000010 e0 e2 46 d8 f3 dd 84 0e 54 1b 8c b8 fd 98 c3 0c |..F.....T.......| +00000020 bc be 28 65 80 02 20 2d dd 63 85 1f 0b db 49 1c |..(e.. -.c....I.| +00000030 dc 96 66 ed 56 9d 78 e1 de cd 7b 5d e8 83 bd 38 |..f.V.x...{]...8| +00000040 5a dc fe b4 01 16 8c |Z......|" +"2019-04-22 06:18:21.100 UTC [msp.identity] Verify -> DEBU 4fff Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-04-22 06:18:21.100 UTC [msp.identity] Verify -> DEBU 5000 Verify: sig = 00000000 30 45 02 21 00 f5 56 89 a6 61 29 27 fe 2f 1a 81 |0E.!..V..a)'./..| +00000010 6a 88 87 4e 3b 2e 7c 0b 78 6f 3f 77 46 81 f8 2d |j..N;.|.xo?wF..-| +00000020 c2 8e 22 18 74 02 20 15 8d b3 f7 70 34 dc e6 0a |..".t. ....p4...| +00000030 14 40 df 7f 1e 23 5b b8 68 eb 4a 60 02 72 7a 8c |.@...#[.h.J`.rz.| +00000040 77 d9 d0 65 39 ee b3 |w..e9..|" +"2019-04-22 06:18:21.101 UTC [gossip.discovery] handleAliveMessage -> DEBU 5001 Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-04-22 06:18:21.101 UTC [gossip.discovery] learnExistingMembers -> DEBU 5002 Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-04-22 06:18:21.102 UTC [gossip.discovery] learnExistingMembers -> DEBU 5003 updating Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 " +"2019-04-22 06:18:21.102 UTC [gossip.discovery] learnExistingMembers -> DEBU 5004 Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 " +"2019-04-22 06:18:21.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 5005 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:21.103 UTC [gossip.discovery] learnExistingMembers -> DEBU 5006 Exiting" +"2019-04-22 06:18:21.104 UTC [gossip.discovery] handleAliveMessage -> DEBU 5007 Exiting" +"2019-04-22 06:18:21.106 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5008 Exiting" +"2019-04-22 06:18:21.106 UTC [gossip.comm] func1 -> DEBU 5009 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.107 UTC [gossip.gossip] handleMessage -> DEBU 500c Exiting" +"2019-04-22 06:18:21.107 UTC [gossip.gossip] handleMessage -> DEBU 500d Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500b Exiting" +"2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.107 UTC [gossip.discovery] handleMsgFromComm -> DEBU 500f Exiting" +"2019-04-22 06:18:21.108 UTC [gossip.gossip] handleMessage -> DEBU 5010 Exiting" +"2019-04-22 06:18:21.108 UTC [msp] DeserializeIdentity -> DEBU 5011 Obtaining identity" +"2019-04-22 06:18:21.108 UTC [msp] DeserializeIdentity -> DEBU 5012 Obtaining identity" +"2019-04-22 06:18:21.108 UTC [msp] DeserializeIdentity -> DEBU 5013 Obtaining identity" +"2019-04-22 06:18:21.109 UTC [gossip.comm] Send -> DEBU 5014 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:21.109 UTC [msp] DeserializeIdentity -> DEBU 5015 Obtaining identity" +"2019-04-22 06:18:21.109 UTC [gossip.comm] Send -> DEBU 5016 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:21.109 UTC [gossip.comm] sendToEndpoint -> DEBU 5017 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.109 UTC [gossip.comm] sendToEndpoint -> DEBU 5018 Exiting" +"2019-04-22 06:18:21.109 UTC [gossip.comm] sendToEndpoint -> DEBU 5019 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org1.example.com:7051 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7Identity:Timestamp:inc_num:1555913791157951100 seq_num:70 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.110 UTC [gossip.comm] sendToEndpoint -> DEBU 501a Exiting" +"2019-04-22 06:18:21.445 UTC [gossip.election] waitForInterrupt -> DEBU 501b c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Exiting" +"2019-04-22 06:18:21.445 UTC [gossip.election] IsLeader -> DEBU 501c c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Returning true" +"2019-04-22 06:18:21.446 UTC [msp.identity] Sign -> DEBU 501d Sign: plaintext: 120F627573696E6573736368616E6E65...120C089889839CBAEBEDCB1510151801 " +"2019-04-22 06:18:21.446 UTC [msp.identity] Sign -> DEBU 501e Sign: digest: 23EB0AA6B5CB21FAA30A44FFE1E215A5431ABF102667FE23BDFAFC94DB9509A4 " +"2019-04-22 06:18:21.446 UTC [gossip.election] waitForInterrupt -> DEBU 501f c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Entering" +"2019-04-22 06:18:21.455 UTC [msp] DeserializeIdentity -> DEBU 5020 Obtaining identity" +"2019-04-22 06:18:21.456 UTC [msp] DeserializeIdentity -> DEBU 5021 Obtaining identity" +"2019-04-22 06:18:21.456 UTC [msp] DeserializeIdentity -> DEBU 5022 Obtaining identity" +"2019-04-22 06:18:21.458 UTC [msp] DeserializeIdentity -> DEBU 5023 Obtaining identity" +"2019-04-22 06:18:21.459 UTC [gossip.comm] Send -> DEBU 5024 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:21.461 UTC [msp] DeserializeIdentity -> DEBU 5025 Obtaining identity" +"2019-04-22 06:18:21.461 UTC [gossip.comm] sendToEndpoint -> DEBU 5026 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Leadership Message: PKI-id:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d Timestamp:inc_num:1555913800492827800 seq_num:21 Is Declaration true, Envelope: 72 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.461 UTC [gossip.comm] sendToEndpoint -> DEBU 5027 Exiting" +"2019-04-22 06:18:21.462 UTC [msp] DeserializeIdentity -> DEBU 5028 Obtaining identity" +"2019-04-22 06:18:21.585 UTC [gossip.comm] func1 -> DEBU 5029 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.585 UTC [gossip.gossip] handleMessage -> DEBU 502a Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.585 UTC [gossip.gossip] handleMessage -> DEBU 502b Exiting" +"2019-04-22 06:18:21.585 UTC [gossip.discovery] handleMsgFromComm -> DEBU 502c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 502d Fetched identity of Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd from identity store" +"2019-04-22 06:18:21.585 UTC [msp] DeserializeIdentity -> DEBU 502e Obtaining identity" +"2019-04-22 06:18:21.586 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 502f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 53 6c 79 6a 72 64 2f 6a 48 53 51 62 50 67 42 4a 38 50 76 4f 2b 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 4f 47 50 45 50 51 66 50 2f 6f 38 63 0a 70 66 34 37 30 31 43 6c 31 44 76 47 6b 32 71 51 2b 55 30 4d 55 6a 51 42 6f 49 61 4f 42 4b 51 54 4b 44 4f 78 35 2b 67 50 6f 5a 42 51 57 63 50 4f 78 59 4a 48 79 33 57 73 4b 68 38 54 52 6c 64 76 0a 57 6e 4b 44 4f 78 5a 6f 47 71 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 4d 33 62 48 70 58 77 31 4e 45 6d 66 46 77 37 44 4e 52 63 71 2b 7a 44 2f 5a 54 38 63 78 53 35 7a 50 52 71 65 57 73 67 7a 4a 78 67 43 49 47 63 32 30 61 4d 72 0a 4b 4b 49 34 56 38 68 35 6c 47 43 55 48 7a 31 48 72 75 32 35 32 70 34 44 4e 30 68 71 77 42 44 37 6f 57 71 51 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:21.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5030 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:21.586 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5031 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:21.586 UTC [policies] Evaluate -> DEBU 5032 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:21.586 UTC [policies] Evaluate -> DEBU 5033 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:21.586 UTC [policies] Evaluate -> DEBU 5034 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:21.586 UTC [cauthdsl] func1 -> DEBU 5035 0xc0028b7400 gate 1555913901586743700 evaluation starts" +"2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5036 0xc0028b7400 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5037 0xc0028b7400 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5038 0xc0028b7400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:21.586 UTC [cauthdsl] func2 -> DEBU 5039 0xc0028b7400 principal evaluation fails" +"2019-04-22 06:18:21.587 UTC [cauthdsl] func1 -> DEBU 503a 0xc0028b7400 gate 1555913901586743700 evaluation fails" +"2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 503b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 503c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 503d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:21.587 UTC [cauthdsl] func1 -> DEBU 503e 0xc0028b7c40 gate 1555913901587203500 evaluation starts" +"2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 503f 0xc0028b7c40 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 5040 0xc0028b7c40 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 5041 0xc0028b7c40 principal matched by identity 0" +"2019-04-22 06:18:21.587 UTC [msp.identity] Verify -> DEBU 5042 Verify: digest = 00000000 8c eb 72 fa 07 0b c9 a4 b2 79 cc 10 44 a6 2c 45 |..r......y..D.,E| +00000010 dd f8 7d 71 ba d3 d9 fd 80 53 a2 e5 e1 57 19 05 |..}q.....S...W..|" +"2019-04-22 06:18:21.587 UTC [msp.identity] Verify -> DEBU 5043 Verify: sig = 00000000 30 44 02 20 1e 55 d9 17 42 23 5b 31 01 76 cb 6b |0D. .U..B#[1.v.k| +00000010 d8 89 c5 97 db 94 07 b8 42 f7 8d 51 4d 26 0c 68 |........B..QM&.h| +00000020 f3 83 2a 14 02 20 10 5e 70 f1 47 57 45 6f 32 79 |..*.. .^p.GWEo2y| +00000030 15 b1 26 29 59 d1 27 1f 40 eb 0b 90 f2 fc 3d b7 |..&)Y.'.@.....=.| +00000040 34 18 d6 b0 25 0c |4...%.|" +"2019-04-22 06:18:21.587 UTC [cauthdsl] func2 -> DEBU 5044 0xc0028b7c40 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:21.587 UTC [cauthdsl] func1 -> DEBU 5045 0xc0028b7c40 gate 1555913901587203500 evaluation succeeds" +"2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5046 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5047 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5048 Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:21.587 UTC [policies] Evaluate -> DEBU 5049 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:21.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 504a Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 504b Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-04-22 06:18:21.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 504c updating Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 " +"2019-04-22 06:18:21.601 UTC [gossip.discovery] learnExistingMembers -> DEBU 504d Updating aliveness data: Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 " +"2019-04-22 06:18:21.602 UTC [gossip.discovery] learnExistingMembers -> DEBU 504e Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:68 , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-04-22 06:18:21.603 UTC [gossip.discovery] learnExistingMembers -> DEBU 504f Exiting" +"2019-04-22 06:18:21.603 UTC [gossip.discovery] handleAliveMessage -> DEBU 5050 Exiting" +"2019-04-22 06:18:21.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5051 Exiting" +"2019-04-22 06:18:21.603 UTC [gossip.comm] func1 -> DEBU 5052 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.603 UTC [gossip.gossip] handleMessage -> DEBU 5053 Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.603 UTC [gossip.gossip] handleMessage -> DEBU 5054 Exiting" +"2019-04-22 06:18:21.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5055 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.603 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5056 Exiting" +"2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 5057 Obtaining identity" +"2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 5058 Obtaining identity" +"2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 5059 Obtaining identity" +"2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 505a Obtaining identity" +"2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 505b Obtaining identity" +"2019-04-22 06:18:21.604 UTC [msp] DeserializeIdentity -> DEBU 505c Obtaining identity" +"2019-04-22 06:18:21.604 UTC [gossip.comm] Send -> DEBU 505d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:21.605 UTC [msp] DeserializeIdentity -> DEBU 505e Obtaining identity" +"2019-04-22 06:18:21.605 UTC [msp] DeserializeIdentity -> DEBU 505f Obtaining identity" +"2019-04-22 06:18:21.605 UTC [gossip.comm] sendToEndpoint -> DEBU 5060 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.605 UTC [gossip.comm] sendToEndpoint -> DEBU 5061 Exiting" +"2019-04-22 06:18:21.606 UTC [gossip.comm] Send -> DEBU 5062 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-04-22 06:18:21.606 UTC [gossip.comm] sendToEndpoint -> DEBU 5063 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.606 UTC [gossip.comm] sendToEndpoint -> DEBU 5064 Exiting" +"2019-04-22 06:18:21.615 UTC [gossip.comm] func1 -> DEBU 5065 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.615 UTC [gossip.gossip] handleMessage -> DEBU 5066 Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.615 UTC [gossip.gossip] handleMessage -> DEBU 5067 Exiting" +"2019-04-22 06:18:21.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5068 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer1.org2.example.com:7051 PKI-id:863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bdIdentity:Timestamp:inc_num:1555913791637475800 seq_num:69 , Envelope: 83 bytes, Signature: 70 bytes" +"2019-04-22 06:18:21.615 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5069 Exiting" +"2019-04-22 06:18:21.946 UTC [endorser] ProcessProposal -> DEBU 506a Entering: request from 192.168.224.9:49452" +"2019-04-22 06:18:21.946 UTC [protoutils] ValidateProposalMessage -> DEBU 506b ValidateProposalMessage starts for signed proposal 0xc0028aaaa0" +"2019-04-22 06:18:21.947 UTC [protoutils] validateChannelHeader -> DEBU 506c validateChannelHeader info: header type 3" +"2019-04-22 06:18:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 506d begin" +"2019-04-22 06:18:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 506e creator is &{Org1MSP 832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec}" +"2019-04-22 06:18:21.947 UTC [protoutils] checkSignatureFromCreator -> DEBU 506f creator is valid" +"2019-04-22 06:18:21.947 UTC [msp.identity] Verify -> DEBU 5070 Verify: digest = 00000000 28 9c 6b f7 87 8c d8 7e af b0 20 dc 2c 1a 67 d6 |(.k....~.. .,.g.| +00000010 dd f4 d3 69 30 65 b6 7b f1 a5 9a 00 10 97 81 f9 |...i0e.{........|" +"2019-04-22 06:18:21.948 UTC [msp.identity] Verify -> DEBU 5071 Verify: sig = 00000000 30 44 02 20 02 4a 9e 01 37 bd 96 3e 8a 1e ca 6a |0D. .J..7..>...j| +00000010 4b 4d 92 54 a4 f6 9c 03 4b 54 f5 ce b3 b3 19 95 |KM.T....KT......| +00000020 fc 88 17 90 02 20 46 f7 0f 58 9f 10 c8 2d cd b5 |..... F..X...-..| +00000030 ee ba 3a 1e f5 d9 b7 c9 3b 24 f9 23 f8 4d e9 55 |..:.....;$.#.M.U| +00000040 be 02 dd b4 30 bc |....0.|" +"2019-04-22 06:18:21.949 UTC [protoutils] checkSignatureFromCreator -> DEBU 5072 exits successfully" +"2019-04-22 06:18:21.950 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5073 validateChaincodeProposalMessage starts for proposal 0xc00289a700, header 0xc0028aaeb0" +"2019-04-22 06:18:21.950 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 5074 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-04-22 06:18:21.950 UTC [endorser] preProcess -> DEBU 5075 [][cc3ea70d] processing txid: cc3ea70dc71aefa20425ee57f935225230a145c14a8a566d693b68757d56856b" +"2019-04-22 06:18:21.951 UTC [endorser] SimulateProposal -> DEBU 5076 [][cc3ea70d] Entry chaincode: name:"qscc" " +"2019-04-22 06:18:21.951 UTC [endorser] callChaincode -> INFO 5077 [][cc3ea70d] Entry chaincode: name:"qscc" " +"2019-04-22 06:18:21.951 UTC [chaincode] Execute -> DEBU 5078 Entry" +"2019-04-22 06:18:21.952 UTC [qscc] Invoke -> DEBU 5079 Invoke function: GetChainInfo on chain: businesschannel" +"2019-04-22 06:18:21.952 UTC [aclmgmt] CheckACL -> DEBU 507a acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-04-22 06:18:21.952 UTC [aclmgmt] CheckACL -> DEBU 507b acl check(/Channel/Application/Readers)" +"2019-04-22 06:18:21.952 UTC [policies] Evaluate -> DEBU 507c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:21.953 UTC [policies] Evaluate -> DEBU 507d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:21.953 UTC [policies] Evaluate -> DEBU 507e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:21.954 UTC [msp] DeserializeIdentity -> DEBU 507f Obtaining identity" +"2019-04-22 06:18:21.954 UTC [msp.identity] newIdentity -> DEBU 5080 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAKixOXktoa5d3yJ827u6nEwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwNDAxMDgxNDAwWhcNMjkwMzI5MDgxNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZBZG1pbkBv +cmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEoDsQsd/e +gesGCg8BWqWyhKQzt9OqJHTP5A3FlqQNzyXrHyLoN4nNBcvnjHFyWrj4LnQ/+NNZ +l85p25lq+9VqmKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga7tLPDZWsxCrvOoeklCzGPgl/ar7aQ5NyyB/5ctC+NgwCgYIKoZI +zj0EAwIDSAAwRQIhAJm1Dj9mLiBn0TNQByw7Beji/XxWeS5npWnoCU0m7cY5AiBF +1j899h/sKmIEV2v4xT8Rz6cM/c55/HRLDgrpjhNtVg== +-----END CERTIFICATE-----" +"2019-04-22 06:18:21.955 UTC [cauthdsl] func1 -> DEBU 5081 0xc00402ccb0 gate 1555913901954983700 evaluation starts" +"2019-04-22 06:18:21.955 UTC [cauthdsl] func2 -> DEBU 5082 0xc00402ccb0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:21.955 UTC [cauthdsl] func2 -> DEBU 5083 0xc00402ccb0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:21.955 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 5084 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-04-22 06:18:21.955 UTC [msp] Validate -> DEBU 5085 MSP Org1MSP validating identity" +"2019-04-22 06:18:21.956 UTC [msp] getCertificationChain -> DEBU 5086 MSP Org1MSP getting certification chain" +"2019-04-22 06:18:21.956 UTC [cauthdsl] func2 -> DEBU 5087 0xc00402ccb0 principal matched by identity 0" +"2019-04-22 06:18:21.956 UTC [msp.identity] Verify -> DEBU 5088 Verify: digest = 00000000 28 9c 6b f7 87 8c d8 7e af b0 20 dc 2c 1a 67 d6 |(.k....~.. .,.g.| +00000010 dd f4 d3 69 30 65 b6 7b f1 a5 9a 00 10 97 81 f9 |...i0e.{........|" +"2019-04-22 06:18:21.957 UTC [msp.identity] Verify -> DEBU 5089 Verify: sig = 00000000 30 44 02 20 02 4a 9e 01 37 bd 96 3e 8a 1e ca 6a |0D. .J..7..>...j| +00000010 4b 4d 92 54 a4 f6 9c 03 4b 54 f5 ce b3 b3 19 95 |KM.T....KT......| +00000020 fc 88 17 90 02 20 46 f7 0f 58 9f 10 c8 2d cd b5 |..... F..X...-..| +00000030 ee ba 3a 1e f5 d9 b7 c9 3b 24 f9 23 f8 4d e9 55 |..:.....;$.#.M.U| +00000040 be 02 dd b4 30 bc |....0.|" +"2019-04-22 06:18:21.957 UTC [cauthdsl] func2 -> DEBU 508a 0xc00402ccb0 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:21.957 UTC [cauthdsl] func1 -> DEBU 508b 0xc00402ccb0 gate 1555913901954983700 evaluation succeeds" +"2019-04-22 06:18:21.957 UTC [policies] Evaluate -> DEBU 508c Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:21.958 UTC [policies] Evaluate -> DEBU 508d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:21.958 UTC [policies] Evaluate -> DEBU 508e Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:21.958 UTC [policies] Evaluate -> DEBU 508f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:21.958 UTC [chaincode] handleMessage -> DEBU 5090 [cc3ea70d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-04-22 06:18:21.959 UTC [chaincode] Notify -> DEBU 5091 [cc3ea70d] notifying Txid:cc3ea70dc71aefa20425ee57f935225230a145c14a8a566d693b68757d56856b, channelID:" +"2019-04-22 06:18:21.960 UTC [chaincode] Execute -> DEBU 5092 Exit" +"2019-04-22 06:18:21.961 UTC [endorser] callChaincode -> INFO 5093 [][cc3ea70d] Exit chaincode: name:"qscc" (9ms)" +"2019-04-22 06:18:21.961 UTC [endorser] SimulateProposal -> DEBU 5094 [][cc3ea70d] Exit" +"2019-04-22 06:18:21.962 UTC [endorser] func1 -> DEBU 5095 Exit: request from 192.168.224.9:49452" +"2019-04-22 06:18:21.962 UTC [comm.grpc.server] 1 -> INFO 5096 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.9:49452 grpc.code=OK grpc.call_duration=16.2453ms +"2019-04-22 06:18:21.967 UTC [grpc] warningf -> DEBU 5097 transport: http2Server.HandleStreams failed to read frame: read tcp 192.168.224.6:7051->192.168.224.9:49452: read: connection reset by peer" +"2019-04-22 06:18:21.968 UTC [grpc] infof -> DEBU 5098 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-04-22 06:18:21.996 UTC [gossip.comm] func1 -> DEBU 5099 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.999 UTC [gossip.gossip] handleMessage -> DEBU 509a Entering, 192.168.224.8:7051 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:21.999 UTC [gossip.gossip] handleMessage -> DEBU 509b Exiting" +"2019-04-22 06:18:22.000 UTC [gossip.discovery] handleMsgFromComm -> DEBU 509c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.000 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 509d Fetched identity of Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 from identity store" +"2019-04-22 06:18:22.000 UTC [msp] DeserializeIdentity -> DEBU 509e Obtaining identity" +"2019-04-22 06:18:22.001 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 509f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 63 33 55 7a 6f 39 49 58 34 6b 6f 61 32 4e 4a 2b 69 41 36 50 7a 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 30 4d 44 45 77 4f 44 45 30 4d 44 42 61 46 77 30 79 4f 54 41 7a 4d 6a 6b 77 4f 44 45 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 75 64 64 34 2b 69 47 38 30 7a 6f 65 0a 77 74 78 59 53 4a 7a 73 42 67 44 75 30 54 7a 58 6c 4b 62 57 37 62 68 36 41 48 31 6f 4f 5a 6a 45 43 58 2f 5a 6f 32 63 67 34 6e 65 79 6f 4a 66 37 4d 64 42 51 71 4a 67 6c 6b 50 72 66 6d 54 32 63 0a 55 46 33 6d 52 64 46 48 32 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 66 42 6e 4b 63 46 61 44 45 2f 6e 62 4c 4b 46 69 64 6c 66 59 67 43 4e 4d 65 59 78 53 7a 34 48 2f 48 34 44 59 69 6d 61 71 34 65 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 53 61 49 6c 30 73 33 6c 30 4c 33 31 6c 42 45 70 53 58 43 61 4d 4f 79 36 67 44 7a 77 58 32 61 65 4f 68 58 54 30 37 67 34 68 4a 67 43 49 45 71 4b 2f 67 58 49 0a 37 73 49 38 2b 6e 59 71 37 32 6c 74 4c 6e 42 6f 66 57 52 52 38 35 34 74 6a 4c 4f 56 70 4d 54 42 5a 33 6b 4c 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-04-22 06:18:22.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:22.001 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 50a1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-04-22 06:18:22.002 UTC [policies] Evaluate -> DEBU 50a2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-04-22 06:18:22.002 UTC [policies] Evaluate -> DEBU 50a3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-04-22 06:18:22.002 UTC [policies] Evaluate -> DEBU 50a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-04-22 06:18:22.002 UTC [cauthdsl] func1 -> DEBU 50a5 0xc0040430d0 gate 1555913902002733100 evaluation starts" +"2019-04-22 06:18:22.002 UTC [cauthdsl] func2 -> DEBU 50a6 0xc0040430d0 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:22.004 UTC [cauthdsl] func2 -> DEBU 50a7 0xc0040430d0 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:22.004 UTC [cauthdsl] func2 -> DEBU 50a8 0xc0040430d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-04-22 06:18:22.004 UTC [cauthdsl] func2 -> DEBU 50a9 0xc0040430d0 principal evaluation fails" +"2019-04-22 06:18:22.005 UTC [cauthdsl] func1 -> DEBU 50aa 0xc0040430d0 gate 1555913902002733100 evaluation fails" +"2019-04-22 06:18:22.006 UTC [gossip.comm] func1 -> DEBU 50ab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.006 UTC [gossip.gossip] handleMessage -> DEBU 50ac Entering, 192.168.224.5:7051 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.007 UTC [gossip.comm] func1 -> DEBU 50ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.005 UTC [policies] Evaluate -> DEBU 50ae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:22.007 UTC [policies] Evaluate -> DEBU 50af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-04-22 06:18:22.008 UTC [policies] Evaluate -> DEBU 50b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-04-22 06:18:22.008 UTC [cauthdsl] func1 -> DEBU 50b1 0xc004043910 gate 1555913902008211700 evaluation starts" +"2019-04-22 06:18:22.009 UTC [cauthdsl] func2 -> DEBU 50b2 0xc004043910 signed by 0 principal evaluation starts (used [false])" +"2019-04-22 06:18:22.009 UTC [cauthdsl] func2 -> DEBU 50b3 0xc004043910 processing identity 0 with bytes of 10c48e0" +"2019-04-22 06:18:22.011 UTC [cauthdsl] func2 -> DEBU 50b4 0xc004043910 principal matched by identity 0" +"2019-04-22 06:18:22.011 UTC [msp.identity] Verify -> DEBU 50b5 Verify: digest = 00000000 fc c8 0f 8a 3e ba b8 5f 53 07 b4 db b6 c2 ca 7c |....>.._S......|| +00000010 6a d6 9f a7 83 a2 81 59 f6 21 a4 ab b0 f3 11 2e |j......Y.!......|" +"2019-04-22 06:18:22.012 UTC [msp.identity] Verify -> DEBU 50b6 Verify: sig = 00000000 30 45 02 21 00 b5 aa 2b 11 fb c2 ed 1c 4e 1f 7b |0E.!...+.....N.{| +00000010 76 47 49 b5 7f c5 f8 a5 96 07 9f 1d 14 d2 5b 19 |vGI...........[.| +00000020 95 7e 64 cc 6e 02 20 33 5f 22 cb 1b 5b 61 f5 61 |.~d.n. 3_"..[a.a| +00000030 a3 af 33 6a c5 65 87 5e b3 65 ac e6 a3 9a b7 f3 |..3j.e.^.e......| +00000040 f6 c3 92 d3 cf ae db |.......|" +"2019-04-22 06:18:22.013 UTC [cauthdsl] func2 -> DEBU 50b7 0xc004043910 principal evaluation succeeds for identity 0" +"2019-04-22 06:18:22.013 UTC [cauthdsl] func1 -> DEBU 50b8 0xc004043910 gate 1555913902008211700 evaluation succeeds" +"2019-04-22 06:18:22.013 UTC [policies] Evaluate -> DEBU 50b9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:22.014 UTC [policies] Evaluate -> DEBU 50ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-04-22 06:18:22.014 UTC [policies] Evaluate -> DEBU 50bb Signature set satisfies policy /Channel/Application/Readers" +"2019-04-22 06:18:22.015 UTC [policies] Evaluate -> DEBU 50bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-04-22 06:18:22.015 UTC [gossip.discovery] handleAliveMessage -> DEBU 50bd Entering GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.016 UTC [gossip.discovery] learnExistingMembers -> DEBU 50be Entering: learnedMembers={[GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-04-22 06:18:22.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 50bf updating Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 " +"2019-04-22 06:18:22.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 50c0 Updating aliveness data: Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 " +"2019-04-22 06:18:22.017 UTC [gossip.discovery] learnExistingMembers -> DEBU 50c1 Replacing GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:64 , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-04-22 06:18:22.018 UTC [gossip.discovery] learnExistingMembers -> DEBU 50c2 Exiting" +"2019-04-22 06:18:22.022 UTC [gossip.discovery] handleAliveMessage -> DEBU 50c3 Exiting" +"2019-04-22 06:18:22.022 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50c4 Exiting" +"2019-04-22 06:18:22.022 UTC [gossip.gossip] handleMessage -> DEBU 50c5 Exiting" +"2019-04-22 06:18:22.023 UTC [gossip.gossip] handleMessage -> DEBU 50c6 Entering, 192.168.224.7:7051 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50c7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.023 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50c8 Exiting" +"2019-04-22 06:18:22.023 UTC [gossip.gossip] handleMessage -> DEBU 50c9 Exiting" +"2019-04-22 06:18:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.024 UTC [gossip.discovery] handleMsgFromComm -> DEBU 50cb Exiting" +"2019-04-22 06:18:22.028 UTC [msp] DeserializeIdentity -> DEBU 50cc Obtaining identity" +"2019-04-22 06:18:22.028 UTC [msp] DeserializeIdentity -> DEBU 50cd Obtaining identity" +"2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50ce Obtaining identity" +"2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50cf Obtaining identity" +"2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50d0 Obtaining identity" +"2019-04-22 06:18:22.029 UTC [msp] DeserializeIdentity -> DEBU 50d1 Obtaining identity" +"2019-04-22 06:18:22.030 UTC [msp] DeserializeIdentity -> DEBU 50d2 Obtaining identity" +"2019-04-22 06:18:22.030 UTC [gossip.comm] Send -> DEBU 50d3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:22.030 UTC [msp] DeserializeIdentity -> DEBU 50d4 Obtaining identity" +"2019-04-22 06:18:22.030 UTC [gossip.comm] Send -> DEBU 50d5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d7 Exiting" +"2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY Alive Message:Membership: Endpoint:peer0.org2.example.com:7051 PKI-id:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030Identity:Timestamp:inc_num:1555913792051021500 seq_num:65 , Envelope: 83 bytes, Signature: 71 bytes" +"2019-04-22 06:18:22.031 UTC [gossip.comm] sendToEndpoint -> DEBU 50d9 Exiting" diff --git a/hyperledger_fabric/latest/scripts/func.sh b/hyperledger_fabric/latest/scripts/func.sh index 4521ac5b..52216fa6 100644 --- a/hyperledger_fabric/latest/scripts/func.sh +++ b/hyperledger_fabric/latest/scripts/func.sh @@ -221,13 +221,13 @@ channelGetInfo () { local channel=$1 local org=$2 local peer=$3 - echo "=== Get channel info of ${channel} with id of org${org}/peer${peer} === " + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " setEnvs $org $peer peer channel getinfo -c ${channel} >&log.txt rc=$? - [ $rc -ne 0 ] && cat log.txt + cat log.txt if [ $rc -ne 0 ]; then echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " else @@ -407,7 +407,7 @@ chaincodeInstall () { # chaincodeApprove channel org peer name version chaincodeApprove () { if [ "$#" -ne 7 -a "$#" -ne 9 ]; then - echo_r "Wrong param number for chaincode approval" + echo_r "Wrong param number for chaincode approve" exit -1 fi local org=$1 @@ -465,6 +465,30 @@ chaincodeApprove () { --cafile ${ORDERER_TLS_CA} >&log.txt fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is approved on remote peer$peer === " +} + +# Query the Approve the chaincode definition +# chaincodeQueryApprove channel org peer name version +chaincodeQueryApprove () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode queryapproval" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + local version=$7 + + setEnvs $org $peer + + echo "Query the approval status of the chaincode $name $version" peer lifecycle chaincode queryapprovalstatus \ --peerAddresses ${peer_url} \ --tlsRootCertFiles ${peer_tls_root_cert} \ @@ -473,15 +497,14 @@ chaincodeApprove () { --version ${version} rc=$? [ $rc -ne 0 ] && cat log.txt - verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" - echo "=== Chaincode is approved on remote peer$peer === " + verifyResult $rc "ChaincodeQueryApproval Failed: org ${org}/peer$peer" } # Anyone can commit the chaincode definition once it's approved by major # chaincodeCommit org peer channel orderer name version [collection-config] [endorse-policy] chaincodeCommit () { if [ "$#" -ne 6 -a "$#" -ne 8 ]; then - echo_r "Wrong param number for chaincode approval" + echo_r "Wrong param number for chaincode commit" exit -1 fi local org=$1 @@ -506,8 +529,8 @@ chaincodeCommit () { peer lifecycle chaincode queryinstalled >&query.log #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log) - echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" + echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then peer lifecycle chaincode commit \ @@ -546,17 +569,40 @@ chaincodeCommit () { [ $rc -ne 0 ] && cat log.txt verifyResult $rc "Chaincode Commit on remote org ${org}/peer$peer has Failed" echo "=== Chaincode is committed on channel $channel === " +} +# Query the Commit the chaincode definition +# chaincodeQueryCommit channel org peer name version +chaincodeQueryCommit () { + if [ "$#" -ne 6 ]; then + echo_r "Wrong param number for chaincode querycommit" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + + setEnvs $org $peer + + echo "Query the committed status of chaincode $name with ${ORG1_PEER0_URL} " peer lifecycle chaincode querycommitted \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ --channelID ${channel} \ --name ${name} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryCommit Failed: org ${org}/peer$peer" } # Instantiate chaincode on specifized peer node # chaincodeInstantiate channel org peer name version args chaincodeInstantiate () { - if [ "$#" -gt 8 -a "$#" -lt 6 ]; then + if [ "$#" -gt 8 -a "$#" -lt 6 ]; then echo_r "Wrong param number for chaincode instantaite" exit -1 fi @@ -614,6 +660,10 @@ chaincodeInstantiate () { # Invoke the Init func of chaincode to start the container # Usage: chaincodeInit org peer channel orderer name args peer_url peer_org_tlsca chaincodeInit () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Init" + exit -1 + fi local org=$1 local peer=$2 local channel=$3 @@ -654,20 +704,24 @@ chaincodeInit () { fi rc=$? [ $rc -ne 0 ] && cat log.txt - verifyResult $rc "Invoke execution on peer$peer failed " - echo "=== Invoke transaction on peer$peer in channel ${channel} is successful === " + verifyResult $rc "Chaincode Init failed: peer$peer in channel ${channel}" + echo "=== Chaincode Init done: peer$peer in channel ${channel} === " } # Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca chaincodeInvoke () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Invoke" + exit -1 + fi local org=$1 local peer=$2 - local channel=$3 - local orderer=$4 - local name=$5 - local args=$6 - local peer_url=$7 - local peer_org_tlsca=$8 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local orderer=$6 + local name=$7 + local args=$8 [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " @@ -704,32 +758,47 @@ chaincodeInvoke () { # query org peer channel name args expected_result chaincodeQuery () { + if [ "$#" -ne 7 -a "$#" -ne 8 ]; then + echo_r "Wrong param number $# for chaincode Query" + echo $* + exit -1 + fi local org=$1 local peer=$2 - local channel=$3 - local name=$4 - local args=$5 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local name=$6 + local args=$7 + local expected_result="" + + [ $# -eq 8 ] && local expected_result=$8 + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 - [ $# -gt 5 ] && local expected_result=$6 + echo "=== chaincodeQuery to org $org/peer $peer === " - echo "channel=${channel}, name=${name}, args=${args}" + echo "channel=${channel}, name=${name}, args=${args}, expected_result=${expected_result}" local rc=1 local starttime=$(date +%s) setEnvs $org $peer + # we either get a successful response, or reach TIMEOUT while [ "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 ]; do echo "Attempting to Query org ${org}/peer ${peer} ...$(($(date +%s)-starttime)) secs" peer chaincode query \ -C "${channel}" \ -n "${name}" \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ -c "${args}" \ >&log.txt rc=$? - if [ $# -gt 5 ]; then # need to check the result + if [ -n "${expected_result}" ]; then # need to check the result test $? -eq 0 && VALUE=$(cat log.txt | awk 'END {print $NF}') if [ "$VALUE" = "${expected_result}" ]; then let rc=0 + echo_b "$VALUE == ${expected_result}, passed" else let rc=1 echo_b "$VALUE != ${expected_result}, will retry" @@ -743,9 +812,9 @@ chaincodeQuery () { # rc==0, or timeout if [ $rc -eq 0 ]; then - echo "=== Query on org $org/peer$peer in channel ${channel} is successful === " + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " else - echo_r "=== Query on org $org/peer$peer is INVALID, run `make stop clean` to clean ===" + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" exit 1 fi } diff --git a/hyperledger_fabric/latest/scripts/gen_config_channel.sh b/hyperledger_fabric/latest/scripts/gen_config_channel.sh index 70fc5f38..797f6e40 100644 --- a/hyperledger_fabric/latest/scripts/gen_config_channel.sh +++ b/hyperledger_fabric/latest/scripts/gen_config_channel.sh @@ -22,10 +22,10 @@ echo_b "Generating channel artifacts with ${GEN_IMG} in mode ${MODE}" [ ! -d ${MODE}/${CHANNEL_ARTIFACTS} ] && mkdir -p ${MODE}/${CHANNEL_ARTIFACTS} echo_b "Make sure channel-artifacts dir exists already" -#if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then -# echo_b "${CHANNEL_ARTIFACTS} exists, ignore." -# exit 0 -#fi +if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then + echo_b "${CHANNEL_ARTIFACTS} exists, ignore." + exit 0 +fi echo_g "Generating ${CHANNEL_ARTIFACTS}..." docker run \ diff --git a/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh index aed81c48..e3806be7 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_invoke_query.sh @@ -18,24 +18,26 @@ echo_b "=== Testing Chaincode invoke/query ===" echo_b "Init chaincode by org1/peer0..." chaincodeInit 1 0 ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INIT_ARGS} "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" +sleep 5 # wait for chaincode is up + # Non-side-DB testing echo_b "Query chaincode ${CC_NAME} on peer org1/peer0..." -chaincodeQuery 1 0 ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 #Invoke on chaincode on Peer0/Org1 echo_b "Invoke transaction (transfer 10) by org1/peer0..." -chaincodeInvoke 1 0 ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} #Query on chaincode on Peer1/Org2, check if the result is 90 echo_b "Query chaincode on org2/peer1..." -chaincodeQuery 2 1 ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 #Invoke on chaincode on Peer1/Org2 echo_b "Send invoke transaction on org2/peer1..." -chaincodeInvoke 2 1 ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} "${ORG2_PEER1_URL}" "${ORG2_PEER1_TLS_ROOTCERT}" +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} #Query on chaincode on Peer1/Org2, check if the result is 80 echo_b "Query chaincode on org1/peer0 4peers..." -chaincodeQuery 1 0 ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 echo_g "=== Chaincode invoke/query done ===" diff --git a/hyperledger_fabric/latest/scripts/test_cc_peer0.sh b/hyperledger_fabric/latest/scripts/test_cc_peer0.sh index 3bf21027..b9064612 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_peer0.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_peer0.sh @@ -14,17 +14,17 @@ CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} echo_b "Channel name: "${APP_CHANNEL} echo_b "Query the existing value of a" -chaincodeQuery ${APP_CHANNEL} 0 ${CC_NAME} ${CC_QUERY_ARGS} 100 +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 sleep 1 echo_b "Invoke a transaction to transfer 10 from a to b" -chaincodeInvoke ${APP_CHANNEL} 0 ${CC_NAME} ${CC_INVOKE_ARGS} +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} sleep 1 echo_b "Check if the result of a is 90" -chaincodeQuery ${APP_CHANNEL} 0 ${CC_NAME} ${CC_QUERY_ARGS} 90 +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 echo echo_g "All GOOD, MVE Test completed" diff --git a/hyperledger_fabric/latest/scripts/test_cc_queryapprove.sh b/hyperledger_fabric/latest/scripts/test_cc_queryapprove.sh new file mode 100644 index 00000000..d032a96e --- /dev/null +++ b/hyperledger_fabric/latest/scripts/test_cc_queryapprove.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode approve status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Query Chaincode approve status done ===" + +echo diff --git a/hyperledger_fabric/latest/scripts/test_cc_querycommit.sh b/hyperledger_fabric/latest/scripts/test_cc_querycommit.sh new file mode 100644 index 00000000..766c4b93 --- /dev/null +++ b/hyperledger_fabric/latest/scripts/test_cc_querycommit.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode commit status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryCommit "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} +done + +echo_g "=== Query Chaincode commit status done ===" + +echo diff --git a/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh b/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh index 0a61bdb1..3f26c90c 100644 --- a/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh +++ b/hyperledger_fabric/latest/scripts/test_cc_upgrade.sh @@ -24,8 +24,8 @@ chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" chaincodeUpgrade ${APP_CHANNEL} 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" # Query new value, should refresh through all peers in the channel -chaincodeQuery ${APP_CHANNEL} 1 0 "${CC_NAME}" "${CC_QUERY_ARGS}" 100 -chaincodeQuery ${APP_CHANNEL} 2 1 "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 echo_g "=== chaincode ${CC_NAME} Upgrade completed ===" diff --git a/hyperledger_fabric/latest/scripts/test_cscc.sh b/hyperledger_fabric/latest/scripts/test_cscc.sh index 3835237c..18e94b17 100644 --- a/hyperledger_fabric/latest/scripts/test_cscc.sh +++ b/hyperledger_fabric/latest/scripts/test_cscc.sh @@ -20,13 +20,13 @@ peer=0 # -c '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' echo_b "CSCC GetConfigBlock" -chaincodeQuery ${APP_CHANNEL} $org $peer cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' echo_b "CSCC GetChannels" -chaincodeQuery ${APP_CHANNEL} $org $peer cscc '{"Args":["GetChannels"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetChannels"]}' echo_b "CSCC GetConfigTree" -chaincodeQuery ${APP_CHANNEL} $org $peer cscc '{"Args":["GetConfigTree","'${APP_CHANNEL}'"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigTree","'${APP_CHANNEL}'"]}' echo_g "CSCC testing done!" diff --git a/hyperledger_fabric/latest/scripts/test_lscc.sh b/hyperledger_fabric/latest/scripts/test_lscc.sh index f2c2752f..7a434190 100644 --- a/hyperledger_fabric/latest/scripts/test_lscc.sh +++ b/hyperledger_fabric/latest/scripts/test_lscc.sh @@ -22,19 +22,19 @@ peer=0 CC_NAME=${CC_02_NAME} echo_b "LSCC Get id" -chaincodeQuery "${APP_CHANNEL}" $org $peer lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' +chaincodeQuery "$org" "$peer" "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' echo_b "LSCC Get cc ChaincodeDeploymentSpec" -chaincodeQuery "${APP_CHANNEL}" $org $peer lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' echo_b "LSCC Get cc bytes" -chaincodeQuery "${APP_CHANNEL}" $org $peer lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' -echo_b "LSCC Get all chaincodes installed on the peer" -chaincodeQuery "${APP_CHANNEL}" $org $peer lscc '{"Args":["getinstalledchaincodes"]}' +echo_b "LSCC Get all chaincodes (with all versions) installed on the peer" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getinstalledchaincodes"]}' echo_b "LSCC Get all chaincodes instantiated on the channel" -chaincodeQuery "${APP_CHANNEL}" $org $peer lscc '{"Args":["getchaincodes"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getchaincodes"]}' #peer chaincode query \ diff --git a/hyperledger_fabric/latest/scripts/test_qscc.sh b/hyperledger_fabric/latest/scripts/test_qscc.sh index e1e3e0b0..bd127457 100644 --- a/hyperledger_fabric/latest/scripts/test_qscc.sh +++ b/hyperledger_fabric/latest/scripts/test_qscc.sh @@ -20,7 +20,7 @@ peer=0 # -c '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' echo_b "QSCC GetChainInfo" -chaincodeQuery ${APP_CHANNEL} $org $peer qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' #peer chaincode query \ # -C "" \ @@ -28,7 +28,7 @@ chaincodeQuery ${APP_CHANNEL} $org $peer qscc '{"Args":["GetChainInfo","'${APP_C # -c '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' echo_b "QSCC GetBlockByNumber 2" -chaincodeQuery ${APP_CHANNEL} $org $peer qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' echo_g "QSCC testing done!" diff --git a/hyperledger_fabric/latest/scripts/test_sideDB.sh b/hyperledger_fabric/latest/scripts/test_sideDB.sh index 1c02cd36..d2339ab7 100644 --- a/hyperledger_fabric/latest/scripts/test_sideDB.sh +++ b/hyperledger_fabric/latest/scripts/test_sideDB.sh @@ -33,17 +33,17 @@ sleep 2 # both org1 and org2 can invoke, but gossip is the problem to cross org echo_b "Invoke chaincode with collection on org1/peer0" -chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} echo_g "=== Invoke chaincode done ===" # both org1 and org2 can do normal read echo_b "Query chaincode with collection collectionMarbles on org1/peer1" -chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +chaincodeQuery 2 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} echo_g "=== Query read chaincode done ===" # only org1 can do detailed read echo_b "Query chaincode with collection collectionMarblePrivateDetails on org1/peer1" -chaincodeQuery ${APP_CHANNEL} 1 1 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} echo_g "=== Query read details chaincode done ===" echo_b "Install chaincode with new collection config" @@ -61,12 +61,12 @@ chaincodeUpgrade ${APP_CHANNEL} 1 0 ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_A echo_g "Update chaincode with new collection on org1/peer0 done" echo_b "Invoke chaincode with new key and new collection on org1/peer0" -chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} echo_g "=== Invoke chaincode done ===" # now both org1 and org2 should be able to readpvtdetails of new data, noticed the read of old data is available since v1.3.0 echo_b "Query chaincode with new key and new collection collectionMarblePrivateDetails on org1/peer1" -chaincodeQuery ${APP_CHANNEL} 1 1 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} echo_g "=== Query read details chaincode done ===" echo_g "=== Testing the private data feature done ===" diff --git a/hyperledger_fabric/latest/scripts/test_temp.sh b/hyperledger_fabric/latest/scripts/test_temp.sh index d81c4c17..38b8ede8 100644 --- a/hyperledger_fabric/latest/scripts/test_temp.sh +++ b/hyperledger_fabric/latest/scripts/test_temp.sh @@ -18,25 +18,6 @@ fi #chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} #chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} -chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} exit - -chaincodeQuery ${APP_CHANNEL} 2 1 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} - -exit - -chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_NAME} ${CC_INVOKE_ARGS} - -exit -#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_NAME} ${CC_INVOKE_ARGS} - -chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} - -# both org1 and org2 can do normal read -#chaincodeQuery ${APP_CHANNEL} 1 1 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} - -# only org1 can do detailed read -#chaincodeQuery ${APP_CHANNEL} 1 1 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} - -echo \ No newline at end of file diff --git a/hyperledger_fabric/latest/solo/configtx.yaml b/hyperledger_fabric/latest/solo/configtx.yaml index fb5cdbf0..6f32421d 100644 --- a/hyperledger_fabric/latest/solo/configtx.yaml +++ b/hyperledger_fabric/latest/solo/configtx.yaml @@ -242,7 +242,8 @@ Capabilities: # prior releases. # Prior to enabling V1.3 channel capabilities, ensure that all # orderers and peers on a channel are at v1.3.0 or later. - V1_3: true + V2_0: true + V1_3: false # Orderer capabilities apply only to the orderers, and may be safely # used with prior release peers. @@ -253,7 +254,8 @@ Capabilities: # level, but which would be incompatible with orderers from prior releases. # Prior to enabling V1.1 orderer capabilities, ensure that all # orderers on a channel are at v1.1.0 or later. - V1_1: true + V2_0: true + V1_1: false # Application capabilities apply only to the peer network, and may be safely # used with prior release orderers. @@ -261,7 +263,8 @@ Capabilities: Application: &ApplicationCapabilities # V1.3 for Application enables the new non-backwards compatible # features and fixes of fabric v1.3. - V1_3: true + V2_0: true + V1_3: false # V1.2 for Application enables the new non-backwards compatible # features and fixes of fabric v1.2 (note, this need not be set if # later version capabilities are set) diff --git a/hyperledger_fabric/v1.3.0/scripts/func.sh b/hyperledger_fabric/v1.3.0/scripts/func.sh index 7e44457b..d083b7da 100644 --- a/hyperledger_fabric/v1.3.0/scripts/func.sh +++ b/hyperledger_fabric/v1.3.0/scripts/func.sh @@ -515,6 +515,7 @@ chaincodeQuery () { sleep 2 fi done + cat log.txt # rc==0, or timeout if [ $rc -eq 0 ]; then diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_0.block index d7f31640116183752ff67b3f54487a3107fa0728..38d5089fee4c11ef461fc6d616ad93c0f173b552 100644 GIT binary patch delta 519 zcmV+i0{H#Pd&+w|3L+XH@8Gd-EIbq}$`y|BNq|deYDu78x$z>gQPa>ME-q)V5}A7n zmU{}ydJ5783L6Lk8U_gF#_#2m;WQJmP8lch0flWs9K0V(PX>N0~jRWlvlPxAGlQ0z>lX(=4vrQG{5tAJ`M3a3qB$He-gp(IC8k6cc3zIQ4 zD3jkaER$I@brYu%3fvG1^9BkV2m%@g2Waxs5gsbDNjQZBf7(_byP`PKdVC}1=-%Mdg{Unq+I|9{auP={MFJrJ-H!+ad1zdB z6EPbh0=rOG7;6KPT47oJt_sbZ`Z5my0w8>sq>AGBKUl}HB&-9ZsTjEU04+mUxYg9u zgJm=#BS#WOFhl|%X25GfeXw3Dlv35Zci)GG%F)!G?&0GqePMm}Z4-)o#sVO4^^4wm zK~7kTgj9Rit7TwDdqv*17;CqW7f2#Zk?unhM=(VKApobdXhn)k5Sn8z_f7H%{aTF` zPjacn-pvN{7vuh2cX0wBC(BD9qnFKOA%~f-tr27^2n~(4XNT+iZtJuT(4a!78VCvi J3IGZK3INs$)8POB delta 501 zcmVkny;Ci~`c&^jq7cB{ z67zEk#bO8n62M}!PY>-7lQuFWlcykPlkPDplVu5DN1K z3L6Ll8U_gY{^#Jc;WSVK7{EbPfxx(}N5@AB!$bzo0>&#|7Kz zkX0vuVr*$jAfjQBOwk>wb*p?5M=(VKApqX$?QE|77tpBB@`$W73#|HmqgE32NR{U) zf8zsN1l9r|2a=Eha|vt`j>ZXk=d8@Gu(GhKu4u#ZHRCXd!7`>W5=Ssa0wDmA!QKcF zVl5vM<+9&$^)TgHoisEFRcd`3;>|B?*%bsY0w5qZO1;#mHR*frOec&~gtnuPIZ#b+ zuX|ReTEnRDuSgO`Fhl|%K+F$R;~PPD{Le_Zrq>Jj5>fd;9{0L^Y*SPVvQ+?40w7*| rJA78uq;Ai~^tnnm&F(#Yryi=0I`z7cVqwTV*jO3}3IGZK3IGZKNMq3{ diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_1.block index c92decf7c1978dd2610e6828d76adb914ac9a3fa..0d12f73e7f760c1ac2925fad35f3983aac0e2225 100644 GIT binary patch delta 735 zcmV<50wDeRi2?bE0bdG62mulxs;KFd$A{~{iSL!(y9+f z8XytXc?DcFGgQSXNSitnRqnTUN7lPyBP4d4R)gx5R|^uHdkUF*3e9>7(gq3}2mu-f z2oa?kXD6By@DK{65DN1K3L6Ll8U_gJ#_#2`KQ&MT7{xdAa}sNQbhc2P!D_#XjOGiZ zE(^!hGqa~SPXvGKDMdqv@`WILIgHz^fVPrpxN6LG73z}`MleJIAW;)n-<;MU#vt7Y zPKiraT7Yx@x_p*lX+q1hzty)m5dt7CEqj~2lb4xKC~yQBg$%F6*9I>2Sg8>&rNOu& z7Ul;MMleJIAa#H!B)iGZ*{mCZdFN0W+!>G#KsNUx1XF+RnkEu|mh=K33S}`f%8_{3 zHo0&_a8ZzDSl@mz7XYD!D$$NJ-@Uj!5=Ssa0wDmGQN}GoM!1Zf+C>LvI01Y#4irm1 zZVPTSgP7gMW0@fWAX|5Ez#Y*~>dK;MBu!af@{hq2X^MI2J)b!LiC(*0_Zp853V;U^ z{RRrM1`4zFJsAUMuWp?z)jgB&{}OdB`; zk6(6ToQ<->++Oqgrq{7IQJLg+@7@9+TB3bzWt+e+;=su0aIfFC1^@?xelQjLA_oIx z>}+9}3WWy>0tf-K?mZv_WoG7yMLwgQ^$c~%veEad6l`WdX$-8B5fVo*MFJrJ*B8Z3 zm?&}i6t@O)05IXkICV-`bjLiMxbB5J5r6kR0w7QGo^4C9mM>_sLFe^3D(3rt{rAeN R+}!x5qq-y+pj`?83IOF?IBWm_ delta 744 zcmV_dkUI+3eI{8(gq3}2mu-f z2>t%&;IUsX10y`{?2qMfDa?%Y^-1&-FqpU@cYI55pF&IulSmIElhY1#le#l8lNU65lj}1q zlPNPPlbSOileaWTlWPwN6Y&rVr4S191_~Pp0vZMg{r>0Rvp+RZ0~ji`&nQsd9mQ^! zCSP-%@VxE}DLY=IyM?o-I8OwBZ%Jes9jLgYaV6+5?&fYC<{7hdf%59S5=JmY0w8l- zmcoSb@dw5Fvr<|npbEj2+k<&B<|~B@s1}gK_MieFJ>G2rD`I!$-O6A= zUoWC~x%$`fd<`A^5=Ssa0wDmA@flMkJ)CbOh=@Yx8czY3$`dZjq?uBG2qWLZ(R-w5 z0w8G%3h12p=Mh@YiFu(cZ$~$XkJ@lfSL?y-)Hn3?4R#VoFhv3(0J9=H>m~pr{5$DT z%QE9Stf|aXGSgXvw5C_QHZsv2U;-d0aUO?RDhBm+emRZ7PabO$(jB;@`;k=|V4?(T zF8HAuj}8if2NM1U3bF>X^F0~^XmES|qGvZX&D9$Xd_q|?6%usbcXskygAzwDMFJrJ zthph@o3Y$>7~zU|R5_s5)Guohbh0w846!1Iau6xH|KO^V&T0K!yV zhyy8sJ!otYQ~))FXiN%(2MPiR0kiErAOmCtVS>?%hnq$d?&h@ diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_2.block index 207beb51137da6f541e24bf5494256dfca03a74f..eaf4106a7f49f74b69a4cd818295be1523830df3 100644 GIT binary patch delta 716 zcmV;-0yF)ziUG8W0bdG62m%ryvLOqQLZ(N1=GTQQ=3Lop9`5*)iQrQ$yUR*WcX`Tj z8X$1OrbGZx;vc1?!8L-u3aT|`VF0M}Th@qu^04Lq1kn=LdkWNh3W$3O(gq3}2mu-f z2<*o1<*{Ec0~p?4k^X!%fsz((j-w~&MLF!482FLRuY$9t10N%k*c2&~NGDK}#3ov^ zm?v)vlRPqNlLj(1lb9zXlP)tZlddvllkqfclYlcU0Va*cEPXvD( zA)%51z~*4!@_3Br_70QottJ<)uQ>1$MleJIAW2~H0&t5pA4H`WBDZzGgy079;flMQ(_H))D%C$>mv{J_Bd5=JmY0w6=g>aV?GGvW2WBSCP@IQMq8u*#d| zErW2HKK?v|_#*-!Eh9+$MibML9GQ{8-z{PCm1ZmsVQ~IrXq1*WxD2n8v#3EQ17+iX z($8m=^H%Ekoi6#s0I62zB)8>ue>4(DFhv3(0K_wD(=b|3tqVVjV0;;A){V*ybI=L8 yb6ib~QvR2x+X5g@m#$WblKXTa<(*FGG|e28UZ$&jq&04hVqbuTLL015!nszlHL delta 733 zcmV<30wVpiiUG8W0bdG62m%ryn#SBtse>a~BGcu56XaWGDT?X-pJjg-9Ys~}PPl2h z8X!%5eu6Dc02BcLh`j<3fA*9~kmq$+KyZz`k3#0<=kgNPdkWKg3W$3O(gq3}2mu-f z2><@);IUsX0~n^Fjp!LYa55?nkz+E5%twKMs;MTTd84zY10N%kQWY(eY$q&}*Ayy~ z?j}&Pm?v)vlX5aNlLj(t0VP#h+N?gAhQWj))3AG@`wE*FgypF&$R3lFG8KHNQ? z5uxi{s{SkzM=(VKApn8IxAacP) zaOhikRabkh#kZ^ITcfqw*WG1k?DaunNt_>uh!RFHL;@gdhkiXEDVuwjv3*p_U$kCf z)cLE|824u6)+k4aHzS+^AYK`Os+mN6eVX^uNyuG_Ak$k(DdI`K!wdQePjpzin}&BKqa6_5=Ssa0wDm%VqRvy zpU=LbbXVx0fi^8#UYa&yKLLRw#Y2ZkjNWwuAY;dA+wL=#Jc?Q79#RK9qZ#U|9b7?S z?o&_RB>V{B(6gvPCj(`x)WV>omdv=vN*{7lf9K1OPQ^UcvF&;iM=(VKApn)I+?|VY zBwc;%W$Ti~{AMpGWJ~Qsb{1Kt#ORH@o)ZEfL|Z0Uty;7)cRiac{i6Cb@5H_*l`}0V=HRIIFkTcrRk2BEuQb;#X|8utTu0ftaygi#csM>C zd;gSG;6eM{1I$YNNu|Y^d8x(4$r*`xd8s*C4i+ZKh8AX4Cgw(I$>ynsX{o6ONlE5r zmdOTbX2}*NNyY|gX=&!>hN)&2md2*$7M2F)CMHG}CaFe=Nk&P@21XlqcrZ)!1>BO^ zE!Ug-ShD`=>V?5EbEll(U+8{Je6s|L3vSuTCG4{m*l+mCOq!~3qiZ7*?}iuiVjH$T zEctYxp^|ZJgv(05(;A!gIeb~`?YCKYMX?-+&%QHh9m72fk=+-R{8$8U?-R86zwF}W z&R!;k_(y?Gd6QIY*X&eU86@KLlHpeJf_fp99Y>R6A{+LkEfjJ$aAi_tc$y|6JVES4 z&3UmfXQP*u@Bi(2`Q^&b?j}8@Zq2>B&YWaYNENfa*f@9T)U}*%)xTs}=%1J!SpnisP+v+=1hCm7jD1}Ig&Gt8CQ#qozVZhlN^Osl|}6L~^z1};nr&W;N< zxZU~|!uDrv*NIsf;s>%npS?L{;RE+${I1Q5+y62t)D#-;|HT`!MX8Np@k%$XIXi2Q zI)1lMOZza()n~6*`l`)6g6hnv6HKQEm-bx!^N%A!&$lf@i2cLT@-5eXzJvPaXq2nQ z-3fc%sip_J9JCSGo`3s*v)0h;z_Ft{B50{%XGj3bS_tQoVF*^BE V*>AF)OWt^mVf7D1BQ6Fm1_1WF4m|(> delta 640 zcmbQGHAAbO%Z-CsNI|seLVntrnYm1xmwcYN|J%C6J?-AFv|gJ375umDSU#hqltSum zH+zN$6J|&JS@*PdRraCR0c~$z{MyqtBg5$K&b!aOg?3AG?U3erE5&t$ohyffS&EyZ z>;LlytO6ePC!Pbw|W%u6jUPR>Zo%S+ACaxhLcOf*eNwlp^|N;EM}Gfp*4u`o?Z zO-eIMGBY$cNJ%v@w=hUcHApf^Nj0{#OffV}F-Xa#b zX=73-X}J3P+&M3+O+RZJynkA~u;#Lk;;=nha*x6L*v|Q$nL=&`E=&p>;!3~Y#OL2K z3f8f9$p0L9WL z@qX516}VvfiOn2*YRn0{E}xqvB`G_pmRo7gF}L!n**|7(cIw(c6Jm|q>@&qDFU^q_ z`gvo*hy5nod!^K`%@u#0IA`&t`TbRS{!9vTWhQ3|F4!$-)BECbLgz2TEvqk&s<@dR z3hS{-|LeE-zPV3OojLVlX(jiy?9hX~CnJ?C%H{4&zT1CoMbfpULhc5xOo|L|y6ZMj$8nUqY5{MNI7WAs*!1||i^J9`WKj#(9d@^H~l6aSg4z%4JW UDmH=7AW`?gdC@1@Tnts`s}mS3mlE)~G>B;k&fi zOa=z=J6$ItKcyv$-Y6ED&UH7ZKsm)>YiyQ$F`rDCgefMcB5{o}*TkcY3 z0w#ip15bYLdz$^k{Os<%Z&W55<==f>GTZlnkU{qTm7Zrem-4GKr>yQ^)w&m~c_{We z-^_HQbj1&1!vEB=>lGlrQPVoX7L~cs=O?SqlC=!C-wW`xf4Q!oFQ0!qsh1^0b`O(6 q@gCtfnrnBjIJ7f-$D>ET&s><-^i8j;psurX4%^A1UUx1AE(QReW(?T? delta 668 zcmeyT+Mrg?<;KAxq;NM-HGb|lTa_tGC2bT|_Zlq8U7=l|Veh}^;>_y(Qn=`o-iu$CzTdw=A{-FCubz)<)!9mIV7hUr=}QNrI{O9n5CqqSsI!c87Em- zSf&_Q7@DUgry7~2nOG(p8(W$unps#_m?bBsrkR>q8mFbCrKTBMnwo6f>B%e`tbJ*j zT0+ajLtCyHU%zhYcI3}j2kxWYAB8&jxmq{Nv)D6B;Z(9_as|7(dJ6|v10$Eh&Y3yt zqI0IHtE}|W`19|Iv|&%E(A}{4LPt0GDIHp2G5OEQh78%LB|A0Vz^(qS{ zg_vEhR-NyAaLoDhz6X<~ghF=DnsY_iETu}WDK$-cI9(+Ou^*vuVAn6aR|ym!z5BZtV674Q#v|_K=tNaEyk+{v&&t z6!LRarF2UVJ*YEtPGI$T^)23tZSP;-PS4h=r11MH^IvT)=2vG<$&nSQxKeeN-F5S8 z$x@dBpIY^<{8POPZwR>=xG*Wy*IB9GYnyf^%SHScw_1LDHv5;@7^xF{Df#Y~oes`t sXHrmL?VY4MJF`4X=dUK;trdHBbbm=Lv%Qnj^;;ymXznU$E(R_J0A64gL;wH) diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_5.block index f944a45be66a39c5de11842c6d9c8cd5ac011141..e588fcbd5259f84867c75be96f8fd0de61889d8d 100644 GIT binary patch delta 657 zcmeyT`d77{%Z-CoNMX@x9+syDF%}nZKGCvO^adJjtUS4XBmV>!Ll8Ir8m9eRLa*CO`g|VrrQHr6Z zd5S3zr&yX=7?_w?8W~v{r6#8&8k;7W8k#00S|%A=B$`?n8ylo18gJa;$t=zf# zQDnMrzaob@UEuhFYnzX<&tb0j{c&+B^U|`l)1L4B|75dQj-rWS-!_jEKWsjpTDWVa zi#?M~C3@-C*^SZ`vu<6R7+bbYUQWo(z=cV{Z z-2CUr^h-J0__0(UA6Emr(BI9~{Bq2hdsQ2keXUk22n?7np>i-S{EF1ddE!^5UV&IA zccm%M{t++VkMnj@LvrRYCN2{U6N$|~W^MBQWdDyF%}feq)4%-)J$aySqFnFmjaNC= zoee3DebBonK}c+w`ii9=B)MAHxtKVZpw^{i+_!0n+S%N1o=GlevdzLJ_Lr7%gy z>A0Am?zV?Hw~w*L1n`^u6Ai1nc}wj`YDl26(d|&71>#(D#knqtaUEsn%H?2|;^uhv z|M>$}fd{uQ2r2O=l@@2_r4|<_XC&t3rRHckB%7NV7$q55rWu(5S;scQcpSYxPyj5!zXLhZ#(!&nH)}XrMM+@7Se6w#|Sl-2? zkb5-tcY1qU5&!nXa_V2j4X$qRUUKeSZ%5DjUz3vN^mq!n8MrVhR6KpoJ>`)7+xSJb z{-5+y7TA>PC_Qah`IGId*deKnmby#|=DeIYA3RrJo+EziLRZxX(;l^>eiMY<5C0O@ z`CWZ%n@Nt;1U{}tcA%W`KHI8_4y*AZTjKucMzqx78 z%DsmsT6$D7tv(r%cAH5d?N^}Y>em6LMvrC&O}SvO@zPo0jbD$y+1`6lVR^(x_Sswv GTnqr$)gOxh diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_6.block index d998ed83e4357a78e30ab5312e058a6a11b327f5..e2c23bf62f7b68fda8be1049da8b6ac6bb8fd123 100644 GIT binary patch delta 1831 zcmcJOeN0nV7{<9R(0cd~ua!x~SuhjD4{pB;Dhh2W1uAVREmYCn-rg2yp{0PgWts}Y zHUSl3ilRn|%9uLc#5ktR55!@ZF2j#Raj2^r1w^;$mJPwI6miM2C2q<7IJxh8@|=_B z`Q7(ix&w_wIza-}7iLUf{%$Sp^fuzk*Vh9&mh~HyZ_mJX{@``$dJrt%jML%s*#o>NsIhH95$F9Hb=mFLcy+3&^--wP=J|Aru$JlI-fr9 z3F>g|SB6j26&L2@D*a;e+gVemeCK^K>*S8M zz};zGCGp!guzR`t*L(_pKm+BpmP&mr+4+x}Ljhn51U5mS3Zg>e7t@`9QfxKaP(2R* zngGlPbKOdR*ax>;5f+`yT)?D<{HcdfKxQHcfOLS&a(`#LrNHSvL85xO7ex1iCjd&S z&B&Cc$zL}tcLTg}cPQY!dNkTc{$Ps_U|hR}gj5y>cMi9FexWR`eI)k&+2!z^YM3!) zcGIKw{*CZsZ?KyLPX}XeU>cnYAk=LNK}IVbebfW|!U=&fVn0K`Z(K`q|11~us-xc+ zuV7CikC$+dmq<^9H%Y(}0Y>9>+o04Od-&qzp!2SQ)-Yb?mESw%S?I!{ts4fj4I+^u;TtLtMGuaheY>bE?_S};1OSN%=h(h!cBGE5n;2EN`%5V zjAx7^r15b^sX``a7fKzO4u?*TTVx6G+H@UCi0bxceGggcEL3?ELI{aWky@ch5fe&6 zt5G{-N&%6m@a&1icJ0`nkh>bo!|b50QOC(p&vnR(?Rl^HfD#8xJ$28d8je#9%^m_&k{=xge3xw#(E>1!`QIk)uk{0VG8eZH*V^ zi<0Z+V=SjyiR6NKp@NWF;*3I#IEq+?MT-)PP=1cmpy41=fta0#8I4IIEv_;p6Dp;t zq&Oi%K?seR(qxNPT9S*1fjhrQNyHJ#IH^&e$x6(07?n1YIjPW=%TCbX@l2ITkezK& z=SZUSlhuT&B%vtX%907C^TcwS)}X+FJ}H}%id!^dW?H&kAmJ$Ve8JqJ0%?I6GsT&qUsaJ@-VOt`1%4TDa-(t+KZIJx!qz$J5T$ zRJHaVF^Pg{FZ{QW7*iJB-w^c`qv@08C%5-Sg{%qg6%wWOt%FUILY^$%{QT-1dQBiG zrL;)Q46@U|LQrQt-}UTi@E3z+_iADsLw(%&lx7z!LBymmufFx{ipQICmR?GkT-eB_ z9XwTz&bd;4v;29=P*CgocLGTa@h>~7rwdO_QeL=Pa;Pf3e8#Nn%eF2#qlsXI4t*-)~uIo3K+b!_IMEhI*&qoVmiTGoW$mTx>e c5p9w|)9$X^W$4-7y>@ofyms3|;03(?0MMR%uK)l5 literal 28620 zcmeHQ3zXwldEVVDyA$QLC`orS31qS%A;ct><#%X+tEXjKvL(w887PruS+;ChwjP$P zQo7CQh6ACcAx#S$nx-UdQz$JVkQPcxN=Zv!q%@_pP*P554{h4g2M5lfJW_dPJTtqV z-JRWRm!`*a&g`tE|6a-R{qFzY?|%Pph+5hQuPEQR_uylbco_Tj+s#X^zu+q7%71wL zmcKaKePsC!-~af}e)8JomG}6OKYPt+_-X!IkJ!)tME%%};kUoj`rSL0CT`;g*ZyAP zui$U|`EKah;P?LE_b>KAS1;{e-naCv=f3{c7ahK=;o6aoefuD& zU^P`swb)V-zH8qt(;tka8Eyq91(Bf`9EjxVQHW(2oDgvwG)fxq7z}8P0CGN+WkyO@ zjfw5JWvF$hD`q7R*CZxq))`+%$iUWwa6kgDTB-AGRwMz75Zl1G8nt7k|rB1+YmCiJuI zhQSRW1?5JpfOxdGetTnKq!>a^F)9-lU%SoCyTs}&#?shiNSD}H8fYX9;rRLskIVps z0a&rD(@dUgWb77|;cDq@wiI?V6-UaIMNy$*8lfhdY#y&f3wC>4hstBl zoQactEw~CA>-3UkCGQhtF(ZOPDwfO2esWx)=K27EPhJOIFn#g(b?`^7gMah7&C^ev7H|R)08Sll0*+~i z$E;Ir*?5?toAGMRh%yd82ROw)*MOr%P@4gcq|=kSPrCJ5yWOZ^cD)qW8z?f)5I|nD zVMP+<+E6~g#5RUrrmb+SsEt{jjI)F`=5*jyr^ocwV*wb~jzLu&^I6{Z@HMc}q?fIf zeNtqDNoqQm;24|ZQOcI9^#Dilfh3Yu7US3EnK8>jWt4ImvObZjab2!)dc!9JP$_GT z+bkbUIDK|~e%J&asj!&2Y6F2WD@rKoZf`h`(Ah`^>i~r?#t;);Jx%&}8HACL)XGHT zZjGe+bUGVHQMA>`w#{+8*eT`PRzl1Ubqy=Fg?uU3G(@WpY59_tj@OcMsgR%v5U$Zx znrYB_&BvPCAQT(uptuUqQt*5TKtq@&R5GP<0JPNfJvGTSI8$r@UM%7}n zM6jtrGY(0qe$OELqLZ$Hkfo1XV$vKXxsYvJ@djWtdQwMK*R@lI@@758->u>4#U|fgti}sJ9lRgOM4ss>}=dw@D?`x*{VC^Qy#Gf z&pheX^}vny8hw78@j-KaG6;Mq)ooOJE+0%B&~_6-RRkiYDeF(1!8V^hi(wvz10a?| z<#drQj5CnZtyL{6!FUk|ixyRr((AEmRH%BPQJG3biiyN{sQH?y$<0Wr5XnkNpDILb zI$6meE`=r_%TLtDbk>dIm5hlXUdacARmAYARhKsPLRbuV#MF%ohzR&h7z2z42w+X^ zpiGG+vjpg9ILJz37({%8RU?+0rP2+Z*F90KPjJxXdhr5pVH_h3h$f#8&71vcv|q3rr>F9 zfJXp@s>&L8DVt*oxNpZg-Li}p=HtJn{zGv`n0UG1N=Ae6Ww}i*kI1++X zyKSg4sSXXQjNqxLqq$YBrvlR(X#EhyrrJuv;2A9|(>U7!Vx{9SgDv zC9d^C10|ne(mA~vsh-j;)jx5`(r)-m`=CX@w+Q$a0pB?c_~3m?ucP*z<-cBlYq6SI ztftQCY6{*vP*rPrA7~n#zP+3X$d10!HmzcC)P`RUzXZA(`jM##a;q5-9=EDv*%<4k+L4Mu{VUI||eLz_Jx-){Hu zFE_fmdG?Oh$sY97WY6m9)BAqjKY{EiIzp<^_L^MYQf#;A<|wokEK5#gSI-C8!|aso znKS&qM)q`0WLZx}_RJaXgzU-ZI8Jl&Ax_Crt#mVj526}~a8$LY$KzoE5s0WIr0UIF zGgGQGGQcnDtwfTOA}l@-8YxJ22TDL~`q>_6C6lANWE8SkByrlPdKOfl8QGJsTh$I@ zmr9K&BG)FJk{*ZhM1*I0Ro7GXLOM?&&4Fe&3KTvcRnKTzKWmc0urdTXoodjK9}4RT zVRB(9-Otxt4^ykv#&)R+x!Fb+g&>z$21q3nNQ$%KZO~DEn;Js?(+FcJyhH1;`qG zI%a7J4K_ZiafB68US^F1A_%OG)#=Ef(Zxo=o{cie8z=0~P+gDoq|Evb5f1o`-68_; z3c+iDOp$ritkQJ|OC`$LYBMGBpp(-a&X$WUG+Al19p7NQbYdLVYC<|kwn|KSf(osy zl1mG@M75@3Mv-<{sEF!}iIyw4hsCl(j$=vNBeYdwr?^J!1O%U^2JEP}l^qSnJMePB zHVqUoKstu=9%BN{F&vrcjI-HMOBl3r*<7(}7b~Dsk&{@0O(J$pKn;9s$I8scpn}$S z!3eVKK+$>!0n9kpG9%X!88D35BaJ0UmT z=WMg@e2_hJUS=!Zcp}*|XS^eqbRNl`IZs2Lg6x?yKDk@kBzx$Toyj5ntP)98?0S(O z;w71Cpz%?WG6-iBZ;k0tNA^+511>S9b7YZ@hHDZOV!|k0MoTrZ6Y&L=b{cUa8f=1g z2gSJMl}_uH&W`NCl2}M$@O&v$hI(U*jIp?!X(sFKzS?N}lZfUj$ zfeT89v!G!&BZo zl(S_?ilNY?*I`U^oQpJilB1_R2~$qB2XO{u&m!PEAG>>VfLR25FU)}N%*dVvxEA1A ztfqFnnmRMG2R#|tvtxc`%83Mw&y2NMeYwG}?1(d3@8PUCqwTJ~$r&AgGaF>jhu4%n z(J9&U(DmEvdR9-K1=W)+rCF-i2$@p4%XgbCd=eY>Jl zr0bdNlbX)| zloPa;gF5A+gzAb|!4!=vhR3mRKT$J6BpM+jnq}Hjzax)Pk5ZCcE<*8U1knP4oJTqY zh}9JVj3L2B4I+>dM+kKAJas(;WztL-2z<5FHOr{mHgU5@pqv>cBYce^#BfS2#zVdM zsJ)G@Clly;$N&JE;8Vq>6GbM)2&!}kqJ%ek8FMm;Nt0B4oG!3JzZFMf`D8!~HEG6& zfRn()j;&WFpc=_xcxB)-89p+0Bdk(QHw|lmJ9ZD8Y5{sKbUjSH&F6Wo*G>6MtWlQb ztP-|UbMEMTP(5>l>Qq$Eobira(s`tM<{*A5s%OslcQknGwJkeZXlNn=Mg>G zuciAm!uHuw+C;NaF`P~h>nstAB*IL}iW0+wH0&x+KG7+6({kO?cs?4Zb6%N?M*G8| z6Dx~7@APuhv!i;5!mx-LVZYG8p>CX22ZQbyBcrtjhpMm}>+ZfS$+ zp<^12L8*q6=j0Ks#r?D&8w*;ts8KDoVFt2r%T9$^ozC?Gs)xk-PCaK*DZU{lT)yLb zX}8D>Jt&H!Y`lby%(PRiVMdhBl~0AV=R@@@0>1wRA@>|$Ha+d}Lhd=klOt;p@cj@1 zzUN8xEWot@*J3plWH@b~-*lX==kSgxn<=-kg|b1RV+v|+QZHk#SY?hO9a!Kv_RHTM#J^dS8AS8SwW2FYXa(^o7%eEC}1 z*aMft_gxOZ^YV@JQ~K#6r~9*7jmj5 zeeP2=d5@fG1$aIe=-pSdNVjB()mW^&DuoD^@r9`xe``V<6lBDCJ6Qip;{@Jj2DT=X zQ7tVu$LSUxu@fl~asl3LD4J1{WFb#dwO%YrgG?vZFLNypXt9x38rX?kJmzL)TDL7C zD`FPOvLQVonURzS)q>2&6Z2YtEP2E<`&2-BLFTQ8X%ad8e~{aLo}m8`9_3!7pUcP|`*|*tyDYHUlNiDrf>NP(V1YX@O1v&-MW~w3_HV%WckAlI0xG z27R;Tr0SJqHCl`mIkimdU89JMve6zt8b!Elh{=LxErXPTOhL`BbahNC5R%ksj**mA zPWI&lYZI}!tC&K@Y00d=ncKFWFuAHbJEsYgWfo)B zglBCwzjdaarXJHekfxtpkh&+5HNjp>^{T{zbj2-&0kBw&5Cb`h$czgj2>wbQOPRqj zX7yOGH8DHpH3%}ufA6kkT%B#nf@#G9XlEr0HZc=aKR_B8Zo9Gt+k@sf%rL=d3X|M` zL)a>j#nYfthx91JPI@*$I8;bQ5EHMU)o`F;3-TAuFclu;rSHFd1V#xVlwR!zBNlG8!~ z7|xpII2J)YrCDj~9Ac%rHKjDxtDvP+<$?-y74bbxwoVPESxk30Hj5YGo8gr}OMcB3 zg?pe|-x|4X5xGY<0!a8K_@zO!@rTZY$jD{h9M>Ekdhr{fyI_<^AVrPXAL&7-q>+}WCD`9|nK zMz-6Xz6N@l8KgY44H$-(p!Ht zfAgpQz56#Q;mDy6{?+$B_v$yl`WJrff>(S9e*3GS_ul}`6_4t`+VQ1tYJvZ{WD|YU z9IdsNQ!ULjWo!As2~^Ck!y7aUyz6j~1~$w1T75Bda=Vs~y$pWvWyfFa-j@Y+c20RU zc%jvq2Ev;)c+PHPbfMK*Xmu7^o%K>s3$2d0(CRF-I-4~Z=S#xPd6|V)XG`(MS!uY1 zR%fBr*;$p-9U*M{qKk7-+>sJ)5%4VnzB3K@7FwNPqxb(HU!pwX)J}qlU zc~R#}WOI&$Lo=H9Yzd-Sd-(qS(1HU#v*P9p4tT)f=k`iStZJ4!Hx5PMcGL-s%QJ6AlD_~d*4^~g8h_=W0=zWS|$D|;hu;kEUDd*_cl z{^~s|&fv1Qec&}0;_rFp>PCbm2iaJm{kr{}%k^54ys4@F&ub zzUxEXe|q3+__YteT!v|c+;iQok3H}b?ZbD!??-R>=yUh{`S;wnKKbhX-+s%RZhG4* zfBZL(z4zdqU)Zy9<^3%6V|#!9^{MH>F??q@GNXx%dW zl~4YZ`?;lWe)jf%zW3dGR$g?Cyt{uS@tk<=_j5O1Eg!lw`N%W(V1M+E$7$r}@AJ9Jy!}tEzgP$rr@pF4tE`0FnC!(K? ze&vx`^k+VQ+b>@02oL_lL%;m%#c#cCaMLIL@iR|BNB2W}g0B$!!2*VhZ}nPytJg`g z-VQx`?|1IG{@|yNwm){|{s-R7y(0PF?|kd)@4frxb+7vE8{Q5scv?Y?Kfn)u}V-+jYJ|LzU>kH2`&%0)ka@oSI$!GWJiJ+hm4I`YjspZ>~Kcm2Tl U#zXGSZ#jCy)gMx!UC^%o0pK&%8vp*2l76X554;O7hbpqDQ1UD>yM$L~M&jTfG{tUh$xJ>7M+mfGv-UHHCz z(0lelP~K_ij_&Zq0({fHQ`3Jq#jwILf|6vGW(iEDR$C#SWeHLy2&`T-FrURSgO#vs zKy&O!>*z7L6?ZJX=5=IF@d-m=vv!RQOoRfmzA95Wh{rk%7AaA9izmuueoO_Jgd0K` zTuCN6LaWYnt$LIjsugNXn^oF?C1?>h3ni|t2R$LRXWdbe7luE>} zGbM07?eUW4)1pF_MUkZZxTzH5U7evlNMpv`oF$CvGN#i$GR~9KgqJ%$_>J-;u7bA7 zTAQ-b#?zfK5n$YOFbKyK8S9p1UgCXfZ3LF``=nAC_iI*qQn$J-UQ&D-TOB<^`4L&E z#0;s&wd$78hcr|e@e<-Q{`&2WrIBVyUCk;_cw+4~H}4X!@i@=mlL1rYV`FR& z4}2bm??Wowj|3M9WzKh(cp7LIhuD{;~G>V%CeA4 zj`*H`joM%ZduCrRxQD%icwV_FRhv-Y|Q5slp5Bm ztyaB?yR~B6gz6~bS7c1a4Q+@RQBkEFMOVAAD1&9%v0h1N3YZZa`Nh7Q$i`zsPGwBjAvqa$D4q|Q z3B``2e5eX$@2a|qsa17b)eu$j$*BdAkS?&EK5i(~^lyyB3R_hZmoXB;#7vkcR!wh% zG{iPeU?nx=#oHD-N)McPic_&@rZ)-3S!Rsj-A-yqp@S3_HPnGfVp(YO^MXS|U@;P> zu{MQS9fvZoxGqizdhF6^ZxD~7u}CLxm{`B+3B&v#5|>L3)Kf|Xa3#@r9hKAZW-DAm z(V>CJVKZqXp4gJ?NDXf{M|nEk68qd_2h}|Bma{4iVNQJ%v#B&fqL9wBgx@ja-dO1- zD1!@`sUIt)p_L2nqimm9b7CZT+<1+N^y?k`Im$EdpQd&kT6I=4|CB2yOIgh5_w1&Z zs+E(KXdzM%^b%ustO7FPqFr$`iU?eY<*-IIgA|oKWCZ1oi5q!RQQD0$l5z@yh>uMz zond(<5pu@vYl)qJ%9f+bx+Xl{8P{LGUF00R7!4;lHG>IDyo?0Is*wp8kWV5 zLQJkdNsDy4gtf5=Z3X^VHln4Ltd;Tu)zFLp$vY__KO(7NPpjzBRJj!-d&Z9L2|oy3 zQp{i|yl?t{Ji&ePtU4jAI+Ec`C&YZ)P4?6T?~<|jP_w0s*Hrlc%WhM36L)#h^&w&n z=rEMel}iC7^8g@DaU6m3SrMgOwNe8ZCf-+Ms>0*q>N$MO3ni2uvQ%vXDV4aXRt2*j zP$eE`*E+ZO+*V5q4DFaPF=hJXfQgf-s^kK&)XG`q7`VU|aEHgLq)f$lnH}e44E$Dn zp0+_7yV@q08*P4_qyUELFwpaXom12a?GAQs>I^`zNIfH*4tkzmX}0MM3uaT868Zwd zS4fUXW91rTMp=H+bxG2rLpp-kL>aAwId0T82z$(zgnYC+97eHrlM6eZM5S>j=jg+F zv6E8_-OP5Ogl(DC0B@WI)Zu+|-EkDbV7f=SOU;2HGNtQ3IIR|AV8W2*bjg{ zKRcZh5|YOWmSVAJV6{YL=(<*E;01PWi1$@9=J-Ba35nsR&?+@)@EB2Bv(E_j$Z@zq z<(tuHO>L$D>NQ(|RJB!<3`K1d@A7e+ggO;lE!xx+?BN7&m*RK?^|eO1WeSLs?o_qn z*sNept)k|2%+!&<$5m%%Wm?&XHLP~eJrRZWSDdz|J1+c6_@|cl!YlAHybt_dTHdpA z5WaLPbld0@gVwvl*TBbs?8~z!9lKrg~oPiqz1 zfe!x%_{Gc6p&M?vA#(JF8;;EeSotaF(p4F`ZRz&VgAc-&Kuf5*asK7d<-}SPDCw@} zv^B47_gr{+L*OKIDWUe&db`{9+PVuLh9PJfx}+R=V+7u_A$1%&K!ARF&mFq*q_4w= z;C;{~uHCg~A}3C4d_hOygUc@fms$TDhn6;Eu7NJYySCOTtKD`(o!$z31U>+SU$pT^ zHe^pg`)6O>hRk}yR+-t8+>lvsn90n(P56Iwp%-KQez&cy4SY{`c?tgJl~Y)6M5ZA9 zu`59g{owI682_o`@O{VOUq8Ni`k}L$UTJE2^})>aN*LP;k9n`sbcry_G~$)26=gkf z4vuKSg$|h+8LO_DS6il-^rRMS2fI@foFOrF!vq8K3*|smdm2GM)6xW9HpaY3#d*>g z1GDQ_rfueG8wjV@+MtSw2U9n4zFq{Hxsfei1cb%f%!`PCGU)N^5&jljukpCODgyyv zFHeE}=>^Yjjv<`2KQvp%J!bnJIW}@+7m7;r0nv0_-+H7+zdmJyci@BDQkhy_r z;DwfyD`p#(?DQZbS2WV`YEmuc6AX!kt4xJq>&&jrF~BqP_V~=^xZ5hE$ZA0xCo98P zry3aw5K+K|cn>f*B3kXl370}@e6m$W=FPDIVs8M~0dslkY=lNzcIhiRYFQk`Q#eN%Ta#K1Vmi7-V?`}0Bfup1HgjOoqDA^ z6oKJ@PG=By5ha&GrF4PGk28?gsa6~(!TJ#oj}~;BHfym;RI2!)QHf4P3W>ycU<8J3 zsEtS}AK?_FN9Q9hlPqVDA&n*=CrH%B3^$Au<&2FWeleJjlJOYklhYVRLgZ->jAN`1 zB4lU!k)TYGr#KP==n3N#IgCXDgx4d^kfYOeQ#5^9uT2Q7BXr|=(ZK~q&d16P5Dm`| zGE@NM;?`(5Es0G!hN{tgL2e}ZRy;rMJ7Pw`ujpG!sfZYAhjUK{8I%M{{JHQP(K zYhEF(n?XLsrOFoDiS*G_{H8_525G>Caq%Er4(F9f*=bOzh=w;a`Lntupgd;|6VB+Ca`j?g z&|~+0oNlwo?GDE_^lolh8|{mrO;FYi&SyT&s^&tKZeH)okm~JCd`0C#Ve~2EGnP zfFpbrd?^gAabtiV+q-fAe(?q;0*J0{hnqxCWJdl>M+UvG*us`=>#|9eRX6z_9wtDa z*8!60;O59+^rh{?J!kY6Y(KkkGaC%hI@yEnO!lmvKD+N1gXfSv1y4%VTYf{xIhs2x z46`)a1YyZ@^CK<>*~4yI+1!EbnG^i?M)tIyn^>aeeY6m8}6r?Uy;s`IL{LC5&1Xg@&vlZVF$hy)d(^a@_i*R(u zr+g)|p5sMe;zqs~iHRC18W@$La;RNlY7m}El(l+Rt2{qG5)>=Ki z-V{|m+%seyFCmDk7w6s5Yz=~tw6@?tgHFbG!%QwTM%r}T>CwGXA0L^_040l^h(^VF z5nnb~Bijx2@)SU~QOd!FO~op4B}Iv$(4^aDZF`)J)VqpjrhNt1c3Oit2eM}Y_%6ok z-kicL0N;-$;5#?6XQ5mR%8A{OJ?mGPk$lH_4vuH?u+Z{Ki^lPjpK5+4nh6Lrs)67`T3<=B?e zYpY|_r?sSzjnJYUK@5-}=Tjbu#cG;_jUmZJEfN$1Mo6^(Jo9=;+Gf}=CW)0|$1b76 zmQC1Q5*6$y6%nf}DTh;fAs*_+N3GN3^<+Sm3k4LwkOI2U@S@115J9z0Usi~EH)BsG zF=djfjnjEv>NVp?ESChdP=jFu2=fxS+;+|K1gk`{I8p8gY(|WXhY?<@q#KsgCp@={ z?G%7sh`b)Q))I4~0m^v-HdZgGDyN0r`Kp(TLG{c{s-38wIpJNoq>D)P%&GWJRL`97 zncdPR)q|_$M$+q5hag=poI}iHubS>L2;bvJX&dFDayXqH)Oa!$Nrc&y6D0=;Wzf-} zT%uj-q}7^Zh+;I(Wc`v5jrIluFIJMf{@K$_&yVUM^Me9zg@b&ZfI4wr@Ao@noQhWK z0;&_%IO~u#o=>Pb&QI3n-O>it!^8{*hf;MVC#WOFhzIE)HkJ&oV9-syZiB*3$4!NK zlgah~)kEPuua>pxlvtM&L$MwB>0yB#_)wHU`FIf>*=es(#jPllE$yUf&xh(+0KRi7 z2ijdC_ng9PdfM%Y+;f6w)~p5K`yl|n=SlS}lxv|}i)ae$QE>Vl3by6->^?td%57|+ zY*r7?jj~z4!g*0PryG5fve|w!GsV$*RVlxW6OeJco|x+8{W9HYanP^$7efUduV|g zMi@F&T+IX9Y@Nx1FZzNM;O*vt&87hS5DwjlL(fe2vjLO!O#9hy!O6(eFuKWtDz5H1p~guy^%fR>8YxyXRk}Nl1}~WY=_U%B6};z1t1OuQ1=GJ^`qvA|7fiprVEPwK|K=Wy^BYRc zd6@;%zh(2r*(Qezrhmco?{1gVU1`|qw``eH#a*qVEdbvF@SQ8*TQL1#lhA)>`ytJ( zjxCnael+u@wkLJ&Dy#BhQS=vR*R z`o8^-TygUk-rKu(KXv>Y)Y7px+1@4E^9bGKam@#F7#_dh-R*Y6i3`1qmEbQ;U=zv(CLcw*^T<{z*5&d0vY zf8mB-yZe6WdiUYrL%;ba!6R24_;vYJH+}3u`D@!1bangF-74tDhH{JD7|-$bAdB4? ze_VEBgpdB-)dvqh{OHU7@Z{@>&ONXHnXm7?{rmo}e)r0o))e&Bm)v~w_wV{;`~wdX zzww!O|ID-6=imPAd*1&U>F&^-^wZqWKD=~{{>{IC`le5P`d!}&AIsG-V)V9meIzsq zKNJ7ouQ=uY{x#~swd=h3Pd?as(|iB;WaK5c-rTzVmP;;;UH!ZFoz(yG>RXF{ab@#^ zuU$G;|62C`(L3A!_{0mv&pwiC6#x0;x3Bx#K>F?bZ#wiq>#{d3uU%(F;{KR?^38|e zcH=ug^gmZ_`KsLbBm1py4X*oXsMbIp`oHwju_S%u^4mZ5_{qC+2mkrmcRzCKHtXrX zI{cS^@Sk4(_J4Tn4mTNDx#b}Ami_Rv`=G_kgcdIoTD(l?^e+>7ru~D5uA2PvSFWdC z_KGjxap$v#TlGJ>?*2U%%pla#@jdVQ+Ksnge}KO2(N{)}-u8Iy?oZrb{M_|VMt=9R zOTTy5;J?4-b4$lw_J=qB>Ggm9=J$Q{o8Nn~`?EjyYma{Aw>~a3UX;D_ssDB0O?Ui! z6S{Ffv;^KD_Ad)PT)fn4@lvldq|6@u;L|_(D=%yO*{hJRM&Ds#KK@DZzg~CC z-D}=(zY|@KM80(789smO_YdD3^0N2bb13%c-s^woQ{O|48?RhCCco`1w;j3n4R6)H jbL2Y@VBh|`dq4bmIP^XQz5L71p1S|%l+QzZpgsQ&UF7C8 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_7.block.json b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_7.block.json new file mode 100644 index 00000000..b9632e94 --- /dev/null +++ b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_7.block.json @@ -0,0 +1,1249 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNSRENDQWVxZ0F3SUJBZ0lSQUloL3hNdFdmc0MvSUdkNVdYbTNJdFF3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGd4TWpFNU1EZ3hOakF3V2hjTk1qZ3hNakUyTURneE5qQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NUzVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkltVDZ3WjlFekNVQS8wK1lmSDM1dVhFRm5HOUo1MjIyZmlKaG94NVBpU0xocjZUSnFqZ0JQaFJMU0tkbVRybgpnTFNnOTVYN2FTTzZHREEvWEdXR0liR2pYekJkTUE0R0ExVWREd0VCL3dRRUF3SUJwakFQQmdOVkhTVUVDREFHCkJnUlZIU1VBTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSUFsaFA4RFhQUXg3V3U0a1gxdU4KQ1BCTjVuSUlDUTJYazVDc0UwWk03aFYwTUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSVFERTB2V1A3U0RNOHBkNQpZOG5sbUVuVHQ5WEErcmp4ZlQ3b3Y3Titzc3I1YkFJZ0d5WjJldXVzOGwzN0xkcFhXRndZQ3B6R2JEREFGdllPCkZQR1RIWmVPdm9RPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNTakNDQWZDZ0F3SUJBZ0lSQUpMMmtzM3N1bU5Ld1BMdkwyZ011eUV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRneE1qRTVNRGd4TmpBd1doY05Namd4TWpFMk1EZ3gKTmpBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRzhzSEswbkpjMThWc1pQUXFDU2FGYjI1dlBGbUR0djVmeEcraWF6MkZ3QXVEeEdLRVBHMy9YWQorSS8yR1UyU1hUaTF6UmVHdGI1RDNBWVRrcFA1cndTalh6QmRNQTRHQTFVZER3RUIvd1FFQXdJQnBqQVBCZ05WCkhTVUVDREFHQmdSVkhTVUFNQThHQTFVZEV3RUIvd1FGTUFNQkFmOHdLUVlEVlIwT0JDSUVJQjdCK1lJQ0xTK1UKbHhyRTRNQ2FIZDdaaG5lYmZRYWUvbmdUZUJVMDBhZVNNQW9HQ0NxR1NNNDlCQU1DQTBnQU1FVUNJUUNSY2lOcgpxa0h3cy9HTCt4MGlGNXJuRm5VcEJ2akdxMkRTazFjRTRuMXdUZ0lnS2wrbk9Fb3JQM0VyQXVmWW1VSlVZWTQyCnlsaUlvb3hLMWJsWXRqOXdZQmM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_3": {} + } + }, + "version": "0" + } + }, + "version": "2" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 102760448, + "max_message_count": 10, + "preferred_max_bytes": 524288 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_1": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": null, + "type": "solo" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "4" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "PEER" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + }, + { + "signed_by": 2 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + }, + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "CLIENT" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + }, + { + "signed_by": 1 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUpTOU1GbGIrb1k5a1FrZGZDeTRwbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaek11WlhoaGJYQnNaUzVqYjIwd0hoY05NVGd4TWpFNU1EZ3hOakF3V2hjTk1qZ3hNakUyTURneE5qQXcKV2pCek1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFWk1CY0dBMVVFQ2hNUWIzSm5NeTVsZUdGdGNHeGxMbU52YlRFY01Cb0dBMVVFCkF4TVRZMkV1YjNKbk15NWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUEKQkJaMlh3UitmaFhEdWhGSDB5VS9yUjBkRTdWQ3IyeVloZXBMR1RKY3NtSnlyaWdmOEtVQjBscm94emtIL1Q4cAo5RStNZHR3WWZtLzY5UHgrd3JoY0JFS2pYekJkTUE0R0ExVWREd0VCL3dRRUF3SUJwakFQQmdOVkhTVUVDREFHCkJnUlZIU1VBTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU1XZ1lqOEJGQlpLU2hUYTZHZ0sKaVVQWTJqY1RWQmNnTlAveDQvbjZYbStFTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUVQR3JqR1V6ajV0QWJXbgpqb0MyK1BHWkVod2xqWjZrMXdHK1RKalJLazFoQWlBSzRqNi93RnRpM1lxQTRMVk91cGdSUXpWcHVkZkF3SjliCjR2VTZ0QnpGemc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQCGZm/wkDiKDhj5C48ou0cxcZhJN9xpI0J4fjzezdTyUgIgDUNpeefkQsSqlqxOuFGxO2D1DOAIty69x+GnOkCGMHw=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "SW4uket+76eq3cgPQgstDicb29Ueonzi" + } + }, + { + "signature": "MEUCIQDEQFzRT/ySA+bzs0TU/dOVL8zoj0U7Cu/UFLZYEEDeGAIgN8FSOwLSylXaRb4iByUk1405p23jnCfrSnkYQqRxFhU=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "CCSLtkuORU1iNafphq2/1BiWPyQWGskU" + } + }, + { + "signature": "MEUCIQCzKWkSek9CGhFWhOZ1t9spqCzTmEgqol7lqoa8Cy1EogIgYFbcxKLcFnj5924f8C/mAySkNKQI3ywIKcFcGr0dm6Q=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "43x39QPc/6j9o52p1/hooi4UL18wkcdx" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-21T03:27:22Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLakNDQWRDZ0F3SUJBZ0lRVGZzcTJnejhOb1dBMVptWmFaOW9vakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPREV5TVRrd09ERTJNREJhRncweU9ERXlNVFl3T0RFMk1EQmEKTUd3eEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE4d0RRWURWUVFMRXdaamJHbGxiblF4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6RXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVRVK1U5UEdPeEgKY2tYV3JyNkl3MXRCM1Blb0ZqWjRXM1JXdyt2VUY4MVA2NnhxZ3pnb2dhZDE4TzFKWTBuRk8xc0c3VkgwdUYyNgpyejZaeEdKdTVDVkhvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBSllUL0ExejBNZTFydUpGOWJqUWp3VGVaeUNBa05sNU9RckJOR1RPNFZkREFLQmdncWhrak8KUFFRREFnTklBREJGQWlFQTlSUWZGNDJhM09QVGQ3TWg1T3hwclFoWTVlcWQ2T0w4MU1sV3pwbXRpd1lDSUdQNQpYS245aVp0UDllanpPOEo4Vm1JbE1QTjNlMXNhTXV3K2Y5aklkci9QCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "+csKIdrevaMzB6+n8DeTahLRgefE3cOB" + } + } + }, + "signature": "MEUCIQC3ZUMf5+7yDegb1wulvcJ3U4z7YeNon7AiZjRj/hZY1gIgbGMqek5ZuKnm50Dked7zK3v3GjyHfvshkJIpJrrQwjc=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-04-21T03:27:22Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJTZ0F3SUJBZ0lSQUt6RkpJdmNrZTRUaDVybWVadGtUSll3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPREV5TVRrd09ERTJNREJhRncweU9ERXlNVFl3T0RFMk1EQmFNRmt4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHCkNDcUdTTTQ5QXdFSEEwSUFCUFVqR0lMTmJIc2ZGSE5YOUpKUy91SFZ0WUtVVFRjRjRnRGU2ZE1MQ1YzT3NoeFoKVUNWVE5MN3ZNL1luRnp3R2ZCcXpyd0dldm5GQVpaT25NOHpIWXpDalRUQkxNQTRHQTFVZER3RUIvd1FFQXdJSApnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJQlJyNjNtS2JhLzJxdm53bG9EY2VmTFBFb2JIClFHV1R5NFRhcndEZUJxcEFNQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUNJSHlYSVV4T004Tkc1V0xJNi9sYU10bWcKL21wdHkrUHR1Zml1M3poRis0WmxBaUJJMmxhSDVFbmdFb2IyNGlsN1VjTHpERVBIVEFPODRLSmF6N3hVR0gyVwpaUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "KFL0NDWgjj2774bz+69mnhks7sKN9qu1" + } + } + }, + "signature": "MEQCIFuU5sQ5B6msicLqR7BztRHWF4JNacV+zRr1ZW/dmiFOAiASc+I69FhLtzWx9YK6lI2w6ZAnMHsAAJdRGpMQLYzwuQ==" + } + ] + }, + "header": { + "data_hash": "7wFn/ndHaAg4I5EF536VDYTzsH6UyeJzVw8GtdQSbyI=", + "number": "7", + "previous_hash": "5mADBbXeNyDhsDJoDh047m8l+mEYP2gnT9ar8h7McUI=" + }, + "metadata": { + "metadata": [ + "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", + "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", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_config.block index d998ed83e4357a78e30ab5312e058a6a11b327f5..f23594f1f32f17ac2fed021eba4278ccf20bbc84 100644 GIT binary patch delta 992 zcmV<610Vd%-vP?s0e=cc2nP}%|8)VOYWr}fkW(efEs1k2F|uPnofwo;&%RhFdRYp+ z8X$Ophi$Yh8QX)u?olnEWKV3~?-$3`(myKDrEvK|E5#D*&;bhQ&;bgZ&;bh41_~Pp z0U8Dfn#k|v1tJe(b#rNMWpi_5Xkl({Wo#0%1`3r13JOnhWU+q|1138mIDz9OmBm}b zH?7c{ivtDoFbeMP5i=6Q$pH%Oh5-l!66b~iv-3I436m>CG?TwWYqMWORsplO11Axa z%O)w4locJ5DO@F!0u^YJo+k;jx)nJjlY2%lleI-nlP*S1lLAI7lVwFnlNCiI94ZDu zWNm3~a}v)&3WP!m^9BkV2m%@g2%5<6<+CzJPy-rqU-{fFE#KC8sYHqXYmoN!G+92f ztaow}i?f_c>J?yo4~k?yhvpVWSm3_j2QDy5P-B=pzL#YZMleJIAQ)LK4A8ZG_NR{M zQJ8)zi(cTI2iF;j(wlCq2Sp*}MFJpRij*bl0^oFUaubE0tX4A+F!1PMBaJ0rxYKyv zCYq|V=3qesV)NusLLy#RHTSshN1=_`Wz$RE{SrnnL;@fbyEU@)HciKmC$k}y zll%VWola5`ArQc8WC)#x5t`@%AV~Ns@~zoT(txX^wo+ho(0Ze>)Oyz?4X;!zhONa^ z;}V{;iDW+mf59gX6wufo%_LhxYpGj6b zlR*As$%*l)oxoD0E1*X3N_)@(AV#t6@P@s=k?b!ZOkzPpc8HOuD|s*THO3|_bI2-T z4iZK%L;@gv)S_s7o6#gO7L` zQN!0vWK;Yk@jB^xQnj{*5WZ*+d68;7X zvIYv3vrlXo184JT`OhVJmfK)O946VCp#BtSV$M3Y0BsUSFhv3(0FmQ_m|zV?m)IyV z7?el8#{wW6&5G4v+h|tzdw;9g+qAPzWC=^4@5Bv! znuBHvga--&2(!OvAp>Nh@ExBVWZEn+hD|Ab#sSq^S0bskm_A+OLBLW~)h=G?EtX_g+@)z>HLGkOXrQa_roG>yI O+5RoIe_6>2015zTRIe2P delta 993 zcmV<710MX!-vP|u0e=cc2nG@$WA2j|ws|!#LaaS+4I={?NfqS1Ez*T+u^L_dxsJRa z8X%f_G0i`Aal%pcv2*HuTBas1jFNJ`UZ$pH%Oh5-l!66b~ivw06E5tAxhB$EpvXp^>FDwD||9h3cB z2(x=3IwZ5V1I-DOxeaQQgAFyaBMw#pljKEBlYd4llQ2e4leR@JlPM2Kli3a=94ZDu zWNm3~a}v=)3WY)n^9BkV2m%@g2=)Kx;IlGEPy-q>ZzF!c?`zpOQh*q%*8I*sem<6| z11YT%jI*3d>J?y-6vcoZdI?ovNyH$ULIJiW{a3M4m|#;9MleJIAP+DH&$|@fHoTnd zfb(C~R|Vkp7a#;Nbx%NA?UEL~J^~6$MFJrJwV)kmu#2KREwulU z(EN3Y#Xbl2hkPiCEPJn}oEL)C0w5KhO-5b>!(7_R3UMg2FHuT`irc}ts@Fms#^5ki zbEgtVFhv3(0EC6LAC)h3aV}r6nc1Tz1ET~E5eWP{e*oh9Wp)3>d~pIGX4Iyh|J0VS zAUir%K@?RDET&eoHQsQj-C1$m69{1M5=JmY0w8;;wzg#{FU|m$>UEGIjtLiXEpef| zfpyLZ^T<8vlbHe_1sq`kZh$ubR3H6ICL3WGf;X|=kwVFjy+<&Vk>6Dg8jlVNfCm!& z1`4tUv&3i`17{ousJ}vmzzYU?+o)lj z-Try|D_f#&&8H=q$DHz`zf-`F0w4*a8^ANjGu^RRGmX(YmmhReqvWKYtWfn^a45Rv z#Lo(a2MPiR2D83sAOmIUllhS&7s7>TwG{`TeoiSj`jUxUlZz@6M=(VKAprIzj6n%e z6{VWh$LA5iDI(8UmFnO&yrr2XwBKD!xe)>&3zQ5%rp6GBII#gl(=qdc)7=?{{%!80 Pbt;F2B^#|}3IGZKoqV5v diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_config.block.json b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_config.block.json index 6c9143e2..9a01c753 100644 --- a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_config.block.json +++ b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/businesschannel_config.block.json @@ -823,13 +823,13 @@ }, "signatures": [ { - "signature": "MEQCIDOfhFX6X3FmtGFuVAg9e7EkXCL3sMZuy3HLl1AcJoTuAiAJZT3bhB+7takuF40Un0JbMwsPqEU+3D2eEaHrXar+LA==", + "signature": "MEQCIElg8QJwizUfRKUXIrd1wITgBvLktLLzi3tSegWM/ZYzAiAUFQ3isBTw+Ogn4Zys4feMztTJ39XSD3ED5Dbee3lLVQ==", "signature_header": { "creator": { "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLakNDQWRHZ0F3SUJBZ0lSQUpWSXltRmtKSlVwd0Q3MmZCRVM1Rm93Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NVGd4TWpFNU1EZ3hOakF3V2hjTk1qZ3hNakUyTURneE5qQXcKV2pCc01Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFUE1BMEdBMVVFQ3hNR1kyeHBaVzUwTVI4d0hRWURWUVFEREJaQlpHMXBia0J2CmNtY3lMbVY0WVcxd2JHVXVZMjl0TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFOEVMMm9XR1oKQjg2VUpXZDhUUUFpS2d0TnNhUGYyN1ZiaHR6bUl3OTZ4L2dYUjlLRWZTSVV5MlJmSmNLOVJLNldYZUJtUEd0TQpQMmpJbzJVVkN3QjRKcU5OTUVzd0RnWURWUjBQQVFIL0JBUURBZ2VBTUF3R0ExVWRFd0VCL3dRQ01BQXdLd1lEClZSMGpCQ1F3SW9BZ3RtdGFJaXhKSnZmUnBmS0pLUGtzUFZBaVZhN0I2TTcwc1hSMm1DeHM0VUl3Q2dZSUtvWkkKemowRUF3SURSd0F3UkFJZ0VOcnpKQ3A3ZldGbC9SWEhranRMQUlsTWIrcVFFV2dBbTF2T0szT1Q5UlVDSUFyVgpmZFpMQ1hQczZrUFlucW0xNFJkNGZrQkR6SS9FQTRJdHI1SUo2ODdGCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", "mspid": "Org2MSP" }, - "nonce": "imG70Y4q2YzJrTpwZE0f0vE2DE9o/NIZ" + "nonce": "GyGhkgHA5mDg8niM5/YOk+6tJheurzjw" } } ] @@ -839,7 +839,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2018-12-19T08:21:19Z", + "timestamp": "2019-04-21T03:28:44Z", "tls_cert_hash": null, "tx_id": "", "type": 2, @@ -850,11 +850,11 @@ "id_bytes": "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", "mspid": "Org2MSP" }, - "nonce": "zCDYIxjlPUV9uk+mqXeU0Y9cdaj11XiZ" + "nonce": "oJd5Lve31DJZkigoNmiXNX9ngHUvWejq" } } }, - "signature": "MEUCIQCB+5/7tMe/DIYk2nUVDZT3lbOL6krvlZrfxk6HFx6PiwIgcsFFcOhbeVVXe63Ft6voW6O12tfdZWjs9UFiSZwfiIg=" + "signature": "MEUCIQDFBq/3tZdbmJGiyH8ZitA5tQCHB/mPpBQqEUTumi19nAIgSDems0BN98ruXvxiSf7R05B83ujcDcVWhkaQZVuz2Fk=" } }, "header": { @@ -862,7 +862,7 @@ "channel_id": "businesschannel", "epoch": "0", "extension": null, - "timestamp": "2018-12-19T08:21:19Z", + "timestamp": "2019-04-21T03:28:44Z", "tls_cert_hash": null, "tx_id": "", "type": 1, @@ -873,23 +873,23 @@ "id_bytes": "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", "mspid": "OrdererMSP" }, - "nonce": "pqKN6Bk9cDIqD5FjMojMR4GAqqkmonmj" + "nonce": "3l+R/nw0gZIWbo6jJ+hFOeyYGPiRza+C" } } }, - "signature": "MEQCIGuHfj0gKZt7l7F9VMtftF5h1Pmr1xj3ZuTWKEeINyOcAiBeGYCqmUR9fZr30knIXYog01tJKeJJvsMPufkORQ1EpQ==" + "signature": "MEUCIQCayr+xNwh9nG4q+WLmYw2e4Y2WO1vDFh5+GkDmxKW9ugIgfNTSu9YUjCqzPDUCWTO20E4hDZFbk//aoGEWW7aOWXw=" } ] }, "header": { - "data_hash": "TX1+gi1NABQBAIi9AhB/9pRJkOd1WEBwjbyPQubl5/I=", + "data_hash": "cMKmRABQ4h+lpME1gr4KqjVmYQCo81vWiH3ysOX/BNE=", "number": "2", - "previous_hash": "msbcTqmDI1ki0+V+E+RbZymK6f6fZX8YHUVV8E64abo=" + "previous_hash": "siELkEKmR3vm14Ur5lzZax7u+JOJ4FMtu8tKTnd5ynE=" }, "metadata": { "metadata": [ - "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", - "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", + "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", + "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", "", "" ] diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/config_delta.pb b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/config_delta.pb index bf030a4e646dd77bff77d82cbb53bb1e23049038..fe49e93e1a6c68d1a844ef666196a0f59fdf5b20 100644 GIT binary patch delta 61 zcmZ3gx>R*S_~aHLNlqm$E;h%M+|0aR*SxDpo^n`26DW?r!ngAz9vdr)d(N@@|56JC^Al3KK}^0UC?XM&NFvjwXr Q+Y4Fh64nCLuLU(0000;rL;wH) diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/config_delta_env.pb index 0e173e9787beb58f1fe5b60e35ec60cf70ca51d6..2609cf9e52a8a272eb5116a6f0a08eec842c0fde 100644 GIT binary patch delta 328 zcmV-O0k{6HJFYts3gbEo^9BkV2m%@g2%5<6<*^Y^0~ojlOpqdMF4Z89M%E_JWpUIZ z3(<=wVt%uE1MC%Gd=H9bK8NNOMp)p!-v=%*N>F2%JieD@5=JmY0w5S!Eez1LefFo0 z=uwz{DvMs=oCnt#iqe~ItOrFQH^?&adH!dpR86h5HRrQVIz$tU%1nF z-X@x=v&9)f1Ap`6P(mVJST*;!@8u0Q%SWM&*=5s9-u)6rFhl|%6uULD^)^k%k0-Ms zm6QAa=ABMb5+M-4Yh(zWh7p?R0w75ED)Oz_P11m?q_$FEbI^LDvDA9kB@M4sEQYPc zRO1pxFhl|%TzvT4x;5BmsuQrUHUT1p2H-xRoEo0j)( aC6^QC!#zj0dzxw)sqqc delta 328 zcmV-O0k{6HJFYts3gbEo^9BkV2m%@g2=)Kx;IR=<0~nqpyYeim=YJfDaKmgUbZ`%fsy_)sn!Oxwg{w(;wQ0hp{DQdXJ*5SA zkBV^}v&9)f1AnAbG$lx2pcGOKuA>!5m^jE_+DycYL}L<0Fhl|%6*GV!B}ISh6ALa~ z%gY)7f}`G@WEhpMF^qjcPcFhl|%abeHQRrRoFLy2#Bsf@M}0SZ7|WJ62uBq^#V7E&U7GXfwka?c|rY!tH7 aY(x|;<5igGv%0*CGsL!g;<%_?g)S77dx{+Z diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/original_config.pb index 652ac2eb3a9e00d8712050bd4f412a1664b3400f..ede726b7717a991b08373e8599ea24c37b513ea0 100644 GIT binary patch delta 84 zcmdm)yfb-&j^JcTWfexl$#%-tlOqL-C%;kV*vu{@CNw!!MRBsLp~vPnm0GUJ>iV6N nne^$CTX6ykY>E92_tJ diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/testchainid_1.block index 10eb62ac224c881cb64e968db05909533e4c0069..ebe9b2e86ea538cc52686e6226875957ac356c42 100644 GIT binary patch delta 845 zcmV-T1G4;-kpY#F0gxy z3mlYS})v(p&e5tExdM3c}eB$L`Ugp-FVC6li=D3e_`ER)wa zbrYu%3fvG1^9BkV2m%@g2Waxs5gsbD z$2)}tf7(_byP`PKdVC}1=-%Mdg{Unq+I|9{auP={MFJrJ-H!+ad1zdB6EPbh0=rOG z7;6KPT47oJt_sbZ`Z5my0w8>sq>AGBKUl}HB&-9ZsTjEU04+mUxYg9ugJm=#BS#WO zFhl|%X25GfeXw3Dlv35Zci)GG%F)!G?&0Gqe_?(0Z4-)o#sVO4^^4wmK~7kTgj9Ri zt7TwDdqv*17;CqW7f2#Zk?unhM=(VKApobdXhn)k5Sn8z_f7H%{aTF`Pjacn-pvN{ z7vuh2cX0wBC(BD9qnFKOA%~f-tr27^2n~(4XNT+iZtJuT(4a!75=Ssa0wDnC;URO9 zN8mk#eDwa^33mfWyus)KZqSc(6#Rx!%~n2!0w7bwj^pFteb*qt7asnYZ%Z00C+t-Z z0i1I^lU>TR?iw144hn$>68;7Xv2h#&VQrH@13en8MTa-%P>4mE5Pj-c9g}&r01`(q zMFJrJ=+rjyxZ?fuCb6*j?yV}(E3#hn9);Cn?z?@o@$|5%0w4l-@2XwkE#Px0Ks-k& zDH(u?;Gt$aNEE^1qcY{pPRg?lMI!@b-oX6~S5&~&=tIU-gw710GRe)mz`i{R5=JmY z0w8A`|8@O_CWfYe`t{)asRzlAi%r^)QO1>{*8S*AQxxKsF-; zF%ke8lXwx2lh-#%lP(fZliD_fldLx@lSnoulY=)Xlh-$O6Q~gi+z<-$1_~Pp0vZMg z`TpnNvtKw+0~o+TRDr;_tw+a43d2MO&H}F?E+0__gD|tlJB0*)ImZRt>5x??fMRTE zN+6g{Z<{TI-v&+>?@Gz+ZyeWO+q^+=WHDSzVwTLjhu zAP16=0dom#5{||RdgrXnuCTJOs;+3m@-^cyh`}FMFJrJk-^>w5n?SL66Lbr za`iCfTAegB2~}!;8{*9`Y}pkAF9IMSHcGwJs5R+(?@T9*RD`ypk2z3HZ?Ah+rdq?O z@UKV`MleJIAVACyRO1^#cl^&txTe<&_!3e1KpywHeQZ-y3$j%JQ34=dd^>zr)TD0D z#`L*LH_h%neWxC(k2>|bkYZuTJ=j(0-) z1`4rp90Os>h_C_s{&$UWgtV5?2ntO<=4lP*pfQ~iM=(VKApq}2p|$PAlm&eAWSLM2 z^vL!Nf=PiQGp);+rXY_Bt^xue4MQWc*|PkyJ*S}#q8f8(3&ktglg1-_VGKvJz;iN^ zvkpZg17y66va4Jg!fu_&eh8NDut2$8Ou;_gN1+l%Fhl|%6K^dq{Ag^RTun8yO1Ep~ z!y_dLBIa#^WVHjER5y5~0w8rvDjlrkEEUqXyW6F}?A17YZ_TFUpwte%)LP%Mwc`o^ F3IJx+WYYiu diff --git a/hyperledger_fabric/v1.3.0/solo/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.3.0/solo/channel-artifacts/updated_config.pb index ed52ac3e3e590948a69c77f813c3af97406eb7b5..2e423b290694fa9002ca473eab889a5936145b88 100644 GIT binary patch delta 129 zcmV-{0Dk}Nh5_w{0UHPd66b~i61i*&3qf#jY-wX*bZKvH5~*wm0ke=D5)qS+KqQlA zFAkIE94?d3E_0KJ9T2mHFXa)l-3!xll(ymlchpblLSJble9rdlXwdxll(ylaz`?( delta 147 zcmV;E0Bry5h5_w{0R{*I66b~ivqCm?3X>i|Mw7NcXOoCQbdzL3BpoUSL1b-dZgUd3 zYzhlOaBysCV_|e@Z*CH)YzP6f^&{92lPwV>0W*_7BRiA&G;@>fBMGq_5fPKkG%b^j z5p$DmH6;cyO;b=10kilK{SlL>H7S$ZK_Qc5K_!zOLnD*?K?##uLZ6caLRFK_HFP2$ BHE93< diff --git a/hyperledger_fabric/v1.3.0/solo/logs/dev_all.log b/hyperledger_fabric/v1.3.0/solo/logs/dev_all.log index fe841730..20b286b6 100644 --- a/hyperledger_fabric/v1.3.0/solo/logs/dev_all.log +++ b/hyperledger_fabric/v1.3.0/solo/logs/dev_all.log @@ -1,475 +1,519 @@ -Attaching to peer1.org1.example.com, peer0.org1.example.com, peer1.org2.example.com, peer0.org2.example.com, fabric-cli, orderer0.example.com -peer1.org1.example.com | [001 12-19 08:21:10.86 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: -peer1.org1.example.com | Version: 1.3.0 -peer1.org1.example.com | Commit SHA: development build -peer1.org1.example.com | Go version: go1.10.4 -peer1.org1.example.com | OS/Arch: linux/amd64 -peer1.org1.example.com | Experimental features: true -peer1.org1.example.com | Chaincode: -peer1.org1.example.com | Base Image Version: 0.4.13 -peer1.org1.example.com | Base Docker Namespace: hyperledger -peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric -peer1.org1.example.com | Docker Namespace: hyperledger -peer1.org1.example.com | [002 12-19 08:21:10.86 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -peer1.org1.example.com | [003 12-19 08:21:10.86 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -peer1.org1.example.com | [004 12-19 08:21:11.08 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -peer1.org1.example.com | [005 12-19 08:21:11.10 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -peer1.org1.example.com | [006 12-19 08:21:11.10 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 -peer1.org1.example.com | [007 12-19 08:21:11.10 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 -peer1.org1.example.com | [008 12-19 08:21:11.10 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 -peer1.org1.example.com | [009 12-19 08:21:11.10 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 -peer1.org1.example.com | [00a 12-19 08:21:11.14 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -peer1.org1.example.com | [00b 12-19 08:21:11.16 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com -peer1.org1.example.com | [00c 12-19 08:21:11.16 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org1.example.com:7052 -peer1.org1.example.com | [00d 12-19 08:21:11.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -peer1.org1.example.com | [00e 12-19 08:21:11.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -peer1.org1.example.com | [00f 12-19 08:21:11.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -peer1.org1.example.com | [010 12-19 08:21:11.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -peer1.org1.example.com | [011 12-19 08:21:11.21 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051] -peer1.org1.example.com | [012 12-19 08:21:11.22 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer1.org1.example.com:7051 [] [68 98 196 75 80 160 129 252 86 22 236 119 27 89 28 51 192 32 226 175 168 163 30 41 145 235 97 187 90 22 17 30] peer1.org1.example.com:7051 } -peer1.org1.example.com | [013 12-19 08:21:11.23 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org1.example.com:7051 started -peer1.org1.example.com | [014 12-19 08:21:11.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org1.example.com | [015 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org1.example.com | [016 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org1.example.com | [017 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer1.org1.example.com | [018 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer1.org1.example.com | [019 12-19 08:21:11.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer1.org1.example.com | [01a 12-19 08:21:11.28 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -peer1.org1.example.com | [01b 12-19 08:21:11.28 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -peer1.org1.example.com | [01c 12-19 08:21:11.28 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -peer1.org1.example.com | [01d 12-19 08:21:11.28 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] -peer1.org1.example.com | [01e 12-19 08:21:11.28 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] -peer1.org1.example.com | [01f 12-19 08:21:14.35 UTC] [%{longpkg}] %{callpath} -> INFO [][7151d85a] Entry chaincode: name:"cscc" -peer1.org1.example.com | [020 12-19 08:21:14.35 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -peer1.org1.example.com | [021 12-19 08:21:14.35 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -peer1.org1.example.com | [022 12-19 08:21:14.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 24ms (state_validation=0ms block_commit=14ms state_commit=3ms) -peer1.org1.example.com | [023 12-19 08:21:14.38 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -peer1.org1.example.com | [024 12-19 08:21:14.39 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org1.example.com | [025 12-19 08:21:14.39 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -peer1.org1.example.com | [026 12-19 08:21:14.39 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer1.org1.example.com | [027 12-19 08:21:14.42 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -peer1.org1.example.com | [028 12-19 08:21:14.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org1.example.com | [029 12-19 08:21:14.43 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org1.example.com | [02a 12-19 08:21:14.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org1.example.com | [02b 12-19 08:21:14.43 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer1.org1.example.com | [02c 12-19 08:21:14.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer1.org1.example.com | [02d 12-19 08:21:14.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer1.org1.example.com | [02e 12-19 08:21:14.43 UTC] [%{longpkg}] %{callpath} -> INFO [][7151d85a] Exit chaincode: name:"cscc" (83ms) -peer1.org1.example.com | [02f 12-19 08:21:15.86 UTC] [%{longpkg}] %{callpath} -> INFO [][d311fd96] Entry chaincode: name:"cscc" -peer1.org1.example.com | [030 12-19 08:21:15.86 UTC] [%{longpkg}] %{callpath} -> INFO [][d311fd96] Exit chaincode: name:"cscc" (1ms) -peer1.org1.example.com | [031 12-19 08:21:16.83 UTC] [%{longpkg}] %{callpath} -> INFO [][1c0e7e6b] Entry chaincode: name:"qscc" -peer1.org1.example.com | [032 12-19 08:21:16.83 UTC] [%{longpkg}] %{callpath} -> INFO [][1c0e7e6b] Exit chaincode: name:"qscc" (1ms) -peer1.org1.example.com | [033 12-19 08:21:20.20 UTC] [%{longpkg}] %{callpath} -> INFO [68 98 196 75 80 160 129 252 86 22 236 119 27 89 28 51 192 32 226 175 168 163 30 41 145 235 97 187 90 22 17 30] : Some peer is already a leader -peer1.org1.example.com | [034 12-19 08:21:20.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -peer1.org1.example.com | [035 12-19 08:21:20.23 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org1.example.com | [036 12-19 08:21:20.23 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer1.org1.example.com | [037 12-19 08:21:20.23 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer1.org1.example.com | [038 12-19 08:21:20.23 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -peer1.org1.example.com | [039 12-19 08:21:20.25 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 24ms -peer1.org1.example.com | [03a 12-19 08:21:20.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 13ms (state_validation=0ms block_commit=8ms state_commit=2ms) -peer1.org1.example.com | [03b 12-19 08:21:20.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -peer1.org1.example.com | [03c 12-19 08:21:20.27 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org1.example.com | [03d 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer1.org1.example.com | [03e 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer1.org1.example.com | [03f 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -peer1.org1.example.com | [040 12-19 08:21:20.30 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 36ms -peer1.org1.example.com | [041 12-19 08:21:20.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 17ms (state_validation=0ms block_commit=10ms state_commit=2ms) -peer1.org1.example.com | [042 12-19 08:21:20.34 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] isn't responsive: EOF -peer1.org1.example.com | [043 12-19 08:21:20.34 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96]] -peer1.org1.example.com | [044 12-19 08:21:20.34 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96], Metadata: [] -peer1.org1.example.com | [045 12-19 08:21:20.34 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -peer1.org1.example.com | [046 12-19 08:21:28.04 UTC] [%{longpkg}] %{callpath} -> INFO [][e29bfc5a] Entry chaincode: name:"lscc" -peer1.org1.example.com | [047 12-19 08:21:28.05 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -peer1.org1.example.com | [048 12-19 08:21:28.05 UTC] [%{longpkg}] %{callpath} -> INFO [][e29bfc5a] Exit chaincode: name:"lscc" (3ms) -peer1.org1.example.com | [049 12-19 08:22:23.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -peer1.org1.example.com | [04a 12-19 08:22:23.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 1ms -peer1.org1.example.com | [04b 12-19 08:22:23.36 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] -peer1.org1.example.com | [04c 12-19 08:22:23.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 37ms (state_validation=0ms block_commit=20ms state_commit=7ms) -peer1.org1.example.com | [04d 12-19 08:23:01.47 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -peer1.org1.example.com | [04e 12-19 08:23:01.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 10ms -peer1.org1.example.com | [04f 12-19 08:23:01.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 21ms (state_validation=0ms block_commit=17ms state_commit=1ms) -peer1.org1.example.com | [050 12-19 08:23:04.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -peer1.org1.example.com | [051 12-19 08:23:04.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 4ms -peer1.org1.example.com | [052 12-19 08:23:04.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 20ms (state_validation=0ms block_commit=14ms state_commit=3ms) -peer1.org1.example.com | [053 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -peer1.org1.example.com | [054 12-19 08:23:17.91 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer0.org2.example.com | [001 12-19 08:21:09.51 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +Attaching to peer0.org1.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org2.example.com, fabric-cli, orderer0.example.com +peer0.org1.example.com | [001 04-21 03:28:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org1.example.com | Version: 1.3.0 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.10.4 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Experimental features: true +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Image Version: 0.4.13 +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger +peer0.org1.example.com | [002 04-21 03:28:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org1.example.com | [003 04-21 03:28:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org1.example.com | [004 04-21 03:28:36.07 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org1.example.com | [005 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org1.example.com | [006 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.6:7051 +peer0.org1.example.com | [007 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [008 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.6:7051 +peer0.org1.example.com | [009 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [00a 04-21 03:28:36.11 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org1.example.com | [00b 04-21 03:28:36.13 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +peer0.org1.example.com | [00c 04-21 03:28:36.13 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +peer0.org1.example.com | [00d 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org1.example.com | [00e 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org1.example.com | [00f 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org1.example.com | [010 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered +peer0.org1.example.com | [011 04-21 03:28:36.18 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +peer0.org1.example.com | [012 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer0.org1.example.com:7051 [] [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] peer0.org1.example.com:7051 } +peer0.org1.example.com | [013 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +peer0.org1.example.com | [014 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [015 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | [016 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [017 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [018 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [019 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer0.org1.example.com | [01a 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org1.example.com | [01b 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer0.org1.example.com | [01c 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer0.org1.example.com | [01d 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer0.org1.example.com | [01e 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer0.org1.example.com | [01f 04-21 03:28:38.75 UTC] [%{longpkg}] %{callpath} -> INFO [][74f0fe16] Entry chaincode: name:"cscc" +peer0.org1.example.com | [020 04-21 03:28:38.75 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [021 04-21 03:28:38.75 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org1.example.com | [022 04-21 03:28:38.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 21ms (state_validation=0ms block_commit=15ms state_commit=3ms) +peer0.org1.example.com | [023 04-21 03:28:38.78 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org1.example.com | [024 04-21 03:28:38.79 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [025 04-21 03:28:38.79 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org1.example.com | [026 04-21 03:28:38.79 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [027 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 +peer0.org1.example.com | [028 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [029 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | [02a 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [02b 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [02c 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [02d 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer0.org1.example.com | [02e 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO [][74f0fe16] Exit chaincode: name:"cscc" (75ms) +peer0.org1.example.com | [02f 04-21 03:28:39.99 UTC] [%{longpkg}] %{callpath} -> INFO [][0cf6365b] Entry chaincode: name:"cscc" +peer0.org1.example.com | [030 04-21 03:28:39.99 UTC] [%{longpkg}] %{callpath} -> INFO [][0cf6365b] Exit chaincode: name:"cscc" (1ms) +peer0.org1.example.com | [031 04-21 03:28:40.97 UTC] [%{longpkg}] %{callpath} -> INFO [][ef857b74] Entry chaincode: name:"qscc" +peer0.org1.example.com | [032 04-21 03:28:40.97 UTC] [%{longpkg}] %{callpath} -> INFO [][ef857b74] Exit chaincode: name:"qscc" (1ms) +peer0.org1.example.com | [033 04-21 03:28:44.79 UTC] [%{longpkg}] %{callpath} -> INFO [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] : Becoming a leader +peer0.org1.example.com | [034 04-21 03:28:44.79 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org1.example.com | [035 04-21 03:28:44.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org1.example.com | [036 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [037 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [038 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org1.example.com | [039 04-21 03:28:44.83 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [03a 04-21 03:28:44.86 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 47ms +peer0.org1.example.com | [03b 04-21 03:28:44.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 23ms (state_validation=0ms block_commit=14ms state_commit=4ms) +peer0.org1.example.com | [03c 04-21 03:28:44.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org1.example.com | [03d 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [03e 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [03f 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [040 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org1.example.com | [041 04-21 03:28:44.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 50ms +peer0.org1.example.com | [042 04-21 03:28:44.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 31ms (state_validation=0ms block_commit=20ms state_commit=4ms) +peer0.org1.example.com | [043 04-21 03:28:47.43 UTC] [%{longpkg}] %{callpath} -> INFO [][c0ded38f] Entry chaincode: name:"lscc" +peer0.org1.example.com | [044 04-21 03:28:47.43 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org1.example.com | [045 04-21 03:28:47.43 UTC] [%{longpkg}] %{callpath} -> INFO [][c0ded38f] Exit chaincode: name:"lscc" (1ms) +peer0.org1.example.com | [046 04-21 03:28:50.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][84c18647] Entry chaincode: name:"lscc" +peer0.org1.example.com | [047 04-21 03:28:50.96 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer0.org1.example.com | [048 04-21 03:28:50.96 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental +peer0.org1.example.com | [049 04-21 03:29:26.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][84c18647] Exit chaincode: name:"lscc" (35741ms) +peer0.org1.example.com | [04a 04-21 03:29:28.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org1.example.com | [04b 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 4ms +peer0.org1.example.com | [04c 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer0.org1.example.com | [04d 04-21 03:29:28.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 37ms (state_validation=1ms block_commit=18ms state_commit=5ms) +peer0.org1.example.com | [04e 04-21 03:30:03.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2d49b229] Entry chaincode: name:"exp02" +peer0.org1.example.com | [04f 04-21 03:30:03.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2d49b229] Exit chaincode: name:"exp02" (4ms) +peer0.org1.example.com | [050 04-21 03:30:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org1.example.com | [051 04-21 03:30:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 2ms +peer0.org1.example.com | [052 04-21 03:30:05.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 37ms (state_validation=1ms block_commit=24ms state_commit=4ms) +peer0.org1.example.com | [053 04-21 03:30:06.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][15cffc0e] Entry chaincode: name:"exp02" +peer0.org1.example.com | [054 04-21 03:30:06.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][15cffc0e] Exit chaincode: name:"exp02" (2ms) +peer0.org1.example.com | [055 04-21 03:30:08.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org1.example.com | [056 04-21 03:30:08.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 1ms +peer0.org1.example.com | [057 04-21 03:30:08.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 35ms (state_validation=0ms block_commit=25ms state_commit=4ms) +peer0.org1.example.com | [058 04-21 03:30:08.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f289ea93] Entry chaincode: name:"exp02" +peer0.org1.example.com | [059 04-21 03:30:08.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f289ea93] Exit chaincode: name:"exp02" (4ms) +peer0.org1.example.com | [05a 04-21 03:30:09.90 UTC] [%{longpkg}] %{callpath} -> INFO [][3adb38a2] Entry chaincode: name:"lscc" +peer0.org1.example.com | [05b 04-21 03:30:09.90 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.1] to peer +peer0.org1.example.com | [05c 04-21 03:30:09.90 UTC] [%{longpkg}] %{callpath} -> INFO [][3adb38a2] Exit chaincode: name:"lscc" (1ms) +peer0.org1.example.com | [05d 04-21 03:30:12.17 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b34fd3c4] Entry chaincode: name:"lscc" +peer0.org1.example.com | [05e 04-21 03:30:12.18 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer0.org1.example.com | [05f 04-21 03:30:12.18 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental +peer0.org1.example.com | [060 04-21 03:30:45.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b34fd3c4] Exit chaincode: name:"lscc" (33664ms) +peer0.org1.example.com | [061 04-21 03:30:45.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][17f07ec3] Entry chaincode: name:"exp02" +peer0.org1.example.com | [062 04-21 03:30:45.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][17f07ec3] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [063 04-21 03:30:47.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org1.example.com | [064 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO Find chaincode upgrade transaction for chaincode exp02 on channel businesschannel with new version 1.1 +peer0.org1.example.com | [065 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 2ms +peer0.org1.example.com | [066 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer0.org1.example.com | [067 04-21 03:30:47.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 39ms (state_validation=1ms block_commit=24ms state_commit=6ms) +peer0.org1.example.com | [068 04-21 03:30:48.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8529b38] Entry chaincode: name:"exp02" +peer0.org1.example.com | [069 04-21 03:30:48.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8529b38] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [06a 04-21 03:31:21.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8d3dd766] Entry chaincode: name:"lscc" +peer0.org1.example.com | [06b 04-21 03:31:21.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8d3dd766] Exit chaincode: name:"lscc" (1ms) +peer0.org1.example.com | [06c 04-21 03:31:21.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9c05f64c] Entry chaincode: name:"lscc" +peer0.org1.example.com | [06d 04-21 03:31:21.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9c05f64c] Exit chaincode: name:"lscc" (1ms) +peer0.org1.example.com | [06e 04-21 03:31:22.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ee13f3d9] Entry chaincode: name:"lscc" +peer0.org1.example.com | [06f 04-21 03:31:22.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ee13f3d9] Exit chaincode: name:"lscc" (1ms) +peer0.org1.example.com | [070 04-21 03:31:22.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db8b5390] Entry chaincode: name:"lscc" +peer0.org1.example.com | [071 04-21 03:31:22.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db8b5390] Exit chaincode: name:"lscc" (1ms) +peer0.org1.example.com | [072 04-21 03:31:22.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9675f175] Entry chaincode: name:"lscc" +peer0.org1.example.com | [073 04-21 03:31:22.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9675f175] Exit chaincode: name:"lscc" (2ms) +peer0.org1.example.com | [074 04-21 03:31:23.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed35492b] Entry chaincode: name:"qscc" +peer0.org1.example.com | [075 04-21 03:31:23.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed35492b] Exit chaincode: name:"qscc" (1ms) +peer0.org1.example.com | [076 04-21 03:31:23.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][45fd4a78] Entry chaincode: name:"qscc" +peer0.org1.example.com | [077 04-21 03:31:23.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][45fd4a78] Exit chaincode: name:"qscc" (1ms) +peer0.org1.example.com | [078 04-21 03:31:24.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0fadbe3f] Entry chaincode: name:"cscc" +peer0.org1.example.com | [079 04-21 03:31:24.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0fadbe3f] Exit chaincode: name:"cscc" (1ms) +peer0.org1.example.com | [07a 04-21 03:31:24.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7aede3df] Entry chaincode: name:"cscc" +peer0.org1.example.com | [07b 04-21 03:31:24.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7aede3df] Exit chaincode: name:"cscc" (0ms) +peer1.org2.example.com | [001 04-21 03:28:35.96 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org2.example.com | Version: 1.3.0 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.10.4 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Experimental features: true +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Image Version: 0.4.13 +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger +peer1.org2.example.com | [002 04-21 03:28:35.96 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org2.example.com | [003 04-21 03:28:35.96 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org2.example.com | [004 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org2.example.com | [005 04-21 03:28:36.12 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org2.example.com | [006 04-21 03:28:36.12 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.7:7051 +peer1.org2.example.com | [007 04-21 03:28:36.12 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer1.org2.example.com | [008 04-21 03:28:36.12 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.7:7051 +peer1.org2.example.com | [009 04-21 03:28:36.12 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer1.org2.example.com | [00a 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org2.example.com | [00b 04-21 03:28:36.16 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com +peer1.org2.example.com | [00c 04-21 03:28:36.16 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org2.example.com:7052 +peer1.org2.example.com | [00d 04-21 03:28:36.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org2.example.com | [00e 04-21 03:28:36.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org2.example.com | [00f 04-21 03:28:36.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org2.example.com | [010 04-21 03:28:36.18 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered +peer1.org2.example.com | [011 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] +peer1.org2.example.com | [012 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer1.org2.example.com:7051 [] [113 186 36 107 190 117 120 205 180 193 101 183 33 93 178 229 154 35 224 253 25 224 238 154 135 61 151 143 78 39 156 154] peer1.org2.example.com:7051 } +peer1.org2.example.com | [013 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org2.example.com:7051 started +peer1.org2.example.com | [014 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [015 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [016 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | [017 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [018 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [019 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer1.org2.example.com | [01a 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org2.example.com | [01b 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org2.example.com | [01c 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org2.example.com | [01d 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [01e 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [01f 04-21 03:28:39.45 UTC] [%{longpkg}] %{callpath} -> INFO [][a3068984] Entry chaincode: name:"cscc" +peer1.org2.example.com | [020 04-21 03:28:39.45 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer1.org2.example.com | [021 04-21 03:28:39.46 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org2.example.com | [022 04-21 03:28:39.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 20ms (state_validation=0ms block_commit=13ms state_commit=3ms) +peer1.org2.example.com | [023 04-21 03:28:39.49 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org2.example.com | [024 04-21 03:28:39.49 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [025 04-21 03:28:39.49 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [026 04-21 03:28:39.49 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org2.example.com | [027 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 +peer1.org2.example.com | [028 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [029 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org2.example.com | [02a 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | [02b 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [02c 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [07c 04-21 03:31:24.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][39ed1fae] Entry chaincode: name:"cscc" +peer0.org1.example.com | [07d 04-21 03:31:24.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][39ed1fae] Exit chaincode: name:"cscc" (1ms) +peer0.org1.example.com | [07e 04-21 03:31:38.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [7] from buffer +peer0.org1.example.com | [07f 04-21 03:31:38.52 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +peer0.org1.example.com | [080 04-21 03:31:38.52 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +peer0.org1.example.com | [081 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org1.example.com | [082 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [083 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org1.example.com | [084 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [085 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org1.example.com | [086 04-21 03:31:38.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [7] in 86ms +peer0.org1.example.com | [087 04-21 03:31:38.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [7] with 1 transaction(s) in 51ms (state_validation=0ms block_commit=45ms state_commit=3ms) +peer0.org1.example.com | [088 04-21 03:31:48.27 UTC] [%{longpkg}] %{callpath} -> INFO [][db6b9983] Entry chaincode: name:"cscc" +peer0.org1.example.com | [089 04-21 03:31:48.27 UTC] [%{longpkg}] %{callpath} -> INFO [][db6b9983] Exit chaincode: name:"cscc" (0ms) +peer0.org1.example.com | [08a 04-21 03:31:49.24 UTC] [%{longpkg}] %{callpath} -> INFO [][a883ee52] Entry chaincode: name:"qscc" +peer0.org1.example.com | [08b 04-21 03:31:49.24 UTC] [%{longpkg}] %{callpath} -> INFO [][a883ee52] Exit chaincode: name:"qscc" (1ms) +peer1.org1.example.com | [001 04-21 03:28:35.98 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org1.example.com | Version: 1.3.0 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.10.4 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Experimental features: true +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Image Version: 0.4.13 +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger +peer1.org1.example.com | [002 04-21 03:28:35.99 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org1.example.com | [003 04-21 03:28:35.99 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org1.example.com | [004 04-21 03:28:36.23 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org1.example.com | [005 04-21 03:28:36.24 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org1.example.com | [006 04-21 03:28:36.24 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.5:7051 +peer1.org1.example.com | [007 04-21 03:28:36.24 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [008 04-21 03:28:36.24 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.5:7051 +peer1.org1.example.com | [009 04-21 03:28:36.24 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [00a 04-21 03:28:36.26 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org1.example.com | [00b 04-21 03:28:36.27 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com +peer1.org1.example.com | [00c 04-21 03:28:36.27 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org1.example.com:7052 +peer1.org1.example.com | [00d 04-21 03:28:36.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org1.example.com | [00e 04-21 03:28:36.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org1.example.com | [00f 04-21 03:28:36.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org1.example.com | [010 04-21 03:28:36.29 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered +peer1.org1.example.com | [011 04-21 03:28:36.30 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051] +peer1.org1.example.com | [012 04-21 03:28:36.30 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer1.org1.example.com:7051 [] [68 98 196 75 80 160 129 252 86 22 236 119 27 89 28 51 192 32 226 175 168 163 30 41 145 235 97 187 90 22 17 30] peer1.org1.example.com:7051 } +peer1.org1.example.com | [013 04-21 03:28:36.30 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org1.example.com:7051 started +peer1.org1.example.com | [014 04-21 03:28:36.30 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org1.example.com | [015 04-21 03:28:36.30 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org1.example.com | [016 04-21 03:28:36.30 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | [017 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [018 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [019 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer1.org1.example.com | [01a 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org1.example.com | [01b 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org1.example.com | [01c 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org1.example.com | [01d 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [01e 04-21 03:28:36.31 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [01f 04-21 03:28:39.01 UTC] [%{longpkg}] %{callpath} -> INFO [][55a46833] Entry chaincode: name:"cscc" +peer1.org1.example.com | [020 04-21 03:28:39.01 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer1.org1.example.com | [021 04-21 03:28:39.02 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org1.example.com | [022 04-21 03:28:39.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 22ms (state_validation=1ms block_commit=13ms state_commit=3ms) +peer1.org1.example.com | [023 04-21 03:28:39.04 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org1.example.com | [024 04-21 03:28:39.05 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [025 04-21 03:28:39.05 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org1.example.com | [026 04-21 03:28:39.05 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [027 04-21 03:28:39.07 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 +peer1.org1.example.com | [028 04-21 03:28:39.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org1.example.com | [029 04-21 03:28:39.08 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org1.example.com | [02a 04-21 03:28:39.08 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | [02b 04-21 03:28:39.08 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [02c 04-21 03:28:39.08 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [02d 04-21 03:28:39.08 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer1.org1.example.com | [02e 04-21 03:28:39.08 UTC] [%{longpkg}] %{callpath} -> INFO [][55a46833] Exit chaincode: name:"cscc" (69ms) +peer1.org1.example.com | [02f 04-21 03:28:40.15 UTC] [%{longpkg}] %{callpath} -> INFO [][977123c1] Entry chaincode: name:"cscc" +peer1.org1.example.com | [030 04-21 03:28:40.15 UTC] [%{longpkg}] %{callpath} -> INFO [][977123c1] Exit chaincode: name:"cscc" (1ms) +peer1.org1.example.com | [031 04-21 03:28:41.12 UTC] [%{longpkg}] %{callpath} -> INFO [][dbc81fa4] Entry chaincode: name:"qscc" +peer1.org1.example.com | [032 04-21 03:28:41.12 UTC] [%{longpkg}] %{callpath} -> INFO [][dbc81fa4] Exit chaincode: name:"qscc" (1ms) +peer1.org1.example.com | [033 04-21 03:28:44.80 UTC] [%{longpkg}] %{callpath} -> INFO [68 98 196 75 80 160 129 252 86 22 236 119 27 89 28 51 192 32 226 175 168 163 30 41 145 235 97 187 90 22 17 30] : Some peer is already a leader +peer1.org1.example.com | [034 04-21 03:28:44.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org1.example.com | [035 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [036 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [037 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [038 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [039 04-21 03:28:44.84 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 29ms +peer1.org1.example.com | [03a 04-21 03:28:44.86 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=12ms state_commit=4ms) +peer1.org1.example.com | [03b 04-21 03:28:44.86 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org1.example.com | [03c 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [03d 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [03e 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [03f 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [040 04-21 03:28:44.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 64ms +peer1.org1.example.com | [041 04-21 03:28:44.95 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] isn't responsive: EOF +peer1.org1.example.com | [042 04-21 03:28:44.95 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96]] +peer1.org1.example.com | [043 04-21 03:28:44.95 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96], Metadata: [] +peer1.org1.example.com | [044 04-21 03:28:44.95 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org1.example.com | [045 04-21 03:28:44.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 36ms (state_validation=0ms block_commit=24ms state_commit=6ms) +peer1.org1.example.com | [046 04-21 03:28:48.14 UTC] [%{longpkg}] %{callpath} -> INFO [][2a655403] Entry chaincode: name:"lscc" +peer1.org1.example.com | [047 04-21 03:28:48.14 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org1.example.com | [048 04-21 03:28:48.14 UTC] [%{longpkg}] %{callpath} -> INFO [][2a655403] Exit chaincode: name:"lscc" (1ms) +peer1.org1.example.com | [049 04-21 03:29:28.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org1.example.com | [04a 04-21 03:29:28.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 4ms +peer1.org1.example.com | [04b 04-21 03:29:28.68 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer1.org1.example.com | [04c 04-21 03:29:28.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 35ms (state_validation=0ms block_commit=26ms state_commit=4ms) +peer1.org1.example.com | [04d 04-21 03:30:05.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer1.org1.example.com | [04e 04-21 03:30:05.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 0ms +peer1.org1.example.com | [04f 04-21 03:30:05.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=24ms state_commit=5ms) +peer1.org1.example.com | [050 04-21 03:30:08.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org1.example.com | [051 04-21 03:30:08.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 4ms +peer1.org1.example.com | [052 04-21 03:30:08.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 31ms (state_validation=0ms block_commit=23ms state_commit=6ms) +peer1.org1.example.com | [053 04-21 03:30:10.55 UTC] [%{longpkg}] %{callpath} -> INFO [][c054a53b] Entry chaincode: name:"lscc" +peer1.org1.example.com | [054 04-21 03:30:10.55 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.1] to peer +peer1.org1.example.com | [055 04-21 03:30:10.55 UTC] [%{longpkg}] %{callpath} -> INFO [][c054a53b] Exit chaincode: name:"lscc" (1ms) +peer1.org1.example.com | [056 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org1.example.com | [057 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO Find chaincode upgrade transaction for chaincode exp02 on channel businesschannel with new version 1.1 +peer1.org1.example.com | [058 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 1ms +peer1.org1.example.com | [059 04-21 03:30:47.80 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer1.org1.example.com | [05a 04-21 03:30:47.84 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 41ms (state_validation=0ms block_commit=26ms state_commit=8ms) +peer1.org1.example.com | [05b 04-21 03:31:38.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [7] from buffer +peer1.org1.example.com | [05c 04-21 03:31:38.54 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 0a074f7267314d535012aa062d2d2d2d2d424547494e2043455254494649434154452d2d2d2d2d0a4d4949434b6a43434164436741774942416749515466737132677a384e6f5741315a6d5a615a396f6f6a414b42676771686b6a4f50515144416a427a4d5173770a435159445651514745774a56557a45544d4245474131554543424d4b5132467361575a76636d3570595445574d4251474131554542784d4e5532467549455a790a5957356a61584e6a627a455a4d4263474131554543684d5162334a6e4d53356c654746746347786c4c6d4e76625445634d426f474131554541784d54593245750a62334a6e4d53356c654746746347786c4c6d4e7662544165467730784f4445794d546b774f4445324d444261467730794f4445794d5459774f4445324d4442610a4d477778437a414a42674e5642415954416c56544d524d77455159445651514945777044595778705a6d3979626d6c684d5259774641594456515148457731540a59573467526e4a68626d4e7063324e764d513877445159445651514c45775a6a62476c6c626e5178487a416442674e5642414d4d466b466b62576c75514739790a5a7a45755a586868625842735a53356a623230775754415442676371686b6a4f5051494242676771686b6a4f50514d4242774e43414154552b553950474f78480a636b585772723649773174423350656f466a5a3457335257772b76554638315036367871677a676f67616431384f314a59306e464f31734737564830754632360a727a365a78474a75354356486f303077537a414f42674e56485138424166384542414d434234417744415944565230544151482f424149774144417242674e560a48534d454a4441696743414a59542f41317a304d653172754a4639626a516a7754655a7943416b4e6c354f5172424e47544f34566444414b42676771686b6a4f0a5051514441674e4941444246416945413952516646343261334f505464374d68354f78707251685935657164364f4c38314d6c577a706d7469775943494750350a584b6e39695a745039656a7a4f384a38566d496c4d504e33653173614d75772b66396a4964722f500a2d2d2d2d2d454e442043455254494649434154452d2d2d2d2d0a at index 2 in signature set +peer1.org2.example.com | [02d 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer1.org2.example.com | [02e 04-21 03:28:39.51 UTC] [%{longpkg}] %{callpath} -> INFO [][a3068984] Exit chaincode: name:"cscc" (64ms) +peer1.org2.example.com | [02f 04-21 03:28:40.53 UTC] [%{longpkg}] %{callpath} -> INFO [][ae9c46d6] Entry chaincode: name:"cscc" +peer1.org2.example.com | [030 04-21 03:28:40.53 UTC] [%{longpkg}] %{callpath} -> INFO [][ae9c46d6] Exit chaincode: name:"cscc" (1ms) +peer1.org2.example.com | [031 04-21 03:28:41.48 UTC] [%{longpkg}] %{callpath} -> INFO [][fa818afb] Entry chaincode: name:"qscc" +peer1.org2.example.com | [032 04-21 03:28:41.48 UTC] [%{longpkg}] %{callpath} -> INFO [][fa818afb] Exit chaincode: name:"qscc" (2ms) +peer1.org2.example.com | [033 04-21 03:28:45.27 UTC] [%{longpkg}] %{callpath} -> INFO [113 186 36 107 190 117 120 205 180 193 101 183 33 93 178 229 154 35 224 253 25 224 238 154 135 61 151 143 78 39 156 154] : Some peer is already a leader +peer1.org2.example.com | [034 04-21 03:28:45.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org2.example.com | [035 04-21 03:28:45.30 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [036 04-21 03:28:45.30 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [037 04-21 03:28:45.30 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [038 04-21 03:28:45.30 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org2.example.com | [039 04-21 03:28:45.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 28ms +peer1.org2.example.com | [03a 04-21 03:28:45.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=17ms state_commit=4ms) +peer1.org2.example.com | [03b 04-21 03:28:45.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org2.example.com | [03c 04-21 03:28:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [03d 04-21 03:28:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [03e 04-21 03:28:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [03f 04-21 03:28:45.38 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org2.example.com | [040 04-21 03:28:45.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 65ms +peer1.org2.example.com | [041 04-21 03:28:45.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=17ms state_commit=4ms) +peer1.org2.example.com | [042 04-21 03:28:45.46 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] isn't responsive: EOF +peer1.org2.example.com | [043 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96]] +peer1.org2.example.com | [044 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96], Metadata: [] +peer1.org2.example.com | [045 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org2.example.com | [046 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] isn't responsive: EOF +peer1.org2.example.com | [047 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67]] +peer1.org2.example.com | [048 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67], Metadata: [] +peer1.org2.example.com | [049 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org2.example.com | [04a 04-21 03:28:50.32 UTC] [%{longpkg}] %{callpath} -> INFO [][0df90131] Entry chaincode: name:"lscc" +peer1.org2.example.com | [04b 04-21 03:28:50.32 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org2.example.com | [04c 04-21 03:28:50.32 UTC] [%{longpkg}] %{callpath} -> INFO [][0df90131] Exit chaincode: name:"lscc" (2ms) +peer1.org2.example.com | [04d 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org2.example.com | [04e 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 2ms +peer1.org2.example.com | [04f 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer1.org2.example.com | [050 04-21 03:29:28.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 35ms (state_validation=1ms block_commit=16ms state_commit=11ms) +peer1.org2.example.com | [051 04-21 03:29:29.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][06a4d0a2] Entry chaincode: name:"exp02" +peer1.org2.example.com | [052 04-21 03:29:29.34 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer1.org2.example.com | [053 04-21 03:29:29.34 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental +peer1.org2.example.com | [054 04-21 03:30:03.73 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][06a4d0a2] Exit chaincode: name:"exp02" (34432ms) +peer1.org2.example.com | [055 04-21 03:30:04.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cc8ddca8] Entry chaincode: name:"exp02" +peer1.org2.example.com | [056 04-21 03:30:04.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cc8ddca8] Exit chaincode: name:"exp02" (3ms) +peer1.org2.example.com | [057 04-21 03:30:05.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer1.org2.example.com | [058 04-21 03:30:05.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 1ms +peer1.org2.example.com | [059 04-21 03:30:05.98 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 32ms (state_validation=0ms block_commit=23ms state_commit=4ms) +peer1.org2.example.com | [05a 04-21 03:30:06.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][57b23f2f] Entry chaincode: name:"exp02" +peer1.org2.example.com | [05b 04-21 03:30:06.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][57b23f2f] Exit chaincode: name:"exp02" (4ms) +peer1.org2.example.com | [05c 04-21 03:30:06.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][70b41d35] Entry chaincode: name:"exp02" +peer1.org2.example.com | [05d 04-21 03:30:06.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][70b41d35] Exit chaincode: name:"exp02" (5ms) +peer1.org2.example.com | [05e 04-21 03:30:08.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org2.example.com | [05f 04-21 03:30:08.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 1ms +peer1.org2.example.com | [060 04-21 03:30:08.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 32ms (state_validation=0ms block_commit=22ms state_commit=6ms) +peer1.org2.example.com | [061 04-21 03:30:11.96 UTC] [%{longpkg}] %{callpath} -> INFO [][0a9a7f16] Entry chaincode: name:"lscc" +peer1.org2.example.com | [062 04-21 03:30:11.96 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.1] to peer +peer1.org2.example.com | [063 04-21 03:30:11.96 UTC] [%{longpkg}] %{callpath} -> INFO [][0a9a7f16] Exit chaincode: name:"lscc" (1ms) +peer1.org2.example.com | [064 04-21 03:30:47.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org2.example.com | [065 04-21 03:30:47.80 UTC] [%{longpkg}] %{callpath} -> INFO Find chaincode upgrade transaction for chaincode exp02 on channel businesschannel with new version 1.1 +peer1.org2.example.com | [066 04-21 03:30:47.80 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 1ms +peer1.org2.example.com | [067 04-21 03:30:47.80 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer1.org2.example.com | [068 04-21 03:30:47.84 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 40ms (state_validation=1ms block_commit=26ms state_commit=5ms) +peer1.org2.example.com | [069 04-21 03:30:48.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7d17641a] Entry chaincode: name:"exp02" +peer1.org2.example.com | [06a 04-21 03:30:48.42 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer1.org2.example.com | [06b 04-21 03:30:48.42 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental +peer1.org2.example.com | [06c 04-21 03:31:21.25 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7d17641a] Exit chaincode: name:"exp02" (32879ms) +peer1.org2.example.com | [06d 04-21 03:31:38.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [7] from buffer +peer1.org2.example.com | [06e 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +peer1.org2.example.com | [06f 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +peer1.org2.example.com | [070 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org2.example.com | [071 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [072 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [073 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org2.example.com | [074 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org2.example.com | [075 04-21 03:31:38.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [7] in 49ms +peer1.org2.example.com | [076 04-21 03:31:38.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [7] with 1 transaction(s) in 43ms (state_validation=0ms block_commit=32ms state_commit=5ms) +peer1.org2.example.com | [077 04-21 03:31:48.74 UTC] [%{longpkg}] %{callpath} -> INFO [][3ff487b9] Entry chaincode: name:"cscc" +peer1.org2.example.com | [078 04-21 03:31:48.74 UTC] [%{longpkg}] %{callpath} -> INFO [][3ff487b9] Exit chaincode: name:"cscc" (1ms) +peer1.org2.example.com | [079 04-21 03:31:49.68 UTC] [%{longpkg}] %{callpath} -> INFO [][95498b32] Entry chaincode: name:"qscc" +peer1.org2.example.com | [07a 04-21 03:31:49.68 UTC] [%{longpkg}] %{callpath} -> INFO [][95498b32] Exit chaincode: name:"qscc" (1ms) +peer1.org1.example.com | [05d 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +peer1.org1.example.com | [05e 04-21 03:31:38.61 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer1.org1.example.com | [05f 04-21 03:31:38.61 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer1.org1.example.com | [060 04-21 03:31:38.61 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [061 04-21 03:31:38.62 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [062 04-21 03:31:38.63 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [063 04-21 03:31:38.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [7] in 138ms +peer1.org1.example.com | [064 04-21 03:31:38.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [7] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=17ms state_commit=2ms) +peer1.org1.example.com | [065 04-21 03:31:38.85 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] isn't responsive: EOF +peer1.org1.example.com | [066 04-21 03:31:38.85 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67]] +peer1.org1.example.com | [067 04-21 03:31:38.85 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67], Metadata: [] +peer1.org1.example.com | [068 04-21 03:31:38.85 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org1.example.com | [069 04-21 03:31:48.44 UTC] [%{longpkg}] %{callpath} -> INFO [][31412dd2] Entry chaincode: name:"cscc" +peer1.org1.example.com | [06a 04-21 03:31:48.44 UTC] [%{longpkg}] %{callpath} -> INFO [][31412dd2] Exit chaincode: name:"cscc" (1ms) +peer1.org1.example.com | [06b 04-21 03:31:49.39 UTC] [%{longpkg}] %{callpath} -> INFO [][e8b84205] Entry chaincode: name:"qscc" +peer1.org1.example.com | [06c 04-21 03:31:49.40 UTC] [%{longpkg}] %{callpath} -> INFO [][e8b84205] Exit chaincode: name:"qscc" (1ms) +peer0.org2.example.com | [001 04-21 03:28:35.25 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: peer0.org2.example.com | Version: 1.3.0 peer0.org2.example.com | Commit SHA: development build peer0.org2.example.com | Go version: go1.10.4 peer0.org2.example.com | OS/Arch: linux/amd64 peer0.org2.example.com | Experimental features: true -peer1.org1.example.com | [055 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer1.org1.example.com | [056 12-19 08:23:17.97 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -peer1.org1.example.com | [057 12-19 08:23:17.98 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer1.org1.example.com | [058 12-19 08:23:17.98 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -peer1.org1.example.com | [059 12-19 08:23:18.00 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer1.org1.example.com | [05a 12-19 08:23:18.00 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -peer1.org1.example.com | [05b 12-19 08:23:18.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 151ms -peer1.org1.example.com | [05c 12-19 08:23:18.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 41ms (state_validation=0ms block_commit=18ms state_commit=20ms) -peer1.org1.example.com | [05d 12-19 08:23:18.25 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] isn't responsive: EOF -peer1.org1.example.com | [05e 12-19 08:23:18.25 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67]] -peer1.org1.example.com | [05f 12-19 08:23:18.25 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67], Metadata: [] -peer1.org1.example.com | [060 12-19 08:23:18.25 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -peer1.org1.example.com | [061 12-19 08:23:31.28 UTC] [%{longpkg}] %{callpath} -> INFO [][0471006d] Entry chaincode: name:"cscc" -peer1.org1.example.com | [062 12-19 08:23:31.28 UTC] [%{longpkg}] %{callpath} -> INFO [][0471006d] Exit chaincode: name:"cscc" (1ms) -peer1.org1.example.com | [063 12-19 08:23:32.32 UTC] [%{longpkg}] %{callpath} -> INFO [][db357b1e] Entry chaincode: name:"qscc" -peer1.org1.example.com | [064 12-19 08:23:32.32 UTC] [%{longpkg}] %{callpath} -> INFO [][db357b1e] Exit chaincode: name:"qscc" (1ms) peer0.org2.example.com | Chaincode: peer0.org2.example.com | Base Image Version: 0.4.13 peer0.org2.example.com | Base Docker Namespace: hyperledger peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric peer0.org2.example.com | Docker Namespace: hyperledger -peer0.org2.example.com | [002 12-19 08:21:09.51 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -peer0.org2.example.com | [003 12-19 08:21:09.51 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -peer0.org2.example.com | [004 12-19 08:21:09.61 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -peer0.org2.example.com | [005 12-19 08:21:09.63 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -peer0.org2.example.com | [006 12-19 08:21:09.63 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.4:7051 -peer0.org2.example.com | [007 12-19 08:21:09.63 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 -peer0.org2.example.com | [008 12-19 08:21:09.63 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.4:7051 -peer0.org2.example.com | [009 12-19 08:21:09.63 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 -peer0.org2.example.com | [00a 12-19 08:21:09.65 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -peer0.org2.example.com | [00b 12-19 08:21:09.67 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com -peer0.org2.example.com | [00c 12-19 08:21:09.67 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org2.example.com:7052 -peer0.org2.example.com | [00d 12-19 08:21:09.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -peer0.org2.example.com | [00e 12-19 08:21:09.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -peer0.org2.example.com | [00f 12-19 08:21:09.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -peer0.org2.example.com | [010 12-19 08:21:09.69 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -peer0.org2.example.com | [011 12-19 08:21:09.71 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] -peer0.org2.example.com | [012 12-19 08:21:09.72 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer0.org2.example.com:7051 [] [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] peer0.org2.example.com:7051 } -peer0.org2.example.com | [013 12-19 08:21:09.72 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org2.example.com:7051 started -peer0.org2.example.com | [014 12-19 08:21:09.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer0.org2.example.com | [015 12-19 08:21:09.73 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer0.org2.example.com | [016 12-19 08:21:09.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer0.org2.example.com | [017 12-19 08:21:09.73 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org2.example.com | [018 12-19 08:21:09.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org2.example.com | [019 12-19 08:21:09.73 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org2.example.com | [01a 12-19 08:21:09.73 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -peer0.org2.example.com | [01b 12-19 08:21:09.74 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -peer0.org2.example.com | [01c 12-19 08:21:09.74 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -peer0.org2.example.com | [01d 12-19 08:21:09.74 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] -peer0.org2.example.com | [01e 12-19 08:21:09.74 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] -peer0.org2.example.com | [01f 12-19 08:21:14.87 UTC] [%{longpkg}] %{callpath} -> INFO [][83fab60d] Entry chaincode: name:"cscc" -peer0.org2.example.com | [020 12-19 08:21:14.89 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -peer0.org2.example.com | [021 12-19 08:21:14.90 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -peer0.org2.example.com | [022 12-19 08:21:14.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 36ms (state_validation=1ms block_commit=21ms state_commit=9ms) -peer0.org2.example.com | [023 12-19 08:21:14.96 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -peer0.org2.example.com | [024 12-19 08:21:14.97 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer0.org2.example.com | [025 12-19 08:21:14.97 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer0.org2.example.com | [026 12-19 08:21:14.97 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -peer0.org2.example.com | [027 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -peer0.org2.example.com | [028 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer0.org2.example.com | [029 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer0.org2.example.com | [02a 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer0.org2.example.com | [02b 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org2.example.com | [02c 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org2.example.com | [02d 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org2.example.com | [02e 12-19 08:21:15.00 UTC] [%{longpkg}] %{callpath} -> INFO [][83fab60d] Exit chaincode: name:"cscc" (126ms) -peer0.org2.example.com | [02f 12-19 08:21:16.02 UTC] [%{longpkg}] %{callpath} -> INFO [][fb314f3e] Entry chaincode: name:"cscc" -peer0.org2.example.com | [030 12-19 08:21:16.02 UTC] [%{longpkg}] %{callpath} -> INFO [][fb314f3e] Exit chaincode: name:"cscc" (1ms) -peer0.org2.example.com | [031 12-19 08:21:17.00 UTC] [%{longpkg}] %{callpath} -> INFO [][0d93a832] Entry chaincode: name:"qscc" -peer0.org2.example.com | [032 12-19 08:21:17.00 UTC] [%{longpkg}] %{callpath} -> INFO [][0d93a832] Exit chaincode: name:"qscc" (1ms) -peer0.org2.example.com | [033 12-19 08:21:21.00 UTC] [%{longpkg}] %{callpath} -> INFO [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] : Becoming a leader -peer0.org2.example.com | [034 12-19 08:21:21.00 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel -peer0.org2.example.com | [035 12-19 08:21:21.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -peer0.org2.example.com | [036 12-19 08:21:21.03 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer0.org2.example.com | [037 12-19 08:21:21.03 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org2.example.com | [038 12-19 08:21:21.03 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer0.org2.example.com | [039 12-19 08:21:21.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 33ms -peer0.org2.example.com | [03a 12-19 08:21:21.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 14ms (state_validation=0ms block_commit=10ms state_commit=2ms) -peer0.org2.example.com | [03b 12-19 08:21:21.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -peer0.org2.example.com | [03c 12-19 08:21:21.08 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer0.org2.example.com | [03d 12-19 08:21:21.08 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org2.example.com | [03e 12-19 08:21:21.08 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer0.org2.example.com | [03f 12-19 08:21:21.08 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -peer0.org2.example.com | [040 12-19 08:21:21.10 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] isn't responsive: EOF -peer0.org2.example.com | [041 12-19 08:21:21.11 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96]] -peer0.org2.example.com | [042 12-19 08:21:21.11 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96], Metadata: [] -peer0.org2.example.com | [043 12-19 08:21:21.11 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -peer0.org2.example.com | [044 12-19 08:21:21.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 43ms -peer0.org2.example.com | [045 12-19 08:21:21.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 26ms (state_validation=8ms block_commit=12ms state_commit=3ms) -peer0.org2.example.com | [046 12-19 08:21:28.68 UTC] [%{longpkg}] %{callpath} -> INFO [][76c073eb] Entry chaincode: name:"lscc" -peer0.org2.example.com | [047 12-19 08:21:28.68 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -peer0.org2.example.com | [048 12-19 08:21:28.68 UTC] [%{longpkg}] %{callpath} -> INFO [][76c073eb] Exit chaincode: name:"lscc" (1ms) -peer0.org2.example.com | [049 12-19 08:22:23.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -peer0.org2.example.com | [04a 12-19 08:22:23.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 3ms -peer0.org2.example.com | [04b 12-19 08:22:23.35 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] -peer0.org2.example.com | [04c 12-19 08:22:23.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 35ms (state_validation=0ms block_commit=24ms state_commit=5ms) -peer0.org2.example.com | [04d 12-19 08:23:01.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -peer0.org2.example.com | [04e 12-19 08:23:01.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 0ms -peer0.org2.example.com | [04f 12-19 08:23:01.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 31ms (state_validation=0ms block_commit=19ms state_commit=4ms) -peer0.org2.example.com | [050 12-19 08:23:04.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -peer0.org2.example.com | [051 12-19 08:23:04.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 2ms -peer0.org2.example.com | [052 12-19 08:23:04.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 38ms (state_validation=0ms block_commit=22ms state_commit=5ms) -peer0.org2.example.com | [053 12-19 08:23:17.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -peer0.org2.example.com | [054 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer0.org2.example.com | [055 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer0.org2.example.com | [056 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -peer0.org2.example.com | [057 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org2.example.com | [058 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer0.org2.example.com | [059 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -peer0.org1.example.com | [001 12-19 08:21:10.75 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: -peer0.org1.example.com | Version: 1.3.0 -peer0.org1.example.com | Commit SHA: development build -peer0.org1.example.com | Go version: go1.10.4 -peer0.org1.example.com | OS/Arch: linux/amd64 -peer0.org1.example.com | Experimental features: true -peer0.org1.example.com | Chaincode: -peer0.org1.example.com | Base Image Version: 0.4.13 -peer0.org1.example.com | Base Docker Namespace: hyperledger -peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric -peer0.org1.example.com | Docker Namespace: hyperledger -peer0.org1.example.com | [002 12-19 08:21:10.75 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -peer0.org1.example.com | [003 12-19 08:21:10.75 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -peer0.org1.example.com | [004 12-19 08:21:10.93 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -peer0.org1.example.com | [005 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -peer0.org1.example.com | [006 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 -peer0.org1.example.com | [007 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -peer0.org1.example.com | [008 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 -peer0.org1.example.com | [009 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -peer0.org1.example.com | [00a 12-19 08:21:11.01 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -peer0.org1.example.com | [00b 12-19 08:21:11.04 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com -peer0.org1.example.com | [00c 12-19 08:21:11.04 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 -peer0.org1.example.com | [00d 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -peer0.org1.example.com | [00e 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -peer0.org1.example.com | [00f 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -peer0.org1.example.com | [010 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -peer0.org1.example.com | [011 12-19 08:21:11.09 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] -peer0.org1.example.com | [012 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer0.org1.example.com:7051 [] [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] peer0.org1.example.com:7051 } -peer0.org1.example.com | [013 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started -peer0.org1.example.com | [014 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer0.org1.example.com | [015 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer0.org1.example.com | [016 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer0.org1.example.com | [017 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org1.example.com | [018 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org1.example.com | [019 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org1.example.com | [01a 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -peer0.org1.example.com | [01b 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -peer0.org1.example.com | [01c 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -peer0.org1.example.com | [01d 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -peer0.org1.example.com | [01e 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -peer0.org1.example.com | [01f 12-19 08:21:14.13 UTC] [%{longpkg}] %{callpath} -> INFO [][bce1f816] Entry chaincode: name:"cscc" -peer0.org1.example.com | [020 12-19 08:21:14.13 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -peer0.org1.example.com | [021 12-19 08:21:14.13 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -peer0.org1.example.com | [022 12-19 08:21:14.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 14ms (state_validation=0ms block_commit=9ms state_commit=2ms) -peer0.org1.example.com | [023 12-19 08:21:14.16 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -peer0.org1.example.com | [024 12-19 08:21:14.17 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer0.org1.example.com | [025 12-19 08:21:14.17 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -peer0.org1.example.com | [026 12-19 08:21:14.17 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer0.org1.example.com | [027 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -peer0.org1.example.com | [028 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer0.org1.example.com | [029 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer0.org2.example.com | [05a 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -peer0.org2.example.com | [05b 12-19 08:23:17.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 65ms -peer0.org2.example.com | [05c 12-19 08:23:18.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 89ms (state_validation=1ms block_commit=12ms state_commit=32ms) -peer0.org2.example.com | [05d 12-19 08:23:31.48 UTC] [%{longpkg}] %{callpath} -> INFO [][a10442ed] Entry chaincode: name:"cscc" -peer0.org2.example.com | [05e 12-19 08:23:31.48 UTC] [%{longpkg}] %{callpath} -> INFO [][a10442ed] Exit chaincode: name:"cscc" (1ms) -peer0.org2.example.com | [05f 12-19 08:23:32.48 UTC] [%{longpkg}] %{callpath} -> INFO [][aca81974] Entry chaincode: name:"qscc" -peer0.org2.example.com | [060 12-19 08:23:32.48 UTC] [%{longpkg}] %{callpath} -> INFO [][aca81974] Exit chaincode: name:"qscc" (1ms) -peer0.org1.example.com | [02a 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer0.org1.example.com | [02b 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer0.org1.example.com | [02c 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer0.org1.example.com | [02d 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer0.org1.example.com | [02e 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO [][bce1f816] Exit chaincode: name:"cscc" (60ms) -peer0.org1.example.com | [02f 12-19 08:21:15.71 UTC] [%{longpkg}] %{callpath} -> INFO [][12bf6290] Entry chaincode: name:"cscc" -peer0.org1.example.com | [030 12-19 08:21:15.71 UTC] [%{longpkg}] %{callpath} -> INFO [][12bf6290] Exit chaincode: name:"cscc" (1ms) -peer0.org1.example.com | [031 12-19 08:21:16.63 UTC] [%{longpkg}] %{callpath} -> INFO [][2bea5f62] Entry chaincode: name:"qscc" -peer0.org1.example.com | [032 12-19 08:21:16.63 UTC] [%{longpkg}] %{callpath} -> INFO [][2bea5f62] Exit chaincode: name:"qscc" (1ms) -peer0.org1.example.com | [033 12-19 08:21:20.19 UTC] [%{longpkg}] %{callpath} -> INFO [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] : Becoming a leader -peer0.org1.example.com | [034 12-19 08:21:20.19 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel -peer0.org1.example.com | [035 12-19 08:21:20.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -peer0.org1.example.com | [036 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer0.org1.example.com | [037 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer0.org1.example.com | [038 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org1.example.com | [039 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -peer0.org1.example.com | [03a 12-19 08:21:20.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 86ms -peer0.org1.example.com | [03b 12-19 08:21:20.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 21ms (state_validation=0ms block_commit=15ms state_commit=2ms) -peer0.org1.example.com | [03c 12-19 08:21:20.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -peer0.org1.example.com | [03d 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer0.org1.example.com | [03e 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer0.org1.example.com | [03f 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org1.example.com | [040 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -peer0.org1.example.com | [041 12-19 08:21:20.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 34ms -peer0.org1.example.com | [042 12-19 08:21:20.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=21ms state_commit=2ms) -peer0.org1.example.com | [043 12-19 08:21:27.11 UTC] [%{longpkg}] %{callpath} -> INFO [][01b2a3f6] Entry chaincode: name:"lscc" -peer0.org1.example.com | [044 12-19 08:21:27.11 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -peer0.org1.example.com | [045 12-19 08:21:27.11 UTC] [%{longpkg}] %{callpath} -> INFO [][01b2a3f6] Exit chaincode: name:"lscc" (1ms) -peer0.org1.example.com | [046 12-19 08:21:30.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3e1a5dc7] Entry chaincode: name:"lscc" -peer0.org1.example.com | [047 12-19 08:21:30.12 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' -peer0.org1.example.com | [048 12-19 08:21:30.12 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental -peer0.org1.example.com | [049 12-19 08:22:21.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3e1a5dc7] Exit chaincode: name:"lscc" (51306ms) -peer0.org1.example.com | [04a 12-19 08:22:23.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -peer0.org1.example.com | [04b 12-19 08:22:23.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 3ms -peer0.org1.example.com | [04c 12-19 08:22:23.36 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] -peer0.org1.example.com | [04d 12-19 08:22:23.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 44ms (state_validation=1ms block_commit=36ms state_commit=3ms) -peer0.org1.example.com | [04e 12-19 08:22:59.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cf3ed3f7] Entry chaincode: name:"exp02" -peer0.org1.example.com | [04f 12-19 08:22:59.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cf3ed3f7] Exit chaincode: name:"exp02" (6ms) -peer0.org1.example.com | [050 12-19 08:23:01.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -peer0.org1.example.com | [051 12-19 08:23:01.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 0ms -peer0.org1.example.com | [052 12-19 08:23:01.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=17ms state_commit=4ms) -peer0.org1.example.com | [053 12-19 08:23:02.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][16f7dde8] Entry chaincode: name:"exp02" -peer0.org1.example.com | [054 12-19 08:23:02.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][16f7dde8] Exit chaincode: name:"exp02" (2ms) -peer0.org1.example.com | [055 12-19 08:23:04.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -peer0.org1.example.com | [056 12-19 08:23:04.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 3ms -peer0.org1.example.com | [057 12-19 08:23:04.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 33ms (state_validation=0ms block_commit=24ms state_commit=2ms) -peer0.org1.example.com | [058 12-19 08:23:04.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][353f421e] Entry chaincode: name:"exp02" -peer0.org1.example.com | [059 12-19 08:23:04.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][353f421e] Exit chaincode: name:"exp02" (3ms) -peer0.org1.example.com | [05a 12-19 08:23:05.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b7c66e39] Entry chaincode: name:"lscc" -peer0.org1.example.com | [05b 12-19 08:23:05.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b7c66e39] Exit chaincode: name:"lscc" (0ms) -peer0.org1.example.com | [05c 12-19 08:23:05.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d7a4c10e] Entry chaincode: name:"lscc" -peer0.org1.example.com | [05d 12-19 08:23:05.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d7a4c10e] Exit chaincode: name:"lscc" (1ms) -peer0.org1.example.com | [05e 12-19 08:23:05.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e19914d8] Entry chaincode: name:"lscc" -peer0.org1.example.com | [05f 12-19 08:23:05.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e19914d8] Exit chaincode: name:"lscc" (1ms) -peer0.org1.example.com | [060 12-19 08:23:05.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0f651a18] Entry chaincode: name:"lscc" -peer0.org1.example.com | [061 12-19 08:23:05.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0f651a18] Exit chaincode: name:"lscc" (1ms) -peer0.org1.example.com | [062 12-19 08:23:05.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ffcfc314] Entry chaincode: name:"lscc" -peer0.org1.example.com | [063 12-19 08:23:05.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ffcfc314] Exit chaincode: name:"lscc" (2ms) -peer0.org1.example.com | [064 12-19 08:23:06.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c89d660e] Entry chaincode: name:"qscc" -peer0.org1.example.com | [065 12-19 08:23:06.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c89d660e] Exit chaincode: name:"qscc" (1ms) -peer0.org1.example.com | [066 12-19 08:23:06.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a9365fbe] Entry chaincode: name:"qscc" -peer0.org1.example.com | [067 12-19 08:23:06.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a9365fbe] Exit chaincode: name:"qscc" (1ms) -peer0.org1.example.com | [068 12-19 08:23:07.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0bfb31ad] Entry chaincode: name:"cscc" -peer0.org1.example.com | [069 12-19 08:23:07.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0bfb31ad] Exit chaincode: name:"cscc" (1ms) -peer0.org1.example.com | [06a 12-19 08:23:07.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bf1c365] Entry chaincode: name:"cscc" -peer0.org1.example.com | [06b 12-19 08:23:07.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bf1c365] Exit chaincode: name:"cscc" (0ms) -peer0.org1.example.com | [06c 12-19 08:23:08.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][73f3820c] Entry chaincode: name:"cscc" -peer0.org1.example.com | [06d 12-19 08:23:08.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][73f3820c] Exit chaincode: name:"cscc" (0ms) -peer0.org1.example.com | [06e 12-19 08:23:17.87 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -peer0.org1.example.com | [06f 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer0.org1.example.com | [070 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer0.org1.example.com | [071 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -peer0.org1.example.com | [072 12-19 08:23:17.94 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer0.org1.example.com | [073 12-19 08:23:17.95 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -peer0.org1.example.com | [074 12-19 08:23:17.95 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer0.org1.example.com | [075 12-19 08:23:17.96 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -peer0.org1.example.com | [076 12-19 08:23:18.00 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 122ms -peer0.org1.example.com | [077 12-19 08:23:18.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 53ms (state_validation=0ms block_commit=14ms state_commit=11ms) -peer0.org1.example.com | [078 12-19 08:23:31.09 UTC] [%{longpkg}] %{callpath} -> INFO [][4b670541] Entry chaincode: name:"cscc" -peer0.org1.example.com | [079 12-19 08:23:31.09 UTC] [%{longpkg}] %{callpath} -> INFO [][4b670541] Exit chaincode: name:"cscc" (0ms) -peer0.org1.example.com | [07a 12-19 08:23:32.15 UTC] [%{longpkg}] %{callpath} -> INFO [][e9227326] Entry chaincode: name:"qscc" -peer0.org1.example.com | [07b 12-19 08:23:32.15 UTC] [%{longpkg}] %{callpath} -> INFO [][e9227326] Exit chaincode: name:"qscc" (1ms) -peer1.org2.example.com | [001 12-19 08:21:10.92 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: -peer1.org2.example.com | Version: 1.3.0 -peer1.org2.example.com | Commit SHA: development build -peer1.org2.example.com | Go version: go1.10.4 -peer1.org2.example.com | OS/Arch: linux/amd64 -peer1.org2.example.com | Experimental features: true -peer1.org2.example.com | Chaincode: -peer1.org2.example.com | Base Image Version: 0.4.13 -peer1.org2.example.com | Base Docker Namespace: hyperledger -peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric -peer1.org2.example.com | Docker Namespace: hyperledger -peer1.org2.example.com | [002 12-19 08:21:10.92 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -peer1.org2.example.com | [003 12-19 08:21:10.92 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -peer1.org2.example.com | [004 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -peer1.org2.example.com | [005 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -peer1.org2.example.com | [006 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 -peer1.org2.example.com | [007 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 -peer1.org2.example.com | [008 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 -peer1.org2.example.com | [009 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 -peer1.org2.example.com | [00a 12-19 08:21:11.15 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -peer1.org2.example.com | [00b 12-19 08:21:11.18 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com -peer1.org2.example.com | [00c 12-19 08:21:11.18 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org2.example.com:7052 -peer1.org2.example.com | [00d 12-19 08:21:11.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -peer1.org2.example.com | [00e 12-19 08:21:11.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -peer1.org2.example.com | [00f 12-19 08:21:11.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -peer1.org2.example.com | [010 12-19 08:21:11.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -peer1.org2.example.com | [011 12-19 08:21:11.22 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] -peer1.org2.example.com | [012 12-19 08:21:11.23 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer1.org2.example.com:7051 [] [113 186 36 107 190 117 120 205 180 193 101 183 33 93 178 229 154 35 224 253 25 224 238 154 135 61 151 143 78 39 156 154] peer1.org2.example.com:7051 } -peer1.org2.example.com | [013 12-19 08:21:11.23 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org2.example.com:7051 started -peer1.org2.example.com | [014 12-19 08:21:11.24 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org2.example.com | [015 12-19 08:21:11.25 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org2.example.com | [016 12-19 08:21:11.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org2.example.com | [017 12-19 08:21:11.26 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer1.org2.example.com | [018 12-19 08:21:11.26 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer1.org2.example.com | [019 12-19 08:21:11.26 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer1.org2.example.com | [01a 12-19 08:21:11.26 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -peer1.org2.example.com | [01b 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -peer1.org2.example.com | [01c 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -peer1.org2.example.com | [01d 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] -peer1.org2.example.com | [01e 12-19 08:21:11.27 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] -peer1.org2.example.com | [01f 12-19 08:21:15.18 UTC] [%{longpkg}] %{callpath} -> INFO [][b03c0f0d] Entry chaincode: name:"cscc" -peer1.org2.example.com | [020 12-19 08:21:15.18 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -peer1.org2.example.com | [021 12-19 08:21:15.18 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -peer1.org2.example.com | [022 12-19 08:21:15.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=0ms block_commit=10ms state_commit=2ms) -peer1.org2.example.com | [023 12-19 08:21:15.21 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -peer1.org2.example.com | [024 12-19 08:21:15.22 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org2.example.com | [025 12-19 08:21:15.22 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -peer1.org2.example.com | [026 12-19 08:21:15.22 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer1.org2.example.com | [027 12-19 08:21:15.25 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -peer1.org2.example.com | [028 12-19 08:21:15.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -peer1.org2.example.com | [029 12-19 08:21:15.25 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -peer1.org2.example.com | [02a 12-19 08:21:15.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -peer1.org2.example.com | [02b 12-19 08:21:15.25 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -peer1.org2.example.com | [02c 12-19 08:21:15.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -peer1.org2.example.com | [02d 12-19 08:21:15.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -peer1.org2.example.com | [02e 12-19 08:21:15.26 UTC] [%{longpkg}] %{callpath} -> INFO [][b03c0f0d] Exit chaincode: name:"cscc" (76ms) -peer1.org2.example.com | [02f 12-19 08:21:16.18 UTC] [%{longpkg}] %{callpath} -> INFO [][b5a51672] Entry chaincode: name:"cscc" -peer1.org2.example.com | [030 12-19 08:21:16.18 UTC] [%{longpkg}] %{callpath} -> INFO [][b5a51672] Exit chaincode: name:"cscc" (1ms) -peer1.org2.example.com | [031 12-19 08:21:17.17 UTC] [%{longpkg}] %{callpath} -> INFO [][0507bc1e] Entry chaincode: name:"qscc" -peer1.org2.example.com | [032 12-19 08:21:17.17 UTC] [%{longpkg}] %{callpath} -> INFO [][0507bc1e] Exit chaincode: name:"qscc" (1ms) -peer1.org2.example.com | [033 12-19 08:21:21.01 UTC] [%{longpkg}] %{callpath} -> INFO [113 186 36 107 190 117 120 205 180 193 101 183 33 93 178 229 154 35 224 253 25 224 238 154 135 61 151 143 78 39 156 154] : Some peer is already a leader -peer1.org2.example.com | [034 12-19 08:21:21.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -peer1.org2.example.com | [035 12-19 08:21:21.07 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org2.example.com | [036 12-19 08:21:21.07 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -peer1.org2.example.com | [037 12-19 08:21:21.07 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer1.org2.example.com | [038 12-19 08:21:21.10 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -peer1.org2.example.com | [039 12-19 08:21:21.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 102ms -peer1.org2.example.com | [03a 12-19 08:21:21.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 20ms (state_validation=0ms block_commit=11ms state_commit=2ms) -peer1.org2.example.com | [03b 12-19 08:21:21.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -peer1.org2.example.com | [03c 12-19 08:21:21.18 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -peer1.org2.example.com | [03d 12-19 08:21:21.18 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer1.org2.example.com | [03e 12-19 08:21:21.19 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer1.org2.example.com | [03f 12-19 08:21:21.19 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -peer1.org2.example.com | [040 12-19 08:21:21.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 69ms -peer1.org2.example.com | [041 12-19 08:21:21.24 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] isn't responsive: EOF -peer1.org2.example.com | [042 12-19 08:21:21.24 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67]] -peer1.org2.example.com | [043 12-19 08:21:21.24 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67], Metadata: [] -peer1.org2.example.com | [044 12-19 08:21:21.24 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -peer1.org2.example.com | [045 12-19 08:21:21.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 48ms (state_validation=0ms block_commit=37ms state_commit=3ms) -peer1.org2.example.com | [046 12-19 08:21:22.85 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] isn't responsive: rpc error: code = Unavailable desc = transport is closing -peer1.org2.example.com | [047 12-19 08:21:22.85 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96]] -peer1.org2.example.com | [048 12-19 08:21:22.85 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96], Metadata: [] -peer1.org2.example.com | [049 12-19 08:21:22.85 UTC] [%{longpkg}] %{callpath} -> WARN Exiting -peer1.org2.example.com | [04a 12-19 08:21:29.59 UTC] [%{longpkg}] %{callpath} -> INFO [][b9dee5c7] Entry chaincode: name:"lscc" -peer1.org2.example.com | [04b 12-19 08:21:29.59 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -peer1.org2.example.com | [04c 12-19 08:21:29.59 UTC] [%{longpkg}] %{callpath} -> INFO [][b9dee5c7] Exit chaincode: name:"lscc" (1ms) -peer1.org2.example.com | [04d 12-19 08:22:23.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -peer1.org2.example.com | [04e 12-19 08:22:23.36 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 1ms -peer1.org2.example.com | [04f 12-19 08:22:23.37 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] -peer1.org2.example.com | [050 12-19 08:22:23.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=21ms state_commit=10ms) -peer1.org2.example.com | [051 12-19 08:22:24.13 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9761786e] Entry chaincode: name:"exp02" -peer1.org2.example.com | [052 12-19 08:22:24.14 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' -peer1.org2.example.com | [053 12-19 08:22:24.14 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental -peer1.org2.example.com | [054 12-19 08:22:59.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9761786e] Exit chaincode: name:"exp02" (35175ms) -peer1.org2.example.com | [055 12-19 08:22:59.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1242787f] Entry chaincode: name:"exp02" -peer1.org2.example.com | [056 12-19 08:22:59.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][1242787f] Exit chaincode: name:"exp02" (3ms) -peer1.org2.example.com | [057 12-19 08:23:01.47 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -peer1.org2.example.com | [058 12-19 08:23:01.47 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 0ms -peer1.org2.example.com | [059 12-19 08:23:01.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=14ms state_commit=3ms) -peer1.org2.example.com | [05a 12-19 08:23:01.85 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][907b2144] Entry chaincode: name:"exp02" -peer1.org2.example.com | [05b 12-19 08:23:01.86 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][907b2144] Exit chaincode: name:"exp02" (3ms) -peer1.org2.example.com | [05c 12-19 08:23:02.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c7602b2f] Entry chaincode: name:"exp02" -peer1.org2.example.com | [05d 12-19 08:23:02.04 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c7602b2f] Exit chaincode: name:"exp02" (9ms) -peer1.org2.example.com | [05e 12-19 08:23:04.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -peer1.org2.example.com | [05f 12-19 08:23:04.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 1ms -peer1.org2.example.com | [060 12-19 08:23:04.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 20ms (state_validation=0ms block_commit=14ms state_commit=2ms) -peer1.org2.example.com | [061 12-19 08:23:17.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -peer1.org2.example.com | [062 12-19 08:23:17.89 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer1.org2.example.com | [063 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -peer1.org2.example.com | [064 12-19 08:23:17.96 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -peer1.org2.example.com | [065 12-19 08:23:17.96 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -peer1.org2.example.com | [066 12-19 08:23:17.96 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -peer1.org2.example.com | [067 12-19 08:23:17.96 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -peer1.org2.example.com | [068 12-19 08:23:17.96 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found -peer1.org2.example.com | [069 12-19 08:23:17.99 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 99ms -peer1.org2.example.com | [06a 12-19 08:23:18.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 78ms (state_validation=0ms block_commit=37ms state_commit=29ms) -peer1.org2.example.com | [06b 12-19 08:23:31.64 UTC] [%{longpkg}] %{callpath} -> INFO [][154806cc] Entry chaincode: name:"cscc" -peer1.org2.example.com | [06c 12-19 08:23:31.64 UTC] [%{longpkg}] %{callpath} -> INFO [][154806cc] Exit chaincode: name:"cscc" (0ms) -peer1.org2.example.com | [06d 12-19 08:23:32.65 UTC] [%{longpkg}] %{callpath} -> INFO [][5ea6a013] Entry chaincode: name:"qscc" -peer1.org2.example.com | [06e 12-19 08:23:32.65 UTC] [%{longpkg}] %{callpath} -> INFO [][5ea6a013] Exit chaincode: name:"qscc" (1ms) -orderer0.example.com | 2018-12-19 08:21:07.968 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -orderer0.example.com | [002 12-19 08:21:08.09 UTC] [%{longpkg}] %{callpath} -> INFO Orderer config values: +peer0.org2.example.com | [002 04-21 03:28:35.25 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org2.example.com | [003 04-21 03:28:35.25 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org2.example.com | [004 04-21 03:28:35.35 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org2.example.com | [005 04-21 03:28:35.36 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org2.example.com | [006 04-21 03:28:35.36 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.4:7051 +peer0.org2.example.com | [007 04-21 03:28:35.36 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [008 04-21 03:28:35.36 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.4:7051 +peer0.org2.example.com | [009 04-21 03:28:35.36 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [00a 04-21 03:28:35.37 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org2.example.com | [00b 04-21 03:28:35.38 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com +peer0.org2.example.com | [00c 04-21 03:28:35.38 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org2.example.com:7052 +peer0.org2.example.com | [00d 04-21 03:28:35.40 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org2.example.com | [00e 04-21 03:28:35.40 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org2.example.com | [00f 04-21 03:28:35.40 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org2.example.com | [010 04-21 03:28:35.40 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered +peer0.org2.example.com | [011 04-21 03:28:35.42 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] +peer0.org2.example.com | [012 04-21 03:28:35.42 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer0.org2.example.com:7051 [] [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] peer0.org2.example.com:7051 } +peer0.org2.example.com | [013 04-21 03:28:35.42 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org2.example.com:7051 started +peer0.org2.example.com | [014 04-21 03:28:35.42 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [015 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [016 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [017 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [018 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [019 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer0.org2.example.com | [01a 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org2.example.com | [01b 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer0.org2.example.com | [01c 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer0.org2.example.com | [01d 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +peer0.org2.example.com | [01e 04-21 03:28:35.43 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +peer0.org2.example.com | [01f 04-21 03:28:39.23 UTC] [%{longpkg}] %{callpath} -> INFO [][8550cc72] Entry chaincode: name:"cscc" +peer0.org2.example.com | [020 04-21 03:28:39.23 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org2.example.com | [021 04-21 03:28:39.24 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org2.example.com | [022 04-21 03:28:39.26 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=13ms state_commit=4ms) +peer0.org2.example.com | [023 04-21 03:28:39.27 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org2.example.com | [024 04-21 03:28:39.27 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [025 04-21 03:28:39.27 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org2.example.com | [026 04-21 03:28:39.27 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [027 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 +peer0.org2.example.com | [028 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [029 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [02a 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [02b 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [02c 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [02d 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +peer0.org2.example.com | [02e 04-21 03:28:39.30 UTC] [%{longpkg}] %{callpath} -> INFO [][8550cc72] Exit chaincode: name:"cscc" (67ms) +peer0.org2.example.com | [02f 04-21 03:28:40.36 UTC] [%{longpkg}] %{callpath} -> INFO [][9004ddc4] Entry chaincode: name:"cscc" +peer0.org2.example.com | [030 04-21 03:28:40.36 UTC] [%{longpkg}] %{callpath} -> INFO [][9004ddc4] Exit chaincode: name:"cscc" (1ms) +peer0.org2.example.com | [031 04-21 03:28:41.28 UTC] [%{longpkg}] %{callpath} -> INFO [][bfd49466] Entry chaincode: name:"qscc" +peer0.org2.example.com | [032 04-21 03:28:41.29 UTC] [%{longpkg}] %{callpath} -> INFO [][bfd49466] Exit chaincode: name:"qscc" (1ms) +peer0.org2.example.com | [033 04-21 03:28:45.27 UTC] [%{longpkg}] %{callpath} -> INFO [53 10 132 76 168 179 177 188 202 178 128 155 170 70 188 28 16 168 16 26 234 115 252 36 41 33 152 33 3 106 250 67] : Becoming a leader +peer0.org2.example.com | [034 04-21 03:28:45.27 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org2.example.com | [035 04-21 03:28:45.28 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org2.example.com | [036 04-21 03:28:45.32 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [037 04-21 03:28:45.32 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [038 04-21 03:28:45.32 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [039 04-21 03:28:45.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 71ms +peer0.org2.example.com | [03a 04-21 03:28:45.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 25ms (state_validation=2ms block_commit=15ms state_commit=2ms) +peer0.org2.example.com | [03b 04-21 03:28:45.38 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org2.example.com | [03c 04-21 03:28:45.40 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [03d 04-21 03:28:45.40 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [03e 04-21 03:28:45.40 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org2.example.com | [03f 04-21 03:28:45.41 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [040 04-21 03:28:45.44 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 57ms +peer0.org2.example.com | [041 04-21 03:28:45.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 24ms (state_validation=0ms block_commit=13ms state_commit=6ms) +peer0.org2.example.com | [042 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] isn't responsive: EOF +peer0.org2.example.com | [043 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Entering [[113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96]] +peer0.org2.example.com | [044 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96], Metadata: [] +peer0.org2.example.com | [045 04-21 03:28:45.47 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | [046 04-21 03:28:48.85 UTC] [%{longpkg}] %{callpath} -> INFO [][fbd7a9f7] Entry chaincode: name:"lscc" +peer0.org2.example.com | [047 04-21 03:28:48.85 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer0.org2.example.com | [048 04-21 03:28:48.85 UTC] [%{longpkg}] %{callpath} -> INFO [][fbd7a9f7] Exit chaincode: name:"lscc" (1ms) +peer0.org2.example.com | [049 04-21 03:29:28.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org2.example.com | [04a 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 3ms +peer0.org2.example.com | [04b 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer0.org2.example.com | [04c 04-21 03:29:28.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 39ms (state_validation=1ms block_commit=22ms state_commit=4ms) +peer0.org2.example.com | [04d 04-21 03:30:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org2.example.com | [04e 04-21 03:30:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 2ms +peer0.org2.example.com | [04f 04-21 03:30:05.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 37ms (state_validation=0ms block_commit=26ms state_commit=4ms) +peer0.org2.example.com | [050 04-21 03:30:08.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org2.example.com | [051 04-21 03:30:08.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 1ms +peer0.org2.example.com | [052 04-21 03:30:08.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 36ms (state_validation=0ms block_commit=27ms state_commit=3ms) +peer0.org2.example.com | [053 04-21 03:30:11.28 UTC] [%{longpkg}] %{callpath} -> INFO [][adc2a220] Entry chaincode: name:"lscc" +peer0.org2.example.com | [054 04-21 03:30:11.28 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.1] to peer +peer0.org2.example.com | [055 04-21 03:30:11.28 UTC] [%{longpkg}] %{callpath} -> INFO [][adc2a220] Exit chaincode: name:"lscc" (1ms) +peer0.org2.example.com | [056 04-21 03:30:47.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org2.example.com | [057 04-21 03:30:47.78 UTC] [%{longpkg}] %{callpath} -> INFO Find chaincode upgrade transaction for chaincode exp02 on channel businesschannel with new version 1.1 +peer0.org2.example.com | [058 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 3ms +peer0.org2.example.com | [059 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +peer0.org2.example.com | [05a 04-21 03:30:47.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 47ms (state_validation=1ms block_commit=28ms state_commit=4ms) +peer0.org2.example.com | [05b 04-21 03:31:38.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [7] from buffer +peer0.org2.example.com | [05c 04-21 03:31:38.54 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +peer0.org2.example.com | [05d 04-21 03:31:38.55 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +peer0.org2.example.com | [05e 04-21 03:31:38.61 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org2.example.com | [05f 04-21 03:31:38.62 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [060 04-21 03:31:38.62 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [061 04-21 03:31:38.64 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +peer0.org2.example.com | [062 04-21 03:31:38.64 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org2.example.com | [063 04-21 03:31:38.69 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [7] in 152ms +peer0.org2.example.com | [064 04-21 03:31:38.72 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [7] with 1 transaction(s) in 28ms (state_validation=7ms block_commit=14ms state_commit=3ms) +peer0.org2.example.com | [065 04-21 03:31:48.59 UTC] [%{longpkg}] %{callpath} -> INFO [][8922b9e0] Entry chaincode: name:"cscc" +peer0.org2.example.com | [066 04-21 03:31:48.59 UTC] [%{longpkg}] %{callpath} -> INFO [][8922b9e0] Exit chaincode: name:"cscc" (0ms) +peer0.org2.example.com | [067 04-21 03:31:49.53 UTC] [%{longpkg}] %{callpath} -> INFO [][2a5bdaba] Entry chaincode: name:"qscc" +peer0.org2.example.com | [068 04-21 03:31:49.54 UTC] [%{longpkg}] %{callpath} -> INFO [][2a5bdaba] Exit chaincode: name:"qscc" (1ms) +orderer0.example.com | 2019-04-21 03:28:32.554 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | [002 04-21 03:28:32.65 UTC] [%{longpkg}] %{callpath} -> INFO Orderer config values: orderer0.example.com | General.LedgerType = "file" orderer0.example.com | General.ListenAddress = "0.0.0.0" orderer0.example.com | General.ListenPort = 7050 @@ -529,55 +573,58 @@ Attaching to peer1.org1.example.com, peer0.org1.example.com, peer1.org2.example. orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 orderer0.example.com | Debug.BroadcastTraceDir = "" orderer0.example.com | Debug.DeliverTraceDir = "" -orderer0.example.com | [003 12-19 08:21:08.11 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer with TLS enabled -orderer0.example.com | [004 12-19 08:21:08.13 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -orderer0.example.com | [005 12-19 08:21:08.16 UTC] [%{longpkg}] %{callpath} -> INFO Starting system channel 'testchainid' with genesis block hash 8d6b0b6339ee9f86f19c5aa9c258558b74c2fe5eaf40f3e05b346455b978e536 and orderer type solo -orderer0.example.com | [006 12-19 08:21:08.16 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer: +orderer0.example.com | [003 04-21 03:28:32.67 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer with TLS enabled +orderer0.example.com | [004 04-21 03:28:32.71 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +orderer0.example.com | [005 04-21 03:28:32.73 UTC] [%{longpkg}] %{callpath} -> INFO Starting system channel 'testchainid' with genesis block hash 8d6b0b6339ee9f86f19c5aa9c258558b74c2fe5eaf40f3e05b346455b978e536 and orderer type solo +orderer0.example.com | [006 04-21 03:28:32.73 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer: orderer0.example.com | Version: 1.3.0 orderer0.example.com | Commit SHA: development build orderer0.example.com | Go version: go1.10.4 orderer0.example.com | OS/Arch: linux/amd64 orderer0.example.com | Experimental features: true -orderer0.example.com | [007 12-19 08:21:08.17 UTC] [%{longpkg}] %{callpath} -> INFO Beginning to serve requests -orderer0.example.com | [008 12-19 08:21:13.39 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -orderer0.example.com | [009 12-19 08:21:13.40 UTC] [%{longpkg}] %{callpath} -> INFO Created and starting new chain businesschannel -orderer0.example.com | [00a 12-19 08:21:17.67 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33528: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [00b 12-19 08:21:17.67 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33526: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [00c 12-19 08:21:19.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33532: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [00d 12-19 08:21:19.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33530: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [00e 12-19 08:22:21.34 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33604: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [00f 12-19 08:22:59.49 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33622: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [010 12-19 08:23:02.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33636: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [011 12-19 08:23:08.51 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33686: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [012 12-19 08:23:08.78 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33688: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [013 12-19 08:23:08.96 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33690: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [014 12-19 08:23:09.14 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33692: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [015 12-19 08:23:09.33 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33694: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [016 12-19 08:23:09.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33696: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [017 12-19 08:23:09.79 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33698: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [018 12-19 08:23:10.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33700: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [019 12-19 08:23:10.32 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33702: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [01a 12-19 08:23:10.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33704: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [01b 12-19 08:23:10.68 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33706: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [01c 12-19 08:23:10.90 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33708: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [01d 12-19 08:23:17.83 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -orderer0.example.com | [01e 12-19 08:23:17.83 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -orderer0.example.com | [01f 12-19 08:23:17.84 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -orderer0.example.com | [020 12-19 08:23:17.84 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -orderer0.example.com | [021 12-19 08:23:17.85 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33712: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [022 12-19 08:23:17.86 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33710: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [023 12-19 08:23:20.03 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33742: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [024 12-19 08:23:20.21 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33744: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [025 12-19 08:23:20.74 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33746: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [026 12-19 08:23:20.93 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33748: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [027 12-19 08:23:21.12 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33750: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [028 12-19 08:23:21.38 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33752: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [029 12-19 08:23:21.63 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33754: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [02a 12-19 08:23:21.85 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33756: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [02b 12-19 08:23:22.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33758: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [02c 12-19 08:23:22.25 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33760: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [02d 12-19 08:23:22.46 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33762: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [02e 12-19 08:23:22.67 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33764: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [02f 12-19 08:23:22.87 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33766: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [030 12-19 08:23:23.07 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33768: rpc error: code = Canceled desc = context canceled -orderer0.example.com | [031 12-19 08:23:23.28 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33770: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [007 04-21 03:28:32.73 UTC] [%{longpkg}] %{callpath} -> INFO Beginning to serve requests +orderer0.example.com | [008 04-21 03:28:38.24 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +orderer0.example.com | [009 04-21 03:28:38.26 UTC] [%{longpkg}] %{callpath} -> INFO Created and starting new chain businesschannel +orderer0.example.com | [00a 04-21 03:28:38.26 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49578: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [00b 04-21 03:28:42.15 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49606: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [00c 04-21 03:28:42.15 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49608: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [00d 04-21 03:28:44.38 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49610: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [00e 04-21 03:28:44.39 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49612: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [00f 04-21 03:29:26.65 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49676: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [010 04-21 03:30:03.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49694: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [011 04-21 03:30:06.55 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49708: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [012 04-21 03:30:45.77 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49738: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [013 04-21 03:31:25.10 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49796: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [014 04-21 03:31:25.37 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49798: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [015 04-21 03:31:25.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49800: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [016 04-21 03:31:25.74 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49802: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [017 04-21 03:31:25.96 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49804: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [018 04-21 03:31:26.22 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49806: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [019 04-21 03:31:26.44 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49808: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [01a 04-21 03:31:26.66 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49810: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [01b 04-21 03:31:26.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49812: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [01c 04-21 03:31:27.40 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49814: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [01d 04-21 03:31:27.84 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49816: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [01e 04-21 03:31:28.20 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49818: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [01f 04-21 03:31:28.40 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49820: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [020 04-21 03:31:38.48 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +orderer0.example.com | [021 04-21 03:31:38.48 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 0a074f7267314d535012aa062d2d2d2d2d424547494e2043455254494649434154452d2d2d2d2d0a4d4949434b6a43434164436741774942416749515466737132677a384e6f5741315a6d5a615a396f6f6a414b42676771686b6a4f50515144416a427a4d5173770a435159445651514745774a56557a45544d4245474131554543424d4b5132467361575a76636d3570595445574d4251474131554542784d4e5532467549455a790a5957356a61584e6a627a455a4d4263474131554543684d5162334a6e4d53356c654746746347786c4c6d4e76625445634d426f474131554541784d54593245750a62334a6e4d53356c654746746347786c4c6d4e7662544165467730784f4445794d546b774f4445324d444261467730794f4445794d5459774f4445324d4442610a4d477778437a414a42674e5642415954416c56544d524d77455159445651514945777044595778705a6d3979626d6c684d5259774641594456515148457731540a59573467526e4a68626d4e7063324e764d513877445159445651514c45775a6a62476c6c626e5178487a416442674e5642414d4d466b466b62576c75514739790a5a7a45755a586868625842735a53356a623230775754415442676371686b6a4f5051494242676771686b6a4f50514d4242774e43414154552b553950474f78480a636b585772723649773174423350656f466a5a3457335257772b76554638315036367871677a676f67616431384f314a59306e464f31734737564830754632360a727a365a78474a75354356486f303077537a414f42674e56485138424166384542414d434234417744415944565230544151482f424149774144417242674e560a48534d454a4441696743414a59542f41317a304d653172754a4639626a516a7754655a7943416b4e6c354f5172424e47544f34566444414b42676771686b6a4f0a5051514441674e4941444246416945413952516646343261334f505464374d68354f78707251685935657164364f4c38314d6c577a706d7469775943494750350a584b6e39695a745039656a7a4f384a38566d496c4d504e33653173614d75772b66396a4964722f500a2d2d2d2d2d454e442043455254494649434154452d2d2d2d2d0a at index 2 in signature set +orderer0.example.com | [022 04-21 03:31:38.49 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +orderer0.example.com | [023 04-21 03:31:38.50 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49822: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [024 04-21 03:31:38.50 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +orderer0.example.com | [025 04-21 03:31:40.66 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49848: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [026 04-21 03:31:40.81 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49850: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [027 04-21 03:31:41.42 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49852: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [028 04-21 03:31:41.59 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49854: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [029 04-21 03:31:41.76 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49856: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [02a 04-21 03:31:41.95 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49858: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [02b 04-21 03:31:42.17 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49860: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [02c 04-21 03:31:42.37 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49862: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [02d 04-21 03:31:42.58 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49864: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [02e 04-21 03:31:42.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49866: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [02f 04-21 03:31:43.14 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49868: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [030 04-21 03:31:43.38 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49870: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [031 04-21 03:31:43.59 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49872: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [032 04-21 03:31:43.81 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49874: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [033 04-21 03:31:43.96 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49876: rpc error: code = Canceled desc = context canceled +orderer0.example.com | [034 04-21 03:31:44.17 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49878: rpc error: code = Canceled desc = context canceled diff --git a/hyperledger_fabric/v1.3.0/solo/logs/dev_orderer.log b/hyperledger_fabric/v1.3.0/solo/logs/dev_orderer.log index 1193037c..044ff9c2 100644 --- a/hyperledger_fabric/v1.3.0/solo/logs/dev_orderer.log +++ b/hyperledger_fabric/v1.3.0/solo/logs/dev_orderer.log @@ -1,5 +1,5 @@ -2018-12-19 08:21:07.968 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 -[002 12-19 08:21:08.09 UTC] [%{longpkg}] %{callpath} -> INFO Orderer config values: +2019-04-21 03:28:32.554 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +[002 04-21 03:28:32.65 UTC] [%{longpkg}] %{callpath} -> INFO Orderer config values: General.LedgerType = "file" General.ListenAddress = "0.0.0.0" General.ListenPort = 7050 @@ -59,55 +59,58 @@ Kafka.Topic.ReplicationFactor = 3 Debug.BroadcastTraceDir = "" Debug.DeliverTraceDir = "" -[003 12-19 08:21:08.11 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer with TLS enabled -[004 12-19 08:21:08.13 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -[005 12-19 08:21:08.16 UTC] [%{longpkg}] %{callpath} -> INFO Starting system channel 'testchainid' with genesis block hash 8d6b0b6339ee9f86f19c5aa9c258558b74c2fe5eaf40f3e05b346455b978e536 and orderer type solo -[006 12-19 08:21:08.16 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer: +[003 04-21 03:28:32.67 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer with TLS enabled +[004 04-21 03:28:32.71 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +[005 04-21 03:28:32.73 UTC] [%{longpkg}] %{callpath} -> INFO Starting system channel 'testchainid' with genesis block hash 8d6b0b6339ee9f86f19c5aa9c258558b74c2fe5eaf40f3e05b346455b978e536 and orderer type solo +[006 04-21 03:28:32.73 UTC] [%{longpkg}] %{callpath} -> INFO Starting orderer: Version: 1.3.0 Commit SHA: development build Go version: go1.10.4 OS/Arch: linux/amd64 Experimental features: true -[007 12-19 08:21:08.17 UTC] [%{longpkg}] %{callpath} -> INFO Beginning to serve requests -[008 12-19 08:21:13.39 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -[009 12-19 08:21:13.40 UTC] [%{longpkg}] %{callpath} -> INFO Created and starting new chain businesschannel -[00a 12-19 08:21:17.67 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33528: rpc error: code = Canceled desc = context canceled -[00b 12-19 08:21:17.67 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33526: rpc error: code = Canceled desc = context canceled -[00c 12-19 08:21:19.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33532: rpc error: code = Canceled desc = context canceled -[00d 12-19 08:21:19.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33530: rpc error: code = Canceled desc = context canceled -[00e 12-19 08:22:21.34 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33604: rpc error: code = Canceled desc = context canceled -[00f 12-19 08:22:59.49 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33622: rpc error: code = Canceled desc = context canceled -[010 12-19 08:23:02.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33636: rpc error: code = Canceled desc = context canceled -[011 12-19 08:23:08.51 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33686: rpc error: code = Canceled desc = context canceled -[012 12-19 08:23:08.78 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33688: rpc error: code = Canceled desc = context canceled -[013 12-19 08:23:08.96 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33690: rpc error: code = Canceled desc = context canceled -[014 12-19 08:23:09.14 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33692: rpc error: code = Canceled desc = context canceled -[015 12-19 08:23:09.33 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33694: rpc error: code = Canceled desc = context canceled -[016 12-19 08:23:09.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33696: rpc error: code = Canceled desc = context canceled -[017 12-19 08:23:09.79 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33698: rpc error: code = Canceled desc = context canceled -[018 12-19 08:23:10.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33700: rpc error: code = Canceled desc = context canceled -[019 12-19 08:23:10.32 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33702: rpc error: code = Canceled desc = context canceled -[01a 12-19 08:23:10.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33704: rpc error: code = Canceled desc = context canceled -[01b 12-19 08:23:10.68 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33706: rpc error: code = Canceled desc = context canceled -[01c 12-19 08:23:10.90 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33708: rpc error: code = Canceled desc = context canceled -[01d 12-19 08:23:17.83 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -[01e 12-19 08:23:17.83 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -[01f 12-19 08:23:17.84 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -[020 12-19 08:23:17.84 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -[021 12-19 08:23:17.85 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33712: rpc error: code = Canceled desc = context canceled -[022 12-19 08:23:17.86 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33710: rpc error: code = Canceled desc = context canceled -[023 12-19 08:23:20.03 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33742: rpc error: code = Canceled desc = context canceled -[024 12-19 08:23:20.21 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33744: rpc error: code = Canceled desc = context canceled -[025 12-19 08:23:20.74 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33746: rpc error: code = Canceled desc = context canceled -[026 12-19 08:23:20.93 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33748: rpc error: code = Canceled desc = context canceled -[027 12-19 08:23:21.12 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33750: rpc error: code = Canceled desc = context canceled -[028 12-19 08:23:21.38 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33752: rpc error: code = Canceled desc = context canceled -[029 12-19 08:23:21.63 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33754: rpc error: code = Canceled desc = context canceled -[02a 12-19 08:23:21.85 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33756: rpc error: code = Canceled desc = context canceled -[02b 12-19 08:23:22.05 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33758: rpc error: code = Canceled desc = context canceled -[02c 12-19 08:23:22.25 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33760: rpc error: code = Canceled desc = context canceled -[02d 12-19 08:23:22.46 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33762: rpc error: code = Canceled desc = context canceled -[02e 12-19 08:23:22.67 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33764: rpc error: code = Canceled desc = context canceled -[02f 12-19 08:23:22.87 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33766: rpc error: code = Canceled desc = context canceled -[030 12-19 08:23:23.07 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33768: rpc error: code = Canceled desc = context canceled -[031 12-19 08:23:23.28 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 172.18.0.3:33770: rpc error: code = Canceled desc = context canceled +[007 04-21 03:28:32.73 UTC] [%{longpkg}] %{callpath} -> INFO Beginning to serve requests +[008 04-21 03:28:38.24 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +[009 04-21 03:28:38.26 UTC] [%{longpkg}] %{callpath} -> INFO Created and starting new chain businesschannel +[00a 04-21 03:28:38.26 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49578: rpc error: code = Canceled desc = context canceled +[00b 04-21 03:28:42.15 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49606: rpc error: code = Canceled desc = context canceled +[00c 04-21 03:28:42.15 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49608: rpc error: code = Canceled desc = context canceled +[00d 04-21 03:28:44.38 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49610: rpc error: code = Canceled desc = context canceled +[00e 04-21 03:28:44.39 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49612: rpc error: code = Canceled desc = context canceled +[00f 04-21 03:29:26.65 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49676: rpc error: code = Canceled desc = context canceled +[010 04-21 03:30:03.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49694: rpc error: code = Canceled desc = context canceled +[011 04-21 03:30:06.55 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49708: rpc error: code = Canceled desc = context canceled +[012 04-21 03:30:45.77 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49738: rpc error: code = Canceled desc = context canceled +[013 04-21 03:31:25.10 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49796: rpc error: code = Canceled desc = context canceled +[014 04-21 03:31:25.37 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49798: rpc error: code = Canceled desc = context canceled +[015 04-21 03:31:25.52 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49800: rpc error: code = Canceled desc = context canceled +[016 04-21 03:31:25.74 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49802: rpc error: code = Canceled desc = context canceled +[017 04-21 03:31:25.96 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49804: rpc error: code = Canceled desc = context canceled +[018 04-21 03:31:26.22 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49806: rpc error: code = Canceled desc = context canceled +[019 04-21 03:31:26.44 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49808: rpc error: code = Canceled desc = context canceled +[01a 04-21 03:31:26.66 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49810: rpc error: code = Canceled desc = context canceled +[01b 04-21 03:31:26.94 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49812: rpc error: code = Canceled desc = context canceled +[01c 04-21 03:31:27.40 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49814: rpc error: code = Canceled desc = context canceled +[01d 04-21 03:31:27.84 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49816: rpc error: code = Canceled desc = context canceled +[01e 04-21 03:31:28.20 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49818: rpc error: code = Canceled desc = context canceled +[01f 04-21 03:31:28.40 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49820: rpc error: code = Canceled desc = context canceled +[020 04-21 03:31:38.48 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +[021 04-21 03:31:38.48 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +[022 04-21 03:31:38.49 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +[023 04-21 03:31:38.50 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49822: rpc error: code = Canceled desc = context canceled +[024 04-21 03:31:38.50 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +[025 04-21 03:31:40.66 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49848: rpc error: code = Canceled desc = context canceled +[026 04-21 03:31:40.81 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49850: rpc error: code = Canceled desc = context canceled +[027 04-21 03:31:41.42 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49852: rpc error: code = Canceled desc = context canceled +[028 04-21 03:31:41.59 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49854: rpc error: code = Canceled desc = context canceled +[029 04-21 03:31:41.76 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49856: rpc error: code = Canceled desc = context canceled +[02a 04-21 03:31:41.95 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49858: rpc error: code = Canceled desc = context canceled +[02b 04-21 03:31:42.17 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49860: rpc error: code = Canceled desc = context canceled +[02c 04-21 03:31:42.37 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49862: rpc error: code = Canceled desc = context canceled +[02d 04-21 03:31:42.58 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49864: rpc error: code = Canceled desc = context canceled +[02e 04-21 03:31:42.92 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49866: rpc error: code = Canceled desc = context canceled +[02f 04-21 03:31:43.14 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49868: rpc error: code = Canceled desc = context canceled +[030 04-21 03:31:43.38 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49870: rpc error: code = Canceled desc = context canceled +[031 04-21 03:31:43.59 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49872: rpc error: code = Canceled desc = context canceled +[032 04-21 03:31:43.81 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49874: rpc error: code = Canceled desc = context canceled +[033 04-21 03:31:43.96 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49876: rpc error: code = Canceled desc = context canceled +[034 04-21 03:31:44.17 UTC] [%{longpkg}] %{callpath} -> WARN Error reading from 192.168.208.3:49878: rpc error: code = Canceled desc = context canceled diff --git a/hyperledger_fabric/v1.3.0/solo/logs/dev_peer0.log b/hyperledger_fabric/v1.3.0/solo/logs/dev_peer0.log index d0dc7927..01acd74c 100644 --- a/hyperledger_fabric/v1.3.0/solo/logs/dev_peer0.log +++ b/hyperledger_fabric/v1.3.0/solo/logs/dev_peer0.log @@ -1,4 +1,4 @@ -[001 12-19 08:21:10.75 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +[001 04-21 03:28:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: Version: 1.3.0 Commit SHA: development build Go version: go1.10.4 @@ -9,125 +9,141 @@ Base Docker Namespace: hyperledger Base Docker Label: org.hyperledger.fabric Docker Namespace: hyperledger -[002 12-19 08:21:10.75 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt -[003 12-19 08:21:10.75 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider -[004 12-19 08:21:10.93 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized -[005 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized -[006 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 -[007 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -[008 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 -[009 12-19 08:21:10.96 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 -[00a 12-19 08:21:11.01 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled -[00b 12-19 08:21:11.04 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com -[00c 12-19 08:21:11.04 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 -[00d 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered -[00e 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered -[00f 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered -[010 12-19 08:21:11.07 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered -[011 12-19 08:21:11.09 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] -[012 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer0.org1.example.com:7051 [] [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] peer0.org1.example.com:7051 } -[013 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started -[014 12-19 08:21:11.11 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed -[015 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -[016 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed -[017 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -[018 12-19 08:21:11.12 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed -[019 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -[01a 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes -[01b 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 -[01c 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated -[01d 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -[01e 12-19 08:21:11.13 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] -[01f 12-19 08:21:14.13 UTC] [%{longpkg}] %{callpath} -> INFO [][bce1f816] Entry chaincode: name:"cscc" -[020 12-19 08:21:14.13 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block -[021 12-19 08:21:14.13 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage -[022 12-19 08:21:14.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 14ms (state_validation=0ms block_commit=9ms state_commit=2ms) -[023 12-19 08:21:14.16 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block -[024 12-19 08:21:14.17 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -[025 12-19 08:21:14.17 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about -[026 12-19 08:21:14.17 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -[027 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 -[028 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed -[029 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC -[02a 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed -[02b 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC -[02c 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed -[02d 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed -[02e 12-19 08:21:14.19 UTC] [%{longpkg}] %{callpath} -> INFO [][bce1f816] Exit chaincode: name:"cscc" (60ms) -[02f 12-19 08:21:15.71 UTC] [%{longpkg}] %{callpath} -> INFO [][12bf6290] Entry chaincode: name:"cscc" -[030 12-19 08:21:15.71 UTC] [%{longpkg}] %{callpath} -> INFO [][12bf6290] Exit chaincode: name:"cscc" (1ms) -[031 12-19 08:21:16.63 UTC] [%{longpkg}] %{callpath} -> INFO [][2bea5f62] Entry chaincode: name:"qscc" -[032 12-19 08:21:16.63 UTC] [%{longpkg}] %{callpath} -> INFO [][2bea5f62] Exit chaincode: name:"qscc" (1ms) -[033 12-19 08:21:20.19 UTC] [%{longpkg}] %{callpath} -> INFO [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] : Becoming a leader -[034 12-19 08:21:20.19 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel -[035 12-19 08:21:20.22 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer -[036 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -[037 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about -[038 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -[039 12-19 08:21:20.28 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -[03a 12-19 08:21:20.31 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 86ms -[03b 12-19 08:21:20.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 21ms (state_validation=0ms block_commit=15ms state_commit=2ms) -[03c 12-19 08:21:20.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer -[03d 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations -[03e 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -[03f 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -[040 12-19 08:21:20.35 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -[041 12-19 08:21:20.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 34ms -[042 12-19 08:21:20.41 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=21ms state_commit=2ms) -[043 12-19 08:21:27.11 UTC] [%{longpkg}] %{callpath} -> INFO [][01b2a3f6] Entry chaincode: name:"lscc" -[044 12-19 08:21:27.11 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer -[045 12-19 08:21:27.11 UTC] [%{longpkg}] %{callpath} -> INFO [][01b2a3f6] Exit chaincode: name:"lscc" (1ms) -[046 12-19 08:21:30.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3e1a5dc7] Entry chaincode: name:"lscc" -[047 12-19 08:21:30.12 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' -[048 12-19 08:21:30.12 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental -[049 12-19 08:22:21.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3e1a5dc7] Exit chaincode: name:"lscc" (51306ms) -[04a 12-19 08:22:23.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer -[04b 12-19 08:22:23.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 3ms -[04c 12-19 08:22:23.36 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] -[04d 12-19 08:22:23.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 44ms (state_validation=1ms block_commit=36ms state_commit=3ms) -[04e 12-19 08:22:59.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cf3ed3f7] Entry chaincode: name:"exp02" -[04f 12-19 08:22:59.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][cf3ed3f7] Exit chaincode: name:"exp02" (6ms) -[050 12-19 08:23:01.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer -[051 12-19 08:23:01.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 0ms -[052 12-19 08:23:01.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=17ms state_commit=4ms) -[053 12-19 08:23:02.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][16f7dde8] Entry chaincode: name:"exp02" -[054 12-19 08:23:02.23 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][16f7dde8] Exit chaincode: name:"exp02" (2ms) -[055 12-19 08:23:04.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer -[056 12-19 08:23:04.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 3ms -[057 12-19 08:23:04.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 33ms (state_validation=0ms block_commit=24ms state_commit=2ms) -[058 12-19 08:23:04.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][353f421e] Entry chaincode: name:"exp02" -[059 12-19 08:23:04.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][353f421e] Exit chaincode: name:"exp02" (3ms) -[05a 12-19 08:23:05.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b7c66e39] Entry chaincode: name:"lscc" -[05b 12-19 08:23:05.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b7c66e39] Exit chaincode: name:"lscc" (0ms) -[05c 12-19 08:23:05.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d7a4c10e] Entry chaincode: name:"lscc" -[05d 12-19 08:23:05.29 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d7a4c10e] Exit chaincode: name:"lscc" (1ms) -[05e 12-19 08:23:05.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e19914d8] Entry chaincode: name:"lscc" -[05f 12-19 08:23:05.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e19914d8] Exit chaincode: name:"lscc" (1ms) -[060 12-19 08:23:05.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0f651a18] Entry chaincode: name:"lscc" -[061 12-19 08:23:05.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0f651a18] Exit chaincode: name:"lscc" (1ms) -[062 12-19 08:23:05.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ffcfc314] Entry chaincode: name:"lscc" -[063 12-19 08:23:05.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ffcfc314] Exit chaincode: name:"lscc" (2ms) -[064 12-19 08:23:06.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c89d660e] Entry chaincode: name:"qscc" -[065 12-19 08:23:06.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c89d660e] Exit chaincode: name:"qscc" (1ms) -[066 12-19 08:23:06.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a9365fbe] Entry chaincode: name:"qscc" -[067 12-19 08:23:06.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a9365fbe] Exit chaincode: name:"qscc" (1ms) -[068 12-19 08:23:07.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0bfb31ad] Entry chaincode: name:"cscc" -[069 12-19 08:23:07.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0bfb31ad] Exit chaincode: name:"cscc" (1ms) -[06a 12-19 08:23:07.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bf1c365] Entry chaincode: name:"cscc" -[06b 12-19 08:23:07.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5bf1c365] Exit chaincode: name:"cscc" (0ms) -[06c 12-19 08:23:08.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][73f3820c] Entry chaincode: name:"cscc" -[06d 12-19 08:23:08.03 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][73f3820c] Exit chaincode: name:"cscc" (0ms) -[06e 12-19 08:23:17.87 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer -[06f 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -[070 12-19 08:23:17.90 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set -[071 12-19 08:23:17.92 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations -[072 12-19 08:23:17.94 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] -[073 12-19 08:23:17.95 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself -[074 12-19 08:23:17.95 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] -[075 12-19 08:23:17.96 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about -[076 12-19 08:23:18.00 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 122ms -[077 12-19 08:23:18.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 53ms (state_validation=0ms block_commit=14ms state_commit=11ms) -[078 12-19 08:23:31.09 UTC] [%{longpkg}] %{callpath} -> INFO [][4b670541] Entry chaincode: name:"cscc" -[079 12-19 08:23:31.09 UTC] [%{longpkg}] %{callpath} -> INFO [][4b670541] Exit chaincode: name:"cscc" (0ms) -[07a 12-19 08:23:32.15 UTC] [%{longpkg}] %{callpath} -> INFO [][e9227326] Entry chaincode: name:"qscc" -[07b 12-19 08:23:32.15 UTC] [%{longpkg}] %{callpath} -> INFO [][e9227326] Exit chaincode: name:"qscc" (1ms) +[002 04-21 03:28:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +[003 04-21 03:28:35.88 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +[004 04-21 03:28:36.07 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +[005 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +[006 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.6:7051 +[007 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[008 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 192.168.208.6:7051 +[009 04-21 03:28:36.10 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[00a 04-21 03:28:36.11 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +[00b 04-21 03:28:36.13 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +[00c 04-21 03:28:36.13 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +[00d 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +[00e 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +[00f 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +[010 04-21 03:28:36.15 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered +[011 04-21 03:28:36.18 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +[012 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of {peer0.org1.example.com:7051 [] [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] peer0.org1.example.com:7051 } +[013 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +[014 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +[015 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[016 04-21 03:28:36.20 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +[017 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[018 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +[019 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +[01a 04-21 03:28:36.21 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +[01b 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +[01c 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +[01d 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[01e 04-21 03:28:36.22 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[01f 04-21 03:28:38.75 UTC] [%{longpkg}] %{callpath} -> INFO [][74f0fe16] Entry chaincode: name:"cscc" +[020 04-21 03:28:38.75 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +[021 04-21 03:28:38.75 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +[022 04-21 03:28:38.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 21ms (state_validation=0ms block_commit=15ms state_commit=3ms) +[023 04-21 03:28:38.78 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +[024 04-21 03:28:38.79 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[025 04-21 03:28:38.79 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +[026 04-21 03:28:38.79 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[027 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information, current ledger sequence is at = 0, next expected block is = 1 +[028 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +[029 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[02a 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +[02b 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[02c 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +[02d 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode +lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed +[02e 04-21 03:28:38.82 UTC] [%{longpkg}] %{callpath} -> INFO [][74f0fe16] Exit chaincode: name:"cscc" (75ms) +[02f 04-21 03:28:39.99 UTC] [%{longpkg}] %{callpath} -> INFO [][0cf6365b] Entry chaincode: name:"cscc" +[030 04-21 03:28:39.99 UTC] [%{longpkg}] %{callpath} -> INFO [][0cf6365b] Exit chaincode: name:"cscc" (1ms) +[031 04-21 03:28:40.97 UTC] [%{longpkg}] %{callpath} -> INFO [][ef857b74] Entry chaincode: name:"qscc" +[032 04-21 03:28:40.97 UTC] [%{longpkg}] %{callpath} -> INFO [][ef857b74] Exit chaincode: name:"qscc" (1ms) +[033 04-21 03:28:44.79 UTC] [%{longpkg}] %{callpath} -> INFO [113 255 111 138 242 70 51 12 249 145 50 36 31 50 246 40 86 185 94 172 159 12 87 25 74 126 248 114 220 59 12 96] : Becoming a leader +[034 04-21 03:28:44.79 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +[035 04-21 03:28:44.81 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +[036 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[037 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[038 04-21 03:28:44.82 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[039 04-21 03:28:44.83 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[03a 04-21 03:28:44.86 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 47ms +[03b 04-21 03:28:44.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 23ms (state_validation=0ms block_commit=14ms state_commit=4ms) +[03c 04-21 03:28:44.88 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +[03d 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[03e 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +[03f 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[040 04-21 03:28:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[041 04-21 03:28:44.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 50ms +[042 04-21 03:28:44.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 31ms (state_validation=0ms block_commit=20ms state_commit=4ms) +[043 04-21 03:28:47.43 UTC] [%{longpkg}] %{callpath} -> INFO [][c0ded38f] Entry chaincode: name:"lscc" +[044 04-21 03:28:47.43 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +[045 04-21 03:28:47.43 UTC] [%{longpkg}] %{callpath} -> INFO [][c0ded38f] Exit chaincode: name:"lscc" (1ms) +[046 04-21 03:28:50.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][84c18647] Entry chaincode: name:"lscc" +[047 04-21 03:28:50.96 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +[048 04-21 03:28:50.96 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental +[049 04-21 03:29:26.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][84c18647] Exit chaincode: name:"lscc" (35741ms) +[04a 04-21 03:29:28.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +[04b 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 4ms +[04c 04-21 03:29:28.67 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +[04d 04-21 03:29:28.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 37ms (state_validation=1ms block_commit=18ms state_commit=5ms) +[04e 04-21 03:30:03.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2d49b229] Entry chaincode: name:"exp02" +[04f 04-21 03:30:03.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][2d49b229] Exit chaincode: name:"exp02" (4ms) +[050 04-21 03:30:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +[051 04-21 03:30:05.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 2ms +[052 04-21 03:30:05.97 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 37ms (state_validation=1ms block_commit=24ms state_commit=4ms) +[053 04-21 03:30:06.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][15cffc0e] Entry chaincode: name:"exp02" +[054 04-21 03:30:06.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][15cffc0e] Exit chaincode: name:"exp02" (2ms) +[055 04-21 03:30:08.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +[056 04-21 03:30:08.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 1ms +[057 04-21 03:30:08.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 35ms (state_validation=0ms block_commit=25ms state_commit=4ms) +[058 04-21 03:30:08.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f289ea93] Entry chaincode: name:"exp02" +[059 04-21 03:30:08.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][f289ea93] Exit chaincode: name:"exp02" (4ms) +[05a 04-21 03:30:09.90 UTC] [%{longpkg}] %{callpath} -> INFO [][3adb38a2] Entry chaincode: name:"lscc" +[05b 04-21 03:30:09.90 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.1] to peer +[05c 04-21 03:30:09.90 UTC] [%{longpkg}] %{callpath} -> INFO [][3adb38a2] Exit chaincode: name:"lscc" (1ms) +[05d 04-21 03:30:12.17 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b34fd3c4] Entry chaincode: name:"lscc" +[05e 04-21 03:30:12.18 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +[05f 04-21 03:30:12.18 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with tags: experimental +[060 04-21 03:30:45.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][b34fd3c4] Exit chaincode: name:"lscc" (33664ms) +[061 04-21 03:30:45.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][17f07ec3] Entry chaincode: name:"exp02" +[062 04-21 03:30:45.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][17f07ec3] Exit chaincode: name:"exp02" (3ms) +[063 04-21 03:30:47.78 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +[064 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO Find chaincode upgrade transaction for chaincode exp02 on channel businesschannel with new version 1.1 +[065 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 2ms +[066 04-21 03:30:47.79 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling LSCC state update for chaincode [exp02] +[067 04-21 03:30:47.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 39ms (state_validation=1ms block_commit=24ms state_commit=6ms) +[068 04-21 03:30:48.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8529b38] Entry chaincode: name:"exp02" +[069 04-21 03:30:48.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c8529b38] Exit chaincode: name:"exp02" (3ms) +[06a 04-21 03:31:21.76 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8d3dd766] Entry chaincode: name:"lscc" +[06b 04-21 03:31:21.77 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8d3dd766] Exit chaincode: name:"lscc" (1ms) +[06c 04-21 03:31:21.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9c05f64c] Entry chaincode: name:"lscc" +[06d 04-21 03:31:21.95 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9c05f64c] Exit chaincode: name:"lscc" (1ms) +[06e 04-21 03:31:22.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ee13f3d9] Entry chaincode: name:"lscc" +[06f 04-21 03:31:22.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ee13f3d9] Exit chaincode: name:"lscc" (1ms) +[070 04-21 03:31:22.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db8b5390] Entry chaincode: name:"lscc" +[071 04-21 03:31:22.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db8b5390] Exit chaincode: name:"lscc" (1ms) +[072 04-21 03:31:22.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9675f175] Entry chaincode: name:"lscc" +[073 04-21 03:31:22.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9675f175] Exit chaincode: name:"lscc" (2ms) +[074 04-21 03:31:23.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed35492b] Entry chaincode: name:"qscc" +[075 04-21 03:31:23.12 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ed35492b] Exit chaincode: name:"qscc" (1ms) +[076 04-21 03:31:23.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][45fd4a78] Entry chaincode: name:"qscc" +[077 04-21 03:31:23.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][45fd4a78] Exit chaincode: name:"qscc" (1ms) +[078 04-21 03:31:24.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0fadbe3f] Entry chaincode: name:"cscc" +[079 04-21 03:31:24.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][0fadbe3f] Exit chaincode: name:"cscc" (1ms) +[07a 04-21 03:31:24.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7aede3df] Entry chaincode: name:"cscc" +[07b 04-21 03:31:24.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][7aede3df] Exit chaincode: name:"cscc" (0ms) +[07c 04-21 03:31:24.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][39ed1fae] Entry chaincode: name:"cscc" +[07d 04-21 03:31:24.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][39ed1fae] Exit chaincode: name:"cscc" (1ms) +[07e 04-21 03:31:38.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [7] from buffer +[07f 04-21 03:31:38.52 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +[080 04-21 03:31:38.52 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity 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 at index 2 in signature set +[081 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +[082 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}] +[083 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer with same endpoint, skipping connecting to myself +[084 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}] +[085 04-21 03:31:38.56 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +[086 04-21 03:31:38.61 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [7] in 86ms +[087 04-21 03:31:38.66 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [7] with 1 transaction(s) in 51ms (state_validation=0ms block_commit=45ms state_commit=3ms) +[088 04-21 03:31:48.27 UTC] [%{longpkg}] %{callpath} -> INFO [][db6b9983] Entry chaincode: name:"cscc" +[089 04-21 03:31:48.27 UTC] [%{longpkg}] %{callpath} -> INFO [][db6b9983] Exit chaincode: name:"cscc" (0ms) +[08a 04-21 03:31:49.24 UTC] [%{longpkg}] %{callpath} -> INFO [][a883ee52] Entry chaincode: name:"qscc" +[08b 04-21 03:31:49.24 UTC] [%{longpkg}] %{callpath} -> INFO [][a883ee52] Exit chaincode: name:"qscc" (1ms)